[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109150499A - Method, apparatus, computer equipment and the storage medium of dynamic encryption data - Google Patents

Method, apparatus, computer equipment and the storage medium of dynamic encryption data Download PDF

Info

Publication number
CN109150499A
CN109150499A CN201810995538.9A CN201810995538A CN109150499A CN 109150499 A CN109150499 A CN 109150499A CN 201810995538 A CN201810995538 A CN 201810995538A CN 109150499 A CN109150499 A CN 109150499A
Authority
CN
China
Prior art keywords
character
random string
data packet
encryption
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810995538.9A
Other languages
Chinese (zh)
Other versions
CN109150499B (en
Inventor
谢晓勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mini Play Technology Co Ltd
Original Assignee
Shenzhen Mini Play Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Mini Play Technology Co Ltd filed Critical Shenzhen Mini Play Technology Co Ltd
Priority to CN201810995538.9A priority Critical patent/CN109150499B/en
Publication of CN109150499A publication Critical patent/CN109150499A/en
Application granted granted Critical
Publication of CN109150499B publication Critical patent/CN109150499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses method, apparatus, computer equipment and the storage mediums of a kind of dynamic encryption data, this method comprises: obtaining the random string as encryption key source and being stored;Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;Since the bebinning character, encryption key is obtained in the random string;According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;Encrypted data packet to be sent is sent.The method increase the safeties of data encryption.

Description

Method, apparatus, computer equipment and the storage medium of dynamic encryption data
Technical field
The present invention relates to internet information field of encryption, method, apparatus, computer more particularly to dynamic encryption data Equipment and storage medium.
Background technique
The today in each corner of living is penetrated into internet, people carry out miscellaneous on the internet daily Operation.Among these operations, mail contact, online trading etc. need the behavior for carrying out data safety guarantee for data encryption Reliability, safety have absolute demand.Therefore, the encryption technology of data becomes weight in current Internet technology development The ring wanted.
In the existing data encryption technology applied in internet, client is set up connection with server and is led to Believe, the key pair that encryption key used in entire communication process is generated, distributed when being fixed as with decruption key and communicate and start. Once the key pair is intercepted and captured by attacker, this time the total data of communication process can all be cracked, obtain, to cause important letter The leakage of breath.
Summary of the invention
Based on this, by solve in the related technology how from technological layer safer and more reliable ground encryption data is faced The technical issues of, the present invention provides method, apparatus, computer equipment and the storage mediums of a kind of dynamic encryption data.
In a first aspect, providing a kind of method of dynamic encryption data, comprising:
It obtains the random string as encryption key source and is stored;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;
According to the specified abstract operation as a result, determining the banner word for choosing encryption key from the random string Symbol;
Since the bebinning character, encryption key is obtained in the random string;
According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Encrypted data packet to be sent is sent.
In an exemplary embodiment of the disclosure, obtains the random string as encryption key source and deposited Storage, comprising:
Random string acquisition request is sent to server;
Receive the random string generated after the server authentication passes through;
The random string is stored.
Specific characteristic information in an exemplary embodiment of the disclosure, about the data packet transmission between server It include: the data in the predetermined position in a upper data packet for the forward direction server transmission of data packet to be sent.
Specific characteristic information in an exemplary embodiment of the disclosure, about the data packet transmission between server It include: the upper data packet that the forward direction server of data packet to be sent is sent.
In an exemplary embodiment of the disclosure, according to the specified abstract operation as a result, determining from described random The bebinning character of encryption key is chosen in character string, comprising:
The result of the abstract operation is converted into number;
Predetermined length of the number to the length for being less than or equal to the random string is subjected to modular arithmetic, obtains mould Operation result;
The starting for the character at the modular arithmetic result will be corresponded on the random string being determined as the encryption key Character.
In an exemplary embodiment of the disclosure, since at the bebinning character, obtained in the random string Take encryption key, comprising:
In the random string, since at the bebinning character, a character is taken every predetermined number character, Until taking out predetermined number of characters;
It combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
In an exemplary embodiment of the disclosure, in the random string, since at the bebinning character, often A character is taken every predetermined number character, until taking out predetermined number of characters, comprising: if every predetermined number word The number of characters at the last character interval of character and the random string that symbol is got when taking character is less than or equal to described Predetermined number successively adds all characters of the random string behind the last character, to what is obtained New random string since at the bebinning character, takes character every predetermined number character again, predetermined until taking out Until a number of characters.
According to the second aspect of the disclosure, a kind of device of dynamic encryption data is provided, comprising:
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the encryption key;
Encrypting module, for encrypting the data packet;
Sending module, for sending the encrypted data packet to be sent.
