CN107809428A - A kind of information ciphering method, decryption method, device and storage medium - Google Patents

A kind of information ciphering method, decryption method, device and storage medium Download PDF

Info

Publication number
CN107809428A
CN107809428A CN201711023802.4A CN201711023802A CN107809428A CN 107809428 A CN107809428 A CN 107809428A CN 201711023802 A CN201711023802 A CN 201711023802A CN 107809428 A CN107809428 A CN 107809428A
Authority
CN
China
Prior art keywords
information
key
encryption
sent
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711023802.4A
Other languages
Chinese (zh)
Inventor
璧垫尝
赵波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
MIGU Interactive Entertainment Co Ltd
MIGU Culture Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
MIGU Interactive Entertainment Co Ltd
MIGU Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, MIGU Interactive Entertainment Co Ltd, MIGU Culture Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201711023802.4A priority Critical patent/CN107809428A/en
Publication of CN107809428A publication Critical patent/CN107809428A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0832Special goods or special handling procedures, e.g. handling of hazardous or fragile goods

Abstract

The invention discloses a kind of information ciphering method, including:Obtain target information;The target information includes type I information and the second category information, and the type I information includes the information of the first object, and second category information includes the information of the second object;The type I information is encrypted using first key, to obtain generating the type I information after the encryption of the first Quick Response Code;Second category information is encrypted using the second key, to obtain generating the second category information after the encryption of the second Quick Response Code;The first key is sent to second object, second key is sent to the 3rd object.The present invention further simultaneously discloses a kind of information encryption device and storage medium.

