Data encryption method, apparatus and system
A technology of data encryption and encryption algorithm, applied in the field of data transmission, can solve problems such as low security, and achieve the effect of small amount of data and high efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] According to an embodiment of the present invention, an embodiment of a data encryption method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0032] figure 1 is a flowchart of a data encryption method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0033] Step S102, sending one or more first data to the first receiving end, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm.
[0034]Specifically, the above-mentioned first data may be sent by a device end, and the device end may be a device such as a smart switch. The above-me...
Embodiment 2
[0067] According to an embodiment of the present invention, an embodiment of a data encryption method is provided. It should be noted that the steps shown in the flowcharts of the drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0068] figure 2 is a flowchart of another data encryption method according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:
[0069] Step S202, receiving one or more first data sent by the sender, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm.
[0070] Specifically, the above-mentioned sending end may be a device end, for example, a device such as a smart switch.
[0071] Step S204, sending one or more seco...
Embodiment 3
[0094] According to an embodiment of the present invention, an embodiment of a data encryption system is provided, Figure 4 is a schematic structural diagram of an optional data encryption system according to an embodiment of the present application, combined with Figure 4 As shown, the system includes:
[0095] The sending end 40, sending one or more first data to the first receiving end, receiving one or more second data returned by the first receiving end, and according to the first random number included in the first data and the random number included in the second data The second random number constitutes a key, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm, and both the first data and the second data include at least one second random number encrypted by an asymmetric algorithm. random number.
[0096] The first receiving end 42 communicates with the sending end for receiving one or more first data sent by the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com