CN109150499A - Method, apparatus, computer equipment and the storage medium of dynamic encryption data - Google Patents
Method, apparatus, computer equipment and the storage medium of dynamic encryption data Download PDFInfo
- Publication number
- CN109150499A CN109150499A CN201810995538.9A CN201810995538A CN109150499A CN 109150499 A CN109150499 A CN 109150499A CN 201810995538 A CN201810995538 A CN 201810995538A CN 109150499 A CN109150499 A CN 109150499A
- Authority
- CN
- China
- Prior art keywords
- character
- random string
- data packet
- encryption
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000005540 biological transmission Effects 0.000 claims abstract description 23
- 238000004590 computer program Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 description 18
- 230000006854 communication Effects 0.000 description 17
- 238000004891 communication Methods 0.000 description 15
- 230000008859 change Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 230000005291 magnetic effect Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 210000004027 cell Anatomy 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 210000000352 storage cell Anatomy 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses method, apparatus, computer equipment and the storage mediums of a kind of dynamic encryption data, this method comprises: obtaining the random string as encryption key source and being stored;Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;Since the bebinning character, encryption key is obtained in the random string;According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;Encrypted data packet to be sent is sent.The method increase the safeties of data encryption.
Description
Technical field
The present invention relates to internet information field of encryption, method, apparatus, computer more particularly to dynamic encryption data
Equipment and storage medium.
Background technique
The today in each corner of living is penetrated into internet, people carry out miscellaneous on the internet daily
Operation.Among these operations, mail contact, online trading etc. need the behavior for carrying out data safety guarantee for data encryption
Reliability, safety have absolute demand.Therefore, the encryption technology of data becomes weight in current Internet technology development
The ring wanted.
In the existing data encryption technology applied in internet, client is set up connection with server and is led to
Believe, the key pair that encryption key used in entire communication process is generated, distributed when being fixed as with decruption key and communicate and start.
Once the key pair is intercepted and captured by attacker, this time the total data of communication process can all be cracked, obtain, to cause important letter
The leakage of breath.
Summary of the invention
Based on this, by solve in the related technology how from technological layer safer and more reliable ground encryption data is faced
The technical issues of, the present invention provides method, apparatus, computer equipment and the storage mediums of a kind of dynamic encryption data.
In a first aspect, providing a kind of method of dynamic encryption data, comprising:
It obtains the random string as encryption key source and is stored;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;
According to the specified abstract operation as a result, determining the banner word for choosing encryption key from the random string
Symbol;
Since the bebinning character, encryption key is obtained in the random string;
According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Encrypted data packet to be sent is sent.
In an exemplary embodiment of the disclosure, obtains the random string as encryption key source and deposited
Storage, comprising:
Random string acquisition request is sent to server;
Receive the random string generated after the server authentication passes through;
The random string is stored.
Specific characteristic information in an exemplary embodiment of the disclosure, about the data packet transmission between server
It include: the data in the predetermined position in a upper data packet for the forward direction server transmission of data packet to be sent.
Specific characteristic information in an exemplary embodiment of the disclosure, about the data packet transmission between server
It include: the upper data packet that the forward direction server of data packet to be sent is sent.
In an exemplary embodiment of the disclosure, according to the specified abstract operation as a result, determining from described random
The bebinning character of encryption key is chosen in character string, comprising:
The result of the abstract operation is converted into number;
Predetermined length of the number to the length for being less than or equal to the random string is subjected to modular arithmetic, obtains mould
Operation result;
The starting for the character at the modular arithmetic result will be corresponded on the random string being determined as the encryption key
Character.
In an exemplary embodiment of the disclosure, since at the bebinning character, obtained in the random string
Take encryption key, comprising:
In the random string, since at the bebinning character, a character is taken every predetermined number character,
Until taking out predetermined number of characters;
It combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
In an exemplary embodiment of the disclosure, in the random string, since at the bebinning character, often
A character is taken every predetermined number character, until taking out predetermined number of characters, comprising: if every predetermined number word
The number of characters at the last character interval of character and the random string that symbol is got when taking character is less than or equal to described
Predetermined number successively adds all characters of the random string behind the last character, to what is obtained
New random string since at the bebinning character, takes character every predetermined number character again, predetermined until taking out
Until a number of characters.
According to the second aspect of the disclosure, a kind of device of dynamic encryption data is provided, comprising:
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the encryption key;
Encrypting module, for encrypting the data packet;
Sending module, for sending the encrypted data packet to be sent.
According to the third aspect of the disclosure, a kind of electronic equipment of dynamic encryption data is provided, comprising:
Receiver is configured to receive the random string;
Processor is configured to execute any of the above-described method;
Transmitter is configured to send the encrypted data packet to be sent.
According to the fourth aspect of the disclosure, a kind of computer-readable program medium is provided, computer program is stored with and refers to
It enables, when the computer instruction is computer-executed, computer is made to execute the process described above.
