Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of latitude and longitude coordinate encryption

A longitude, latitude and longitude technology, applied in satellite radio beacon positioning systems, measuring devices, instruments, etc., can solve the problems of inability to use MD5 one-way encryption algorithm, inability to restore latitude and longitude information, inability to apply encryption, etc., to achieve flexible encryption methods, The effect of convenient encryption requirements and data stability assurance

Active Publication Date: 2019-03-29
CENNAVI TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Use various two-way encryption algorithm libraries, such as RES, AES, RSA, DSA, etc., but the problem is that the speed is slow, and the MD5 one-way encryption algorithm cannot be used at the same time. The latitude and longitude information cannot be encrypted in this way, otherwise The decryption party cannot restore the real latitude and longitude information
But it cannot be applied to the encryption of latitude and longitude coordinates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of latitude and longitude coordinate encryption
  • Method of latitude and longitude coordinate encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] As above, the same encryption method can be used to encrypt the GPS data of the second point, that is, each GPS point is encrypted using the same algorithm.

[0030] That is: from the first point, the longitude data of GPS and the string p of latitude data after encryption are, p={the longitude data after the first point GPS encryption, the latitude data after the first point GPS encryption, the second point GPS Longitude data after encryption, latitude data after GPS encryption at the second point, longitude data after GPS encryption at the third point, latitude data after GPS encryption at the third point...}.

[0031] When decrypting, the decryption algorithm matching the encryption terminal is also used to perform decryption.

Embodiment 2

[0033] Different from Embodiment 1, the second point and the GPS longitude data and latitude data of each point after the second point are encrypted in the following manner:

[0034] The longitude data and latitude data of the GPS at the second point; the longitude data of the second point is obtained by subtracting the longitude data of the first point from the longitude data of the second point to obtain the encrypted longitude data of the second point, and the latitude data of the second point is subtracted from the latitude data of the first point to obtain Longitude data of the second point after encryption;

[0035] Encrypt the longitude data and latitude data of the third point GPS, subtract the longitude data of the second point from the longitude data of the third point to obtain the encrypted longitude data of the third point, and subtract the second point from the latitude data of the third point The longitude data of the third point after the point latitude data is...

Embodiment 3

[0090] The difference from Embodiment 2 is that the mapping table is established differently. Each integer a' within the range of longitude has one and only one corresponding key value a1, and a1 is at least two characters in A-Z and a-z.

[0091] Each integer b' in the latitude range has one and only one corresponding key value b1, and b1 is at least two characters from A-Z and a-z.

[0092] The key values ​​corresponding to the integer part of the longitude data and latitude data of the same GPS point are the same or different.

[0093] In summary, the latitude and longitude coordinate encryption method of this application adopts an end-to-end system, which solves the transmission encryption problem of GPS points; in terms of security, only two endpoints of the mapping table are owned, and will not be exposed to the network, eliminating the existence of potential safety hazards ;In terms of flexibility, since the mapping table is customized, it has higher flexibility. The ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of geographic coordinate information encryption, and particularly relates to a method of latitude and longitude coordinate encryption. The method includes the following steps: customizing a mapping table; by an encryption end, obtaining longitude data and latitude data of a GPS of a first point, carrying out mapping encryption, and carrying out mapping encryptionon an integer part of the longitude data in corresponding to the mapping table, carrying out quotient and remainder solving in sequence on a fractional part of the longitude data to the integer partof the longitude data, obtaining encrypted longitude data as [mapping character of integer part, quotient solving value, remainder solving value], and in the same way, obtaining encrypted latitude data as [mapping character of integer part, quotient solving value, remainder solving value], wherein encrypted first-point GPS data P are P={encrypted longitude data, encrypted latitude data}; and setting a decryption algorithm, which matches the encryption end, at a decryption side. The method of the application can meet precise transmission of massive data, and has high security performance.

Description

technical field [0001] The invention belongs to the field of geographic coordinate information encryption, and in particular relates to a method for encrypting latitude and longitude coordinates. Background technique [0002] With the rapid development of Internet technology, various GIS-based applications are blooming everywhere, bringing a lot of convenience to people's lives, such as real estate industry, insurance industry, logistics industry and other industries. There is competition in the development of any industry, so the problem arises: merchants or enterprises want to protect their data. The data here refers to latitude and longitude information. The GPS positioning system collects the latitude and longitude information of the vehicle's trajectory in real time. Manufacturers hope that their data will not be obtained by others. After all, the current network tools are becoming more and more powerful, or even if they are obtained by others, they cannot be decrypted....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G01S19/37
CPCG01S19/37H04L63/0428
Inventor 万栋新陈耀罗颖磊宋江波伏宜家
Owner CENNAVI TECH