CN110138739A - Data information encryption method, device, computer equipment and storage medium - Google Patents
Data information encryption method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110138739A CN110138739A CN201910299382.5A CN201910299382A CN110138739A CN 110138739 A CN110138739 A CN 110138739A CN 201910299382 A CN201910299382 A CN 201910299382A CN 110138739 A CN110138739 A CN 110138739A
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- data information
- key
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 238000006243 chemical reaction Methods 0.000 claims abstract description 64
- 230000008569 process Effects 0.000 claims abstract description 49
- 230000005540 biological transmission Effects 0.000 claims description 26
- 229910002056 binary alloy Inorganic materials 0.000 claims description 21
- 230000009466 transformation Effects 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 14
- 230000000694 effects Effects 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 16
- 238000012545 processing Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 11
- 239000011159 matrix material Substances 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 230000010354 integration Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 238000005194 fractionation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005498 polishing Methods 0.000 description 2
- 238000001629 sign test Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000032258 transport Effects 0.000 description 2
- 238000000151 deposition Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses data information encryption method, device, computer equipment and storage mediums.If method includes: the information sending request for receiving user and being inputted, according to preset symmetric cryptography Rule code key to be encrypted to obtain encryption information to the data information in the information sending request;Public key and private key are generated according to preset asymmetric code key create-rule and the code key is encrypted according to the public key to obtain encryption code key;The encryption information, encryption code key, public key are integrated to obtain encrypted characters string according to preset information Integrated Models;Conversion process is carried out to obtain ciphered data information to obtained encrypted characters string according to preset conversion process model.The present invention is based on multi-enciphering technologies, substantially enhance the safety coefficient of data information, can be avoided data information and cause to reveal during being transmitted, achieve good technical effect in actual application.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of data information encryption methods, device, computer equipment
And storage medium.
Background technique
Application program need to usually send the important informations such as log-on message, payment information during carrying out data interaction,
Therefore it is transmitted again after need to being encrypted to important information, traditional information cipher mode mostly uses symmetric cryptography.However it is symmetrical
There is the risk being easily cracked in encryption, traditional cipher mode has that safety coefficient is lower in the prior art, is easy
The leakage that important information is caused when transmitting to information brings the risk of information leakage to enterprises and individuals.It is thus existing
Data information encryption method has that safety coefficient is not high.
Summary of the invention
The embodiment of the invention provides a kind of data information encryption method, device, computer equipment and storage mediums, it is intended to
Solve the problems, such as that safety coefficient present in data information encryption method is not high in art methods.
In a first aspect, the embodiment of the invention provides a kind of data information encryption methods comprising:
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute
The data information in information sending request is stated to be encrypted to obtain encryption information;
According to preset asymmetric code key create-rule generate public key and private key and according to the public key to the code key into
Row encryption is to obtain encryption code key;
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models
Character string;
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model
Information.
Second aspect, the embodiment of the invention provides a kind of data information encryption devices comprising:
Symmetric cryptography unit, if the information sending request inputted for receiving user, according to preset symmetric cryptography
Rule code key to the data information in the information sending request to be encrypted to obtain encryption information;
Code key generation unit is encrypted, for generating public key and private key and basis according to preset asymmetric code key create-rule
The public key encrypts the code key to obtain encryption code key;
Information integral unit, for according to preset information Integrated Models to the encryption information, encryption code key, public key into
Row integration is to obtain encrypted characters string;
Character string converting unit, for being converted according to preset conversion process model to obtained encrypted characters string
Processing is to obtain ciphered data information.
The third aspect, the embodiment of the present invention provide a kind of computer equipment again comprising memory, processor and storage
On the memory and the computer program that can run on the processor, the processor execute the computer program
Data information encryption method described in the above-mentioned first aspect of Shi Shixian.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, wherein the computer can
It reads storage medium and is stored with computer program, it is above-mentioned that the computer program when being executed by a processor executes the processor
Data information encryption method described in first aspect.
The embodiment of the invention provides a kind of data information encryption method, device, computer equipment and storage mediums.Pass through
It obtains secret key pair data information to be encrypted to obtain encryption information, public key and private is generated by asymmetric code key create-rule
Key, and code key is encrypted by public key to obtain encryption code key, encryption information, encryption code key and public key are integrated, turned
It changes and finally obtains ciphered data information.Data information is encrypted by above-mentioned data information encryption method, is substantially enhanced
The safety coefficient of data information can be avoided data information and cause to reveal during being transmitted, in actual application
In achieve good technical effect.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 2 is the sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 3 is another sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 4 is another sub-process schematic diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 5 is another flow diagram of data information encryption method provided in an embodiment of the present invention;
Fig. 6 is the schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 7 is the subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 8 is another subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Fig. 9 is another subelement schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Figure 10 is another schematic block diagram of data information encryption device provided in an embodiment of the present invention;
Figure 11 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, Fig. 1 is the flow diagram of data information encryption method provided in an embodiment of the present invention.The data
Information ciphering method is applied in user terminal, and this method is executed by the application software being installed in user terminal, uses
Family terminal is the terminal device encrypted for executing data information encryption method with data information, such as desktop computer,
Laptop, tablet computer or mobile phone etc..
As shown in Figure 1, the method comprising the steps of S110~S140.
If S110, receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key
To be encrypted to obtain encryption information to the data information in the information sending request.