According to the 5th of the disclosure the aspect, a kind of method of dynamic ciphertext data is provided, comprising:
Receive the encrypted packet from client;
It obtains the random string as decruption key source and is stored, the random words as decruption key source
Symbol string with the encrypted packet encryption used in encryption key from random string it is identical;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between the client;
According to the specified abstract operation as a result, determining the banner word for choosing decruption key from the random string
Symbol;
Since the bebinning character, decruption key is obtained in the random string;
According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm with
Encryption Algorithm used by encrypted packet encrypts is corresponding.
According to the 6th of the disclosure the aspect, a kind of device of dynamic ciphertext data is provided, comprising:
Receiving module, for receiving the encrypted packet from client;
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the decruption key;
Deciphering module, for decrypting the encrypted packet.
According to the 7th of the disclosure the aspect, a kind of electronic equipment of dynamic ciphertext data is provided, comprising:
Transmitter is configured to send the random string to client;
Receiver is configured to receive the encrypted packet from client;
Processor, the method for being configured to execute the dynamic ciphertext data.
According to the eighth aspect of the disclosure, a kind of computer-readable program medium is provided, computer program is stored with and refers to
It enables, when the computer instruction is computer-executed, makes the method for computer execution dynamic ciphertext data.
Compared with the key pair used in the encryption and decryption of data in traditional technology is fixed, embodiment of the disclosure passes through
It handles to obtain the encryption and decryption key of dynamic change according to dynamic is carried out to random string, the encryption and decryption of dynamic change is close
Key is applied in data transmission, improves the safety of data transmission.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure
Practice and acquistion.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
It is open.
Detailed description of the invention
Fig. 1 shows the flow chart of the method for the dynamic encryption data according to one example embodiment of the disclosure.
Fig. 2 shows the block diagrams according to the devices of the dynamic encryption data of one example embodiment of the disclosure.
Fig. 3 shows the block diagram of the device of the dynamic ciphertext data according to one example embodiment of the disclosure.
Fig. 4, which is shown, to go forward side by side according to the acquisition of one example embodiment of the disclosure as the random string in encryption key source
The detail flowchart of row storage.
Fig. 5 is shown according to one example embodiment of the disclosure according to the specified abstract operation as a result, determining from institute
State the detail flowchart that the bebinning character of encryption key is chosen in random string.
Fig. 6 is shown according to one example embodiment of the disclosure since at the bebinning character, in the random character
The detail flowchart of encryption key is obtained in string.
Fig. 7 shows the flow chart of the dynamic ciphertext data according to one example embodiment of the disclosure.
Fig. 8 shows the electronic equipment figure of the dynamic encryption data set according to one example embodiment of the disclosure.
Fig. 9 shows the computer readable storage medium of the dynamic encryption data system according to one example embodiment of the disclosure
Figure.
Figure 10 shows the electronic equipment figure of the dynamic ciphertext data device according to one example embodiment of the disclosure.
Figure 11 shows the computer-readable storage medium of the dynamic ciphertext data system according to one example embodiment of the disclosure
Matter figure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot
Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps
More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can
It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used
Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and
So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure
Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function
Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form
Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place
These functional entitys are realized in reason device device and/or microcontroller device.
The purpose of the disclosure is that the dynamic from technical aspect realization data encryption carries out, and improves the safety of data encryption
Property.According to the method for the dynamic encryption data of an embodiment of the present disclosure, comprising: obtain the random words as encryption key source
Symbol is gone here and there and is stored;Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;
According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;From institute
It states bebinning character to start, obtains encryption key in the random string;According to scheduled Encryption Algorithm, the encryption is used
Key pair data packet to be sent is encrypted;Encrypted data packet to be sent is sent.With data in traditional technology
Key pair used in encryption and decryption is comparing for fixation, and embodiment of the disclosure passes through to be carried out at dynamic according to random string
The encryption and decryption key of dynamic change is applied in data transmission, improves to obtain the encryption and decryption key of dynamic change by reason
The safety of data transmission.
It is to be understood that illustrating as illustrative, " charactor " described in present embodiment is to use
ASCII character coding mode is encoded, but is not represented the method that the present invention is protected and be only limited to ASCII character to the use of character
The character of coding.
Fig. 1 shows the flow chart of the method for the dynamic encryption data according to one example embodiment of the disclosure:
Step S100: it obtains the random string as encryption key source and is stored;
Step S110: specified abstract fortune is carried out to the specific characteristic information about the data packet transmission between server
It calculates;
Step S120: encryption key is chosen as a result, determining from the random string according to the specified abstract
Bebinning character;
Step S130: since the bebinning character, encryption key is obtained in the random string;
Step S140: according to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Step S150: encrypted data packet to be sent is sent.
In the following, by detailed solution is carried out in conjunction with each step of the attached drawing to dynamic encryption data above-mentioned in this example embodiment
It releases and illustrates.
In the step s 100, it obtains the random string as encryption key source and is stored.
Random string refers to one section of character string that the multiple random characters generated by server form, the random string
It is used to therefrom obtain encryption key.
