Multiplayer online dynamic encryption method and apparatus
A dynamic encryption and encrypted technology, used in secure communication devices and key distribution, can solve problems such as slow processing speed, and achieve the effect of ensuring decryption speed and information transmission security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] The present invention is a software program implemented by J2EE. The main principle is to support multiple people to input different key fragments they have mastered online in real time. Through the background program, the key fragments of multiple people are mixed into key A according to the set mechanism. . Key A is encrypted with private key M through an asymmetric encryption algorithm to generate ciphertext B encrypted by key A. Pass the ciphertext B and the data encrypted with the key A to the data receiver, and the receiver uses the public key M corresponding to the private key M to decrypt the key B, restore the key A, and then use the key A to encrypt the encrypted data File decryption.
[0035] The method of dynamically generating keys by inputting key fragments online by multiple people allows the encrypted password to change every time without setting an expiration time limit. The complete key is obtained, and the technical method of transmitting the symmet...
Embodiment 2
[0039] Due to business needs, a certain operator needs to make a large number of recharge cards, and the password of the recharge card needs to be sent to the card manufacturer. In this process, the invented technology is used to encrypt and transmit the recharge card password to the cooperative card manufacturer. Mass production of recharge cards.
[0040] When transferring, multiple employees of the operator input their own key fragments online (the input is different for each data transfer), and when all the input is completed, the key fragments are synthesized into a unique key using an obfuscation program. Then use the unique key to encrypt the password data of the recharge card. At the same time, the unique key itself is also passed to the third-party card manufacturer through asymmetric encryption. The card manufacturer uses the built-in decryption logic of the decryption program to restore the unique key, and then use Unique key restores encrypted files.
[0041] In t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


