[go: up one dir, main page]

CN110138739A - Data information encryption method, device, computer equipment and storage medium - Google Patents

Data information encryption method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110138739A
CN110138739A CN201910299382.5A CN201910299382A CN110138739A CN 110138739 A CN110138739 A CN 110138739A CN 201910299382 A CN201910299382 A CN 201910299382A CN 110138739 A CN110138739 A CN 110138739A
Authority
CN
China
Prior art keywords
information
encryption
data information
key
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910299382.5A
Other languages
Chinese (zh)
Other versions
CN110138739B (en
Inventor
张猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910299382.5A priority Critical patent/CN110138739B/en
Publication of CN110138739A publication Critical patent/CN110138739A/en
Application granted granted Critical
Publication of CN110138739B publication Critical patent/CN110138739B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses data information encryption method, device, computer equipment and storage mediums.If method includes: the information sending request for receiving user and being inputted, according to preset symmetric cryptography Rule code key to be encrypted to obtain encryption information to the data information in the information sending request;Public key and private key are generated according to preset asymmetric code key create-rule and the code key is encrypted according to the public key to obtain encryption code key;The encryption information, encryption code key, public key are integrated to obtain encrypted characters string according to preset information Integrated Models;Conversion process is carried out to obtain ciphered data information to obtained encrypted characters string according to preset conversion process model.The present invention is based on multi-enciphering technologies, substantially enhance the safety coefficient of data information, can be avoided data information and cause to reveal during being transmitted, achieve good technical effect in actual application.

Description

Data information encryption method, device, computer equipment and storage medium
Technical field
The present invention relates to field of computer technology more particularly to a kind of data information encryption methods, device, computer equipment And storage medium.
Background technique
Application program need to usually send the important informations such as log-on message, payment information during carrying out data interaction, Therefore it is transmitted again after need to being encrypted to important information, traditional information cipher mode mostly uses symmetric cryptography.However it is symmetrical There is the risk being easily cracked in encryption, traditional cipher mode has that safety coefficient is lower in the prior art, is easy The leakage that important information is caused when transmitting to information brings the risk of information leakage to enterprises and individuals.It is thus existing Data information encryption method has that safety coefficient is not high.
Summary of the invention
The embodiment of the invention provides a kind of data information encryption method, device, computer equipment and storage mediums, it is intended to Solve the problems, such as that safety coefficient present in data information encryption method is not high in art methods.
In a first aspect, the embodiment of the invention provides a kind of data information encryption methods comprising:
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute The data information in information sending request is stated to be encrypted to obtain encryption information;
According to preset asymmetric code key create-rule generate public key and private key and according to the public key to the code key into Row encryption is to obtain encryption code key;
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models Character string;
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model Information.
Second aspect, the embodiment of the invention provides a kind of data information encryption devices comprising:
Symmetric cryptography unit, if the information sending request inputted for receiving user, according to preset symmetric cryptography Rule code key to the data information in the information sending request to be encrypted to obtain encryption information;
Code key generation unit is encrypted, for generating public key and private key and basis according to preset asymmetric code key create-rule The public key encrypts the code key to obtain encryption code key;
Information integral unit, for according to preset information Integrated Models to the encryption information, encryption code key, public key into Row integration is to obtain encrypted characters string;
Character string converting unit, for being converted according to preset conversion process model to obtained encrypted characters string Processing is to obtain ciphered data information.
The third aspect, the embodiment of the present invention provide a kind of computer equipment again comprising memory, processor and storage On the memory and the computer program that can run on the processor, the processor execute the computer program Data information encryption method described in the above-mentioned first aspect of Shi Shixian.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, wherein the computer can It reads storage medium and is stored with computer program, it is above-mentioned that the computer program when being executed by a processor executes the processor Data information encryption method described in first aspect.
The embodiment of the invention provides a kind of data information encryption method, device, computer equipment and storage mediums.Pass through It obtains secret key pair data information to be encrypted to obtain encryption information, public key and private is generated by asymmetric code key create-rule Key, and code key is encrypted by public key to obtain encryption code key, encryption information, encryption code key and public key are integrated, turned It changes and finally obtains ciphered data information.Data information is encrypted by above-mentioned data information encryption method, is substantially enhanced The safety coefficient of data information can be avoided data information and cause to reveal during being transmitted, in actual application In achieve good technical effect.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 2 is the sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 3 is another sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 4 is another sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 5 is another flow diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 6 is the schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 7 is the subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 8 is another subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 9 is another subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Figure 10 is another schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Figure 11 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, Fig. 1 is the flow diagram of data information encryption method provided in an embodiment of the present invention.The data Information ciphering method is applied in user terminal, and this method is executed by the application software being installed in user terminal, uses Family terminal is the terminal device encrypted for executing data information encryption method with data information, such as desktop computer, Laptop, tablet computer or mobile phone etc..
As shown in Figure 1, the method comprising the steps of S110~S140.
If S110, receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key To be encrypted to obtain encryption information to the data information in the information sending request.
