CN115270150A - Communication data encryption method, device, equipment and storage medium thereof - Google Patents
Communication data encryption method, device, equipment and storage medium thereof Download PDFInfo
- Publication number
- CN115270150A CN115270150A CN202210817077.2A CN202210817077A CN115270150A CN 115270150 A CN115270150 A CN 115270150A CN 202210817077 A CN202210817077 A CN 202210817077A CN 115270150 A CN115270150 A CN 115270150A
- Authority
- CN
- China
- Prior art keywords
- communication data
- encryption algorithm
- encryption
- encrypting
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method, a device, equipment and a storage medium for encrypting communication data, wherein the method comprises the following steps: acquiring communication data sent by a user, and carrying out data encryption judgment to determine whether the communication data is encrypted; when the communication data are determined to be encrypted, acquiring a preset encryption algorithm for encrypting the communication data, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm; and encrypting the communication data by adopting a preset encryption algorithm. The encryption algorithm of the invention has diversity, and can carry out personalized encryption on the communication data according to the personal requirements of users.
Description
Technical Field
The present invention relates to the field of data encryption, and in particular, to a method, an apparatus, a device and a storage medium for encrypting communication data
Background
At present, a lot of communication tools greatly infringe on personal privacy, even a user can form a large database in the background backup data of the communication tool, and lawless persons such as hackers can easily obtain a large amount of personal data such as chatting records, transfer records, learning materials and the like by decrypting the background backup data, so that the personal data of the user is easily lost. The user personal data security is not guaranteed, and some unexpected troubles may be brought to the user. In the prior art, an encryption algorithm adopted for encrypting communication data is single, and the reliability is low.
Disclosure of Invention
Based on the above, a method, an apparatus, a device and a storage medium for encrypting communication data are provided to solve the problems of single encryption algorithm and low reliability in encrypting communication data in the prior art.
In a first aspect, an embodiment of the present invention provides a method for encrypting communication data, where the method includes the following steps:
the method comprises the steps of obtaining communication data sent by a user, and carrying out data encryption judgment to determine whether the communication data is encrypted;
when the communication data are determined to be encrypted, acquiring a preset encryption algorithm for encrypting the communication data, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm;
and encrypting the communication data by adopting the preset encryption algorithm.
Optionally, the obtaining communication data sent by a user, and performing data encryption judgment to determine whether to encrypt the communication data includes:
the method comprises the steps of obtaining communication data and dividing the grade of the communication data, wherein the grade comprises the following steps: very important, general, and not important;
when the grade of the communication data is very important, important or general, encrypting the communication data;
when the level of the communication data is not important, the communication data is not encrypted.
Optionally, the classifying the communication data includes:
detecting the privacy of the communication data, wherein the privacy of the communication data is preset;
when the privacy of the communication data is greater than a first threshold value, the level corresponding to the communication data is very important;
when the privacy of the communication data is smaller than a first threshold and larger than a second threshold, the level corresponding to the communication data is important;
when the privacy of the communication data is smaller than a second threshold and larger than a third threshold, the grade corresponding to the communication data is generally important;
and when the privacy of the communication data is smaller than a third threshold value, the grade corresponding to the communication data is unimportant.
Optionally, the obtaining a preset encryption algorithm for encrypting the communication data includes:
when the communication data is judged to be general in grade, selecting the local default encryption algorithm to encrypt the data;
and when the level of the communication data is judged to be important, sending N options of the encryption algorithm to be selected to a foreground for selection by a user, wherein N is greater than 2, and acquiring the encryption algorithm independently selected by the user for data encryption.
Optionally, when the communication data is judged to be of a very important level, pushing an encryption algorithm editing page to a foreground for a user to design an algorithm, and acquiring an encryption algorithm independently designed by the user to encrypt data.
Optionally, before acquiring the encryption algorithm autonomously designed by the user for data encryption, the method further includes: and compiling the encryption algorithm, and reporting an error when the encryption algorithm is compiled to have an error.
Optionally, after the encryption algorithm is successfully compiled, the method further includes: and pushing a key editing page to a foreground for a user to input a key, wherein the length of the key is set by the user independently, and the key is used as an input parameter of the encryption algorithm.
In a second aspect, an embodiment of the present invention provides an apparatus for encrypting communication data, where the apparatus includes:
the encryption judging unit is used for acquiring communication data sent by a user and carrying out data encryption judgment to determine whether the communication data is encrypted;
the encryption algorithm selection unit is used for acquiring a preset encryption algorithm for encrypting the communication data when the communication data are determined to be encrypted, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm;
and the encryption unit is used for encrypting the communication data by adopting the preset encryption algorithm.