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute
The data information in information sending request is stated to be encrypted to obtain encryption information.Specifically, information sending request is that user is logical
Cross the solicited message that user terminal is inputted, the data information comprising transmission needed for user in information sending request, data information
It can be the landing request information inputted when user logs in client software by user terminal or user be soft by client
The important letters such as payment information (including the information such as payment cipher), personally identifiable information (comprising information such as identification card numbers) that part is submitted
Breath, wherein landing request information includes the information such as user name, login password.Landing request information need to be sent to server by user
End, which is just able to achieve, carries out data interaction with server end, is easy to be trapped and leads to information if directly send by data information
Leakage, brings very big security risk to user, therefore need to be encrypted data information to be added by symmetric cryptography rule
Confidential information.
Wherein, symmetric cryptography rule is the Rule Information for obtaining code key to be encrypted to data information, is passed through
Encryption information can be obtained after being encrypted in secret key pair data information.
In one embodiment, as shown in Fig. 2, step S110 includes sub-step S111 and S112.
S111, according to the logon account information of the symmetric cryptography Rule current system to obtain code key.
According to the logon account information of predetermined encryption Rule current system to obtain code key.Specifically, current system
Logon account information be user login operation system (such as Windows operating system) secure identifier information (SID letter
Breath), the logon account information of current system is obtained, encodes to obtain the code key of symmetric cryptography by Hash.
S112, the data information according to the secret key pair carry out AES symmetric cryptography to obtain encryption information.
According to data information described in the secret key pair carry out AES (Advanced Encryption Standard, it is advanced plus
Data Encryption Standard) symmetric cryptography to be to obtain encryption information.Specifically, AES symmetric encipherment algorithm first transports data information by matrix
The byte matrix that multiple 4 × 4 are obtained after calculation, by each byte matrix in such a way that nonlinear replacement function is using look-up table
Included in byte be substituted for corresponding literary name section, then multiple byte matrixes comprising literary name section are repeated to go for nine times
Displacement, column are obscured and are taken turns code key operation (each of matrix byte all does XOR operation with the next round code key), finally obtain
Byte matrix carry out line position shifting and wheel code key operation finally obtain encryption information.By the obtained encryption information of secret key pair into
The primary data information (pdi) of unencryption can be obtained in row decryption processing.
S120, public key and private key are generated and according to the public key to described secret according to preset asymmetric code key create-rule
Key is encrypted to obtain encryption code key.
Public key and private key are generated according to preset asymmetric code key create-rule and is stored, according to the public key to institute
Code key is stated to be encrypted to obtain encryption code key.Presetting asymmetric code key create-rule is the rule for generating public key and private key
The characteristics of then information, asymmetric encryption, can be encrypted to information by public key, and encrypted information need to pass through public key and private
Key, which combines, to be decrypted.
Specifically, by preset asymmetric code key create-rule generate public key and private key the specific steps are choose two
It is a be greater than 100 prime number p, q, calculate N=p × q;According to Euler's function, acquire
Selection one is less than the integer e of r, keeps e relatively prime with r;Acquire mould antielement d of the e about r.Wherein, the calculation of mould antielement
Are as follows: two positive integers e and r are relatively prime, then can centainly find integer d, so that e × d-1 is divided exactly by r, e × d is removed by r in other words
Remainder be 1.At this moment, d is mould antielement of the e about r, and calculation formula is ed ≡ 1 (mod r).Finally obtained (N, e) i.e.
It is public key generated, (N, d) is private key generated.Public key, which can be transmitted, carries out data interaction with user terminal to all
Communication ends, the private key of generation then need to be stored to prevent stopping leak dew.According to c ≡ ne(modN) carrying out calculating can be to required encryption
Information n encrypted to obtain encryption information c;According to c0d≡ne-d(modN) encryption information n can be solved by carrying out calculating
It is close to obtain raw information c0。
S130, the encryption information, encryption code key, public key are integrated to obtain according to preset information Integrated Models
Encrypted characters string.
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models
Character string.Specifically, including coding rule and Binary Conversion rule in information Integrated Models.
In one embodiment, as shown in figure 3, step S130 includes sub-step S131, S132 and S133.
S131, the encryption information and encryption code key are carried out according to the coding rule in the information Integrated Models
Base64 is encoded to obtain scrambled information and code key encoded information.
Base64 volume is carried out to the encryption information and encryption code key according to the coding rule in the information Integrated Models
Code is to obtain scrambled information and code key encoded information.Due to during carrying out information transmission, part spcial character without
Method is transmitted, therefore need to carry out Base64 coding to encryption information to obtain scrambled information, is carried out to encryption code key
Base64 is encoded to obtain code key encoded information.
Specifically, the spcial character that can not be transmitted includes the characters such as newline, carriage return, backspace.Base64 is encoded
It is that will use American Standard Code for Information Interchange (American Standard Code forInformation Interchange, U.S. information
Exchange standard code) encryption information that is recorded and encryption code key be converted to A-Z, a-z, 0-9 ,+,/this 64 character visibles
To indicate binary data.
S132, the public key is converted to obtain two according to the Binary Conversion rule in the information Integrated Models
System public key information.
The public key is converted to obtain binary system according to the Binary Conversion rule in the information Integrated Models
Public key information.To increase the safety in data transmission procedure, public key need to be converted into binary system public key information and be stored in text
In information.Wherein, Binary Conversion rule is for data information to be converted to the binary system being indicated with " 0 " and " 1 "
The Rule Information of data.
S133, the scrambled information, the code key encoded information and the binary system public key information are spliced
To obtain encrypted characters string.
The scrambled information, the code key encoded information and the binary system public key information are spliced to obtain
Encrypted characters string.It in the specific use process, can also be public in the code information, code key encoded information and binary system spliced
Parameter preset information is added in key information, encrypted characters string can be obtained after being spliced to the information of required splicing.
S140, conversion process is carried out to obtained encrypted characters string to be encrypted according to preset conversion process model
Data information.
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model
Information.Specifically, including endorse rule and transformation of ownership rule in conversion process model, rule of endorsing is for carrying out to character string
The Rule Information endorsed, can be obtained character string of endorsing after endorsing to character string, transformation of ownership rule is for word of endorsing
Symbol string carries out the Rule Information of the transformation of ownership, and ciphered data information can be obtained after carrying out the transformation of ownership.It wherein, include message in rule of endorsing
Abstract, the server end for receiving data information of accordingly endorsing can believe received encryption data by corresponding message digest
Breath carries out sign test, with the integrality for the data information that ensures to endorse received by server end.
In one embodiment, as shown in figure 4, step S140 includes sub-step S141 and S142.
S141, it is endorsed the encrypted characters string to be added according to the rule of endorsing in the conversion process model
Sign character string.
It is endorsed the encrypted characters string to be endorsed according to the rule of endorsing in the string processing model
Character string.Specifically, including message digest in rule of endorsing, endorse to encrypted characters string (can be breathed out by SHA256 algorithm
Uncommon value size is 256 algorithms) it is realized, the specific steps are splitting encrypted characters string, and pass through message digest
It is the integral multiple of 256 (bit) by the character string polishing after fractionation.
S142, obtained character string of endorsing is formatted according to the transformation of ownership rule in the conversion process model
To obtain ciphered data information.
According to the transformation of ownership rule in the string processing model to obtained character string of endorsing format with
Obtain ciphered data information.Specifically, transformation of ownership rule is the rule for the format for character string of endorsing to be converted to utf-8 format
Data information is converted to utf-8 format and sent, that is, the transmitting efficiency of data information can be improved by then information.Encrypt number
It is believed that breath is stored and transmitted in the form of character string, ciphered data information is converted to by the transformation of ownership rule character string that will endorse
Later, server end can be sent to by http communication agreement (hypertext transfer protocol).
In one embodiment, as shown in figure 5, further including step S150 and S160 after step S140.
S150, the ciphered data information is sent to according to the transmission address information in the information sending request it is described
Send the corresponding server end of address information.
The ciphered data information is sent to the transmission according to the transmission address information in the information sending request
The corresponding server end of address information.It will be endorsed after character string is converted to ciphered data information by transformation of ownership rule, Ji Ketong
It crosses TTTP communication protocol and is sent to server end.Specifically, further including sending address information in information sending request, address is sent
Information is to receive the corresponding network address information of server end (IP address) of ciphered data information, by sending address information
Ciphered data information can be sent to corresponding server end, to complete to encrypt data information in information sending request
And it sends.
S160, the message digest in the rule of endorsing is sent to the server end.
Message digest in the rule of endorsing is sent to the server end.To add to received by server end
The integrality of ciphertext data information is verified, and can also the message digest in rule of endorsing be sent to server end, server end
It, can be by message digest to the complete of received ciphered data information after receiving message digest transmitted by user terminal
Whole property is verified.
It is encrypted by obtaining secret key pair data information to obtain encryption information, it is raw by asymmetric code key create-rule
Encrypted to obtain encryption code key to code key at public key and private key, and by public key, by encryption information, encryption code key and public key into
Row integration, conversion finally obtain ciphered data information.Data information is encrypted by above-mentioned data information encryption method, greatly
Width enhances the safety coefficient of data information, can be avoided data information and causes to reveal during being transmitted, in reality
Good technical effect is achieved in application process.
The embodiment of the present invention also provides a kind of data information encryption device, and the data information encryption device is aforementioned for executing
Any embodiment of data information encryption method.Specifically, referring to Fig. 6, Fig. 6 is data information provided in an embodiment of the present invention
The schematic block diagram of encryption device.The data information encryption device can be configured at desktop computer, laptop, tablet computer
Or in the user terminals such as mobile phone.
As shown in fig. 6, data information encryption device 100 include symmetric cryptography unit 110, encryption code key generation unit 120,
Information integral unit 130 and character string converting unit 140.
Symmetric cryptography unit 110 is used for symmetric cryptography unit, if asking for receiving the information transmission that user is inputted
It asks, according to preset symmetric cryptography Rule code key to be encrypted to obtain to the data information in the information sending request
Encryption information.
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to institute
The data information in information sending request is stated to be encrypted to obtain encryption information.Specifically, information sending request is that user is logical
Cross the solicited message that user terminal is inputted, the data information comprising transmission needed for user in information sending request, data information
It can be the landing request information inputted when user logs in client software by user terminal or user be soft by client
The important letters such as payment information (including the information such as payment cipher), personally identifiable information (comprising information such as identification card numbers) that part is submitted
Breath, wherein landing request information includes the information such as user name, login password.Landing request information need to be sent to server by user
End, which is just able to achieve, carries out data interaction with server end, is easy to be trapped and leads to information if directly send by data information
Leakage, brings very big security risk to user, therefore need to be encrypted data information to be added by symmetric cryptography rule
Confidential information.
Wherein, symmetric cryptography rule is the Rule Information for obtaining code key to be encrypted to data information, is passed through
Encryption information can be obtained after being encrypted in secret key pair data information.
