Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing encrypting

An encrypted and encrypted device technology, which is applied in the field of information security, can solve the problems that it is impossible to avoid impersonating signatures or tampering with signature content, it is impossible to see the content to be encrypted, and tamper with user signatures, etc., so as to avoid impersonating signatures or tampering with signature content Effect

Active Publication Date: 2010-05-05
LENOVO (BEIJING) LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] application figure 2 When the device shown in the figure performs the encryption operation, although the encryption control information needs to be input to strengthen the control link, since the platform in the public network environment is untrustworthy, it is still possible to impersonate the user's signature or tamper with the content of the user's signature
[0013] In addition, no matter which encryption device is based on the above, the user can only see the input information at most, and it is impossible to see the specific content to be encrypted. In this way, it is possible for the hacker to drop the actual encrypted content before the actual encryption.
It can be seen that none of the existing encryption methods can avoid the situation of impersonating a signature or tampering with the content of a signature
At present, there is no way to solve the problem of counterfeiting signatures or tampering with signature content.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing encrypting
  • Method for realizing encrypting
  • Method for realizing encrypting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0046] image 3 Shown is a schematic diagram of the process of implementing encryption by applying the present invention.

[0047] Step 301: The encryption device receives part of the data to be encrypted from the input and output interface, and receives the encryption operation authorization information containing the data elements to be encrypted from the management interface. The above part of the data to be encrypted is usually in plain text.

[0048] Step 302: The execution unit in the encryption device extracts the data element to be encrypted from the encryption operation authorization information, combines the data element to be encrypted with the received part of the data to be encrypted, and synthesizes the complete data to be encrypted.

[0049] Of course, the encryption operation authorization information can further include constraint condit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for realizing encryption including that a encryption device receives data to be ciphered from an I / O interface and authorization information of encryption operation from a management interface to get correct and complete data to be ciphered, then carries out encryption operation to the data and transmits the ciphered information to a platform, which avoids the situation of imitating signature or juggling its content and is widely used in banks, on-line trading systems related to negotiable securities, cipher systems of electronic payment, electronic stamps fordocuments and post signatures.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a method for implementing encryption suitable for an encryption device having an input and output interface, an execution unit and a management interface. Background technique [0002] In today's society, the Internet is very popular. For the convenience of the following description, a few terms will be described first. [0003] "Platform" includes any product containing a device with data processing capability, which may be one or more packaged or unpackaged integrated circuits. Examples of various types of platforms include, but are not limited to, or limited to computers, such as personal digital assistants, notebooks, desktops, workstations, servers; any peripheral devices associated with computers, such as printers, digital cameras, and digital video cameras; wireless Communication devices, such as: telephone handsets, smart phones; network terminals, such as:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 刘永华
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products