[go: up one dir, main page]

CN108549818A - A kind of method and system of mobile phone games data ciphering and deciphering - Google Patents

A kind of method and system of mobile phone games data ciphering and deciphering Download PDF

Info

Publication number
CN108549818A
CN108549818A CN201810182245.9A CN201810182245A CN108549818A CN 108549818 A CN108549818 A CN 108549818A CN 201810182245 A CN201810182245 A CN 201810182245A CN 108549818 A CN108549818 A CN 108549818A
Authority
CN
China
Prior art keywords
encryption information
encryption
length
original key
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810182245.9A
Other languages
Chinese (zh)
Inventor
刘德建
陈辉东
陈宏展
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianyi Network Technology Co Ltd
Original Assignee
Fujian Tianyi Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianyi Network Technology Co Ltd filed Critical Fujian Tianyi Network Technology Co Ltd
Priority to CN201810182245.9A priority Critical patent/CN108549818A/en
Publication of CN108549818A publication Critical patent/CN108549818A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and system of mobile phone games data ciphering and deciphering, original KEY is encrypted to form the first encryption information by Hash codes, original KEY treats encrypted mobile phone games data encryption and forms the second encryption information, first encryption file is combined to form encryption file with the second encryption file, terminal, to encrypting file decryption, finally obtains mobile phone games data to be encrypted by Hash codes, coordinated without additional server-side, it is at low cost, it is safer using two level Encryption Algorithm.

