Data transmission encryption and decryption method

A data transmission, encryption and decryption technology, applied in the transmission system, electrical components, etc., can solve problems affecting the company's profitability, achieve the effect of not occupying resources, convenient modification, and preventing data from being stolen

Inactive Publication Date: 2016-11-16
福建中金在线信息科技有限公司
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are hundreds of millions of URLs on the Internet, some of which are publicly requested by the public, while others are non-public and used internally by the company. Some data is very precious, and if stolen, it may affect the company's profitability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission encryption and decryption method
  • Data transmission encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] see figure 1 and figure 2 As shown, a method for data transmission encryption and decryption of the present invention, the method defines a key chain in the code, and the key chain is used as the center to encrypt and decrypt data;

[0018] The encryption operation: carry out the carry number encoding of the key string and the character string to be encrypted, then perform logical operations, and finally perform base64 encoding to obtain the encrypted character string;

[0019] The decryption operation: carry out carry encoding on the key chain and the character string to be decrypted, then perform logical operations, and finally perform base64 decoding to obtain the decrypted data.

[0020] Wherein, the encryption operation is specifically:

[0021] First define the key chain, splicing the date format of the timestamp and the random number to get the dynamic key, so that the results of the data encryption are different every day, which increases the difficulty of de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data transmission encryption and decryption method. The method comprises the steps of defining a key string in code; carrying out encryption and decryption operations on data by taking the key string as a center, wherein the encryption operation comprises the steps of carrying out carry number coding on a character string needing to be encrypted, carrying out logic operation, and carrying out base 64 coding to obtain encrypted character string, and the decryption operation comprises the steps of carrying out carry number coding on the key string and the character string needing to be decrypted, carrying out the logic operation, and carrying out base 64 coding to obtain decrypted character string. According to the method, encryption operation logic and decryption operation logic are in mutual symmetry, so that a logic rule can be modified conveniently; and through adoption of a mode of modifying an encryption logic rule and a key, the data can be rapidly and effectively prevented from being stolen.

Description

technical field [0001] The invention relates to the technical field of payment terminals, in particular to a data transmission encryption and decryption method. Background technique [0002] There are hundreds of millions of URLs on the Internet, some of which are publicly requested by the public, while others are private and used internally by the company. Some data is very precious, and if stolen, it may affect the company's profitability. [0003] For a long time, people have invented various encryption methods. For the convenience of research, these methods are usually divided into two categories: symmetric encryption methods and asymmetric encryption methods. The common feature of the former is the use of single-key technology, that is, the same key is used in the encryption and decryption process, so it is also called a symmetric encryption method; while the common feature of the latter is the use of double-key technology, that is, the same key is used in the encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/045
Inventor 沈文策
Owner 福建中金在线信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products