首页>
外国专利>
Data encryption/decryption method, for data transmission, involves identification of the operator, and implementing encryption algorithm for which the encryption key once programmed becomes inaccessible
Data encryption/decryption method, for data transmission, involves identification of the operator, and implementing encryption algorithm for which the encryption key once programmed becomes inaccessible
Encrypting/decrypting process (10) is characterized by an encryption algorithm for which the encryption key once programmed becomes inaccessible, and involves: initialization and optional blocking (12) of the person performing the process; supplying data (11) to be processed; implementing the algorithm; optional addition of complementary data; and supplying the processed data (13).
展开▼