Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of encoding encryption, decoding and decryption processing method

A technology of encoding and encoding characters, which is applied in the field of information security, can solve the problems that encryption algorithms cannot guarantee the security of information transmission, and achieve the effect of ensuring security

Active Publication Date: 2022-07-29
GUANGDONG UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application provides an encoding encryption, decoding and decryption processing method, which is used to solve the technical problem that the existing encryption algorithm cannot guarantee the security of information transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of encoding encryption, decoding and decryption processing method
  • A kind of encoding encryption, decoding and decryption processing method
  • A kind of encoding encryption, decoding and decryption processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0043] Please refer to figure 1 , which is a flowchart of an embodiment of an encoding and encryption processing method performed by the application at the encoding sending end, including the following steps:

[0044] In step S101, the data to be encrypted is acquired, and the data to be encrypted is digitized to obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encoding encryption, decoding and decryption processing method. The encoding and encryption method includes acquiring data to be encrypted, performing digital processing on the data to be encrypted to obtain a plurality of discrete initial characters; using the plurality of discrete initial characters as a coding neural network The input of the encoding neural network is used to encode the input multiple discrete initial characters to obtain multiple discrete encoded characters; wherein, the input layer of the encoding neural network includes multiple first perceptrons, and each discrete encoded character is Corresponding to a first perceptron, and the number of the first perceptron is adapted to the number of discrete initial characters; multiple discrete coded characters are used as encrypted data corresponding to the data to be encrypted; after calculating the encrypted data and decoding the encrypted data The obtained difference value between the decrypted data, when the obtained difference value is less than or equal to the preset threshold, the encryption process ends. Solve the technical problem that the existing encryption algorithm cannot guarantee the security of information transmission.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a method for encoding, encrypting, decoding and decrypting. Background technique [0002] At present, there are two encryption methods, symmetric encryption method and asymmetric encryption method. Symmetric encryption means that the key used for encryption and the key used for decryption are the same. Asymmetric encryption means that the key used for encryption and the key used for decryption are different. Among them, the secret key used for encryption is called the public key, and the secret key used for decryption is called the private key. However, the existing asymmetric encryption technologies are all based on the difficult solving of mathematical problems to ensure that the private key cannot be calculated through the public key. Or, if some mathematical problems are cracked by brute force method, the security of the existing encryption algo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08
CPCH04L63/0442H04L63/061G06N3/084G06N3/045
Inventor 杨文浩刘广聪
Owner GUANGDONG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More