Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method in a block chain technology

An encryption method and blockchain technology, applied in the field of encryption, can solve problems such as lack of security protection, and achieve the effects of preventing illegal decryption, improving security, and improving performance

Active Publication Date: 2021-08-24
广东辰宜信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, machine vision can directly peek at passwords, and machine learning can quickly compare the mapping relationship between plaintext and ciphertext. Therefore, in the face of artificial intelligence and machine learning technology, the use of traditional encryption and decryption technology basically cannot provide security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] The encryption method in a kind of blockchain technology of the present invention is like this: comprise the following steps:

[0031] In the first step, the original information is re-encoded by the combination of encoding elements to form an information source.

[0032] The second step is to generate a cumulatively increased / decreased numerical ID for the information source as a unique ID, and append the unique ID to the beginning of the information source.

[0033] In the third step, the code value of each bit element of the information source is encrypted by any combination of modulus, addition, subtraction, multiplication, division, XOR, OR, AND, and NOT operations. Specifically: use the key to form a characteristic string of more than 512 characters, calculate the code value and length of each character, and perform any combination of modulo, addition, subtraction, multiplication, division, XOR, OR, AND, and NOT operations After the operation, a long integer stri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption and decryption method in the blockchain technology. The encryption method is to first re-encode the original information by means of a combination of encoding elements to form an information source; and then obtain the code value of each element of the information source. Encrypt the information source after any combination of modulo, addition, subtraction, multiplication, division, XOR, OR, AND, NOT operation; set the first receiving ID at the receiving end to receive the ciphertext of the added unique ID; Finally, the length of the encrypted ciphertext received by the first receiving ID is counted, and then the encrypted ciphertext is re-encoded by means of a combination of coding elements to realize the encryption of the original information. The decryption method is to first judge the legitimacy of the ciphertext; decode the ciphertext judged to be legal to generate the information source of the ciphertext; decrypt the information source of the ciphertext, and generate the information source containing redundant information and a unique ID ; Finally, judge the legitimacy of information sources with redundant information. The present invention can effectively prevent illegal decryption to improve security.

Description

technical field [0001] The present invention relates to the field of encryption technology, and more specifically, to an encryption and decryption method in blockchain technology. Background technique [0002] At present, the capital flow of mobile payment mainly occurs on the Internet platform, and the level of risk management and control of related activities depends entirely on the Internet platform. Therefore, there is a blind spot in the supervision of capital flow in this method, which can easily lead to large-scale systemic financial risks. These are all industry-wide systemic risks brought about by systemic problems in network communication. Because data and identities can be intercepted, imitated, and read during the transfer process, network information systems transmit data through wired or wireless means, which provides the possibility of illegally obtaining data and illegally simulating user behavior through the Internet. [0003] In the existing technology, ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q20/38G06Q40/04
Inventor 易朝刚
Owner 广东辰宜信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More