Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption and decryption method, device and equipment

A technology of data encryption and encryption equipment, applied in the field of communication, can solve problems such as trouble, ciphertext decryption, and data leakage

Active Publication Date: 2021-03-16
XINHUASAN INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for the data transmitted through these encryption algorithms, as long as the user has the corresponding decryption key, the encrypted data can be decrypted. If you want to prevent the user with the decryption key from decrypting the received ciphertext, you can It is very troublesome to replace the encryption key and resend the corresponding decryption key to the user who is allowed to decrypt, and the process of assigning the decryption key also has the risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device and equipment
  • Data encryption and decryption method, device and equipment
  • Data encryption and decryption method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0046] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data encryption and decryption method, device and equipment. According to the method, the users are grouped through the encryption equipment according to the obtained user information, and the corresponding user group codes and user identity codes are allocated to the grouped user groups and the users, so that when the target data are sent to the targetuser groups, an encryption key is generated by using a set specified encryption algorithm, the user identity code corresponding to the user allowed to decrypt and the user group code, and the target data is encrypted by using the encryption key to obtain an encrypted ciphertext. And after the decryption device, namely the user receives the encrypted ciphertext sent by the encryption device, a decryption key can be generated according to the obtained user private key, and the received encrypted ciphertext is decrypted by using the decryption key. Only the user allowed to decrypt decrypts the received encrypted ciphertext to obtain the target data, so that the decryption authority of the user with the user private key is limited.

Description

technical field [0001] The present application relates to the communication field, in particular to a data encryption and decryption method, device and equipment. Background technique [0002] In the process of data transmission, in order to prevent data leakage, an encryption algorithm can be used to encrypt the transmitted data, such as using a symmetric encryption algorithm or an asymmetric encryption algorithm to encrypt the transmitted data. [0003] However, for the data transmitted through these encryption algorithms, as long as the user has the corresponding decryption key, the encrypted data can be decrypted. If you want to prevent the user with the decryption key from decrypting the received ciphertext, you can It is very troublesome to replace the encryption key and re-send the corresponding decryption key to the user who is allowed to decrypt, and the process of assigning the decryption key also has the risk of data leakage. Therefore, an encryption method that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/065H04L63/104
Inventor 孔波
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products