Description

A kind of information ciphering method, decryption method, device and storage medium
Technical field
The present invention relates to logistics information security fields, more particularly to a kind of information ciphering method, decryption method, device and deposit Storage media.
Background technology
With flourishing for ecommerce, a series of development of periphery industries has been driven, wherein, delivery industry is benefited A most obvious industry.After especially carrying out express delivery system of real name, sender need to fill in real name and contact method, have Also need to fill in identification card number, in this way, making delivery industry further normalization;But at the same time, the information peace on papery express delivery list Full problem also begins to expose, and has the complete personal information such as name, specific address, contact method on traditional papery express delivery list, The hiding social harm in its behind is very big, the criminals such as easily express mail is falsely claimed as one's own in growth, house robbery is murdered and blackmailed Crime.
Electronics is gradually begun to use to send single (also referred to as electronics waybill) to replace papery express delivery list, to avoid transporting now During reveal address and the private information such as telephone number, the address of addressee and telephone number of sender.For example, sender Can by client (for ease of description, claiming electronics to send client), come input sender and the respective information of addressee (including Above-mentioned private information) etc.;The electronics that courier uses sends client, then can be according to sender and the respective letter of addressee Breath generation Quick Response Code, and printed to Quick Response Code in paper labels by printing equipment.The paper labels can be affixed on express mail, So that courier is subsequently scanned and acquisition of information.
However, even using such as upper type, can also there are the information such as sender, addressee and pass through barcode scanning two dimension by other people The risk that the mode of code is revealed.
How to ensure to send the safety of single information comprising the electronics including above-mentioned private information, be that prior art is urgently to be resolved hurrily The problem of.
For ease of description, electronics used in sender or sender is sent into client, referred to as the first object;It will receive Electronics used in part people or addressee sends client, referred to as the second object;Courier or courier are used Electronics sends client, referred to as the 3rd object.
It is similar, exist similar to sender, addressee and courier these three objects other scenes in, also may be used Can exist similar needs to ensure the problem of target information (such as electronics sends single information) is safe.
The content of the invention
In view of this, the embodiment of the present invention it is expected to provide a kind of information ciphering method, device and storage medium, to solve Under the scene that the three kind object associated with target information be present, how to ensure the problem of target information is safe.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
The embodiment of the present invention provides a kind of information ciphering method, and methods described includes:
Obtain target information;The target information includes type I information and the second category information, the type I information bag The information of the first object is included, second category information includes the information of the second object;
The type I information is encrypted using first key, after obtaining generating the encryption of the first Quick Response Code Type I information;Second category information is encrypted using the second key, to obtain generating the second Quick Response Code The second category information after encryption;
The first key is sent to second object, second key is sent to the 3rd object.
In such scheme, the type I information is encrypted using first key, using the second key to described Two category informations are encrypted, including:
Using first key and the first AES, the type I information is encrypted;Use the second key and institute The first AES is stated second category information is encrypted;Or
Using first key and the first AES, the type I information is encrypted;Use the second key and Second category information is encrypted two AESs.
In such scheme, the Cipher Strength of second AES, more than the Cipher Strength of first AES.
It is described the first key is sent to second object to include in such scheme:
By way of short message, the first key is sent to second object.
In such scheme, before the type I information is encrypted using first key, methods described also includes:It is local Generate the first key;
Before second category information is encrypted using the second key, methods described also includes:Local generation described the Two keys.
In such scheme, the target information, including:
Electronics sends single information.
The embodiment of the present invention also provides a kind of information encryption device, and described device includes:First acquisition module, encryption mould Block, the first sending module;Wherein,
First acquisition module, for obtaining target information;The target information includes type I information and the second class Information, the type I information include the information of the first object, and second category information includes the information of the second object;
The encrypting module, for the type I information to be encrypted using first key, to obtain generating Type I information after the encryption of first Quick Response Code;Second category information is encrypted using the second key, to be used To generate the second category information after the encryption of the second Quick Response Code;
First sending module, for the first key to be sent into second object, by second key It is sent to the 3rd object.
The embodiment of the present invention also provides a kind of storage medium, is stored thereon with executable program, the executable code Step described in any one foregoing information ciphering method is realized during computing device.
The embodiment of the present invention also provides a kind of information encryption device, including memory, processor and storage are on a memory And the executable program that can be run by the processor, the processor perform foregoing any when running the executable program Step described in a kind of information ciphering method.
Information ciphering method, device and the storage medium that the embodiment of the present invention is provided, pass through what target information was included The information of first object and the information of the second object are encrypted respectively, further, on the one hand, according to the first couple after encryption The information generation Quick Response Code of the second object after the information of elephant and encryption, on the other hand, corresponding key is only sent to accordingly Object, even if so as to which the people for attempting steal information gets information by way of barcode scanning Quick Response Code, also due to not possessing Key and confidential information can not be solved, so as to avoid reveal target information risk, ensure that the safety of target information.
Brief description of the drawings
Fig. 1 is the implementation process schematic diagram for the information ciphering method that the embodiment of the present invention one provides;
Fig. 2 is that a kind of electronics sends single composition form schematic diagram;
Fig. 3 is the composition structure and interactive relation schematic diagram of the terminal and the terminal of the second object of the first object;
Fig. 4 is the composition structure and interactive relation schematic diagram of the terminal of the terminal of the first object, server and the second object;
Fig. 5 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention two provides;
Fig. 6 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention three provides;
Fig. 7 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention four provides;
Fig. 8 is the composition structural representation for the information encryption device that the embodiment of the present invention five provides;
Fig. 9 is the hardware architecture diagram for the information encryption device that the embodiment of the present invention six provides;
Figure 10 is the composition structural representation that the information that the embodiment of the present invention seven provides decrypts device;
Figure 11 is the hardware architecture diagram that the information that the embodiment of the present invention eight provides decrypts device;
Figure 12 is the composition structural representation that the information that the embodiment of the present invention nine provides decrypts device;
Figure 13 is the hardware architecture diagram that the information that the embodiment of the present invention ten provides decrypts device;
Figure 14 is the composition structural representation that the information that the embodiment of the present invention 11 provides decrypts device;
Figure 15 is the hardware architecture diagram that the information that the embodiment of the present invention 12 provides decrypts device.
Embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present invention and technology contents, below in conjunction with the accompanying drawings to this hair The realization of bright embodiment is described in detail, appended accompanying drawing purposes of discussion only for reference, is not used for limiting the present invention.
In embodiments of the present invention, the terminal can include but is not limited to:Mobile phone, flat board, palm PC, notebook electricity The electronic equipments such as brain, personal computer (PC).
As shown in figure 1, the implementation process schematic diagram for the information ciphering method that the embodiment of the present invention one provides, the present embodiment should Client is sent for electronics used in the terminal of the first object or the first object, is comprised the following steps:
Step 101:Obtain target information;The target information includes type I information and the second category information, and described first Category information includes the information of the first object, and second category information includes the information of the second object.
Specifically, terminal can obtain target information from client, and target information includes type I information and the second class Information, type I information include the information of the first object, and the second category information includes the information of the second object.Using client as electronics Exemplified by sending client, target information sends single information including electronics, the information of the first object can include sender's information and Object information is sent, the information of the second object can include addressee information.
For ease of description, electronics used in sender or sender is sent into client, referred to as the first object;It will receive Electronics used in part people or addressee sends client, referred to as the second object;Courier or courier are used Electronics sends client, referred to as the 3rd object.
In practical application, sender wants to send goods, can send client request electronics by the electronics in terminal List is sent, can be then probabilistically assigned and sent the electronics of odd numbers and send list, wherein, sending odd numbers can be by server according to existing Some sends the generation of odd numbers generating algorithm, and the electronics for being sent to by server sender sends client;Sender can pass through The electronics of pattern as shown in Figure 2 sends list, the information such as sender and the respective address of addressee, telephone number is inputted, such as Fig. 2 institutes Show, electronics, which is sent single information and is divided into, to be sent odd numbers, sender's information, addressee information and send object information, sender's letter Breath includes sender's name, telephone number and address, and addressee information includes addressee's name, telephone number and address, sent Object information includes sending contents of object, sending the information such as object type.
