Information security technology based on prime number coding theory

A technology of information security and coding theory, applied in the direction of preventing unauthorized use of memory, protecting stored content from loss, etc., can solve the hidden dangers of information security, cannot achieve security and effectiveness, cannot realize encryption and decryption control, management and distribution, etc. Achieve the effect of super anti-interference and shortened time

Inactive Publication Date: 2005-01-19
SHANGHAI HONGDI DIGITAL TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The ciphers and key encryption measures of the above-mentioned technologies, products and solutions, because the algorithms adopted are all functional relationships and are based on algorithms controlled by others, therefore, complete encryption and decryption control, management and distribution cannot be realized , can not achieve 100% safe and effective and 100% error detection, there are loopholes that cannot be filled so far in preventing information leakage and intrusion, leaving hidden dangers to information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security technology based on prime number coding theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0020] like figure 1 Shown is a block diagram of network channel codes implemented by hardware-specific binary logic circuits according to the present invention, and discloses a method for transmitting information processed by the method of the present invention in a computer network system.

[0021] First, through the binary logic circuit, the source code to be transmitted is input with universal binary code. And complete the logical conversion of binary code to decimal code. Then carry out colliding operation, expand the mathematical operation mode and form multiple prime values ​​to match to garbled codes. In the process of implementing prime number logical reasoning and colliding operations again and again, the characteristics similar to concepts such as "soliton" and "single group" are produced, thereby forming discontinuous prime numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a kind of new information security technique that based on prime number encoding theory. During the information transmission, first, it matches the signal source code and encodes them to clobber by prime number encoding theory. The prime number matched clobber is served as channel code to enter the transmission channel. It executes channel error detection during channel transmission, and decodes the channel code at the receiving end. The clobber generating method comprises: during the conversion by executing the prime number logical reasoning and clash calculation, it generates the feature of isolated seed and single cluster, so to form non-linear function discontinuous prime number encoding reasoning clobber. This invention can ensure the complete match of network communication data to prime number data, so the information data can arrive timely, reliably, availably.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information security technology based on prime number coding theory. Background technique [0002] With the continuous development of computer network information technology, people's dependence on computer network is getting stronger and stronger, and the requirements for information technology are also getting higher and higher. At the same time, the high-tech crimes against computer networks have also multiplied, with increasingly sophisticated means and greater harm. Therefore, higher requirements are put forward for computer network information security. At present, information security technologies, products and solutions at home and abroad are mainly listed as follows: [0003] (1) Adopt physical isolation, firewall, anti-virus and hacking software; [0004] (2) Using combinatorial mathematics, complexity design, digital signature, finge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F12/16
Inventor 洪庆美
Owner SHANGHAI HONGDI DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products