In one embodiment, as shown in figure 4, step S100 includes:
Step S1001: random string acquisition request is sent to server;
Step S1002: the random string generated after the server authentication passes through is received;
Step S1003: the random string is stored.
By obtaining the random string as encryption key and being stored, it ensure that both client and server are deposited
The random string store up, used it is consistent so that in subsequent process, server can obtain client according to the random string
Used encryption key when being encrypted to data packet.
In one embodiment, user end to server sends logging request and random string acquisition request.Server
Authentication is carried out to client, after being verified, the logging request sent with client is responded and is asked with random string acquisition
It asks, server generates a string of random strings using random string generator, the database of server end is stored it in, and
Send it to client.Client is stored in client database after receiving random string.So, objective
Family end and server save identical random string.
In step s 110, specified abstract is carried out to the specific characteristic information about the data packet transmission between server
Operation.
Specific characteristic information refers to the predetermined information for being included with the related specific part of the data packet.
Abstract operation is the operation for using digest algorithm to carry out.Digest algorithm, also known as hash algorithm, hash algorithm.Abstract
Algorithm has following three classes algorithm: MD, SHA, MAC.
Since characteristic information changes with the difference of data packet to be sent, abstract operation is carried out to the characteristic information and is obtained
The result arrived also dynamic change therewith.The abstract operation result of the dynamic change will be used for determining encryption key, therefore institute
The dynamic change for stating abstract operation result is to realize the premise of dynamic encryption.By this method, reached and obtained dynamic change
Abstract operation result purpose.
In one embodiment, the specific characteristic information about the data packet transmission between server includes: number to be sent
The data in the predetermined position in a upper data packet sent according to the forward direction server of packet.Such as: before data packet to be sent
Rear 10 bytes of the upper data packet sent to server are as specific characteristic information, after a upper data packet
10 bytes carry out MD5 operation.For first data packet to be sent, then rear 10 bytes of the random string are made
MD5 operation is carried out for the specific characteristic information.If less than 10 bytes of the random string, in the random character
Several characters " 0 " are continuously added before string, until the random string there are 10 bytes.Character is added to by described
" 0 " has specific characteristic information of the random string of 10 bytes as first data packet to be sent.
In one embodiment, the specific characteristic information about the data packet transmission between server includes: number to be sent
The upper data packet sent according to the forward direction server of packet.Using it is described to server send a upper data packet as described in
Send the characteristic information of data packet.For first data packet to be sent, using the random string as its characteristic information.
In the step s 120, adding as a result, determining and being chosen from the random string according to the specified abstract operation
The bebinning character of key, as shown in Figure 5, comprising:
Step S1201: the result of the abstract operation is converted into number;
Step S1202: predetermined length of the number to the length for being less than or equal to the random string is subjected to mould
Operation obtains modular arithmetic result;
Step S1203: the character corresponded at the modular arithmetic result on the random string is determined as the encryption
The bebinning character of key.
Since the abstract operation is the result is that dynamic change, by this method, has reached by the abstract operation
Result determine the encryption key bebinning character be also dynamic change purpose.
In one embodiment, it is described abstract operation result be 16 systems indicate, for use 10 systems expression institute
The length for stating random string unifies system, and the result of the abstract operation is first converted to the number of 10 systems.For example, abstract
Operation result is 3000000007 after being converted to 10 systems.The length of the random string is 20 bytes, and needing will be described
Predetermined length is determined as a number less than or equal to 20.The predetermined length is determined as 15, uses 3000000007 pairs
15 carry out modular arithmetic, and the modular arithmetic result acquired is 7.The 7th character on lawsuit random string is then determined as the encryption
The bebinning character of key.It is to guarantee mould that the predetermined length, which is determined as the length less than or equal to the random string,
Length of the operation result without departing from the random string, it is ensured that be not in hair the case where can not choosing bebinning character
It is raw.
In step s 130, since the bebinning character, encryption key, such as Fig. 6 are obtained in the random string
It is shown, comprising:
Step S1301: in the random string, since at the bebinning character, every predetermined number character
A character is taken, until taking out predetermined number of characters;
Step S1302: it combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
By choosing character in the random string, carry out sequence combination has achieved the purpose that obtain encryption key.
In one embodiment, the random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 5 characters, starting
Character is " 9 ", and the predetermined number being separated by determined is 2, i.e., takes out a character every two characters.5 then successively taken out
Character is " 9 ", " d ", " 2 ", " Y ", " P ", and the character string thus formed is " 9d2YP ".Then by character string " 9d2YP " as encryption
Key.