Description

A kind of method and system of mobile phone games data ciphering and deciphering
Technical field
The present invention relates to data security arts more particularly to a kind of method and system of mobile phone games data ciphering and deciphering.
Background technology
Currently, popularizing with smart mobile phone, mobile phone games industry is also fast-developing, there is a large amount of new game productions every year It is raw, but the game that can be succeeded on the market is in fact and few.Therefore, there is one kind not in mobile phone games exploitation industry Good phenomenon is exactly those successfully game of mountain vallage.They by being unziped it to installation file (for example, apk files), from And resource file therein is obtained easily, quickly analysis cracks the resource of those game, configuration, and then quick mountain vallage goes out one Similar game.It is also configuration data by cracking game more also to play plug-in, some to be played are crucial Data.
Common method includes the following steps in terms of game data encryption at present:
1. compress mode is randomly selected in ciphering process, cipher mode compresses game client valuable source, Encryption, and accordingly generate index information and be uploaded to game server;
2. obtaining above-mentioned index information from game server in decrypting process, and correct decryption side is chosen according to it Formula, decompression mode are decrypted the called valuable source of encryption, decompress;And then complete the calling of above-mentioned valuable source with Ensure the normal operation of game client.
The encryption method improves the difficulty maliciously cracked to a certain extent, is effectively protected game client and its again Resource is wanted, but is the encrypting and decrypting of game resource the shortcomings that the above method to need special server-side and coordinated, this Inconvenience can be brought to resource decryption, increase the additional many workloads of game resource processing.
Invention content
The technical problem to be solved by the present invention is to:It provides a kind of inexpensive, safety to mobile phone games data encryption solution Close method and system.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:
A method of to mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
In order to solve the above-mentioned technical problem, the another technical solution that the present invention uses for:
A kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation end include first Memory, first processor and storage on the first memory and the first computer program that can be run on first processor, The terminal includes second memory, second processor and is stored on second memory and can be run in second processor Second computer program,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
The beneficial effects of the present invention are:Original KEY is encrypted to form the first encryption information by Hash codes, original KEY It treats encrypted mobile phone games data encryption and forms the second encryption information, the first encryption file is combined into shape with the second encryption file At encryption file, terminal, to encrypting file decryption, finally obtains mobile phone games data to be encrypted, without additional by Hash codes Server-side coordinated, it is at low cost, it is safer using two level Encryption Algorithm.
Description of the drawings
Fig. 1 is a kind of flow chart of the method for mobile phone games encrypting and decrypting of the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the system of mobile phone games encrypting and decrypting of the embodiment of the present invention;
Label declaration:
1, end is developed;2, first memory;3, first processor;4, terminal 5, second memory;6, second processor;7、 Mobile phone games data ciphering and deciphering system.
Specific implementation mode
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and coordinate attached Figure is explained.
The design of most critical of the present invention is:Use Hash codes and corresponding original with mobile phone games data to be encrypted Decryption is encrypted to mobile phone games data by encrypting and decrypting rule in KEY, is coordinated without additional server-side, cost It is low, it is safer using two level Encryption Algorithm.
Please refer to Fig. 1, a kind of method of mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
As can be seen from the above description, the beneficial effects of the present invention are:Original KEY is encrypted by Hash codes to be formed first plus Confidential information, original KEY treat encrypted mobile phone games data encryption and form the second encryption information, and file and second is encrypted by first Encryption file combines to form encryption file, and terminal, to encrypting file decryption, finally obtains mobile phone trip to be encrypted by Hash codes Play data, are coordinated without additional server-side, at low cost, safer using two level Encryption Algorithm.
Further, the step S2 is specifically included:The length for obtaining the original KEY, the Hash codes are followed Ring expand, the length of the Hash codes after expansion is consistent with the length of original KEY, by after the expansion Hash codes with it is described Original KEY step-by-steps carry out xor operation, obtain first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
Seen from the above description, it carries out cyclic extension using Hash codes and original KEY and encrypts more convenient, nothing as key Encryption key need to be separately provided, it is convenient and efficient.
Further, first encryption information is combined to form encryption with second encryption information described in step S4 File specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
First encryption information is read from the encryption file and second encryption information is specific described in step S5 Including:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information Degree determines first encryption information, obtains the length of second encryption information, determines second encryption information.
It seen from the above description, can be more smart by the length of the length and the second encryption information that obtain the first encryption information True the first encryption information of positioning and the second encryption information.
Further, the step S5 is specifically included:The length for obtaining first encryption information, by the Hash codes into Row cyclic extension, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by the Kazakhstan after the expansion Uncommon code carries out xor operation with the first encryption information step-by-step, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions, The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
Seen from the above description, more convenient as secret key decryption using Hash codes and original KEY progress cyclic extension, nothing Decruption key need to be separately provided, more quick, raising user experience is decrypted using xor operation.
Please refer to Fig. 2, a kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation End include first memory, first processor and storage on the first memory and can be run on first processor first count Calculation machine program, the terminal include second memory, second processor and are stored on second memory and can be in second processing The second computer program run on device,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
As can be seen from the above description, the beneficial effects of the present invention are:Original KEY is encrypted by Hash codes to be formed first plus Confidential information, original KEY treat encrypted mobile phone games data encryption and form the second encryption information, and file and second is encrypted by first Encryption file combines to form encryption file, and terminal, to encrypting file decryption, finally obtains mobile phone trip to be encrypted by Hash codes Play data, are coordinated without additional server-side, at low cost, safer using two level Encryption Algorithm.
Further, the step S2 is specifically included:The length for obtaining the original KEY, the Hash codes are followed Ring expand, the length of the Hash codes after expansion is consistent with the length of original KEY, by after the expansion Hash codes with it is described Original KEY step-by-steps carry out xor operation, obtain first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
Seen from the above description, it carries out cyclic extension using Hash codes and original KEY and encrypts more convenient, nothing as key Encryption key need to be separately provided, it is convenient and efficient.
Further, first encryption information is combined to form encryption with second encryption information described in step S4 File specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
First encryption information is read from the encryption file and second encryption information is specific described in step S5 Including:
