Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, device, terminal equipment and storage medium

An encryption method and technology to be encrypted, applied in the financial field, can solve the problem of low encryption flexibility

Active Publication Date: 2020-11-27
PING AN TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide an encryption method, device, terminal equipment, and storage medium to solve the problem of low encryption flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, device, terminal equipment and storage medium
  • Encryption method, device, terminal equipment and storage medium
  • Encryption method, device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] see figure 1 , figure 1 The implementation flow of the encryption method provided by this embodiment is shown. The encryption method is applied in the financial industry. The details are as follows:

[0033] S1: Obtain password information.

[0034] In this embodiment, the password information is temporarily stored in the temporary storage area. Preferably, the password database is used to store password information.

[0035] It should be noted that the temporary storage area is used to store temporary data, and each time the temporary data is retrieved, the temporary storage area is cleared.

[0036] Specifically, the password information sent by the encrypting party to the temporary storage area by delivery is extracted, and the password information is stored in the password database.

[0037] It should be noted that the encryption party can be a user terminal or a smart device, and the delivery method can be an input method, a transmission method, etc., and the...

Embodiment 2

[0176] Corresponding to the encryption method in embodiment 1, Figure 7 An encryption device corresponding to the encryption method provided in Embodiment 1 is shown. For ease of description, only parts related to the embodiments of the present invention are shown.

[0177] see Figure 7 , the encryption device includes: a first acquisition module 71 , a second acquisition module 72 , a first encryption module 73 , an extraction module 74 , a second encryption module 75 and a sending module 76 . The detailed description of each functional module is as follows:

[0178] A first obtaining module 71, configured to obtain password information;

[0179] The second obtaining module 72 is used to obtain the data information to be encrypted;

[0180] The first encryption module 73 is used to encrypt the password information by the first preset encryption method to obtain the target key;

[0181] An extraction module 74, configured to extract all or part of the continuous key inf...

Embodiment 3

[0212] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the encryption method in Embodiment 1 is implemented. To avoid repetition, details are not repeated here. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the encryption device in Embodiment 2 are realized, and details are not repeated here to avoid repetition.

[0213] It can be understood that the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal and telecommunication signal, etc.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An encryption method and apparatus, a terminal device, and a storage medium. The method comprises obtaining password information (S1); obtaining data information to be encrypted (S2); encrypting the password information by means of a first preset encryption method so as to obtain a target key (S3); according to the specification length of a key of a second preset encryption method, extracting all or a part of continuous key information from the target key so as to be used as an encrypted key (S4); by means of the second preset encryption method, encrypting the data information to be encrypted by using the encrypted key so as to obtain a cipher text (S5); and transmitting an encoded cipher text to a receiver by means of a preset transmitting manner (S6). The first preset encryption method is used to encrypt plaintext password information so as to obtain the target key; then the key information satisfying the specification length of the key of the second preset encryption method is extracted from the target key and used as the encrypted key, so that the password information can be any length; next, the data information to be encrypted is encrypted so as to obtain the cipher text, so that the flexibility and efficiency of encryption is improved.

Description

technical field [0001] The present invention relates to the financial field, in particular to an encryption method, device, terminal equipment and storage medium. Background technique [0002] At present, in the financial industry, financial companies use different business systems to store different data. When users encrypt the data, they need to enter a password with the length of the encryption law. At the same time, the password entered is in plain text, which is easy to leak information. This results in low encryption flexibility. Contents of the invention [0003] Embodiments of the present invention provide an encryption method, device, terminal equipment, and storage medium to solve the problem of low encryption flexibility [0004] In a first aspect, an embodiment of the present invention provides an encryption method, including: [0005] Obtain password information; [0006] Obtain the data information to be encrypted; [0007] Encrypting the password informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428H04L63/06
Inventor 蔡俊
Owner PING AN TECH (SHENZHEN) CO LTD