Encryption and decryption method and system of terminal data

An encryption and decryption, data technology, applied in the field of data security, can solve problems such as hidden dangers of enterprise data security, and achieve the effect of avoiding data leakage

Active Publication Date: 2013-08-21
MAIPU COMM TECH CO LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a method and system for encrypting and decrypting terminal data, so as to solve the problem in the prior art that enterprise data stored on mobile terminals has potential security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system of terminal data
  • Encryption and decryption method and system of terminal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] see figure 1 , which is a flowchart of a method for encrypting and decrypting terminal data in an embodiment of the present invention, including the following steps:

[0031] Step 101, the client receives the personal key set by the terminal user, and submits the personal key set by the terminal user to the server, and the server generates and saves a system key corresponding to the terminal user.

[0032] In this step, after receiving the personal key set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption and decryption method and system of terminal data, and relates to encryption techniques in the field of data safety. The encryption and decryption method and system solves the problem that in the prior art, enterprise data stored on a mobile terminal have safety hidden risks. The encryption and decryption method includes the steps: a client receives a private secret key set by a terminal user, the private secrete key set by the terminal user is submitted to a server end, the server end produces a system secret key corresponding to the terminal user and stores the system secret key, when the terminal user carried out data encryption and decryption operations, the client submits the private secret key of the terminal user to the server end, the server end returns to the corresponding system secrete key after the private secrete key passes verification, and the client carries out encryption and decryption operations on data by means of the private secrete key and the corresponding system secrete key.

Description

technical field [0001] The invention relates to encryption technology in the field of data security, in particular to a method and system for encrypting and decrypting terminal data using a symmetric encryption algorithm. Background technique [0002] With the development of the mobile Internet, more and more smart mobile terminals such as mobile phones and tablet computers are used in mobile office and mobile business activities in various industries such as government, public security, banks, and enterprises. Because the confidential information of the enterprise will inevitably be stored on the mobile terminal. The data security of this information is very important to the enterprise and needs to be encrypted and stored. Data encryption is the basis of information security. The so-called data encryption technology refers to converting a piece of information (usually referred to as plaintext) through an encryption key and an encryption function into meaningless ciphertext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F21/62
Inventor 尹茂
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products