Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method and device for numerical value and storage medium

An encryption method and numerical technology, applied in the field of computing applications, can solve the problems of inability to accurately restore data tables, undetectable values, leakage of sensitive data, etc., and achieve the effect of avoiding random modification of data, occupying less memory, and wide applicability

Pending Publication Date: 2022-04-12
深圳市米软科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 3. Database backup files are copied and leak sensitive data due to poor management
[0011] 2. After the value is run through addition, subtraction, multiplication and division, the length of the value will be changed, especially the length of the decimal place. As a result, the encrypted data cannot be saved to the data table or cannot be accurately restored because the length of the encrypted data exceeds the length designed by the original data table. Purpose;
[0012] 3. The value cannot be detected after being tampered with by the database administrator
[0013] For the technical problems in the above-mentioned prior art, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device for numerical value and storage medium
  • Encryption and decryption method and device for numerical value and storage medium
  • Encryption and decryption method and device for numerical value and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] According to this embodiment, an embodiment of an encryption and decryption method for numerical values ​​is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0091] The method embodiments provided in this embodiment can be executed in mobile terminals, computer terminals, servers or similar computing devices. figure 1 A block diagram of a hardware structure of a computing device for an encryption and decryption method for numerical values ​​is shown. like figure 1 As shown, the computing device may include one or more processors (processors may include but not limited to processing devices such as microprocessors MCUs or programmable logic devices FPGAs), memo...

Embodiment 2

[0134] Figure 15 Shown is the encryption device 500 for numerical values ​​according to the first aspect of this embodiment, which corresponds to the method according to the first aspect of Embodiment 1. refer to Figure 15 As shown, the device 500 includes:

[0135] A binary conversion module 510, configured to multiply the data to be encrypted by 10 to the M power to obtain a first integer value, perform literal dictionary exchange on the first integer value, and convert the first integer value after the literal dictionary exchange is the first binary data, M is 0 or a natural number;

[0136] An encryption processing module 520, configured to generate a random number 0 or 1, and perform binary encryption processing on the first binary data according to the random number to obtain second binary data;

[0137] A verification bit and algorithm bit adding module 530, configured to add a verification bit and an algorithm bit to the right side of the second binary data;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a numerical value encryption and decryption method and device, and the encryption method comprises the steps: multiplying to-be-encrypted data by the M power of 10 to obtain a first integer value, carrying out the literal dictionary exchange of the first integer value, and converting the first integer value after the literal dictionary exchange into first binary data, M being 0 or a natural number; generating a random number 0 or 1, and performing binary encryption processing on the first binary data according to the random number to obtain second binary data; a verification bit and an algorithm bit are added to the right side of the second binary data; and converting the result added with the verification bit and the algorithm bit into a second integer value, dividing the second integer value by M power of 10, and converting the second integer value into an encryption value to obtain an encrypted result. According to the method, the original numerical value is converted into another effective numerical value to facilitate use and transmission by performing various means such as dictionary conversion, random binary data conversion encryption algorithm and data verification bit addition on the numerical value. In the decryption process, verification and reverse operation are carried out on the encrypted data to obtain an original value with unchanged precision.

Description

technical field [0001] The present application relates to the technical field of computing applications, and in particular to a numerical encryption and decryption method and device as well as a storage medium. Background technique [0002] Documents are indispensable in the publicity of manuscripts or commercial communications of major enterprises and government departments. Due to the development of informatization, the storage, portability, and transferability of electronic documents are much better than traditional paper documents, and thus become a popular choice at present. However, problems such as inconsistency, repetition, and difficulty in verification of the document format followed, which caused various enterprise departments to invest too much human resources in complicated documents. [0003] In the existing information system, a large amount of sensitive data is often stored in the database: such as the ID number of the employee, the latest salary and funds o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F7/58
Inventor 蒋勋勋
Owner 深圳市米软科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products