Data security protection method based on granulation
A data security and granular technology, applied in the field of information security, can solve the problem of high probability of stealing and restoring some valid information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0083] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0084] The embodiment of the present invention provides a particle-based data security protection method, such as figure 1 shown, including:
[0085] Step S1: Obtain a set of plaintext data ;
[0086] Step S2: For the plaintext data Perform preprocessing to obtain plaintext packet data ;
[0087] Step S3: grouping the plaintext data Perform the first pseudo-random permutation to obtain permutation data ;
[0088] Step S4: For the replacement data Perform block encryption to obtain block encrypted data ;
[0089] Step S5: Encrypt data to the group Perform the second pseudo-random permutation to obtain ciphertext data .
[0090] The working princ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com