Data encryption method and device, electronic equipment and readable storage medium

A data encryption and data technology, which is applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve the problems of low data transmission security and easy leakage of data encryption keys, etc., to solve the problems of easy leakage and guaranteed complexity Effect

Pending Publication Date: 2022-07-29
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a data encryption method, device, electronic equipment, and readable storage medium to solve the problem in the related art that the data encryption key is easily leaked, resulting in low data transmission security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device, electronic equipment and readable storage medium
  • Data encryption method and device, electronic equipment and readable storage medium
  • Data encryption method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] According to an embodiment of the present invention, a data encryption method is provided, such as figure 1 As shown, the method may specifically include the following steps:

[0025] S102, generating an encryption public key according to the planet configuration information in the first constellation, wherein the planet configuration information is determined according to the constellation mapping relationship table;

[0026] S104, encrypting the target data according to the encryption public key to obtain encrypted data;

[0027] The data sending end and the data receiving end in this embodiment include but are not limited to servers, terminals, etc. The data sending end and the data receiving end can perform data processing and data transmission. In this embodiment, the data sending end and the data receiving end do not perform limit.

[0028] In this embodiment, the constellation mapping relationship table is pre-established and stored in the database of the data ...

Embodiment 2

[0058] A data encryption device provided by an embodiment of the present invention is introduced in detail.

[0059] refer to image 3 , showing a schematic structural diagram of a data encryption apparatus in an embodiment of the present invention.

[0060] The application program loading apparatus in the embodiment of the present invention includes: a processing module 30 , an encryption module 32 and a sending module 34 .

[0061] The functions of each module and the interaction between the modules are described in detail below.

[0062] A processing module 30, configured to generate an encryption public key according to planet configuration information in the first constellation, wherein the planet configuration information is determined according to a constellation mapping relationship table;

[0063] an encryption module 32, configured to encrypt the target data according to the encryption public key to obtain encrypted data;

[0064] The sending module 34 is configur...

Embodiment 3

[0077] Preferably, an embodiment of the present invention further provides an electronic device, comprising: a memory, a processor, and a computer program stored in the memory and running on the processor, the computer program being executed by the processor Steps to implement the data encryption method as described above when executed.

[0078] Optionally, in this embodiment, the memory is configured to store program codes for performing the following steps:

[0079]S1, generating the encryption public key according to the planet configuration information in the first constellation, wherein the planet configuration information is determined according to the constellation mapping relationship table;

[0080] S2, encrypting the target data according to the encryption public key to obtain encrypted data;

[0081] S3: Send an encrypted data message to a data receiving end, where the encrypted data message includes the encrypted data and the planet configuration information.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method and device, electronic equipment and a readable storage medium, and relates to the technical field of data encryption. The method comprises the steps that an encryption public key is generated according to planet configuration information in a first constellation, and the planet configuration information is determined according to a constellation mapping relation table; encrypting the target data according to the encryption public key to obtain encrypted data; the encrypted data message is sent to a data receiving end, and the encrypted data message comprises the encrypted data and the planet configuration information. Therefore, the problem that the communication service of the user terminal is affected when the session type of the user terminal in the roaming place network is not matched with the signed session type in the related technology can be solved.

Description

technical field [0001] The present invention relates to the technical field of data encryption, and in particular, to a data encryption method, apparatus, electronic device and readable storage medium. Background technique [0002] With the development of the information society, people's awareness of the importance of data security has been continuously improved; among traditional encryption algorithms, the management of secret keys in symmetric encryption algorithms is difficult and the security is not high. In the asymmetric encryption algorithm, before transmitting data, the data server and the client must agree on the secret key in advance, and then both parties must save the secret key. However, in today's network age where information is developing rapidly, the security of existing encryption algorithms is low. [0003] In view of the above problems, no effective technical means have been proposed so far. SUMMARY OF THE INVENTION [0004] Embodiments of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/0442H04L9/0861
Inventor 王乾赵轶新蒋艳军孙科
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products