In a third aspect, an embodiment of the present invention provides an encryption device for communication data, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements the encryption method for the communication data when executing the computer program.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium includes a stored computer program, and when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the above encryption method for communication data.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides a communication data encryption method, device, equipment and storage medium thereof, firstly, the invention judges the encryption of the communication data to judge whether the communication data needs to be encrypted, and the communication data which does not need encryption protection is not encrypted to improve the transmission efficiency of the communication data. When the communication data is encrypted, a user can independently select an encryption algorithm used for encrypting the communication data, the encryption algorithm can be a local default encryption algorithm or a local self-contained encryption algorithm which can be independently selected by the user or an encryption algorithm which is independently designed by the user, the user independently selects the encryption algorithm for encrypting the communication data, personalized confidentiality can be realized according to the requirement of the user, the autonomy of the user is improved, in addition, the encryption algorithm which is independently designed by the user is used for encrypting the very important communication data, and the safety is higher.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart illustrating an encryption method for communication data according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an encryption apparatus for communication data according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an encryption device for communication data according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present invention and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present invention. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather mean "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless otherwise specifically stated.
It should be understood that, the sequence numbers of the steps in the following embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by the function and the internal logic thereof, and should not limit the implementation process of the embodiments of the present invention in any way.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Referring to fig. 1, which is a flowchart of a method for encrypting communication data according to an embodiment of the present invention, the method includes:
s101, communication data sent by a user are obtained, and data encryption judgment is carried out to determine whether the communication data are encrypted or not.
The communication data may include: the private contents such as the chat records, the transfer records and the photos can also comprise some public contents such as learning materials and entertainment videos.
In one example, obtaining communication data sent by a user, and performing a data encryption judgment to determine whether to encrypt the communication data includes:
the method comprises the following steps of obtaining communication data and dividing the grade of the communication data, wherein the grade comprises the following steps: very important, general, and not important;
when the grade of the communication data is very important, important or general, encrypting the communication data;
when the level of the communication data is not important, the communication data is not encrypted.
In one example, the ranking of the communication data includes:
detecting the privacy of the communication data, wherein the privacy of the communication data is preset;
when the privacy of the communication data is greater than a first threshold value, the corresponding grade of the communication data is very important;
when the privacy of the communication data is smaller than a first threshold and larger than a second threshold, the grade corresponding to the communication data is important;
when the privacy of the communication data is smaller than the second threshold and larger than the third threshold, the grade corresponding to the communication data is generally important;
and when the privacy of the communication data is less than the third threshold value, the grade corresponding to the communication data is unimportant.
The privacy of the communication data is preset, and specifically, the privacy can be set as follows: the privacy of the chat records in the communication data is a first preset value, the privacy of the entertainment videos in the communication data is a second preset value, and the privacy of the pictures in the communication data is a third preset value.
By dividing the grade of the communication data, different encryption algorithms can be adopted for encrypting the communication data with different grades. When the grade of the communication data is unimportant, encryption is not carried out, and the transmission time of the communication data can be saved. The more important the level of the communication data is, the better the encryption effect can be adopted for encryption, so that the communication data with important user level can not be leaked and lost.
S102, when the communication data are determined to be encrypted, a preset encryption algorithm for encrypting the communication data is obtained, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm.
In one example, obtaining a predetermined encryption algorithm for encrypting communication data includes:
when the communication data is judged to be of a general grade, a local default encryption algorithm is selected for data encryption;
and when the communication data is judged to be important, sending N options of the encryption algorithm to be selected to the foreground for the user to select, wherein N is greater than 2, and acquiring the encryption algorithm independently selected by the user for data encryption.
The alternative encryption algorithms may include: MD5, AES, ECB, etc., the local default encryption algorithm may be one of the candidate encryption algorithms, or may be a preset encryption algorithm different from all the N candidate encryption algorithms.
When the communication data is judged to be of a general grade, the privacy degree of the communication data is not high, only a general encryption algorithm needs to be adopted, the general communication data of the grade is easy to be broken by lawless persons, and the communication data safety of a user can be generally guaranteed.
When the level of the communication data is judged to be important, the communication data is proved to have high privacy, the encryption algorithm selected by the user is needed, and as the encryption algorithm selected by the user has arbitrariness, when a lawbreaker breaks the communication data, the lawbreaker needs to adopt one decryption algorithm to try to break one by one, the breaking difficulty is high, so that the communication data with the important level is not easy to break by the lawbreaker, and the communication data safety of the user can be guaranteed.