In one embodiment, in the random string, since at the bebinning character, every predetermined number word
Symbol takes a character, until taking out predetermined number of characters, comprising: if got when predetermined number character takes character
Character and the number of characters at last character interval of the random string be less than or equal to the predetermined number, will be described
All characters of random string successively add behind the last character, to obtained new random string weight
Newly since at the bebinning character, character is taken every predetermined number character, until taking out predetermined number of characters.Example
Such as, the random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 7 characters, bebinning character is " 9 ", and what is determined is pre-
Surely the number being separated by is 3, i.e., takes out a character every three characters.The character successively taken out is " 9 ", " h ", " 4 ", " P ", is taken
When to character " P ", the number of characters with last character interval is 0.All characters of the random string are successively added
It is added in behind the last character, obtains new random string " aFk980dhb254YVjP1aFk980dhb254Y
VjP1".Since bebinning character, in this example, to take out a character every three characters since first character " 9 ".
The character successively taken out is " 9 ", " h ", " 4 ", " P ", " k ", " d ", " 5 ", and the character string thus formed is " 9h4Pkd5 ".Then will
Character string " 9h4Pkd5 " is used as encryption key.
In step S140, according to scheduled Encryption Algorithm, data packet to be sent is added using the encryption key
It is close.
Scheduled Encryption Algorithm refers to that both sides arrange in the communication protocol formulated when client and server establish connection
Good Encryption Algorithm.
In this way, the encryption to data packet is realized.
In one embodiment, both sides establish the communication protocol agreement formulated when connection and use DES symmetric encipherment algorithm logarithm
According to being encrypted.Then from the random string obtain 8 characters encryption key, using the encryption key to data packet into
Row encryption.
In step S150, encrypted data packet to be sent is sent.
By this method, the transmission for the data packet to be sent that encryption is completed is realized.
Fig. 7 shows the flow chart of the dynamic ciphertext data according to one example embodiment of the disclosure:
Step S200: the encrypted packet from client is received;
Step S210: it obtains the random string as decruption key source and is stored, this is as decruption key
The random string in source and the encrypted packet encryption encryption key used from random string it is identical;
Step S220: specified abstract is carried out to the specific characteristic information about the data packet transmission between the client
Operation
Step S230: according to the specified abstract operation as a result, determining that selection decryption is close from the random string
The bebinning character of key;
Step S240: since the bebinning character, decruption key is obtained in the random string;
Step S250: according to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the solution
Encryption Algorithm used by close algorithm is encrypted with encrypted packet is corresponding.
In one embodiment, after server and client establish connection, server deposits the random string of generation
It stores up and is sent to client.It is established in communication protocol used in connection in the two, has arranged specific characteristic information, specified abstract
The algorithm of algorithm, the concrete mode for determining key, encryption and decryption.After server receives the encrypted packet from client, to finger
Determine characteristic information and carry out abstract operation, obtained abstract operation result is consistent with the abstract operation result that client obtains.Service
The result for operation of making a summary is converted to 10 binary digits by device, using the number to pre- less than or equal to random character string length
Measured length carries out modular arithmetic, the starting for the character at the modular arithmetic result will be corresponded on random string being determined as decruption key
Character.
In step S240, since the bebinning character, decruption key is obtained in the random string.
In one embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement, therefore
Encryption key is identical as decruption key.The random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 5 characters, rise
Beginning character is " 9 ", and the predetermined number being separated by determined is 2, i.e., takes out a character every two characters.5 then successively taken out
A character is " 9 ", " d ", " 2 ", " Y ", " P ", and the character string thus formed is " 9d2YP ".Then by character string " 9d2YP " as solution
Key.
In another embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement, because
This encryption key is identical as decruption key.The random string is " aFk980dhb254YVjP1 ", makes a reservation for take out 7 characters,
Bebinning character is " 9 ", and the predetermined number being separated by determined is 3.Thus the character successively taken out is " 9 ", " h ", " 4 ", " P ", is taken
When to character " P ", the number of characters with last character interval is 0.All characters of the random string are successively added
It is added to behind last character, obtains new random string " aFk980dhb254YVjP1aFk980dhb254YVj
P1".Since bebinning character, in this example, to take out a character every three characters since first character " 9 ".According to
The character of secondary taking-up is " 9 ", " h ", " 4 ", " P ", " k ", " d ", " 5 ", and the character string thus formed is " 9h4Pkd5 ".Then by word
Symbol string " 9h4Pkd5 " is used as decruption key.
In step S250, according to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, it should
Decipherment algorithm is corresponding with Encryption Algorithm used by encrypted packet.
In one embodiment, use DES as enciphering and deciphering algorithm in the communication protocol of server and client agreement.Service
After device obtains decruption key, using DES decipherment algorithm, the encrypted packet received is solved using the decruption key
It is close.
As shown in Fig. 2, in one embodiment, providing a kind of device of dynamic encryption data, specifically including: first obtains
Module 310, computing module 320, second obtain module 330, encrypting module 340, sending module 350.
First obtains module 310, for obtaining the random string;
Computing module 320, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module 330, for obtaining the encryption key;
Encrypting module 340, for encrypting the data packet;
Sending module 350, for sending the encrypted data packet to be sent.
The function of modules and the realization process of effect are specifically detailed in the side of above-mentioned dynamic encryption data in above-mentioned apparatus
The realization process of step is corresponded in method, details are not described herein.