Above-mentioned electronics sends the form for the eight papery waybills for singly referring to that waybill discards tradition, and with a electron number According to form existence information system in, similar ' E-TICKET ', i.e. electronic passenger ticket, are the important symbols for realizing electronic logisticses.
Step 102:The type I information is encrypted using first key, to obtain generating the first Quick Response Code Encryption after type I information;Second category information is encrypted using the second key, to obtain generating second The second category information after the encryption of Quick Response Code.
It is local to generate first key corresponding with type I information while terminal obtains target information in this step, with And the second key corresponding with the second category information.
Terminal can use first key and the first AES, and type I information is encrypted;Use the second key The second category information is encrypted with the first AES;Or
Using first key and the first AES, type I information is encrypted;Added using the second key and second Second category information is encrypted close algorithm;Wherein, the Cipher Strength of the second AES, more than the encryption of the first AES Intensity, here, Cipher Strength refer to the complexity of AES, i.e., to AES used in the second category information relative to right AES is more complicated used in type I information, for example, the complexity of AES encryption algorithm is less than RSA cryptographic algorithms Complexity, therefore, it is possible to use type I information is encrypted AES encryption algorithm, the second class is believed using RSA cryptographic algorithms Breath is encrypted.
For example, in the present embodiment, it is assumed that terminal uses first key and the first AES, and type I information is entered Row encryption;The second category information is encrypted using the second key and the second AES.
Specifically, the first AES can be AES encryption algorithm, and first key can be AES encryption key, wherein, AES encryption algorithm is a kind of symmetric encipherment algorithm, the algorithm specifically used encryption function, referred to as AES encryption function, symmetrically AES, which refers to encrypt and decrypted, uses identical key;
Second AES can be RSA cryptographic algorithms, and the second key can be RSA key pair, wherein, RSA key pair Including public key and private key, public key and private key are a pair, if information be encrypted with private key, then only with corresponding public key It could decrypt, because encryption and decryption use two different keys, RSA cryptographic algorithms are called asymmetric encryption calculation Method.
For example, the first object part as shown in Figure 3, the terminal of the first object is close using AES encryption algorithm and AES encryption Key, type I information is encrypted, wherein, AES encryption key KEY is the password for type I information to be encrypted, If AES encryption function is E, then C=E (KEY, P), wherein P is type I information, and KEY is key, and C is the first kind after encryption Information;That is, being inputted using type I information P and key KEY as the parameter of encryption function, then encryption function E can be defeated The type I information gone out after encryption, and the type I information after encryption is sent to server.
First object part as shown in Figure 4, the terminal of the first object uses RSA cryptographic algorithms, using private key to second Category information is encrypted, the second category information after being encrypted, and the second category information after encryption is sent to server.
Here, the type I information after encryption can make server generate the first Quick Response Code, and the second category information after encryption can Server is set to generate the second Quick Response Code.
Preferably, the present embodiment can also use Elgamal AESs, knapsack algorithm, elliptic curve encryption algorithm (ECC) The non-encrypted algorithm such as AES.
Specifically, the second category information after the type I information after encryption and encryption is sent to server by terminal, so that Server generates the first Quick Response Code corresponding with the type I information after encryption, generates corresponding with the second category information after encryption Second Quick Response Code.For example, the first Quick Response Code of generation and the second Quick Response Code can be sent to transmitting-receiving express delivery people by server Member, so, courier can utilize the 2 D code information obtained to print to Quick Response Code by the printing equipment of handheld terminal Papery is sent on list.
Step 103:The first key is sent to second object, second key is sent to the 3rd pair As.
Specifically, it is assumed that terminal is mobile phone, then using the telephone number in the information of the second object, passes through short message Mode, first key is sent to the second object, here, the second object can be the terminal of addressee;Or can be by first Key is first sent to server, and the second object is sent to by server;It should be noted that by first key with direct or indirect Mode send the technology of the second object and can be applicable in the present embodiment, and be not only restricted to above-mentioned implementation.With This simultaneously, the second key is sent to server by terminal, meet setting condition after, the 3rd object is sent to by server.
After second object receives the goods that the first object is sent, the two dimension on list can be sent by terminal scanning papery Code, to obtain the type I information after encrypting, and the type I information after encryption is solved using the first key received It is close, so as to obtain type I information;After 3rd object receives the goods that the first object is sent, terminal scanning papery can be passed through The Quick Response Code on list is sent, to obtain the second category information after encrypting, and utilizes the after the second key pair encryption for receiving Two category informations are decrypted, so as to obtain the second category information;Therefore, even if the people for attempting steal information passes through barcode scanning Quick Response Code Mode gets information, also due to not possessing key and can not solve confidential information, so as to avoid revealing the wind of target information Danger, ensure that the safety of target information.
The process of information encryption is had been described in detail in the present embodiment, and the process of information decryption is described in detail below.
The implementation process of the information decryption method provided below the embodiment of the present invention two, which is done, further to be described in detail.
Fig. 5 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention two provides, and the present embodiment is applied to Electronics used in the terminal of second object or the second object sends client;As shown in figure 5, the information decryption side of the present embodiment Method comprises the following steps:
Step 501:Receive the first key of the first object transmission.
In this step, it is assumed that terminal is mobile phone, then can receive that the first object is sent by way of short message first Key, in addition, also receiving the associated with first key first mark of the first object transmission, here, the first mark can be electricity Son is sent only number.
Step 502:By way of scanning Quick Response Code, the type I information after encryption is obtained.
Specifically, server receives the type I information after the encryption of the terminal transmission of the first object, and generates and encrypt First Quick Response Code corresponding to type I information afterwards, for example, it is fast that the Quick Response Code of generation can be sent to transmitting-receiving by server Personnel are passed, and so, courier can utilize the 2 D code information obtained Quick Response Code to be beaten by the printing equipment of handheld terminal Papery is printed to send on list.
After second object receives the goods that the first object is sent, the two dimension on list can be sent by terminal scanning papery Code, to obtain the type I information after encrypting, in addition, by way of scanning Quick Response Code, also obtain and the first kind after encryption Second mark of information association, here, the second mark can be that electronics be sent only number.
Step 503:The type I information after the encryption is decrypted using the first key.
Specifically, it is consistent to determine that the first mark identifies whether with second for terminal, here, determines the first mark and the second mark It is whether consistent, can be to determine both electronics send it is only number whether consistent, it is determined that when consistent, using first key to encryption Type I information afterwards is decrypted.
For example, the second object part as shown in Figure 3, the terminal of the second object enter row information solution using AES decryption functions D Close operation, P=D (KEY, C) is obtained, wherein C is the type I information after encryption, and KEY is the key that the first object is sent, and P is Type I information, that is to say, that inputted using the type I information C after encryption and key KEY as the parameter of decryption function, then Decryption function can export type I information P, so that the second object knows type I information.
The implementation process of the information decryption method provided below the embodiment of the present invention three, which is done, further to be described in detail.
Fig. 6 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention three provides, and the present embodiment is applied to Electronics used in the terminal of 3rd object or the 3rd object sends client;As shown in fig. 6, the information decryption side of the present embodiment Method comprises the following steps:
Step 601:By way of scanning Quick Response Code, the second category information after encryption is obtained.
Specifically, server receives the second category information after the encryption of the terminal transmission of the first object, and generates and encrypt Second Quick Response Code corresponding to the second category information afterwards, for example, it is fast that the Quick Response Code of generation can be sent to transmitting-receiving by server Personnel are passed, and so, courier can utilize the 2 D code information obtained Quick Response Code to be beaten by the printing equipment of handheld terminal Papery is printed to send on list.
It should be noted that sending single-phase corresponding papery with electronics sends the second object in the second category information in list Address information, the address information in the region in city where can showing the second object, the address that the address information includes region are believed Breath, and the address information of at least one subregion for belonging to the region.For example, it can only show that Ye, an ancient place in Henan Province is built in Nanjing Area, that is to say, that on the second category information, the second Quick Response Code corresponding to the second category information of single display can be sent in papery, and Partial address information, so conveniently send company and destination to is rapidly only transported goods by the address information in region, but Specific information will not be revealed.
3rd object receives the goods that the first object is sent, and reaches the address in the region in the second object place city After information, the Quick Response Code on list can be sent by terminal scanning papery, to obtain the second category information after encrypting, in addition, logical The mode of Quick Response Code is over-scanned, also obtains the information of threeth mark associated with the second category information after encryption, here, the 3rd Mark can be that electronics be sent only number.
Step 602:The request for obtaining the second key is sent to server.
