Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption devices and methods thereof

A technology of encryption device and encryption method, which is applied in the field of data security, can solve problems such as loss of function, and achieve the effect of reliable encryption

Inactive Publication Date: 2013-07-03
MEDIATEK INC
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method will not work when unauthorized users skip or change the authentication check procedure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption devices and methods thereof
  • Encryption and decryption devices and methods thereof
  • Encryption and decryption devices and methods thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 It is a simplified block diagram of a communication system using the encryption and decryption method of the embodiment of the present invention. The communication system 1 may include exchange networks 102 , 106 a , 106 b and a network 104 , wherein the network 104 is connected to each exchange network. The switching network 102 can be further coupled to the application providers 100a and 100b, and the switching networks 106a, 106b can be further coupled to user equipments (User Equipment, UE) 108a-108b respectively. Application providers 100a and 100b may be computer servers that include application software that may be downloaded by remote user devices 108a and 108b. The switching network 102 may include hubs and routers that direct data transmission between the application providers 100 a , 100 b and the network 104 . Switching network 106a may include hubs, routers, telephone exchanges, and base stations to provide wireless or partially wireless data tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Encryption and decryption devices, computer readable media, and methods thereof. The decryption device comprises a key generator and a decryption module. The key generator is capable of receiving a first security key information for generating an application key. The decryption module is coupled to the key generator, capable of decrypting at least a portion of encrypted software data according to the application key, wherein the software data is used by a software when a software code of the software is executed.

Description

technical field [0001] The present invention relates to data security, and more particularly to an encryption and decryption device and method thereof. Background technique [0002] Recently, using mobile devices to access application software from the Internet has become a common method, so the demand for application software data security has gradually increased. Data security can be used to prevent unauthorized recipients from accessing applications using unauthorized access methods software. Currently, data security establishment methods for application software include checking a registration code or activation key (key) when the software is activated. However, this method will be broken when an unauthorized user obtains the registration code or activation key from other channels. Another known method of establishing data security uses an authentication check procedure to determine the validity of a signature or certificate after software activation. However, this ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/62
CPCG06F21/125G06F21/602H04L63/0435H04W12/02H04W12/04H04W12/35
Inventor 张弘义
Owner MEDIATEK INC