×

Data encryption method, decryption method, apparatus, and system

  • US 10,659,226 B2
  • Filed: 09/07/2017
  • Issued: 05/19/2020
  • Est. Priority Date: 08/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A data encryption method performed at a computing device having one or more processors and memory storing programs to be executed by the computing device, the method comprising:

  • receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and identifiers of at least two target mobile phones for storing the encrypted data, wherein the at least two target mobile phones are communicatively connected to the computing device;

    in response to the data encryption request;

    separately obtaining unique device information of the at least two target mobile phones;

    generating, based on the unique device information of the at least two mobile phones, an encryption key that includes a combination of the unique device information of the at least two mobile phones and according to a preset policy;

    encrypting the original data by using the encryption key to obtain ciphertext, including dividing, according to a quantity of the at least two target mobile phones, the ciphertext into a corresponding quantity of ciphertext segments;

    destructing relevant data of the encryption key from the computing device; and

    storing each of the ciphertext segments into a corresponding target mobile phone of the at least two target mobile phones, such that the ciphertext can be obtained only by combining all of the ciphertext segments from the at least two target mobile phones;

    receiving a data decryption request, the decryption request indicating ciphertext that needs to be decrypted and including addresses of the at least two mobile phones that store the ciphertext to be decrypted;

    in response to the data decryption request;

    determining, based on the addresses, that the ciphertext to be decrypted are stored at the at least two target mobile phones and can be obtained by combining the ciphertext segments from the at least two target mobile phones, wherein the at least two target mobile phones are communicatively connected to the computing device via Bluetooth;

    obtaining the unique device information of the at least two target mobile phones by the Bluetooth connection;

    retrieving, based on the unique device information, the encryption key that includes the combination of the unique device information of the at least two mobile phones and according to the preset policy; and

    retrieving the ciphertext by combining the cipertext segments from the at least two target mobile phones and decrypting the ciphertext by using the encryption key to obtain decrypted data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×