Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, data decryption method, data encryption device, data decryption device and server

A data encryption and data technology, applied in the computer field, can solve the problems of consuming more computing power resources and occupying more computing power resources, and achieve the effect of improving user experience, reducing computing power overhead, and convenient and quick acquisition.

Pending Publication Date: 2022-04-19
CEC CYBERSPACE GREAT WALL
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the cryptographic method, disturbances are usually added to the original data (such as adding a part of noise data), but this part of the disturbance data also needs to go through the encryption and decryption process, which causes the system to consume more computing resources; in the joint method, due to confidentiality For reasons of security, the data cannot penetrate the system, and the sub-model can only be built and optimized locally, and then the parameters are passed to the central server, and then new tasks are distributed through the central server to perform model iteration and optimization. , the better the effect of the model, this also leads to more computing resources of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data decryption method, data encryption device, data decryption device and server
  • Data encryption method, data decryption method, data encryption device, data decryption device and server
  • Data encryption method, data decryption method, data encryption device, data decryption device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order for those skilled in the art to better understand the technical solution of the present invention, the data encryption method, decryption method, data encryption device, data decryption device, server and computer storage medium provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] figure 1 It is a flowchart of a data encryption method provided by an embodiment of the present invention.

[0065] refer to figure 1 , the data encryption method provided by the embodiment of the present invention includes:

[0066] Step S101. According to the base pairing algorithm, encrypt each original data in the original data sequence to obtain a first base sequence, the first base sequence includes the first base group corresponding to each original data, the first base sequence A base group includes one or more bases.

[0067] In the embodiments of the present invention, the bases are the bases included ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method, and relates to the technical field of communication, and the method comprises the steps: encrypting each piece of original data in an original data sequence according to a base pairing algorithm to obtain a first base sequence, the first base sequence comprising a first base group corresponding to each piece of original data, and the first base group comprising one or more bases; generating a corresponding relationship between a bit sequence of each first base group in the first base sequence and each first base group; according to a base pairing algorithm, bit sequences corresponding to all first base groups in the first base sequence are encrypted, a second base sequence is obtained, the second base sequence comprises second base groups corresponding to the bit sequences of all the first base groups, and each second base group comprises one or more bases. According to the data encryption method provided by the invention, the computing power overhead is greatly reduced. The invention further provides a data decryption method, a data encryption device, a data decryption device, a server and a computer storage medium.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a data encryption method, a decryption method, a data encryption device, a data decryption device, a server and a computer storage medium. Background technique [0002] With the rapid development of network technology and the continuous precipitation of massive data, privacy protection has become an increasingly important topic. Privacy protection means preventing third parties from obtaining unauthorized information. In a broad sense, information held by any subject, Information that you do not want to disclose can be used as the object of privacy protection. [0003] In related technologies, privacy protection can be implemented based on cryptography methods and joint learning methods. In the cryptographic method, disturbances are usually added to the original data (such as adding a part of noise data), but this part of the disturbance data also needs to go through t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06G06F21/60G06F21/62
CPCH04L9/0618H04L9/0643H04L63/0428G06F21/602G06F21/6245
Inventor 聂二保高磊朱江张兴杨芬凌杰史保华
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products