Encryption method, device, terminal equipment and storage medium
An encryption method and technology to be encrypted, applied in the financial field, can solve the problem of low encryption flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] see figure 1 , figure 1 The implementation flow of the encryption method provided by this embodiment is shown. The encryption method is applied in the financial industry. The details are as follows:
[0033] S1: Obtain password information.
[0034] In this embodiment, the password information is temporarily stored in the temporary storage area. Preferably, the password database is used to store password information.
[0035] It should be noted that the temporary storage area is used to store temporary data, and each time the temporary data is retrieved, the temporary storage area is cleared.
[0036] Specifically, the password information sent by the encrypting party to the temporary storage area by delivery is extracted, and the password information is stored in the password database.
[0037] It should be noted that the encryption party can be a user terminal or a smart device, and the delivery method can be an input method, a transmission method, etc., and the...
Embodiment 2
[0176] Corresponding to the encryption method in embodiment 1, Figure 7 An encryption device corresponding to the encryption method provided in Embodiment 1 is shown. For ease of description, only parts related to the embodiments of the present invention are shown.
[0177] see Figure 7 , the encryption device includes: a first acquisition module 71 , a second acquisition module 72 , a first encryption module 73 , an extraction module 74 , a second encryption module 75 and a sending module 76 . The detailed description of each functional module is as follows:
[0178] A first obtaining module 71, configured to obtain password information;
[0179] The second obtaining module 72 is used to obtain the data information to be encrypted;
[0180] The first encryption module 73 is used to encrypt the password information by the first preset encryption method to obtain the target key;
[0181] An extraction module 74, configured to extract all or part of the continuous key inf...
Embodiment 3
[0212] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the encryption method in Embodiment 1 is implemented. To avoid repetition, details are not repeated here. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the encryption device in Embodiment 2 are realized, and details are not repeated here to avoid repetition.
[0213] It can be understood that the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal and telecommunication signal, etc.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


