Computer data encryption system and method

A data encryption, computer technology, applied in computer security devices, computing, digital data protection and other directions, can solve problems such as easy leakage of personal characteristic data

Pending Publication Date: 2021-03-09
QINGYUAN POLYTECHNIC
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, in order to solve the problem that personal characteristic data of WeChat applets are easily leaked, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer data encryption system and method
  • Computer data encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] In order to make the objectives, technical solutions and advantages of the present invention, the present invention will be described in further detail below in conjunction with the embodiments. It should be understood that the specific embodiments described herein are intended to explain the present invention and does not limit the scope of the invention.

[0046] It should be noted that when the element is referred to as "fixed to" another element, it can be directly in another element or may also exist. When a component is considered to be "connected" another element, it may be directly connected to another element or may always exist in the center element. The term "vertical", "horizontal", "left", "right", "left", "right", "left", "right", and similar expressions are not shown, as unique embodiments.

[0047]All techniques and scientific terms used herein are identical to those skilled in the art, unless otherwise defined. The terminology used in the specification of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer data encryption method which comprises the following steps: establishing communication connection between a computer and an intelligent terminal, acquiring identity information of the intelligent terminal, and generating a corresponding public key and a public key encryption algorithm; performing feedback of the public key and a public key encryption algorithm tothe intelligent terminal by the computer; reading own identity information through the WeChat applet by the intelligent terminal, encrypting the data transmission request by using a public key and a public key encryption algorithm, and transmitting the encrypted data transmission request to the computer; and receiving and decrypting the data transmission request of the intelligent terminal by thecomputer, verifying the identity information of the intelligent terminal, transmitting data to the intelligent terminal if the verification succeeds, and performing feedback of verification failure information to the intelligent terminal if the verification does not succeed. According to the method, the personal private data information of the user can be better encrypted, and the leakage of the personal private data of the user is prevented. Correspondingly, the invention further provides a computer data encryption system.

Description

technical field [0001] The present invention relates to the technical field of computer data encryption, in particular to a computer data encryption system and method. Background technique [0002] With the development of science and technology, the functions of smart terminals are becoming more and more powerful, which greatly facilitates people's life. However, along with it comes the issue of information security. When the user sends private data information to the smart terminal through the computer, the user's private data information is often maliciously attacked by criminals. If the user's private data information is not encrypted and transmitted, it is very easy to cause the leakage of private data. [0003] WeChat applets are common applications on smart terminals. In daily life, users frequently access computer servers through WeChat applets in smart terminals, and request computer servers to send data information containing personal characteristics such as user-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/606G06F21/602G06F21/6209G06F21/6245G06F2221/2107
Inventor 丁知平郭锡泉林昆
Owner QINGYUAN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products