According to the third aspect of the disclosure, a kind of electronic equipment of dynamic encryption data is provided, comprising:
Receiver is configured to receive the random string;
Processor is configured to execute any of the above-described method;
Transmitter is configured to send the encrypted data packet to be sent.
According to the fourth aspect of the disclosure, a kind of computer-readable program medium is provided, computer program is stored with and refers to It enables, when the computer instruction is computer-executed, computer is made to execute the process described above.
According to the 5th of the disclosure the aspect, a kind of method of dynamic ciphertext data is provided, comprising:
Receive the encrypted packet from client;
It obtains the random string as decruption key source and is stored, the random words as decruption key source Symbol string with the encrypted packet encryption used in encryption key from random string it is identical;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between the client;
According to the specified abstract operation as a result, determining the banner word for choosing decruption key from the random string Symbol;
Since the bebinning character, decruption key is obtained in the random string;
According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm with Encryption Algorithm used by encrypted packet encrypts is corresponding.
According to the 6th of the disclosure the aspect, a kind of device of dynamic ciphertext data is provided, comprising:
Receiving module, for receiving the encrypted packet from client;
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the decruption key;
Deciphering module, for decrypting the encrypted packet.
According to the 7th of the disclosure the aspect, a kind of electronic equipment of dynamic ciphertext data is provided, comprising:
Transmitter is configured to send the random string to client;
Receiver is configured to receive the encrypted packet from client;
Processor, the method for being configured to execute the dynamic ciphertext data.
According to the eighth aspect of the disclosure, a kind of computer-readable program medium is provided, computer program is stored with and refers to It enables, when the computer instruction is computer-executed, makes the method for computer execution dynamic ciphertext data.
Compared with the key pair used in the encryption and decryption of data in traditional technology is fixed, embodiment of the disclosure passes through It handles to obtain the encryption and decryption key of dynamic change according to dynamic is carried out to random string, the encryption and decryption of dynamic change is close Key is applied in data transmission, improves the safety of data transmission.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
Fig. 1 shows the flow chart of the method for the dynamic encryption data according to one example embodiment of the disclosure.
Fig. 2 shows the block diagrams according to the devices of the dynamic encryption data of one example embodiment of the disclosure.
Fig. 3 shows the block diagram of the device of the dynamic ciphertext data according to one example embodiment of the disclosure.
Fig. 4, which is shown, to go forward side by side according to the acquisition of one example embodiment of the disclosure as the random string in encryption key source The detail flowchart of row storage.
Fig. 5 is shown according to one example embodiment of the disclosure according to the specified abstract operation as a result, determining from institute State the detail flowchart that the bebinning character of encryption key is chosen in random string.
Fig. 6 is shown according to one example embodiment of the disclosure since at the bebinning character, in the random character The detail flowchart of encryption key is obtained in string.
Fig. 7 shows the flow chart of the dynamic ciphertext data according to one example embodiment of the disclosure.
Fig. 8 shows the electronic equipment figure of the dynamic encryption data set according to one example embodiment of the disclosure.
Fig. 9 shows the computer readable storage medium of the dynamic encryption data system according to one example embodiment of the disclosure Figure.
Figure 10 shows the electronic equipment figure of the dynamic ciphertext data device according to one example embodiment of the disclosure.
Figure 11 shows the computer-readable storage medium of the dynamic ciphertext data system according to one example embodiment of the disclosure Matter figure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
The purpose of the disclosure is that the dynamic from technical aspect realization data encryption carries out, and improves the safety of data encryption Property.According to the method for the dynamic encryption data of an embodiment of the present disclosure, comprising: obtain the random words as encryption key source Symbol is gone here and there and is stored;Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server; According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;From institute It states bebinning character to start, obtains encryption key in the random string;According to scheduled Encryption Algorithm, the encryption is used Key pair data packet to be sent is encrypted;Encrypted data packet to be sent is sent.With data in traditional technology Key pair used in encryption and decryption is comparing for fixation, and embodiment of the disclosure passes through to be carried out at dynamic according to random string The encryption and decryption key of dynamic change is applied in data transmission, improves to obtain the encryption and decryption key of dynamic change by reason The safety of data transmission.
It is to be understood that illustrating as illustrative, " charactor " described in present embodiment is to use ASCII character coding mode is encoded, but is not represented the method that the present invention is protected and be only limited to ASCII character to the use of character The character of coding.
