Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method and device and computing equipment

A data encryption and data technology, applied in the direction of digital video signal modification, image communication, electrical components, etc., can solve the problems of hidden dangers in data transmission, cracking, penetration, etc., and achieve the effect of convenient decryption process, improved security, and improved efficiency

Active Publication Date: 2022-04-29
UNIONTECH SOFTWARE TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The encryption effects of the above two network security transmission technologies are average, and there are still risks of being sniffed, intercepted, cracked, simulated, and infiltrated
In addition, these two network security transmission technologies only focus on the data itself, while ignoring the data transmission method. Most of the data transmission methods use plaintext transmission. While plaintext transmission causes great network security risks, it also makes the fixed binary The encoded form becomes less secure
[0005] To sum up, both of the above two existing network security transmission technologies have the problem of unsatisfactory encryption effect and potential safety hazards in the data transmission process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device and computing equipment
  • Data encryption method and device and computing equipment
  • Data encryption method and device and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0040] Aiming at the problem that the encryption effect is not ideal in all network security transmission technologies, the invention provides a data encryption method.

[0041] figure 1 A schematic diagram of an application scenario of a data encryption method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the communication connection between the first device and the second device is, fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and device and computing equipment. The data encryption method comprises the following steps: acquiring to-be-encrypted data; for each bit in the data, converting the initial form representation of the bit into binary representation, then carrying out cyclic shift for a plurality of times, and converting the shifted binary data into the initial form representation of the data to obtain shifted data; carrying out Fibonacci coding on the shift data to obtain Fibonacci coded data; encoding the carrier image to obtain image encoding data, and selecting a part of data from the image encoding data as a secret key; encrypting the Fibonacci coded data by using the key to obtain encrypted data, and writing the encrypted data into the carrier image data to obtain encrypted image data; and storing the encrypted image data in a cache. The invention also discloses a corresponding device and computing equipment.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a data encryption method, device and computing equipment. Background technique [0002] Since the birth of the first computer, after decades of rapid development, information technology has entered every aspect of our lives, constantly changing our lives. We have entered the information age. The information age is an era of information explosion. It is difficult to store and transmit a large amount of information effectively by traditional methods. Therefore, the development of information technology based on computer technology and network technology is particularly important. . As one of the main means of protecting information security, cryptographic technology can not only ensure the confidentiality of information, but also ensure the integrity and authenticity of information, and prevent information from being tampered with, forged and faked. With the development a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/423H04N19/467H04N1/32
CPCH04N19/467H04N19/423H04N1/32272
Inventor 唐鹏吉祥龙王翊存
Owner UNIONTECH SOFTWARE TECH CO LTD