CN105791281A - Information encryption system - Google Patents
Information encryption system Download PDFInfo
- Publication number
- CN105791281A CN105791281A CN201610112735.2A CN201610112735A CN105791281A CN 105791281 A CN105791281 A CN 105791281A CN 201610112735 A CN201610112735 A CN 201610112735A CN 105791281 A CN105791281 A CN 105791281A
- Authority
- CN
- China
- Prior art keywords
- information
- rule
- module
- encryption system
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 claims abstract description 30
- 230000015572 biosynthetic process Effects 0.000 claims abstract description 10
- 238000003786 synthesis reaction Methods 0.000 claims abstract description 10
- 230000008901 benefit Effects 0.000 abstract description 3
- 230000009977 dual effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information encryption system, comprising an encryption module, a verification code module and a coding module, wherein the encryption module synthesizes information into a primary ciphertext by adopting a preset encryption rule, the verification code module synthesizes the information into a verification code point in the information synthesis by adopting a preset verification rule, and the coding module synthesizes the primary ciphertext and the verification code point into a ciphertext by adopting a preset coding rule. By means of the mode, the information encryption system disclosed by the invention has the advantages of novel structure, simple operation, safe coding, dual encryption, high confidentiality and good convenience and practicability and the like, and has a broad market prospect on the popularization of the information encryption system.
Description
Technical field
The present invention relates to science technology information field, particularly relate to a kind of information encryption system.
Background technology
Along with the arrival of information age, the study of people, life, work have be unable to do without Information technology.Wherein widely using along with mobile phone and computer, information transmits the risk facing bigger information leakage in a network.
Existing information ciphering method is varied, but mostly has that coding is complicated, decoding time length or a shortcoming such as coding is excessively simple, safety is low or encryption errors rate is high, is unfavorable for that productive life ground fast and safely transmits information.
Summary of the invention
The technical problem that present invention mainly solves is to provide a kind of information encryption system, by adopting encrypting module that information is encrypted, adopt again correction verification module to increase verification code bit, adopting coding module to be encoded processing, safety and the accuracy of information is substantially increased when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical, information encryption system universal on have market prospect widely.
For solving above-mentioned technical problem, the present invention provides a kind of information encryption system, including: encrypting module, check code module and coding module, described encrypting module adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module adopts presets verification rule to information synthesis verification code bit, and described coding module adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext.
In a preferred embodiment of the present invention, including transcoding module, described transcoding module adopts GB or internal code that nonnumerical information is converted into digital information.
In a preferred embodiment of the present invention, described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, bits per inch word information to be encrypted is multiplied by 2, is respectively converted into the English alphabet corresponded to.
In a preferred embodiment of the present invention, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about being added respectively, the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
In a preferred embodiment of the present invention, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
The invention has the beneficial effects as follows: information encryption system of the present invention has the advantages such as novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical have market prospect widely popularizing of information encryption system.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme in the embodiment of the present invention, below the accompanying drawing used required during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings, wherein:
Fig. 1 is the structural representation of information encryption system one preferred embodiment of the present invention.
Detailed description of the invention
Technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, all other embodiments that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, the embodiment of the present invention includes:
A kind of information encryption system, including: encrypting module 2, check code module 3 and coding module 4.
Described encrypting module 2 adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module 3 adopts presets verification rule to information synthesis verification code bit, described coding module 4 adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext, substantially increase safety and the accuracy of information when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical.
Preferably, including transcoding module 1, described transcoding module 1 adopts GB or internal code that nonnumerical information is converted into digital information, facilitates follow-up encryption and coded treatment.
Preferably, described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, bits per inch word information to be encrypted is multiplied by 2, is respectively converted into the English alphabet corresponded to.
Preferably, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about is added respectively, and the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
Preferably, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
Information encryption system of the present invention provides the benefit that:
By adopting encrypting module that information is encrypted, adopt again correction verification module to increase verification code bit, adopting coding module to be encoded processing, substantially increase safety and the accuracy of information when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical field, all in like manner include in the scope of patent protection of the present invention.
Claims (5)
1. an information encryption system, it is characterized in that, including: encrypting module, check code module and coding module, described encrypting module adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module adopts presets verification rule to information synthesis verification code bit, and described coding module adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext.
2. information encryption system according to claim 1, it is characterised in that include transcoding module, described transcoding module adopts GB or internal code that nonnumerical information is converted into digital information.
3. information encryption system according to claim 1, it is characterised in that described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, is multiplied by 2 by bits per inch word information to be encrypted, is respectively converted into the English alphabet corresponded to.