Fig. 1 shows the flow chart of the method for the dynamic encryption data according to one example embodiment of the disclosure:
Step S100: it obtains the random string as encryption key source and is stored;
Step S110: specified abstract fortune is carried out to the specific characteristic information about the data packet transmission between server It calculates;
Step S120: encryption key is chosen as a result, determining from the random string according to the specified abstract Bebinning character;
Step S130: since the bebinning character, encryption key is obtained in the random string;
Step S140: according to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Step S150: encrypted data packet to be sent is sent.
In the following, by detailed solution is carried out in conjunction with each step of the attached drawing to dynamic encryption data above-mentioned in this example embodiment It releases and illustrates.
In the step s 100, it obtains the random string as encryption key source and is stored.
Random string refers to one section of character string that the multiple random characters generated by server form, the random string It is used to therefrom obtain encryption key.
In one embodiment, as shown in figure 4, step S100 includes:
Step S1001: random string acquisition request is sent to server;
Step S1002: the random string generated after the server authentication passes through is received;
Step S1003: the random string is stored.
By obtaining the random string as encryption key and being stored, it ensure that both client and server are deposited The random string store up, used it is consistent so that in subsequent process, server can obtain client according to the random string Used encryption key when being encrypted to data packet.
In one embodiment, user end to server sends logging request and random string acquisition request.Server Authentication is carried out to client, after being verified, the logging request sent with client is responded and is asked with random string acquisition It asks, server generates a string of random strings using random string generator, the database of server end is stored it in, and Send it to client.Client is stored in client database after receiving random string.So, objective Family end and server save identical random string.
In step s 110, specified abstract is carried out to the specific characteristic information about the data packet transmission between server Operation.
Specific characteristic information refers to the predetermined information for being included with the related specific part of the data packet.
Abstract operation is the operation for using digest algorithm to carry out.Digest algorithm, also known as hash algorithm, hash algorithm.Abstract Algorithm has following three classes algorithm: MD, SHA, MAC.
Since characteristic information changes with the difference of data packet to be sent, abstract operation is carried out to the characteristic information and is obtained The result arrived also dynamic change therewith.The abstract operation result of the dynamic change will be used for determining encryption key, therefore institute The dynamic change for stating abstract operation result is to realize the premise of dynamic encryption.By this method, reached and obtained dynamic change Abstract operation result purpose.
In one embodiment, the specific characteristic information about the data packet transmission between server includes: number to be sent The data in the predetermined position in a upper data packet sent according to the forward direction server of packet.Such as: before data packet to be sent Rear 10 bytes of the upper data packet sent to server are as specific characteristic information, after a upper data packet 10 bytes carry out MD5 operation.For first data packet to be sent, then rear 10 bytes of the random string are made MD5 operation is carried out for the specific characteristic information.If less than 10 bytes of the random string, in the random character Several characters " 0 " are continuously added before string, until the random string there are 10 bytes.Character is added to by described " 0 " has specific characteristic information of the random string of 10 bytes as first data packet to be sent.
In one embodiment, the specific characteristic information about the data packet transmission between server includes: number to be sent The upper data packet sent according to the forward direction server of packet.Using it is described to server send a upper data packet as described in Send the characteristic information of data packet.For first data packet to be sent, using the random string as its characteristic information.
In the step s 120, adding as a result, determining and being chosen from the random string according to the specified abstract operation The bebinning character of key, as shown in Figure 5, comprising:
Step S1201: the result of the abstract operation is converted into number;
Step S1202: predetermined length of the number to the length for being less than or equal to the random string is subjected to mould Operation obtains modular arithmetic result;
Step S1203: the character corresponded at the modular arithmetic result on the random string is determined as the encryption The bebinning character of key.
Since the abstract operation is the result is that dynamic change, by this method, has reached by the abstract operation Result determine the encryption key bebinning character be also dynamic change purpose.
In one embodiment, it is described abstract operation result be 16 systems indicate, for use 10 systems expression institute The length for stating random string unifies system, and the result of the abstract operation is first converted to the number of 10 systems.For example, abstract Operation result is 3000000007 after being converted to 10 systems.The length of the random string is 20 bytes, and needing will be described Predetermined length is determined as a number less than or equal to 20.The predetermined length is determined as 15, uses 3000000007 pairs 15 carry out modular arithmetic, and the modular arithmetic result acquired is 7.The 7th character on lawsuit random string is then determined as the encryption The bebinning character of key.It is to guarantee mould that the predetermined length, which is determined as the length less than or equal to the random string, Length of the operation result without departing from the random string, it is ensured that be not in hair the case where can not choosing bebinning character It is raw.
In step s 130, since the bebinning character, encryption key, such as Fig. 6 are obtained in the random string It is shown, comprising:
Step S1301: in the random string, since at the bebinning character, every predetermined number character A character is taken, until taking out predetermined number of characters;
Step S1302: it combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
By choosing character in the random string, carry out sequence combination has achieved the purpose that obtain encryption key.
