Network security encryption method and system based on artificial intelligence

A technology of network security and artificial intelligence, applied in the field of network security, can solve problems such as information exposure and hidden dangers of network environment security, and achieve the effect of ensuring data security, ensuring security, and increasing security

Active Publication Date: 2022-01-21
西安道法数器信息科技有限公司 +1
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Commonly used encryption methods directly perform calculations and conversions on data. Although the encryption results are complex and the key types are diverse, once the encryption type is know

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security encryption method and system based on artificial intelligence
  • Network security encryption method and system based on artificial intelligence
  • Network security encryption method and system based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the following, in conjunction with the accompanying drawings and preferred embodiments, will describe a method and system for network security encryption based on artificial intelligence according to the present invention. Embodiments, structures, features and effects thereof are described in detail as follows. In the following description, different "one embodiment" or "another embodiment" do not necessarily refer to the same embodiment. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.

[0038] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention.

[0039] The specific scheme of an artificial intelligence-based network sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, in particular to a network security encryption method and system based on artificial intelligence. The method comprises steps of converting data to be encrypted to a binary image; obtaining a voting value sequence corresponding to each pixel point in the Hough space, determining a first importance degree of each pixel point by comparing the voting value sequence with a voting threshold value, and screening out base point data; obtaining the second importance degree of each angle according to the difference between the voting value information under each angle in the Hough space and the reference angle, screening out perspiration important angles, and obtaining space angle data according to the voting value mean square error in the Hough space corresponding to the important angles; the number of pixel points in each column in the binary image forming initial phase data, and the base point data, the space angle data and the initial phase data serving as encrypted data. According to the invention, the to-be-encrypted data is converted into the binary image, and the image is subjected to data splitting encryption, so that the security in the transmission process is ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an artificial intelligence-based network security encryption method and system. Background technique [0002] In the process of network information transmission, a large amount of data will be transmitted between multiple ports. Encryption algorithms are often used to process data during transmission. The commonly used encryption and decryption processes of data have been made public, criminals can perform targeted decryption of data, thus threatening the security of data transmission. [0003] Commonly used encryption methods directly perform calculations and conversions on data. Although the encryption results are complex and the key types are diverse, once the encryption type is known, the data can be intercepted and the reverse process of decryption can still be used to obtain data information, which makes the information exposed and the network environment appears....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04N1/32G06N20/00G06F21/60
CPCH04L63/0428H04N1/32272G06N20/00G06F21/602
Inventor 苏凯航王永昌付家豪王智慧韩艺
Owner 西安道法数器信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products