Data encryption method and data encryption device

A technology for data encryption and encryption keys, which is applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., and can solve problems such as no security at all and display.

Inactive Publication Date: 2017-08-25
EASTCOMPEACE TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The first method is to directly store plaintext data in the non-volatile storage space; however, if the plaintext data is directly stored in the non-volatile storage space, if there is a data leak, the customer's information will be directly displayed without any delay. no safety at all;
[0004] The second method is to simply encrypt the data and store it in the non-volatile storage space. It specifically uses cryptographic technology to encrypt the data to realize data concealment, thereby protecting the security of the data; however, some products Using ciphertext to encrypt and store data, there are a series of problems such as key protection and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and data encryption device
  • Data encryption method and data encryption device
  • Data encryption method and data encryption device

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0050] In the first specific implementation manner, the data at the odd address in the random number is selected as the encryption key;

[0051] In the second specific implementation manner, the data at the even address in the random number is selected as the encryption key;

[0052] In the third specific implementation manner, the six-byte number in the random number is randomly selected as the encryption key;

[0053] In the fourth specific implementation manner, the six-byte number in the random number is randomly selected as the key seed; the encryption key is generated using the key seed;

[0054] In the fifth specific implementation manner, the six-byte number in the random number is randomly selected as the base number, and the prime number closest to the base number is used as the key seed; the encryption key is generated using the key seed.

[0055] Above-mentioned five kinds of specific implementation modes (five kinds of conversion rules) all can obtain unique encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a data encryption method and a data encryption device. The method comprises the steps of: acquiring one group of unique random numbers generated after a static random access memory is powered off; and performing the encryption protection to clear data stored in a nonvolatile storage space by using the random numbers. The method of the application utilizes the physical property of the static random access memory to generate one group of unique random numbers to encrypt the clear data; thus, the security of the data can be protected at source by using the random numbers that are not known by the outside; the data is encrypted and cannot be copied; and the security of the data is improved.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a data encryption method and a data encryption device. Background technique [0002] Currently, there are two ways to store data: [0003] The first method is to directly store plaintext data in the non-volatile storage space; however, if the plaintext data is directly stored in the non-volatile storage space, if there is a data leak, the customer's information will be directly displayed without any delay. no safety at all; [0004] The second method is to simply encrypt the data and store it in the non-volatile storage space. It specifically uses cryptographic technology to encrypt the data to realize data concealment, thereby protecting the security of the data; however, some products Using ciphertext to encrypt and store data has a series of problems such as key protection and maintenance. [0005] Therefore, how to improve data security is a technical problem to be solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/06H04L9/0869
Inventor 林国民
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products