Supercharge Your Innovation With Domain-Expert AI Agents!

Data encryption or decryption method, device and system

A data encryption, encryption and decryption technology, applied in the computer field, can solve the problems that affect the efficiency of data processing, and the processing capacity cannot meet the delay of data encryption or decryption processing, so as to achieve the effect of improving efficiency

Pending Publication Date: 2021-12-24
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when there is a lot of data to be encrypted or decrypted, the processing capability of the CPU cannot meet the requirements of data encryption or decryption processing delay, which affects the efficiency of data processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption or decryption method, device and system
  • Data encryption or decryption method, device and system
  • Data encryption or decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] For ease of understanding, the terms involved in this application are explained first.

[0037] Stream cipher (stream cipher), also known as data stream encryption, is a symmetric encryption and decryption (also called encryption or decryption) algorithm. Specifically, each execution subject that performs encryption or decryption uses the same key, for example, a pseudo-random encrypted data stream (pseudo-random stream) is used as a key, and the encrypted execution subject uses the key to treat encrypted data (also called plaintext data ) encryption to obtain the encrypted result of the data to be encrypted (also called ciphertext data). Correspondingly, after obtaining the ciphertext data, the decryption subject can use the same key to decrypt the ciphertext data. For example, taking the symmetric encryption and decryption algorithm as block cipher (also known as block cipher or block cipher) as an example, the execution subject of encryption and decryption can divid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption or decryption method. The method comprises the following steps: acquiring a data processing request carrying to-be-processed data; selecting one of a first processing mode and a second processing mode as a processing mode of the data to be processed, wherein the first processing mode is processed by the encryption and decryption chip, and the second processing mode is processed by a software program running on the central processing unit; and encrypting or decrypting the to-be-processed data by using the selected processing mode, thereby solving the problem that the data processing efficiency is influenced because the processing capability of a CPU cannot meet the requirement of data encryption or decryption processing delay in the prior art.

Description

technical field [0001] The present application relates to the computer field, in particular to a data encryption or decryption method, device and system. Background technique [0002] With the development of the big data era, data security in infrastructure has received more and more attention, and data encryption is the top priority of data security. Generally, data encryption is to implement data encryption through a specified software code library, for example, to use open secure sockets layer (open secure sockets layer, OpenSSL) to implement data encryption processing; correspondingly, receiving encrypted data The endpoint performs decryption over an open secure socket. In a specific implementation, the data to be encrypted or decrypted includes data for executing instructions or transmitting messages, and the data may include various types. unit, CPU) can use the specified software program or process to complete the encryption or decryption of the data of each data bl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64G06F9/54
CPCG06F21/602G06F21/64G06F9/546
Inventor 朱明明杨仲凯邓师平郑卫炎
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More