Encryption method, decryption method and system
An encryption method and encryption algorithm technology, applied in software deployment, instruments, electronic digital data processing, etc., can solve the problem of software files being monitored and cracked, and achieve the effect of preventing monitoring and cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The present application will be further described below in combination with specific embodiments.
[0036] In the drawings of the embodiments of the present application, the same or similar symbols correspond to the same or similar components; , "top", "bottom", "inner", "outer" and other indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the application and simplifying the description, rather than indicating or It implies that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, so the terms describing the positional relationship in the drawings are for illustrative purposes only, and should not be construed as limitations on this patent.
[0037] In addition, if terms such as "first" and "second" are used for descriptive purposes only, they are mainly used to distinguish di...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com