CN113254974B - Information security encryption method and device - Google Patents

Information security encryption method and device Download PDF

Info

Publication number
CN113254974B
CN113254974B CN202110652162.3A CN202110652162A CN113254974B CN 113254974 B CN113254974 B CN 113254974B CN 202110652162 A CN202110652162 A CN 202110652162A CN 113254974 B CN113254974 B CN 113254974B
Authority
CN
China
Prior art keywords
encryption
splitting
data
unit
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110652162.3A
Other languages
Chinese (zh)
Other versions
CN113254974A (en
Inventor
杨海祥
姜雪军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Guangpeng Information Technology Co ltd
Original Assignee
Shandong Guangpeng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Guangpeng Information Technology Co ltd filed Critical Shandong Guangpeng Information Technology Co ltd
Priority to CN202110652162.3A priority Critical patent/CN113254974B/en
Publication of CN113254974A publication Critical patent/CN113254974A/en
Application granted granted Critical
Publication of CN113254974B publication Critical patent/CN113254974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computers, in particular to an information security encryption method and device; the method comprises the steps of 1) obtaining information received by a terminal; step 2) splitting the received information into a plurality of block data according to a preset splitting rule, and step 3) configuring an encryption device to provide a first encryption unit; step 4) configuring a first encryption channel so that the chunk data and the first encryption unit form a corresponding combination; step 5) obtaining the attribute value of each encryption chunk; step 6) configuring an encryption device to provide a second encryption unit corresponding to the first encryption unit for forming independent encryption; and 7) configuring a second encryption channel to enable the attribute value and the second encryption unit to form corresponding combination, and 8) combining the encrypted attribute data and the encryption block in any pairs, inputting the combined data and the encryption block to an encryption output module, and combining and outputting the combined data and the encryption block according to a preset combination rule.

