Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data decryption method

A data decryption and data technology, applied in the computer field, can solve the problems that hardware encryption is difficult to adapt to high-concurrency scenarios and software encryption is not safe, and achieve the effect of improving encryption and decryption performance, improving security, and good applicability

Pending Publication Date: 2021-09-28
深圳法大大网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application provides a data decryption method, a data processing device, and an encryption machine to solve the defects in the prior art that the security of software encryption is not high, and hardware encryption is difficult to adapt to high concurrency scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data decryption method
  • Data decryption method
  • Data decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0083] With the continuous development of Internet technology, a large amount of data is also generated. In order to avoid data leakage, the method of encrypting data can usually be used to ensure data security.

[0084] Currently, when encrypting data, encryption and decryption algorithms can be divided into symmetric encryption algorithms and asymmetric encryption algorithms accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of computers, provides a data decryption method, data processing equipment and encryption equipment, and is used for solving the defects that in the prior art, software encryption is not high in security, and it is difficult for hardware encryption to adapt to a high-concurrency scene, and the method comprises the following steps: obtaining a decryption request for first encrypted data; determining a first key identifier according to the decryption request; determining a first key and a second key identifier corresponding to the first key identifier; sending the first key and the second key identifier to the encryption equipment, and receiving a second key obtained by the encryption equipment by decrypting the first key by using a decryption key corresponding to the second key identifier; and decrypting the first encrypted data by using the second key to obtain first data.

Description

technical field [0001] The application belongs to the field of computer technology, and in particular relates to a method for decrypting data, a data processing device and an encryption machine. Background technique [0002] More and more informatization involves encryption and protection of data, which requires encryption and decryption functions. Existing encryption technologies mainly include software encryption and hardware encryption. [0003] Symmetric key encryption algorithms are currently the most widely used software encryption methods, and commonly used algorithms include AES, 3DES and other algorithms. Encryption and decryption through hardware are currently most widely used through an encryption machine, that is, adding a hardware security module (hardware security module, HSM). [0004] Software encryption can be deployed on various computing devices, and the implementation cost is low. However, after encrypting data, the storage and management of the generat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/045H04L67/60
Inventor 梅臻卓义宝
Owner 深圳法大大网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products