Encryption method, device, equipment and medium

An encryption method and technology to be encrypted, applied in the computer field, can solve problems affecting data accuracy, easy to be cracked, security risks, etc., to achieve the effect of avoiding data operation errors, ensuring data accuracy, and reducing transformation costs

Active Publication Date: 2021-12-03
CHINA MOBILE GRP FUJIAN CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Ordinary data encryption causes the byte length of the generated ciphertext to be larger than the byte length of the original plaintext, which leads to the risk of modification of the existing data system and brings additional costs
[0006] (2) Ordinary encryption methods have low security. Once the password is leaked, the encrypted information can be obtained
[0007] (3) The information encrypted by the method of data hiding still contains more real information, which is easy to be cracked and has certain security risks
In addition, this method easily leads to the same ciphertext for different data. When operating on the two identical ciphertexts, it is impossible to distinguish the two identical ciphertexts, resulting in operational errors and affecting data accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, device, equipment and medium
  • Encryption method, device, equipment and medium
  • Encryption method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The features and exemplary embodiments of the various aspects of the present invention will be described in detail below, in order to clarify the purposes of the present invention, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments. It will be appreciated that the specific embodiments described herein are only configured to explain the present invention and are not configured to limit the invention. The invention can be carried out without some details in these specific details in the art. The description of the embodiments is merely understood to provide a better understanding of the present invention by illustrating the examples of the present invention.

[0028] It should be noted that in this article, a relationship term such as the first and second, etc. is only used to distinguish an entity or operation with another entity or an operational zone, without having to require or imply these ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method, device, equipment and medium. The encryption method is executed for each character in the plaintext to be encrypted, and the encryption method includes: according to the random seed value of the character to be encrypted and the value of the plaintext to be encrypted Initial key, generate the encryption key corresponding to the character to be encrypted; generate a random array according to the random seed value and the encryption key; generate the character to be encrypted according to the index number of the character in the random array Replaced with the characters in the random array. According to the embodiment of the present invention, the byte lengths of the ciphertext and the plaintext can be made consistent without breaking the constraints of the data format, and when encrypting different plaintexts, the generated ciphertexts are also different, avoiding data loss due to the same ciphertext. Operation errors, thereby ensuring data accuracy.

Description

Technical field [0001] The present invention belongs to the field of computers, in particular, it relates to an encryption method, apparatus, devices and media. Background technique [0002] As mobile communication technology as well as special scene covering the growing demand, a growing number of emergency site and put into use, the emergency site monitoring and control messages more sensitive to the need to ensure information security, it is necessary to design a message encryption. [0003] Encryption method currently transmitting a message to the emergency site to be ordinary data encryption or encrypt data mask. Wherein normal data are encrypted using a symmetric encryption algorithm general XDR MSISDN other sensitive information is encrypted, to generate the form ZgPZrDBM / ue87cvdF1rbHg == meaningless ciphertext. Data mask (Data Masking) is encrypted sensitive data and the mask conversion cloning. Currently common is simply a message to be transmitted among several hidden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0816H04L9/0869
Inventor 王希陈向荣陈文斌
Owner CHINA MOBILE GRP FUJIAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products