Information encryption method of high security
A technology for information encryption and security, applied in security devices, wireless communications, electrical components, etc., can solve problems such as unguaranteed security, achieve security assurance, protect private information, and reduce key transmission Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0015] Preferred embodiments of the present invention are described in detail below, wherein, for the sake of clarity and simplicity, detailed detailed descriptions of known functions and structures in the devices described herein will be omitted when it may obscure the subject matter of the present invention.
[0016] In the process of the method described in the embodiment of the present invention, if A sends an encrypted short message to B as an example, the method may specifically include the following steps:
[0017] Step 1: Select the text message to be encrypted and sent, encrypt the data to be sent, negotiate a digital key with each other according to their respective key password tables, and the terminal device and the terminal device store a fake text message table;
[0018] Step 2: Combine the selected text message with the input password to generate encrypted data, use symmetric encryption technology to encrypt the content of the text message when sending and after ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com