Description

Information security encryption method and device
Technical Field
The invention relates to the technical field of computers, in particular to an information security encryption method.
Background
The information security mainly comprises the following five aspects, namely the confidentiality, the authenticity, the integrity, the unauthorized copying and the security of a parasitic system of the information are ensured; the information security itself includes a wide range, including how to prevent the leakage of the secret of the business enterprise, prevent the browsing of bad information by teenagers, the leakage of personal information, etc.
The existing information format is very complex, including plain text, image information and larger mixed information mixed by the text and the image information, when the information is transmitted, the existing encryption method needs to set various different encryption algorithms and encryption forms to encrypt the information, and an effective unified combination of various encryption forms cannot be formed.
Disclosure of Invention
The present invention is directed to a method and an apparatus for encrypting information to solve the above problems.
In order to achieve the purpose, the invention provides the following technical scheme:
an information security encryption method is characterized by comprising the following steps:
step 1) acquiring information received by a terminal;
step 2) splitting the received information into a plurality of chunk data according to a preset splitting rule, wherein the chunk data comprises a butt-joint head segment;
step 3) configuring an encryption device to provide the same number of first encryption units for forming independent encryption as the chunk data;
step 4) configuring a first encryption channel to enable chunk data and first encryption units to form corresponding combinations, and after each first encryption unit receives the chunk data, independently encrypting the chunk data to form an encrypted chunk;
step 5) obtaining the attribute value of each encryption chunk;
step 6) configuring an encryption device to provide a second encryption unit corresponding to the first encryption unit for forming independent encryption;
step 7) configuring a second encryption channel to enable the attribute value and the second encryption units to form a corresponding combination, and after each second encryption unit receives the attribute value, independently encrypting the attribute value to form encrypted attribute data;
and 8) combining the encrypted attribute data and the encrypted chunks in pairs at will, inputting the combined data and the encrypted chunks into an encryption output module, and combining and outputting the combined data and the encrypted chunks according to a preset combination rule.
Further, in step 2), the splitting rule includes:
according to predetermined data nodes, or
According to a predetermined byte size, or
According to a preset frame number.
Further, in step 2), the step of including the pair of headers in the chunk data includes:
in the first situation, received information is split into a plurality of node chunk data according to a preset data node, the node data chunks are marked according to the splitting sequence to form a marked header segment, and the header segment is taken as a butt-joint header segment;
in the second situation, the received information is split into a plurality of byte chunk data according to the preset byte size, the byte chunk data is expanded by at least one byte bit according to the splitting sequence to form a blank byte, a connection byte header segment is written into the blank byte in a binary system, and the connection byte header segment is taken as a docking header segment;
in the third situation, the received information is split into a plurality of frame block data according to a preset frame number, the residual bits of the frame head of the frame block data are written into a connecting frame head section in a binary mode according to the splitting sequence, and the connecting frame head section is used as a butting word head section.
Further, the dummy byte is at least 1B.
Further, the received information is split into a plurality of frame block data according to a preset frame number, wherein the frame number is at least one frame.
The invention also provides an information security encryption device, which comprises
The splitting module is used for splitting the received information into a plurality of block data according to a preset splitting rule;
the encryption device is used for starting a plurality of first encryption units and second encryption units corresponding to the first encryption units according to the configuration information;
a first encryption channel for forming a corresponding combination of the chunk data and the first encryption unit according to the configuration information;
the first encryption unit is used for independently encrypting the chunk data after receiving the chunk data to form an encrypted chunk;
the encryption chunk attribute acquisition module is used for acquiring the attribute value of each encryption chunk;
the second encryption channel is used for enabling the attribute value and the second encryption unit to form a corresponding combination according to the configuration information;
the second encryption unit is used for independently encrypting the attribute value after receiving the attribute value to form encrypted attribute data;
the random combination module is used for combining the encryption attribute data and the encryption chunks in a random pairwise manner;
and the encryption output module is used for combining and outputting any pairwise combined encryption attribute data and the encryption chunks according to a preset combination rule.
The encryption device further comprises a configuration module, wherein the configuration module is used for outputting first configuration information to the encryption device, and the first configuration information is used for starting a plurality of first encryption units; and
second configuration information for configuring the first encryption channel such that the attribute value and the second encryption unit form a corresponding combination; and
third configuration information for outputting the third configuration information to the encryption device, the third configuration information starting a plurality of second encryption units corresponding to the first encryption units;
fourth configuration information for configuring the second secret channel such that the attribute value and the second cryptographic unit form a corresponding combination.
Furthermore, a detection unit, a judgment unit, a rule loading unit and a splitting unit are arranged in the splitting module
The detection unit is used for detecting the attribute and the data size of the acquired information;
the judging unit is used for judging the splitting mode used by the information according to the attribute and the data size of the information;
the rule loading unit is used for loading the corresponding splitting rule according to the splitting mode obtained by the judging unit;
the splitting unit is used for splitting the received information into a plurality of block data according to the loaded splitting rule.
