CN112182512A - Information processing method, device and storage medium - Google Patents

Information processing method, device and storage medium Download PDF

Info

Publication number
CN112182512A
CN112182512A CN202010903174.4A CN202010903174A CN112182512A CN 112182512 A CN112182512 A CN 112182512A CN 202010903174 A CN202010903174 A CN 202010903174A CN 112182512 A CN112182512 A CN 112182512A
Authority
CN
China
Prior art keywords
key
data segment
data
encrypted
segment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010903174.4A
Other languages
Chinese (zh)
Inventor
张云帆
梁炯生
索俊晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Fantasy Network Technology Co ltd
Original Assignee
Beijing Fantasy Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Fantasy Network Technology Co ltd filed Critical Beijing Fantasy Network Technology Co ltd
Priority to CN202010903174.4A priority Critical patent/CN112182512A/en
Publication of CN112182512A publication Critical patent/CN112182512A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses an information processing method, an information processing device and a storage medium. The method comprises the following steps: firstly, acquiring a data segment encrypted by using a first key, wherein the data segment is a data segment of a data file; then, acquiring a first key corresponding to the data segment; then, carrying out XOR operation on each byte in the data segment by using a first key to obtain a decrypted data segment; the decrypted data segment is then displayed. The data file is encrypted in a segmented mode, so that the data file can be decrypted in a segmented mode, all data does not need to be loaded when online reading is conducted, only the content which is currently being read needs to be loaded and decrypted, the time for first loading is greatly shortened, the length of the file cannot be changed when the data file is encrypted and decrypted by means of XOR on each byte, and the purpose of the length of the file in various scenes can be reserved to the maximum extent.

Description

Information processing method, device and storage medium
Technical Field
The present invention relates to the field of computer information processing, and in particular, to an information processing method, apparatus, and storage medium.
Background
At present, in an online reading system, chapter contents of novels or other books are stored locally in a file manner, or are displayed by acquiring data from a remote server through a network. In this process, if the content is transmitted or loaded in the clear, the content is easy to be captured, so that the copyright cannot be effectively protected, but commonly used Encryption algorithms such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC4 Encryption algorithm (Rivest Cipher 4), RSA Encryption algorithm, and the like.
However, the following problems can exist with these algorithms: 1) the length of the original text is changed, but the length may have special use in system implementation, such as determining whether the file is modified; 2) the problem that the user experience is poor due to the fact that the time for displaying the content for the first time is long for books with lengthened contents is solved.
Therefore, how to encrypt and support the decryption of partial content under the condition of ensuring that the file length is not changed becomes a technical problem to be solved by the current online reading system.
Disclosure of Invention
In view of the above problems, embodiments of the present invention provide a method, an apparatus, and a storage medium.
According to a first aspect of the embodiments of the present invention, an information processing method is used for displaying encrypted data files in segments, and the method includes: acquiring an encrypted data segment, wherein the data segment is a data segment of a data file and is obtained by independently encrypting a first key corresponding to the data segment; acquiring a first key corresponding to the data segment; carrying out XOR operation on each byte in the data segments by using a first key to obtain decrypted data segments; and displaying the decrypted data segment.
According to an embodiment of the present invention, before obtaining the data segment encrypted by using the first key, the method further includes: dividing the data file into at least one data segment; generating at least one first key; distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the encrypted data is segmented and recombined into an encrypted data file.
According to an embodiment of the present invention, generating at least one first key includes: generating at least one second key; and transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using a self-defined algorithm to obtain at least one first key.
According to an embodiment of the present invention, after allocating a first key to each data segment to obtain a first key corresponding to the corresponding data segment, the method further includes: the first key is stored.
According to a second aspect of the embodiments of the present invention, an information processing apparatus for displaying encrypted data in segments, includes: the data block acquisition module is used for acquiring the encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment; the first key acquisition module is used for acquiring a first key corresponding to the data segment; the decryption module is used for carrying out XOR operation on each byte in the data segmentation by using a first key to obtain the decrypted data segmentation; and the display module is used for displaying the decrypted data segment.
According to an embodiment of the present invention, the apparatus further includes: the data segmentation module is used for dividing the data file into at least one data segment; a first key generation module for generating at least one first key; the first key distribution module is used for distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into the encrypted data file.
According to an embodiment of the present invention, the first key generation module includes: a second key generation unit, configured to generate a second key for each data segment to obtain at least one second key; and the key transformation unit is used for transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key by using a customized algorithm to obtain at least one first key.
According to an embodiment of the present invention, the apparatus further includes: and the storage module is used for storing the first key.
According to a third aspect of embodiments of the present invention, there is provided a storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method described above.
The embodiment of the invention provides an information processing method, an information processing device and a storage medium, wherein the method comprises the following steps: firstly, acquiring an encrypted data segment, wherein the data segment is a data segment of a data file and is obtained by independently encrypting by using a first key corresponding to the data segment; then, acquiring a first key corresponding to the data segment; then, carrying out XOR operation on each byte in the data segment by using a first key to obtain a decrypted data segment; the decrypted data segment is then displayed. The data file is encrypted in a segmented mode, so that the data file can be decrypted in a segmented mode, all data does not need to be loaded when online reading is conducted, only the content which is currently being read needs to be loaded and decrypted, the time for first loading is greatly shortened, the length of the file cannot be changed when the data file is encrypted and decrypted by means of XOR on each byte, and the purpose of the length of the file in various scenes can be reserved to the maximum extent.
It is to be understood that the teachings of the present invention need not achieve all of the above-described benefits, but rather that specific embodiments may achieve specific technical results, and that other embodiments of the present invention may achieve benefits not mentioned above.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
FIG. 1 is a schematic flow chart of an implementation of an information processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a composition structure of an information processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
According to a first aspect of the embodiments of the present invention, an information processing method is used for displaying an encrypted data file in segments, as shown in fig. 1, the method includes: operation 110, acquiring the encrypted data segment, where the data segment is a data segment of the data file and is obtained by independently encrypting using a first key corresponding to the data segment; operation 120, obtaining a first key corresponding to the data segment; operation 130, performing an exclusive-or operation on each byte in the data segment with the first key to obtain a decrypted data segment; at operation 140, the decrypted data segment is displayed.
In operation 110, the acquired data segment is a data segment encrypted with a first key. The data file is divided into data segments, generally because the data file is too large and does not need to display the entire content at a time, so in order to save system resources, such as transmission bandwidth and memory, the large data file is segmented for segment-by-segment transmission, segment-by-segment loading and segment-by-segment display. In the information processing method according to the embodiment of the present invention, the data segments are independently encrypted, so that the encrypted data segments can be obtained. If the whole file is encrypted by adopting the conventional common method, the encrypted data file is difficult to segment.
In operation 120, a first key corresponding to the data segment is obtained to decrypt the encrypted data segment. Usually, the first key corresponding to the data segment is stored in a data storage system having a mapping relationship with the data segment, for example, a database table with a certain sequence number as a unique identifier, if this is the case, only the unique identifier of the first key corresponding to the data segment needs to be calculated according to the mapping relationship, and the first key corresponding to the data segment is obtained from the database table through the unique identifier. The mapping may be determined by any method or form that can map the data segments to the first key, such as by some function or modulo calculation.
However, in the present embodiment, the specific embodiment of obtaining the first key corresponding to the data segment is not limited, and the first key may be obtained from a certain data storage system, or may be obtained again by using the same method used in the encryption, and the same key as the key used in the encryption may be secured.
In operation 130, performing the xor operation on each byte in the data segment to perform the encryption/decryption using the first key corresponding to the data segment does not change the byte length of the original data, so that the purpose of the file length in various scenarios can be maximally reserved. For example, the data [0] ═ 0x01 before encryption obtains the data bdate [0] ═ 0x10 after encryption with the first key bkey ═ 0x10 (data [0] ^ bkey) ═ 0x01^0x10 ═ 0x 11; the encrypted data bdata [0] is decrypted by the first key bkey to obtain the data before encryption [0] ═ bdata [0] ^ bkey ^0x 11^0x10 ═ 0x 01.
At operation 140, the content of the data segment is decrypted and various plaintext presentations may be made for reading or querying by the user.
According to an embodiment of the present invention, before obtaining the data segment encrypted by using the first key, the method further includes: dividing the data file into at least one data segment; generating at least one first key; distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the encrypted data is segmented and recombined into an encrypted data file.
The large data file may be segmented by any suitable method according to needs, and the large data file is often divided into a plurality of data segments by subscripts or file indexes of the data array.
When generating at least one first key, a group of keys can be generated by any applicable software or hardware key generation method, the number of the group of keys is not required to be equal to the number of the data segments, and if the number of the group of keys is less than the number of the data segments, the first keys can be repeatedly distributed to the data segments by adopting a certain rule under the condition of ensuring relative safety. For example, assuming that the content of a part of novel is divided into 100 pages, only 20 first keys may be generated, and the first key corresponding to the page content may be determined by modulo 20 by the page number i.
Once the first key corresponding to the data segment is determined, the key may be used to exclusive-or each byte in the data segment to obtain an encrypted data segment.
When the encrypted data is segmented and recombined into the encrypted data file, if the original data is covered during encryption, no additional operation is needed; if the data is encrypted by adopting a copying mode, the sequence of the original data segments is reserved, and the encrypted data is sequentially added to a new data file.
According to an embodiment of the present invention, generating at least one first key includes: generating at least one second key; and transforming each second key to obtain at least one first key.
In this embodiment, the second key is a first generated key, and the first key is obtained by performing a second transformation on the first generated key. This embodiment may enhance the security of the key and reduce the risk of the key being compromised.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using an encryption algorithm to obtain at least one first key.
In the embodiment, the encryption algorithm is adopted to transform the first generated key to obtain the first key so as to enhance the security of the first key. The embodiment does not limit the specific encryption algorithm used, and generally, the higher the security level, the higher the algorithm security, but the higher the computational complexity, will bring certain system consumption, and the implementer can determine the applicable encryption algorithm according to the specific conditions and requirements of implementation.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using a self-defined algorithm to obtain at least one first key.
In the present embodiment, when the standard encryption algorithm cannot meet some special requirements of the application scenario for various reasons or special circumstances, a first key may be obtained by transforming the first generated key, i.e. the second key, using a self-defined algorithm to meet some special requirements of the application scenario.
According to an embodiment of the present invention, after allocating a first key to each data segment to obtain a first key corresponding to the corresponding data segment, the method further includes: the first key is stored.
In this embodiment, in order to facilitate the later decryption operation, all the first keys used for encrypting the data file are stored in a certain data storage system, and the first keys corresponding to the data segments can be directly obtained through the data file names or the identifiers of the data files, and by combining the subscripts of the data segments or the identifiers of the data segments without being regenerated. Therefore, when decryption is carried out later, the key can be conveniently read, the time for repeated calculation and the system consumption can be greatly saved, and the problem that the newly generated key is different from the key used in encryption due to small errors or changes in the process of regenerating the key can be avoided.
According to a second aspect of the embodiments of the present invention, an information processing apparatus for displaying encrypted data in segments, as shown in fig. 2, the apparatus 20 includes: a data block obtaining module 201, configured to obtain an encrypted data segment, where the data segment is a data segment of a data file and is obtained by independently encrypting using a first key corresponding to the data segment; a first key obtaining module 202, configured to obtain a first key corresponding to the data segment; the decryption module 203 is configured to perform an exclusive-or operation on each byte in the data segment with the first key to obtain a decrypted data segment; and a display module 204, configured to display the decrypted data segment.
According to an embodiment of the present invention, the apparatus 20 further includes: the data segmentation module is used for dividing the data file into at least one data segment; a first key generation module for generating at least one first key; the first key distribution module is used for distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into the encrypted data file.
According to an embodiment of the present invention, the first key generation module includes: a second key generation unit, configured to generate a second key for each data segment to obtain at least one second key; and the key transformation unit is used for transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key by using a customized algorithm to obtain at least one first key.
According to an embodiment of the present invention, the apparatus 20 further includes: and the storage module is used for storing the first key.
According to a third aspect of embodiments of the present invention, there is provided a storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method described above.
Here, it should be noted that: the above description of the embodiment of the information processing apparatus and the above description of the embodiment of the computer storage medium are similar to the description of the foregoing method embodiments, and have similar beneficial effects to the foregoing method embodiments, and therefore, the description is omitted here for brevity. For the technical details that have not been disclosed yet in the description of the embodiment of the apparatus for configuring a distribution and the embodiment of the computer storage medium of the present invention, please refer to the description of the foregoing method embodiment of the present invention for understanding, and therefore, for brevity, no further description is provided.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of a unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage medium, a Read Only Memory (ROM), a magnetic disk, and an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage medium, a ROM, a magnetic disk, an optical disk, or the like, which can store the program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An information processing method for displaying encrypted data files in a segmented manner, the method comprising:
acquiring an encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment;
acquiring a first key corresponding to the data segment;
carrying out XOR operation on each byte in the data segment by using the first key to obtain a decrypted data segment;
and displaying the decrypted data segment.
2. The method of claim 1, wherein prior to said obtaining the data segment encrypted using the first key, the method further comprises:
dividing the data file into at least one data segment;
generating at least one first key;
distributing one first key for each data segment to obtain a first key corresponding to the corresponding data segment;
acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment;
and segmenting and recombining the encrypted data into encrypted data files.
3. The method of claim 2, wherein generating at least one first key comprises:
generating at least one second key;
and transforming each second key to obtain at least one first key.
4. The method of claim 3, wherein transforming each second key to obtain at least one first key comprises:
and transforming each second key by using an encryption algorithm to obtain at least one first key.
5. The method of claim 3, wherein transforming each second key to obtain at least one first key comprises:
and transforming each second key by using a self-defined algorithm to obtain at least one first key.
6. The method of claim 2, wherein after assigning one of the first keys to each data segment results in the corresponding first key for the corresponding data segment, the method further comprises:
storing the first key.
7. An information processing apparatus for displaying encrypted data in segments, the apparatus comprising:
the data block acquisition module is used for acquiring an encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment;
the first key acquisition module is used for acquiring a first key corresponding to the data segment;
the decryption module is used for carrying out exclusive OR operation on each byte in the data segments by using the first key to obtain decrypted data segments;
and the display module is used for displaying the decrypted data segment.
8. The apparatus of claim 7, further comprising:
the data segmentation division module is used for dividing the data file into at least one data segment;
a first key generation module for generating at least one first key;
the first key distribution module is used for distributing one first key for each data segment to obtain a first key corresponding to the corresponding data segment;
the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment;
and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into an encrypted data file.
9. The apparatus of claim 7, further comprising:
and the storage module is used for storing the first key.
10. A storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method of any one of claims 1 to 6.
CN202010903174.4A 2020-09-01 2020-09-01 Information processing method, device and storage medium Pending CN112182512A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010903174.4A CN112182512A (en) 2020-09-01 2020-09-01 Information processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010903174.4A CN112182512A (en) 2020-09-01 2020-09-01 Information processing method, device and storage medium

Publications (1)

Publication Number Publication Date
CN112182512A true CN112182512A (en) 2021-01-05

Family

ID=73925332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010903174.4A Pending CN112182512A (en) 2020-09-01 2020-09-01 Information processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN112182512A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347001A (en) * 2021-05-31 2021-09-03 广州众诺电子技术有限公司 Data protection method, server, system, device and medium
CN115664635A (en) * 2022-10-19 2023-01-31 山东新一代信息产业技术研究院有限公司 Method for super-long key

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009087972A1 (en) * 2008-01-09 2009-07-16 Nec Corporation Data transmission device, data reception device, methods therefor, recording medium, and data communication system therefor
CN102143159A (en) * 2011-01-13 2011-08-03 北京邮电大学 Database key management method in DAS (database-as-a-service) model
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN106250770A (en) * 2015-06-03 2016-12-21 三星电子株式会社 For to the electronic equipment of content-encrypt and method
CN106982116A (en) * 2017-04-26 2017-07-25 南通大学 A kind of local file encryption method of the AES based on reversible logic circuits
US20180089427A1 (en) * 2016-09-28 2018-03-29 Rodrigo R. Branco Return address encryption
CN108156113A (en) * 2016-12-02 2018-06-12 航天星图科技(北京)有限公司 A kind of method for pushing for updating file
CN108810022A (en) * 2018-07-18 2018-11-13 郑州云海信息技术有限公司 A kind of encryption method, decryption method and device
CN109635573A (en) * 2018-11-12 2019-04-16 北京海泰方圆科技股份有限公司 System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption
CN110099064A (en) * 2019-05-08 2019-08-06 广州创想云科技有限公司 A kind of document handling method based on Internet of Things, device, equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009087972A1 (en) * 2008-01-09 2009-07-16 Nec Corporation Data transmission device, data reception device, methods therefor, recording medium, and data communication system therefor
CN102143159A (en) * 2011-01-13 2011-08-03 北京邮电大学 Database key management method in DAS (database-as-a-service) model
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN104836656A (en) * 2015-05-08 2015-08-12 厦门大学 Method for storing and transmitting video file
CN106250770A (en) * 2015-06-03 2016-12-21 三星电子株式会社 For to the electronic equipment of content-encrypt and method
US20180089427A1 (en) * 2016-09-28 2018-03-29 Rodrigo R. Branco Return address encryption
CN108156113A (en) * 2016-12-02 2018-06-12 航天星图科技(北京)有限公司 A kind of method for pushing for updating file
CN106982116A (en) * 2017-04-26 2017-07-25 南通大学 A kind of local file encryption method of the AES based on reversible logic circuits
CN108810022A (en) * 2018-07-18 2018-11-13 郑州云海信息技术有限公司 A kind of encryption method, decryption method and device
CN109635573A (en) * 2018-11-12 2019-04-16 北京海泰方圆科技股份有限公司 System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption
CN110099064A (en) * 2019-05-08 2019-08-06 广州创想云科技有限公司 A kind of document handling method based on Internet of Things, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347001A (en) * 2021-05-31 2021-09-03 广州众诺电子技术有限公司 Data protection method, server, system, device and medium
CN115664635A (en) * 2022-10-19 2023-01-31 山东新一代信息产业技术研究院有限公司 Method for super-long key

Similar Documents

Publication Publication Date Title
US20120281839A1 (en) Key usage policies for cryptographic keys
CN106878013B (en) File encryption and decryption method and device
CN110061840A (en) Data ciphering method, device, computer equipment and storage medium
CN111191255B (en) Information encryption processing method, server, terminal, device and storage medium
CN115225409B (en) Cloud data safety duplicate removal method based on multi-backup joint verification
CN106530206B (en) Image encryption and decryption method and device based on optical encryption and decryption technology
EP4020265A1 (en) Method and device for storing encrypted data
CN112182512A (en) Information processing method, device and storage medium
US20110154015A1 (en) Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File
CN110650191A (en) Data read-write method of distributed storage system
WO2023052869A1 (en) Secure encryption of partial blocks
KR101553986B1 (en) System and method of distrubuted data storage, restoration
US11354427B2 (en) Encrypting/decrypting method for multi-digit number and encrypting/decrypting server
US20120281838A1 (en) Key management policies for cryptographic keys
JP4363086B2 (en) Information transmitting apparatus and method, information receiving apparatus and method, and information providing system
CN115412246B (en) Method, device, equipment and storage medium for inadvertent transmission
CN111666577A (en) Data decryption method, device, equipment and storage medium
CN116132065A (en) Key determination method, device, computer equipment and storage medium
CN111949996A (en) Generation method, encryption method, system, device and medium of security private key
KR102284877B1 (en) Efficient functional encryption for set intersection
CN111130788B (en) Data processing method and system, data reading method and iSCSI server
CN115085983A (en) Data processing method and device, computer readable storage medium and electronic equipment
CN114398656A (en) File encryption method, file decryption method, file encryption device, file decryption device, computer equipment and storage medium
CN108921550B (en) Management method and device of digital currency wallet, electronic equipment and storage medium
CN115865530B (en) File management method, file management system and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105