Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for data encryption, and method and device for data decryption

A data encryption and encryption key technology, applied in the field of communication, can solve the problem that electronic data cannot provide enough

Inactive Publication Date: 2016-01-27
ZTE CORP
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that electronic data cannot provide sufficient security protection in the related art, the present invention provides a data encryption method, decryption method and device to at least solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for data encryption, and method and device for data decryption
  • Method and device for data encryption, and method and device for data decryption
  • Method and device for data encryption, and method and device for data decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Figure 5 is a schematic flow diagram of the system according to Embodiment 1 of the present invention, as Figure 5 As shown, the system process includes:

[0057] Step S502: packaging the original data and device-related information to generate intermediate data;

[0058] Among them, the device information requires that the device is unique and cannot be copied. The unique information of the device can be processed to generate fixed-length data and form intermediate data with the original data in a certain way.

[0059] Step S504: collecting user voice data, generating a voiceprint encryption key and encrypting intermediate data;

[0060] Among them, the voiceprint key extracted from the user's voice should have nothing to do with the content of the user's voice.

[0061] Step S506: Encrypt the intermediate data with the voiceprint key and set the encryption flag to obtain the encrypted data.

[0062] Step S508: Read the encryption flag, if it is judged to be encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for data encryption, and a method and a device for data decryption. The method comprises: according to original data and device information, generating intermediate data; acquiring voice data of a user, and according to the voice data, generating an encryption key; and using the encryption key to encrypting the intermediate data to obtain encrypted data. Through the method and the device, a problem in related technology that enough safety protection aimed on electronic data cannot be provided is solved, and even though the electronic data is copied and propagated, the data cannot be decrypted by other people or devices.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data encryption method, a decryption method and a device. Background technique [0002] At present, digital devices and smart phones on the market generally do not have data protection functions, and a large amount of private and important information in people's work and life, such as address books, short messages, documents, videos, photos, etc., are generally stored in the form of electronic data in personal In the mobile phone, there are risks such as unauthorized or accidental loss, arbitrary viewing, copying, stealing, destruction, dissemination, etc., resulting in the leakage of personal privacy. In addition, the personal password protection generally used for electronic documents also has risks such as password leakage and forgetting, and cannot provide sufficient security protection. Therefore, it is necessary to find a method for conveniently and quickly protecting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/32
CPCG06F21/62
Inventor 李欣
Owner ZTE CORP