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute The data information in information sending request is stated to be encrypted to obtain encryption information.Specifically, information sending request is that user is logical Cross the solicited message that user terminal is inputted, the data information comprising transmission needed for user in information sending request, data information It can be the landing request information inputted when user logs in client software by user terminal or user be soft by client The important letters such as payment information (including the information such as payment cipher), personally identifiable information (comprising information such as identification card numbers) that part is submitted Breath, wherein landing request information includes the information such as user name, login password.Landing request information need to be sent to server by user End, which is just able to achieve, carries out data interaction with server end, is easy to be trapped and leads to information if directly send by data information Leakage, brings very big security risk to user, therefore need to be encrypted data information to be added by symmetric cryptography rule Confidential information.
Wherein, symmetric cryptography rule is the Rule Information for obtaining code key to be encrypted to data information, is passed through Encryption information can be obtained after being encrypted in secret key pair data information.
In one embodiment, as shown in Fig. 2, step S110 includes sub-step S111 and S112.
S111, according to the logon account information of the symmetric cryptography Rule current system to obtain code key.
According to the logon account information of predetermined encryption Rule current system to obtain code key.Specifically, current system Logon account information be user login operation system (such as Windows operating system) secure identifier information (SID letter Breath), the logon account information of current system is obtained, encodes to obtain the code key of symmetric cryptography by Hash.
S112, the data information according to the secret key pair carry out AES symmetric cryptography to obtain encryption information.
According to data information described in the secret key pair carry out AES (Advanced Encryption Standard, it is advanced plus Data Encryption Standard) symmetric cryptography to be to obtain encryption information.Specifically, AES symmetric encipherment algorithm first transports data information by matrix The byte matrix that multiple 4 × 4 are obtained after calculation, by each byte matrix in such a way that nonlinear replacement function is using look-up table Included in byte be substituted for corresponding literary name section, then multiple byte matrixes comprising literary name section are repeated to go for nine times Displacement, column are obscured and are taken turns code key operation (each of matrix byte all does XOR operation with the next round code key), finally obtain Byte matrix carry out line position shifting and wheel code key operation finally obtain encryption information.By the obtained encryption information of secret key pair into The primary data information (pdi) of unencryption can be obtained in row decryption processing.
S120, public key and private key are generated and according to the public key to described secret according to preset asymmetric code key create-rule Key is encrypted to obtain encryption code key.
Public key and private key are generated according to preset asymmetric code key create-rule and is stored, according to the public key to institute Code key is stated to be encrypted to obtain encryption code key.Presetting asymmetric code key create-rule is the rule for generating public key and private key The characteristics of then information, asymmetric encryption, can be encrypted to information by public key, and encrypted information need to pass through public key and private Key, which combines, to be decrypted.
Specifically, by preset asymmetric code key create-rule generate public key and private key the specific steps are choose two It is a be greater than 100 prime number p, q, calculate N=p × q;According to Euler's function, acquire Selection one is less than the integer e of r, keeps e relatively prime with r;Acquire mould antielement d of the e about r.Wherein, the calculation of mould antielement Are as follows: two positive integers e and r are relatively prime, then can centainly find integer d, so that e × d-1 is divided exactly by r, e × d is removed by r in other words Remainder be 1.At this moment, d is mould antielement of the e about r, and calculation formula is ed ≡ 1 (mod r).Finally obtained (N, e) i.e. It is public key generated, (N, d) is private key generated.Public key, which can be transmitted, carries out data interaction with user terminal to all Communication ends, the private key of generation then need to be stored to prevent stopping leak dew.According to c ≡ ne(modN) carrying out calculating can be to required encryption Information n encrypted to obtain encryption information c;According to c0d≡ne-d(modN) encryption information n can be solved by carrying out calculating It is close to obtain raw information c0
S130, the encryption information, encryption code key, public key are integrated to obtain according to preset information Integrated Models Encrypted characters string.
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models Character string.Specifically, including coding rule and Binary Conversion rule in information Integrated Models.
In one embodiment, as shown in figure 3, step S130 includes sub-step S131, S132 and S133.
S131, the encryption information and encryption code key are carried out according to the coding rule in the information Integrated Models Base64 is encoded to obtain scrambled information and code key encoded information.
Base64 volume is carried out to the encryption information and encryption code key according to the coding rule in the information Integrated Models Code is to obtain scrambled information and code key encoded information.Due to during carrying out information transmission, part spcial character without Method is transmitted, therefore need to carry out Base64 coding to encryption information to obtain scrambled information, is carried out to encryption code key Base64 is encoded to obtain code key encoded information.
Specifically, the spcial character that can not be transmitted includes the characters such as newline, carriage return, backspace.Base64 is encoded It is that will use American Standard Code for Information Interchange (American Standard Code forInformation Interchange, U.S. information Exchange standard code) encryption information that is recorded and encryption code key be converted to A-Z, a-z, 0-9 ,+,/this 64 character visibles To indicate binary data.
S132, the public key is converted to obtain two according to the Binary Conversion rule in the information Integrated Models System public key information.
The public key is converted to obtain binary system according to the Binary Conversion rule in the information Integrated Models Public key information.To increase the safety in data transmission procedure, public key need to be converted into binary system public key information and be stored in text In information.Wherein, Binary Conversion rule is for data information to be converted to the binary system being indicated with " 0 " and " 1 " The Rule Information of data.
S133, the scrambled information, the code key encoded information and the binary system public key information are spliced To obtain encrypted characters string.
