Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encryption and decryption method, device and terminal

An encryption method and ciphertext technology, applied in the field of communication, can solve the problems of invalid encryption and the inability to meet the needs of real-time insertion, modification and deletion, etc.

Active Publication Date: 2020-12-01
HUAWEI TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the input method uses a stream cipher algorithm for encryption, such as RC4, this algorithm encrypts the continuous plaintext sequence by byte or by bit, and its advantage is that it can reduce the overhead of ciphertext transmission and eliminate the length extension of ciphertext, but , because the algorithm encrypts consecutive bytes or bits, if it is necessary to insert, modify, or delete encrypted information, the encryption of the entire sequence input before will be invalidated, so it cannot satisfy the user's input requirements. Information needs to be inserted, modified and deleted in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, device and terminal
  • Encryption and decryption method, device and terminal
  • Encryption and decryption method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0091] Before introducing the present invention, the application scenarios of the present invention are first introduced. With the rapid development of communication technology, more and more terminals such as mobile phones, tablet computers, and computers have appeared, through which users can access various applications, such as Weibo, chat software, readers and games. When a user accesses these applications, the user needs to enter the application account and pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention relate to the technical field of communications, and provide encryption and decryption methods and devices, for a user to perform real-time deletion, insertion, and modification on previously input information. The method comprises: receiving i input plaintexts, i≥1; encrypting each of the i plaintexts based on a master key according to the input sequence of the plaintexts to obtain a first ciphertext sequence and first position information, the first ciphertext sequence comprising i ciphertexts corresponding to the i plaintexts, the first position information comprises position indication information and input indication information of each of the i ciphertexts, the position indication information being used for indicating the positions of the ciphertexts in the first ciphertext sequence, and the input indication information being used for indicating the input sequence of the plaintexts corresponding to the ciphertexts; if an editing operation to the input plaintexts is detected, modifying the first ciphertext sequence and the first position information based on the editing operation to obtain a second ciphertext sequence and second position information; and sending the second ciphertext sequence and second position information.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an encryption and decryption method and device. Background technique [0002] When a user uses a terminal to log in to a third-party application, he needs to enter key information such as account number and password through the input method. If the input method is intercepted by a Trojan horse virus during the process of sending the input information to the third-party application, the input account and password will be blocked. Passwords and other information are stolen by malicious programs. Therefore, it is necessary to protect the input method to prevent the input information from being stolen. [0003] At present, conventional encryption and decryption algorithms are usually used to protect the security of the input method. For the information entered by the user, that is, the plain text, the input method uses a conventional encryption algorithm to encrypt the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/16H04L9/20
CPCH04L9/16
Inventor 方习文闫永杰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products