Encryption method and encryption system
An encryption method and a hash algorithm technology, applied in the field of information security, can solve problems such as data theft and failure to effectively prevent the loss of secret keys, and achieve the effect of strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] refer to figure 1 , shows a flow chart of the steps of the encryption method according to Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. It should be noted that this embodiment uses the computer device 2 as an execution subject for exemplary description. details as follows:
[0057] Step S100, detecting whether the installation of the client is completed.
[0058] In a preferred embodiment, the computer device 2 detects whether there is a client installation completed every preset time (for example: within 5 seconds).
[0059] Step S102, when the installation of the client is completed, use a random algorithm to encrypt the identification information of the client to generate a random key, and store the identification information in a database, wherein the identification information at least includes: MAC Address, IP address, UUID, local time and user mous...
Embodiment 2
[0072] see figure 2 , shows a schematic diagram of the hardware architecture of the computer device according to Embodiment 2 of the present invention. The computer device 2 includes, but is not limited to, a memory 21, a processing 22, and a network interface 23 that can communicate with each other through a system bus, figure 2 Only the computer device 2 is shown with components 21-23, but it should be understood that implementation of all of the illustrated components is not required and that more or fewer components may instead be implemented.
[0073] The memory 21 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static Random Access Memory (SRAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Programmable Read Only Memory (PROM), Magnetic Memory, Magne...
Embodiment 3
[0077] see image 3 , shows a schematic diagram of the program modules of the encryption system according to Embodiment 3 of the present invention. In this embodiment, the encryption system 20 may include or be divided into one or more program modules, and one or more program modules are stored in a storage medium and executed by one or more processors to complete the present invention , and can implement the above encryption method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable for describing the execution process of the encryption system 20 in the storage medium than the program itself. The following description will specifically introduce the functions of each program module of the present embodiment:
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com