In other inventive embodiments, as shown in fig. 7, the symmetric cryptography unit 110 includes subelement: code key acquiring unit
111 and information symmetrical encryption unit 112.
Code key acquiring unit 111, for according to the logon account information of the symmetric cryptography Rule current system with
Obtain code key.
According to the logon account information of predetermined encryption Rule current system to obtain code key.Specifically, current system
Logon account information be user login operation system (such as Windows operating system) secure identifier information (SID letter
Breath), the logon account information of current system is obtained, encodes to obtain the code key of symmetric cryptography by Hash.
Information symmetrical encryption unit 112 carries out AES symmetric cryptography for the data information according to the secret key pair to obtain
To encryption information.
According to data information described in the secret key pair carry out AES (Advanced Encryption Standard, it is advanced plus
Data Encryption Standard) symmetric cryptography to be to obtain encryption information.Specifically, AES symmetric encipherment algorithm first transports data information by matrix
The byte matrix that multiple 4 × 4 are obtained after calculation, by each byte matrix in such a way that nonlinear replacement function is using look-up table
Included in byte be substituted for corresponding literary name section, then multiple byte matrixes comprising literary name section are repeated to go for nine times
Displacement, column are obscured and are taken turns code key operation (each of matrix byte all does XOR operation with the next round code key), finally obtain
Byte matrix carry out line position shifting and wheel code key operation finally obtain encryption information.By the obtained encryption information of secret key pair into
The primary data information (pdi) of unencryption can be obtained in row decryption processing.
Code key generation unit 120 is encrypted, for generating public key and private key simultaneously according to preset asymmetric code key create-rule
The code key is encrypted according to the public key to obtain encryption code key.
Public key and private key are generated according to preset asymmetric code key create-rule and is stored, according to the public key to institute
Code key is stated to be encrypted to obtain encryption code key.Presetting asymmetric code key create-rule is the rule for generating public key and private key
The characteristics of then information, asymmetric encryption, can be encrypted to information by public key, and encrypted information need to pass through public key and private
Key, which combines, to be decrypted.
Specifically, by preset asymmetric code key create-rule generate public key and private key the specific steps are choose two
It is a be greater than 100 prime number p, q, calculate N=p × q;According to Euler's function, acquire
Selection one is less than the integer e of r, keeps e relatively prime with r;Acquire mould antielement d of the e about r.Wherein, the calculation of mould antielement
Are as follows: two positive integers e and r are relatively prime, then can centainly find integer d, so that e × d-1 is divided exactly by r, e × d is removed by r in other words
Remainder be 1.At this moment, d is mould antielement of the e about r, and calculation formula is ed ≡ 1 (mod r).Finally obtained (N, e) i.e.
It is public key generated, (N, d) is private key generated.Public key, which can be transmitted, carries out data interaction with user terminal to all
Communication ends, the private key of generation then need to be stored to prevent stopping leak dew.According to c ≡ ne(modN) carrying out calculating can be to required encryption
Information n encrypted to obtain encryption information c;According to c0d≡ne-d(modN) encryption information n can be solved by carrying out calculating
It is close to obtain raw information c0。
Information integral unit 130 is used for according to preset information Integrated Models to the encryption information, encryption code key, public affairs
Key is integrated to obtain encrypted characters string.
The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models
Character string.Specifically, including coding rule and Binary Conversion rule in information Integrated Models.
In other inventive embodiments, as shown in figure 8, the information integral unit 130 includes subelement: information coding unit
131, Binary Conversion unit 132 and information concatenation unit 133.
Information coding unit 131, for according to the coding rule in the information Integrated Models to the encryption information and
It encrypts code key and carries out Base64 coding to obtain scrambled information and code key encoded information.
Base64 volume is carried out to the encryption information and encryption code key according to the coding rule in the information Integrated Models
Code is to obtain scrambled information and code key encoded information.Due to during carrying out information transmission, part spcial character without
Method is transmitted, therefore need to carry out Base64 coding to encryption information to obtain scrambled information, is carried out to encryption code key
Base64 is encoded to obtain code key encoded information.
Specifically, the spcial character that can not be transmitted includes the characters such as newline, carriage return, backspace.Base64 is encoded
It is that will use American Standard Code for Information Interchange (American Standard Code forInformation Interchange, U.S. information
Exchange standard code) encryption information that is recorded and encryption code key be converted to A-Z, a-z, 0-9 ,+,/this 64 character visibles
To indicate binary data.
Binary Conversion unit 132, for according to the Binary Conversion rule in the information Integrated Models to the public affairs
Key is converted to obtain binary system public key information.
The public key is converted to obtain binary system according to the Binary Conversion rule in the information Integrated Models
Public key information.To increase the safety in data transmission procedure, public key need to be converted into binary system public key information and be stored in text
In information.Wherein, Binary Conversion rule is for data information to be converted to the binary system being indicated with " 0 " and " 1 "
The Rule Information of data.
Information concatenation unit 133, for public to the scrambled information, the code key encoded information and the binary system
Key information is spliced to obtain encrypted characters string.
The scrambled information, the code key encoded information and the binary system public key information are spliced to obtain
Encrypted characters string.It in the specific use process, can also be public in the code information, code key encoded information and binary system spliced
Parameter preset information is added in key information, encrypted characters string can be obtained after being spliced to the information of required splicing.
Character string converting unit 140, for being carried out according to preset conversion process model to obtained encrypted characters string
Conversion process is to obtain ciphered data information.