In one embodiment, the random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 5 characters, starting Character is " 9 ", and the predetermined number being separated by determined is 2, i.e., takes out a character every two characters.5 then successively taken out Character is " 9 ", " d ", " 2 ", " Y ", " P ", and the character string thus formed is " 9d2YP ".Then by character string " 9d2YP " as encryption Key.
In one embodiment, in the random string, since at the bebinning character, every predetermined number word Symbol takes a character, until taking out predetermined number of characters, comprising: if got when predetermined number character takes character Character and the number of characters at last character interval of the random string be less than or equal to the predetermined number, will be described All characters of random string successively add behind the last character, to obtained new random string weight Newly since at the bebinning character, character is taken every predetermined number character, until taking out predetermined number of characters.Example Such as, the random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 7 characters, bebinning character is " 9 ", and what is determined is pre- Surely the number being separated by is 3, i.e., takes out a character every three characters.The character successively taken out is " 9 ", " h ", " 4 ", " P ", is taken When to character " P ", the number of characters with last character interval is 0.All characters of the random string are successively added It is added in behind the last character, obtains new random string " aFk980dhb254YVjP1aFk980dhb254Y VjP1".Since bebinning character, in this example, to take out a character every three characters since first character " 9 ". The character successively taken out is " 9 ", " h ", " 4 ", " P ", " k ", " d ", " 5 ", and the character string thus formed is " 9h4Pkd5 ".Then will Character string " 9h4Pkd5 " is used as encryption key.
In step S140, according to scheduled Encryption Algorithm, data packet to be sent is added using the encryption key It is close.
Scheduled Encryption Algorithm refers to that both sides arrange in the communication protocol formulated when client and server establish connection Good Encryption Algorithm.
In this way, the encryption to data packet is realized.
In one embodiment, both sides establish the communication protocol agreement formulated when connection and use DES symmetric encipherment algorithm logarithm According to being encrypted.Then from the random string obtain 8 characters encryption key, using the encryption key to data packet into Row encryption.
In step S150, encrypted data packet to be sent is sent.
By this method, the transmission for the data packet to be sent that encryption is completed is realized.
Fig. 7 shows the flow chart of the dynamic ciphertext data according to one example embodiment of the disclosure:
Step S200: the encrypted packet from client is received;
Step S210: it obtains the random string as decruption key source and is stored, this is as decruption key The random string in source and the encrypted packet encryption encryption key used from random string it is identical;
Step S220: specified abstract is carried out to the specific characteristic information about the data packet transmission between the client Operation
Step S230: according to the specified abstract operation as a result, determining that selection decryption is close from the random string The bebinning character of key;
Step S240: since the bebinning character, decruption key is obtained in the random string;
Step S250: according to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the solution Encryption Algorithm used by close algorithm is encrypted with encrypted packet is corresponding.
In one embodiment, after server and client establish connection, server deposits the random string of generation It stores up and is sent to client.It is established in communication protocol used in connection in the two, has arranged specific characteristic information, specified abstract The algorithm of algorithm, the concrete mode for determining key, encryption and decryption.After server receives the encrypted packet from client, to finger Determine characteristic information and carry out abstract operation, obtained abstract operation result is consistent with the abstract operation result that client obtains.Service The result for operation of making a summary is converted to 10 binary digits by device, using the number to pre- less than or equal to random character string length Measured length carries out modular arithmetic, the starting for the character at the modular arithmetic result will be corresponded on random string being determined as decruption key Character.
In step S240, since the bebinning character, decruption key is obtained in the random string.
In one embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement, therefore Encryption key is identical as decruption key.The random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 5 characters, rise Beginning character is " 9 ", and the predetermined number being separated by determined is 2, i.e., takes out a character every two characters.5 then successively taken out A character is " 9 ", " d ", " 2 ", " Y ", " P ", and the character string thus formed is " 9d2YP ".Then by character string " 9d2YP " as solution Key.
In another embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement, because This encryption key is identical as decruption key.The random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 7 characters, Bebinning character is " 9 ", and the predetermined number being separated by determined is 3.Thus the character successively taken out is " 9 ", " h ", " 4 ", " P ", is taken When to character " P ", the number of characters with last character interval is 0.All characters of the random string are successively added It is added to behind last character, obtains new random string " aFk980dhb254YVjP1aFk980dhb254YVj P1".Since bebinning character, in this example, to take out a character every three characters since first character " 9 ".According to The character of secondary taking-up is " 9 ", " h ", " 4 ", " P ", " k ", " d ", " 5 ", and the character string thus formed is " 9h4Pkd5 ".Then by word Symbol string " 9h4Pkd5 " is used as decruption key.