The encryption file is received, the head of the encryption file is read, obtains the length of first encryption information, really Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
It seen from the above description, can be more smart by the length of the length and the second encryption information that obtain the first encryption information True the first encryption information of positioning and the second encryption information.
Further, the step S5 is specifically included:The length for obtaining first encryption information, by the Hash codes into Row cyclic extension, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by the Kazakhstan after the expansion Uncommon code carries out xor operation with the first encryption information step-by-step, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions, The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
Seen from the above description, more convenient as secret key decryption using Hash codes and original KEY progress cyclic extension, nothing Decruption key need to be separately provided, more quick, raising user experience is decrypted using xor operation.
Fig. 1 is please referred to, the embodiment of the present invention one is:
A kind of method of mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
The step S2 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining the original KEY The length of Hash codes after filling is consistent with the length of original KEY, and the Hash codes after the expansion are pressed with the original KEY Position carries out xor operation, obtains first encryption information, and the Hash codes are the setting of exploitation end, and maintain secrecy undocumented character String;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
It is described first encryption information is combined with second encryption information to be formed encryption file specifically include:By institute It states the length of the first encryption information and the head for encrypting file is written in first encryption information, described second is encrypted The tail portion of the encryption file is written in the length of information and second encryption information.
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information KEY;
The step S5 is specifically included:The Hash codes are carried out cycle expansion by the length for obtaining first encryption information Fill, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by after the expansion Hash codes and institute It states the first encryption information step-by-step and carries out xor operation, obtain the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions, The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
The embodiment of the present invention two is:
Method described in embodiment one is applied to specific scene, for example Hash codes are:HASHC, with hand to be encrypted The corresponding original KEY of machine game data is:TESTKEYCODE123, mobile phone games data to be encrypted are: IPHONEGAME12345678, the process that exploitation end is encrypted are specially:The length of the Hash codes is 5 characters, described The length of original KEY is 14 characters, and Hash codes described in cyclic extension obtain HASHCHASHCHASH, the Hash of cyclic extension Code is consistent with the length of original KEY, by each character ASCII character of HASHCHASHCHASH and TESTKEYCODE123 Each character ASCII character step-by-step carries out xor operation, as follows:
The first encryption information is obtained, it is as follows:
28 4 0 28 8 13 24 16 7 7 13 112 97 123
The length of the mobile phone games data to be encrypted is 18 characters, and the length of the original KEY is 14 characters, Original KEY described in cyclic extension obtains TESTKEYCODE123TEST, the original KEY of cyclic extension and the hand to be encrypted The length of machine game data is consistent, by each character ASCII character of TESTKEYCODE123TEST and Each character ASCII character step-by-step of IPHONEGAME12345678 carries out xor operation, as follows:
The second encryption information is obtained, it is as follows:
31 21 27 27 5 0 30 14 14 1 116 3 1 7 97 115 100 108
It is described to combine to form encryption file with second encryption information by first encryption information, described first is added The head of the encryption file is written in the length 14 of confidential information and first encryption information, by second encryption information The tail portion of the encryption file is written in length 18 and second encryption information, the encryption file is sent to terminal, eventually Termination receives encryption file, the first encryption information and the second encryption information is read, according to the rule of xor operation:Same variable with Another variable and its exclusive or value exclusive or are equal to another number, such as (a^b) ^a=b;The length for reading the first encryption information is 14, will The Hash codes HASHC carries out cyclic extension, obtains HASHCHASHCHASH, and the Hash codes after the expansion are believed with the first encryption The length of breath is consistent, by each character ASCII character of each character ASCII character of HASHCHASHCHASH and the first encryption information Step-by-step carries out xor operation, as follows:
It is TESTKEYCODE123 to obtain the original KEY, according to the rule of xor operation:Same variable and another variable It is equal to another number, such as (a^b) ^a=b with its exclusive or value exclusive or;The length for reading the second encryption information is 18, will be described original KEY cyclic extensions obtain TESTKEYCODE123TEST, the length of the original KEY of cyclic extension and second encryption information Unanimously, by each character ASCII character step-by-step of each character ASCII character of TESTKEYCODE123TEST and the second encryption information Xor operation is carried out, it is as follows:
It is IPHONEGAME12345678 to obtain mobile phone games data.
Fig. 2 is please referred to, the embodiment of the present invention three is:
A kind of system 7 to mobile phone games data ciphering and deciphering, including exploitation end 1 and terminal 4, the exploitation end 1 include First memory 2, first processor 3 and storage are on the first memory and the first computer that can be run on first processor Program, the terminal 4 include second memory 5, second processor 6 and are stored on second memory and can be in second processor The second computer program of upper operation, which is characterized in that
The first processor 3 realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
The step S2 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining the original KEY The length of Hash codes after filling is consistent with the length of original KEY, and the Hash codes after the expansion are pressed with the original KEY Position carries out xor operation, obtains first encryption information, and the Hash codes are the setting of exploitation end, and maintain secrecy undocumented character String;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed Second encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text Part is sent to terminal;
It is described first encryption information is combined with second encryption information to be formed encryption file specifically include:By institute It states the length of the first encryption information and the head for encrypting file is written in first encryption information, described second is encrypted The tail portion of the encryption file is written in the length of information and second encryption information.
The second processor 6 realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
The step S5 is specifically included:The Hash codes are carried out cycle expansion by the length for obtaining first encryption information Fill, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by after the expansion Hash codes and institute It states the first encryption information step-by-step and carries out xor operation, obtain the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone Game data.
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions, The character length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with The second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
In conclusion a kind of method and system of mobile phone games data ciphering and deciphering provided by the invention, pass through Hash codes Original KEY is encrypted to form the first encryption information, original KEY treats encrypted mobile phone games data encryption and forms the second encryption letter Breath, by first encryption file with second encryption file combine to form encryption file, terminal by Hash codes to encryption file decryption, Mobile phone games data to be encrypted are finally obtained, are coordinated without additional server-side, it is at low cost, it is encrypted and is calculated using two level Method, it is safer.
Example the above is only the implementation of the present invention is not intended to limit the scope of the invention, every to utilize this hair Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in relevant technical field, include similarly In the scope of patent protection of the present invention.

