Methods and computer program products for encryption key generation and management
An encryption method and encryption key technology, which is applied in the field of generating and managing encryption keys, can solve problems such as tedious and complicated, data loss, and weak encryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050]Various systems or methods are described below to provide examples of implementations of the claimed subject matter. The embodiments described below do not limit any claimed subject matter, and any claimed subject matter may cover methods or systems that differ from those described below. Claimed subject matter is not limited to a system or method having all of the features of any one system or method described below, nor to features common to multiple or all of the apparatus or methods described below. It is possible that a system or method described below is not an implementation set forth in any claimed subject matter. Any subject matter disclosed in the systems or methods described below but not claimed in this document may be the subject of another tool of protection, such as a continuing patent application, and by disclosing any such subject matter in this document, this application , inventors or owners do not intend to renounce, disclaim or dedicate them to the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


