Supercharge Your Innovation With Domain-Expert AI Agents!

A computer data encryption system and method

A data encryption, computer technology

Active Publication Date: 2021-03-19
南京恒永信息科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that for computer data encryption, there are still many practical problems that need to be solved urgently in its practical application (such as improving the security of data encryption under different user accounts) and there are still many specific solutions that have not been proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer data encryption system and method
  • A computer data encryption system and method
  • A computer data encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] like figure 1 As shown, the present invention also provides a computer data encryption system, which includes: a key factor generation module, an encryption algorithm generation module, a key generation module and a data encryption module.

[0037] A key factor generating module, configured to generate a corresponding first key factor and a second key factor, and a third key factor for generating a prime number according to a computer login account number and password;

[0038] Encryption algorithm generating module, for determining the elliptic curve Ep(X according to the first key factor, the second key factor and the third key factor n ,Y n ), where X n is the first key factor, Y n is the second key factor, p is the third key factor;

[0039] Key generation module, used to generate a private key Z n , take the elliptic curve Ep(X n ,Yn ) as the base point G, according to the private key Z n And base point G generates public key Q=Z n G;

[0040] Data encrypt...

Embodiment 2

[0057] Such as figure 1 As shown, the present invention also provides a computer data encryption system, which includes: a key factor generation module, an encryption algorithm generation module, a key generation module and a data encryption module.

[0058] A key factor generating module, configured to generate a corresponding first key factor and a second key factor, and a third key factor for generating a prime number according to a computer login account number and password;

[0059] Encryption algorithm generating module, for determining the elliptic curve Ep(X according to the first key factor, the second key factor and the third key factor n ,Y n ), where X n is the first key factor, Y n is the second key factor, p is the third key factor;

[0060] Key generation module, used to generate a private key Z n , take the elliptic curve Ep(X n ,Y n ) as the base point G, according to the private key Z n And base point G generates public key Q=Z n G;

[0061] Data en...

Embodiment 3

[0075] like figure 1 As shown, the present invention also provides a computer data encryption system, which includes: a key factor generation module, an encryption algorithm generation module, a key generation module and a data encryption module.

[0076] A key factor generating module, configured to generate a corresponding first key factor and a second key factor, and a third key factor for generating a prime number according to a computer login account number and password;

[0077] Encryption algorithm generating module, for determining the elliptic curve Ep(X according to the first key factor, the second key factor and the third key factor n ,Y n ), where X n is the first key factor, Y n is the second key factor, p is the third key factor;

[0078] Key generation module, used to generate a private key Z n , take the elliptic curve Ep(X n ,Y n ) as the base point G, according to the private key Z n And base point G generates public key Q=Z n G;

[0079] Data encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer data encryption system comprising a key factor generation module used for generating a corresponding first key factor, a second key factor and a third key factor according to a login account and a password of a computer; the encryption algorithm generation module is used for determining an elliptic curve Ep (Xn, Yn) according to the first secret key factor, the second secret key factor and the third secret key factor, the Xn is the first secret key factor, the Yn is the second secret key factor, and the p is the third secret key factor; the key generation module is used for generating a private key Zn, taking one point on the elliptic curve Ep (Xn, Yn) as a base point G, and generating a public key according to the private key and the base point; and the data encryption module is used for encrypting the data according to the elliptic curve, the base point and the public key. According to the invention, different data encryption public keys and data decryption private keys can be generated, and the security of data encryption under different user accounts can be effectively improved. Correspondingly, the invention further provides a computer data encryption method.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a computer data encryption system and method. Background technique [0002] ECC (Elliptic Cryptography Algorithm) is a public key encryption algorithm based on elliptic curve mathematics, and its essence is to use the discrete logarithm problem to realize encryption. Compared with the RSA encryption algorithm, ECC can provide faster performance and higher level of security while using a smaller key. When there are multiple user accounts on the computer, but only a pair of matching private key and public key, there is a risk of leakage of data under different user accounts. [0003] After a large number of searches, some typical existing technologies were found. For example, the patent application number 201610526874. safety. Another example is the patent application No. 200510036826.4 which discloses a computer encryption device and its encryption method. The encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06N7/08
CPCG06F21/602G06N7/08
Inventor 许亮
Owner 南京恒永信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More