Specifically, terminal sends the request for obtaining the second key to server;And the information of the 3rd mark is sent to clothes Business device, to cause server according to the information of the 3rd mark, to send second key associated with the information of the 3rd mark;This Outside, location information can also be obtained by the GPS module of itself, and is sent to server, to cause server to perform: When the address information for judging the positional information and the second cipher key associated matches, the second key is sent;So, can sentence It is disconnected should be the courier for reaching this address in request key, rather than attempt the personnel of steal information and (attempt steal information Personnel, tend not to appear in so accurate region).
Step 603:Receive second key that the server is sent, using second key to the encryption after The second category information be decrypted.
For example, the 3rd object part as shown in Figure 4, the public key of the terminal the reception server transmission of the 3rd object, are utilized The second category information after encryption is decrypted public key, so as to obtain the information of the second object, for example, address information is Nanjing Jianye District Yu Run street 88-1, addressee's name Amy and addressee's telephone number 123456.
The implementation process of the information decryption method provided below the embodiment of the present invention four, which is done, further to be described in detail.
Fig. 7 is the implementation process schematic diagram for the information decryption method that the embodiment of the present invention four provides, and the present embodiment is applied to Server;As shown in fig. 7, the information decryption method of the present embodiment comprises the following steps:
Step 701:Receive the second key of the first object transmission.
Step 702:When receiving the request of acquisition second key of the 3rd object transmission, by the 3rd object Positional information is matched with the address information of second cipher key associated.
Specifically, when server receives the request of the key of acquisition second of the 3rd object transmission, the 3rd object is also received The information of the 3rd mark sent, and the location of the 3rd object information, wherein, the positional information bag of the 3rd object The address information in region residing for the 3rd object is included, the address information includes the address information in region, and at least one ownership In the address information of the subregion in the region.Then, server is by the positional information of the 3rd object and the second cipher key associated The address information in region is matched.
Step 703:When determining result to match, second key is sent to the 3rd object.
In this step, the address information phase of the positional information and the second cipher key associated of the 3rd object is judged in server Timing, according to the information of the 3rd mark, second key associated with the information of the 3rd mark is sent to the 3rd object.
To realize the method described in embodiment one, the embodiment of the present invention five provides a kind of information encryption device, this implementation Example is arranged in the terminal of the first object, as shown in figure 8, the device includes:First acquisition module 801, encrypting module 802, One sending module 803;Wherein,
First acquisition module 801, for obtaining target information;The target information includes type I information and second Category information, the type I information include the information of the first object, and second category information includes the information of the second object;
Here, the target information includes:Electronics sends single information.
The encrypting module 802, for the type I information to be encrypted using first key, to obtain to life Type I information into after the encryption of the first Quick Response Code;Second category information is encrypted using the second key, to obtain To generate the second category information after the encryption of the second Quick Response Code;
First sending module 803, it is close by described second for the first key to be sent into second object Key is sent to the 3rd object.
The encrypting module 802, specifically for using first key and the first AES, the type I information is entered Row encryption;Second category information is encrypted using the second key and first AES;Or
Using first key and the first AES, the type I information is encrypted;Use the second key and Second category information is encrypted two AESs.
Here, the Cipher Strength of second AES, more than the Cipher Strength of first AES.
First sending module 803, specifically for by way of short message, the first key being sent to described Second object.
The device also includes:First generation module 804 and the second generation module 805;Wherein,
First generation module 804, the first key is generated for local;
Second generation module 805, the first key is generated for local.
In actual applications, first acquisition module 801, encrypting module 802, the generation of the first sending module 803, first Module 804, the second generation module 805 can be by central processing unit (CPU, the Central Processing in terminal Unit), microprocessor (MPU, Micro Processor Unit), digital signal processor (DSP, Digital Signal Processor) or field programmable gate array (FPGA, Field Programmable Gate Array) etc. is realized.
It should be noted that:The information encryption device that above-described embodiment provides is when entering row information encryption, only with above-mentioned each The division progress of program module as needed can distribute above-mentioned processing by different journeys for example, in practical application Sequence module is completed, i.e., the internal structure of device is divided into different program modules, to complete whole described above or portion Manage office.In addition, the information encryption device that above-described embodiment provides belongs to same design with information ciphering method embodiment, it has Body implementation process refers to embodiment of the method, repeats no more here.
To realize the above method, the embodiment of the present invention additionally provides another information encryption device, should applied to end side The executable program that device includes memory, processor and storage on a memory and can run by the processor, it is described When processor runs the executable program, following operate is performed:
Obtain target information;The target information includes type I information and the second category information, the type I information bag The information of the first object is included, second category information includes the information of the second object;
The type I information is encrypted using first key, after obtaining generating the encryption of the first Quick Response Code Type I information;Second category information is encrypted using the second key, to obtain generating the second Quick Response Code The second category information after encryption;
The first key is sent to second object, second key is sent to the 3rd object.
When the processor is additionally operable to run the executable program, following operate is performed:
Using first key and the first AES, the type I information is encrypted;Use the second key and institute The first AES is stated second category information is encrypted;Or
Using first key and the first AES, the type I information is encrypted;Use the second key and Second category information is encrypted two AESs.
When the processor is additionally operable to run the executable program, following operate is performed:
By way of short message, the first key is sent to second object.
When the processor is additionally operable to run the executable program, following operate is performed:
It is local to generate the first key;
It is local to generate second key.
Below so that information encryption device is embodied as the terminal for information encryption as an example, to the hardware of the information encryption device Structure is described further.
Fig. 9 is the hardware architecture diagram for the information encryption device that the embodiment of the present invention six provides, applied to end side, figure Information encryption device 900 shown in 9 includes:At least one processor 901, memory 902, user interface 903 and at least one Network interface 904.Each component in described information encryption device 900 is coupled by bus system 905.It is understood that Bus system 905 is used to realize the connection communication between these components.Bus system 905 is also wrapped in addition to including data/address bus Include power bus, controlling bus and status signal bus in addition.But for the sake of clear explanation, various buses are all marked in fig.9 For bus system 905.
Wherein, user interface 903 can include display, keyboard, mouse, trace ball, click wheel, button, button, sense of touch Plate or touch-screen etc..
It is appreciated that memory 902 can be volatile memory or nonvolatile memory, may also comprise volatibility and Both nonvolatile memories.
Memory 902 in the embodiment of the present invention is used to store various types of data to support information encryption device 900 Operation.The example of these data includes:For any computer program operated on information encryption device 900, can such as hold Line program 9021, realize that the program of present invention method may be embodied in executable program 9021.
The method that the embodiments of the present invention disclose can apply in processor 901, or be realized by processor 901. Processor 901 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.Above-mentioned processing Device 901 can be general processor, DSP, either other PLDs, discrete gate or transistor logic, point Vertical nextport hardware component NextPort etc..Disclosed each method, step and logic in the embodiment of the present invention can be realized or performed to processor 901 Block diagram.General processor can be microprocessor or any conventional processor etc..With reference to disclosed in the embodiment of the present invention The step of method, hardware decoding processor can be embodied directly in and perform completion, or with the hardware in decoding processor and soft Part block combiner performs completion.Software module can be located in storage medium, and the storage medium is located at memory 902, processor 901 read the information in memory 902, with reference to the step of its hardware completion preceding method.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of storage medium, applied to end side, the storage Executable program is stored with medium, when the processor 901 of the executable code information encryption device 900 is run, is performed Operate below:
Obtain target information;The target information includes type I information and the second category information, the type I information bag The information of the first object is included, second category information includes the information of the second object;
The type I information is encrypted using first key, after obtaining generating the encryption of the first Quick Response Code Type I information;Second category information is encrypted using the second key, to obtain generating the second Quick Response Code The second category information after encryption;
The first key is sent to second object, second key is sent to the 3rd object.
When the processor 901 of the executable code information encryption device 900 is run, following operate also is performed:
Using first key and the first AES, the type I information is encrypted;Use the second key and institute The first AES is stated second category information is encrypted;Or
Using first key and the first AES, the type I information is encrypted;Use the second key and Second category information is encrypted two AESs.
When the processor 901 of the executable code information encryption device 900 is run, following operate also is performed:
By way of short message, the first key is sent to second object.
When the processor 901 of the executable code information encryption device 900 is run, following operate also is performed:
It is local to generate the first key;
It is local to generate second key.
To realize the method described in embodiment two, the embodiment of the present invention seven provides a kind of information decryption device, this implementation Example is arranged in the terminal of the second object, and as shown in Figure 10, the device includes:First receiving module 1001, the second acquisition module 1002nd, the first deciphering module 1003;Wherein,
First receiving module 1001, the first key sent for receiving the first object;
Second acquisition module 1002, for by way of scanning Quick Response Code, obtaining the type I information after encryption;
First deciphering module 1003, for being carried out using the first key to the type I information after the encryption Decryption.
The device also includes:Second receiving module 1004, the 3rd acquisition module 1005;Wherein,
Second receiving module 1004, for being associated with the first key of receiving that first object sends One mark;
3rd acquisition module 1005, for by way of scanning Quick Response Code, obtaining and first after the encryption Second mark of category information association;
First deciphering module 1003, specifically for determining that first mark identifies whether unanimously with described second; It is determined that when consistent, the type I information after the encryption is decrypted using the first key.
First receiving module 1001, the institute sent specifically for receiving first object by way of short message State first key.
In actual applications, first receiving module 1001, the second acquisition module 1002, the first deciphering module 1003, Second receiving module 1004, the 3rd acquisition module 1005 can be realized by CPU, MPU, DSP or FPGA in terminal etc..
It should be noted that:The information decryption device that above-described embodiment provides is when entering row information decryption, only with above-mentioned each The division progress of program module as needed can distribute above-mentioned processing by different journeys for example, in practical application Sequence module is completed, i.e., the internal structure of device is divided into different program modules, to complete whole described above or portion Manage office.In addition, the information decryption device that above-described embodiment provides belongs to same design with information decryption method embodiment, it has Body implementation process refers to embodiment of the method, repeats no more here.
To realize the above method, the embodiment of the present invention additionally provides another information decryption device, should applied to end side The executable program that device includes memory, processor and storage on a memory and can run by the processor, it is described When processor runs the executable program, following operate is performed:
Receive the first key of the first object transmission;
By way of scanning Quick Response Code, the type I information after encryption is obtained;
The type I information after the encryption is decrypted using the first key.
When the processor is additionally operable to run the executable program, following operate is performed:
Receive the associated with the first key first mark that first object is sent;
By way of scanning Quick Response Code, the second mark associated with the type I information after the encryption is obtained;Then
It is consistent to determine that first mark identifies whether with described second;
It is determined that when consistent, the type I information after the encryption is decrypted using the first key.
When the processor is additionally operable to run the executable program, following operate is performed:
Receive the first key that first object is sent by way of short message.
Below so that information decryption device is embodied as the terminal for information decryption as an example, the hardware of device is decrypted to the information Structure is described further.
Figure 11 is the hardware architecture diagram that the information that the embodiment of the present invention eight provides decrypts device, applied to end side, Information decryption device 1100 shown in Figure 11 includes:At least one processor 1101, memory 1102, user interface 1103 and extremely A few network interface 1104.Each component in described information decryption device 1100 is coupling in one by bus system 1105 Rise.It is understood that bus system 1105 is used to realize the connection communication between these components.Bus system 1105 is total except data are included Outside line, in addition to power bus, controlling bus and status signal bus in addition.But for the sake of clear explanation, in fig. 11 will Various buses are all designated as bus system 1105.
Wherein, user interface 1103 can include display, keyboard, mouse, trace ball, click wheel, button, button, touch Feel plate or touch-screen etc..
It is appreciated that memory 1102 can be volatile memory or nonvolatile memory, volatibility may also comprise Both with nonvolatile memory.
Memory 1102 in the embodiment of the present invention is used to store various types of data to support information to decrypt device 1100 operation.The example of these data includes:For decrypting any computer program operated on device 1100 in information, such as Executable program 11021, realize that the program of present invention method may be embodied in executable program 11021.
The method that the embodiments of the present invention disclose can apply in processor 1101, or real by processor 1101 It is existing.Processor 1101 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1101 or software form.Above-mentioned Processor 1101 can be general processor, DSP, either other PLDs, discrete gate or transistor logic device Part, discrete hardware components etc..Disclosed each method, step in the embodiment of the present invention can be realized or performed to processor 1101 And logic diagram.General processor can be microprocessor or any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, hardware decoding processor can be embodied directly in and perform completion, or with hard in decoding processor Part and software module combination perform completion.Software module can be located in storage medium, and the storage medium is located at memory 1102, Processor 1101 reads the information in memory 1102, with reference to the step of its hardware completion preceding method.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of storage medium, applied to end side, the storage Executable program is stored with medium, when the processor 1101 of the executable code information decryption device 1100 is run, is held Row is following to be operated:
Receive the first key of the first object transmission;
By way of scanning Quick Response Code, the type I information after encryption is obtained;
The type I information after the encryption is decrypted using the first key.
When the processor 1101 of the executable code information decryption device 1100 is run, following operate also is performed:
Receive the associated with the first key first mark that first object is sent;
By way of scanning Quick Response Code, the second mark associated with the type I information after the encryption is obtained;Then
It is consistent to determine that first mark identifies whether with described second;
It is determined that when consistent, the type I information after the encryption is decrypted using the first key.
When the processor 1101 of the executable code information decryption device 1100 is run, following operate also is performed:
Receive the first key that first object is sent by way of short message.
To realize the method described in embodiment three, the embodiment of the present invention nine provides a kind of information decryption device, this implementation Example is arranged in the terminal of the 3rd object, and as shown in figure 12, the device includes:4th acquisition module 1201, the second sending module 1202nd, the second deciphering module 1203;Wherein,
4th acquisition module 1201, for by way of scanning Quick Response Code, obtaining the second category information after encryption;
Second sending module 1202, the request of the second key is obtained for sending to server;
Second deciphering module 1203, second key sent for receiving the server, utilize described the The second category information after the encryption is decrypted two keys.
The device also includes:5th acquisition module 1204, the 3rd sending module 1205;Wherein,
5th acquisition module 1204, for by way of scanning Quick Response Code, obtaining and second after the encryption The information of the 3rd associated mark of category information;
3rd sending module 1205, for the information identified the described 3rd, the server is sent to, to cause Server sends second key associated with the information of the described 3rd mark according to the information of the described 3rd mark.
The device also includes:6th acquisition module 1206, the server is sent to for obtaining location information, To cause the server to perform:Match in the address information for judging the positional information and second cipher key associated When, send second key.
In actual applications, the 4th acquisition module 1201, the second sending module 1202, the second deciphering module 1203, 5th acquisition module 1204, the 3rd sending module 1205, the 6th acquisition module 1206 can by CPU, MPU in terminal, DSP or FPGA etc. is realized.
It should be noted that:The information decryption device that above-described embodiment provides is when entering row information decryption, only with above-mentioned each The division progress of program module as needed can distribute above-mentioned processing by different journeys for example, in practical application Sequence module is completed, i.e., the internal structure of device is divided into different program modules, to complete whole described above or portion Manage office.In addition, the information decryption device that above-described embodiment provides belongs to same design with information decryption method embodiment, it has Body implementation process refers to embodiment of the method, repeats no more here.
To realize the above method, the embodiment of the present invention additionally provides another information decryption device, should applied to end side The executable program that device includes memory, processor and storage on a memory and can run by the processor, it is described When processor runs the executable program, following operate is performed:
By way of scanning Quick Response Code, the second category information after encryption is obtained;
The request for obtaining the second key is sent to server;
Second key that the server is sent is received, using second key to the second class after the encryption Information is decrypted.
When the processor is additionally operable to run the executable program, following operate is performed:
By way of scanning Quick Response Code, the letter of threeth mark associated with the second category information after the encryption is obtained Breath;
By the information of the described 3rd mark, the server is sent to, to cause server according to the described 3rd mark Information, send second key associated with the information of the described 3rd mark.
When the processor is additionally operable to run the executable program, following operate is performed:
Obtain location information and be sent to the server, to cause the server to perform:Described in judging When the address information of positional information and second cipher key associated matches, second key is sent.
Below so that information decryption device is embodied as the terminal for information decryption as an example, the hardware of device is decrypted to the information Structure is described further.
Figure 13 is the hardware architecture diagram that the information that the embodiment of the present invention ten provides decrypts device, applied to end side, Information decryption device 1300 shown in Figure 13 includes:At least one processor 1301, memory 1302, user interface 1303 and extremely A few network interface 1304.Each component in described information decryption device 1300 is coupling in one by bus system 1305 Rise.It is understood that bus system 1305 is used to realize the connection communication between these components.Bus system 1305 is total except data are included Outside line, in addition to power bus, controlling bus and status signal bus in addition.But for the sake of clear explanation, in fig. 13 will Various buses are all designated as bus system 1305.
Wherein, user interface 1303 can include display, keyboard, mouse, trace ball, click wheel, button, button, touch Feel plate or touch-screen etc..
It is appreciated that memory 1302 can be volatile memory or nonvolatile memory, volatibility may also comprise Both with nonvolatile memory.
