CN112182512A - Information processing method, device and storage medium - Google Patents
Information processing method, device and storage medium Download PDFInfo
- Publication number
- CN112182512A CN112182512A CN202010903174.4A CN202010903174A CN112182512A CN 112182512 A CN112182512 A CN 112182512A CN 202010903174 A CN202010903174 A CN 202010903174A CN 112182512 A CN112182512 A CN 112182512A
- Authority
- CN
- China
- Prior art keywords
- key
- data segment
- data
- encrypted
- segment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 21
- 238000003672 processing method Methods 0.000 title claims abstract description 13
- 238000000034 method Methods 0.000 claims abstract description 37
- 230000001131 transforming effect Effects 0.000 claims description 18
- 230000011218 segmentation Effects 0.000 claims description 8
- 230000006798 recombination Effects 0.000 claims description 3
- 238000005215 recombination Methods 0.000 claims description 3
- 230000009466 transformation Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses an information processing method, an information processing device and a storage medium. The method comprises the following steps: firstly, acquiring a data segment encrypted by using a first key, wherein the data segment is a data segment of a data file; then, acquiring a first key corresponding to the data segment; then, carrying out XOR operation on each byte in the data segment by using a first key to obtain a decrypted data segment; the decrypted data segment is then displayed. The data file is encrypted in a segmented mode, so that the data file can be decrypted in a segmented mode, all data does not need to be loaded when online reading is conducted, only the content which is currently being read needs to be loaded and decrypted, the time for first loading is greatly shortened, the length of the file cannot be changed when the data file is encrypted and decrypted by means of XOR on each byte, and the purpose of the length of the file in various scenes can be reserved to the maximum extent.
Description
Technical Field
The present invention relates to the field of computer information processing, and in particular, to an information processing method, apparatus, and storage medium.
Background
At present, in an online reading system, chapter contents of novels or other books are stored locally in a file manner, or are displayed by acquiring data from a remote server through a network. In this process, if the content is transmitted or loaded in the clear, the content is easy to be captured, so that the copyright cannot be effectively protected, but commonly used Encryption algorithms such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC4 Encryption algorithm (Rivest Cipher 4), RSA Encryption algorithm, and the like.
However, the following problems can exist with these algorithms: 1) the length of the original text is changed, but the length may have special use in system implementation, such as determining whether the file is modified; 2) the problem that the user experience is poor due to the fact that the time for displaying the content for the first time is long for books with lengthened contents is solved.
Therefore, how to encrypt and support the decryption of partial content under the condition of ensuring that the file length is not changed becomes a technical problem to be solved by the current online reading system.
Disclosure of Invention
In view of the above problems, embodiments of the present invention provide a method, an apparatus, and a storage medium.
According to a first aspect of the embodiments of the present invention, an information processing method is used for displaying encrypted data files in segments, and the method includes: acquiring an encrypted data segment, wherein the data segment is a data segment of a data file and is obtained by independently encrypting a first key corresponding to the data segment; acquiring a first key corresponding to the data segment; carrying out XOR operation on each byte in the data segments by using a first key to obtain decrypted data segments; and displaying the decrypted data segment.
According to an embodiment of the present invention, before obtaining the data segment encrypted by using the first key, the method further includes: dividing the data file into at least one data segment; generating at least one first key; distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the encrypted data is segmented and recombined into an encrypted data file.
According to an embodiment of the present invention, generating at least one first key includes: generating at least one second key; and transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using a self-defined algorithm to obtain at least one first key.
According to an embodiment of the present invention, after allocating a first key to each data segment to obtain a first key corresponding to the corresponding data segment, the method further includes: the first key is stored.
According to a second aspect of the embodiments of the present invention, an information processing apparatus for displaying encrypted data in segments, includes: the data block acquisition module is used for acquiring the encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment; the first key acquisition module is used for acquiring a first key corresponding to the data segment; the decryption module is used for carrying out XOR operation on each byte in the data segmentation by using a first key to obtain the decrypted data segmentation; and the display module is used for displaying the decrypted data segment.
According to an embodiment of the present invention, the apparatus further includes: the data segmentation module is used for dividing the data file into at least one data segment; a first key generation module for generating at least one first key; the first key distribution module is used for distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into the encrypted data file.
According to an embodiment of the present invention, the first key generation module includes: a second key generation unit, configured to generate a second key for each data segment to obtain at least one second key; and the key transformation unit is used for transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key by using a customized algorithm to obtain at least one first key.
