key embedded cipher
An embedded and key technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] The realization of the present invention includes two parts of work, namely the design of the key embedded algorithm module and the construction of the key embedded network security system with the key embedded algorithm module as the basic unit. The following is attached Figure 1 to 4 , Describe the implementation method of the present invention.
[0061] 1. Design and production of key embedded algorithm module
[0062] Choose the appropriate computer language, such as VB, C#, C++, and compile the key embedded algorithm program. Refer to the basic algorithm flow of the key embedded algorithm module ( figure 1 ), design the generating function module according to the following requirements.
[0063] The mother function module is composed of three independent sub-modules: mother function encoder E, mother function decoder D, initialization function 12, such as figure 1 Shown. The generating function encoder E includes an encryption transformation function 1 and an encryp...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com