As shown in figure 3, in one embodiment, providing a kind of device of dynamic ciphertext data, specifically including: receiving module
410, first module 420, computing module 430 are obtained, second obtains module 440, deciphering module 450.
Receiving module 410, for receiving the encrypted packet from client;
First obtains module 420, for obtaining the random string;
Computing module 430, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module 440, for obtaining the decruption key;
Deciphering module 450, for decrypting the encrypted packet.
The function of modules and the realization process of effect are specifically detailed in the side of above-mentioned dynamic ciphertext data in above-mentioned apparatus
The realization process of step is corresponded in method, details are not described herein.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould
The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want
These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize
Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/
Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment
Method.
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 8.The electronics that Fig. 8 is shown
Equipment 500 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 8, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap
It includes but is not limited to: at least one above-mentioned processing unit 510, at least one above-mentioned storage unit 520, the different system components of connection
The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510
Row, so that various according to the present invention described in the execution of the processing unit 510 above-mentioned " illustrative methods " part of this specification
The step of illustrative embodiments.For example, the processing unit 510 can execute step S100 as shown in fig. 1: obtaining conduct
The random string in encryption key source is simultaneously stored;Step S110: to about the data packet transmission between server
Specific characteristic information carries out specified abstract operation;Step S120: according to it is described it is specified abstract operation as a result, determine from it is described with
The bebinning character of encryption key is chosen in machine character string;Step S130: since the bebinning character, in the random string
Middle acquisition encryption key;Step S140: according to scheduled Encryption Algorithm, data packet to be sent is carried out using the encryption key
Encryption;Step S150: encrypted data packet to be sent is sent.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 5201 and/or cache memory unit 5202, it can further include read-only memory unit (ROM) 5203.
Storage unit 520 can also include program/utility with one group of (at least one) program module 5205
5204, such program module 5205 includes but is not limited to: operating system, one or more application program, other program moulds
It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 530 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 communicate, and/or with make
Any equipment (such as the router, modulation /demodulation that the electronic equipment 500 can be communicated with one or more of the other calculating equipment
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with
By network adapter 560 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500.
It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not
Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and
Data backup storage system etc..
The electronic equipment 500 ' of this embodiment according to the present invention is described referring to Figure 10.The electricity that Fig. 8 is shown
Sub- equipment 500 ' is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in Figure 10, electronic equipment 500 ' is showed in the form of universal computing device.The component of electronic equipment 500 ' can
To include but is not limited to: at least one above-mentioned processing unit 510 ', connects not homologous ray at least one above-mentioned storage unit 520 '
The bus 530 ' of component (including storage unit 520 ' and processing unit 510 ').
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510 '
Row, so that various according to the present invention described in the processing unit 510 ' execution above-mentioned " illustrative methods " part of this specification
The step of illustrative embodiments.For example, the processing unit 510 ' can execute step S200 as shown in Figure 7: receiving and
From the encrypted packet of client;Step S210: it obtains the random string as decruption key source and is stored, the work
For the random string in decruption key source and the used encryption key of encrypted packet encryption from random string
It is identical;Step S220: specified abstract fortune is carried out to the specific characteristic information about the data packet transmission between the client
It calculates;Step S230: according to the specified abstract operation as a result, determining from choosing decruption key in the random string
Beginning character;Step S240: since the bebinning character, decruption key is obtained in the random string;Step S250: root
According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm and encrypted packet
Encryption Algorithm used by encrypting is corresponding.
Storage unit 520 ' may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 5201 ' and/or cache memory unit 5202 ', it can further include read-only memory unit (ROM) 5203 '.
Storage unit 520 ' can also include program/utility with one group of (at least one) program module 5205 '
5204 ', such program module 5205 ' includes but is not limited to: operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 530 ' can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 500 ' can also be with one or more external equipments 700 ' (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 ' communicate, and/or with make
The electronic equipment 500 ' can with it is one or more of the other calculating equipment be communicated any equipment (such as router, modulation
Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 550 '.Also, electronic equipment 500 '
Network adapter 560 ' and one or more network (such as local area network (LAN), wide area network (WAN) and/or public affairs can also be passed through
Common network network, such as internet) communication.As shown, network adapter 560 ' passes through its of bus 530 ' and electronic equipment 500 '
The communication of its module.It should be understood that although not shown in the drawings, other hardware and/or software can be used in conjunction with electronic equipment 500 '
Module, including but not limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, magnetic
Tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with
Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also
In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute
Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair
The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method of embodiment according to the present invention
600, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
With reference to shown in Figure 11, the program product for realizing the above method of embodiment according to the present invention is described
600 ', can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention
It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable
Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or
Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim
It points out.
Claims (14)
1. a kind of method of dynamic encryption data characterized by comprising
It obtains the random string as encryption key source and is stored;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between server;
According to the specified abstract operation as a result, determining the bebinning character for choosing encryption key from the random string;
Since the bebinning character, encryption key is obtained in the random string;
According to scheduled Encryption Algorithm, data packet to be sent is encrypted using the encryption key;
Encrypted data packet to be sent is sent.
