Data encryption method, data decryption method and devices
A technology for data encryption and encryption keys, applied in the usage of multiple keys/algorithms, electrical components, transmission systems, etc., to solve the problems of data security, integrity, and tamper-proof reduction.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] Aiming at the problems of data security, integrity and tamper-proof reduction existing in the prior art, an embodiment of the present invention provides a data encryption method, which can be applied to a data encryption device. The flow of the method is as follows: figure 1 As shown, the execution steps are as follows:
[0055] S11: After receiving the original data sent by the data sender App, obtain an encryption key corresponding to the original data, a preset first encryption algorithm and a second encryption algorithm corresponding to the data sender App.
[0056] At present, the number of Apps is increasing. Commonly used ones are QQ, Fetion, WeChat, etc. These Apps can exchange data. The App that sends data is called the data sender App, and the App that receives data is called the data receiver. App.
[0057] Before the data sending app sends data, in order to ensure the security of data transmission, the data can be encrypted, and the data that needs to be en...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com