Multiple real-time data encryption method for information security assurance in smart community and system

A technology for security assurance and community information, applied in the field of information security, it can solve the problems that the security and reliability of core data cannot be guaranteed, and password transmission is not performed, so as to achieve the effect of improving confidentiality and ensuring security and reliability.

Inactive Publication Date: 2019-01-29
CHANGSHU INSTITUTE OF TECHNOLOGY +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a multiple real-time data encryption method and information security system for smart community information security, to solve the problem in the above background technology that the existi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple real-time data encryption method for information security assurance in smart community and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] This embodiment: as figure 1 As shown, a multiple real-time data encryption method for smart community information security assurance, including:

[0055] At both ends of the communication network, both communication parties agree on a consistent security key S101;

[0056] Encrypt the core data with a security key at the source point of the communication with DES S102: if the data mode is the encryption mode S103, encrypt the data with the security key and generate password data S104;

[0057] In the form of password, it is transmitted in the smart community intranet to the end point S105 of the communication network;

[0058] At the end of the communication, use the security key to perform DES decryption on the core data S106: if the data mode is the decryption mode S107, then use the security key to decrypt the data and restore the plaintext data S108.

[0059] Since the two ends of the communication network are used, the two parties agree on the same security key;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, in particular to a multiple real-time data encryption method for information security assurance in a smart community. The invention also provides a multiple real-time data encryption information security system for information security assurance in a smart community. A security key is used for carrying out DES encryption on coredata at a communication source point; if a data mode is an encryption mode, the data are encrypted by the security key and password data are generated. The problems that the security and the reliability of transmission of the core data in a smart community Intranet can not be assured when data in the smart community Intranet generally do not perform password transmission in the prior art can be solved, and the method and the system have the beneficial technical effects of high security, high reliability, high confidentiality and security password.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a multiple real-time data encryption method for information security in a smart community. The invention also provides a multiple real-time data encryption information security system for information security in a smart community. Background technique [0002] At present, information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying and security of the parasitic system of information. Information security itself covers a wide range, including how to prevent The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, and security mechanisms (digital signatures, message authentication, data encryption, etc.), until the security system, such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06H04L9/08
CPCH04L9/0625H04L9/0869H04L9/0891H04L63/0435H04L63/068
Inventor 张方舟阚志刚叶枭陈彪田也
Owner CHANGSHU INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products