2. the method according to claim 1, which is characterized in that obtain the random string as encryption key source and deposited
Storage, comprising:
Random string acquisition request is sent to server;
Receive the random string generated after the server authentication passes through;
The random string is stored.
3. the method according to claim 1, which is characterized in that the specific characteristic letter about the data packet transmission between server
Breath includes: the data in the middle predetermined position for the upper data packet that the forward direction server of data packet to be sent is sent.
4. the method according to claim 1, which is characterized in that the specific characteristic letter about the data packet transmission between server
Breath includes: the upper data packet that the forward direction server of data packet to be sent is sent.
5. the method according to claim 1, which is characterized in that according to it is described it is specified abstract operation as a result, determine from it is described with
The bebinning character of encryption key is chosen in machine character string, comprising:
The result of the abstract operation is converted into number;
Predetermined length of the number to the length for being less than or equal to the random string is subjected to modular arithmetic, obtains modular arithmetic
As a result;
The bebinning character for the character at the modular arithmetic result will be corresponded on the random string being determined as the encryption key.
6. the method according to claim 1, which is characterized in that since at the bebinning character, in the random string
Obtain encryption key, comprising:
In the random string, since at the bebinning character, a character is taken every predetermined number character, until
Until taking out predetermined number of characters;
It combines the character of the taking-up according to the sequence of taking-up, as the encryption key.
7. method according to claim 6, which is characterized in that in the random string, since at the bebinning character,
A character is taken every predetermined number character, until taking out predetermined number of characters, comprising: if every predetermined number
Character takes the number of characters at the last character interval for the character and random string got when character to be less than or equal to institute
Predetermined number is stated, all characters of the random string are successively added behind the last character, to obtaining
New random string again since at the bebinning character, take character every predetermined number character, it is pre- until taking out
Until fixed number of characters.
8. a kind of method of dynamic ciphertext data characterized by comprising
Receive the encrypted packet from client;
It obtains the random string as decruption key source and is stored, the random string as decruption key source
With encrypted packet encryption encryption key used from random string it is identical;
Specified abstract operation is carried out to the specific characteristic information about the data packet transmission between the client;
According to the specified abstract operation as a result, determining the bebinning character for choosing decruption key from the random string;
Since the bebinning character, decruption key is obtained in the random string;
According to scheduled decipherment algorithm, encrypted packet is decrypted using the decipherment algorithm, the decipherment algorithm and encryption
Encryption Algorithm used by data packet encrypts is corresponding.
9. a kind of device of dynamic encryption data characterized by comprising
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the encryption key;
Encrypting module, for encrypting the data packet;
Sending module, for sending the encrypted data packet to be sent.
10. a kind of electronic equipment of dynamic encryption data, is characterized in that, comprising:
Receiver is configured to receive the random string;
Processor is configured to perform claim and requires method described in any of 1-7;
Transmitter is configured to send the encrypted data packet to be sent.
11. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer
When instruction is computer-executed, computer is made to execute method described in any of -7 according to claim 1.
12. a kind of device of dynamic ciphertext data characterized by comprising
Receiving module, for receiving the encrypted packet from client;
First obtains module, for obtaining the random string;
Computing module, the specific characteristic information for transmitting to the data packet carry out specified abstract operation;
Second obtains module, for obtaining the decruption key;
Deciphering module, for decrypting the encrypted packet.
13. a kind of electronic equipment of dynamic encryption data, is characterized in that, comprising:
Transmitter is configured to send the random string to client;
Receiver is configured to receive the encrypted packet from client;
Processor is configured to perform claim and requires method described in 8.
14. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer
When instruction is computer-executed, computer is made to execute method according to claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810995538.9A CN109150499B (en) | 2018-08-29 | 2018-08-29 | Method and device for dynamically encrypting data, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810995538.9A CN109150499B (en) | 2018-08-29 | 2018-08-29 | Method and device for dynamically encrypting data, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150499A true CN109150499A (en) | 2019-01-04 |
CN109150499B CN109150499B (en) | 2021-06-08 |
Family
ID=64829087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810995538.9A Active CN109150499B (en) | 2018-08-29 | 2018-08-29 | Method and device for dynamically encrypting data, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150499B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
CN110048835A (en) * | 2019-03-27 | 2019-07-23 | 北京三快在线科技有限公司 | The method and apparatus of encryption, storage medium |
CN110176986A (en) * | 2019-05-30 | 2019-08-27 | 杭州奇治信息技术股份有限公司 | A kind of data ciphering method of multi-enciphering, device and mobile terminal |
CN110324143A (en) * | 2019-05-24 | 2019-10-11 | 平安科技(深圳)有限公司 | Data transmission method, electronic equipment and storage medium |
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN110492998A (en) * | 2019-08-14 | 2019-11-22 | 郑州大学 | Methods of encrypting and decrypting data |
CN110784313A (en) * | 2019-09-25 | 2020-02-11 | 苏州浪潮智能科技有限公司 | Key protection method, device and storage medium |
CN111260365A (en) * | 2020-03-13 | 2020-06-09 | 上海商米科技集团股份有限公司 | Encryption method and device for protecting transaction security |
CN111368323A (en) * | 2020-03-24 | 2020-07-03 | 杨九妹 | Medical insurance financial user information encryption method and system based on big data |
CN112769543A (en) * | 2019-10-21 | 2021-05-07 | 千寻位置网络有限公司 | Method and system for protecting dynamic secret key |
CN113254966A (en) * | 2021-06-04 | 2021-08-13 | 王兆河 | Dynamic encryption method and ciphertext structure of medical digital image information |
CN113352318A (en) * | 2021-04-29 | 2021-09-07 | 国网浙江省电力有限公司嘉兴供电公司 | Intelligent robot communication link self-checking selection method |
CN113364760A (en) * | 2021-06-01 | 2021-09-07 | 平安科技(深圳)有限公司 | Data encryption processing method and device, computer equipment and storage medium |
CN113901003A (en) * | 2021-10-11 | 2022-01-07 | 智慧足迹数据科技有限公司 | Abstract compression method and related device |
CN114186105A (en) * | 2021-12-13 | 2022-03-15 | 中国农业银行股份有限公司 | A string comparison method, device, device and storage medium |
CN114422143A (en) * | 2022-01-13 | 2022-04-29 | 中国平安人寿保险股份有限公司 | Artificial intelligence based dynamic data encryption method, device, equipment and medium |
CN114978711A (en) * | 2022-05-25 | 2022-08-30 | 山东国子软件股份有限公司 | Data transmission method and system for symmetric encryption of dynamic secret key |
CN115001662A (en) * | 2022-06-02 | 2022-09-02 | 中国银行股份有限公司 | Data encryption method and device, computer equipment and storage medium |
CN115694902A (en) * | 2022-09-27 | 2023-02-03 | 中国工商银行股份有限公司 | Second kill request method and second kill verification method, device, system and medium |
CN115694805A (en) * | 2022-10-28 | 2023-02-03 | 上海壁仞智能科技有限公司 | Electronic device, integrated circuit design and manufacturing method and product operation method |
CN116388964A (en) * | 2023-03-31 | 2023-07-04 | 统信软件技术有限公司 | Digest generation method, digest generation device, computing device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060020907A1 (en) * | 2004-07-23 | 2006-01-26 | Nec Electronics Corporation | Copy protection method and system for programmable gate array |
CN106506159A (en) * | 2016-11-18 | 2017-03-15 | 上海艾讯云计算有限公司 | Encryption method and equipment for key safety |
US20170075877A1 (en) * | 2015-09-16 | 2017-03-16 | Marie-Therese LEPELTIER | Methods and systems of handling patent claims |
CN106788995A (en) * | 2016-12-07 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | File encrypting method and device |
CN106941407A (en) * | 2017-05-10 | 2017-07-11 | 成都课迪科技有限公司 | A kind of method and apparatus of platform data dynamic encryption |
-
2018
- 2018-08-29 CN CN201810995538.9A patent/CN109150499B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060020907A1 (en) * | 2004-07-23 | 2006-01-26 | Nec Electronics Corporation | Copy protection method and system for programmable gate array |
US20170075877A1 (en) * | 2015-09-16 | 2017-03-16 | Marie-Therese LEPELTIER | Methods and systems of handling patent claims |
CN106506159A (en) * | 2016-11-18 | 2017-03-15 | 上海艾讯云计算有限公司 | Encryption method and equipment for key safety |
CN106788995A (en) * | 2016-12-07 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | File encrypting method and device |
CN106941407A (en) * | 2017-05-10 | 2017-07-11 | 成都课迪科技有限公司 | A kind of method and apparatus of platform data dynamic encryption |
Non-Patent Citations (1)
Title |
---|
张蜀男: "《云存储中高效密文检索的中文数据加密方案》", 《计算机科学》 * |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688160A (en) * | 2019-01-28 | 2019-04-26 | 平安科技(深圳)有限公司 | Data Encryption Transmission control method, device, computer equipment and storage medium |
CN110048835A (en) * | 2019-03-27 | 2019-07-23 | 北京三快在线科技有限公司 | The method and apparatus of encryption, storage medium |