4. information encryption system according to claim 3, it is characterized in that, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about being added respectively, the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
5. information encryption system according to claim 1, it is characterized in that, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610112735.2A CN105791281A (en) | 2016-03-01 | 2016-03-01 | Information encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610112735.2A CN105791281A (en) | 2016-03-01 | 2016-03-01 | Information encryption system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105791281A true CN105791281A (en) | 2016-07-20 |
Family
ID=56386723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610112735.2A Pending CN105791281A (en) | 2016-03-01 | 2016-03-01 | Information encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105791281A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508155A (en) * | 2017-09-14 | 2019-03-22 | 北京立思辰计算机技术有限公司 | A kind of printer with encryption function |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790420A (en) * | 2005-12-01 | 2006-06-21 | 北京北大方正电子有限公司 | Method and apparatus for embedding and detecting digital watermark in text file |
CN101251883A (en) * | 2008-03-11 | 2008-08-27 | 北京深思洛克数据保护中心 | Method for performing safety controllable remote upgrade for software protecting device |
CN101350724A (en) * | 2008-08-15 | 2009-01-21 | 西安电子科技大学 | An Encryption Method Based on Biometric Information |
CN102073831A (en) * | 2011-02-23 | 2011-05-25 | 上海帝埃碧化学科技有限公司 | System and method for encrypting and decrypting electronic documents |
CN104282070A (en) * | 2013-07-08 | 2015-01-14 | 航天信息股份有限公司 | Invoice fake validation method and system |
-
2016
- 2016-03-01 CN CN201610112735.2A patent/CN105791281A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790420A (en) * | 2005-12-01 | 2006-06-21 | 北京北大方正电子有限公司 | Method and apparatus for embedding and detecting digital watermark in text file |
CN101251883A (en) * | 2008-03-11 | 2008-08-27 | 北京深思洛克数据保护中心 | Method for performing safety controllable remote upgrade for software protecting device |
CN101350724A (en) * | 2008-08-15 | 2009-01-21 | 西安电子科技大学 | An Encryption Method Based on Biometric Information |
CN102073831A (en) * | 2011-02-23 | 2011-05-25 | 上海帝埃碧化学科技有限公司 | System and method for encrypting and decrypting electronic documents |
CN104282070A (en) * | 2013-07-08 | 2015-01-14 | 航天信息股份有限公司 | Invoice fake validation method and system |
Non-Patent Citations (2)
Title |
---|
刘志海 等: "《条码技术及程序设计案例》", 30 September 2009 * |
娄亚敏: "《数学与现代生活》", 28 February 2015 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508155A (en) * | 2017-09-14 | 2019-03-22 | 北京立思辰计算机技术有限公司 | A kind of printer with encryption function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019153867A1 (en) | Two-dimensional code generation and identification | |
CN103605950B (en) | Method and system for hiding signature in credible two-dimensional code | |
US9208304B2 (en) | Method for web service user authentication | |
CN112202729B (en) | Dynamic obfuscation encryption and decryption method and device | |
RU2753245C2 (en) | Secure genomic data transmission | |
CN110022314B (en) | Big data secure transmission method based on matrix two-dimensional code | |
CN102724668A (en) | Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs | |
US20180253559A1 (en) | Secured lossless data compression using encrypted headers | |
CN103400173A (en) | Generating method and reading method of two-dimensional code containing private information | |
CN111431716B (en) | Data transmission method and device, computer equipment and storage medium | |
CN106055531A (en) | Text information hiding technology using all Song Ci | |
CN105635162A (en) | Combination method for achieving network isolation access type data communication | |
CN103402185B (en) | A kind of private information transfer method | |
CN103543980A (en) | Digital data processing method and device | |
CN103956163B (en) | Common voice and encrypted voice interconversion system and method | |
CN103532960A (en) | Text encryption interaction method, encryption method and device, decryption method and device | |
CN105791281A (en) | Information encryption system | |
CN104636677A (en) | Data safety storage method based on privacy protection | |
CN101419589B (en) | Method and system for protecting computer document content | |
CN104393988B (en) | A kind of reversible data ciphering method and device | |
CN103365814B (en) | A kind of serial data transmission method and system thereof | |
CN110210224B (en) | An intelligent detection method for big data mobile software similarity based on description entropy | |
CN105847003A (en) | Encryption method of biological feature, encryption matching method and encryption system, and encryption matching system | |
CN116156072B (en) | Steganographic image generation method, steganographic information extraction method and related devices | |
CN108108267B (en) | Data recovery method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160720 |
|
RJ01 | Rejection of invention patent application after publication |