Memory 1302 in the embodiment of the present invention is used to store various types of data to support information to decrypt device 1300 operation.The example of these data includes:For decrypting any computer program operated on device 1300 in information, such as Executable program 13021, realize that the program of present invention method may be embodied in executable program 13021.
The method that the embodiments of the present invention disclose can apply in processor 1301, or real by processor 1301 It is existing.Processor 1301 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1301 or software form.Above-mentioned Processor 1301 can be general processor, DSP, either other PLDs, discrete gate or transistor logic device Part, discrete hardware components etc..Disclosed each method, step in the embodiment of the present invention can be realized or performed to processor 1301 And logic diagram.General processor can be microprocessor or any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, hardware decoding processor can be embodied directly in and perform completion, or with hard in decoding processor Part and software module combination perform completion.Software module can be located in storage medium, and the storage medium is located at memory 1302, Processor 1301 reads the information in memory 1302, with reference to the step of its hardware completion preceding method.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of storage medium, applied to end side, the storage Executable program is stored with medium, when the processor 1301 of the executable code information decryption device 1300 is run, is held Row is following to be operated:
By way of scanning Quick Response Code, the second category information after encryption is obtained;
The request for obtaining the second key is sent to server;
Second key that the server is sent is received, using second key to the second class after the encryption Information is decrypted.
When the processor 1301 of the executable code information decryption device 1300 is run, following operate also is performed:
By way of scanning Quick Response Code, the letter of threeth mark associated with the second category information after the encryption is obtained Breath;
By the information of the described 3rd mark, the server is sent to, to cause server according to the described 3rd mark Information, send second key associated with the information of the described 3rd mark.
When the processor 1301 of the executable code information decryption device 1300 is run, following operate also is performed:
Obtain location information and be sent to the server, to cause the server to perform:Described in judging When the address information of positional information and second cipher key associated matches, second key is sent.
To realize the method described in example IV, the embodiment of the present invention 11 provides a kind of information decryption device, this reality Apply example to be arranged in server, as shown in figure 14, the device includes:3rd receiving module 1401, matching module the 1402, the 4th are sent out Send module 1403;Wherein,
3rd receiving module 1401, the second key sent for receiving the first object;
The matching module 1402, will during the request of acquisition second key for receiving the transmission of the 3rd object The positional information of 3rd object is matched with the address information of second cipher key associated;
Here, the positional information of the 3rd object, the address information in region residing for the 3rd object is included;
The address information includes the address information in region, and the ground of at least one subregion for belonging to the region Location information;
The matching module 1402, specifically for by the positional information of the 3rd object and second cipher key associated The address information in region is matched.
4th sending module 1403, for determine result for matching when, second key is sent to described the Three objects.
In actual applications, the 3rd receiving module 1401, matching module 1402, the 4th sending module 1403 can be by CPU, MPU, DSP or FPGA on server etc. are realized.
It should be noted that:The information decryption device that above-described embodiment provides is when entering row information decryption, only with above-mentioned each The division progress of program module as needed can distribute above-mentioned processing by different journeys for example, in practical application Sequence module is completed, i.e., the internal structure of device is divided into different program modules, to complete whole described above or portion Manage office.In addition, the information decryption device that above-described embodiment provides belongs to same design with information decryption method embodiment, it has Body implementation process refers to embodiment of the method, repeats no more here.
To realize the above method, the embodiment of the present invention additionally provides another information decryption device, applied to server side, The executable program that the device includes memory, processor and storage on a memory and can run by the processor, institute When stating the processor operation executable program, following operate is performed:
Receive the second key of the first object transmission;
When receiving the request of acquisition second key of the 3rd object transmission, by the positional information of the 3rd object Matched with the address information of second cipher key associated;
When determining result to match, second key is sent to the 3rd object.
When the processor is additionally operable to run the executable program, following operate is performed:
The positional information of 3rd object is matched with the address information in the region of second cipher key associated.
Below so that information decryption device is embodied as the server for information decryption as an example, the hard of device is decrypted to the information Part structure is described further.
Figure 15 is the hardware architecture diagram that the information that the embodiment of the present invention 12 provides decrypts device, applied to server Side, the information decryption device 1500 shown in Figure 15 include:At least one processor 1501, memory 1502 and at least one network Interface 1503.Each component in described information decryption device 1500 is coupled by bus system 1504.It is it is understood that total Linear system system 1504 is used to realize the connection communication between these components.Bus system 1504 is also wrapped in addition to including data/address bus Include power bus, controlling bus and status signal bus in addition.But for the sake of clear explanation, various buses are all marked in fig.15 For bus system 1504.
It is appreciated that memory 1502 can be volatile memory or nonvolatile memory, volatibility may also comprise Both with nonvolatile memory.
Memory 1502 in the embodiment of the present invention is used to store various types of data to support information to decrypt device 1500 operation.The example of these data includes:For decrypting any computer program operated on device 1500 in information, such as Executable program 15021, realize that the program of present invention method may be embodied in executable program 15021.
The method that the embodiments of the present invention disclose can apply in processor 1501, or real by processor 1501 It is existing.Processor 1501 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1501 or software form.Above-mentioned Processor 1501 can be general processor, DSP, either other PLDs, discrete gate or transistor logic device Part, discrete hardware components etc..Disclosed each method, step in the embodiment of the present invention can be realized or performed to processor 901 And logic diagram.General processor can be microprocessor or any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, hardware decoding processor can be embodied directly in and perform completion, or with hard in decoding processor Part and software module combination perform completion.Software module can be located in storage medium, and the storage medium is located at memory 1502, Processor 1501 reads the information in memory 1502, with reference to the step of its hardware completion preceding method.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of storage medium, and applied to server side, this is deposited Executable program is stored with storage media, when the processor 1501 of the executable code information decryption device 1500 is run, Perform following operate:
Receive the second key of the first object transmission;
When receiving the request of acquisition second key of the 3rd object transmission, by the positional information of the 3rd object Matched with the address information of second cipher key associated;
When determining result to match, second key is sent to the 3rd object.
When the processor 1501 of the executable code information decryption device 1500 is run, following operate also is performed:
The positional information of 3rd object is matched with the address information in the region of second cipher key associated.
Information ciphering method, decryption method, device and the storage medium that the embodiment of the present invention is provided, by believing target Cease the information of the first object included and the information of the second object is encrypted respectively, further, on the one hand, after encryption The first object information and encryption after the second object information generation Quick Response Code, on the other hand, corresponding key is only sent out Corresponding object is given, even if so as to which the people for attempting steal information gets information by way of barcode scanning Quick Response Code, also can be by Confidential information can not be solved in not possessing key, so as to avoid revealing the risk of target information, ensure that the peace of target information Entirely.
In addition, the second object obtains first key, it is determined that the first mark associated with first key, and and type I information When second mark of association is consistent, it could utilize first key that the type I information after encryption is decrypted;3rd object exists When present position information matches with the address information in the region of the second cipher key associated, the second key is just sent to the 3rd by server Object, the 3rd object could utilize the second category information after the second key pair encryption to be decrypted.In this way, the second object and the 3rd Object is both needed to reach the condition specified, and different types of information in target information can be decrypted respectively, so as to Avoid revealing the risk of target information, ensure that the safety of target information.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or executable program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage The form for the executable program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and executable program product Figure and/or block diagram describe.It should be understood that can be by every first-class in executable program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These executable programs can be provided Instruct all-purpose computer, special-purpose computer, Embedded Processor or with reference to programmable data processing device processor to produce A raw machine so that produced by computer or with reference to the instruction of the computing device of programmable data processing device for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These executable program instructions, which may be alternatively stored in, can guide computer or with reference to programmable data processing device with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These executable program instructions can also be loaded into computer or with reference in programmable data processing device so that count Calculation machine or with reference to performing series of operation steps on programmable device to produce computer implemented processing, so as in computer or There is provided with reference to the instruction performed on programmable device for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all All any modification, equivalent and improvement made within the spirit and principles in the present invention etc., it should be included in the protection of the present invention Within the scope of.

Claims (29)

1. a kind of information ciphering method, it is characterised in that methods described includes:
Obtain target information;The target information includes type I information and the second category information, and the type I information includes the The information of one object, second category information include the information of the second object;
The type I information is encrypted using first key, to obtain generating after the encryption of the first Quick Response Code One category information;Second category information is encrypted using the second key, to obtain generating the encryption of the second Quick Response Code The second category information afterwards;
The first key is sent to second object, second key is sent to the 3rd object.
2. according to the method for claim 1, it is characterised in that the type I information is added using first key It is close, second category information is encrypted using the second key, including:
Using first key and the first AES, the type I information is encrypted;Use the second key and described Second category information is encrypted one AES;Or
Using first key and the first AES, the type I information is encrypted;Added using the second key and second Second category information is encrypted close algorithm.
3. according to the method for claim 2, it is characterised in that:
The Cipher Strength of second AES, more than the Cipher Strength of first AES.
4. according to the method for claim 1, it is characterised in that described that the first key is sent to second object Including:
By way of short message, the first key is sent to second object.
5. according to the method for claim 1, it is characterised in that the type I information is encrypted using first key Before, methods described also includes:It is local to generate the first key;
Before second category information is encrypted using the second key, methods described also includes:Local generation described second is close Key.
6. according to the method described in any claim of right 1 to 5, it is characterised in that the target information, including:
Electronics sends single information.
7. a kind of information decryption method, it is characterised in that methods described includes:
Receive the first key of the first object transmission;
By way of scanning Quick Response Code, the type I information after encryption is obtained;
The type I information after the encryption is decrypted using the first key.
8. according to the method for claim 7, it is characterised in that methods described also includes:
Receive the associated with the first key first mark that first object is sent;
By way of scanning Quick Response Code, the second mark associated with the type I information after the encryption is obtained;Then
The type I information after the encryption is decrypted using the first key, including:
It is consistent to determine that first mark identifies whether with described second;
It is determined that when consistent, the type I information after the encryption is decrypted using the first key.
9. according to the method for claim 7, it is characterised in that the first key for receiving the transmission of the first object includes:
Receive the first key that first object is sent by way of short message.
10. a kind of information decryption method, it is characterised in that methods described includes:
By way of scanning Quick Response Code, the second category information after encryption is obtained;
The request for obtaining the second key is sent to server;
Second key that the server is sent is received, using second key to the second category information after the encryption It is decrypted.
11. according to the method for claim 10, it is characterised in that receive second key that the server sends it Before, methods described also includes:
By way of scanning Quick Response Code, the information of threeth mark associated with the second category information after the encryption is obtained;
By the information of the described 3rd mark, the server is sent to, to cause information of the server according to the described 3rd mark, Send second key associated with the information of the described 3rd mark.
12. the method according to claim 10 or 11, it is characterised in that receive the server transmission described second is close Before key, methods described also includes:
Obtain location information and be sent to the server, to cause the server to perform:Judging the position When the address information of information and second cipher key associated matches, second key is sent.
13. a kind of information decryption method, it is characterised in that methods described includes:
Receive the second key of the first object transmission;
When receiving the request of acquisition second key of the 3rd object transmission, by the positional information of the 3rd object and institute The address information for stating the second cipher key associated is matched;
When determining result to match, second key is sent to the 3rd object.
14. according to the method for claim 13, it is characterised in that the positional information of the 3rd object, including described the The address information in region residing for three objects;
The address information includes the address information in region, and the address letter of at least one subregion for belonging to the region Breath;
The positional information of 3rd object is matched with the address information of second cipher key associated, including:
The positional information of 3rd object is matched with the address information in the region of second cipher key associated.
15. a kind of information encryption device, it is characterised in that described device includes:First acquisition module, encrypting module, the first hair Send module;Wherein,
First acquisition module, for obtaining target information;The target information includes type I information and the second category information, The type I information includes the information of the first object, and second category information includes the information of the second object;
The encrypting module, for the type I information to be encrypted using first key, to obtain generating first Type I information after the encryption of Quick Response Code;Second category information is encrypted using the second key, to obtain to life The second category information into after the encryption of the second Quick Response Code;
First sending module, for the first key to be sent into second object, second key is sent To the 3rd object.
16. a kind of information decrypts device, it is characterised in that described device includes:First receiving module, the second acquisition module, One deciphering module;Wherein,
First receiving module, the first key sent for receiving the first object;
Second acquisition module, for by way of scanning Quick Response Code, obtaining the type I information after encryption;
First deciphering module, for the type I information after the encryption to be decrypted using the first key.
17. device according to claim 16, it is characterised in that described device also includes:Second receiving module, the 3rd obtain Modulus block;Wherein,
Second receiving module, the associated with the first key first mark sent for receiving first object;
3rd acquisition module, for by way of scanning Quick Response Code, obtaining and being closed with the type I information after the encryption Second mark of connection;
First deciphering module, is specifically used for:
It is consistent to determine that first mark identifies whether with described second;
It is determined that when consistent, the type I information after the encryption is decrypted using the first key.
18. a kind of information decrypts device, it is characterised in that described device includes:4th acquisition module, the second sending module, Two deciphering modules;Wherein,
4th acquisition module, for by way of scanning Quick Response Code, obtaining the second category information after encryption;
Second sending module, the request of the second key is obtained for sending to server;
Second deciphering module, second key sent for receiving the server, utilizes second key pair The second category information after the encryption is decrypted.
19. device according to claim 18, it is characterised in that described device also includes:5th acquisition module, the 3rd hair Send module;Wherein,
5th acquisition module, for by way of scanning Quick Response Code, obtaining and the second category information phase after the encryption The information of 3rd mark of association;
3rd sending module, for the information identified the described 3rd, the server is sent to, to cause server root According to the information of the described 3rd mark, second key associated with the information of the described 3rd mark is sent.
20. the device according to claim 18 or 19, it is characterised in that described device also includes the 6th acquisition module, uses The server is sent in obtaining location information, to cause the server to perform:Judging the position letter When breath and the address information of second cipher key associated match, second key is sent.
21. a kind of information decrypts device, it is characterised in that described device includes:3rd receiving module, matching module, the 4th hair Send module;Wherein,
3rd receiving module, the second key sent for receiving the first object;
The matching module, during the request of acquisition second key for receiving the transmission of the 3rd object, by the described 3rd The positional information of object is matched with the address information of second cipher key associated;
4th sending module, for determining that result is that when matching, second key is sent into the 3rd object.
22. a kind of storage medium, is stored thereon with executable program, it is characterised in that the executable code processor is held Realized during row such as the step of any one of claim 1 to 6 described information encryption method.
23. a kind of information encryption device, including memory, processor and storage can be transported on a memory and by the processor Capable executable program, it is characterised in that the processor performs such as claim 1 to 6 times when running the executable program The step of one described information encryption method.
24. a kind of storage medium, is stored thereon with executable program, it is characterised in that the executable code processor is held Realized during row such as the step of any one of claim 7 to 9 described information decryption method.
25. a kind of information decrypts device, including memory, processor and storage can be transported on a memory and by the processor Capable executable program, it is characterised in that the processor performs such as claim 7 to 9 times when running the executable program The step of one described information decryption method.
26. a kind of storage medium, is stored thereon with executable program, it is characterised in that the executable code processor is held Realized during row such as the step of any one of claim 10 to 12 described information decryption method.
27. a kind of information decrypts device, including memory, processor and storage can be transported on a memory and by the processor Capable executable program, it is characterised in that the processor performs such as claim 10 to 12 when running the executable program The step of any one described information decryption method.
28. a kind of storage medium, is stored thereon with executable program, it is characterised in that the executable code processor is held Realized during row such as the step of any one of claim 13 to 14 described information decryption method.
29. a kind of information decrypts device, including memory, processor and storage can be transported on a memory and by the processor Capable executable program, it is characterised in that the processor performs such as claim 13 to 14 when running the executable program The step of any one described information decryption method.
CN201711023802.4A 2017-10-27 2017-10-27 A kind of information ciphering method, decryption method, device and storage medium Pending CN107809428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711023802.4A CN107809428A (en) 2017-10-27 2017-10-27 A kind of information ciphering method, decryption method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711023802.4A CN107809428A (en) 2017-10-27 2017-10-27 A kind of information ciphering method, decryption method, device and storage medium

