Code-controlled data encryption method for variability key
A data encryption and key technology, applied in the field of information electronics, can solve problems such as ambiguity and confusion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0196] Next, according to the method of the present invention, a specific encryption transformation method is set to implement encryption and decryption.
[0197] 1. Secret key.
[0198] Divided into "pre-stored secret key" and "group secret key".
[0199] 1. Pre-store the secret key. Pre-stored, preset digital string (key), 1K bytes (Byte) 1Byte=8bit
[0200] 2. Group secret key. Select one of the 8 bytes in the "pre-stored secret key" as the secret key used in the block encryption process.
[0201] Two, the clear key.
[0202] It is divided into "preparation key" and "group key".
[0203] 1. Prepare the public key. 16 bytes, a public digital string, or a public "virtual text" (a file that is encrypted and transmitted publicly).
[0204] 2. The group secret key. 8 bytes. Select one of the 8 bytes in the "preparation secret key", each group is different.
[0205] In the group secret key, ①, the first group uses the "boot code", and ②, the second group starts to use t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com