Data encryption and decryption method, device thereof, and terminal

A data encryption and terminal technology, which is applied in the field of information security, can solve the problems of insecure private call records and private text messages, and achieve the effect of increasing speed, improving security, and ensuring security

Inactive Publication Date: 2015-08-26
ZTE CORP
View PDF4 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantage of the prior art is that the mobile terminal must store the key for encrypting data locally
However, since the key used for encryption is stored locally, it is easy for illegal use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device thereof, and terminal
  • Data encryption and decryption method, device thereof, and terminal
  • Data encryption and decryption method, device thereof, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0068] The flow of the data encryption method is as follows figure 1 As shown, for a terminal, the method includes:

[0069] Step 100. Randomly generate an asymmetric key when setting the user's privacy password;

[0070] Step 101. Obtain a symmetric key randomly generated when the data to be encrypted is obtained;

[0071] Step 102. Using the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed in the present invention are a data encrypting and decrypting method, apparatus, and terminal, the method comprising: when setting a user privacy password, randomly generating an asymmetric key; when acquiring data to be encrypted, randomly generating a symmetric key; using the symmetric key to encrypt the data to be encrypted using a symmetrical encryption algorithm, obtaining encrypted data; using a public key of the asymmetric key to encrypt the symmetric key, obtaining a first cipher text corresponding to the symmetric key; and recording the encrypted data and the first cipher text.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a data encryption and decryption method, device and terminal. Background technique [0002] Existing mobile terminals are getting deeper and deeper into people's lives, and people are paying more and more attention to personal privacy in the use of mobile terminals, and will store some files such as call records, text messages, pictures, and videos that they do not want others to know. After encryption, it is stored in the mobile terminal, and users who know the password can only view the encrypted data by entering the password. For example: there is a type of mobile phone application called privacy space, and its function is to encrypt and save the user's private content such as call records, text messages, pictures, videos, files, etc., to achieve the purpose of protecting user privacy. [0003] Existing mobile terminals usually use symmetric encryption algorithms (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L63/045H04L2463/062
Inventor 陈璐
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products