Furthermore, the splitting module also comprises a marking unit, an expanding unit, a first writing unit and a second writing unit,
the marking unit is used for marking the node data chunks according to the splitting order to form a marked header field;
the expansion unit is used for expanding the byte data chunk by at least one byte bit according to the splitting sequence to form a blank byte;
the first writing unit is used for writing a concatenated byte header segment in binary in the blank byte;
the second writing unit is used for writing the residual bits of the frame head of the frame block data into the head section of the connection frame in a binary mode according to the splitting sequence.
Compared with the prior art, the invention has the beneficial effects that:
firstly, the method comprises the following steps: the invention can encrypt various formats and ultra-large data, uniformly improves various encryption forms, forms a set of information to be encrypted, automatically detects the format and the size of the information to be encrypted, and encrypts the information to be encrypted according to different encryption rules.
Secondly, the method comprises the following steps: the information to be encrypted is correspondingly split according to the detected format and size, the split data is independently encrypted, the attribute value of the encryption block is obtained after encryption is completed to carry out secondary encryption, and the encryption block which is encrypted once and the encryption attribute data which is encrypted twice are combined in pairs and then output.
Drawings
FIG. 1 is a schematic diagram of the frame of the apparatus of the present invention;
fig. 2 is a schematic diagram of a framework of a splitting module according to the present invention.
Detailed Description
The present invention will be described in detail with reference to specific embodiments.
Referring to fig. 1 and 2, the present invention provides an information security encryption apparatus, comprising
The splitting module is used for splitting the received information into a plurality of block data according to a preset splitting rule;
the encryption device is used for starting a plurality of first encryption units and second encryption units corresponding to the first encryption units according to the configuration information;
a first encryption channel for forming a corresponding combination of the chunk data and the first encryption unit according to the configuration information;
the first encryption unit is used for independently encrypting the chunk data after receiving the chunk data to form an encrypted chunk;
the encryption chunk attribute acquisition module is used for acquiring the attribute value of each encryption chunk;
the second encryption channel is used for enabling the attribute value and the second encryption unit to form a corresponding combination according to the configuration information;
the second encryption unit is used for independently encrypting the attribute value after receiving the attribute value to form encrypted attribute data;
the random combination module is used for combining the encryption attribute data and the encryption chunks in a random pairwise manner;
the encryption output module is used for combining and outputting any two-by-two combined encryption attribute data and the encryption blocks according to a preset combination rule;
a configuration module, configured to output first configuration information to the encryption device, the first configuration information being used to start the plurality of first encryption units; and
second configuration information for configuring the first encryption channel such that the attribute value and the second encryption unit form a corresponding combination; and
third configuration information for outputting the third configuration information to the encryption device, the third configuration information starting a plurality of second encryption units corresponding to the first encryption units;
fourth configuration information for configuring the second secret channel such that the attribute values and the second encryption unit form corresponding combinations.
In the above, the splitting module is provided with a detecting unit, a judging unit, a rule loading unit, a splitting unit, a marking unit, an expanding unit, a first writing unit and a second writing unit,
the detection unit is used for detecting the attribute and the data size of the acquired information;
the judging unit is used for judging the splitting mode used by the information according to the attribute and the data size of the information;
the rule loading unit is used for loading the corresponding splitting rule according to the splitting mode obtained by the judging unit;
the splitting unit is used for splitting the received information into a plurality of block data according to the loaded splitting rule.
The marking unit is used for marking the node data chunks according to the splitting order to form a marked header field;
the expansion unit is used for expanding the byte data chunk by at least one byte bit according to the splitting sequence to form a blank byte;
the first writing unit is used for writing a concatenated byte header segment in binary in the blank byte;
the second writing unit is used for writing the residual bits of the frame head of the frame block data into the head section of the connection frame in a binary mode according to the splitting sequence.
The present invention will be described in detail with reference to examples.
Example 1
The invention provides an information security encryption method, which is characterized by comprising the following steps:
step 1) acquiring information to be encrypted received by a terminal;
step 2) the detection unit detects the information to be encrypted to obtain the attribute and the data size of the information to be encrypted; the judging unit judges the splitting mode used by the information to be encrypted according to the attribute and the data size of the information to be encrypted; if the information to be encrypted is in a plain text format, the rule loading unit loads a splitting rule, namely the received information is split into a plurality of byte chunk data according to a preset byte size and the preset byte size as a splitting rule, and the expansion unit expands the byte chunk data by at least one byte bit according to the splitting sequence to form a blank byte, wherein the blank byte is at least 1B; a first writing unit writes a connection byte head segment in the blank byte in a binary mode, and the connection byte head segment is used as a butt-joint byte head segment;
step 3) the configuration module configures the encryption device according to the first configuration information to provide the same number of first encryption units for forming independent encryption as the number of the chunk data;
step 4) the configuration module configures a first encryption channel according to second configuration information so that the chunk data and the first encryption units form a corresponding combination, and each first encryption unit independently encrypts the chunk data after receiving the chunk data to form an encrypted chunk;
step 5) obtaining the attribute value of each encryption chunk;
