Encryption authentication method and device, equipment and storage medium

An encryption authentication and equipment technology, applied in secure communication devices, digital data authentication, computer security devices, etc., can solve the problems of public key leakage, brute force cracking and cracking of encryption methods, improve security performance and reduce the risk of brute force cracking Effect

Active Publication Date: 2022-05-06
LIVEFAN INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to solve the technical problem that the encryption method of the prior art has the situation of brute force cracking and the situation of public key leakage and cracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption authentication method and device, equipment and storage medium
  • Encryption authentication method and device, equipment and storage medium
  • Encryption authentication method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The embodiment of the present invention provides an encryption authentication method, device, equipment and storage medium.

[0054] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the term "comprising" or "having" and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to those explicitly listed instead, may include other steps or elements not explicitly listed or inherent to the process, meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data encryption, and discloses an encryption authentication method and device, equipment and a storage medium. The method comprises the following steps: receiving an authentication request sent by a to-be-authenticated device, and sending a public key authentication request to the to-be-authenticated device based on the authentication request; receiving an authentication public key sent by the to-be-authenticated device; performing verification processing on the character string according to a preset coordinate verification algorithm to obtain a verification result; judging whether the verification result is a pass result or not; if yes, obtaining a preset character check matrix framework, and filling the character string into the character check matrix framework to obtain a character check matrix; according to a preset matrix decryption algorithm, carrying out decryption processing on the character check matrix to obtain a character decryption matrix; carrying out matrix removal processing on the character decryption matrix to obtain a decryption character string; judging whether the decrypted character string belongs to a preset key character string set or not; if yes, determining the to-be-authenticated device as an authentication device; and if not, determining the to-be-authenticated device as a non-authenticated device.

Description

technical field [0001] The present invention relates to the field of data encryption, in particular to an encryption authentication method, device, equipment and storage medium. Background technique [0002] With the rapid development of portable devices and mobile network technologies, data security has been paid more and more attention. Data is the core part of the entire storage, and the encryption and protection of data is also the focus of safe storage, so it is more important to design the system for safe storage and encryption. Data encryption technology refers to converting a piece of information into meaningless ciphertext through an encryption key and an encryption function, and the receiver restores the ciphertext to plaintext through a decryption function and a decryption key. [0003] In the fiercely competitive information age, a strong security measure is objectively required to protect confidential data from being stolen or tampered with, so data encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40G06F21/31G06F21/62G06F21/60
CPCH04L9/3234H04L63/0442G06F21/31G06F21/62G06F21/602
Inventor 王斌张果唐盛
Owner LIVEFAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products