Data encryption method and system

An encryption method and data technology, applied in the field of data security, can solve problems such as being decrypted, and achieve the effects of small computational complexity, high decryption difficulty, and high encryption and decryption efficiency.

Inactive Publication Date: 2012-07-11
成都科创知识产权研究所
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the current encryption method, no matter what method is used, because the encrypted data is complete, it is possible to be decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and system
  • Data encryption method and system
  • Data encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to facilitate a further understanding of the present invention, the specific embodiments of the present invention will be described below in conjunction with the accompanying drawings:

[0024] refer to figure 1 As shown, the original data A is decomposed into data A1 and data A2 in a discontinuous manner. Since the data obtained from data A1 and A2 are discontinuous, it cannot be restored to data A through A1 and A2. Even if the data A1 and A2 are obtained, If the decomposition law of the data cannot be obtained, it cannot be restored to achieve the encryption effect. Of course, there can be at least two after decomposing, if it can be decomposed into multiple in order to ensure safety.

[0025] refer to figure 2 As shown in the method, the data A follows the function It is decomposed into data A1, A2, A3, and the data A1, A2, A3 are encrypted by encryption steps to generate encrypted data A1', A2', A3'. Of course, the encryption methods of data A1, A2, A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data encryption method and a system. The data encryption method is characterized in that raw data is decomposed into at least two parts of data according to a preset function relationship. A data encryption storage method is characterized in that the preset function relationship is decomposed into at least parts of data, and the disassembled data is respectively stored in different memories. A data encryption transmission method is characterized in that a sending end decomposes raw data A into at least two parts according to the preset function relationship; the two parts are sent to a data receiving end via different data transmitting channels; and the data receiving end respectively receives the data, and combines and reduces the data into the raw data A according to the corresponding function relationship. As various combination modes are provided, the decryption difficulty is high after encryption, and the original encryption index is enhanced by times to guarantee the encryption effect of numbers. Only disassembly is required, and therefore, good encryption effect is achieved. In addition, the data encryption method has the advantages of low calculation amount and high encryption and decryption efficiency.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data encryption method and system. Background technique [0002] Nowadays, the safe storage and transmission of data has become very important in many fields, especially for units and departments with high confidentiality requirements such as national defense and military, which have strict requirements. In order to realize the confidentiality of the data, people generally adopt the encryption method to encrypt the data now, and it is even more necessary to decrypt and restore it when using it. However, the current encryption method, no matter which method is used, may be decrypted because the encrypted data is complete. Whether it is encrypted storage or encrypted transmission, it reduces the difficulty of data decryption, which is not conducive to data security. Contents of the invention [0003] In view of the above deficiencies, the technical problem to be solved by the pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24H04L9/00G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 杨斌徐玉
Owner 成都科创知识产权研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products