CN105791281A - Information encryption system - Google Patents

Information encryption system Download PDF

Info

Publication number
CN105791281A
CN105791281A CN201610112735.2A CN201610112735A CN105791281A CN 105791281 A CN105791281 A CN 105791281A CN 201610112735 A CN201610112735 A CN 201610112735A CN 105791281 A CN105791281 A CN 105791281A
Authority
CN
China
Prior art keywords
information
rule
module
encryption system
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610112735.2A
Other languages
Chinese (zh)
Inventor
钱青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Granary Su Yi Information Science And Technology Ltd
Original Assignee
Granary Su Yi Information Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Granary Su Yi Information Science And Technology Ltd filed Critical Granary Su Yi Information Science And Technology Ltd
Priority to CN201610112735.2A priority Critical patent/CN105791281A/en
Publication of CN105791281A publication Critical patent/CN105791281A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information encryption system, comprising an encryption module, a verification code module and a coding module, wherein the encryption module synthesizes information into a primary ciphertext by adopting a preset encryption rule, the verification code module synthesizes the information into a verification code point in the information synthesis by adopting a preset verification rule, and the coding module synthesizes the primary ciphertext and the verification code point into a ciphertext by adopting a preset coding rule. By means of the mode, the information encryption system disclosed by the invention has the advantages of novel structure, simple operation, safe coding, dual encryption, high confidentiality and good convenience and practicability and the like, and has a broad market prospect on the popularization of the information encryption system.

Description

A kind of information encryption system
Technical field
The present invention relates to science technology information field, particularly relate to a kind of information encryption system.
Background technology
Along with the arrival of information age, the study of people, life, work have be unable to do without Information technology.Wherein widely using along with mobile phone and computer, information transmits the risk facing bigger information leakage in a network.
Existing information ciphering method is varied, but mostly has that coding is complicated, decoding time length or a shortcoming such as coding is excessively simple, safety is low or encryption errors rate is high, is unfavorable for that productive life ground fast and safely transmits information.
Summary of the invention
The technical problem that present invention mainly solves is to provide a kind of information encryption system, by adopting encrypting module that information is encrypted, adopt again correction verification module to increase verification code bit, adopting coding module to be encoded processing, safety and the accuracy of information is substantially increased when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical, information encryption system universal on have market prospect widely.
For solving above-mentioned technical problem, the present invention provides a kind of information encryption system, including: encrypting module, check code module and coding module, described encrypting module adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module adopts presets verification rule to information synthesis verification code bit, and described coding module adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext.
In a preferred embodiment of the present invention, including transcoding module, described transcoding module adopts GB or internal code that nonnumerical information is converted into digital information.
In a preferred embodiment of the present invention, described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, bits per inch word information to be encrypted is multiplied by 2, is respectively converted into the English alphabet corresponded to.
In a preferred embodiment of the present invention, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about being added respectively, the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
In a preferred embodiment of the present invention, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
The invention has the beneficial effects as follows: information encryption system of the present invention has the advantages such as novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical have market prospect widely popularizing of information encryption system.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme in the embodiment of the present invention, below the accompanying drawing used required during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings, wherein:
Fig. 1 is the structural representation of information encryption system one preferred embodiment of the present invention.
Detailed description of the invention
Technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, all other embodiments that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Referring to Fig. 1, the embodiment of the present invention includes:
A kind of information encryption system, including: encrypting module 2, check code module 3 and coding module 4.
Described encrypting module 2 adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module 3 adopts presets verification rule to information synthesis verification code bit, described coding module 4 adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext, substantially increase safety and the accuracy of information when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical.
Preferably, including transcoding module 1, described transcoding module 1 adopts GB or internal code that nonnumerical information is converted into digital information, facilitates follow-up encryption and coded treatment.
Preferably, described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, bits per inch word information to be encrypted is multiplied by 2, is respectively converted into the English alphabet corresponded to.
Preferably, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about is added respectively, and the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
Preferably, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
Information encryption system of the present invention provides the benefit that:
By adopting encrypting module that information is encrypted, adopt again correction verification module to increase verification code bit, adopting coding module to be encoded processing, substantially increase safety and the accuracy of information when not increasing coding, decoding difficulty, novel structure, simple to operate, coded safety, double-encryption, confidentiality are high, convenient and practical.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical field, all in like manner include in the scope of patent protection of the present invention.

