Data encryption method and system
An encryption method and data technology, applied in the field of data security, can solve problems such as being decrypted, and achieve the effects of small computational complexity, high decryption difficulty, and high encryption and decryption efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to facilitate a further understanding of the present invention, the specific embodiments of the present invention will be described below in conjunction with the accompanying drawings:
[0024] refer to figure 1 As shown, the original data A is decomposed into data A1 and data A2 in a discontinuous manner. Since the data obtained from data A1 and A2 are discontinuous, it cannot be restored to data A through A1 and A2. Even if the data A1 and A2 are obtained, If the decomposition law of the data cannot be obtained, it cannot be restored to achieve the encryption effect. Of course, there can be at least two after decomposing, if it can be decomposed into multiple in order to ensure safety.
[0025] refer to figure 2 As shown in the method, the data A follows the function It is decomposed into data A1, A2, A3, and the data A1, A2, A3 are encrypted by encryption steps to generate encrypted data A1', A2', A3'. Of course, the encryption methods of data A1, A2, A...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com