Key encryption method, key decryption method, data encryption method and data decryption method

A key encryption and key technology, which is applied in the field of encryption, can solve problems such as security needs to be improved, and achieve the effect of improving encryption security and improving security

Pending Publication Date: 2021-06-11
ZTE CORP
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing encryption methods, since most of the keys are managed by users, once the keys are leaked, the attacker may easily decrypt important data, so the security of the existing encryption methods still needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key encryption method, key decryption method, data encryption method and data decryption method
  • Key encryption method, key decryption method, data encryption method and data decryption method
  • Key encryption method, key decryption method, data encryption method and data decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0039] It should be understood that in the description of the embodiments of the present application, multiple (or multiple) means more than two, greater than, less than, exceeding, etc. are understood as not including the original number, and above, below, within, etc. are understood as including the original number. If there is a description of "first", "second", etc., it is only for the purpose of distinguishing technical features, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features or implicitly indic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key encryption method, a key decryption method, a data encryption method and a data decryption method. The key encryption method comprises the following steps: acquiring a first key and equipment identification information of the electronic equipment, generating a second key according to the equipment identification information, encrypting the first key by using the second key, and generating an encrypted key. In the embodiment of the invention, the first key is encrypted by using the equipment identification information, so that the security of the first key can be effectively ensured, and the security of data encryption is improved; and meanwhile, the first key is encrypted by using the equipment identification information, and the encryption security of the first key is greatly improved based on the uniqueness of the equipment identification information.

Description

technical field [0001] The present application relates to the field of encryption technology, in particular to a key encryption method, a decryption method, a data encryption method, and a decryption method. Background technique [0002] With the rapid development of the Internet and mobile networks, various network security issues have emerged, and network security has increasingly become one of the focuses of people's attention. Since the development of network security, there are relatively mature frameworks and theories, and there are many scenarios and methods involved, such as cryptography, infrastructure security, access control, authentication management, transmission security, and sensitive data protection. If important data involving identity information, confidential information, and personal privacy are leaked, it will pose a great threat to users' assets and safety. For the protection of these important data, it is common to use a key to encrypt these data. Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32
CPCH04L9/0822H04L9/0866H04L9/0869H04L63/0428H04L63/123H04L9/3236H04L9/32H04L9/08H04L9/40
Inventor 吴水华李锐
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products