Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption and decryption method and system, server, storage device and mobile device

A technology for storage devices and mobile devices, which is applied in the field of data encryption and decryption, and can solve problems such as large security risks, users' inability to obtain authorization, and inability to perform data transmission.

Inactive Publication Date: 2021-04-02
四川微巨芯科技有限公司
View PDF18 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing authorized encryption and decryption methods, the authorization process is relatively complicated, and the user often needs the authorizer to provide the decryption key to obtain the authorization
If the authorizer is not present, the user cannot obtain authorization and cannot perform data transmission
Moreover, there is a risk of forgetting and losing the key, which is inconvenient to use and poses a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method and system, server, storage device and mobile device
  • Data encryption and decryption method and system, server, storage device and mobile device
  • Data encryption and decryption method and system, server, storage device and mobile device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be described in detail below. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in the present application, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0063] see figure 1 It is a flow chart of a data encryption and decryption method provided by an embodiment of the present application. This embodiment provides a method for data encryption and decryption. Taking the execution on the server side as an example, the server may be a cloud server. As shown in the figure, the implementation method includes at least the following steps:

[0064] Step 11. After directly establishing a wireless connection with the stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data encryption and decryption method and system, a server, a storage device and a mobile device. The data encryption and decryption method comprises the steps: generating afirst ciphertext after directly building wireless connection with the storage device, transmitting the first ciphertext to the storage device, and receiving a second ciphertext transmitted by the storage device; sending the first feature information to a storage device, and receiving second feature information sent by the storage device; decrypting the second feature information by using the second ciphertext, and performing feature matching on the decrypted second feature information; if the feature matching succeeds, sending a key to the storage device to enable the storage device to execute corresponding encryption and decryption operations; and receiving and storing the encryption and decryption state sent by the storage device. Thus, bidirectional authentication before data transmission is realized, the security of data transmission is further guaranteed, an authorizer does not need to independently provide a key, the key does not need to be worried about being forgotten and lost, and the implementation is convenient and rapid.

Description

technical field [0001] The present application relates to the technical field of data encryption and decryption, and in particular to a data encryption and decryption method and system, a server, a storage device, and a mobile device. Background technique [0002] Nowadays, mobile communication is moving towards the wireless interconnection of all things, and the wireless rate is getting higher and higher. For example, wireless earphones for mobile phones and wireless charging technology are popular. These are short-distance wireless technologies. Although the application scenarios are different, they are realized. The leap from wired to wireless. With the development of wireless communication technology, it is becoming more and more common to use wireless communication technology to realize data interaction. [0003] In related technologies, using wireless communication technology to realize data interaction has the advantages of low learning cost and easy implementation. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/03H04W12/04H04W12/06
CPCH04W12/04H04W12/06
Inventor 梁小龙易小洪王斐朱琳琳
Owner 四川微巨芯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products