Asynchronous encryption implementation method and device, apparatus and readable storage medium

An implementation method and asynchronous technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as low computing efficiency, achieve the effects of improving system performance, reducing system local resources, and improving computing performance

Pending Publication Date: 2020-01-10
WEBANK (CHINA)
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide an asynchronous encryption implementation method, device, equipment and readable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asynchronous encryption implementation method and device, apparatus and readable storage medium
  • Asynchronous encryption implementation method and device, apparatus and readable storage medium
  • Asynchronous encryption implementation method and device, apparatus and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] Such as figure 1 as shown, figure 1 It is a schematic diagram of the device structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0037] It should be noted that the device implementing asynchronous encryption in this embodiment of the present invention may be a smart phone, a personal computer, a server, etc., and no specific limitation is set here.

[0038] Such as figure 1 As shown, the device for implementing asynchronous encryption may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Disp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asynchronous encryption implementation method and device, an apparatus and a readable storage medium. The method comprises the steps of calling a preset asynchronous channelto calculate an intermediate variable required by an encryption or decryption operation; calling the asynchronous channel to add the intermediate variable into a target queue; and obtaining the intermediate variable from the target queue, and performing the encryption or decryption operation by adopting the intermediate variable. According to the present invention, the time-consuming intermediatevariable does not need to be calculated during the encryption or decryption process, so that the encryption or encryption operation efficiency is improved, and the encryption or decryption operationperformance is also improved.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to an asynchronous encryption implementation method, device, equipment and readable storage medium. Background technique [0002] With the development of computer technology, the security technology of encrypting data has been applied in more and more fields. At present, computers generally perform encryption and decryption operations in real time when data needs to be encrypted or decrypted. If the encryption and decryption algorithm requires relatively low computing performance, this method of performing encryption or decryption operations in real time will generally not affect calculating speed. However, when the encryption and decryption algorithm requires relatively high computing performance, such as using a larger key to meet security standards, the speed of the computer's real-time computing will be very slow, or even impossible. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/72
CPCG06F21/602G06F21/72H04L2209/12H04L2209/125
Inventor 黄启军陈天健范涛马国强康焱黄铭毅林江淼陈振南
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products