The scrambled information, the code key encoded information and the binary system public key information are spliced to obtain Encrypted characters string.It in the specific use process, can also be public in the code information, code key encoded information and binary system spliced Parameter preset information is added in key information, encrypted characters string can be obtained after being spliced to the information of required splicing.
S140, conversion process is carried out to obtained encrypted characters string to be encrypted according to preset conversion process model Data information.
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model Information.Specifically, including endorse rule and transformation of ownership rule in conversion process model, rule of endorsing is for carrying out to character string The Rule Information endorsed, can be obtained character string of endorsing after endorsing to character string, transformation of ownership rule is for word of endorsing Symbol string carries out the Rule Information of the transformation of ownership, and ciphered data information can be obtained after carrying out the transformation of ownership.It wherein, include message in rule of endorsing Abstract, the server end for receiving data information of accordingly endorsing can believe received encryption data by corresponding message digest Breath carries out sign test, with the integrality for the data information that ensures to endorse received by server end.
In one embodiment, as shown in figure 4, step S140 includes sub-step S141 and S142.
S141, it is endorsed the encrypted characters string to be added according to the rule of endorsing in the conversion process model Sign character string.
It is endorsed the encrypted characters string to be endorsed according to the rule of endorsing in the string processing model Character string.Specifically, including message digest in rule of endorsing, endorse to encrypted characters string (can be breathed out by SHA256 algorithm Uncommon value size is 256 algorithms) it is realized, the specific steps are splitting encrypted characters string, and pass through message digest It is the integral multiple of 256 (bit) by the character string polishing after fractionation.
S142, obtained character string of endorsing is formatted according to the transformation of ownership rule in the conversion process model To obtain ciphered data information.
According to the transformation of ownership rule in the string processing model to obtained character string of endorsing format with Obtain ciphered data information.Specifically, transformation of ownership rule is the rule for the format for character string of endorsing to be converted to utf-8 format Data information is converted to utf-8 format and sent, that is, the transmitting efficiency of data information can be improved by then information.Encrypt number It is believed that breath is stored and transmitted in the form of character string, ciphered data information is converted to by the transformation of ownership rule character string that will endorse Later, server end can be sent to by http communication agreement (hypertext transfer protocol).
In one embodiment, as shown in figure 5, further including step S150 and S160 after step S140.
S150, the ciphered data information is sent to according to the transmission address information in the information sending request it is described Send the corresponding server end of address information.
The ciphered data information is sent to the transmission according to the transmission address information in the information sending request The corresponding server end of address information.It will be endorsed after character string is converted to ciphered data information by transformation of ownership rule, Ji Ketong It crosses TTTP communication protocol and is sent to server end.Specifically, further including sending address information in information sending request, address is sent Information is to receive the corresponding network address information of server end (IP address) of ciphered data information, by sending address information Ciphered data information can be sent to corresponding server end, to complete to encrypt data information in information sending request And it sends.
S160, the message digest in the rule of endorsing is sent to the server end.
Message digest in the rule of endorsing is sent to the server end.To add to received by server end The integrality of ciphertext data information is verified, and can also the message digest in rule of endorsing be sent to server end, server end It, can be by message digest to the complete of received ciphered data information after receiving message digest transmitted by user terminal Whole property is verified.
It is encrypted by obtaining secret key pair data information to obtain encryption information, it is raw by asymmetric code key create-rule Encrypted to obtain encryption code key to code key at public key and private key, and by public key, by encryption information, encryption code key and public key into Row integration, conversion finally obtain ciphered data information.Data information is encrypted by above-mentioned data information encryption method, greatly Width enhances the safety coefficient of data information, can be avoided data information and causes to reveal during being transmitted, in reality Good technical effect is achieved in application process.
The embodiment of the present invention also provides a kind of data information encryption device, and the data information encryption device is aforementioned for executing Any embodiment of data information encryption method.Specifically, referring to Fig. 6, Fig. 6 is data information provided in an embodiment of the present invention The schematic block diagram of encryption device.The data information encryption device can be configured at desktop computer, laptop, tablet computer Or in the user terminals such as mobile phone.
As shown in fig. 6, data information encryption device 100 include symmetric cryptography unit 110, encryption code key generation unit 120, Information integral unit 130 and character string converting unit 140.
Symmetric cryptography unit 110 is used for symmetric cryptography unit, if asking for receiving the information transmission that user is inputted It asks, according to preset symmetric cryptography Rule code key to be encrypted to obtain to the data information in the information sending request Encryption information.
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute The data information in information sending request is stated to be encrypted to obtain encryption information.Specifically, information sending request is that user is logical Cross the solicited message that user terminal is inputted, the data information comprising transmission needed for user in information sending request, data information It can be the landing request information inputted when user logs in client software by user terminal or user be soft by client The important letters such as payment information (including the information such as payment cipher), personally identifiable information (comprising information such as identification card numbers) that part is submitted Breath, wherein landing request information includes the information such as user name, login password.Landing request information need to be sent to server by user End, which is just able to achieve, carries out data interaction with server end, is easy to be trapped and leads to information if directly send by data information Leakage, brings very big security risk to user, therefore need to be encrypted data information to be added by symmetric cryptography rule Confidential information.