Publications (1)

Publication Number Publication Date
CN107809428A true CN107809428A (en) 2018-03-16

Family

ID=61582885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711023802.4A Pending CN107809428A (en) 2017-10-27 2017-10-27 A kind of information ciphering method, decryption method, device and storage medium

Country Status (1)

Country Link
CN (1) CN107809428A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115001676A (en) * 2022-06-02 2022-09-02 深圳市爱克信智能股份有限公司 Two-dimensional code encryption method, decryption method, system, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8967458B1 (en) * 2012-08-30 2015-03-03 Amazon Technologies, Inc. Messages associated with unopened delivered packages
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105321054A (en) * 2014-06-14 2016-02-10 江苏大学 Logistic receiving and dispatching method and system capable of protecting privacy
CN107122676A (en) * 2017-04-27 2017-09-01 苏州派维斯信息科技有限公司 A kind of payment system single for express delivery privacy face and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8967458B1 (en) * 2012-08-30 2015-03-03 Amazon Technologies, Inc. Messages associated with unopened delivered packages
CN105321054A (en) * 2014-06-14 2016-02-10 江苏大学 Logistic receiving and dispatching method and system capable of protecting privacy
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN107122676A (en) * 2017-04-27 2017-09-01 苏州派维斯信息科技有限公司 A kind of payment system single for express delivery privacy face and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115001676A (en) * 2022-06-02 2022-09-02 深圳市爱克信智能股份有限公司 Two-dimensional code encryption method, decryption method, system, terminal and storage medium
CN115001676B (en) * 2022-06-02 2022-12-02 深圳市爱克信智能股份有限公司 Two-dimensional code encryption method, decryption method, system, terminal and storage medium

Similar Documents

Publication Publication Date Title
US20200372503A1 (en) Transaction messaging
CN105719120B (en) A method of encryption express delivery list privacy information
US10142107B2 (en) Token binding using trust module protected keys
CN106453268B (en) A method of realizing express delivery secret protection in logistics progress
CN101765996B (en) Device and method for remote authentication and transaction signatures
US20190050554A1 (en) Logo image and advertising authentication
SE514105C2 (en) Secure distribution and protection of encryption key information
CN103996117B (en) Safe mobile phone
CN109951274B (en) Anti-quantum computing point-to-point message transmission method and system based on private key pool
CN108868367B (en) Intelligent lock device
US11128453B2 (en) Visual image authentication
CN110401542A (en) Electronic identity voucher generation method, terminal and server
US20110202772A1 (en) Networked computer identity encryption and verification
CN105917612A (en) Cryptographic watermarking of content in fuel dispensing environments
CN108256339A (en) A kind of method and system protected based on Quick Response Code to electronic invoice information
CN105809015A (en) Electronic ticket information hiding and verifying method, device and system
TW201419208A (en) Picture delivering system based on visual cryptography and related computer program product
CN101859360A (en) File security processing method, corresponding software and decryption reading device
CN110069906A (en) A kind of encryption and decryption method and its device of electronic document
CN107809428A (en) A kind of information ciphering method, decryption method, device and storage medium
CN106656463A (en) Fixed-secret-key symmetric white box password encryption method, device and equipment
CN103294943B (en) Ciphering signature handwriting device and method
CN112861156B (en) Secure communication method and device for display data, electronic equipment and storage medium
CN108063882A (en) There is the high photographing instrument system of authentication, data encryption and detaching-proof protection
CN106487796A (en) Identity card reads the safe ciphering unit in equipment and its application process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180316