Data encryption method, device, data decryption method and device
A data encryption and data decryption technology, applied in the direction of user identity/authority verification, etc., can solve the problems of reducing data security, increasing the cost of data encryption processing, increasing the risk of key decryption, etc., to achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example 1
[0031] This embodiment provides a data encryption method, such as figure 1 The method shown includes:
[0032] S11, obtain a random number. The random number is used as an identifier to distinguish different encrypted data. The random number may be pre-allocated, for example, may be calculated based on data such as hardware ID, network IP, and encryption operation time. In a practical application environment, the random numbers obtained by multiple encryptors are different, and the random numbers obtained by the same encryptor in different time periods may also be different. For example, in an Internet application, a server in the network can act as a decryptor, and a user terminal can act as an encryptor, and the random number can be generated by the server and then distributed to the corresponding user terminal. Preferably, the random number can be a universally unique identifier (Universally Unique Identifier, UUID), and the UUID is composed of the fol...
Example Embodiment
[0050] Embodiment 2
[0051] This embodiment provides another data encryption method, such as image 3 As shown, the method includes:
[0052] S31. Obtain a random number, a token corresponding to the random number, and a timestamp. A token is a sign information (a code composed of one or more binary digits). In Internet applications, only the node that obtains the token has the right to send information packets. The token can be generated by the decryption party and sent to the corresponding Encryption party, so that the encryption party has the authority to send encrypted data.
[0053] A timestamp is usually a sequence of characters used to uniquely identify the time at a certain moment, such as the time when encrypted data is generated, or the time when data is sent.
[0054] S32: Obtain a key required for encryption according to the random number.
[0055] S33, encrypt the content to be encrypted by using the key.
[0056] S34, using the encrypted content to generate...
Example Embodiment
[0069] Embodiment 3
[0070] This embodiment provides a data encryption device, such as Figure 5 The device shown includes:
[0071] an obtaining unit 51 for obtaining random numbers;
[0072] An encryption key generation unit 52, configured to obtain a key required for encryption according to the random number;
[0073] an encryption unit 53, configured to encrypt the content to be encrypted by using the key;
[0074] The first digest generating unit 54 is configured to generate a first digest using the encrypted content.
[0075] This embodiment also provides a data decryption device corresponding to the above device, such as Image 6 The device shown includes:
[0076] Data packet acquisition unit 61, for acquiring the data packet obtained according to the above-mentioned data encryption device;
[0077] A second digest generating unit 62, configured to generate a second digest using the encrypted content;
[0078] An abstract comparison unit 63, configured to compa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap