Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, encryption device and electronic equipment

An encryption method and technology of an encryption device, applied in the field of data security, can solve problems such as security risks, and achieve the effects of improving security and increasing the difficulty of reverse engineering.

Active Publication Date: 2019-06-04
SHENZHEN GOODIX TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] On embedded devices, the exclusive information of users and developers and related technical information are stored in the form of firmware. However, the current strategy for storing firmware on many embedded devices is to directly store plaintext firmware. Hackers can crack the firmware code or Write malicious firmware to achieve the purpose of obtaining exclusive information of users and developers, technical secrets, etc., which brings great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, encryption device and electronic equipment
  • Encryption method, encryption device and electronic equipment
  • Encryption method, encryption device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Implementing any technical solution of the embodiments of the present application does not necessarily need to achieve all the above advantages at the same time.

[0031] The specific implementation of the embodiment of the present application will be further described below in conjunction with the accompanying drawings of the embodiment of the present application.

[0032] In the following embodiments of the present application, the first random number is generated based on the first encryption model, and the first encryption parameter corresponding to the first random number is generated; the second random number is generated based on the first encryption model, and according to the The second random number and the first encryption parameter generate a second encryption parameter; use the second encryption model to encrypt the object to be encrypted based on the second encryption parameter, thereby realizing obfuscation and encryption of the object to be encrypted, inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an encryption method, an encryption device, and an electronic device, the encryption method comprising: generating a first random number based on a first encryption model, and generating a first encryption parameter corresponding to the first random number (S101); Generating a second random number based on the first encryption model, and generating a second encryption parameter according to the second random number and the first encryption parameter (S102); And using a second encryption model to encrypt the to-be-encrypted object based on the second encryptionparameter (S103). According to the invention, the data storage security is improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of data security, and in particular, to an encryption method, an encryption device, and electronic equipment. Background technique [0002] On embedded devices, the exclusive information of users and developers and related technical information are stored in the form of firmware. However, the current strategy for storing firmware on many embedded devices is to directly store plaintext firmware. Hackers can crack the firmware code or Writing malicious firmware achieves the purpose of obtaining exclusive information of users and developers, technical secrets, etc., which brings great security risks. Contents of the invention [0003] In view of this, one of the technical problems to be solved by the embodiments of the present application is to provide an encryption method, an encryption device, and an electronic device, so as to overcome the above-mentioned defects in the prior ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
Inventor 孙志豪邓凌
Owner SHENZHEN GOODIX TECH CO LTD