Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption and decryption method, device and electronic equipment

A technology for encryption and decryption and data, which is applied in the field of information processing, can solve problems such as low security and easy cracking of encryption and decryption algorithms, and achieve the effect of improving security

Active Publication Date: 2019-09-20
南方电网互联网服务有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a data encryption and decryption method, device and electronic equipment to solve the technical problem of low security in the prior art because the encryption and decryption algorithm is easy to be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device and electronic equipment
  • Data encryption and decryption method, device and electronic equipment
  • Data encryption and decryption method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] This embodiment provides a data encryption and decryption method, please refer to figure 1 , the method includes:

[0055] Step S101: Encrypt the original encryption and decryption code in advance to obtain the encrypted original encryption and decryption code;

[0056] Step S102: When data needs to be encrypted and decrypted, decrypt the encrypted original encryption and decryption code to obtain the original encryption and decryption code;

[0057]Step S103: Use the original encryption and decryption code to encrypt and decrypt the data.

[0058] In this embodiment of the application, the original encryption and decryption code is a code used to encrypt and decrypt data. There can be one type of original encryption and decryption code, and then all data is encrypted and decrypted according to the same encryption and decryption method. Alternatively, there may be multiple original encryption and decryption algorithms, and then different data are encrypted and decryp...

Embodiment 2

[0111] Based on the same inventive concept as that of Embodiment 1, Embodiment 2 of the present invention provides a device for encrypting and decrypting data. Please refer to figure 2 , the device includes:

[0112] The first preprocessing module 201 is used to perform encryption processing on the original encryption and decryption code in advance, and obtain the encrypted original encryption and decryption code;

[0113] The second preprocessing module 202 is used to decrypt the original encryption and decryption code after the encryption and processing to obtain the original encryption and decryption code when the data needs to be encrypted and decrypted;

[0114] The encryption and decryption module 203 is configured to use the original encryption and decryption code to encrypt and decrypt the data.

[0115] In the data encryption and decryption device provided in this embodiment, the device further includes a conversion module, configured to convert the original encrypt...

Embodiment 3

[0129] Based on the same inventive concept as that of Embodiment 1, Embodiment 3 of the present invention provides an electronic device for data encryption and decryption. Please refer to image 3 , the electronic equipment includes:

[0130] A memory 301, a processor 302, and a computer program 303 stored on the memory and operable on the processor, wherein, when the processor 302 executes the computer program 303, any one of claims 1 to 5 can be realized. the method described.

[0131] It should be noted that the electronic devices involved in this application include but are not limited to: mobile terminals (mobile phones, smart phones, PADs, notebook computers, etc.), fixed terminals (computers).

[0132] For ease of description, only the parts related to the embodiments of the present invention are shown, and for specific technical details not disclosed, please refer to the method part of the embodiments of the present invention. The memory 301 can be used to store comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption-decryption method and device, and an electronic device. The method comprises steps of carrying out encryption processing on an original encryption-decryption code in advance so as to obtain an encrypted original encryption-decryption code; when encryption-decryption should be performed on the data, decrypting the encrypted original encryption-decryption code so as to obtain the original encryption-decryption code; and using the original encryption-decryption code, carrying out encryption-decryption on the data. According to the invention, a technical problem of quite low safety caused by the fact that an encryption-decryption algorithm is easy to break in the prior art is solved and a technical effect of improving safety of data encryption-decryption is achieved.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a data encryption and decryption method, device and electronic equipment. Background technique [0002] At present, with the advancement of network communication technology and the acceleration of broadband networks, information security has become more and more important, especially some important data, such as program codes, user passwords, resource files used in programs, etc. It is usually necessary to encrypt and protect the above-mentioned important data. [0003] In the prior art, encryption and decryption algorithms are generally used to encrypt or decrypt the data in the application program. When the application program needs to be used, the code corresponding to the above encryption and decryption algorithm will be compiled together with the application program code to form the final executable file . [0004] However, the applicant found that s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 周志刚张文明陈少杰
Owner 南方电网互联网服务有限公司