Data encryption and data decryption method, system, computer equipment and storage medium

A data encryption and data decryption technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problem of low data transmission security, and achieve the effect of improving security, increasing cost consumption, and high security

Active Publication Date: 2022-07-12
ZHUHAI JIELI TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a data encryption method, data decryption method, system, computer equipment and storage medium with higher data transmission security for the problem of low data transmission security of traditional data encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and data decryption method, system, computer equipment and storage medium
  • Data encryption and data decryption method, system, computer equipment and storage medium
  • Data encryption and data decryption method, system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0033] The data encryption and data decryption methods provided in this application are mainly applicable to the data encryption and decryption scenarios of the communication between the embedded system and the mobile terminal. figure 1 in the application environment shown. The mobile terminal 102 communicates with the embedded system development terminal 104 and the embedded system electronic device terminal 106 through the network. The embedded system development end converts the machine language obtained after compiling the system program to obtain an encrypted for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a data encryption and data decryption method, system, computer equipment and storage medium, which utilizes the uniqueness of machine language, uses machine language as an encryption and decryption algorithm, and updates the machine language by continuously modifying the system level to ensure data encryption. The confidentiality of the transmission process improves the security of data transmission. Even if the network hacker cracks the data, this solution can update the machine language, so that the network hacker cannot crack the transmitted data after that, resulting in the collapse of its system function. Further, when the network hacker When you want to obtain the data encryption and decryption algorithm again, the original system program must be modified, and each modification will use a read-only memory ROM, which increases its cost consumption.

Description

technical field [0001] The present application relates to the field of communication data encryption, in particular to data encryption and data decryption methods, systems, computer equipment and storage media. Background technique [0002] With the rapid popularization of computers and networks, more and more users will store data in the computer system. Once the data stored in the computer is not protected, there is a risk of data being stolen at any time. Once, how to ensure data security Security has become an important topic. [0003] Data encryption technology is the most basic security technology in the network. It mainly ensures the security of the information transmitted in the network by encrypting the data. This is an active security defense strategy, which can provide considerable information for the information at a small cost. Great security protection. The traditional data encryption method refers to converting plaintext into ciphertext through encryption an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428
Inventor 陈明秋毛伟文蔡岳龙
Owner ZHUHAI JIELI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products