Check patentability & draft patents in minutes with Patsnap Eureka AI!

A private key, a public key and a decryption method

A private key and public key technology, applied in the computer field, can solve problems such as security can no longer be guaranteed, and achieve the effect of improving transmission security

Active Publication Date: 2019-09-24
INSPUR FINANCIAL INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the key system formed by the traditional mathematical encryption algorithm usually has a fixed algorithm mode, and different users and manufacturers must follow the same algorithm definition. Once the algorithm has a security risk or is cracked, its security is usually no longer Guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A private key, a public key and a decryption method
  • A private key, a public key and a decryption method
  • A private key, a public key and a decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0064] In the first aspect, the embodiment of the present invention provides a private key, which may include:

[0065] At least one permission token, the number of key granularities, and the key subject;

[0066] Each permission mark records the permission marking information corresponding to the permission mark;

[0067] The key body includes at lea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a private key, a public key and a decryption method. The private key comprises at least one permission label, a key granularity number and a key main body, wherein permission labeling information corresponding to each permission label is recorded in the permission label; the key main body comprises at least one key granularity; the number of the key granularities is recorded in the key granularity number; a coordinate value of a key space is recorded in each key granularity, each coordinate value corresponds to one space geometry in an encrypted space, and the encrypted space is provided by a public key corresponding to the private key. The private key can be a geometry key structure based on the space geometry, and thus, the private key is not related to a conventional mathematical encryption algorithm and is difficult to crack. Therefore, according to the scheme, transmission security of data files can be improved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a private key, a public key and a decryption method. Background technique [0002] With the continuous development of computer hardware technology, especially the rise of quantum computer technology, the use of public and private keys to encrypt and decrypt data files can effectively guarantee the security of Internet data transmission. [0003] At present, the traditional AES (Advanced Encryption Standard, Advanced Encryption Standard) / RSA mathematical encryption algorithm can be used to encrypt and decrypt data files. [0004] However, the key system formed by the traditional mathematical encryption algorithm usually has a fixed algorithm mode, and different users and manufacturers must follow the same algorithm definition. Once the algorithm has a security risk or is cracked, its security is usually no longer Guaranteed. Contents of the invention [0005] The invention p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 张家重董毅李光瑞王玉奎
Owner INSPUR FINANCIAL INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More