Separated multi-terminal scientific and technological achievement data encryption method and system
A technology of scientific and technological achievements and data encryption, applied in transmission systems, electrical components, etc., can solve the problems of personal data cannot be guaranteed, theft, etc., to achieve the effect of solving theft of personal data and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 Shown, the present invention provides technical scheme:
[0042] The present invention provides a data encryption method based on partitioned multi-terminal scientific and technological achievements, including the following method steps:
[0043] S1. Multiple device terminals are connected to the storage terminal, and the device terminal includes computers, mobile phones or equipment carriers for research and development of scientific and technological achievements data;
[0044] S2. The storage terminal shares the data uploaded by multiple equipment terminals. First, the scientific and technological achievements data of the equipment terminal are uploaded to the storage terminal, and then shared through the storage terminal. The operations include modification, deletion, and group discussion on some issues. For details, please refer to figure 2 As shown, the data sharing adopts the editable sharing algorithm, and the algorithm steps are as follows:
[...
Embodiment 2
[0064] see Figure 4 As shown in , the registration and login adopts the attached label algorithm, and the algorithm steps are as follows:
[0065] S2.2.1. Registered users on the device side;
[0066] S2.2.2. Generate a label on the device side, and attach the label to the registered user, and the label on the device side adopts a screening random generation algorithm, and the algorithm formula is as follows:
[0067] ;
[0068] in, for randomly generating tags; for filter tags; It is a tag list. When used, there are existing device-side tags in the tag list. Here, the tags can be letters or numbers. It is preferable to use a combination of the two, and filter tags means to filter out unused tags of existing device-side tags. and It is randomly generated in the use tag, and the generated tag is attached to the registered user, so that the registered user can define the user ID by himself, which can be the same as other users, thereby solving the problem that the s...
Embodiment 3
[0070] see Figure 5 As shown, the data generated on the device side is marked by the label on the device side, so that there is no need to define the label by yourself. The data uploaded by the personal device side has its own label, and the label is used to mark it, which greatly improves the cutting of the work. At the same time, the separation is encrypted through the label Parts of the data are encrypted separately, thereby improving the security of the encryption.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


