Unlock instant, AI-driven research and patent intelligence for your innovation.

A terminal information protection method and device based on encryption password

A terminal information and encryption password technology, which is applied in the field of information management security, can solve the problems of insufficient encryption, large calculation amount of each node, cracking, etc., and achieve the effect of reducing burden, reducing steps and processing time, and improving security

Active Publication Date: 2021-03-23
HENGBAO
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it relies on network policies and the performance of each node, which requires a lot of processing and network bandwidth
[0005] In addition, for the hierarchical trust management in the prior art, it considers two aspects of trust value, social trust and service quality trust value, the acquisition of trust value is based on the trust of the node position, but the calculation amount of each node Too large and unrealistic for the implementation of the Internet of Things
[0006] In the field of wireless ad hoc networks and wireless sensor networks, due to the openness of wireless communication signals, it is very easy for a third party to intercept and analyze the communication data through the transmission of plaintext communication data through wireless signals, resulting in the leakage of key data in the wireless network. In severe cases, illegal intruders will pretend to invade the wireless network, resulting in abnormal wireless network communication, in order to achieve the illegal purpose of malicious intruders
[0007] Although there are currently a small number of products that encrypt the upgrade program and communication data to ensure the security of the equipment, in wireless ad-hoc networks, wireless sensor networks and embedded systems, if international standards such as DES and AES are used Symmetric encryption algorithm for data encryption, but limited by the code space of the embedded CPU processor and the computing speed of the processor, the encryption and decryption efficiency is very low; if a simple single encryption technology is used, it is easy to be cracked by a malicious third party , thus failing to achieve the purpose of encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A terminal information protection method and device based on encryption password
  • A terminal information protection method and device based on encryption password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The invention provides a method for protecting terminal information based on an encryption code to ensure the security of user terminal access and internal data security.

[0034] The above method is divided into three parts:

[0035] 1. Hierarchical design of content data

[0036] According to the attributes of the internal data itself, related parameters or preset settings, the above-mentioned internal data is classified, and each type of internal da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a terminal information protection method based on an encrypted password to ensure the access security and the internal data security of a user terminal. The terminal information protection method comprises layered design of content data, main security code generation and layered security code generation. The invention further relates to a terminal information protection device based on the encrypted password, which comprises a layered unit and a main security code unit, wherein the main security code unit includes a data group preprocessing module, a data XOR encryption processing module, an interpolation data processing module, a data equivalency preprocessing module, a data interpolation encryption processing module and a data repeated encryption processing module.

Description

technical field [0001] The invention belongs to the field of information management security, and in particular relates to an encryption password-based terminal information protection method and device. Background technique [0002] When users conduct financial transactions, most of the security protection devices such as U-Shield operate and manage independently, but with the improvement of smart terminal technology and the diversification of operation methods, it poses challenges to the security of data in smart terminals. [0003] The society puts forward higher requirements for the confidentiality, integrity and availability of terminal information security. In this situation, how to ensure that each access terminal, especially a user terminal, is securely connected to a server or other terminal on the network, and at the same time ensures that user privacy data will not be leaked. At the same time, adapting to the more complex access environment of future smart payment...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428H04L63/20
Inventor 崔可
Owner HENGBAO