In step S250, according to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, it should Decipherment algorithm is corresponding with Encryption Algorithm used by encrypted packet.
In one embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement.Service After device obtains decruption key, using DES decipherment algorithm, the encrypted packet received is solved using the decruption key It is close.
As shown in Fig. 2, in one embodiment, providing a kind of device of dynamic encryption data, specifically including: first obtains Module 310, computing module 320, second obtain module 330, encrypting module 340, sending module 350.
First obtains module 310, for obtaining the random string;
Computing module 320, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module 330, for obtaining the encryption key;
Encrypting module 340, for encrypting the data packet;
Sending module 350, for sending the encrypted data packet to be sent.
The function of modules and the realization process of effect are specifically detailed in the side of above-mentioned dynamic encryption data in above-mentioned apparatus The realization process of step is corresponded in method, details are not described herein.
As shown in figure 3, in one embodiment, providing a kind of device of dynamic ciphertext data, specifically including: receiving module 410, first module 420, computing module 430 are obtained, second obtains module 440, deciphering module 450.
Receiving module 410, for receiving the encrypted packet from client;
First obtains module 420, for obtaining the random string;
Computing module 430, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module 440, for obtaining the decruption key;
Deciphering module 450, for decrypting the encrypted packet.
The function of modules and the realization process of effect are specifically detailed in the side of above-mentioned dynamic ciphertext data in above-mentioned apparatus The realization process of step is corresponded in method, details are not described herein.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/ Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment Method.
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 8.The electronics that Fig. 8 is shown Equipment 500 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 8, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap It includes but is not limited to: at least one above-mentioned processing unit 510, at least one above-mentioned storage unit 520, the different system components of connection The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510 Row, so that various according to the present invention described in the execution of the processing unit 510 above-mentioned " illustrative methods " part of this specification The step of illustrative embodiments.For example, the processing unit 510 can execute step S100 as shown in fig. 1: obtaining conduct The random string in encryption key source is simultaneously stored;Step S110: to about the data packet transmission between server Specific characteristic information carries out specified abstract operation;Step S120: according to it is described it is specified abstract operation as a result, determine from it is described with The bebinning character of encryption key is chosen in machine character string;Step S130: since the bebinning character, in the random string Middle acquisition encryption key;Step S140: according to scheduled Encryption Algorithm, data packet to be sent is carried out using the encryption key Encryption;Step S150: encrypted data packet to be sent is sent.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 5201 and/or cache memory unit 5202, it can further include read-only memory unit (ROM) 5203.
Storage unit 520 can also include program/utility with one group of (at least one) program module 5205 5204, such program module 5205 includes but is not limited to: operating system, one or more application program, other program moulds It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 530 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 500 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with By network adapter 560 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
The electronic equipment 500 ' of this embodiment according to the present invention is described referring to Figure 10.The electricity that Fig. 8 is shown Sub- equipment 500 ' is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in Figure 10, electronic equipment 500 ' is showed in the form of universal computing device.The component of electronic equipment 500 ' can To include but is not limited to: at least one above-mentioned processing unit 510 ', connects not homologous ray at least one above-mentioned storage unit 520 ' The bus 530 ' of component (including storage unit 520 ' and processing unit 510 ').
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510 ' Row, so that various according to the present invention described in the processing unit 510 ' execution above-mentioned " illustrative methods " part of this specification The step of illustrative embodiments.For example, the processing unit 510 ' can execute step S200 as shown in Figure 7: receiving and From the encrypted packet of client;Step S210: it obtains the random string as decruption key source and is stored, the work For the random string in decruption key source and the used encryption key of encrypted packet encryption from random string It is identical;Step S220: specified abstract fortune is carried out to the specific characteristic information about the data packet transmission between the client It calculates;Step S230: according to the specified abstract operation as a result, determining from choosing decruption key in the random string Beginning character;Step S240: since the bebinning character, decruption key is obtained in the random string;Step S250: root According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm and encrypted packet Encryption Algorithm used by encrypting is corresponding.
Storage unit 520 ' may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 5201 ' and/or cache memory unit 5202 ', it can further include read-only memory unit (ROM) 5203 '.
