Encryption lock based on elliptic encryption algorithm and unlocking method thereof
A technology of elliptic encryption and encrypted lock, which is applied in the computer field, can solve problems such as security and hidden dangers, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0072] see figure 1 , the present application provides a first embodiment of an encryption lock based on an elliptic encryption algorithm, including:
[0073] The algorithm information storage 11 is used to store the public key and constant parameters of the elliptic encryption algorithm. The elliptic encryption algorithm is an asymmetric encryption algorithm that uses a private key for encryption and a public key for decryption. Compared with other encryption algorithms, the key used is smaller and provides the same or higher level of security as other encryption algorithms. security. The public key and constant parameters of the elliptic encryption algorithm determine the decryption method of the encryption algorithm. The private key used for encryption is not stored in the algorithm information storage 11, and the private key is only saved by the terminal or software client used by the user, so that the private key and public key for encryption and decryption are stored s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