According to an embodiment of the present invention, the apparatus further includes: and the storage module is used for storing the first key.
According to a third aspect of embodiments of the present invention, there is provided a storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method described above.
The embodiment of the invention provides an information processing method, an information processing device and a storage medium, wherein the method comprises the following steps: firstly, acquiring an encrypted data segment, wherein the data segment is a data segment of a data file and is obtained by independently encrypting by using a first key corresponding to the data segment; then, acquiring a first key corresponding to the data segment; then, carrying out XOR operation on each byte in the data segment by using a first key to obtain a decrypted data segment; the decrypted data segment is then displayed. The data file is encrypted in a segmented mode, so that the data file can be decrypted in a segmented mode, all data does not need to be loaded when online reading is conducted, only the content which is currently being read needs to be loaded and decrypted, the time for first loading is greatly shortened, the length of the file cannot be changed when the data file is encrypted and decrypted by means of XOR on each byte, and the purpose of the length of the file in various scenes can be reserved to the maximum extent.
It is to be understood that the teachings of the present invention need not achieve all of the above-described benefits, but rather that specific embodiments may achieve specific technical results, and that other embodiments of the present invention may achieve benefits not mentioned above.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
FIG. 1 is a schematic flow chart of an implementation of an information processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a composition structure of an information processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
According to a first aspect of the embodiments of the present invention, an information processing method is used for displaying an encrypted data file in segments, as shown in fig. 1, the method includes: operation 110, acquiring the encrypted data segment, where the data segment is a data segment of the data file and is obtained by independently encrypting using a first key corresponding to the data segment; operation 120, obtaining a first key corresponding to the data segment; operation 130, performing an exclusive-or operation on each byte in the data segment with the first key to obtain a decrypted data segment; at operation 140, the decrypted data segment is displayed.
In operation 110, the acquired data segment is a data segment encrypted with a first key. The data file is divided into data segments, generally because the data file is too large and does not need to display the entire content at a time, so in order to save system resources, such as transmission bandwidth and memory, the large data file is segmented for segment-by-segment transmission, segment-by-segment loading and segment-by-segment display. In the information processing method according to the embodiment of the present invention, the data segments are independently encrypted, so that the encrypted data segments can be obtained. If the whole file is encrypted by adopting the conventional common method, the encrypted data file is difficult to segment.
In operation 120, a first key corresponding to the data segment is obtained to decrypt the encrypted data segment. Usually, the first key corresponding to the data segment is stored in a data storage system having a mapping relationship with the data segment, for example, a database table with a certain sequence number as a unique identifier, if this is the case, only the unique identifier of the first key corresponding to the data segment needs to be calculated according to the mapping relationship, and the first key corresponding to the data segment is obtained from the database table through the unique identifier. The mapping may be determined by any method or form that can map the data segments to the first key, such as by some function or modulo calculation.
However, in the present embodiment, the specific embodiment of obtaining the first key corresponding to the data segment is not limited, and the first key may be obtained from a certain data storage system, or may be obtained again by using the same method used in the encryption, and the same key as the key used in the encryption may be secured.
In operation 130, performing the xor operation on each byte in the data segment to perform the encryption/decryption using the first key corresponding to the data segment does not change the byte length of the original data, so that the purpose of the file length in various scenarios can be maximally reserved. For example, the data [0] ═ 0x01 before encryption obtains the data bdate [0] ═ 0x10 after encryption with the first key bkey ═ 0x10 (data [0] ^ bkey) ═ 0x01^0x10 ═ 0x 11; the encrypted data bdata [0] is decrypted by the first key bkey to obtain the data before encryption [0] ═ bdata [0] ^ bkey ^0x 11^0x10 ═ 0x 01.
At operation 140, the content of the data segment is decrypted and various plaintext presentations may be made for reading or querying by the user.
According to an embodiment of the present invention, before obtaining the data segment encrypted by using the first key, the method further includes: dividing the data file into at least one data segment; generating at least one first key; distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the encrypted data is segmented and recombined into an encrypted data file.
The large data file may be segmented by any suitable method according to needs, and the large data file is often divided into a plurality of data segments by subscripts or file indexes of the data array.
When generating at least one first key, a group of keys can be generated by any applicable software or hardware key generation method, the number of the group of keys is not required to be equal to the number of the data segments, and if the number of the group of keys is less than the number of the data segments, the first keys can be repeatedly distributed to the data segments by adopting a certain rule under the condition of ensuring relative safety. For example, assuming that the content of a part of novel is divided into 100 pages, only 20 first keys may be generated, and the first key corresponding to the page content may be determined by modulo 20 by the page number i.
Once the first key corresponding to the data segment is determined, the key may be used to exclusive-or each byte in the data segment to obtain an encrypted data segment.
When the encrypted data is segmented and recombined into the encrypted data file, if the original data is covered during encryption, no additional operation is needed; if the data is encrypted by adopting a copying mode, the sequence of the original data segments is reserved, and the encrypted data is sequentially added to a new data file.
According to an embodiment of the present invention, generating at least one first key includes: generating at least one second key; and transforming each second key to obtain at least one first key.
In this embodiment, the second key is a first generated key, and the first key is obtained by performing a second transformation on the first generated key. This embodiment may enhance the security of the key and reduce the risk of the key being compromised.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using an encryption algorithm to obtain at least one first key.
In the embodiment, the encryption algorithm is adopted to transform the first generated key to obtain the first key so as to enhance the security of the first key. The embodiment does not limit the specific encryption algorithm used, and generally, the higher the security level, the higher the algorithm security, but the higher the computational complexity, will bring certain system consumption, and the implementer can determine the applicable encryption algorithm according to the specific conditions and requirements of implementation.
According to an embodiment of the present invention, transforming each second key to obtain at least one first key includes: and transforming each second key by using a self-defined algorithm to obtain at least one first key.
In the present embodiment, when the standard encryption algorithm cannot meet some special requirements of the application scenario for various reasons or special circumstances, a first key may be obtained by transforming the first generated key, i.e. the second key, using a self-defined algorithm to meet some special requirements of the application scenario.
According to an embodiment of the present invention, after allocating a first key to each data segment to obtain a first key corresponding to the corresponding data segment, the method further includes: the first key is stored.
In this embodiment, in order to facilitate the later decryption operation, all the first keys used for encrypting the data file are stored in a certain data storage system, and the first keys corresponding to the data segments can be directly obtained through the data file names or the identifiers of the data files, and by combining the subscripts of the data segments or the identifiers of the data segments without being regenerated. Therefore, when decryption is carried out later, the key can be conveniently read, the time for repeated calculation and the system consumption can be greatly saved, and the problem that the newly generated key is different from the key used in encryption due to small errors or changes in the process of regenerating the key can be avoided.
According to a second aspect of the embodiments of the present invention, an information processing apparatus for displaying encrypted data in segments, as shown in fig. 2, the apparatus 20 includes: a data block obtaining module 201, configured to obtain an encrypted data segment, where the data segment is a data segment of a data file and is obtained by independently encrypting using a first key corresponding to the data segment; a first key obtaining module 202, configured to obtain a first key corresponding to the data segment; the decryption module 203 is configured to perform an exclusive-or operation on each byte in the data segment with the first key to obtain a decrypted data segment; and a display module 204, configured to display the decrypted data segment.
According to an embodiment of the present invention, the apparatus 20 further includes: the data segmentation module is used for dividing the data file into at least one data segment; a first key generation module for generating at least one first key; the first key distribution module is used for distributing a first key for each data segment to obtain a first key corresponding to the corresponding data segment; the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment; and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into the encrypted data file.
According to an embodiment of the present invention, the first key generation module includes: a second key generation unit, configured to generate a second key for each data segment to obtain at least one second key; and the key transformation unit is used for transforming each second key to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key using an encryption algorithm to obtain at least one first key.
According to an embodiment of the present invention, the key transformation unit is specifically configured to transform each second key by using a customized algorithm to obtain at least one first key.
According to an embodiment of the present invention, the apparatus 20 further includes: and the storage module is used for storing the first key.
According to a third aspect of embodiments of the present invention, there is provided a storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method described above.
Here, it should be noted that: the above description of the embodiment of the information processing apparatus and the above description of the embodiment of the computer storage medium are similar to the description of the foregoing method embodiments, and have similar beneficial effects to the foregoing method embodiments, and therefore, the description is omitted here for brevity. For the technical details that have not been disclosed yet in the description of the embodiment of the apparatus for configuring a distribution and the embodiment of the computer storage medium of the present invention, please refer to the description of the foregoing method embodiment of the present invention for understanding, and therefore, for brevity, no further description is provided.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of a unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage medium, a Read Only Memory (ROM), a magnetic disk, and an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage medium, a ROM, a magnetic disk, an optical disk, or the like, which can store the program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. An information processing method for displaying encrypted data files in a segmented manner, the method comprising:
acquiring an encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment;
acquiring a first key corresponding to the data segment;
carrying out XOR operation on each byte in the data segment by using the first key to obtain a decrypted data segment;
and displaying the decrypted data segment.
2. The method of claim 1, wherein prior to said obtaining the data segment encrypted using the first key, the method further comprises:
dividing the data file into at least one data segment;
generating at least one first key;
distributing one first key for each data segment to obtain a first key corresponding to the corresponding data segment;
acquiring each data segment and carrying out XOR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment;
and segmenting and recombining the encrypted data into encrypted data files.
3. The method of claim 2, wherein generating at least one first key comprises:
generating at least one second key;
and transforming each second key to obtain at least one first key.
4. The method of claim 3, wherein transforming each second key to obtain at least one first key comprises:
and transforming each second key by using an encryption algorithm to obtain at least one first key.
5. The method of claim 3, wherein transforming each second key to obtain at least one first key comprises:
and transforming each second key by using a self-defined algorithm to obtain at least one first key.
6. The method of claim 2, wherein after assigning one of the first keys to each data segment results in the corresponding first key for the corresponding data segment, the method further comprises:
storing the first key.
7. An information processing apparatus for displaying encrypted data in segments, the apparatus comprising:
the data block acquisition module is used for acquiring an encrypted data segment, wherein the data segment is a data segment of the data file and is obtained by independently encrypting by using a first key corresponding to the data segment;
the first key acquisition module is used for acquiring a first key corresponding to the data segment;
the decryption module is used for carrying out exclusive OR operation on each byte in the data segments by using the first key to obtain decrypted data segments;
and the display module is used for displaying the decrypted data segment.
8. The apparatus of claim 7, further comprising:
the data segmentation division module is used for dividing the data file into at least one data segment;
a first key generation module for generating at least one first key;
the first key distribution module is used for distributing one first key for each data segment to obtain a first key corresponding to the corresponding data segment;
the encryption module is used for acquiring each data segment and performing exclusive OR operation on each byte in the corresponding data segment by using a first key corresponding to the corresponding data segment to obtain an encrypted data segment;
and the data segmentation and recombination module is used for segmenting and recombining the encrypted data into an encrypted data file.
9. The apparatus of claim 7, further comprising:
and the storage module is used for storing the first key.
10. A storage medium on which program instructions are stored, wherein the program instructions are operable when executed to perform the information processing method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010903174.4A CN112182512A (en) | 2020-09-01 | 2020-09-01 | Information processing method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010903174.4A CN112182512A (en) | 2020-09-01 | 2020-09-01 | Information processing method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112182512A true CN112182512A (en) | 2021-01-05 |
Family
ID=73925332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010903174.4A Pending CN112182512A (en) | 2020-09-01 | 2020-09-01 | Information processing method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112182512A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113347001A (en) * | 2021-05-31 | 2021-09-03 | 广州众诺电子技术有限公司 | Data protection method, server, system, device and medium |
CN115664635A (en) * | 2022-10-19 | 2023-01-31 | 山东新一代信息产业技术研究院有限公司 | Method for super-long key |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009087972A1 (en) * | 2008-01-09 | 2009-07-16 | Nec Corporation | Data transmission device, data reception device, methods therefor, recording medium, and data communication system therefor |
CN102143159A (en) * | 2011-01-13 | 2011-08-03 | 北京邮电大学 | Database key management method in DAS (database-as-a-service) model |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN106250770A (en) * | 2015-06-03 | 2016-12-21 | 三星电子株式会社 | For to the electronic equipment of content-encrypt and method |
CN106982116A (en) * | 2017-04-26 | 2017-07-25 | 南通大学 | A kind of local file encryption method of the AES based on reversible logic circuits |
US20180089427A1 (en) * | 2016-09-28 | 2018-03-29 | Rodrigo R. Branco | Return address encryption |
CN108156113A (en) * | 2016-12-02 | 2018-06-12 | 航天星图科技(北京)有限公司 | A kind of method for pushing for updating file |
CN108810022A (en) * | 2018-07-18 | 2018-11-13 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method and device |
CN109635573A (en) * | 2018-11-12 | 2019-04-16 | 北京海泰方圆科技股份有限公司 | System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption |
CN110099064A (en) * | 2019-05-08 | 2019-08-06 | 广州创想云科技有限公司 | A kind of document handling method based on Internet of Things, device, equipment and storage medium |
-
2020
- 2020-09-01 CN CN202010903174.4A patent/CN112182512A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009087972A1 (en) * | 2008-01-09 | 2009-07-16 | Nec Corporation | Data transmission device, data reception device, methods therefor, recording medium, and data communication system therefor |
CN102143159A (en) * | 2011-01-13 | 2011-08-03 | 北京邮电大学 | Database key management method in DAS (database-as-a-service) model |
CN102402670A (en) * | 2011-08-03 | 2012-04-04 | 广东欧珀移动通信有限公司 | File encryption and decryption method |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN104836656A (en) * | 2015-05-08 | 2015-08-12 | 厦门大学 | Method for storing and transmitting video file |
CN106250770A (en) * | 2015-06-03 | 2016-12-21 | 三星电子株式会社 | For to the electronic equipment of content-encrypt and method |
US20180089427A1 (en) * | 2016-09-28 | 2018-03-29 | Rodrigo R. Branco | Return address encryption |
CN108156113A (en) * | 2016-12-02 | 2018-06-12 | 航天星图科技(北京)有限公司 | A kind of method for pushing for updating file |
CN106982116A (en) * | 2017-04-26 | 2017-07-25 | 南通大学 | A kind of local file encryption method of the AES based on reversible logic circuits |
CN108810022A (en) * | 2018-07-18 | 2018-11-13 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method and device |
CN109635573A (en) * | 2018-11-12 | 2019-04-16 | 北京海泰方圆科技股份有限公司 | System, method, apparatus, electronic equipment and the medium of data distribution formula encryption and decryption |
CN110099064A (en) * | 2019-05-08 | 2019-08-06 | 广州创想云科技有限公司 | A kind of document handling method based on Internet of Things, device, equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113347001A (en) * | 2021-05-31 | 2021-09-03 | 广州众诺电子技术有限公司 | Data protection method, server, system, device and medium |
CN115664635A (en) * | 2022-10-19 | 2023-01-31 | 山东新一代信息产业技术研究院有限公司 | Method for super-long key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120281839A1 (en) | Key usage policies for cryptographic keys | |
CN106878013B (en) | File encryption and decryption method and device | |
CN110061840A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN111191255B (en) | Information encryption processing method, server, terminal, device and storage medium | |
CN115225409B (en) | Cloud data safety duplicate removal method based on multi-backup joint verification | |
CN106530206B (en) | Image encryption and decryption method and device based on optical encryption and decryption technology | |
EP4020265A1 (en) | Method and device for storing encrypted data | |
CN112182512A (en) | Information processing method, device and storage medium | |
US20110154015A1 (en) | Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File | |
CN110650191A (en) | Data read-write method of distributed storage system | |
WO2023052869A1 (en) | Secure encryption of partial blocks | |
KR101553986B1 (en) | System and method of distrubuted data storage, restoration | |
US11354427B2 (en) | Encrypting/decrypting method for multi-digit number and encrypting/decrypting server | |
US20120281838A1 (en) | Key management policies for cryptographic keys | |
JP4363086B2 (en) | Information transmitting apparatus and method, information receiving apparatus and method, and information providing system | |
CN115412246B (en) | Method, device, equipment and storage medium for inadvertent transmission | |
CN111666577A (en) | Data decryption method, device, equipment and storage medium | |
CN116132065A (en) | Key determination method, device, computer equipment and storage medium | |
CN111949996A (en) | Generation method, encryption method, system, device and medium of security private key | |
KR102284877B1 (en) | Efficient functional encryption for set intersection | |
CN111130788B (en) | Data processing method and system, data reading method and iSCSI server | |
CN115085983A (en) | Data processing method and device, computer readable storage medium and electronic equipment | |
CN114398656A (en) | File encryption method, file decryption method, file encryption device, file decryption device, computer equipment and storage medium | |
CN108921550B (en) | Management method and device of digital currency wallet, electronic equipment and storage medium | |
CN115865530B (en) | File management method, file management system and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210105 |