Conversion process is carried out to obtain encryption data to obtained encrypted characters string according to preset conversion process model
Information.Specifically, including endorse rule and transformation of ownership rule in conversion process model, rule of endorsing is for carrying out to character string
The Rule Information endorsed, can be obtained character string of endorsing after endorsing to character string, transformation of ownership rule is for word of endorsing
Symbol string carries out the Rule Information of the transformation of ownership, and ciphered data information can be obtained after carrying out the transformation of ownership.It wherein, include message in rule of endorsing
Abstract, the server end for receiving data information of accordingly endorsing can believe received encryption data by corresponding message digest
Breath carries out sign test, with the integrality for the data information that ensures to endorse received by server end.
In other inventive embodiments, as shown in figure 9, the character string converting unit 140 includes subelement: endorsing and handle list
Member 141 and format conversion processing unit 142.
Endorse processing unit 141, for according to the rule of endorsing in the conversion process model to the encrypted characters string
It endorses to obtain character string of endorsing.
It is endorsed the encrypted characters string to be endorsed according to the rule of endorsing in the string processing model
Character string.Specifically, including message digest in rule of endorsing, endorse to encrypted characters string (can be breathed out by SHA256 algorithm
Uncommon value size is 256 algorithms) it is realized, the specific steps are splitting encrypted characters string, and pass through message digest
It is the integral multiple of 256 (bit) by the character string polishing after fractionation.
Format conversion processing unit 142, for being added according to the transformation of ownership rule in the conversion process model to obtained
Label character string is formatted to obtain ciphered data information.
According to the transformation of ownership rule in the string processing model to obtained character string of endorsing format with
Obtain ciphered data information.Specifically, transformation of ownership rule is the rule for the format for character string of endorsing to be converted to utf-8 format
Data information is converted to utf-8 format and sent, that is, the transmitting efficiency of data information can be improved by then information.Encrypt number
It is believed that breath is stored and transmitted in the form of character string, ciphered data information is converted to by the transformation of ownership rule character string that will endorse
Later, server end can be sent to by http communication agreement (hypertext transfer protocol).
In other inventive embodiments, as shown in Figure 10, the data information encryption device 100 further includes subelement: encryption
Data information transmission unit 150 and message digest transmission unit 160.
Ciphered data information transmission unit 150, for according to the transmission address information in the information sending request by institute
It states ciphered data information and is sent to the corresponding server end of the transmission address information.
The ciphered data information is sent to the transmission according to the transmission address information in the information sending request
The corresponding server end of address information.It will be endorsed after character string is converted to ciphered data information by transformation of ownership rule, Ji Ketong
It crosses TTTP communication protocol and is sent to server end.Specifically, further including sending address information in information sending request, address is sent
Information is to receive the corresponding network address information of server end (IP address) of ciphered data information, by sending address information
Ciphered data information can be sent to corresponding server end, to complete to encrypt data information in information sending request
And it sends.
Message digest transmission unit 160, for the message digest in the rule of endorsing to be sent to the server end.
Message digest in the rule of endorsing is sent to the server end.To add to received by server end
The integrality of ciphertext data information is verified, and can also the message digest in rule of endorsing be sent to server end, server end
It, can be by message digest to the complete of received ciphered data information after receiving message digest transmitted by user terminal
Whole property is verified.
It is encrypted by obtaining secret key pair data information to obtain encryption information, it is raw by asymmetric code key create-rule
Encrypted to obtain encryption code key to code key at public key and private key, and by public key, by encryption information, encryption code key and public key into
Row integration, conversion finally obtain ciphered data information.Data information is encrypted by above-mentioned data information encryption method, greatly
Width enhances the safety coefficient of data information, can be avoided data information and causes to reveal during being transmitted, in reality
Good technical effect is achieved in application process.
Above-mentioned data information encryption device can be implemented as the form of computer program, which can such as scheme
It is run in computer equipment shown in 11.
Figure 11 is please referred to, Figure 11 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Refering to fig. 11, which includes processor 502, memory and the net connected by system bus 501
Network interface 505, wherein memory may include non-volatile memory medium 503 and built-in storage 504.
The non-volatile memory medium 503 can storage program area 5031 and computer program 5032.The computer program
5032 are performed, and processor 502 may make to execute data information encryption method.
The processor 502 supports the operation of entire computer equipment 500 for providing calculating and control ability.
The built-in storage 504 provides environment for the operation of the computer program 5032 in non-volatile memory medium 503, should
When computer program 5032 is executed by processor 502, processor 502 may make to execute data information encryption method.
The network interface 505 is for carrying out network communication, such as the transmission of offer data information.Those skilled in the art can
To understand, structure shown in Figure 11, only the block diagram of part-structure relevant to the present invention program, is not constituted to this hair
The restriction for the computer equipment 500 that bright scheme is applied thereon, specific computer equipment 500 may include than as shown in the figure
More or fewer components perhaps combine certain components or with different component layouts.
Wherein, the processor 502 is for running computer program 5032 stored in memory, to realize following function
Can: if receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to the letter
The data information that breath is sent in request is encrypted to obtain encryption information;It is generated according to preset asymmetric code key create-rule public
Key and private key simultaneously encrypt the code key according to the public key to obtain encryption code key;According to preset information Integrated Models
The encryption information, encryption code key, public key are integrated to obtain encrypted characters string;According to preset conversion process model pair
Obtained encrypted characters string carries out conversion process to obtain ciphered data information.