Storage unit 520 ' can also include program/utility with one group of (at least one) program module 5205 ' 5204 ', such program module 5205 ' includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 530 ' can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 500 ' can also be with one or more external equipments 700 ' (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 ' communicate, and/or with make The electronic equipment 500 ' can with it is one or more of the other calculating equipment be communicated any equipment (such as router, modulation Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 550 '.Also, electronic equipment 500 ' Network adapter 560 ' and one or more network (such as local area network (LAN), wide area network (WAN) and/or public affairs can also be passed through Common network network, such as internet) communication.As shown, network adapter 560 ' passes through its of bus 530 ' and electronic equipment 500 ' The communication of its module.It should be understood that although not shown in the drawings, other hardware and/or software can be used in conjunction with electronic equipment 500 ' Module, including but not limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, magnetic Tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method of embodiment according to the present invention 600, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
With reference to shown in Figure 11, the program product for realizing the above method of embodiment according to the present invention is described 600 ', can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim It points out.

Claims (14)

1. a kind of method of dynamic encryption data characterized by comprising
It obtains the random string as encryption key source and is stored;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;
According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;
Since the bebinning character, encryption key is obtained in the random string;
According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Encrypted data packet to be sent is sent.
2. the method according to claim 1, which is characterized in that obtain the random string as encryption key source and deposited Storage, comprising:
Random string acquisition request is sent to server;
Receive the random string generated after the server authentication passes through;
The random string is stored.
3. the method according to claim 1, which is characterized in that the specific characteristic letter about the data packet transmission between server Breath includes: the data in the middle predetermined position for the upper data packet that the forward direction server of data packet to be sent is sent.
4. the method according to claim 1, which is characterized in that the specific characteristic letter about the data packet transmission between server Breath includes: the upper data packet that the forward direction server of data packet to be sent is sent.
5. the method according to claim 1, which is characterized in that according to it is described it is specified abstract operation as a result, determine from it is described with The bebinning character of encryption key is chosen in machine character string, comprising:
The result of the abstract operation is converted into number;
Predetermined length of the number to the length for being less than or equal to the random string is subjected to modular arithmetic, obtains modular arithmetic As a result;
The bebinning character for the character at the modular arithmetic result will be corresponded on the random string being determined as the encryption key.
6. the method according to claim 1, which is characterized in that since at the bebinning character, in the random string Obtain encryption key, comprising:
In the random string, since at the bebinning character, a character is taken every predetermined number character, until Until taking out predetermined number of characters;
It combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
7. method according to claim 6, which is characterized in that in the random string, since at the bebinning character, A character is taken every predetermined number character, until taking out predetermined number of characters, comprising: if every predetermined number Character takes the number of characters at the last character interval for the character and random string got when character to be less than or equal to institute Predetermined number is stated, all characters of the random string are successively added behind the last character, to obtaining New random string again since at the bebinning character, take character every predetermined number character, it is pre- until taking out Until fixed number of characters.
8. a kind of method of dynamic ciphertext data characterized by comprising
Receive the encrypted packet from client;
It obtains the random string as decruption key source and is stored, the random string as decruption key source With encrypted packet encryption encryption key used from random string it is identical;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between the client;
According to the specified abstract operation as a result, determining the bebinning character for choosing decruption key from the random string;
Since the bebinning character, decruption key is obtained in the random string;
According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm and encryption Encryption Algorithm used by data packet encrypts is corresponding.
9. a kind of device of dynamic encryption data characterized by comprising
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the encryption key;
Encrypting module, for encrypting the data packet;
Sending module, for sending the encrypted data packet to be sent.
10. a kind of electronic equipment of dynamic encryption data, is characterized in that, comprising:
Receiver is configured to receive the random string;
Processor is configured to perform claim and requires method described in any of 1-7;
Transmitter is configured to send the encrypted data packet to be sent.
11. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer When instruction is computer-executed, computer is made to execute method described in any of -7 according to claim 1.
12. a kind of device of dynamic ciphertext data characterized by comprising
Receiving module, for receiving the encrypted packet from client;
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the decruption key;
Deciphering module, for decrypting the encrypted packet.
13. a kind of electronic equipment of dynamic encryption data, is characterized in that, comprising:
Transmitter is configured to send the random string to client;
Receiver is configured to receive the encrypted packet from client;
Processor is configured to perform claim and requires method described in 8.
14. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer When instruction is computer-executed, computer is made to execute method according to claim 8.
