Encryption and decryption method and device of player identity, equipment and storage medium

A technology of encryption, decryption, and encryption algorithm, which is applied in information security-related fields, can solve problems such as leakage of state secrets, commercial secrets, and personal privacy, affect enthusiasm for competitions, and destroy a good environment for network security competitions, and achieve the effect of avoiding fraudulent behavior

Pending Publication Date: 2022-07-22
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. During the competition of the network security competition, the sponsor and organizer can easily identify the real identity of the contestants, which opens the door to cheating in the competition, violates the principle of fair competition, destroys the good environment of the network security competition, and greatly affects Enthusiasm of most users to participate in the competition;
[0005] 2. For network security competitions with a high level of confidentiality, sensitive information such as ID numbers and contact information of contestants can be obtained by the organizers, organizers and third parties of the network security competition, and state secrets, commercial secrets and personal privacy are leaked risks of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device of player identity, equipment and storage medium
  • Encryption and decryption method and device of player identity, equipment and storage medium
  • Encryption and decryption method and device of player identity, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0027] see Figure 1-4 , the present invention provides a technical scheme: a method for encrypting and decrypting player identity, comprising the following steps:

[0028] Step S1, determine three secret members of the network security competition, which are respectively the system administrator, security security administrator and security auditor of the network security competition;

[0029] Step S2, the encryption and decryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field related to information security, in particular to a player identity encryption and decryption method, device and equipment and a storage medium, on one hand, identity information of players can be encrypted, a sponsor and an undertaking party of a network security game cannot recognize the real identities of the players, and cheating behaviors are avoided; and on the other hand, for the network security competition with a relatively high security level, the information of the competitors can be protected from being acquired by the sponsor, the handler and the third party of the network security competition, so that the national secret, the commercial secret and the personal privacy are not leaked.

Description

technical field [0001] The invention relates to the related field of information security, in particular to a method, device, equipment and storage medium for encryption and decryption of player identity. Background technique [0002] Network security means that the hardware, software and data in the network system are protected from being damaged, altered or leaked due to accidental or malicious reasons, the system operates continuously, reliably and normally, and network services are not interrupted. However, the global network security situation is now severe, and there are frequent network security incidents. In the increasingly complex and huge network structure, no industry can be spared from the increasing proliferation of network attacks. Whether it is military training and tactical strategies for the military in cyberspace, response drills for the public service industry in response to cyberattacks, or testing and evaluation of key infrastructure to ensure performan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/28H04L9/08
CPCH04L63/0407H04L63/0428H04L63/0485H04L41/28H04L9/0866
Inventor 傅涛郭超郭金辉张冠阳麻晓龙冯驰宇付荣王健
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products