Encryption method and encryption system

An encryption method and a hash algorithm technology, applied in the field of information security, can solve problems such as data theft and failure to effectively prevent the loss of secret keys, and achieve the effect of strengthening security

Inactive Publication Date: 2019-12-31
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Of course, there are many "unpacking" tools at present, so this "packing" processing method cannot effectively prevent the loss of the secret key, resulting in data theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and encryption system
  • Encryption method and encryption system
  • Encryption method and encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] refer to figure 1 , shows a flow chart of the steps of the encryption method according to Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. It should be noted that this embodiment uses the computer device 2 as an execution subject for exemplary description. details as follows:

[0057] Step S100, detecting whether the installation of the client is completed.

[0058] In a preferred embodiment, the computer device 2 detects whether there is a client installation completed every preset time (for example: within 5 seconds).

[0059] Step S102, when the installation of the client is completed, use a random algorithm to encrypt the identification information of the client to generate a random key, and store the identification information in a database, wherein the identification information at least includes: MAC Address, IP address, UUID, local time and user mous...

Embodiment 2

[0072] see figure 2 , shows a schematic diagram of the hardware architecture of the computer device according to Embodiment 2 of the present invention. The computer device 2 includes, but is not limited to, a memory 21, a processing 22, and a network interface 23 that can communicate with each other through a system bus, figure 2 Only the computer device 2 is shown with components 21-23, but it should be understood that implementation of all of the illustrated components is not required and that more or fewer components may instead be implemented.

[0073] The memory 21 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), Magnetic Memory, Magne...

Embodiment 3

[0077] see image 3 , shows a schematic diagram of the program modules of the encryption system according to Embodiment 3 of the present invention. In this embodiment, the encryption system 20 may include or be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to complete the present invention , and can implement the above encryption method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable for describing the execution process of the encryption system 20 in the storage medium than the program itself. The following description will specifically introduce the functions of each program module of the present embodiment:

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an encryption method. The encryption method comprises the following steps: detecting whether a client is installed; when the client is installed, encrypting the identification information of the client through a random algorithm to generate a random secret key, wherein the identification information at least comprises an MAC address, an IP address, a UUID,local time and a user mouse track; and transmitting the random secret key to a server through a temporary elliptic curve secret key negotiator, so that the server obtains the same secret key and stores the random secret key in the server. Through the embodiment of the invention, the security of the local data of the client can be greatly enhanced.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to an encryption method, an encryption system, computer equipment, and a readable storage medium. Background technique [0002] At present, when the client program starts, if a large amount of data needs to be obtained from the server, common methods include: [0003] (1) Asynchronous acquisition, that is, when the program starts, the data is acquired in the worker thread, but this method only speeds up the startup speed of the program. When a certain part of the data needs to be used, if it is not ready, it only gives a prompt message , this method only improves the friendliness of the program; [0004] (2) The data is saved locally, and there is no need to obtain it again at the next startup, which speeds up the data acquisition speed. [0005] Of course, this way of saving data locally must first encrypt the data. The existing encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L29/06
CPCH04L9/0869H04L9/0866H04L9/0643H04L63/067
Inventor 芦永胜
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products