In one embodiment, if processor 502 is executing the information sending request for receiving user and being inputted, according to default
Symmetric cryptography Rule code key to be encrypted to obtain encryption information to the data information in the information sending request
It when step, performs the following operations: according to the logon account information of the symmetric cryptography Rule current system to obtain code key;
AES symmetric cryptography is carried out according to data information described in the secret key pair to obtain encryption information.
In one embodiment, processor 502 is being executed according to preset information Integrated Models to the encryption information, encryption
It when code key, public key are integrated to obtain the step of encrypted characters string, performs the following operations: according in the information Integrated Models
Coding rule Base64 coding carried out to the encryption information and encryption code key encoded with obtaining scrambled information and code key
Information;The public key is converted according to the Binary Conversion rule in the information Integrated Models to obtain binary system public key
Information;The scrambled information, the code key encoded information and the binary system public key information are spliced to be added
Close character string.
In one embodiment, processor 502 is being executed according to preset conversion process model to obtained encrypted characters
When string carries out conversion process to obtain the step of ciphered data information, perform the following operations: according in the conversion process model
Endorse rule endorse the encrypted characters string to obtain character string of endorsing;According to turning in the conversion process model
System rule formats to obtain ciphered data information obtained character string of endorsing.
In one embodiment, processor 502 is being executed according to preset conversion process model to obtained encrypted characters
It after string carries out the step of conversion process is to obtain ciphered data information, also performs the following operations: being asked according to information transmission
The ciphered data information is sent to the corresponding server end of the default transmission address information by the transmission address information in asking;
Message digest in the rule of endorsing is sent to the server end.
It will be understood by those skilled in the art that the embodiment of computer equipment shown in Figure 11 is not constituted to computer
The restriction of equipment specific composition, in other embodiments, computer equipment may include components more more or fewer than diagram, or
Person combines certain components or different component layouts.For example, in some embodiments, computer equipment can only include depositing
Reservoir and processor, in such embodiments, the structure and function of memory and processor are consistent with embodiment illustrated in fig. 11,
Details are not described herein.
It should be appreciated that in embodiments of the present invention, processor 502 can be central processing unit (Central
ProcessingUnit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices
Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or
The processor is also possible to any conventional processor etc..
Computer readable storage medium is provided in another embodiment of the invention.The computer readable storage medium can be with
For non-volatile computer readable storage medium.The computer-readable recording medium storage has computer program, wherein calculating
If machine program performs the steps of when being executed by processor receives the information sending request that user is inputted, according to preset
Symmetric cryptography Rule code key to the data information in the information sending request to be encrypted to obtain encryption information;According to
Preset asymmetric code key create-rule generates public key and private key and is encrypted the code key to obtain according to the public key
Encrypt code key;The encryption information, encryption code key, public key are integrated to be encrypted according to preset information Integrated Models
Character string;Conversion process is carried out to obtained encrypted characters string according to preset conversion process model to obtain encryption data letter
Breath.
In one embodiment, if the information sending request for receiving user and being inputted, according to preset symmetric cryptography
Rule code key is to be encrypted the step of obtaining encryption information to the data information in the information sending request, comprising:
According to the logon account information of the symmetric cryptography Rule current system to obtain code key;The number according to the secret key pair
It is believed that breath carries out AES symmetric cryptography to obtain encryption information.
In one embodiment, it is described according to preset information Integrated Models to the encryption information, encryption code key, public key into
The step of row integration is to obtain encrypted characters string, comprising: according to the coding rule in the information Integrated Models to the encryption
Information and encryption code key carry out Base64 coding to obtain scrambled information and code key encoded information;It is integrated according to the information
Binary Conversion rule in model is converted the public key to obtain binary system public key information;The scrambled is believed
Breath, the code key encoded information and the binary system public key information are spliced to obtain encrypted characters string.
In one embodiment, described that obtained encrypted characters string is carried out at conversion according to preset conversion process model
The step of reason is to obtain ciphered data information, comprising: according to the rule of endorsing in the conversion process model to the encrypted word
Symbol string is endorsed to obtain character string of endorsing;According to the transformation of ownership rule in the conversion process model to obtained word of endorsing
Symbol string is formatted to obtain ciphered data information.
In one embodiment, described that obtained encrypted characters string is carried out at conversion according to preset conversion process model
After the step of reason is to obtain ciphered data information, further includes: will according to the transmission address information in the information sending request
The ciphered data information is sent to the corresponding server end of the default transmission address information;By the report in the rule of endorsing
Digest will be sent to the server end.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is set
The specific work process of standby, device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm
Step can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and software
Interchangeability generally describes each exemplary composition and step according to function in the above description.These functions are studied carefully
Unexpectedly the specific application and design constraint depending on technical solution are implemented in hardware or software.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In several embodiments provided by the present invention, it should be understood that disclosed unit and method, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only logical function partition, there may be another division manner in actual implementation, can also will be with the same function
Unit set is at a unit, such as multiple units or components can be combined or can be integrated into another system or some
Feature can be ignored, or not execute.In addition, shown or discussed mutual coupling, direct-coupling or communication connection can
Be through some interfaces, the indirect coupling or communication connection of device or unit, be also possible to electricity, mechanical or other shapes
Formula connection.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a computer readable storage medium, including some instructions are used so that one
Platform computer equipment (can be personal computer, server or the network equipment etc.) executes described in each embodiment of the present invention
The all or part of the steps of method.And computer readable storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory
The various media that can store program code such as (ROM, Read-OnlyMemory), magnetic or disk.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection scope subject to.
