Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Model encryption and decryption method and device based on asymmetric interval insertion of encryption characters

An asymmetric and character-based technology, applied in encryption devices with shift registers/memory, secure communication devices, computer security devices, etc., can solve problems such as easy cracking of model encryption

Pending Publication Date: 2022-01-18
合肥钛灵信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present disclosure provide a model encryption and decryption method and device based on asymmetric interval insertion of encrypted characters, so as to at least solve the technical problem that model encryption is easily cracked in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Model encryption and decryption method and device based on asymmetric interval insertion of encryption characters
  • Model encryption and decryption method and device based on asymmetric interval insertion of encryption characters
  • Model encryption and decryption method and device based on asymmetric interval insertion of encryption characters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] According to the present embodiment, there is provided a method of inserting interval based on asymmetric encryption model character decryption embodiment, it is noted that the steps illustrated in the flowchart drawings can be executable instructions, such as a set of computer a computer system execute, and although in the flowchart shown in a logical order, but in some cases, may be different from the steps in the order shown or described herein.

[0066] Embodiment of the method provided in this embodiment may be performed in the embodiment the mobile terminal, computer terminal, a server or similar computing device. figure 1 Shows a block diagram of a hardware configuration for implementing a method of computing device model encrypted decryption methods based on asymmetric character insertion interval. like figure 1 , The computing device may include one or more processors (processors may include, without limitation, a microprocessor or a programmable logic device FPGA ...

Embodiment 2

[0107] Figure 5 A model encryption device 500 based on an asymmetric interval inserted into the encrypted character according to the first aspect of the present embodiment is shown, and the apparatus 500 corresponds to the method according to the first aspect of the first embodiment. refer to Figure 5 As shown, the device 500 includes:

[0108] SHA encryption module 510, a string for splicing the application identifier and private key, and encrypts the spliced ​​string after the SHA algorithm to obtain SHA encryption characters;

[0109] The array generating module 520 is configured to read the model file to be encrypted. According to the number of bytes to be encrypted, randomly generate a set of asymmetric interval number, insert the SHA encryption character inserting the SHA encrypted character into the desired. The initial part of the encryption model file;

[0110] The RSA encryption module 530 is configured to twice the initial portion and encrypt the initial portion of the...

Embodiment 3

[0121] Figure 7 A model encryption apparatus 700 based on an asymmetric interval is inserted into the encrypted character according to the first aspect of the present embodiment is shown, and the apparatus 700 corresponds to the method described in accordance with the first aspect of the first embodiment. refer to Figure 7 As shown, the device 700 includes:

[0122] First processor 710;

[0123] The first memory 720 is connected to the first processor for providing an instruction for processing the following processing step for the first processor:

[0124] Stitching the application identifies the string of the private key, and encrypts the spliced ​​string after the SHA algorithm to get the SHA encryption character;

[0125] Read the model file to be encrypted, based on the number of bytes to be encrypted, randomly generate a set of asymmetric interval, insert the SHA encryption character into the initial portion of the model file to be encrypted according to the value of the ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a model encryption and decryption method and device based on asymmetric interval insertion of encryption characters. The encryption method comprises the following steps: splicing a character string of an application program identifier and a private key, and encrypting the spliced character string through an SHA algorithm to obtain an SHA encrypted character; reading a to-be-encrypted model file, randomly generating a group of asymmetric interval arrays according to the byte number of the to-be-encrypted model, and inserting the SHA encrypted characters into the initial part of the to-be-encrypted model file according to the numerical value of the arrays; carrying out secondary splicing on the initial part, and encrypting the initial part after the secondary splicing through an RSA algorithm; and putting the initial part subjected to RSA encryption into the head position of the to-be-encrypted model file, and storing the encrypted model file. According to the method, the array of the interval data is randomly set, and the dimension is more than one dimension, so that the positions where the encrypted characters are inserted are difficult to be completely cracked, and the security of model encryption is ensured.

Description

Technical field [0001] The present application relates to encryption technology model, and more particularly relates to a method and apparatus for encryption and decryption model based on asymmetric encryption spacer inserted character. Background technique [0002] Depth study, the model is based on existing data set refers to the output, and by running a learning algorithm obtained. Model is what we end up with, and it is the basis of the reasoning for the prediction of late, is a set of inference rules. Model reflects the final form of the algorithm, the code works, by adding a model of reasoning, we can get the results corresponding to the respective algorithm. The algorithm is the condensation of developers and companies such as unit labor and related benefits. Model data is not processed is exposed in front of the user, the user can freely use the inference model, and the model algorithm to obtain the calculation result. In order to ensure the confidentiality and integrity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/06H04L9/30
CPCG06F21/602G06F21/6218H04L9/0618H04L9/0643H04L9/302
Inventor 夏东明金晨曦汪明贵
Owner 合肥钛灵信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products