Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information encryption method of high security

A technology for information encryption and security, applied in security devices, wireless communications, electrical components, etc., can solve problems such as unguaranteed security, achieve security assurance, protect private information, and reduce key transmission Effect

Inactive Publication Date: 2013-06-05
XIAN RUNFENG ELECTRONICS TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the present invention aims to provide a short message encryption device and method to solve the problem that the security of the existing short message encryption technology cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Preferred embodiments of the present invention are described in detail below, wherein, for the sake of clarity and simplicity, detailed detailed descriptions of known functions and structures in the devices described herein will be omitted when it may obscure the subject matter of the present invention.

[0016] In the process of the method described in the embodiment of the present invention, if A sends an encrypted short message to B as an example, the method may specifically include the following steps:

[0017] Step 1: Select the text message to be encrypted and sent, encrypt the data to be sent, negotiate a digital key with each other according to their respective key password tables, and the terminal device and the terminal device store a fake text message table;

[0018] Step 2: Combine the selected text message with the input password to generate encrypted data, use symmetric encryption technology to encrypt the content of the text message when sending and after ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is an information encryption method of high security. The method includes that a message to be encrypted and sent is chosen, after data to be sent is encrypted, a digital secret key is mutually discussed according to a respective secret key password; a fake message chart is stored in a terminal device. The chosen message is combined with the inputted password to generate encrypted data. A symmetrical encryption technology is used for carrying out encryption over textual contents of the message so that the text contents are displayed an inner section of one message inside the fake message chart, at least a first encrypted data to be decrypted is chosen from the encrypted data. The encrypted message is forged into a normal message through the fake message chart; the secret key of the encrypted data is changed from the secret key of a mobile terminal of senders to the secret key of the objective mobile terminal, and then is sent to the objective mobile terminal and the security if the message communication is increased.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an information encryption method with high security. Background technique [0002] Confidential communication, computer keys, anti-copy floppy disks, etc. all belong to information encryption technology. Encryption in the communication process mainly uses passwords. In digital communication, computers can use encryption methods to change the digital structure of the load information. Computer information protection is mainly based on software encryption. At present, the most popular encryption systems and encryption algorithms in the world are: RSA algorithm and CCEP algorithm. [0003] In order to prevent cracking, encryption software often uses hardware encryption and encrypted floppy disks. Some software products often have a small hard card, which is the hardware encryption method. Use laser perforation on the floppy disk to make the software storage area have some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02
Inventor 耿亚坤
Owner XIAN RUNFENG ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products