Key encryption system constructed by means of multidirectional technology

A technology of key encryption and technology, applied in the field of information security, can solve problems such as the inability to meet the requirements of Internet data transmission security, the security can no longer be guaranteed, and the reliability of encryption algorithms. , the effect of high safety

Active Publication Date: 2016-09-21
INSPUR FINANCIAL INFORMATION TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of computer hardware technology, especially the rise of quantum computer technology, the traditional AES / RSA encryption algorithm has been unable to meet the security requirements of Internet data transmission
Especially after the Snowden-related incidents, the reliability of the relevant encryption algorithms has been widely questioned by the industry. Currently, the common encryption algorithms in the world have become unreliable
However, it is very difficult to implement a new encryption algorithm based on traditional mathematical methods, and its reliability needs long-term verification, which cannot solve the practical problems faced by the industry in the short term.
[0003] Moreover, the key system formed by using traditional mathematical algorithms has a fixed algorithm mode, and different users and manufacturers must follow the same algorithm definition. Once the algorithm has a security risk or is cracked, regardless of the key No matter how high the security level is, its security can no longer be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key encryption system constructed by means of multidirectional technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0037] as attached figure 1 As shown, the present invention uses multi-dimensional technology to build a key encryption system, which completely disrupts the transmission rules of ordinary binary computer data streams through the original spatial geometric data structure, thereby fundamentally solving the problem of traditional key encryption methods. The problem of being easily cracked is an effective guarantee for the security of Internet data transmission.

[0038] Its specific structure includes:

[0039] Data space module, which is used to construct and sort the data to be encrypted and the geometric structure of the data space lock, as well as the relationship between the components;

[0040] The component association module uses the interactive interaction dimension to manage the operation and feedback between components;

[0041] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key encryption system constructed by means of multidirectional technology. The key encryption system comprises the components of a data space module which is used for constructing and ordering to-be-encrypted data, the geometric structure of a data space lock and association among components; a component association module which utilizes interaction dimensions for managing operation and feedback among the components; a physical material module which manages the material and physical attribute of the component by means of the material physical dimension; and a decryption reduction module which starts a data decryption process when operation of the key satisfies an active state critical point rule of the data space lock, thereby rearranging the sequence of spatial data and realizing purposes of decryption and reducing original data. Compared with the prior art, the key encryption system which is constructed by means of the multidirectional technology has advantages of high safety degree, simple key memorization, convenient user operation, supporting user / manufacturer customizing of the encryption method, high encryption grade, cracking incapability, convenient use, high practicability and easy popularization.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key encryption system constructed using multi-dimensional technology. Background technique [0002] With the continuous development of computer hardware technology, especially the rise of quantum computer technology, the traditional AES / RSA encryption algorithm has been unable to meet the security requirements of Internet data transmission. Especially after the Snowden-related incidents, the reliability of the relevant encryption algorithms has been widely questioned by the industry, and the current common encryption algorithms in the world have become unreliable. However, it is very difficult to implement a new encryption algorithm based on traditional mathematical methods, and its reliability also requires long-term verification, which cannot solve the practical problems faced by the industry in a short period of time. [0003] Moreover, the key system formed by using tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 张家重董毅李光瑞
Owner INSPUR FINANCIAL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products