Claims (10)

1. a kind of method of mobile phone games data ciphering and deciphering, which is characterized in that including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, form second Encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, the encryption file is sent out It send to terminal;
S5, terminal receive the encryption file, and first encryption information and second encryption are read from the encryption file First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone games Data.
2. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
The step S2 is specifically included:The Hash codes are carried out cyclic extension, after expansion by the length for obtaining the original KEY Hash codes length it is consistent with the length of original KEY, by Hash codes and the original KEY step-by-steps after the expansion into Row xor operation obtains first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, the original KEY is followed Ring expands, and the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, after the expansion Original KEY carry out xor operation with the mobile phone games data step-by-step to be encrypted, obtain second encryption information.
3. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
First encryption information combined with second encryption information described in step S4 and to form encryption file and specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will be described The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
4. a kind of method of mobile phone games data ciphering and deciphering according to claim 3, which is characterized in that
First encryption information is read from the encryption file and second encryption information specifically includes described in step S5:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information, really Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
5. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
The step S5 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining first encryption information The length of Hash codes after filling is consistent with the length of the first encryption information, by the Hash codes and described first after the expansion Encryption information step-by-step carries out xor operation, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information expands the original KEY cyclic extensions The length of original KEY afterwards is consistent with the length of the second encryption information, by the original KEY and described second after the expansion Encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
6. a kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation end are deposited including first Reservoir, first processor and storage on the first memory and the first computer program that can be run on first processor, institute State terminal include second memory, second processor and be stored on second memory and can be run in second processor Two computer programs,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, form second Encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, the encryption file is sent out It send to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption information is read from the encryption file, First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone games Data.
7. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
The step S2 is specifically included:The Hash codes are carried out cyclic extension, after expansion by the length for obtaining the original KEY Hash codes length it is consistent with the length of original KEY, by Hash codes and the original KEY step-by-steps after the expansion into Row xor operation obtains first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, the original KEY is followed Ring expands, and the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, after the expansion Original KEY carry out xor operation with the mobile phone games data step-by-step to be encrypted, obtain second encryption information.
8. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
First encryption information combined with second encryption information described in step S4 and to form encryption file and specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will be described The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
9. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
First encryption information is read from the encryption file and second encryption information specifically includes described in step S5:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information, really Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
10. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
The step S5 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining first encryption information The length of Hash codes after filling is consistent with the length of the first encryption information, by the Hash codes and described first after the expansion Encryption information step-by-step carries out xor operation, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information expands the original KEY cyclic extensions The length of original KEY afterwards is consistent with the length of the second encryption information, by the original KEY and described second after the expansion Encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
CN201810182245.9A 2018-03-06 2018-03-06 A kind of method and system of mobile phone games data ciphering and deciphering Pending CN108549818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810182245.9A CN108549818A (en) 2018-03-06 2018-03-06 A kind of method and system of mobile phone games data ciphering and deciphering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810182245.9A CN108549818A (en) 2018-03-06 2018-03-06 A kind of method and system of mobile phone games data ciphering and deciphering

