Multi-encryption system and decryption method of plug-in encryption terminal
A multiple encryption, plug-in technology, applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as computer encryption, and achieve the effect of strong encryption reliability and difficult cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] This embodiment is basically as figure 1 , figure 2 Shown: a multiple encryption system of a plug-in encryption terminal, including an encryption terminal microprocessor, the encryption terminal microprocessor is provided with a side-end connector, and it is characterized in that: the encryption terminal microprocessor has a clock module inside , the encrypted terminal microprocessor is also connected with an encrypted memory, and a private key is stored in the encrypted memory.
[0029] In this embodiment, an encrypted file is also provided in the encrypted memory, and the encrypted file key is a preset software package in the edge-end device to be encrypted connected to the edge-end connection head.
[0030] In this embodiment, the encrypted file is an AES encrypted file.
[0031] In this embodiment, an encryption start time and an encryption end time are set in the encryption memory or the encryption terminal microprocessor.
[0032] In this embodiment, license a...
Embodiment 2
[0039] The difference between this embodiment and Embodiment 1 is that: the private key includes one plain code private key and one hidden code private key;
[0040] The public key corresponding to the plaintext private key is obtained by popping up a pop-up window to the edge-end device to be encrypted connected to the edge-end connector;
[0041] The public key corresponding to the private key of the hidden code is obtained by accessing a preset software package in the edge-end device connected to the edge-end connection head to be encrypted.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


