Data encryption method

A data encryption and data technology, applied in encryption devices with shift registers/memory, digital transmission systems, usage of multiple keys/algorithms, etc., can solve problems such as single algorithm, easy to be cracked, etc., to enhance security , the effect of ensuring safety and increasing safety

Inactive Publication Date: 2018-08-21
陈柱
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to increase the confidentiality of communication, the usual practice is to introduce a complex algorithm based on mathematical operations, encrypt the data at the data sending end, convert the plaintext into ciphertext and then transmit it. Generally, the algorithms used are relatively single, single algorithm The biggest disadvantage is that it is easy to be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method
  • Data encryption method
  • Data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Such as figure 1 As shown, a data encryption method according to an embodiment of the present invention is provided, which includes the following steps:

[0045] S101 collects first data, where the first data is fingerprint data, ID card data, digital password and / or MF card data.

[0046] S102: Convert the first data into hexadecimal coded second data;

[0047] Further, converting the first data into hexadecimal-encoded second data means: when the first data is fingerprint data, the 498-bit hexadecimal encoding rule is adopted to convert the fingerprint data into hexadecimal. Encoded second data, each fingerprint data in the second data corresponds to two 249-bit hexadecimal coded data packets in the second data, and the two data packets have different numbers.

[0048] Further, converting the first data into hexadecimal-encoded second data refers to: when the first data is data other than fingerprint data, the 12-digit hexadecimal encoding rule is used to separate the fingerp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method. The data encryption method comprises the following steps that first data is acquired, wherein the first data is fingerprint data, identity card data, adigital cipher and / or MF card data; the first data is converted into hexadecimal coded second data; and the second data is subjected to a hardware encryption mechanism and a software encryption mechanism to acquire encrypted data. According to the data encryption method, by means of the process that the first data is acquired and converted into the hexadecimal coded second data, and then the second data is encrypted to acquire the encrypted data, the security of the data can be guaranteed.

Description

Technical field [0001] The present invention relates to the field of data encryption technology, in particular to a data encryption method. Background technique [0002] One of the most important characteristics of contemporary communications is the large bandwidth, and with the advancement of technology, the bandwidth is getting larger and larger, which is now higher than 10Gbit / s. In recent years, due to the increasing number of information security issues, the confidentiality and security of communications have also become an important issue. In order to increase the confidentiality of communication, the usual method is to introduce a complex algorithm based on mathematical operations, encrypt the data at the data sending end, and convert the plaintext into ciphertext for transmission. Generally, the algorithms used are relatively single, single algorithm One of the biggest disadvantages is that it is easy to crack. Summary of the invention [0003] Aiming at the shortcomings...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/14H04L9/08H04L9/06
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/0852H04L9/14H04L9/3066H04L9/3231H04L63/045
Inventor 陈柱
Owner 陈柱
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products