Publications (1)

Publication Number Publication Date
CN108549818A true CN108549818A (en) 2018-09-18

Family

ID=63516581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810182245.9A Pending CN108549818A (en) 2018-03-06 2018-03-06 A kind of method and system of mobile phone games data ciphering and deciphering

Country Status (1)

Country Link
CN (1) CN108549818A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723036A (en) * 2023-07-04 2023-09-08 上海企创信息科技有限公司 Network data transmission encryption and decryption methods, systems, terminals and media
CN120200857A (en) * 2025-05-26 2025-06-24 赛力斯汽车有限公司 Vehicle communication data encryption method, decryption method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN105376261A (en) * 2015-12-21 2016-03-02 Tcl集团股份有限公司 Encryption method and system for instant communication message
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device
CN107038383A (en) * 2016-02-03 2017-08-11 华为技术有限公司 A kind of method and apparatus of data processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device
CN105376261A (en) * 2015-12-21 2016-03-02 Tcl集团股份有限公司 Encryption method and system for instant communication message
CN107038383A (en) * 2016-02-03 2017-08-11 华为技术有限公司 A kind of method and apparatus of data processing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723036A (en) * 2023-07-04 2023-09-08 上海企创信息科技有限公司 Network data transmission encryption and decryption methods, systems, terminals and media
CN120200857A (en) * 2025-05-26 2025-06-24 赛力斯汽车有限公司 Vehicle communication data encryption method, decryption method, device and system

Similar Documents

Publication Publication Date Title
CN110008745B (en) Encryption method, computer equipment and computer storage medium
CN112035827B (en) Cipher data processing method, device, equipment and readable storage medium
CN105760764A (en) Encryption and decryption methods and devices for embedded storage device file and terminal
KR101112157B1 (en) Data Encrytion Method
KR20180081470A (en) System for hiding information using lightweight mutual authentication based on biometric in mobile environment, method thereof and computer recordable medium storing program to perform the method
CN110704854B (en) Stream type encryption method aiming at text data reserved format
Alsaffar et al. An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image
CN105119924B (en) A kind of information transferring method
CN114205142A (en) Data transmission method and device, electronic equipment and storage medium
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
CN105721134B (en) It is realized using the single whitepack with multiple external encodes
CN108549818A (en) A kind of method and system of mobile phone games data ciphering and deciphering
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN107278357B (en) Cryptographic system and method
CN105162592B (en) A kind of method and system of certification wearable device
US11276138B2 (en) Image data encryption and rendering system
CN111314052B (en) A data encryption and decryption method
KR20110101317A (en) Method and apparatus for automatic data encryption
CN109214163B (en) Identity authentication method and device
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
CN109150494B (en) Method, storage medium, device and system for constructing encryption and decryption algorithm in mobile terminal
CN106650342B (en) Jar package reinforcement method and system
CN104363584B (en) A kind of method, apparatus and terminal of short message Encrypt and Decrypt
KR101224956B1 (en) Method and device for cipher-deciphering data automatically
CN106330961A (en) Encryption method of important resources of mobile game client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180918

RJ01 Rejection of invention patent application after publication