Wherein, symmetric cryptography rule is the Rule Information for obtaining code key to be encrypted to data information, is passed through Encryption information can be obtained after being encrypted in secret key pair data information.
In other inventive embodiments, as shown in fig. 7, the symmetric cryptography unit 110 includes subelement: code key acquiring unit 111 and information symmetrical encryption unit 112.
Code key acquiring unit 111, for according to the logon account information of the symmetric cryptography Rule current system with Obtain code key.
According to the logon account information of predetermined encryption Rule current system to obtain code key.Specifically, current system Logon account information be user login operation system (such as Windows operating system) secure identifier information (SID letter Breath), the logon account information of current system is obtained, encodes to obtain the code key of symmetric cryptography by Hash.
Information symmetrical encryption unit 112 carries out AES symmetric cryptography for the data information according to the secret key pair to obtain To encryption information.
According to data information described in the secret key pair carry out AES (Advanced Encryption Standard, it is advanced plus Data Encryption Standard) symmetric cryptography to be to obtain encryption information.Specifically, AES symmetric encipherment algorithm first transports data information by matrix The byte matrix that multiple 4 × 4 are obtained after calculation, by each byte matrix in such a way that nonlinear replacement function is using look-up table Included in byte be substituted for corresponding literary name section, then multiple byte matrixes comprising literary name section are repeated to go for nine times Displacement, column are obscured and are taken turns code key operation (each of matrix byte all does XOR operation with the next round code key), finally obtain Byte matrix carry out line position shifting and wheel code key operation finally obtain encryption information.By the obtained encryption information of secret key pair into The primary data information (pdi) of unencryption can be obtained in row decryption processing.
Code key generation unit 120 is encrypted, for generating public key and private key simultaneously according to preset asymmetric code key create-rule The code key is encrypted according to the public key to obtain encryption code key.
Public key and private key are generated according to preset asymmetric code key create-rule and is stored, according to the public key to institute Code key is stated to be encrypted to obtain encryption code key.Presetting asymmetric code key create-rule is the rule for generating public key and private key The characteristics of then information, asymmetric encryption, can be encrypted to information by public key, and encrypted information need to pass through public key and private Key, which combines, to be decrypted.
Specifically, by preset asymmetric code key create-rule generate public key and private key the specific steps are choose two It is a be greater than 100 prime number p, q, calculate N=p × q;According to Euler's function, acquire Selection one is less than the integer e of r, keeps e relatively prime with r;Acquire mould antielement d of the e about r.Wherein, the calculation of mould antielement Are as follows: two positive integers e and r are relatively prime, then can centainly find integer d, so that e × d-1 is divided exactly by r, e × d is removed by r in other words Remainder be 1.At this moment, d is mould antielement of the e about r, and calculation formula is ed ≡ 1 (mod r).Finally obtained (N, e) i.e. It is public key generated, (N, d) is private key generated.Public key, which can be transmitted, carries out data interaction with user terminal to all Communication ends, the private key of generation then need to be stored to prevent stopping leak dew.According to c ≡ ne(modN) carrying out calculating can be to required encryption Information n encrypted to obtain encryption information c;According to c0d≡ne-d(modN) encryption information n can be solved by carrying out calculating It is close to obtain raw information c0
Information integral unit 130 is used for according to preset information Integrated Models to the encryption information, encryption code key, public affairs Key is integrated to obtain encrypted characters string.
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models Character string.Specifically, including coding rule and Binary Conversion rule in information Integrated Models.
In other inventive embodiments, as shown in figure 8, the information integral unit 130 includes subelement: information coding unit 131, Binary Conversion unit 132 and information concatenation unit 133.
Information coding unit 131, for according to the coding rule in the information Integrated Models to the encryption information and It encrypts code key and carries out Base64 coding to obtain scrambled information and code key encoded information.
Base64 volume is carried out to the encryption information and encryption code key according to the coding rule in the information Integrated Models Code is to obtain scrambled information and code key encoded information.Due to during carrying out information transmission, part spcial character without Method is transmitted, therefore need to carry out Base64 coding to encryption information to obtain scrambled information, is carried out to encryption code key Base64 is encoded to obtain code key encoded information.
Specifically, the spcial character that can not be transmitted includes the characters such as newline, carriage return, backspace.Base64 is encoded It is that will use American Standard Code for Information Interchange (American Standard Code forInformation Interchange, U.S. information Exchange standard code) encryption information that is recorded and encryption code key be converted to A-Z, a-z, 0-9 ,+,/this 64 character visibles To indicate binary data.
Binary Conversion unit 132, for according to the Binary Conversion rule in the information Integrated Models to the public affairs Key is converted to obtain binary system public key information.
The public key is converted to obtain binary system according to the Binary Conversion rule in the information Integrated Models Public key information.To increase the safety in data transmission procedure, public key need to be converted into binary system public key information and be stored in text In information.Wherein, Binary Conversion rule is for data information to be converted to the binary system being indicated with " 0 " and " 1 " The Rule Information of data.
Information concatenation unit 133, for public to the scrambled information, the code key encoded information and the binary system Key information is spliced to obtain encrypted characters string.
The scrambled information, the code key encoded information and the binary system public key information are spliced to obtain Encrypted characters string.It in the specific use process, can also be public in the code information, code key encoded information and binary system spliced Parameter preset information is added in key information, encrypted characters string can be obtained after being spliced to the information of required splicing.
