Method for realizing encrypting

An encryption device and a technology of data to be encrypted, which are applied in the field of information security, can solve problems such as the impossibility of impersonating a signature or tampering with the content of a signature, the impossibility of seeing the content to be encrypted, and the content of a user's signature, so as to avoid counterfeiting or tampering with a signature content effect

Active Publication Date: 2007-01-03
LENOVO (BEIJING) LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

application figure 2 When the device shown in the figure performs the encryption operation, although the encryption control information needs to be input to strengthen the control link, since the platform in the public network environment is untrustworthy, it is still possible to impersonate the user's signature or tamper with the content of the user's signature
[0012] In addition, no matter which encryption device is based on the above, the user can only see the input information at most, and it is impossible to see the specific content to be encrypted. In this way, it is possible for the hacker to drop the actual encrypted content before the actual encryption.
It can be seen that none of the existing encryption methods can avoid the situation of impersonating a signature or tampering with the content of a signature
At present, there is no way to solve the problem of counterfeiting signatures or tampering with signature content.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing encrypting
  • Method for realizing encrypting
  • Method for realizing encrypting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0048] image 3 Shown is a schematic flow diagram of implementing encryption by applying the present invention.

[0049] Step 301, the encryption device receives part of the data to be encrypted from the input and output interface, and receives encryption operation authorization information including the data elements to be encrypted from the management interface. The aforementioned part of the data to be encrypted is usually plain text.

[0050] Step 302, the execution unit in the encryption device extracts the data element to be encrypted from the encryption operation authorization information, combines the data element to be encrypted with the received partial data to be encrypted, and synthesizes the complete data to be encrypted.

[0051] Of course, the encryption operation authorization information may further include constrai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for realizing encryption including that a encryption device receives data to be ciphered from an I/O interface and authorization information of encryption operation from a management interface to get correct and complete data to be ciphered, then carries out encryption operation to the data and transmits the ciphered information to a platform, which avoids the situation of imitating signature or juggling its content and is widely used in banks, on-line trading systems related to negotiable securities, cipher systems of electronic payment, electronic stamps for documents and post signatures.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an encryption device with an input and output interface, an execution unit and a management interface, and a method for realizing encryption. Background technique [0002] In today's society, the Internet is very popular. For the convenience of the following description, a few terms will be described first. [0003] A "platform" includes any product that includes a data processing capability device, which may be one or more packaged or unpackaged integrated circuits. Examples of various types of platforms include, but are not limited to or limited to, computers such as: personal digital assistants, notebooks, desktops, workstations, servers; any peripherals associated with a computer such as: printers, digital cameras, digital video cameras; wireless Communication devices, such as: telephones, smart phones; network terminals, such as: ATM machines, POS machines, KIO...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
Inventor 刘永华
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products