Unlock instant, AI-driven research and patent intelligence for your innovation.

Information processing method

An information processing method and a technology for assisting information, which are applied to secure communication devices, public keys for secure communication, and key distribution, and can solve problems such as long encryption time.

Active Publication Date: 2021-06-15
无锡润盟软件有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the larger the parameter N, the better the encryption effect, but the larger the parameter N, the longer the encryption time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method
  • Information processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0041] Please refer to figure 1 , which shows a flowchart of an information processing method provided by an embodiment of the present invention. The information processing method is applicable to terminals used for information interaction in the network. Optionally, the terminal is an electronic device such as a mobile phone, a tablet computer, a desktop computer and a portable computer. The terminal can encrypt and decrypt information, and can also perform identity verification and digital signature.

[0042] Such as figure 1 As shown, the information processing method may include the following steps:

[0043] In step 101, the first terminal sends a primitive, a public key and key parameters to a second terminal.

[0044] The ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information processing method, which belongs to the technical field of safety. The method includes receiving the primitive, public key, and key parameters sent by the first terminal; receiving an information encryption instruction, where the information encryption instruction is used to instruct to encrypt original information; and generating a random number according to the information encryption instruction; Encrypt the original information by using the random number, the primitive, the public key, and the key parameters to obtain encrypted auxiliary information and ciphertext; send the encrypted auxiliary information and the ciphertext to In the first terminal, the private key paired with the public key is stored in the first terminal; the problem that a key parameter with a relatively large length needs to be used in the current asymmetric encryption algorithm, resulting in a large amount of computation, is achieved, and the A key parameter with a shorter length can also ensure a good encryption effect, reduce the length of the selected key parameter, and reduce the calculation amount in the encryption process.

Description

technical field [0001] The embodiments of the present invention relate to the field of security technologies, and in particular, to an information processing method. Background technique [0002] With the rapid development of electronic information technology, more and more information is transmitted through the network. In order to ensure the security of information in network transmission, it is necessary to encrypt the information. The existing encryption algorithms include symmetric encryption algorithms and asymmetric encryption algorithms. . [0003] Symmetric encryption algorithm means that the sender and receiver of the information use the same encryption rule to encrypt and decrypt the information. Since the symmetric encryption algorithm requires the sender to inform the receiver of the encryption rules, storing and delivering the key has become the biggest problem affecting the effectiveness of encryption. In order to avoid passing the key directly, an asymmetri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0825H04L9/0869H04L9/3033H04L63/0442
Inventor 霍建军孙太国
Owner 无锡润盟软件有限公司