Character string converting unit 140, for being carried out according to preset conversion process model to obtained encrypted characters string Conversion process is to obtain ciphered data information.
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model Information.Specifically, including endorse rule and transformation of ownership rule in conversion process model, rule of endorsing is for carrying out to character string The Rule Information endorsed, can be obtained character string of endorsing after endorsing to character string, transformation of ownership rule is for word of endorsing Symbol string carries out the Rule Information of the transformation of ownership, and ciphered data information can be obtained after carrying out the transformation of ownership.It wherein, include message in rule of endorsing Abstract, the server end for receiving data information of accordingly endorsing can believe received encryption data by corresponding message digest Breath carries out sign test, with the integrality for the data information that ensures to endorse received by server end.
In other inventive embodiments, as shown in figure 9, the character string converting unit 140 includes subelement: endorsing and handle list Member 141 and format conversion processing unit 142.
Endorse processing unit 141, for according to the rule of endorsing in the conversion process model to the encrypted characters string It endorses to obtain character string of endorsing.
It is endorsed the encrypted characters string to be endorsed according to the rule of endorsing in the string processing model Character string.Specifically, including message digest in rule of endorsing, endorse to encrypted characters string (can be breathed out by SHA256 algorithm Uncommon value size is 256 algorithms) it is realized, the specific steps are splitting encrypted characters string, and pass through message digest It is the integral multiple of 256 (bit) by the character string polishing after fractionation.
Format conversion processing unit 142, for being added according to the transformation of ownership rule in the conversion process model to obtained Label character string is formatted to obtain ciphered data information.
According to the transformation of ownership rule in the string processing model to obtained character string of endorsing format with Obtain ciphered data information.Specifically, transformation of ownership rule is the rule for the format for character string of endorsing to be converted to utf-8 format Data information is converted to utf-8 format and sent, that is, the transmitting efficiency of data information can be improved by then information.Encrypt number It is believed that breath is stored and transmitted in the form of character string, ciphered data information is converted to by the transformation of ownership rule character string that will endorse Later, server end can be sent to by http communication agreement (hypertext transfer protocol).
In other inventive embodiments, as shown in Figure 10, the data information encryption device 100 further includes subelement: encryption Data information transmission unit 150 and message digest transmission unit 160.
Ciphered data information transmission unit 150, for according to the transmission address information in the information sending request by institute It states ciphered data information and is sent to the corresponding server end of the transmission address information.
The ciphered data information is sent to the transmission according to the transmission address information in the information sending request The corresponding server end of address information.It will be endorsed after character string is converted to ciphered data information by transformation of ownership rule, Ji Ketong It crosses TTTP communication protocol and is sent to server end.Specifically, further including sending address information in information sending request, address is sent Information is to receive the corresponding network address information of server end (IP address) of ciphered data information, by sending address information Ciphered data information can be sent to corresponding server end, to complete to encrypt data information in information sending request And it sends.
Message digest transmission unit 160, for the message digest in the rule of endorsing to be sent to the server end.
Message digest in the rule of endorsing is sent to the server end.To add to received by server end The integrality of ciphertext data information is verified, and can also the message digest in rule of endorsing be sent to server end, server end It, can be by message digest to the complete of received ciphered data information after receiving message digest transmitted by user terminal Whole property is verified.
It is encrypted by obtaining secret key pair data information to obtain encryption information, it is raw by asymmetric code key create-rule Encrypted to obtain encryption code key to code key at public key and private key, and by public key, by encryption information, encryption code key and public key into Row integration, conversion finally obtain ciphered data information.Data information is encrypted by above-mentioned data information encryption method, greatly Width enhances the safety coefficient of data information, can be avoided data information and causes to reveal during being transmitted, in reality Good technical effect is achieved in application process.
Above-mentioned data information encryption device can be implemented as the form of computer program, which can such as scheme It is run in computer equipment shown in 11.
Figure 11 is please referred to, Figure 11 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Refering to fig. 11, which includes processor 502, memory and the net connected by system bus 501 Network interface 505, wherein memory may include non-volatile memory medium 503 and built-in storage 504.
The non-volatile memory medium 503 can storage program area 5031 and computer program 5032.The computer program 5032 are performed, and processor 502 may make to execute data information encryption method.
The processor 502 supports the operation of entire computer equipment 500 for providing calculating and control ability.
The built-in storage 504 provides environment for the operation of the computer program 5032 in non-volatile memory medium 503, should When computer program 5032 is executed by processor 502, processor 502 may make to execute data information encryption method.
The network interface 505 is for carrying out network communication, such as the transmission of offer data information.Those skilled in the art can To understand, structure shown in Figure 11, only the block diagram of part-structure relevant to the present invention program, is not constituted to this hair The restriction for the computer equipment 500 that bright scheme is applied thereon, specific computer equipment 500 may include than as shown in the figure More or fewer components perhaps combine certain components or with different component layouts.
Wherein, the processor 502 is for running computer program 5032 stored in memory, to realize following function Can: if receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to the letter The data information that breath is sent in request is encrypted to obtain encryption information;It is generated according to preset asymmetric code key create-rule public Key and private key simultaneously encrypt the code key according to the public key to obtain encryption code key;According to preset information Integrated Models The encryption information, encryption code key, public key are integrated to obtain encrypted characters string;According to preset conversion process model pair Obtained encrypted characters string carries out conversion process to obtain ciphered data information.
In one embodiment, if processor 502 is executing the information sending request for receiving user and being inputted, according to default Symmetric cryptography Rule code key to be encrypted to obtain encryption information to the data information in the information sending request It when step, performs the following operations: according to the logon account information of the symmetric cryptography Rule current system to obtain code key; AES symmetric cryptography is carried out according to data information described in the secret key pair to obtain encryption information.
In one embodiment, processor 502 is being executed according to preset information Integrated Models to the encryption information, encryption It when code key, public key are integrated to obtain the step of encrypted characters string, performs the following operations: according in the information Integrated Models Coding rule Base64 coding carried out to the encryption information and encryption code key encoded with obtaining scrambled information and code key Information;The public key is converted according to the Binary Conversion rule in the information Integrated Models to obtain binary system public key Information;The scrambled information, the code key encoded information and the binary system public key information are spliced to be added Close character string.
In one embodiment, processor 502 is being executed according to preset conversion process model to obtained encrypted characters When string carries out conversion process to obtain the step of ciphered data information, perform the following operations: according in the conversion process model Endorse rule endorse the encrypted characters string to obtain character string of endorsing;According to turning in the conversion process model System rule formats to obtain ciphered data information obtained character string of endorsing.
In one embodiment, processor 502 is being executed according to preset conversion process model to obtained encrypted characters It after string carries out the step of conversion process is to obtain ciphered data information, also performs the following operations: being asked according to information transmission The ciphered data information is sent to the corresponding server end of the default transmission address information by the transmission address information in asking; Message digest in the rule of endorsing is sent to the server end.
It will be understood by those skilled in the art that the embodiment of computer equipment shown in Figure 11 is not constituted to computer The restriction of equipment specific composition, in other embodiments, computer equipment may include components more more or fewer than diagram, or Person combines certain components or different component layouts.For example, in some embodiments, computer equipment can only include depositing Reservoir and processor, in such embodiments, the structure and function of memory and processor are consistent with embodiment illustrated in fig. 11, Details are not described herein.
It should be appreciated that in embodiments of the present invention, processor 502 can be central processing unit (Central ProcessingUnit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or The processor is also possible to any conventional processor etc..
Computer readable storage medium is provided in another embodiment of the invention.The computer readable storage medium can be with For non-volatile computer readable storage medium.The computer-readable recording medium storage has computer program, wherein calculating If machine program performs the steps of when being executed by processor receives the information sending request that user is inputted, according to preset Symmetric cryptography Rule code key to the data information in the information sending request to be encrypted to obtain encryption information;According to Preset asymmetric code key create-rule generates public key and private key and is encrypted the code key to obtain according to the public key Encrypt code key;The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models Character string;Conversion process is carried out to obtained encrypted characters string according to preset conversion process model to obtain encryption data letter Breath.
In one embodiment, if the information sending request for receiving user and being inputted, according to preset symmetric cryptography Rule code key is to be encrypted the step of obtaining encryption information to the data information in the information sending request, comprising: According to the logon account information of the symmetric cryptography Rule current system to obtain code key;The number according to the secret key pair It is believed that breath carries out AES symmetric cryptography to obtain encryption information.
In one embodiment, it is described according to preset information Integrated Models to the encryption information, encryption code key, public key into The step of row integration is to obtain encrypted characters string, comprising: according to the coding rule in the information Integrated Models to the encryption Information and encryption code key carry out Base64 coding to obtain scrambled information and code key encoded information;It is integrated according to the information Binary Conversion rule in model is converted the public key to obtain binary system public key information;The scrambled is believed Breath, the code key encoded information and the binary system public key information are spliced to obtain encrypted characters string.
In one embodiment, described that obtained encrypted characters string is carried out at conversion according to preset conversion process model The step of reason is to obtain ciphered data information, comprising: according to the rule of endorsing in the conversion process model to the encrypted word Symbol string is endorsed to obtain character string of endorsing;According to the transformation of ownership rule in the conversion process model to obtained word of endorsing Symbol string is formatted to obtain ciphered data information.
In one embodiment, described that obtained encrypted characters string is carried out at conversion according to preset conversion process model After the step of reason is to obtain ciphered data information, further includes: will according to the transmission address information in the information sending request The ciphered data information is sent to the corresponding server end of the default transmission address information;By the report in the rule of endorsing Digest will be sent to the server end.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is set The specific work process of standby, device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein. Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm Step can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and software Interchangeability generally describes each exemplary composition and step according to function in the above description.These functions are studied carefully Unexpectedly the specific application and design constraint depending on technical solution are implemented in hardware or software.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In several embodiments provided by the present invention, it should be understood that disclosed unit and method, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only logical function partition, there may be another division manner in actual implementation, can also will be with the same function Unit set is at a unit, such as multiple units or components can be combined or can be integrated into another system or some Feature can be ignored, or not execute.In addition, shown or discussed mutual coupling, direct-coupling or communication connection can Be through some interfaces, the indirect coupling or communication connection of device or unit, be also possible to electricity, mechanical or other shapes Formula connection.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a computer readable storage medium, including some instructions are used so that one Platform computer equipment (can be personal computer, server or the network equipment etc.) executes described in each embodiment of the present invention The all or part of the steps of method.And computer readable storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory The various media that can store program code such as (ROM, Read-OnlyMemory), magnetic or disk.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of data information encryption method characterized by comprising
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to the letter The data information that breath is sent in request is encrypted to obtain encryption information;
Public key and private key are generated according to preset asymmetric code key create-rule and the code key is added according to the public key It is close with obtain encryption code key;
The encryption information, encryption code key, public key are integrated to obtain encrypted characters according to preset information Integrated Models String;
Conversion process is carried out to obtain ciphered data information to obtained encrypted characters string according to preset conversion process model.
2. data information encryption method according to claim 1, which is characterized in that described to be advised according to preset symmetric cryptography Obtain code key then to be encrypted to obtain encryption information to the data information in the information sending request, comprising:
According to the logon account information of the symmetric cryptography Rule current system to obtain code key;
AES symmetric cryptography is carried out according to data information described in the secret key pair to obtain encryption information.
3. data information encryption method according to claim 1, which is characterized in that described to integrate mould according to preset information Type integrates to obtain encrypted characters string the encryption information, encryption code key, public key, comprising:
According to the coding rule in the information Integrated Models to the encryption information and encryption code key carry out Base64 coding with Obtain scrambled information and code key encoded information;
The public key is converted according to the Binary Conversion rule in the information Integrated Models to obtain binary system public key Information;
The scrambled information, the code key encoded information and the binary system public key information are spliced to be encrypted Character string.
4. data information encryption method according to claim 1, which is characterized in that described according to preset conversion process mould Type carries out conversion process to obtained encrypted characters string to obtain ciphered data information, comprising:
It is endorsed the encrypted characters string to obtain character string of endorsing according to the rule of endorsing in the conversion process model;
Obtained character string of endorsing is formatted to be added according to the transformation of ownership rule in the conversion process model Ciphertext data information.
5. data information encryption method according to claim 4, which is characterized in that described according to preset conversion process mould Type obtains obtained encrypted characters string progress conversion process after ciphered data information, further includes:
The ciphered data information is sent to the default transmission according to the transmission address information in the information sending request The corresponding server end of address information;
Message digest in the rule of endorsing is sent to the server end.
6. a kind of data information encryption device characterized by comprising
Symmetric cryptography unit, if the information sending request inputted for receiving user, according to preset symmetric cryptography rule Code key is obtained to be encrypted to obtain encryption information to the data information in the information sending request;
Code key generation unit is encrypted, for generating public key and private key according to preset asymmetric code key create-rule and according to described Public key encrypts the code key to obtain encryption code key;
Information integral unit, it is whole for being carried out according to preset information Integrated Models to the encryption information, encryption code key, public key It closes to obtain encrypted characters string;
Character string converting unit, for carrying out conversion process to obtained encrypted characters string according to preset conversion process model To obtain ciphered data information.
7. data information encryption device according to claim 6, which is characterized in that the symmetric cryptography unit, comprising:
Code key acquiring unit, for secret to obtain according to the logon account information of the symmetric cryptography Rule current system Key;
Information symmetrical encryption unit carries out AES symmetric cryptography for the data information according to the secret key pair to be encrypted Information.
8. data information encryption device according to claim 6, which is characterized in that the information integral unit, comprising:
Information coding unit, for the encryption information and encrypting code key according to the coding rule in the information Integrated Models Base64 coding is carried out to obtain scrambled information and code key encoded information;
Binary Conversion unit, for being turned according to the Binary Conversion rule in the information Integrated Models to the public key It changes to obtain binary system public key information;
Information concatenation unit, for the scrambled information, the code key encoded information and the binary system public key information Spliced to obtain encrypted characters string.
9. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program Any one of described in data information encryption method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program make the processor execute such as number described in any one of claim 1 to 5 when being executed by a processor According to information ciphering method.
CN201910299382.5A 2019-04-15 2019-04-15 Data information encryption method and device, computer equipment and storage medium Active CN110138739B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910299382.5A CN110138739B (en) 2019-04-15 2019-04-15 Data information encryption method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910299382.5A CN110138739B (en) 2019-04-15 2019-04-15 Data information encryption method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110138739A true CN110138739A (en) 2019-08-16
CN110138739B CN110138739B (en) 2023-04-18

Family

ID=67569685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910299382.5A Active CN110138739B (en) 2019-04-15 2019-04-15 Data information encryption method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110138739B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738513A (en) * 2019-09-11 2020-01-31 完美世界(北京)软件科技发展有限公司 method and device for generating and verifying redemption codes
CN111866018A (en) * 2020-07-30 2020-10-30 平安国际智慧城市科技股份有限公司 Data information encryption transmission method and device, computer equipment and storage medium
CN112329044A (en) * 2020-11-23 2021-02-05 北京沃东天骏信息技术有限公司 Information acquisition method and device, electronic equipment and computer readable medium
CN112738051A (en) * 2020-12-24 2021-04-30 深圳赛安特技术服务有限公司 Data information encryption method, system and computer readable storage medium
CN113407860A (en) * 2021-05-07 2021-09-17 浙江工业大学 Privacy protection-based multi-social platform user recommendation method and system
CN116633683A (en) * 2023-07-18 2023-08-22 中国人民解放军国防科技大学 Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation
CN116781384A (en) * 2023-07-14 2023-09-19 建信金融科技有限责任公司 Request data processing method, device and server
CN116976884A (en) * 2023-08-06 2023-10-31 唐山骅驰科技有限责任公司 A transaction data processing method based on cloud storage and NFC

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222501A (en) * 2017-07-06 2017-09-29 中国电子科技集团公司第二十九研究所 A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
WO2018176781A1 (en) * 2017-04-01 2018-10-04 广东欧珀移动通信有限公司 Information sending method, information receiving method, apparatus, and system
CN108769027A (en) * 2018-05-31 2018-11-06 深圳壹账通智能科技有限公司 Safety communicating method, device, mobile terminal and storage medium
US20180322311A1 (en) * 2016-02-18 2018-11-08 Canon Kabushiki Kaisha Information processing system, information processing device, server device, method of controlling information processing system, and program
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN109474619A (en) * 2018-12-17 2019-03-15 中国平安财产保险股份有限公司 Data encryption report method and device, data decryption method and device
CN109495252A (en) * 2018-12-04 2019-03-19 深圳前海环融联易信息科技服务有限公司 Data ciphering method, device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180322311A1 (en) * 2016-02-18 2018-11-08 Canon Kabushiki Kaisha Information processing system, information processing device, server device, method of controlling information processing system, and program
WO2018176781A1 (en) * 2017-04-01 2018-10-04 广东欧珀移动通信有限公司 Information sending method, information receiving method, apparatus, and system
CN107222501A (en) * 2017-07-06 2017-09-29 中国电子科技集团公司第二十九研究所 A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
CN108769027A (en) * 2018-05-31 2018-11-06 深圳壹账通智能科技有限公司 Safety communicating method, device, mobile terminal and storage medium
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN109495252A (en) * 2018-12-04 2019-03-19 深圳前海环融联易信息科技服务有限公司 Data ciphering method, device, computer equipment and storage medium
CN109474619A (en) * 2018-12-17 2019-03-15 中国平安财产保险股份有限公司 Data encryption report method and device, data decryption method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738513A (en) * 2019-09-11 2020-01-31 完美世界(北京)软件科技发展有限公司 method and device for generating and verifying redemption codes
CN111866018A (en) * 2020-07-30 2020-10-30 平安国际智慧城市科技股份有限公司 Data information encryption transmission method and device, computer equipment and storage medium
CN112329044A (en) * 2020-11-23 2021-02-05 北京沃东天骏信息技术有限公司 Information acquisition method and device, electronic equipment and computer readable medium
CN112738051A (en) * 2020-12-24 2021-04-30 深圳赛安特技术服务有限公司 Data information encryption method, system and computer readable storage medium
CN112738051B (en) * 2020-12-24 2023-12-01 深圳赛安特技术服务有限公司 Data information encryption method, system and computer readable storage medium
CN113407860A (en) * 2021-05-07 2021-09-17 浙江工业大学 Privacy protection-based multi-social platform user recommendation method and system
CN116781384A (en) * 2023-07-14 2023-09-19 建信金融科技有限责任公司 Request data processing method, device and server
CN116633683A (en) * 2023-07-18 2023-08-22 中国人民解放军国防科技大学 Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation
CN116633683B (en) * 2023-07-18 2023-11-03 中国人民解放军国防科技大学 Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation
CN116976884A (en) * 2023-08-06 2023-10-31 唐山骅驰科技有限责任公司 A transaction data processing method based on cloud storage and NFC

Also Published As

Publication number Publication date
CN110138739B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN110138739A (en) Data information encryption method, device, computer equipment and storage medium
US10122710B2 (en) Binding a data transaction to a person's identity using biometrics
US10437469B2 (en) Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad
US8892881B2 (en) Split key secure access system
CN101677269B (en) Method and system for transmitting keys
JPH0823330A (en) Safe data communication
WO2013091348A1 (en) Encryption and decryption method based on proxy, network apparatus, network device, and system
US8533493B1 (en) Method of securing transmission data
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN118174967B (en) Information verification method and related equipment
CN106911663A (en) One kind sells bank's full message encryption system and method for mixed mode directly to households
US20120017086A1 (en) Information security transmission system
CN103500294B (en) A kind of file encryption-decryption method and device
CN110311892A (en) A kind of data capture method and server
US20240322914A1 (en) Quantum secure direct communication method and apparatus based on one-way transmission, device and system
CN114500037B (en) Configurable interface encryption method and device, computer equipment and storage medium
CN118199992B (en) Data encryption method and device, electronic equipment and storage medium
CN109743305A (en) Method for realizing application text data protection in intelligent dialogue system application
CN118509227A (en) Data transmission method, device and system
CN114679312B (en) Encryption method, electronic device, and computer-readable storage medium
CN106375327A (en) A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks
CN102238150A (en) Form registration method and server
CN117371050A (en) Modifiable electronic medical record sharing method and system based on chameleon hash
CN111212068B (en) Method for encrypting and decrypting characters by input method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant