Unlock instant, AI-driven research and patent intelligence for your innovation.

A data encryption and decryption method and device

A data encryption and data link technology, applied in transmission systems, electrical components, etc., can solve the problems of no management method, inability to resist hacking, inability to guarantee data security, etc., to achieve the effect of protecting security and preventing cracking

Active Publication Date: 2019-12-17
GUANGDONG HONGQIN COMM TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these data information can only exist as fixed data. The data is all the data of the information or just ordinary encrypted data. There is no better management method except for the security area to prevent external access.
[0003] With the rapid development of the Internet, computer hacking activities are becoming more and more rampant, and hacking techniques are also being updated day by day. Therefore, traditional encryption technology can no longer prevent hackers from invading and cannot guarantee data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption and decryption method and device
  • A data encryption and decryption method and device
  • A data encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] see figure 1 It is a schematic flowchart of a data encryption method provided by Embodiment 1 of the present invention, the method includes the following steps:

[0063] S11. Obtain original data, encrypt the original data, and generate encrypted data and a key;

[0064] Specifically, the original data may include any data type to be encrypted, such as fingerprint data type or data information such as other files.

[0065] At the same time, when obtaining the original data, part of the memory space can be initialized. The memory space includes two parts, one part is the storage space used to store the encryption program, and the further stored encryption program can be multiple encryption programs, and the other part is The space to be used means that there is no data in the space, and it is prepared for subsequent storage of related information of binary codes, wherein the related information of binary codes includes: identification feature code, length of binary code...

Embodiment 2

[0084] refer to figure 2 It is a schematic flowchart of a data decryption method provided in Embodiment 2 of the present invention, the method includes:

[0085] S21. Obtain ciphertext, wherein the ciphertext includes identification feature code, binary code related information, binary code and encrypted data, and the binary code related information includes binary code length, identification feature code and binary code offset quantity;

[0086] S22. Read and analyze the ciphertext, judge whether the ciphertext contains a preset binary code according to the identification feature code, and if so, obtain according to the length of the binary code and the offset of the binary code said binary code;

[0087] Specifically, the first 6 bytes of the ciphertext are defined as: the identification feature code (1 byte) and the relevant information of the binary code (5 bytes), and the relevant information of the binary code is the length of the decoding program (1 byte) section), ...

Embodiment 3

[0098] Corresponding to the data encryption method disclosed in Embodiment 1 of the present invention, Embodiment 3 of the present invention also provides a data encryption device, see image 3 , the device consists of:

[0099] The first encryption module 10 is used to obtain original data, encrypt said original data, and generate encrypted data and a key;

[0100] The conversion module 11 is configured to obtain a decryption program corresponding to the key, convert the decryption program into a binary code, and calculate relevant information of the binary code, wherein the relevant information of the binary code includes a binary code length, Identify the signature and the offset of the binary code;

[0101] The second encryption module 12 is configured to splice the relevant information of the binary code and the binary code into the encrypted data according to a preset format to obtain ciphertext. .

[0102] Correspondingly, the first encryption module 10 includes:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and apparatus. The data encryption method comprises the following steps: obtaining original data, and encrypting the original data to generate encrypted data; obtaining a decryption program, converting the decryption program into a binary code, and calculating related information of the binary code; and splicing the related information of the binary code and the binary code in the encrypted according to a preset format to obtain a ciphertext. As the binary code is added to the encrypted data, even if hackers invade to obtain the encrypted data, but the hackers know nothing about the decryption information of the binary code, and cannot break the real original data, thereby protecting the security of the data. Meanwhile, the invention further discloses a data decryption method and apparatus.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to a binary code-based data encryption and decryption method and device. Background technique [0002] At present, in order to ensure the security of files during network transmission, files are usually encrypted, for example, using agreed characters or data with biometric information such as fingerprints as passwords. However, these data information can only exist as fixed data. The data is all the data of the information or just ordinary encrypted data. There is no better management method except for the security area to prevent external access. [0003] With the rapid development of the Internet, computer hacking activities are becoming more and more rampant, and hacking techniques are also being updated day by day. Therefore, traditional encryption technology can no longer prevent hackers from invading and cannot guarantee data security. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0442H04L63/0478
Inventor 刘晓润杨聪许信雄封磊
Owner GUANGDONG HONGQIN COMM TECH CO LTD