Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An encryption method and system based on time release

An encryption method and technology of an encryption system, which are applied in the field of encryption methods and systems based on time release, can solve the problems of inability to provide proof of message generation time, no asymmetric encryption, forged messages, etc., to prove the validity of time and improve confidentiality. , the effect of preventing early leakage

Active Publication Date: 2021-07-27
广州欧赛斯信息科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The traditional encryption method does not add a time-based mark to the encrypted information. The message receiver cannot manage the validity period of the message, nor can it provide proof of the generation time of the message. A third party can attack the message storage module, forge the message, and tamper with the message time stamp;
[0004] 2. There is no organic combination of asymmetric encryption and symmetric encryption to achieve the effect of improving information confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method and system based on time release
  • An encryption method and system based on time release
  • An encryption method and system based on time release

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0037] Preferred embodiments of the present invention are described below with reference to the accompanying drawings. Those skilled in the art should understand that these embodiments are only used to explain the technical principles of the present invention, and are not intended to limit the protection scope of the present invention.

[0038] It should be noted that, in the description of the present invention, terms such as "upper", "lower", "left", "right", "inner", "outer" and other indicated directions or positional relationships are based on the terms shown in the accompanying drawings. The direction or positional relationship shown is only for convenience of description, and does not indicate or imply that the device or element must have a specific orientation, be constructed and operated in a spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption method and system based on time release, which includes: generating a public-private key pair, encrypting information to be sent, setting a time-based signature and a time stamp T, and setting a protection time for the message. Decrypt the message. At the same time, the encryption process combines symmetric decryption and asymmetric decryption, which greatly improves the protection of information, effectively prevents the information from being cracked by a third party, provides verification of the message time, and proves the time validity of the message. Before the time, the message cannot be decrypted and used, which ensures the confidentiality of the message content and prevents the message content from being leaked in advance.

Description

technical field [0001] The field of the present invention is network encryption, specifically an encryption method and system based on time release. Background technique [0002] With the development of computer technology and network technology, people pay more and more attention to network security issues. For information transmission, encryption work is particularly important. The leakage of information may cause huge losses to enterprises. The existing encryption methods are mainly Symmetric encryption and asymmetric encryption are widely used by people, and their advantages and disadvantages are also different. However, the existing encryption technology still has the following problems: [0003] 1. The traditional encryption method does not add a time-based mark to the encrypted information. The message receiver cannot manage the validity period of the message, nor can it provide proof of the generation time of the message. A third party can attack the message storage ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/32
CPCH04L9/14H04L9/3297H04L63/045H04L63/12
Inventor 王华松
Owner 广州欧赛斯信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products