Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of masquerading and de-masquerading characters based on non-repeating keys

A key pair and character technology, applied in the field of information security, can solve the problems of inability to distinguish whether the data is disguised data, the data is confusing, and there is no clear text character disguise.

Active Publication Date: 2021-02-23
SICHUAN QIAODUOTIANGONG PRECISION EQUIP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data encryption technology is an information security technology that is widely used and effective, and data camouflage is essentially a data encryption technology. The difference is that the camouflage of plaintext characters is to encrypt plaintext in a certain way. Or after the transformation, it is still displayed in front of the user in a readable form, which makes it impossible for ordinary users to distinguish whether the data is fake data, making the data more confusing
[0003] In the prior art, the traditional encryption method is easy to be deciphered due to its regularity. Another example is the traditional RSA and DES data encryption algorithm. Due to its complexity or security issues, a simple, efficient and difficult to decipher Camouflage algorithm; In addition, there is no technical scheme for camouflaging plaintext characters in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of masquerading and de-masquerading characters based on non-repeating keys
  • A method of masquerading and de-masquerading characters based on non-repeating keys
  • A method of masquerading and de-masquerading characters based on non-repeating keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further elaborated below in conjunction with the accompanying drawings and embodiments.

[0054] Because the characters contained in "Thousand Characters" are different, in this embodiment, the characters contained in "Thousand Characters" are selected as the key characters.

[0055] Such as figure 1 As shown, a method for disguising characters based on non-repeating keys comprises the following steps:

[0056] S100: Load plaintext: input the plaintext that needs to be camouflaged;

[0057] S200: building a key dictionary, comprising the following steps:

[0058] S201: The key character is formed into a key character matrix of 16*16 with 16 characters as a row and 16 characters as a column: as figure 2 As shown, the characters contained in "Thousand Characters" are selected as the key characters. Since the number of characters in "Thousand Characters" is 1000, it is divided into blocks according to each 16*16 key character matrix, and 24 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for disguising and uncamouflaging characters based on non-repetitive keys, which is characterized in that it comprises the following steps: S100: loading plaintext; S200: constructing a key dictionary; S300: determining the key block number ; S400: generate the UNICODE encoding of plaintext characters; S500: convert the UNICODE encoding into 4 bytes of Hex encoding 0xyYhH, wherein, when the Hex encoding is less than 4 bytes, fill the low byte with 0; S600: use the Hex encoding camouflages the plaintext characters and outputs the camouflage characters; S700: judge whether to complete the camouflage of all plaintext characters, if yes, perform step S800, otherwise, perform step S300; S800: merge the camouflaged character sequence of the plaintext characters , to output the camouflage text; the camouflage text can be de-camouflaged and output plain text by the reverse method.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for disguising and uncamouflaging data, in particular to a method for disguising and uncamouflaging characters based on non-repetitive keys. Background technique [0002] With the rapid development of computer network, computer information and computer technology, more and more people attach great importance to the security and confidentiality of information. Data encryption technology is an information security technology that is widely used and effective, and data camouflage is essentially a data encryption technology. The difference is that the camouflage of plaintext characters is to encrypt the plaintext in a certain way. Or after transformation, it is still displayed in front of the user in a readable form, so that ordinary users cannot distinguish whether the data is fake data, making the data more confusing. [0003] In the prior art, the traditional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 梁效宁聂学良
Owner SICHUAN QIAODUOTIANGONG PRECISION EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products