Encryption method and device and terminal

An encryption method and technology of an encryption device, applied in the field of communication, can solve problems such as low security and single encryption key, and achieve the effect of enhancing security and avoiding simplification

Active Publication Date: 2015-03-25
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the technical problem to be solved by the present invention is to provide an encryption method, device and terminal to solve the defects in the prior art that the encryption method for terminal equipment has a relatively single encryption key and low security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device and terminal
  • Encryption method and device and terminal
  • Encryption method and device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 1 It is a flow chart of the encryption method proposed by the present invention. The method includes:

[0056] S1, obtain the identity information of the device through the encryption card.

[0057] Specifically, the encryption card used in this embodiment is equipped with independent functional modules, such as a microprocessor module, an encryption module, a decryption module, a communication module, and a storage module. The encryption card used in this embodiment may be the same size as the SD memory card of the smart device, compatible with the SD card slot and the corresponding interface. The encryption card used in this embodiment may also be a card with a specific size and a specific interface.

[0058] Specifically, a device using the encryption card for unlocking operation is provided with a card slot matching the encryption card. It can be understood that an interface contact piece or an interface pin for establishing a communication link with the ...

Embodiment 2

[0072] figure 2 It is a flow chart of the encryption method proposed by the second preferred embodiment of the present invention. Based on the above embodiment, obtaining the identity information of the device through the encryption card further includes:

[0073] S11, judging whether the encryption card is inserted into the device. Whether the encryption card is inserted into the device is judged by the interface contact piece or the interface pin set in the card slot that establishes the communication link with the encryption card. Valid connection range.

[0074] S12, if the encryption card has been inserted into the device, establish a communication link between the encryption card and the device. It can be understood that the communication link between the encryption card and the device may be an NFC communication link, a Bluetooth communication link, a WiFi communication link, or the like.

[0075] S13, if the encryption card is separated from the device, clear the ...

Embodiment 3

[0078] image 3 This is a flow chart of the encryption method proposed by the third preferred embodiment of the present invention. Based on the above embodiment, acquiring the identity information of the device through the encryption card further includes:

[0079] S14, if a communication link has been established between the encryption card and the device, the communication link is encrypted by the encryption card to generate an encrypted link.

[0080] It can be understood that the encryption module is not set on the device side, but the encryption module is built into the encryption card. The beneficial effect of this is that the encryption module operates independently, so that the encryption key generated by the encryption card exists independently and is not disturbed. At the same time, other devices do not have the right to read the encryption card, thus ensuring the security of the encryption card.

[0081] Further, by encrypting the communication link between the en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method and device and a terminal. The method includes the following steps that identity information of equipment is acquired through an encryption card; an encryption key is generated according to the identity information; the equipment is encrypted through the encryption key. By the implementation of the encryption method and device and the terminal, the identity information of the equipment is acquired through the encryption card, the encryption key is generated according to the identity information, and the equipment is encrypted through the encryption key. The equipment is encrypted in the mode that the external encryption card is inserted, the equipment is encrypted through the encryption key independently generated by the encryption card, the simplification of an encryption password is avoided, and the encryption safety of the equipment is improved.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, to an encryption method, device and terminal. Background technique [0002] In the prior art, encryption methods for terminal devices usually include the following: [0003] 1. Encrypt the terminal device through the built-in software program of the terminal device, for example, encrypt the terminal through the software program setting the program password or the system password; [0004] 2. Encrypt the terminal device through a server or other terminal device remotely connected to the terminal device; [0005] Using the above encryption method for terminal equipment, on the one hand, the terminal equipment is encrypted with a unilaterally determined password, that is, through program setting or through remote acquisition, the encryption key is obtained in a simple way and is easy to be cracked; The encryption method needs to rely on local password generation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L9/32H04L29/06
CPCH04L9/3234H04L63/0853H04W12/02H04W12/06
Inventor 申世安刘英东
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products