Supercharge Your Innovation With Domain-Expert AI Agents!

An encryption request processing method

A technology for encrypting requests and processing methods, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as home appliance paralysis, lack of protection measures, threats to human life safety, etc., and achieve the effect of excellent performance and simple and reasonable structure

Active Publication Date: 2022-02-22
BEIJING POLYTECHNIC COLLEGE
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing remote control method for smart products is generally as follows: set an identification code on the smart product, and then enter the identification code on the mobile phone, computer, etc. to connect to the smart product and then control the smart product. Control smart products, but there are great security risks. For example, anyone who knows the smart product identification code can remotely control the smart product by entering the identification code through the remote control terminal, so the use safety of smart products cannot be guaranteed.
At present, smart home appliances are in a period of rapid development. Most manufacturers do not specifically emphasize the safety of home appliances, and there are no relevant protection measures. Criminals can paralyze home appliances through loopholes in products or mobile devices. Some hackers even control Appliances pose a threat to human life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption request processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, wherein the schematic embodiments and descriptions are only used to explain the present invention, but are not intended to limit the present invention.

[0017] An encryption request processing method applied in the present invention is described in detail, and the method includes the following steps:

[0018] S1: Check the confidential data encryption request initiated by the current user, including:

[0019] Obtain the current user's access operation to the confidential data, and store the access operation and the current user information in two-dimensional correspondence; specifically: when the current user's access operation to the confidential data occurs, obtain the current user's name and access operation The classification of the current user name and its access operation and the classification of the confidential data are corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption request processing method, the method comprising: S1: checking the confidential data encryption request initiated by the current user; S1: allowing the user to encrypt the confidential data after the verification is passed. The present invention can check the encryption operation of the confidential data itself, abandons the idea of ​​simply improving the encryption algorithm itself in the prior art, and realizes hierarchical encryption processing through the verification of the encryption operation, and encrypts the confidential data At the same time, it does not affect the use of encrypted files by other users. At the same time, it provides a variety of encryption sets for differentiated management of encryption operations, so it has the characteristics of simple and reasonable structure, excellent performance, safety and reliability.

Description

【Technical field】 [0001] The invention belongs to the field of data information processing, in particular to an encryption request processing method. 【Background technique】 [0002] Today's fast-paced and fast-paced life makes smart products more and more used by consumers, such as the emergence of smart home appliances, so that users do not need to frequently stand by the electrical appliances to perform corresponding operations like operating traditional electrical products, but only need to Control it anytime and anywhere through remote control terminals such as mobile phones and computers, which greatly saves people's time. The existing remote control method for smart products is generally as follows: set an identification code on the smart product, and then enter the identification code on the mobile phone, computer, etc. to connect to the smart product and then control the smart product. Control smart products, but there are great security risks. For example, anyone w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428H04L63/102
Inventor 宋玉娥宋玉祥
Owner BEIJING POLYTECHNIC COLLEGE
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More