In one example, when the communication data is judged to be of a very important level, an encryption algorithm editing page is pushed to a foreground for a user to design an algorithm, and an encryption algorithm independently designed by the user is obtained for data encryption.
When the communication data is judged to be of a very important level, the communication data is proved to have very high privacy, an encryption algorithm independently designed by a user is needed, the encryption algorithm independently designed by the user is extremely uncertain and is not a conventionally used encryption algorithm, for lawbreakers, the communication data of the user cannot be decrypted by the conventional decryption algorithm, and the conventional decryption scheme is not feasible by adopting one decryption algorithm to try to break the encryption algorithm one by one.
In one example, before obtaining the encryption algorithm designed by the user independently for data encryption, the method further comprises: and compiling the encryption algorithm, and reporting an error when the encryption algorithm is compiled to be in error.
Compiling is a process of converting a source code into a machine language code, after a user inputs a code which is designed and compiled by himself in an encryption algorithm editing page, compiling the code to judge whether the code has some grammatical errors, and when errors occur in the encryption algorithm compiling, reporting the errors to remind the user to correct the errors.
In one example, after the encryption algorithm is successfully compiled, the method further comprises: and pushing a key editing page to a foreground for a user to input a key, wherein the length of the key is set by the user independently, and the key is used as an input parameter of an encryption algorithm.
It should be noted that the encryption algorithm includes two input parameters, one is a secret key, and the other is plaintext, i.e. the communication data. The longer and more complex the key, the more difficult it is for a lawless person to break. In order to achieve better encryption effect, the user can set the key as long and as complicated as possible.
S103, encrypting the communication data by adopting a preset encryption algorithm.
The encryption algorithm inputs the key and the communication data, and then the encrypted file or the encrypted document can be output.
The invention firstly carries out encryption judgment on the communication data to judge whether the communication data needs to be encrypted, and the communication data which is not important and does not need encryption protection is not encrypted to improve the transmission efficiency of the communication data. When the communication data is encrypted, a user can independently select an encryption algorithm used for encrypting the communication data, the encryption algorithm can be a local default encryption algorithm or a local self-contained encryption algorithm which can be independently selected by the user or an encryption algorithm which is independently designed by the user, the user independently selects the encryption algorithm for encrypting the communication data, personalized confidentiality can be realized according to the requirement of the user, the autonomy of the user is improved, in addition, the encryption algorithm which is independently designed by the user is used for encrypting the very important communication data, and the safety is higher.
Referring to fig. 2, a schematic diagram of an encryption apparatus for communication data according to an embodiment of the present invention is shown, where the apparatus includes:
an encryption judgment unit 201, configured to acquire communication data sent by a user, and perform data encryption judgment to determine whether to encrypt the communication data;
the encryption algorithm selecting unit 202 is configured to, when it is determined that the communication data is encrypted, obtain a preset encryption algorithm for encrypting the communication data, where the preset encryption algorithm is one of a locally default encryption algorithm, an autonomously selected encryption algorithm, and an autonomously designed encryption algorithm;
and the encryption unit 203 is used for encrypting the communication data by adopting a preset encryption algorithm.
Optionally, the encryption determining unit includes:
the system comprises a grade dividing unit, a communication data processing unit and a communication data processing unit, wherein the grade dividing unit is used for acquiring communication data and dividing the grade of the communication data, and the grade comprises: very important, general, and not important;
the judging unit is used for encrypting the communication data when the grade of the communication data is important, important or general; when the level of the communication data is not important, the communication data is not encrypted.
Optionally, the ranking unit includes:
the detection subunit is used for detecting the privacy of the communication data, wherein the privacy of the communication data is preset;
the first grade subunit is used for determining the grade corresponding to the communication data to be very important when the privacy of the communication data is greater than a first threshold;
the second grade subunit is used for determining the grade corresponding to the communication data as important when the privacy of the communication data is smaller than the first threshold and larger than the second threshold;
the third grade subunit is used for judging that the grade corresponding to the communication data is generally important when the privacy of the communication data is smaller than the second threshold and larger than a third threshold;
and the fourth grade subunit is used for judging whether the grade corresponding to the communication data is unimportant when the privacy of the communication data is smaller than the third threshold.