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN110324143A (en) * | 2019-05-24 | 2019-10-11 | 平安科技(深圳)有限公司 | Data transmission method, electronic equipment and storage medium |
CN110324143B (en) * | 2019-05-24 | 2022-03-11 | 平安科技(深圳)有限公司 | Data transmission method, electronic device and storage medium |
CN110176986A (en) * | 2019-05-30 | 2019-08-27 | 杭州奇治信息技术股份有限公司 | A kind of data ciphering method of multi-enciphering, device and mobile terminal |
CN110492998A (en) * | 2019-08-14 | 2019-11-22 | 郑州大学 | Methods of encrypting and decrypting data |
CN110784313A (en) * | 2019-09-25 | 2020-02-11 | 苏州浪潮智能科技有限公司 | Key protection method, device and storage medium |
CN112769543A (en) * | 2019-10-21 | 2021-05-07 | 千寻位置网络有限公司 | Method and system for protecting dynamic secret key |
CN112769543B (en) * | 2019-10-21 | 2022-06-28 | 千寻位置网络有限公司 | Method and system for protecting dynamic secret key |
CN111260365A (en) * | 2020-03-13 | 2020-06-09 | 上海商米科技集团股份有限公司 | Encryption method and device for protecting transaction security |
CN111368323A (en) * | 2020-03-24 | 2020-07-03 | 杨九妹 | Medical insurance financial user information encryption method and system based on big data |
CN113352318A (en) * | 2021-04-29 | 2021-09-07 | 国网浙江省电力有限公司嘉兴供电公司 | Intelligent robot communication link self-checking selection method |
CN113364760A (en) * | 2021-06-01 | 2021-09-07 | 平安科技(深圳)有限公司 | Data encryption processing method and device, computer equipment and storage medium |
CN113254966A (en) * | 2021-06-04 | 2021-08-13 | 王兆河 | Dynamic encryption method and ciphertext structure of medical digital image information |
CN113901003A (en) * | 2021-10-11 | 2022-01-07 | 智慧足迹数据科技有限公司 | Abstract compression method and related device |
CN114186105A (en) * | 2021-12-13 | 2022-03-15 | 中国农业银行股份有限公司 | A string comparison method, device, device and storage medium |
CN114422143A (en) * | 2022-01-13 | 2022-04-29 | 中国平安人寿保险股份有限公司 | Artificial intelligence based dynamic data encryption method, device, equipment and medium |
CN114422143B (en) * | 2022-01-13 | 2023-06-20 | 中国平安人寿保险股份有限公司 | Data dynamic encryption method, device, equipment and medium based on artificial intelligence |
CN114978711A (en) * | 2022-05-25 | 2022-08-30 | 山东国子软件股份有限公司 | Data transmission method and system for symmetric encryption of dynamic secret key |
CN115001662A (en) * | 2022-06-02 | 2022-09-02 | 中国银行股份有限公司 | Data encryption method and device, computer equipment and storage medium |
CN115694902A (en) * | 2022-09-27 | 2023-02-03 | 中国工商银行股份有限公司 | Second kill request method and second kill verification method, device, system and medium |
CN115694805A (en) * | 2022-10-28 | 2023-02-03 | 上海壁仞智能科技有限公司 | Electronic device, integrated circuit design and manufacturing method and product operation method |
CN116388964A (en) * | 2023-03-31 | 2023-07-04 | 统信软件技术有限公司 | Digest generation method, digest generation device, computing device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109150499B (en) | 2021-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150499A (en) | Method, apparatus, computer equipment and the storage medium of dynamic encryption data | |
US20140282840A1 (en) | Managing data handling policies | |
WO2016089710A1 (en) | Secure computer evaluation of decision trees | |
CN105897784B (en) | Internet-of-things terminal equipment encryption communication method and device | |
US10990692B2 (en) | Managing data handling policies | |
CN110177099A (en) | Method for interchanging data, transmission terminal and medium based on asymmetric encryption techniques | |
CN110912877B (en) | Data transmitting and receiving method and device based on IEC61850 model in transformer substation | |
CN112182635A (en) | Method, device, equipment and medium for realizing joint modeling | |
CN109257176A (en) | Decruption key segmentation and decryption method, device and medium based on SM2 algorithm | |
CN109560914A (en) | Data ciphering method and device, storage medium, electronic equipment | |
CN115580489B (en) | Data transmission method, device, equipment and storage medium | |
CN107872315B (en) | Data processing method and intelligent terminal | |
CN109391473A (en) | A kind of method, apparatus and storage medium of Electronic Signature | |
CN109446751A (en) | Generate the method, apparatus and storage medium of the data set including multiple subfiles | |
CN112261015B (en) | Information sharing method, platform, system and electronic equipment based on block chain | |
CN109951294A (en) | Information update management method and relevant device in electronic labelling system | |
CN112242978B (en) | Method and device for processing data | |
CN112784237A (en) | Authentication processing method, authentication authorization method and related equipment of electronic document | |
CN115412246B (en) | Method, device, equipment and storage medium for inadvertent transmission | |
CN117633848A (en) | User information joint processing method, device, equipment and computer readable medium | |
CN114363094B (en) | Data sharing method, device, equipment and storage medium | |
US10313315B2 (en) | Ensuring information security in data transfers by utilizing proximity keys | |
CN110232570A (en) | A kind of information monitoring method and device | |
CN115242389A (en) | Data confusion transmission method and system based on multi-level node network | |
CN115086428A (en) | Network request sending method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |