A data encryption and decryption operation method
An operation method and data encryption technology, applied in the field of computer communication to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0036] see figure 1 , which is a flow chart of the first embodiment of a data encryption operation method provided by the present invention.
[0037] In this example, include:
[0038] S101: Obtain the length information of the target data.
[0039] S102: Generate a mapping table according to the length information. The mapping table stores characters in the target data and corresponding encrypted characters.
[0040] S103: Perform an encryption operation on the target data according to the mapping table.
[0041] When implementing this embodiment, the length information of the target data is first obtained. For example: "1, 2, 3, 4, 5, 6" are stored in the current target data, a total of 6 bytes. That is, the length of the curre...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com