Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method of saving operation resources of computer

A data encryption and computer technology, applied to electrical components, transmission systems, etc., can solve problems such as occupying large computing resources and affecting computer performance, and achieve the effect of reducing workload and ensuring normal performance

Inactive Publication Date: 2019-03-29
XIAOGAN TIANCHUANG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the deficiencies in the above-mentioned prior art, the present invention provides a data encryption method that saves computing resources of the computer, which can solve the problem that in the prior art, the overall encryption processing of the original data by the sending end will occupy a large amount of computing resources and affect Technical issues with computer performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method of saving operation resources of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the accompanying drawings in the embodiments of the application. Apparently, the described embodiments are only part of the embodiments of the application, not all of them. Based on the implementation manners in this application, all other implementation manners obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0019] The embodiment of the present invention provides a data encryption method, which is applied to the sending end. see figure 1 , figure 1 A flow chart of a data encryption method according to an embodiment of the present invention, including the following steps:

[0020] In step 101, the sender determines key data in the original data.

[0021] In this step, the sender can determine key data in the original data so as to encrypt the key dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer encryption technology, and provides a data encryption method of saving operation resources of a computer. The method is applied to a sending end, and includes: determining key data in original data; encrypting the key data to generate encrypted data, wherein the encrypted data carry an encryption identifier; replacing the key data in the original databy the encrypted data; determining the original data after replacing as to-be-sent data; sending the to-be-sent data to a receiving end to enable the receiving end to obtain the original data after carrying out decryption on the to-be-sent data on the basis of the encryption identifier. The method can save the operation resources of the computer.

Description

technical field [0001] The invention relates to the technical field of computer data encryption, in particular to a data encryption method that saves computing resources of a computer. Background technique [0002] At present, in order to avoid leakage of key data during data transmission, it is necessary to perform overall encryption processing on the original data containing the key data before sending the key data during the communication process. Specifically, first, the sending end performs overall encryption processing on the original data, wherein the original data contains key data, generates encrypted data to be sent, and then sends the encrypted data to the receiving end, so that the receiving end The original data is obtained after decrypting the encrypted data to be sent. However, in a scenario where the amount of original data is large, the overall encryption processing of the original data by the sending end will occupy a large amount of computing resources an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 许鸣
Owner XIAOGAN TIANCHUANG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products