Claims (10)
1. a kind of data information encryption method characterized by comprising
If receiving the information sending request that user is inputted, according to preset symmetric cryptography Rule code key to the letter
The data information that breath is sent in request is encrypted to obtain encryption information;
Public key and private key are generated according to preset asymmetric code key create-rule and the code key is added according to the public key
It is close with obtain encryption code key;
The encryption information, encryption code key, public key are integrated to obtain encrypted characters according to preset information Integrated Models
String;
Conversion process is carried out to obtain ciphered data information to obtained encrypted characters string according to preset conversion process model.
2. data information encryption method according to claim 1, which is characterized in that described to be advised according to preset symmetric cryptography
Obtain code key then to be encrypted to obtain encryption information to the data information in the information sending request, comprising:
According to the logon account information of the symmetric cryptography Rule current system to obtain code key;
AES symmetric cryptography is carried out according to data information described in the secret key pair to obtain encryption information.
3. data information encryption method according to claim 1, which is characterized in that described to integrate mould according to preset information
Type integrates to obtain encrypted characters string the encryption information, encryption code key, public key, comprising:
According to the coding rule in the information Integrated Models to the encryption information and encryption code key carry out Base64 coding with
Obtain scrambled information and code key encoded information;
The public key is converted according to the Binary Conversion rule in the information Integrated Models to obtain binary system public key
Information;
The scrambled information, the code key encoded information and the binary system public key information are spliced to be encrypted
Character string.
4. data information encryption method according to claim 1, which is characterized in that described according to preset conversion process mould
Type carries out conversion process to obtained encrypted characters string to obtain ciphered data information, comprising:
It is endorsed the encrypted characters string to obtain character string of endorsing according to the rule of endorsing in the conversion process model;
Obtained character string of endorsing is formatted to be added according to the transformation of ownership rule in the conversion process model
Ciphertext data information.
5. data information encryption method according to claim 4, which is characterized in that described according to preset conversion process mould
Type obtains obtained encrypted characters string progress conversion process after ciphered data information, further includes:
The ciphered data information is sent to the default transmission according to the transmission address information in the information sending request
The corresponding server end of address information;
Message digest in the rule of endorsing is sent to the server end.
6. a kind of data information encryption device characterized by comprising
Symmetric cryptography unit, if the information sending request inputted for receiving user, according to preset symmetric cryptography rule
Code key is obtained to be encrypted to obtain encryption information to the data information in the information sending request;
Code key generation unit is encrypted, for generating public key and private key according to preset asymmetric code key create-rule and according to described
Public key encrypts the code key to obtain encryption code key;
Information integral unit, it is whole for being carried out according to preset information Integrated Models to the encryption information, encryption code key, public key
It closes to obtain encrypted characters string;
Character string converting unit, for carrying out conversion process to obtained encrypted characters string according to preset conversion process model
To obtain ciphered data information.
7. data information encryption device according to claim 6, which is characterized in that the symmetric cryptography unit, comprising:
Code key acquiring unit, for secret to obtain according to the logon account information of the symmetric cryptography Rule current system
Key;
Information symmetrical encryption unit carries out AES symmetric cryptography for the data information according to the secret key pair to be encrypted
Information.
8. data information encryption device according to claim 6, which is characterized in that the information integral unit, comprising:
Information coding unit, for the encryption information and encrypting code key according to the coding rule in the information Integrated Models
Base64 coding is carried out to obtain scrambled information and code key encoded information;
Binary Conversion unit, for being turned according to the Binary Conversion rule in the information Integrated Models to the public key
It changes to obtain binary system public key information;
Information concatenation unit, for the scrambled information, the code key encoded information and the binary system public key information
Spliced to obtain encrypted characters string.
9. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program
Any one of described in data information encryption method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program make the processor execute such as number described in any one of claim 1 to 5 when being executed by a processor
According to information ciphering method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910299382.5A CN110138739B (en) | 2019-04-15 | 2019-04-15 | Data information encryption method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910299382.5A CN110138739B (en) | 2019-04-15 | 2019-04-15 | Data information encryption method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110138739A true CN110138739A (en) | 2019-08-16 |
CN110138739B CN110138739B (en) | 2023-04-18 |
Family
ID=67569685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910299382.5A Active CN110138739B (en) | 2019-04-15 | 2019-04-15 | Data information encryption method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110138739B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110738513A (en) * | 2019-09-11 | 2020-01-31 | 完美世界(北京)软件科技发展有限公司 | method and device for generating and verifying redemption codes |
