Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data encryption and decryption operation method

An operation method and data encryption technology, applied in the field of computer communication to achieve the effect of improving security

Active Publication Date: 2017-12-01
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a data encryption and decryption operation method to solve the problem of data security transmission in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption and decryption operation method
  • A data encryption and decryption operation method
  • A data encryption and decryption operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] see figure 1 , which is a flow chart of the first embodiment of a data encryption operation method provided by the present invention.

[0037] In this example, include:

[0038] S101: Obtain the length information of the target data.

[0039] S102: Generate a mapping table according to the length information. The mapping table stores characters in the target data and corresponding encrypted characters.

[0040] S103: Perform an encryption operation on the target data according to the mapping table.

[0041] When implementing this embodiment, the length information of the target data is first obtained. For example: "1, 2, 3, 4, 5, 6" are stored in the current target data, a total of 6 bytes. That is, the length of the curre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption and decryption operation method which includes the steps of obtaining length information of target data, generating a mapping table according to the length information and encrypting target data according to the mapping table, wherein the mapping relation between characters in the target data and corresponding encryption characters is stored in the mapping table. By means of the method, the target data are dynamically encrypted, the defect that a fixed encryption mode is used in traditional encryption, and data safety is improved.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a data encryption and decryption operation method. Background technique [0002] With the development of market economy and Internet technology, people's work and life are more and more changed by the Internet. Among them, network communication is one of the very important application fields. [0003] In the prior art, people often use mobile terminals to perform operations such as electronic payment. During the communication process, the electronic payment information is usually transmitted in an encrypted manner. The mobile terminal encrypts the user's information and then sends it to the remote server. The remote server decrypts the data according to the agreed rules. [0004] However, with the publicization of encryption technology, more and more encryption methods have become familiar to the public. For some technicians, there is a problem of using encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 侯绍东陈腾跃刘丽丽
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products