Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encrypting spatial network

An encryption method and space network technology, applied in the field of space network encryption, can solve the problems of security discount and high use cost, and achieve the effects of enhancing security, convenient operation and reducing use cost

Active Publication Date: 2014-09-24
INSPUR FINANCIAL INFORMATION TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional encryption technology uses mathematics as the main means, not only the cost of use is relatively high, but also because the encryption method based on mathematics as the main means has been cracked by many mature cracking methods, many mature cracking methods can be easily cracked, and the security is high. discount

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting spatial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The specific steps for setting this encryption method are as follows:

[0038] Step 1: Computer B sends a session request to server A;

[0039] Step 2: Server A receives the request by listening to the port message, agrees to the session and creates a session connection;

[0040] Step 3: Server A calls the CreateSpaceEncoding function to create an independent encrypted space for computer B, and loads the preset encrypted space parameters of computer B through the SpaceEncoding function, encrypts the version information and timestamp of the space key currently used by server A, and then The encrypted message is returned to computer B together;

[0041] Step 4: Computer B obtains the return message from server A, calls the CreateSpaceDecoding function to create the decryption space of computer B, then calls the SpaceDecoding function to load the communication ciphertext and the preset decryption space parameters of computer B, and initializes the decryption spa...

Embodiment 2

[0063] The specific steps for setting this encryption method are as follows:

[0064] Step 1: Computer B sends a session request to server A;

[0065] Step 2: Server A receives the request by listening to the port message, agrees to the session and creates a session connection;

[0066] Step 3: Server A calls the CreateSpaceEncoding function to create an independent encrypted space for computer B, and loads the preset encrypted space parameters of computer B through the SpaceEncoding function, encrypts the version information and timestamp of the space key currently used by server A, and then The encrypted message is returned to computer B together;

[0067] Step 4: Computer B obtains the return message from server A, calls the CreateSpaceDecoding function to create the decryption space of computer B, then calls the SpaceDecoding function to load the communication ciphertext and the preset decryption space parameters of computer B, and initializes the decryption spa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting a spatial network. When transmitted among a computer A, a computer B and a server A, data are processed through the following steps: the computer B carries out meaning transferring on the communication data of the computer B according to encrypted space disclosed by the server A, and the data are reconstructed to be encrypted data which can only be identified through the server A; the server A obtains the data and intercalates the data into a self-defined spatial rule, a data sequence is decrypted, if the data sequence is successfully decrypted, the data are read into main data space, and communication data needing to be fed back to the computer A are generated after the data are processed. Compared with the prior art, the method for encrypting the spatial network has the advantages of being reasonable in design, high in safety, convenient to operate, low in use cost and the like.

Description

technical field [0001] The invention relates to the technical field of network communication data encryption, in particular to a space network encryption method. Background technique [0002] Encryption technology is the main security measure adopted by e-commerce, and it is the most commonly used security measure. It uses technical means to convert important data into garbled codes (encryption) for transmission, and then restores (decryption) with the same or different means after arriving at the destination. . Encryption technology consists of two elements: algorithm and key. Algorithms are the steps of combining ordinary text (or understandable information) with a string of numbers (keys) to produce incomprehensible ciphertext. Keys are an algorithm used to encode and decode data. In security and confidentiality, appropriate key encryption technology and management mechanism can be used to ensure the security of network information communication. [0003] The tradition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张家重董毅王玉奎王宏生张涛高强
Owner INSPUR FINANCIAL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products