A kind of key protection management method based on android system
A key protection and management method technology, which is applied in the field of key protection management based on the Android system, can solve problems such as complicated encryption process, and achieve the effect of data security protection, safe and convenient key protection and management method, and security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The present invention will be further described below with reference to the accompanying drawings.
[0024] refer to figure 1 and figure 2 , a key protection management method based on Android system, the key protection management method comprises a key encryption process and a key decryption process,
[0025] refer to figure 1 , the key encryption process includes the following steps:
[0026] 1.1: Randomly generate an AES key as the key to encrypt and decrypt data.
[0027] 1.2: The user sets a password. First, enter the password into the key generator packaged in SM4. The system will generate a salt 1 (salt) according to the length of the password and return the salt 1 (salt), and then combine the password and salt 1 (salt). ) is combined into SM4 key 1, uses the encryption algorithm of SM4 to encrypt the AES key in 1.1, obtains the encrypted sequence, and stores the encrypted AES key and salt 1 (salt) of SM4 key 1 into the database;
[0028] Step 1.3: The pass...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com