CN201810995538.9A 2018-08-29 2018-08-29 Method and device for dynamically encrypting data, computer equipment and storage medium Active CN109150499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810995538.9A CN109150499B (en) 2018-08-29 2018-08-29 Method and device for dynamically encrypting data, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810995538.9A CN109150499B (en) 2018-08-29 2018-08-29 Method and device for dynamically encrypting data, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109150499A true CN109150499A (en) 2019-01-04
CN109150499B CN109150499B (en) 2021-06-08

Family

ID=64829087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810995538.9A Active CN109150499B (en) 2018-08-29 2018-08-29 Method and device for dynamically encrypting data, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109150499B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium
CN110048835A (en) * 2019-03-27 2019-07-23 北京三快在线科技有限公司 The method and apparatus of encryption, storage medium
CN110176986A (en) * 2019-05-30 2019-08-27 杭州奇治信息技术股份有限公司 A kind of data ciphering method of multi-enciphering, device and mobile terminal
CN110324143A (en) * 2019-05-24 2019-10-11 平安科技(深圳)有限公司 Data transmission method, electronic equipment and storage medium
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN110492998A (en) * 2019-08-14 2019-11-22 郑州大学 Methods of encrypting and decrypting data
CN110784313A (en) * 2019-09-25 2020-02-11 苏州浪潮智能科技有限公司 Key protection method, device and storage medium
CN111260365A (en) * 2020-03-13 2020-06-09 上海商米科技集团股份有限公司 Encryption method and device for protecting transaction security
CN111368323A (en) * 2020-03-24 2020-07-03 杨九妹 Medical insurance financial user information encryption method and system based on big data
CN112769543A (en) * 2019-10-21 2021-05-07 千寻位置网络有限公司 Method and system for protecting dynamic secret key
CN113254966A (en) * 2021-06-04 2021-08-13 王兆河 Dynamic encryption method and ciphertext structure of medical digital image information
CN113352318A (en) * 2021-04-29 2021-09-07 国网浙江省电力有限公司嘉兴供电公司 Intelligent robot communication link self-checking selection method
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
CN113901003A (en) * 2021-10-11 2022-01-07 智慧足迹数据科技有限公司 Abstract compression method and related device
CN114186105A (en) * 2021-12-13 2022-03-15 中国农业银行股份有限公司 A string comparison method, device, device and storage medium
CN114422143A (en) * 2022-01-13 2022-04-29 中国平安人寿保险股份有限公司 Artificial intelligence based dynamic data encryption method, device, equipment and medium
CN114978711A (en) * 2022-05-25 2022-08-30 山东国子软件股份有限公司 Data transmission method and system for symmetric encryption of dynamic secret key
CN115001662A (en) * 2022-06-02 2022-09-02 中国银行股份有限公司 Data encryption method and device, computer equipment and storage medium
CN115694902A (en) * 2022-09-27 2023-02-03 中国工商银行股份有限公司 Second kill request method and second kill verification method, device, system and medium
CN115694805A (en) * 2022-10-28 2023-02-03 上海壁仞智能科技有限公司 Electronic device, integrated circuit design and manufacturing method and product operation method
CN116388964A (en) * 2023-03-31 2023-07-04 统信软件技术有限公司 Digest generation method, digest generation device, computing device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060020907A1 (en) * 2004-07-23 2006-01-26 Nec Electronics Corporation Copy protection method and system for programmable gate array
CN106506159A (en) * 2016-11-18 2017-03-15 上海艾讯云计算有限公司 Encryption method and equipment for key safety
US20170075877A1 (en) * 2015-09-16 2017-03-16 Marie-Therese LEPELTIER Methods and systems of handling patent claims
CN106788995A (en) * 2016-12-07 2017-05-31 武汉斗鱼网络科技有限公司 File encrypting method and device
CN106941407A (en) * 2017-05-10 2017-07-11 成都课迪科技有限公司 A kind of method and apparatus of platform data dynamic encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060020907A1 (en) * 2004-07-23 2006-01-26 Nec Electronics Corporation Copy protection method and system for programmable gate array
US20170075877A1 (en) * 2015-09-16 2017-03-16 Marie-Therese LEPELTIER Methods and systems of handling patent claims
CN106506159A (en) * 2016-11-18 2017-03-15 上海艾讯云计算有限公司 Encryption method and equipment for key safety
CN106788995A (en) * 2016-12-07 2017-05-31 武汉斗鱼网络科技有限公司 File encrypting method and device
CN106941407A (en) * 2017-05-10 2017-07-11 成都课迪科技有限公司 A kind of method and apparatus of platform data dynamic encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张蜀男: "《云存储中高效密文检索的中文数据加密方案》", 《计算机科学》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688160A (en) * 2019-01-28 2019-04-26 平安科技(深圳)有限公司 Data Encryption Transmission control method, device, computer equipment and storage medium
CN110048835A (en) * 2019-03-27 2019-07-23 北京三快在线科技有限公司 The method and apparatus of encryption, storage medium