CN111866018A (en) * | 2020-07-30 | 2020-10-30 | 平安国际智慧城市科技股份有限公司 | Data information encryption transmission method and device, computer equipment and storage medium |
CN112329044A (en) * | 2020-11-23 | 2021-02-05 | 北京沃东天骏信息技术有限公司 | Information acquisition method and device, electronic equipment and computer readable medium |
CN112738051A (en) * | 2020-12-24 | 2021-04-30 | 深圳赛安特技术服务有限公司 | Data information encryption method, system and computer readable storage medium |
CN113407860A (en) * | 2021-05-07 | 2021-09-17 | 浙江工业大学 | Privacy protection-based multi-social platform user recommendation method and system |
CN116633683A (en) * | 2023-07-18 | 2023-08-22 | 中国人民解放军国防科技大学 | Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation |
CN116781384A (en) * | 2023-07-14 | 2023-09-19 | 建信金融科技有限责任公司 | Request data processing method, device and server |
CN116976884A (en) * | 2023-08-06 | 2023-10-31 | 唐山骅驰科技有限责任公司 | A transaction data processing method based on cloud storage and NFC |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107222501A (en) * | 2017-07-06 | 2017-09-29 | 中国电子科技集团公司第二十九研究所 | A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code |
WO2018176781A1 (en) * | 2017-04-01 | 2018-10-04 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, apparatus, and system |
CN108769027A (en) * | 2018-05-31 | 2018-11-06 | 深圳壹账通智能科技有限公司 | Safety communicating method, device, mobile terminal and storage medium |
US20180322311A1 (en) * | 2016-02-18 | 2018-11-08 | Canon Kabushiki Kaisha | Information processing system, information processing device, server device, method of controlling information processing system, and program |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN109474619A (en) * | 2018-12-17 | 2019-03-15 | 中国平安财产保险股份有限公司 | Data encryption report method and device, data decryption method and device |
CN109495252A (en) * | 2018-12-04 | 2019-03-19 | 深圳前海环融联易信息科技服务有限公司 | Data ciphering method, device, computer equipment and storage medium |
-
2019
- 2019-04-15 CN CN201910299382.5A patent/CN110138739B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180322311A1 (en) * | 2016-02-18 | 2018-11-08 | Canon Kabushiki Kaisha | Information processing system, information processing device, server device, method of controlling information processing system, and program |
WO2018176781A1 (en) * | 2017-04-01 | 2018-10-04 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, apparatus, and system |
CN107222501A (en) * | 2017-07-06 | 2017-09-29 | 中国电子科技集团公司第二十九研究所 | A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code |
CN108769027A (en) * | 2018-05-31 | 2018-11-06 | 深圳壹账通智能科技有限公司 | Safety communicating method, device, mobile terminal and storage medium |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN109495252A (en) * | 2018-12-04 | 2019-03-19 | 深圳前海环融联易信息科技服务有限公司 | Data ciphering method, device, computer equipment and storage medium |
CN109474619A (en) * | 2018-12-17 | 2019-03-15 | 中国平安财产保险股份有限公司 | Data encryption report method and device, data decryption method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110738513A (en) * | 2019-09-11 | 2020-01-31 | 完美世界(北京)软件科技发展有限公司 | method and device for generating and verifying redemption codes |
CN111866018A (en) * | 2020-07-30 | 2020-10-30 | 平安国际智慧城市科技股份有限公司 | Data information encryption transmission method and device, computer equipment and storage medium |
CN112329044A (en) * | 2020-11-23 | 2021-02-05 | 北京沃东天骏信息技术有限公司 | Information acquisition method and device, electronic equipment and computer readable medium |
CN112738051A (en) * | 2020-12-24 | 2021-04-30 | 深圳赛安特技术服务有限公司 | Data information encryption method, system and computer readable storage medium |
CN112738051B (en) * | 2020-12-24 | 2023-12-01 | 深圳赛安特技术服务有限公司 | Data information encryption method, system and computer readable storage medium |
CN113407860A (en) * | 2021-05-07 | 2021-09-17 | 浙江工业大学 | Privacy protection-based multi-social platform user recommendation method and system |
CN116781384A (en) * | 2023-07-14 | 2023-09-19 | 建信金融科技有限责任公司 | Request data processing method, device and server |
CN116633683A (en) * | 2023-07-18 | 2023-08-22 | 中国人民解放军国防科技大学 | Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation |
CN116633683B (en) * | 2023-07-18 | 2023-11-03 | 中国人民解放军国防科技大学 | Single-pixel imaging asymmetric encryption method based on 3D Arnod transformation |
CN116976884A (en) * | 2023-08-06 | 2023-10-31 | 唐山骅驰科技有限责任公司 | A transaction data processing method based on cloud storage and NFC |
Also Published As
Publication number | Publication date |
---|---|
CN110138739B (en) | 2023-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110138739A (en) | Data information encryption method, device, computer equipment and storage medium | |
US10122710B2 (en) | Binding a data transaction to a person's identity using biometrics | |
US10437469B2 (en) | Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad | |
US8892881B2 (en) | Split key secure access system | |
CN101677269B (en) | Method and system for transmitting keys | |
JPH0823330A (en) | Safe data communication | |
WO2013091348A1 (en) | Encryption and decryption method based on proxy, network apparatus, network device, and system | |
US8533493B1 (en) | Method of securing transmission data | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN112738051B (en) | Data information encryption method, system and computer readable storage medium | |
CN118174967B (en) | Information verification method and related equipment | |
CN106911663A (en) | One kind sells bank's full message encryption system and method for mixed mode directly to households | |
US20120017086A1 (en) | Information security transmission system | |
CN103500294B (en) | A kind of file encryption-decryption method and device | |
CN110311892A (en) | A kind of data capture method and server | |
US20240322914A1 (en) | Quantum secure direct communication method and apparatus based on one-way transmission, device and system | |
CN114500037B (en) | Configurable interface encryption method and device, computer equipment and storage medium | |
CN118199992B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN109743305A (en) | Method for realizing application text data protection in intelligent dialogue system application | |
CN118509227A (en) | Data transmission method, device and system | |
CN114679312B (en) | Encryption method, electronic device, and computer-readable storage medium | |
CN106375327A (en) | A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks | |
CN102238150A (en) | Form registration method and server | |
CN117371050A (en) | Modifiable electronic medical record sharing method and system based on chameleon hash | |
CN111212068B (en) | Method for encrypting and decrypting characters by input method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |