DATA ENCRYPTION METHOD, DECRYPTION METHOD, APPARATUS, AND SYSTEM
First Claim
1. A data encryption method performed at a computing device having one or more processors and memory storing programs to be executed by the computing device, the method comprising:
- receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device;
in response to the data encryption request;
separately obtaining unique device information of the at least two target storage devices;
generating, based on the unique device information, a public key according to a preset policy;
encrypting the original data by using the public key to obtain ciphertext; and
destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A data encryption method performed at a computing device includes: receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request: separately obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; encrypting the original data by using the public key to obtain ciphertext; and destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices.
32 Citations
20 Claims
-
1. A data encryption method performed at a computing device having one or more processors and memory storing programs to be executed by the computing device, the method comprising:
-
receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request; separately obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; encrypting the original data by using the public key to obtain ciphertext; and destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data decryption method performed at a computing device having one or more processors and memory storing programs to be executed by the computing device, the method comprising:
-
receiving a data decryption request, the decryption request indicating ciphertext that needs to be decrypted; in response to the data decryption request; determining at least two target storage devices that store the ciphertext, each target storage device having at least a portion of the ciphertext, wherein the at least two target storage devices are communicatively connected to the computing device; obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; and retrieving the ciphertext from the at least two target storage devices and decrypting the ciphertext by using the public key to obtain decrypted data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computing device for data encryption and data decryption, comprising:
-
one or more processors; memory; and a plurality of programs stored in the memory, wherein the plurality of programs, when executed by the one or more processors, cause the computing device to perform the following operations; receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request; separately obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; encrypting the original data by using the public key to obtain ciphertext; and destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification