Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data encryption method and system

A data encryption and data technology, applied in the field of communication, can solve the problems of low security and cracking by illegal users, and achieve the effect of improving security and convenience, improving security, and improving user experience

Inactive Publication Date: 2013-08-07
NUBIA TECHNOLOGY CO LTD
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing data encryption method, the seed key for encrypting or decrypting data is usually pre-generated by the terminal equipment manufacturer and stored in a designated security file or security chip. The seed keys of different users in the same terminal system are the same, It is very easy to be cracked by illegal users through reverse engineering, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and system
  • Data encryption method and system
  • Data encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0037] see figure 1 , propose the first embodiment of the data encryption method of the present invention, the data encryption method includes the following steps:

[0038] Step S101, the current user logs into the terminal system through fingerprint information verification.

[0039] The fingerprint information of several users can be pre-registered in the terminal system to realize the management of multiple users in the same terminal system. The specific steps are: first create a user, then collect the fingerprint information of one or more fingers of the user, and finally generate the fingerprint of the user Information Sheet. Then pre-registered users can log in to the system through user authentication, that is, the current user logs in to the terminal system through fingerprint information verification, as follows: figure 2 Shown:

[0040] Step S201, collecting fingerprint information of the current user.

[0041] The current user inputs fingerprint information to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and system. The data encryption method comprises the steps of obtaining a cipher key which is generated according to fingerprint information of a current user when the current user conducts encryption or decryption operation to data; and encrypting or decrypting the data by using the cipher key. Since the fingerprint information of users is different, the cipher keys which are generated according to the fingerprint information are different, i.e. each user owns a unique cipher key and further owns a unique data encryption method. The cipher key is generated according to the fingerprint information through a preset rule in terminal systems. Even though the finger information of the users is illegally copied and stolen, encrypted files in the terminal systems cannot be decrypted in other systems, so that the security of user data is greatly improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a data encryption method and system. Background technique [0002] With the continuous development of communication technology, increasingly popular communication terminals, especially smart terminals, have more and more functions, more and more private information of users is stored in communication terminals, and multiple users of the same communication terminal The need to use is also increasing. How to better protect the private information of users, better meet the individual needs of multiple users, and effectively improve user experience is becoming more and more important. Accordingly, user data needs to be encrypted and protected. [0003] In the existing data encryption method, the seed key for encrypting or decrypting data is usually pre-generated by the terminal equipment manufacturer and stored in a designated security file or security chip. The seed keys of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K9/00
Inventor 柏凤佳
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products