step 6) the configuration module configures the encryption device according to third configuration information to provide a second encryption unit corresponding to the first encryption unit and used for forming independent encryption;
step 7) the configuration module configures a second encryption channel according to fourth configuration information so that the attribute value and the second encryption units form a corresponding combination, and each second encryption unit independently encrypts the attribute value after receiving the attribute value to form encrypted attribute data;
and 8) combining the encrypted attribute data and the encrypted chunks in pairs at will, inputting the combined data and the encrypted chunks into an encryption output module, and combining and outputting the combined data and the encrypted chunks according to a preset combination rule.
Example 2
The invention provides an information security encryption method, which is characterized by comprising the following steps:
step 1) acquiring information to be encrypted received by a terminal;
step 2) the detection unit detects the information to be encrypted to obtain the attribute and the data size of the information to be encrypted; the judging unit judges the splitting mode used by the information to be encrypted according to the attribute and the data size of the information to be encrypted; if the information is to-be-encrypted information in an image format, the rule loading unit loads a splitting rule, namely the received information is split into a plurality of frame block data according to a preset frame number as a splitting rule according to the preset frame number, residual bits of a frame header of the frame block data are written into a connection frame header section in a binary mode according to the splitting sequence, and the connection frame header section is used as a docking header section.
Step 3) the configuration module configures the encryption device according to the first configuration information to provide the same number of first encryption units for forming independent encryption as the number of the chunk data;
step 4) the configuration module configures a first encryption channel according to second configuration information so that the chunk data and the first encryption units form a corresponding combination, and each first encryption unit independently encrypts the chunk data after receiving the chunk data to form an encrypted chunk;
step 5) obtaining the attribute value of each encryption chunk;
step 6) the configuration module configures the encryption device according to third configuration information to provide a second encryption unit corresponding to the first encryption unit and used for forming independent encryption;
step 7) the configuration module configures a second encryption channel according to fourth configuration information so that the attribute value and the second encryption units form a corresponding combination, and each second encryption unit independently encrypts the attribute value after receiving the attribute value to form encrypted attribute data;
and 8) combining the encrypted attribute data and the encrypted chunks in pairs at will, inputting the combined data and the encrypted chunks into an encryption output module, and combining and outputting the combined data and the encrypted chunks according to a preset combination rule.
Example 3
The invention provides an information security encryption method, which is characterized by comprising the following steps:
step 1) acquiring information to be encrypted received by a terminal;
step 2) the detection unit detects the information to be encrypted to obtain the attribute and the data size of the information to be encrypted; the judging unit judges the splitting mode used by the information to be encrypted according to the attribute and the data size of the information to be encrypted; if the information is mixed information to be encrypted in an image and plain text format and the space occupied by the mixed information to be encrypted is large, the rule loading unit loads a splitting rule, namely, according to a preset data node as the splitting rule, for example, 64M is used as a data node, the received information is split into a plurality of node chunk data according to the preset data node, the node chunk data is marked according to the splitting sequence to form a marked header section, and the header section is used as a butt-joint header section;
step 3) the configuration module configures the encryption device according to the first configuration information to provide the same number of first encryption units for forming independent encryption as the number of the chunk data;
step 4) the configuration module configures a first encryption channel according to second configuration information so that the chunk data and the first encryption units form a corresponding combination, and each first encryption unit independently encrypts the chunk data after receiving the chunk data to form an encrypted chunk;
step 5) obtaining the attribute value of each encryption chunk;
step 6) the configuration module configures the encryption device according to third configuration information to provide a second encryption unit corresponding to the first encryption unit and used for forming independent encryption;
step 7) the configuration module configures a second encryption channel according to fourth configuration information so that the attribute value and the second encryption units form a corresponding combination, and each second encryption unit receives the attribute value and then independently encrypts the attribute value to form encrypted attribute data;
and 8) combining the encrypted attribute data and the encrypted chunks in pairs at will, inputting the combined data and the encrypted chunks into an encryption output module, and combining and outputting the combined data and the encrypted chunks according to a preset combination rule.
In the invention, various formats and ultra-large data can be encrypted, various encryption forms are improved uniformly, a set of information to be encrypted, formats and sizes can be detected automatically, and the information to be encrypted is encrypted according to different encryption rules. The information to be encrypted is correspondingly split according to the detected format and size, the split data is independently encrypted, the attribute value of the encryption block is obtained after encryption is completed to carry out secondary encryption, and the encryption block which is encrypted once and the encryption attribute data which is encrypted twice are combined in pairs and then output.
The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts of the present invention. The foregoing is only a preferred embodiment of the present invention, and it should be noted that there are objectively infinite specific structures due to the limited character expressions, and it will be apparent to those skilled in the art that a plurality of modifications, decorations or changes may be made without departing from the principle of the present invention, and the technical features described above may be combined in a suitable manner; such modifications, variations, combinations, or adaptations of the invention using its spirit and scope, as defined by the claims, may be directed to other uses and embodiments.

Claims (5)

1. An information security encryption method is characterized by comprising the following steps:
step 1) acquiring information received by a terminal;
step 2) splitting the received information into a plurality of chunk data according to a preset splitting rule, wherein the chunk data comprises a butt-joint head segment;
step 3) configuring an encryption device to provide the same number of first encryption units for forming independent encryption as the chunk data;
step 4) configuring a first encryption channel to enable the chunk data and the first encryption units to form a corresponding combination, and after each first encryption unit receives the chunk data, independently encrypting the chunk data to form an encrypted chunk;
step 5) obtaining the attribute value of each encryption chunk;
step 6) configuring an encryption device to provide a second encryption unit corresponding to the first encryption unit for forming independent encryption;
step 7) configuring a second encryption channel to enable the attribute value and the second encryption units to form a corresponding combination, and after each second encryption unit receives the attribute value, independently encrypting the attribute value to form encrypted attribute data;
step 8) combining the encrypted attribute data and the encrypted chunks in pairs at will, inputting the combined data and the encrypted chunks to an encryption output module, and combining and outputting the combined data and the encrypted chunks according to a preset combination rule;
splitting received information into a plurality of block data according to a preset splitting rule to form a splitting module, wherein a detection unit, a judgment unit, a rule loading unit and a splitting unit are arranged in the splitting module;
the detection unit is used for detecting the attribute and the data size of the acquired information;
the judging unit is used for judging the splitting mode of the information according to the attribute and the data size of the information;
the rule loading unit is used for loading the corresponding splitting rule according to the splitting mode obtained by the judging unit;
the splitting unit is used for splitting the received information into a plurality of block data according to the loaded splitting rule;
in step 2), the splitting rule includes:
according to a predetermined data node, or
According to a predetermined byte size, or
According to a preset frame number;
in step 2), the chunk data including a pair of headers includes:
in the first situation, received information is split into a plurality of node chunk data according to a preset data node, the node data chunks are marked according to the splitting sequence to form a marked header segment, and the header segment is taken as a butt-joint header segment;
in the second situation, the received information is split into a plurality of byte chunk data according to the preset byte size, the byte chunk data is expanded by at least one byte bit according to the splitting sequence to form a blank byte, a connection byte header segment is written into the blank byte in a binary system, and the connection byte header segment is taken as a docking header segment;
in the third situation, the received information is split into a plurality of frame block data according to a preset frame number, the residual bits of the frame head of the frame block data are written into a connecting frame head section in a binary mode according to the splitting sequence, and the connecting frame head section is used as a butting word head section.
2. The method of claim 1, wherein the white space byte is at least 1B.
3. The information security encryption method according to claim 1, wherein the received information is split into a plurality of frame block data according to a preset number of frames, the number of frames being at least one frame.
4. An information security encryption device is characterized by comprising
The information received by the terminal is acquired and input to a splitting module, the splitting module is used for splitting the received information into a plurality of block data according to a preset splitting rule,
the encryption device is used for starting a plurality of first encryption units and second encryption units corresponding to the first encryption units according to the configuration information;
a first encryption channel for forming a corresponding combination of the chunk data and the first encryption unit according to the configuration information;
the first encryption unit is used for independently encrypting the chunk data after receiving the chunk data to form an encrypted chunk;
the encryption chunk attribute acquisition module is used for acquiring the attribute value of each encryption chunk;
the second encryption channel is used for enabling the attribute value and the second encryption unit to form a corresponding combination according to the configuration information;
the second encryption unit is used for independently encrypting the attribute value after receiving the attribute value to form encrypted attribute data;
the random combination module is used for combining the encryption attribute data and the encryption chunks in a random pairwise manner;
the encryption output module is used for combining and outputting any two-by-two combined encryption attribute data and the encryption blocks according to a preset combination rule;
the splitting module is internally provided with a detection unit, a judgment unit, a rule loading unit and a splitting unit;
the detection unit is used for detecting the attribute and the data size of the acquired information;
the judging unit is used for judging the splitting mode used by the information according to the attribute and the data size of the information;
the rule loading unit is used for loading the corresponding splitting rule according to the splitting mode obtained by the judging unit;
the splitting unit is used for splitting the received information into a plurality of block data according to the loaded splitting rule;
the splitting rule comprises:
according to a predetermined data node, or
According to a predetermined byte size, or
According to a preset frame number;
the chunk data including a pair of headers includes:
in the first situation, received information is split into a plurality of node chunk data according to a preset data node, the node data chunks are marked according to the splitting sequence to form a marked header segment, and the header segment is taken as a butt-joint header segment;
in the second situation, the received information is split into a plurality of byte chunk data according to the preset byte size, the byte chunk data is expanded by at least one byte bit according to the splitting sequence to form a blank byte, a connection byte header segment is written into the blank byte in a binary system, and the connection byte header segment is taken as a docking header segment;
in the third situation, the received information is split into a plurality of frame block data according to a preset frame number, the residual bits of the frame head of the frame block data are written into a connecting frame head section in a binary mode according to the splitting sequence, and the connecting frame head section is used as a butting word head section.
5. The information security encryption device of claim 4, wherein the splitting module further comprises a marking unit, an expanding unit, a first writing unit and a second writing unit,
the marking unit is used for marking the node data chunks according to the splitting sequence to form a marked header segment;
the expansion unit is used for expanding the byte data chunks by at least one byte bit according to the splitting order to form a blank byte;
the first writing unit is used for writing a concatenated byte header segment in a binary manner in the blank byte;
and the second writing unit is used for writing the residual bits of the frame head of the frame block data into the head section of the connection frame in a binary mode according to the splitting sequence.
CN202110652162.3A 2021-06-11 2021-06-11 Information security encryption method and device Active CN113254974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110652162.3A CN113254974B (en) 2021-06-11 2021-06-11 Information security encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110652162.3A CN113254974B (en) 2021-06-11 2021-06-11 Information security encryption method and device

