Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and device, equipment and medium

An encryption method and technology to be encrypted, applied in the computer field, can solve problems affecting data accuracy, easy to be cracked, security risks, etc., to achieve the effect of avoiding data operation errors, ensuring data accuracy, and reducing transformation costs

Active Publication Date: 2019-04-12
CHINA MOBILE GRP FUJIAN CO LTD +1
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Ordinary data encryption causes the byte length of the generated ciphertext to be larger than the byte length of the original plaintext, which leads to the risk of modification of the existing data system and brings additional costs
[0006] (2) Ordinary encryption methods have low security. Once the password is leaked, the encrypted information can be obtained
[0007] (3) The information encrypted by the method of data hiding still contains more real information, which is easy to be cracked and has certain security risks
In addition, this method easily leads to the same ciphertext for different data. When operating on the two identical ciphertexts, it is impossible to distinguish the two identical ciphertexts, resulting in operational errors and affecting data accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, equipment and medium
  • Encryption method and device, equipment and medium
  • Encryption method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0028] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method and device, equipment and a medium. The encryption method is carried out on each character in a to-be-encrypted plaintext. The encryption method comprisesthe steps of generating an encryption key corresponding to a to-be-encrypted character according to a random seed value of the to-be-encrypted character and an initial key of the to-be-encrypted plaintext; generating a random array according to the random seed value and the encryption key; and replacing the to-be-encrypted character by a character in the random array according to an index number of the character in the random array. According to the embodiments of the invention, byte lengths of a ciphertext and the plaintext are consistent, constraint of a data format is not broken, and when different plaintexts are encrypted, the generated ciphertexts are different, so a data operation error resulting from the same ciphertexts is avoided, and data accuracy is ensured.

Description

technical field [0001] The invention belongs to the field of computers, and in particular relates to an encryption method, device, equipment and medium. Background technique [0002] With the development of mobile communication technology and the growing coverage requirements of special scenarios, more and more emergency sites are put into use. The monitoring and control messages of emergency sites are sensitive, and information security needs to be ensured. Therefore, it is necessary to design a message encryption method. [0003] At present, the encryption method of the message to be sent by the emergency site adopts the normal data encryption method or the data masking method encryption method. Among them, common data encryption is to encrypt XDR sensitive information such as MSISDN by using a general symmetric encryption algorithm, and generate meaningless ciphertexts in the form of ZgPZrDBM / ue87cvdF1rbHg==. Data masking (Data Masking) encryption is the cloning and mask...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0816H04L9/0869
Inventor 王希陈向荣陈文斌
Owner CHINA MOBILE GRP FUJIAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products