Unlock instant, AI-driven research and patent intelligence for your innovation.

A data encryption method and system

A technology of data encryption and key data, which is applied in the field of communication security to achieve the effect of improving security

Active Publication Date: 2018-11-20
数据堂(北京)科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing encryption methods usually use the same key repeatedly during multiple data transmissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption method and system
  • A data encryption method and system
  • A data encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0060] The data encryption method of the present invention can be applied to various data transmission processes.

[0061] figure 1 It is a flowchart of Embodiment 1 of the data encryption method of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and system. The method includes the steps that data to be transmitted are acquired; the data length of the data to be transmitted is determined as the first length; data in a data platform are searched for secret key data with the data length being the second length, wherein the second length is larger than or equal to the first length; the data to be transmitted are divided into data blocks to be transmitted in the first number; the secret key data are divided into secret key data blocks in the second number; the secret key data block corresponding to each data block to be transmitted is determined; the data blocks to be transmitted are encrypted through the secret key data blocks, and then encrypted data blocks are acquired; the encrypted data blocks are transmitted to a target terminal. By the adoption of the method and system, each data block in the data to be transmitted can be encrypted through different secret keys, a one-time pad encryption mode is achieved, and data transmission safety is improved.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a data encryption method and system. Background technique [0002] In the information age, data is a kind of knowledge asset, and its content itself contains high-value information, which needs to be prevented from being illegally acquired, copied and disseminated. Therefore, the data needs to be encrypted. [0003] For data encryption, there are mainly two types. One is to hide the encryption algorithm. The other is to hide the encryption key. For the first method, only hiding the encryption algorithm to protect information has been discussed in academia and industry, and it is generally considered to be not secure enough. For the second method, such as the popular RSA public key encryption algorithm and AES (Advanced Encryption Standard, Advanced Encryption Standard) encryption algorithm, the encryption algorithms are completely open. If one party obtains encrypted da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/06
Inventor 王大亮杨琪
Owner 数据堂(北京)科技股份有限公司