Encryption and decryption method and device with user/device identity authentication
A technology of device identity and user equipment, which is applied in the field of data communication and information security, and can solve problems such as inability to directly process encrypted incomplete packets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044]All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.
[0045] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.
[0046] Relevant description of the present invention:
[0047] 1. Symbol description:
[0048] 0x represents a hexadecimal number;
[0049] ID User ID;
[0050] ID_LEN length of user identification ID (bits);
[0051] IV block cipher algorithm initialization vector (equal to the full block length);
[0052] P plaintext;
[0053] P_LEN plaintext length (bits);
[0054] HASH () The hash cipher algorithm selected.
[0055] 2 Algorithm conv...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


