Tile map encryption and decryption method
An encryption and decryption, tile map technology, applied to encryption devices with shift registers/memory, key distribution, can solve the problem of unusable stolen information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The encryption methods used by the invention for mobile map tiles are mainly scrambling and bit XOR encryption. Encryption methods such as figure 1 As shown, the specific steps are as follows:
[0019] (1) Randomly scramble the storage order of the tiles, and assign the order value to the ID.
[0020] (2) Use the layer value (LV), row value (Row) and column value (Col) of the tile to perform operations and combinations. The formula (LV2×Row)^Col is carried out, and the obtained operation value is used as the input of the pseudo-random number generator to generate a random number, and the LV, Row, and Col are respectively encrypted by a bit XOR operation to generate LV', Row' and Col'.
[0021] (3) Create a table in the database and put the tiles into storage.
[0022] Through the above 3 steps, the encryption of the map tile package on the mobile terminal is completed. When using the tile service or offline package illegally, the order of the tiles in SQLite has be...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

