Data decryption method
A data decryption and data technology, applied in the computer field, can solve the problems that hardware encryption is difficult to adapt to high-concurrency scenarios and software encryption is not safe, and achieve the effect of improving encryption and decryption performance, improving security, and good applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0082] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
[0083] With the continuous development of Internet technology, a large amount of data is also generated. In order to avoid data leakage, the method of encrypting data can usually be used to ensure data security.
[0084] Currently, when encrypting data, encryption and decryption algorithms can be divided into symmetric encryption algorithms and asymmetric encryption algorithms accord...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com