Claims (5)

1. an information encryption system, it is characterized in that, including: encrypting module, check code module and coding module, described encrypting module adopts predetermined encryption rule that information synthesis primary is added ciphertext, described check code module adopts presets verification rule to information synthesis verification code bit, and described coding module adopts pre-arranged code rule that described primary adds ciphertext and described verification code bit synthesis ciphertext.
2. information encryption system according to claim 1, it is characterised in that include transcoding module, described transcoding module adopts GB or internal code that nonnumerical information is converted into digital information.
3. information encryption system according to claim 1, it is characterised in that described predetermined encryption rule is: from 0-25, a-z is numbered by the English alphabet, is multiplied by 2 by bits per inch word information to be encrypted, is respectively converted into the English alphabet corresponded to.
4. information encryption system according to claim 3, it is characterized in that, described default verification rule verifies for simple sentence: from 0-9, a-j is numbered by the English alphabet, every bits per inch word information talked about being added respectively, the unit numbers of the numeral sum obtained is converted to the English alphabet corresponded to as verification code bit.
5. information encryption system according to claim 1, it is characterized in that, described pre-arranged code rule is: if check code is a, c, e, g, i that even number digital information is corresponding, then this verification code bit is arranged on this first place, if check code is b, d, f, h, j that odd number information is corresponding, then this verification code bit is arranged on this last position.
CN201610112735.2A 2016-03-01 2016-03-01 Information encryption system Pending CN105791281A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610112735.2A CN105791281A (en) 2016-03-01 2016-03-01 Information encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610112735.2A CN105791281A (en) 2016-03-01 2016-03-01 Information encryption system

Publications (1)

Publication Number Publication Date
CN105791281A true CN105791281A (en) 2016-07-20

Family

ID=56386723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610112735.2A Pending CN105791281A (en) 2016-03-01 2016-03-01 Information encryption system

Country Status (1)

Country Link
CN (1) CN105791281A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508155A (en) * 2017-09-14 2019-03-22 北京立思辰计算机技术有限公司 A kind of printer with encryption function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
CN101251883A (en) * 2008-03-11 2008-08-27 北京深思洛克数据保护中心 Method for performing safety controllable remote upgrade for software protecting device
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN104282070A (en) * 2013-07-08 2015-01-14 航天信息股份有限公司 Invoice fake validation method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
CN101251883A (en) * 2008-03-11 2008-08-27 北京深思洛克数据保护中心 Method for performing safety controllable remote upgrade for software protecting device
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN104282070A (en) * 2013-07-08 2015-01-14 航天信息股份有限公司 Invoice fake validation method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘志海 等: "《条码技术及程序设计案例》", 30 September 2009 *
娄亚敏: "《数学与现代生活》", 28 February 2015 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508155A (en) * 2017-09-14 2019-03-22 北京立思辰计算机技术有限公司 A kind of printer with encryption function

Similar Documents

Publication Publication Date Title
WO2019153867A1 (en) Two-dimensional code generation and identification
CN103605950B (en) Method and system for hiding signature in credible two-dimensional code
US9208304B2 (en) Method for web service user authentication
CN102546174A (en) Two-dimensional code encryption/decryption method and anti-counterfeiting method
CN110011993B (en) Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption
CN102724668A (en) Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
RU2753245C2 (en) Secure genomic data transmission
CL2018003279A1 (en) Use of hardware-based secure isolated region to prevent piracy and deception in electronic devices
CN102883322A (en) Mobile terminal and WiFi (wireless fidelity) connection method for same
CN112202729B (en) Dynamic obfuscated encryption and decryption method and device
CN111431716B (en) Data transmission method and device, computer equipment and storage medium
CN105635162A (en) Combination method for achieving network isolation access type data communication
CN105740215A (en) Data communication coding and decoding method
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
CN103312458A (en) Hybrid coding method
CN103956163B (en) Common voice and encrypted voice interconversion system and method
CN103402185A (en) Private information transfer method
CN105791281A (en) Information encryption system
CN104636677A (en) Data safety storage method based on privacy protection
CN104393988B (en) A kind of reversible data ciphering method and device
CN110210224B (en) Intelligent big data mobile software similarity detection method based on description entropy
CN102185897B (en) Safe distributed virtual storage pool system
US20180019982A1 (en) Systems and Methods for Secure Online Communication
CN103634098B (en) Information concealing method based on time interval
CN104363348B (en) Information data processing method and processing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160720

RJ01 Rejection of invention patent application after publication