Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer data encryption system and method

A data encryption, computer technology, applied in computer security devices, computing, digital data protection and other directions, can solve problems such as easy leakage of personal characteristic data

Pending Publication Date: 2021-03-09
QINGYUAN POLYTECHNIC
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, in order to solve the problem that personal characteristic data of WeChat applets are easily leaked, the present invention provides a computer data encryption system and method, and its specific technical solutions are as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer data encryption system and method
  • Computer data encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with its embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0046] It should be noted that when an element is referred to as being “fixed” to another element, it can be directly on the other element or there can also be an intervening element. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and similar expressions are used herein for purposes of illustration only and are not intended to represent the only embodiments.

[0047]Unless otherwise defined, all technical and scientific te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer data encryption method which comprises the following steps: establishing communication connection between a computer and an intelligent terminal, acquiring identity information of the intelligent terminal, and generating a corresponding public key and a public key encryption algorithm; performing feedback of the public key and a public key encryption algorithm tothe intelligent terminal by the computer; reading own identity information through the WeChat applet by the intelligent terminal, encrypting the data transmission request by using a public key and a public key encryption algorithm, and transmitting the encrypted data transmission request to the computer; and receiving and decrypting the data transmission request of the intelligent terminal by thecomputer, verifying the identity information of the intelligent terminal, transmitting data to the intelligent terminal if the verification succeeds, and performing feedback of verification failure information to the intelligent terminal if the verification does not succeed. According to the method, the personal private data information of the user can be better encrypted, and the leakage of the personal private data of the user is prevented. Correspondingly, the invention further provides a computer data encryption system.

Description

technical field [0001] The present invention relates to the technical field of computer data encryption, in particular to a computer data encryption system and method. Background technique [0002] With the development of science and technology, the functions of smart terminals are becoming more and more powerful, which greatly facilitates people's life. However, along with it comes the issue of information security. When the user sends private data information to the smart terminal through the computer, the user's private data information is often maliciously attacked by criminals. If the user's private data information is not encrypted and transmitted, it is very easy to cause the leakage of private data. [0003] WeChat applets are common applications on smart terminals. In daily life, users frequently access computer servers through WeChat applets in smart terminals, and request computer servers to send data information containing personal characteristics such as user-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/606G06F21/602G06F21/6209G06F21/6245G06F2221/2107
Inventor 丁知平郭锡泉林昆
Owner QINGYUAN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products