Method and device for data encryption, and method and device for data decryption
A data encryption and encryption key technology, applied in the field of communication, can solve the problem that electronic data cannot provide enough
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Figure 5 is a schematic flow diagram of the system according to Embodiment 1 of the present invention, as Figure 5 As shown, the system process includes:
[0057] Step S502: packaging the original data and device-related information to generate intermediate data;
[0058] Among them, the device information requires that the device is unique and cannot be copied. The unique information of the device can be processed to generate fixed-length data and form intermediate data with the original data in a certain way.
[0059] Step S504: collecting user voice data, generating a voiceprint encryption key and encrypting intermediate data;
[0060] Among them, the voiceprint key extracted from the user's voice should have nothing to do with the content of the user's voice.
[0061] Step S506: Encrypt the intermediate data with the voiceprint key and set the encryption flag to obtain the encrypted data.
[0062] Step S508: Read the encryption flag, if it is judged to be encr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 