Data encryption method, data decryption method and devices

A technology for data encryption and encryption keys, applied in the usage of multiple keys/algorithms, electrical components, transmission systems, etc., to solve the problems of data security, integrity, and tamper-proof reduction.

Inactive Publication Date: 2015-04-29
BEIJING BLUE POWER SOFTWARE
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a data encryption method, a data decryption method, and a device to solve the problems of data security, integrity, and tamper resistance reduction in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data decryption method and devices
  • Data encryption method, data decryption method and devices
  • Data encryption method, data decryption method and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Aiming at the problems of data security, integrity and tamper-proof reduction existing in the prior art, an embodiment of the present invention provides a data encryption method, which can be applied to a data encryption device. The flow of the method is as follows: figure 1 As shown, the execution steps are as follows:

[0055] S11: After receiving the original data sent by the data sender App, obtain an encryption key corresponding to the original data, a preset first encryption algorithm and a second encryption algorithm corresponding to the data sender App.

[0056] At present, the number of Apps is increasing. Commonly used ones are QQ, Fetion, WeChat, etc. These Apps can exchange data. The App that sends data is called the data sender App, and the App that receives data is called the data receiver. App.

[0057] Before the data sending app sends data, in order to ensure the security of data transmission, the data can be encrypted, and the data that needs to be en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data encryption method, a data decryption method, a data encryption device and a data decryption device. The data encryption method comprises the following steps: after receiving original data sent by a data sending party App (Application), acquiring an encryption key corresponding to the original data as well as a first encryption algorithm and a second encryption algorithm which are preset and correspond to the data sending party App; carrying out encryption on the original data by using the first encryption algorithm and the encryption key and generating encrypted data corresponding to the original data; packaging the encrypted data by using the second encryption algorithm and generating a digital envelope corresponding to the encryption key; packaging the digital envelope into the enciphered data to be sent to the data sending party App. According to the scheme, encrypted data interworking among multiple operation systems and among multiple Apps can be realized and safety, integrity and tamper resistance of the data are improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a data encryption method, a data decryption method and a device. Background technique [0002] At present, in order to ensure the security of data transmission, the original data is generally encrypted, and the encrypted data is obtained before transmission. At the same time, with the rapid development of terminal technology, there are more and more types of operating systems, commonly used are Windows, Linux, Unix, Android, Ios, etc.; in order to meet various needs of users, application programs (Application , App) types are also increasing. Due to the diversified development of operating systems and Apps, how to ensure the encrypted data intercommunication between multiple operating systems and multiple Apps has become very important. [0003] According to the existing data encryption method, a fixed key is usually set in advance, and the data sender App uses the fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L63/0428H04L9/14
Inventor 张伟平夏东山
Owner BEIJING BLUE POWER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products