Optionally, the encryption algorithm selecting unit includes: the first selection unit is used for selecting the local default encryption algorithm to encrypt data when the communication data is judged to be general in grade;
the second selection unit is used for sending N options of the encryption algorithm to be selected to the foreground for selection by a user when the communication data is judged to be important in level, wherein N is greater than 2, and the encryption algorithm selected by the user is obtained for data encryption;
and the third selection unit pushes an encryption algorithm editing page to a foreground for a user to design an algorithm when the communication data is judged to be of a very important level, and obtains an encryption algorithm independently designed by the user to encrypt the data.
Optionally, the third selecting unit includes:
an encryption algorithm design unit: the encryption algorithm editing page is pushed to the foreground for the user to design the algorithm when the communication data is judged to be very important in level, and the encryption algorithm independently designed by the user is obtained;
a compiling unit: the device is used for compiling the encryption algorithm and reporting an error when the encryption algorithm is compiled to be in error;
a key input unit: the key editing device is used for pushing a key editing page to a foreground for a user to input a key, the length of the key is set by the user independently, and the key is used as an input parameter of an encryption algorithm.
The specific principle and the implementation process of each unit in the encryption device for communication data disclosed in the above-described embodiment are the same as the encryption method for communication data disclosed in the embodiment shown in fig. 1, and reference may be made to corresponding parts in the encryption method for communication data disclosed in the embodiment shown in fig. 1, which are not described again here.
Referring to fig. 3, a schematic diagram of an encryption apparatus for communication data according to an embodiment of the present invention is provided, where the apparatus includes a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, and the processor implements the encryption method for the communication data when executing the computer program.
The encryption device for communication data may include a processor and a memory, but is not limited to the processor and the memory. It will be understood by those skilled in the art that fig. 3 is merely an example of an encryption device for communication data, and does not constitute a limitation of the encryption device for communication data, and the encryption device for communication data may include more or less components than those shown in the drawings, or may combine some components, or different components, such as a network interface, a display screen, an input device, and the like.
The Processor may be a CPU, or other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory includes a readable storage medium, an internal memory, and the like, wherein the internal memory may be an internal memory of the computer device (i.e., the above-mentioned onboard control system), and the internal memory provides an environment for the operating system and the execution of the computer-readable instructions in the readable storage medium. The readable storage medium may be a hard disk of the computer device, and in other embodiments may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the computer device. Further, the memory may also include both internal and external storage units of the computer device. The memory is used for storing an operating system, application programs, a BootLoader (BootLoader), data, and other programs, such as program codes of a computer program, and the like. The memory may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and simplicity of description, the foregoing functional units and partitions are merely illustrated as examples, and in practical applications, the above functions may be distributed as needed and performed by different functional units and partitions, that is, the internal structure of the device may be partitioned into different functional units or partitions, so as to perform all or part of the functions described above. Each functional unit and unit in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention. For the specific working processes of the units in the above-mentioned apparatus, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.
The embodiment of the invention also provides a computer-readable storage medium, which comprises a stored computer program, wherein when the computer program runs, the equipment where the computer-readable storage medium is located is controlled to execute the communication data encryption method. The method of the present invention, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method of the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium and used by a processor to implement the steps of the above method embodiments. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code, recording medium, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media. Such as a usb-drive, a removable hard drive, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
The present invention can also be implemented by a computer program product, which when executed on a computer device causes the computer device to implement all or part of the processes in the method of the above embodiments.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein.
Claims (10)
1. A method for encrypting communication data, comprising:
communication data sent by a user is obtained, and data encryption judgment is carried out to determine whether the communication data is encrypted or not;
when the communication data are determined to be encrypted, acquiring a preset encryption algorithm for encrypting the communication data, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm;
and encrypting the communication data by adopting the preset encryption algorithm.
2. The method for encrypting communication data according to claim 1, wherein the obtaining communication data sent by a user, and performing data encryption judgment to determine whether to encrypt the communication data comprises:
the method comprises the steps of obtaining communication data and dividing the grade of the communication data, wherein the grade comprises the following steps: very important, general, and not important;
when the grade of the communication data is very important, important or general, encrypting the communication data;
when the level of the communication data is not important, the communication data is not encrypted.
3. The method for encrypting communication data according to claim 2, wherein said classifying the communication data includes:
detecting the privacy of the communication data, wherein the privacy of the communication data is preset;
when the privacy of the communication data is greater than a first threshold value, the level corresponding to the communication data is very important;
when the privacy of the communication data is smaller than a first threshold and larger than a second threshold, the corresponding grade of the communication data is important;
when the privacy of the communication data is smaller than a second threshold and larger than a third threshold, the grade corresponding to the communication data is generally important;
and when the privacy of the communication data is less than a third threshold value, the grade corresponding to the communication data is unimportant.
