CN107862210A - Cipher processing method, system and computer equipment - Google Patents

Cipher processing method, system and computer equipment Download PDF

Info

Publication number
CN107862210A
CN107862210A CN201710978685.0A CN201710978685A CN107862210A CN 107862210 A CN107862210 A CN 107862210A CN 201710978685 A CN201710978685 A CN 201710978685A CN 107862210 A CN107862210 A CN 107862210A
Authority
CN
China
Prior art keywords
file
binary stream
stream file
key
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710978685.0A
Other languages
Chinese (zh)
Inventor
王立
张炜雪
周春星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yonyou Network Technology Co Ltd
Original Assignee
Yonyou Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonyou Network Technology Co Ltd filed Critical Yonyou Network Technology Co Ltd
Priority to CN201710978685.0A priority Critical patent/CN107862210A/en
Publication of CN107862210A publication Critical patent/CN107862210A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of cipher processing method, system and computer equipment, wherein, cipher processing method includes:Obtain the file for needing to be encrypted;Translate the file into as the first binary stream file;Calculated according to the first binary stream file with preset-key, obtain the second binary stream file;Second binary stream file is stored.The present invention stores the binary stream file after encryption into database, avoid that directly file is stored in disk and easily illegally revealed, and because file is encryption, can not recover during Non-precondition key, and then secure documents, exclude potential safety hazard for user.

Description

Cipher processing method, system and computer equipment
Technical field
The present invention relates to secure memory techniques field, in particular to a kind of cipher processing method, a kind of encryption System, a kind of computer equipment and a kind of computer-readable recording medium.
Background technology
Some scenes need to preserve the documentation of user in information system, and existing information system directly stores file In disk, distribute after a mark ID carries out renaming during storage, be saved in disk for file;According to mark ID during reading Respective file is read from disk to be shown on interface.
Above-mentioned document storage mode existence information safety problem, first, face hacker, virus, wooden horse, electricity in information system During the means such as son deception, disk is subject to attack, and makes the fileinfo that is stored in disk compromised;Secondly, file is placed on disk In may directly be opened and check by other staff, cause sensitive document to be revealed.
Under the restriction of above-mentioned factor, directly file is stored in disk and is likely to result in fileinfo leakage, by not Method molecule obtains, and damages the interests of user, and therefore, how to carry out the safety storage of file turns into urgent problem to be solved.
The content of the invention
It is contemplated that at least solves one of technical problem present in prior art or correlation technique.
Therefore, the first aspect of the invention is to propose a kind of cipher processing method.
The second aspect of the invention is to propose a kind of encryption treatment system.
The third aspect of the invention is to propose a kind of computer equipment.
The fourth aspect of the invention is to propose a kind of computer-readable recording medium.
In view of this, according to the first aspect of the invention, it is proposed that a kind of cipher processing method, including:Obtaining needs The file being encrypted;Translate the file into as the first binary stream file;It is close with presetting according to the first binary stream file Key is calculated, and obtains the second binary stream file;Second binary stream file is stored.
Cipher processing method provided by the invention, it would be desirable to the file being encrypted is converted to binary stream file, Then the binary stream file is calculated with preset-key, obtains the binary stream file after preset-key encryption, and then Binary stream file after storage encryption.The present invention utilizes binary stream file corresponding to the file that preset-key stores to needs It is encrypted, and the binary stream file after encryption is stored into database, on the one hand avoids that file directly is stored in into magnetic Easily illegally revealed in disk, on the other hand, even if file is revealed, because file is encryption, Non-precondition key can not be extensive It is multiple, and then secure documents, exclude potential safety hazard for user.
According to the above-mentioned cipher processing method of the present invention, there can also be following technical characteristic:
In the above-mentioned technical solutions, it is preferable that calculated according to the first binary stream file with preset-key, obtain The step of two binary stream files, specifically include:First binary stream file and preset-key are subjected to XOR, obtain the Two binary stream files.
In the technical scheme, XOR is carried out by binary stream file and the preset-key of file to be stored, it is real The now encryption storage to file to be stored, prevents file from illegally revealing, secures documents, and potential safety hazard is excluded for user.
In any of the above-described technical scheme, it is preferable that also include:When reading file, the second binary stream file is obtained, and Second binary stream file and preset-key are subjected to XOR, obtain the first binary stream file;And the one or two is entered Stream file processed is converted to file.
In the technical scheme, when user needs to read the file of storage, information system obtains second from database Binary stream file, because the second binary stream file can be utilized pre- by the file of preset-key encryption, only information system If the second binary stream file is decrypted key, the first binary stream file is obtained, and then obtains file and feeds back to user, It ensure that file can only be preserved in information system, checked, imported and exported, avoid the illegal leakage of file, ensure The safety storage of file.
In any of the above-described technical scheme, it is preferable that preset-key is by the physical address of network adapter, U-shield, made by oneself Any one of adopted password or its combination carry out the self-defined hexadecimal data formed.
In the technical scheme, key is preset by any one of the physical address of network adapter, U-shield, self-defined password Or its combination carry out it is self-defined form, storage is into database after default key encryption for every part of file, due to every network The physical address of adapter is different, and U-shield license and self-defined password also have uncertainty, ensure that default key only One property and confidentiality, so as to find the binary stream file after encryption in database, due to Network adaptation can not be determined Physical address, U-shield, the User Defined password of device, it can not also obtain the binary stream text after correctly default secret key pair encryption Part is decrypted, and so as to obtain fileinfo, realization prevents fileinfo from revealing, and secure documents storage, is user Exclude potential safety hazard.
In any of the above-described technical scheme, it is preferable that file comprises at least any one of following or its combination:Picture, photo, Text.
In the technical scheme, storage can be encrypted to any one of picture, photo, text or combination, and then The illegal leakage of picture, photo, text is avoided, ensures the safety storage of picture, photo, text, potential safety hazard is excluded for user.
The second aspect of the invention, it is proposed that a kind of encryption treatment system, including:Acquiring unit, needed for obtaining The file being encrypted;Converting unit, for translating the file into as the first binary stream file;Ciphering unit, for root Calculated according to the first binary stream file with preset-key, obtain the second binary stream file;Memory cell, for by second Binary stream file is stored.
Encryption treatment system provided by the invention, it would be desirable to the file being encrypted is converted to binary stream file, Then the binary stream file is calculated with preset-key, obtains the binary stream file after preset-key encryption, and then Binary stream file after storage encryption.The present invention utilizes binary stream file corresponding to the file that preset-key stores to needs It is encrypted, and the binary stream file after encryption is stored into database, on the one hand avoids that file directly is stored in into magnetic Easily illegally revealed in disk, on the other hand, even if file is revealed, because file is encryption, Non-precondition key can not be extensive It is multiple, and then secure documents, exclude potential safety hazard for user.
According to the above-mentioned encryption treatment system of the present invention, there can also be following technical characteristic:
In the above-mentioned technical solutions, it is preferable that ciphering unit, be specifically used for:First binary stream file is close with presetting Key carries out XOR, obtains the second binary stream file.
In the technical scheme, XOR is carried out by binary stream file and the preset-key of file to be stored, it is real The now encryption storage to file to be stored, prevents file from illegally revealing, secures documents, and potential safety hazard is excluded for user.
In any of the above-described technical scheme, it is preferable that also include:Decryption unit, during for reading file, obtain the two or two System stream file, and the second binary stream file and preset-key are subjected to XOR, obtain the first binary stream file;With And the first binary stream file is converted into file.
In the technical scheme, when user needs to read the file of storage, information system obtains second from database Binary stream file, because the second binary stream file can be utilized pre- by the file of preset-key encryption, only information system If the second binary stream file is decrypted key, the first binary stream file is obtained, and then obtains file and feeds back to user, It ensure that file can only be preserved in information system, checked, imported and exported, avoid the illegal leakage of file, ensure The safety storage of file.
In any of the above-described technical scheme, it is preferable that preset-key is by the physical address of network adapter, U-shield, made by oneself Any one of adopted password or its combination carry out the self-defined hexadecimal data formed.
In the technical scheme, key is preset by any one of the physical address of network adapter, U-shield, self-defined password Or its combination carry out it is self-defined form, storage is into database after default key encryption for every part of file, due to every network The physical address of adapter is different, and U-shield license and self-defined password also have uncertainty, ensure that default key only One property and confidentiality, so as to find the binary stream file after encryption in database, due to Network adaptation can not be determined Physical address, U-shield, the User Defined password of device, it can not also obtain the binary stream text after correctly default secret key pair encryption Part is decrypted, and so as to obtain fileinfo, realization prevents fileinfo from revealing, and secure documents storage, is user Exclude potential safety hazard.
In any of the above-described technical scheme, it is preferable that file comprises at least any one of following or its combination:Picture, photo, Text.
In the technical scheme, storage can be encrypted to any one of picture, photo, text or combination, and then The illegal leakage of picture, photo, text is avoided, ensures the safety storage of picture, photo, text, potential safety hazard is excluded for user.
The third aspect of the invention, it is proposed that a kind of computer equipment, including memory, processor and it is stored in storage Realized on device and the computer program that can run on a processor, during computing device computer program any one of as described above plus The step of close processing method.
Computer equipment provided by the invention, the step of above-mentioned cipher processing method is realized during computing device computer program Suddenly, the technique effect of above-mentioned cipher processing method can be realized, is repeated no more.
The fourth aspect of the invention, it is proposed that a kind of computer-readable recording medium, computer program is stored thereon with, The step of cipher processing method of any one as described above is realized when computer program is executed by processor.
Computer-readable recording medium provided by the invention, realized when computer program is executed by processor at above-mentioned encryption The step of reason method, the technique effect of above-mentioned cipher processing method can be realized, is repeated no more.
The additional aspect and advantage of the present invention will become obvious in following description section, or the practice by the present invention Recognize.
Brief description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention will become in the description from combination accompanying drawings below to embodiment Substantially and it is readily appreciated that, wherein:
Fig. 1 shows the cipher processing method schematic flow sheet of one embodiment of the present of invention;
Fig. 2 shows the cipher processing method schematic flow sheet of an alternative embodiment of the invention;
Fig. 3 a show the cipher processing method schematic flow sheet of the specific embodiment of the present invention;
Fig. 3 b show the picture of typing in information system in a specific embodiment of the invention;
Fig. 3 c show the binary stream file that storage is encrypted in the specific embodiment of the present invention;
Fig. 4 shows the schematic block diagram of the encryption treatment system of one embodiment of the present of invention;
Fig. 5 shows the schematic block diagram of the encryption treatment system of an alternative embodiment of the invention;
Fig. 6 shows the schematic block diagram of the computer equipment in one embodiment of the present of invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be different from other modes described here using other to implement, therefore, protection scope of the present invention is not limited to following public affairs The limitation for the specific embodiment opened.
Fig. 1 shows the cipher processing method schematic flow sheet of one embodiment of the present of invention.Wherein, this method includes:
Step 102, the file for needing to be encrypted is obtained;
Step 104, translate the file into as the first binary stream file;
Step 106, calculated according to the first binary stream file with preset-key, obtain the second binary stream file;
Step 108, the second binary stream file is stored.
Cipher processing method provided by the invention, it would be desirable to the file being encrypted is converted to binary stream file, Then the binary stream file is calculated with preset-key, obtains the binary stream file after preset-key encryption, and then Binary stream file after storage encryption.The present invention utilizes binary stream file corresponding to the file that preset-key stores to needs It is encrypted, and the binary stream file after encryption is stored into database, on the one hand avoids that file directly is stored in into magnetic Easily illegally revealed in disk, on the other hand, even if file is revealed, because file is encryption, Non-precondition key can not be extensive It is multiple, and then secure documents, exclude potential safety hazard for user.
In one embodiment of the invention, it is preferable that calculated according to the first binary stream file with preset-key, The step of obtaining the second binary stream file, specifically includes:First binary stream file and preset-key are subjected to XOR, Obtain the second binary stream file.
In this embodiment, XOR is carried out by the binary stream file and preset-key of file to be stored, realized Encryption storage to file to be stored, prevents file from illegally revealing, secures documents, and potential safety hazard is excluded for user.
Fig. 2 shows the cipher processing method schematic flow sheet of an alternative embodiment of the invention.Wherein, this method bag Include:
Step 202, the file for needing to be encrypted is obtained;
Step 204, translate the file into as the first binary stream file;
Step 206, calculated according to the first binary stream file with preset-key, obtain the second binary stream file;
Step 208, the second binary stream file is stored;
Step 210, when reading file, the second binary stream file is obtained;
Step 212, the second binary stream file and preset-key are subjected to XOR, obtain the first binary stream text Part;
Step 214, the first binary stream file is converted into file.
In this embodiment, when user needs to read the file of storage, information system obtains the two or two from database System stream file, because the second binary stream file can be utilized default by the file of preset-key encryption, only information system Second binary stream file is decrypted key, obtains the first binary stream file, and then obtains file and feed back to user, protects Having demonstrate,proved file can only be preserved in information system, is checked, imported and be exported, and avoided the illegal leakage of file, be ensure that The safety storage of file.
The present invention any one embodiment in, it is preferable that preset-key be by the physical address of network adapter, U-shield, Any one of self-defined password or its combination carry out the self-defined hexadecimal data formed.
In this embodiment, preset key by any one of the physical address of network adapter, U-shield, self-defined password or Its combine carry out it is self-defined form, storage is into database after default key encryption for every part of file, because every network is fitted The physical address of orchestration is different, and U-shield license and self-defined password also have uncertainty, ensure that the unique of default key Property and confidentiality, so as to found in database encryption after binary stream file, due to network adapter can not be determined Physical address, U-shield, User Defined password, can not also obtain the binary stream file after correctly default secret key pair encryption It is decrypted, so as to obtain fileinfo, realization prevents fileinfo from revealing, and secure documents storage, is arranged for user Except potential safety hazard.
In any one embodiment of the present invention, it is preferable that file comprises at least any one of following or its combination:Picture, Photo, text.
In this embodiment it is possible to which storage is encrypted to any one of picture, photo, text or combination, and then keep away Exempt from the illegal leakage of picture, photo, text, ensure the safety storage of picture, photo, text, potential safety hazard is excluded for user.
Specific embodiment, there is provided a kind of image ciphering method being used in information system, the image ciphering method are main Including two processes:Picture storing process and picture reading process.By the picture of typing in information system in picture storing process Binary stream is converted to, then carries out XOR calculating with hexadecimal key, is obtained in new binary stream deposit database;Picture Reading process is opposite with picture storing process.
Wherein, key is formed by the physical address of network adapter, U-shield, User Defined password definition.Due to every clothes The physical address of business device is different, the uncertainty of license and self-defined password, ensure that the uniqueness and secrecy of key Property.Accordingly even when finding the binary stream after image ciphering in database, due to that can not determine physical address, U-shield, user is certainly Password is defined, also can not just obtain key to be decrypted, so as to which pictorial information can not be obtained, can prevent pictorial information from letting out Dew, ensures picture safety, and potential safety hazard is excluded for user.
The encryption flow of the image ciphering method is as shown in Figure 3 a:
Step 302, the picture by typing in information system is converted to binary stream;
Step 304, by the binary stream with utilizing physical address, U-shield and the User Defined of network of network adapter close The key of code definition carries out XOR, obtains new binary stream;
Step 306, new binary stream is stored in database.
Wherein, as shown in Figure 3 b, binary data is to encrypt to the picture of typing in black box in Fig. 3 c in information system The binary stream file of storage.
The embodiment of second aspect of the present invention, it is proposed that a kind of encryption treatment system, Fig. 4 show the reality of the present invention Apply the schematic block diagram of the encryption treatment system 400 of example.
Wherein, encryption treatment system 400 includes:
Acquiring unit 402, for obtaining the file for needing to be encrypted;
Converting unit 404, for translating the file into as the first binary stream file;
Ciphering unit 406, for being calculated according to the first binary stream file with preset-key, obtain the second binary system Stream file;
Memory cell 408, for the second binary stream file to be stored.
Encryption treatment system provided by the invention, it would be desirable to the file being encrypted is converted to binary stream file, Then the binary stream file is calculated with preset-key, obtains the binary stream file after preset-key encryption, and then Binary stream file after storage encryption.The present invention utilizes binary stream file corresponding to the file that preset-key stores to needs It is encrypted, and the binary stream file after encryption is stored into database, on the one hand avoids that file directly is stored in into magnetic Easily illegally revealed in disk, on the other hand, even if file is revealed, because file is encryption, Non-precondition key can not be extensive It is multiple, and then secure documents, exclude potential safety hazard for user.
In one embodiment of the invention, it is preferable that ciphering unit, be specifically used for:By the first binary stream file with Preset-key carries out XOR, obtains the second binary stream file.
In this embodiment, XOR is carried out by the binary stream file and preset-key of file to be stored, realized Encryption storage to file to be stored, prevents file from illegally revealing, secures documents, and potential safety hazard is excluded for user.
Fig. 5 shows the schematic block diagram of the encryption treatment system 500 of an alternative embodiment of the invention.Wherein, at encryption Reason system 500 includes:
Acquiring unit 502, for obtaining the file for needing to be encrypted;
Converting unit 504, for translating the file into as the first binary stream file;
Ciphering unit 506, for being calculated according to the first binary stream file with preset-key, obtain the second binary system Stream file;
Memory cell 508, for the second binary stream file to be stored;
Decryption unit 510, during for reading file, obtain the second binary stream file, and by the second binary stream file XOR is carried out with preset-key, obtains the first binary stream file;And the first binary stream file is converted into file.
In this embodiment, when user needs to read the file of storage, information system obtains the two or two from database System stream file, because the second binary stream file can be utilized default by the file of preset-key encryption, only information system Second binary stream file is decrypted key, obtains the first binary stream file, and then obtains file and feed back to user, protects Having demonstrate,proved file can only be preserved in information system, is checked, imported and be exported, and avoided the illegal leakage of file, be ensure that The safety storage of file.
The present invention any one embodiment in, it is preferable that preset-key be by the physical address of network adapter, U-shield, Any one of self-defined password or its combination carry out the self-defined hexadecimal data formed.
In this embodiment, preset key by any one of the physical address of network adapter, U-shield, self-defined password or Its combine carry out it is self-defined form, storage is into database after default key encryption for every part of file, because every network is fitted The physical address of orchestration is different, and U-shield license and self-defined password also have uncertainty, ensure that the unique of default key Property and confidentiality, so as to found in database encryption after binary stream file, due to network adapter can not be determined Physical address, U-shield, User Defined password, can not also obtain the binary stream file after correctly default secret key pair encryption It is decrypted, so as to obtain fileinfo, realization prevents fileinfo from revealing, and secure documents storage, is arranged for user Except potential safety hazard.
In any one embodiment of the present invention, it is preferable that file comprises at least any one of following or its combination:Picture, Photo, text.
In this embodiment it is possible to which storage is encrypted to any one of picture, photo, text or combination, and then keep away Exempt from the illegal leakage of picture, photo, text, ensure the safety storage of picture, photo, text, potential safety hazard is excluded for user.
The embodiment of third aspect present invention, it is proposed that a kind of computer equipment, Fig. 6 show the implementation of the present invention The schematic block diagram of computer equipment 600 in example.Computer equipment 600, including memory 602, processor 604 and it is stored in storage On device 602 and the computer program that can be run on processor 604, processor 604 are realized as described above when performing computer program The step of cipher processing method of any one.
Computer equipment provided by the invention, the step of above-mentioned cipher processing method is realized during computing device computer program Suddenly, the technique effect of above-mentioned cipher processing method can be realized, is repeated no more.
The embodiment of the 4th aspect of the present invention, it is proposed that a kind of computer-readable recording medium, be stored thereon with calculating Machine program, the step of cipher processing method any one of as described above is realized when computer program is executed by processor.
Computer-readable recording medium provided by the invention, realized when computer program is executed by processor at above-mentioned encryption The step of reason method, the technique effect of above-mentioned cipher processing method can be realized, is repeated no more.
In the description of this specification, the description of term " one embodiment ", " some embodiments ", " specific embodiment " etc. Mean to combine at least one reality that specific features, structure, material or the feature that the embodiment or example describe are contained in the present invention Apply in example or example.In this manual, identical embodiment or reality are not necessarily referring to the schematic representation of above-mentioned term Example.Moreover, description specific features, structure, material or feature can in any one or more embodiments or example with Suitable mode combines.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (12)

  1. A kind of 1. cipher processing method, it is characterised in that including:
    Obtain the file for needing to be encrypted;
    The file is converted into the first binary stream file;
    Calculated according to the first binary stream file with preset-key, obtain the second binary stream file;
    The second binary stream file is stored.
  2. 2. cipher processing method according to claim 1, it is characterised in that described according to the first binary stream file Calculated, the step of obtaining the second binary stream file, specifically included with preset-key:
    The first binary stream file and preset-key are subjected to XOR, obtain the second binary stream file.
  3. 3. cipher processing method according to claim 2, it is characterised in that the cipher processing method also includes:
    When reading the file, the second binary stream file is obtained, and
    The second binary stream file and the preset-key are subjected to XOR, obtain the first binary stream text Part;And
    The first binary stream file is converted into the file.
  4. 4. cipher processing method according to any one of claim 1 to 3, it is characterised in that
    The preset-key is to be carried out certainly by any one of the physical address of network adapter, U-shield, self-defined password or its combination Define the hexadecimal data formed.
  5. 5. cipher processing method according to claim 4, it is characterised in that
    The file comprises at least any one of following or its combination:Picture, photo, text.
  6. A kind of 6. encryption treatment system, it is characterised in that including:
    Acquiring unit, for obtaining the file for needing to be encrypted;
    Converting unit, for the file to be converted into the first binary stream file;
    Ciphering unit, for being calculated according to the first binary stream file with preset-key, obtain the second binary stream File;
    Memory cell, for the second binary stream file to be stored.
  7. 7. encryption treatment system according to claim 6, it is characterised in that the ciphering unit, be specifically used for:
    The first binary stream file and preset-key are subjected to XOR, obtain the second binary stream file.
  8. 8. encryption treatment system according to claim 7, it is characterised in that the encryption treatment system also includes:
    Decryption unit, during for reading the file, the second binary stream file is obtained, and
    The second binary stream file and the preset-key are subjected to XOR, obtain the first binary stream text Part;And
    The first binary stream file is converted into the file.
  9. 9. the encryption treatment system according to any one of claim 6 to 8, it is characterised in that
    The preset-key is to be carried out certainly by any one of the physical address of network adapter, U-shield, self-defined password or its combination Define the hexadecimal data formed.
  10. 10. encryption treatment system according to claim 9, it is characterised in that
    The file comprises at least any one of following or its combination:Picture, photo, text.
  11. 11. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, it is characterised in that the processor is used to perform the method as any one of claim 1 to 5 The step of.
  12. 12. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program The step of method as any one of claim 1 to 5 is realized when being executed by processor.
CN201710978685.0A 2017-10-19 2017-10-19 Cipher processing method, system and computer equipment Pending CN107862210A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710978685.0A CN107862210A (en) 2017-10-19 2017-10-19 Cipher processing method, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710978685.0A CN107862210A (en) 2017-10-19 2017-10-19 Cipher processing method, system and computer equipment

Publications (1)

Publication Number Publication Date
CN107862210A true CN107862210A (en) 2018-03-30

Family

ID=61696595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710978685.0A Pending CN107862210A (en) 2017-10-19 2017-10-19 Cipher processing method, system and computer equipment

Country Status (1)

Country Link
CN (1) CN107862210A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145622A (en) * 2018-08-23 2019-01-04 Tcl移动通信科技(宁波)有限公司 Tune-up data output control method, mobile terminal and computer readable storage medium
CN114189860A (en) * 2021-12-21 2022-03-15 四川安迪科技实业有限公司 Fixed format data encryption and decryption method and verification method for satellite network equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978539A (en) * 2014-04-14 2015-10-14 博雅网络游戏开发(深圳)有限公司 Flash encryption method, flash decryption method, flash encryption device and flash decryption device
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device
CN104281815B (en) * 2013-07-05 2017-09-29 中国移动通信集团北京有限公司 The method and system of file encryption-decryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281815B (en) * 2013-07-05 2017-09-29 中国移动通信集团北京有限公司 The method and system of file encryption-decryption
CN104978539A (en) * 2014-04-14 2015-10-14 博雅网络游戏开发(深圳)有限公司 Flash encryption method, flash decryption method, flash encryption device and flash decryption device
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145622A (en) * 2018-08-23 2019-01-04 Tcl移动通信科技(宁波)有限公司 Tune-up data output control method, mobile terminal and computer readable storage medium
CN114189860A (en) * 2021-12-21 2022-03-15 四川安迪科技实业有限公司 Fixed format data encryption and decryption method and verification method for satellite network equipment

Similar Documents

Publication Publication Date Title
US8756416B2 (en) Checking revocation status of a biometric reference template
CN110798315B (en) Data processing method and device based on block chain and terminal
US8811612B2 (en) Using file metadata for data obfuscation
CN109829269A (en) Method, apparatus and system based on E-seal authenticating electronic documents
WO2016086788A1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN109274644B (en) Data processing method, terminal and watermark server
Gupta et al. A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN104657670A (en) Data encryption based safety use method of configuration file
CN114175580B (en) Enhanced secure encryption and decryption system
CN112258376A (en) Encrypted document processing method and system
CN112040086A (en) Image encryption and decryption method and device, equipment and readable storage medium
CN107862210A (en) Cipher processing method, system and computer equipment
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
CN109299611A (en) File encrypting method, device, equipment/terminal/server and computer readable storage medium
Pramanik et al. Analytical study on security issues in steganography
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
JP2008011092A (en) Encrypted-content retrieval system
Abboud Multifactor authentication for software protection
Rao et al. A novel information security scheme using cryptic steganography
KR102414910B1 (en) Apparatus and method for securing document information
Halvi et al. A robust and secured cloud based distributed biometric system using symmetric key cryptography and microsoft cognitive API
Bhangale Securing Image Metadata using Advanced Encryption Standard
JP2006085456A (en) Data distribution system, device and program
Faluyi et al. Secured Online Transcript Issuing and Processing Using Crypto-Steganography Technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330