Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data redundancy encryption method and device, redundancy encryption data identification method and device and storage medium

An encryption method and data redundancy technology, applied in the field of information security, can solve problems such as the difficulty for data owners to prove the source of stolen data, the difficulty of data forensics, and the inability to track the source of data to be encrypted, so as to facilitate proof and rights protection, prevent The effect of piracy

Inactive Publication Date: 2019-10-11
BEIJING LINKING MEDICAL TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, it is impossible to track the source of the data to be encrypted, which makes it difficult to obtain evidence after the data is stolen. Once the data is stolen, it is difficult for the data owner to prove the source of the stolen data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data redundancy encryption method and device, redundancy encryption data identification method and device and storage medium
  • Data redundancy encryption method and device, redundancy encryption data identification method and device and storage medium
  • Data redundancy encryption method and device, redundancy encryption data identification method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] refer to figure 1 , a data redundancy encryption method suitable for execution in a computing device, comprising the following steps:

[0059] Obtain the data to be encrypted 101;

[0060] In a preferred embodiment of the present invention, when the data to be encrypted contains non-digital data, the non-digital data can be converted into digital data by standard ASCII codes, and then encrypted; those skilled in the art should understand that the encrypted The data in a database can be a single piece of data, or several pieces of data or some or all of the data in the database.

[0061] Obtain the identification code 102;

[0062] Wherein the identification code is a combination of numbers or a random number with an identification function. Wherein, the random numbers in this embodiment are pseudo-random numbers or quasi-random numbers. Therefore, the random number of the present invention can be reproduced by combining the random seed and the method of generating t...

Embodiment 2

[0079] An embodiment of the present invention also provides a computing device, including:

[0080] one or more processors;

[0081] storage; and

[0082] One or more programs, wherein the one or more programs are stored in said memory and configured to be executed by one or more processors, the one or more programs include instructions for a data redundancy encryption method, the method comprising Follow the steps below:

[0083] (1) Obtain the data to be encrypted;

[0084] (2) Obtain the identification code;

[0085] (3) Encrypt the identification code to obtain the ciphertext;

[0086] (4) Add the ciphertext to the redundant data bits of the data to be encrypted to obtain the encrypted data.

[0087] Depending on the desired configuration, a processor may be any type of processing including, but not limited to, a microprocessor (μP), microcontroller (μC), digital information processor (DSP), or any combination thereof. A processor may include one or more levels of ca...

Embodiment 3

[0090] The present invention also provides a computer-readable storage medium storing one or more programs, wherein the one or more programs include instructions, and the instructions are adapted to be loaded by the memory and execute the data redundancy encryption method, the method includes the following step:

[0091] (1) Obtain the data to be encrypted;

[0092] (2) Obtain the identification code;

[0093] (3) Encrypt the identification code to obtain the ciphertext;

[0094] (4) Add the ciphertext to the redundant data bits of the data to be encrypted to obtain the encrypted data.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and relates to a data redundancy encryption method, a redundancy encryption data identification method and device, and a storage medium. The data encryption method comprises the following steps: acquiring to-be-encrypted data; obtaining an identification code; encrypting the identification code to obtain a ciphertext; and addingthe ciphertext into the redundant data bit of the to-be-encrypted data to obtain encrypted data. In addition, the invention also provides a method for identifying the data obtained by the encryptionmethod. Through the data encryption and identification method provided by the invention, piracy can be effectively prevented; meanwhile, evidence obtaining and right protection after the data is stolen are also facilitated; in addition, the data encryption bit is located on the invalid bit of the data, so that the data precision is not influenced.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a data redundancy encryption method, a data identification method, equipment and a storage medium. Background technique [0002] Data encryption is currently the most reliable way for computer systems to protect information. It uses cryptographic technology to encrypt information, realize information concealment, and thus play a role in protecting information security. [0003] In the prior art, it is impossible to track the source of the data to be encrypted, which makes it difficult to obtain evidence after the data is stolen. Once the data is stolen, it is difficult for the data owner to prove the source of the stolen data. Contents of the invention [0004] The object of the present invention is to provide a data redundancy encryption and identification method, device and storage medium in order to overcome the defects of the prior art. [0005] To achieve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/14
CPCG06F21/14G06F21/602
Inventor 李贵
Owner BEIJING LINKING MEDICAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products