Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption authentication method, device, device and storage medium

An encryption authentication and equipment technology, applied in secure communication devices, digital data authentication, computer security devices, etc., can solve problems such as public key leakage, encryption method brute force cracking, and cracking, so as to improve security performance and reduce the risk of brute force cracking Effect

Active Publication Date: 2022-07-01
LIVEFAN INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to solve the technical problem that the encryption method of the prior art has the situation of brute force cracking and the situation of public key leakage and cracking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption authentication method, device, device and storage medium
  • Encryption authentication method, device, device and storage medium
  • Encryption authentication method, device, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Embodiments of the present invention provide an encryption authentication method, apparatus, device, and storage medium.

[0054] The terms "first", "second", "third", "fourth", etc. (if present) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It is to be understood that data so used can be interchanged under appropriate circumstances so that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" or "having" and any variations thereof are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those expressly listed steps or units, but may include other steps or units not expressly listed or inherent to these processe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data encryption, and discloses an encryption authentication method, device, equipment and storage medium. The method includes: receiving an authentication request sent by a device to be authenticated, and based on the authentication request, sending a public key authentication request to the device to be authenticated; receiving an authentication public key sent by the device to be authenticated; Perform verification processing to obtain a verification result; determine whether the verification result is a pass result; if so, obtain a preset character verification matrix frame, fill the character string into the character verification matrix frame, and obtain a character verification matrix ; According to the preset matrix decryption algorithm, decrypt the character check matrix to obtain a character decryption matrix; perform de-matrix processing on the character decryption matrix to obtain a decrypted string; determine whether the decrypted string belongs to the preset key string set; If it belongs, the device to be authenticated is determined as an authentication device; if not, the device to be authenticated is determined as a non-authenticated device.

Description

technical field [0001] The present invention relates to the field of data encryption, and in particular, to an encryption authentication method, device, device and storage medium. Background technique [0002] With the rapid development of portable devices and mobile network technology, data security has been paid more and more attention. Data is the core part of the entire storage, and the encryption and protection of data is also the focus of secure storage, so it is more important to design the system for secure storage and encryption. Data encryption technology refers to converting a piece of information into meaningless ciphertext through an encryption key and an encryption function, and the receiver restores the ciphertext to plaintext through a decryption function and decryption key. [0003] In the highly competitive information age, a strong security measure is objectively needed to protect confidential data from being stolen or tampered with, so data encryption te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40G06F21/31G06F21/62G06F21/60
CPCH04L9/3234H04L63/0442G06F21/31G06F21/62G06F21/602
Inventor 王斌张果唐盛
Owner LIVEFAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products