Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, decryption method, encryption device and decryption device

An encryption method and encryption lock technology, applied in the computer field, can solve problems such as poor file security, and achieve the effect of improving security

Inactive Publication Date: 2018-01-09
NEW FOUNDER HLDG DEV LLC +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides an encryption method, a decryption method, an encryption device and a decryption device, which are used to solve the problem of poor file security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method, encryption device and decryption device
  • Encryption method, decryption method, encryption device and decryption device
  • Encryption method, decryption method, encryption device and decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] figure 1 A flowchart of an embodiment of the encryption method provided by the present invention, such as figure 1 shown, including:

[0028] 101. Acquire the file to be encrypted in the terminal.

[0029] The encryption method provided by the present invention can be executed by an encryption device, and the specific form of the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method, a decryption method, an encryption device and a decryption device. The encryption method includes the steps of obtaining a to-be-encrypted file in a terminal, encrypting the to-be-encrypted file through a public key in an encryption lock, and transmitting the encrypted file to the terminal. As a thief can not steel the public key saved in the encryption lock, the problem that the public key saved in an executable program in the prior art is easily obtained and decrypted by the thief to obtain the file is solved accordingly, and the file safety is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an encryption method, a decryption method, an encryption device and a decryption device. Background technique [0002] In the prior art, generally, the public key and private key required for encryption are directly stored in the executable program in the form of a constant, or are stored in the program in the form of a constant after simple processing. When the file needs to be encrypted, the public key is taken out from the program for encryption; when the file needs to be decrypted, the private key is taken out of the program for decryption. [0003] However, in the existing technology, the thief can decompile the executable program to obtain the assembly program, search for constants in the assembly program, and study the searched constants one by one, it is easy to find the public key and private key, and then decrypt it to obtain files, resulting in poor file sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/6209G06F2221/2107
Inventor 郭相军林好
Owner NEW FOUNDER HLDG DEV LLC