Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information encryption method and system based on Internet

An information encryption and Internet technology, applied in the field of mobile Internet-based user management methods and devices, can solve problems such as inability to meet security requirements and security requirements, and achieve the effects of improving time security, improving security, and stabilizing decryption.

Active Publication Date: 2021-01-05
深圳小步奔跑科技集团有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the continuous advancement of technology, the security of traditional encryption methods such as symmetric encryption or asymmetric encryption has gradually failed to meet the increasingly high security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption method and system based on Internet
  • Information encryption method and system based on Internet
  • Information encryption method and system based on Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0067] see figure 1 , an Internet-based information encryption system 10 provided by an embodiment of the present application, the Internet-based information encryption system 10 may include: a terminal management system 11 and a service base station 12 connected to the terminal management system 11 . Among them, the terminal management system 11 can be deployed in a server in the central control room, and the serving base station 12 is a base station of a conventional communication network, such as a base station of a 3G network, a 4G network or even a 5G network.

[0068] In this embodiment, the terminal management system 11 is used to monitor the processes running on the serving base station 12, and the serving base station 12 cooperates with the terminal management syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information encryption method and system based on the Internet. Firstly, the process information of each kernel process is obtained through kernel callback, and compared witha conventional direct monitoring mode, the process information of each kernel process has relatively strong concealment, so that the monitoring security can be improved to a certain extent. And secondly, the service base station randomly determines a part of data units needing to be encrypted by using a random tuple encryption strategy, so that each encryption can be random, and an encryption rule cannot be cracked by externally connecting encrypted data, thereby greatly improving the security of the service base station in transmitting process information to the terminal management system. And finally, the terminal management system decrypts the randomly encrypted data by using the random tuple decryption strategy, so that stable decryption is realized on the basis of high security.

Description

technical field [0001] The present application relates to the field of big data technology, and in particular, to a mobile Internet-based user management method and device. Background technique [0002] In the current communication technology field, the management system deployed in the central control room or on the upper computer often needs to monitor each service base station through a network such as the Internet to analyze whether the equipment connected to each service base station is safe and reliable. In order to ensure the security of monitoring, the communication between the management system and each service base station needs to be encrypted to prevent the monitoring from being discovered by hackers. [0003] However, with the continuous advancement of technology, the security of traditional encryption methods such as symmetric encryption or asymmetric encryption has gradually failed to meet the increasingly high security requirements. Contents of the inventio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/205H04L63/0428
Inventor 李春梅张良虎
Owner 深圳小步奔跑科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products