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN110324143A (en) * 2019-05-24 2019-10-11 平安科技(深圳)有限公司 Data transmission method, electronic equipment and storage medium
CN110324143B (en) * 2019-05-24 2022-03-11 平安科技(深圳)有限公司 Data transmission method, electronic device and storage medium
CN110176986A (en) * 2019-05-30 2019-08-27 杭州奇治信息技术股份有限公司 A kind of data ciphering method of multi-enciphering, device and mobile terminal
CN110492998A (en) * 2019-08-14 2019-11-22 郑州大学 Methods of encrypting and decrypting data
CN110784313A (en) * 2019-09-25 2020-02-11 苏州浪潮智能科技有限公司 Key protection method, device and storage medium
CN112769543A (en) * 2019-10-21 2021-05-07 千寻位置网络有限公司 Method and system for protecting dynamic secret key
CN112769543B (en) * 2019-10-21 2022-06-28 千寻位置网络有限公司 Method and system for protecting dynamic secret key
CN111260365A (en) * 2020-03-13 2020-06-09 上海商米科技集团股份有限公司 Encryption method and device for protecting transaction security
CN111368323A (en) * 2020-03-24 2020-07-03 杨九妹 Medical insurance financial user information encryption method and system based on big data
CN113352318A (en) * 2021-04-29 2021-09-07 国网浙江省电力有限公司嘉兴供电公司 Intelligent robot communication link self-checking selection method
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
CN113254966A (en) * 2021-06-04 2021-08-13 王兆河 Dynamic encryption method and ciphertext structure of medical digital image information
CN113901003A (en) * 2021-10-11 2022-01-07 智慧足迹数据科技有限公司 Abstract compression method and related device
CN114186105A (en) * 2021-12-13 2022-03-15 中国农业银行股份有限公司 A string comparison method, device, device and storage medium
CN114422143A (en) * 2022-01-13 2022-04-29 中国平安人寿保险股份有限公司 Artificial intelligence based dynamic data encryption method, device, equipment and medium
CN114422143B (en) * 2022-01-13 2023-06-20 中国平安人寿保险股份有限公司 Data dynamic encryption method, device, equipment and medium based on artificial intelligence
CN114978711A (en) * 2022-05-25 2022-08-30 山东国子软件股份有限公司 Data transmission method and system for symmetric encryption of dynamic secret key
CN115001662A (en) * 2022-06-02 2022-09-02 中国银行股份有限公司 Data encryption method and device, computer equipment and storage medium
CN115694902A (en) * 2022-09-27 2023-02-03 中国工商银行股份有限公司 Second kill request method and second kill verification method, device, system and medium
CN115694805A (en) * 2022-10-28 2023-02-03 上海壁仞智能科技有限公司 Electronic device, integrated circuit design and manufacturing method and product operation method
CN116388964A (en) * 2023-03-31 2023-07-04 统信软件技术有限公司 Digest generation method, digest generation device, computing device and storage medium

Also Published As

Publication number Publication date
CN109150499B (en) 2021-06-08

Similar Documents

Publication Publication Date Title
CN109150499A (en) Method, apparatus, computer equipment and the storage medium of dynamic encryption data
US20140282840A1 (en) Managing data handling policies
WO2016089710A1 (en) Secure computer evaluation of decision trees
CN105897784B (en) Internet-of-things terminal equipment encryption communication method and device
US10990692B2 (en) Managing data handling policies
CN110177099A (en) Method for interchanging data, transmission terminal and medium based on asymmetric encryption techniques
CN110912877B (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN112182635A (en) Method, device, equipment and medium for realizing joint modeling
CN109257176A (en) Decruption key segmentation and decryption method, device and medium based on SM2 algorithm
CN109560914A (en) Data ciphering method and device, storage medium, electronic equipment
CN115580489B (en) Data transmission method, device, equipment and storage medium
CN107872315B (en) Data processing method and intelligent terminal
CN109391473A (en) A kind of method, apparatus and storage medium of Electronic Signature
CN109446751A (en) Generate the method, apparatus and storage medium of the data set including multiple subfiles
CN112261015B (en) Information sharing method, platform, system and electronic equipment based on block chain
CN109951294A (en) Information update management method and relevant device in electronic labelling system
CN112242978B (en) Method and device for processing data
CN112784237A (en) Authentication processing method, authentication authorization method and related equipment of electronic document
CN115412246B (en) Method, device, equipment and storage medium for inadvertent transmission
CN117633848A (en) User information joint processing method, device, equipment and computer readable medium
CN114363094B (en) Data sharing method, device, equipment and storage medium
US10313315B2 (en) Ensuring information security in data transfers by utilizing proximity keys
CN110232570A (en) A kind of information monitoring method and device
CN115242389A (en) Data confusion transmission method and system based on multi-level node network
CN115086428A (en) Network request sending method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant