Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method, decryption method, device and processing equipment for proprietary information

A proprietary information and encryption method technology, applied in the computer field, can solve the problem of easy access to proprietary information, and achieve the effect of increasing the difficulty of obtaining, ensuring security, and improving security

Active Publication Date: 2021-10-08
NEW H3C TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present disclosure is to provide an encryption method, decryption method, device and processing equipment for proprietary information, so as to improve the problem that the proprietary information of equipment is easily obtained in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method, device and processing equipment for proprietary information
  • Encryption method, decryption method, device and processing equipment for proprietary information
  • Encryption method, decryption method, device and processing equipment for proprietary information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present disclosure, not all of them. implementation. Based on the implementation manners in the present disclosure, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.

[0025] Each device is usually provided with proprietary information that is different from other devices to represent its own attributes or characteristics, such as serial number, product model, production date, MAC address and other highly identifiable information, so that people can use the proprietary information Identify the device. Considering that p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure provides an encryption method, decryption method, device and processing equipment for proprietary information. The encryption method includes: when encrypting the proprietary information of the device, generating a first-type secret key and a second-type secret key; applying the first-type secret key to encrypt the proprietary information; applying the second-type secret key to encrypt the first Class key encryption; encrypt the second class key through the trusted security module preset in the device; store the encrypted first class secret key and the encrypted second class secret key. Through the present disclosure, the difficulty of obtaining proprietary information can be improved, and the security of proprietary information can be better guaranteed.

Description

technical field [0001] The present disclosure relates to the field of computer technology, in particular to an encryption method, decryption method, device and processing equipment for proprietary information. Background technique [0002] In order to distinguish devices, device manufacturers usually store proprietary information of the device in the storage medium of the device, so that the identity of the device can be determined by querying the proprietary information during production and after-sales. Among them, the proprietary information may be serial number, product model, production date, MAC address and other characteristic information that can be distinguished from other devices. [0003] However, the proprietary information of the device is easily obtained and tampered with illegally. For example, criminals can intercept the communication signal of the device hardware through a proprietary testing instrument, and then obtain the proprietary information of the dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428H04L63/0478
Inventor 秦娟
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products