Encryption method, decryption method, server and storage medium

An encryption method and encryption algorithm technology, applied in the field of communication, can solve the problem of low security of sensitive configuration data, achieve the effect of avoiding compatibility problems and improving security

Pending Publication Date: 2021-12-24
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, even if the encryption key and algorithm are used to encrypt the sensitive configuration data to form ciphertext, since the encryption key is relatively easy to be cracked, the security of the sensitive configuration data is still low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method, server and storage medium
  • Encryption method, decryption method, server and storage medium
  • Encryption method, decryption method, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those skilled in the art can understand that in each embodiment of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0019] The first embodiment of the present application relates to an en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an encryption method, a decryption method, a server and a storage medium, and belongs to the field of communication. The encryption method comprises the following steps: encrypting an encryption key by using a selected encryption algorithm to obtain an encrypted fingerprint; encrypting plaintext data by using the encryption algorithm and the encryption key to obtain first ciphertext data; and mixing the encrypted fingerprint and the first ciphertext data to obtain second ciphertext data. The encryption key is encrypted by using the encryption algorithm, so the encryption key is difficult to crack, the security of the encryption key is improved, the first ciphertext data obtained by encrypting the plaintext data by using the encryption algorithm and the encryption key is difficult to crack, and the security of the data is improved; after the first ciphertext data is obtained, the encrypted fingerprint and the first ciphertext data are mixed to obtain the second ciphertext data, so the data security is improved.

Description

technical field [0001] The embodiments of the present application relate to the communication field, and in particular to an encryption method, a decryption method, a server, and a storage medium. Background technique [0002] At present, some business data with high security requirements are usually referred to as sensitive configuration data, for example, data specially used for passwords or identity authentication. Since sensitive configuration data has security requirements, the system first uses local encryption keys and algorithms to encrypt sensitive configuration data to form ciphertext, and it exists in ciphertext when storing, responding to queries, and transmitting. . [0003] However, even if the encryption key and algorithm are used to encrypt the sensitive configuration data to form ciphertext, since the encryption key is relatively easy to be cracked, the security of the sensitive configuration data is still low. Contents of the invention [0004] The main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08H04L29/06
CPCH04L9/14H04L9/0822H04L63/0428H04L63/0478H04L63/06H04L63/205
Inventor 吴道揆李光
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products