Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for encrypting and securely transmitting data

A technology of encryption security and transmission method, which is applied in transmission systems, relational databases, database models, etc., can solve the problems of high security requirements for engineering data transmission, poor data pertinence, data encryption protection, etc., and achieve strong pertinence in data processing , Improving the efficiency of transmission and the effect of improving efficiency

Active Publication Date: 2021-05-18
山东三木众合信息科技股份有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] A large amount of engineering data can no longer be processed according to conventional processing and storage methods. Using big data and data mining to process data can effectively solve the problem of large data volume and low processing efficiency. However, engineering data The requirements for transmission security will also become higher
Most of the existing data mining uses data clustering and other operations on the server side of big data. The data is poorly targeted and the amount of calculation is large. At the same time, the interaction of the client requires two-way big data transmission, which is inefficient and slow.
For the data encryption method, the existing technology basically only aims at the confidentiality of customer information, and does not encrypt and protect the data from the whole data processing process, especially in the process of data transmission, no targeted encryption measures are taken, resulting in Data security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for encrypting and securely transmitting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The concrete implementation of the present invention is described in detail below, it is necessary to point out here that the following implementation is only used for further description of the present invention, and can not be interpreted as limiting the protection scope of the present invention. Some non-essential improvements and adjustments still belong to the protection scope of the present invention.

[0042] The present invention provides an encrypted secure transmission method for engineering data, and its specific flow is as attached figure 1 As shown, the processing efficiency and speed of data prediction can be improved through this method, and the data security is high, which will be introduced in detail below.

[0043] Data mining is a technology that finds its laws from a large amount of data by analyzing each data. It mainly includes three steps: data preparation, law finding and law expression. Data preparation is to select the required data from relev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A predictive processing method for engineering data based on data mining, including initialization settings, establishment of sub-target data clusters, preprocessing to form effective target data clusters, clustering processing and analysis, associative processing of similar data and establishment of priority data sets in the data, setting with The associated class encryption ID and priority number set encryption ID, category data transmission, data verification and mining processing steps can improve the processing efficiency and speed of data prediction, and the targeted data encryption method makes data security high.

Description

technical field [0001] The invention relates to the field of data analysis, processing and transmission, in particular to an encrypted and secure transmission method of engineering data. Background technique [0002] Big data (big data), a term in the IT industry, refers to a collection of data that cannot be captured, managed and processed by conventional software tools within a certain period of time. It requires a new processing model to have stronger decision-making, insight, and Massive, high growth rate and diverse information assets of process optimization capabilities. [0003] Data mining is an emerging discipline, which was born in the 1980s and is mainly oriented to the field of artificial intelligence research for commercial applications. From a technical point of view, data mining is the process of obtaining implicit, potentially valuable information and knowledge that people have not noticed in advance from a large number of complex, irregular, random, and fuz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2458G06F16/28G06F16/215G06F21/60H04L29/06H04L29/08
CPCG06F16/2465G06F16/285G06F16/215G06F21/602H04L67/025H04L67/12H04L67/14H04L63/0428H04L63/123H04L67/1001
Inventor 于士国
Owner 山东三木众合信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products