4. The method for encrypting communication data according to claim 1, wherein obtaining a predetermined encryption algorithm for encrypting the communication data comprises:
when the communication data is judged to be in a general grade, the local default encryption algorithm is selected for data encryption;
and when the communication data is judged to be important, sending N options of the encryption algorithm to be selected to the foreground for the user to select, wherein N is greater than 2, and acquiring the encryption algorithm independently selected by the user for data encryption.
5. The method according to claim 2 or 4, wherein when the communication data is judged to be of high importance, an encryption algorithm editing page is pushed to the foreground for the user to design the algorithm, and the encryption algorithm designed by the user is obtained for data encryption.
6. The method for encrypting communication data according to claim 5, wherein the step of obtaining the encryption algorithm designed by the user independently for data encryption further comprises: and compiling the encryption algorithm, and reporting an error when the encryption algorithm is compiled to have an error.
7. The method for encrypting communication data according to claim 6, further comprising, after the successful compilation of the encryption algorithm: and pushing a key editing page to a foreground for a user to input a key, wherein the length of the key is set by the user independently, and the key is used as an input parameter of the encryption algorithm.
8. An apparatus for encrypting communication data, comprising:
the encryption judgment unit is used for acquiring communication data sent by a user and carrying out data encryption judgment to determine whether the communication data is encrypted;
the encryption algorithm selection unit is used for acquiring a preset encryption algorithm for encrypting the communication data when the communication data are determined to be encrypted, wherein the preset encryption algorithm is one of a local default encryption algorithm, an autonomously selected encryption algorithm and an autonomously designed encryption algorithm;
and the encryption unit is used for encrypting the communication data by adopting the preset encryption algorithm.
9. An encryption apparatus for communication data, comprising a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the processor implementing a method of encrypting communication data according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, comprising a stored computer program, wherein when the computer program runs, the computer-readable storage medium controls a device to execute the encryption method of the communication data according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210817077.2A CN115270150A (en) | 2022-07-12 | 2022-07-12 | Communication data encryption method, device, equipment and storage medium thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210817077.2A CN115270150A (en) | 2022-07-12 | 2022-07-12 | Communication data encryption method, device, equipment and storage medium thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115270150A true CN115270150A (en) | 2022-11-01 |
Family
ID=83765289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210817077.2A Pending CN115270150A (en) | 2022-07-12 | 2022-07-12 | Communication data encryption method, device, equipment and storage medium thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115270150A (en) |
-
2022
- 2022-07-12 CN CN202210817077.2A patent/CN115270150A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100576196C (en) | Content encryption method, system and method for providing content over network using the encryption method | |
JP6814147B2 (en) | Terminals, methods, non-volatile storage media | |
CN105577379A (en) | Information processing method and apparatus thereof | |
CN109787956B (en) | Data table encryption method and device, computer equipment and storage medium | |
CN110912920A (en) | Data processing method, apparatus and medium | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN113225297A (en) | Data hybrid encryption method, device and equipment | |
CN113839780A (en) | Encryption method, decryption method, server and storage medium | |
CN106685897B (en) | Safe input method, device and system | |
CN114189862A (en) | Wireless terminal and interface access authentication method of wireless terminal in Uboot mode | |
CN113542187A (en) | File uploading and downloading method and device, computer device and medium | |
KR101485968B1 (en) | Method for accessing to encoded files | |
CN114915504A (en) | Security chip initial authentication method and system | |
CN110674525A (en) | Electronic equipment and file processing method thereof | |
CN106549754A (en) | The method and apparatus of management key | |
US7945046B2 (en) | Decryption processing apparatus, decryption method and image forming apparatus | |
CN106452755B (en) | The method, apparatus and system of resetting protection password based on client decryption ciphertext | |
CN105022965A (en) | Data encryption method and apparatus | |
KR101630462B1 (en) | Apparatus and Method for Securing a Keyboard | |
CN106341227B (en) | The method, apparatus and system of resetting protection password based on server decryption ciphertext | |
CN115270150A (en) | Communication data encryption method, device, equipment and storage medium thereof | |
CN111064736A (en) | Data transmission method and equipment | |
CN110830252B (en) | Data encryption method, device, equipment and storage medium | |
JP2007020065A (en) | Decryption backup method, decryption restoration method, attestation device, individual key setting machine, user terminal, backup equipment, encryption backup program, decryption restoration program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |