Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big data security encryption method, device, storage medium and mobile terminal

A security encryption, mobile terminal technology, applied in the field of communication, can solve the problems of breaking passwords, easy to be decrypted, etc., to prevent cracking and improve data security.

Active Publication Date: 2022-02-08
HUIZHOU UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing data encryption methods, although the encryption algorithm provides a certain degree of security, it is possible to break the password
Once the data is leaked, it is easy to be decrypted, therefore, there are defects in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security encryption method, device, storage medium and mobile terminal
  • Big data security encryption method, device, storage medium and mobile terminal
  • Big data security encryption method, device, storage medium and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, are only for explaining the present application, and should not be construed as limiting the present application.

[0038] In the description of the present application, it should be understood that the terms "center", "longitudinal", "transverse", "length", "width", "thickness", "upper", "lower", "front", " Orientation indicated by rear, left, right, vertical, horizontal, top, bottom, inside, outside, clockwise, counterclockwise, etc. The positional relationship is based on the orientation or positional relationship shown in the drawings, which is only for the convenience of describing the application and simplifying the description, and doe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a big data security encryption method, device, storage medium and mobile terminal. The method includes the following steps: acquiring the first face image of the user under the first expression, and the second facial image under the second expression. face image; encrypt the original data according to the first face image to obtain first encrypted data; encrypt the interference data according to the second face image to obtain second encrypted data; obtain the second encrypted data according to the first face image and mixing the first encrypted data and the second encrypted data for the second human face image to obtain final data. The invention has the beneficial effect of improving data security.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a big data security encryption method, device, storage medium and mobile terminal. Background technique [0002] With the continuous development of information technology, data security has been paid more and more attention. Data theft can easily lead to huge losses, and even lead to company bankruptcy and endanger national security. Often, communication systems can help protect user data privacy by encrypting data signals. For example, a data signal can be encrypted before being transmitted and can be decrypted by a receiver device. As another example, Internet data (such as streaming video or voice) can be encrypted to prevent unauthorized users from accessing the data. Additionally, in communication systems, voice signals may be encrypted to provide privacy to users. [0003] In the existing data encryption methods, although the encryption algorithm pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 蔡昭权蔡映雪胡辉胡松陈伽黄思博黄翰梁椅辉罗伟
Owner HUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products