Publications (2)

Publication Number Publication Date
CN113254974A CN113254974A (en) 2021-08-13
CN113254974B true CN113254974B (en) 2022-07-08

Family

ID=77187762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110652162.3A Active CN113254974B (en) 2021-06-11 2021-06-11 Information security encryption method and device

Country Status (1)

Country Link
CN (1) CN113254974B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113687878B (en) * 2021-08-23 2023-12-01 北京京东振世信息技术有限公司 Information interaction method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN103780375A (en) * 2012-10-19 2014-05-07 中国电信股份有限公司 Data transmitting method and device, and data receiving method and device
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage
CN111615106A (en) * 2019-02-25 2020-09-01 阿里巴巴集团控股有限公司 Voice data packet encryption method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414842A (en) * 2013-08-02 2013-11-27 广州杰赛科技股份有限公司 Image data encryption method and system and image data decryption method and system
CN107592636A (en) * 2017-08-17 2018-01-16 深圳市诚壹科技有限公司 A kind of method of processing information, terminal and server
CN110401631A (en) * 2019-06-19 2019-11-01 深圳壹账通智能科技有限公司 System upgrade information acquisition method, device, storage medium and block chain node

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN103780375A (en) * 2012-10-19 2014-05-07 中国电信股份有限公司 Data transmitting method and device, and data receiving method and device
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN111615106A (en) * 2019-02-25 2020-09-01 阿里巴巴集团控股有限公司 Voice data packet encryption method and device
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN110798455A (en) * 2019-10-18 2020-02-14 深圳市高德信通信股份有限公司 Encrypted communication transmission system for preventing information leakage

Also Published As

Publication number Publication date
CN113254974A (en) 2021-08-13

Similar Documents

Publication Publication Date Title
US8347083B1 (en) Encrypted cross-origin communication via an intermediary
CN105049425A (en) Physical isolation transmission method based on two-dimension code
CN102916963A (en) Safe data exchange method, device, nodes and safe data exchange system
US9621521B2 (en) Rapid data encryption and decryption for secure communication over open channels with plausible deniability
DE102016112552A1 (en) Data ciphering and decryption based on device and data authentication
CN113254974B (en) Information security encryption method and device
CN104902138A (en) ENCRYPTION/DECRYPTION SYSTEM and its control method
CN113094718A (en) File encryption method and related device
CN111625862B (en) Data processing method, system and storage medium based on multiple data nodes
CN112804133A (en) Encrypted group chat method and system based on block chain technology
US20190089534A1 (en) Firmware-inaccessible key storage
US10574439B2 (en) System and method for secure communication using random blocks or random numbers
JP2004072151A (en) Terminal with file encryption function
CN113595722A (en) Quantum security key synchronization method and device, electronic equipment and storage medium
JP5041607B2 (en) Key derivation technology for secure communication in wireless mesh networks
CN108985109B (en) Data storage method and device
CN103763697A (en) Wireless access point multi-secret key support system and method
CN106341384A (en) Methods for facilitating secure communication
CN115834192A (en) File ferrying method and device and computer readable storage medium
CN108701195B (en) Data security protection method and device
CN114650138A (en) I2C communication method, system, equipment and medium
CN106960159A (en) Burst disk and safe encryption method with safe encryption function
KR102423507B1 (en) Information comparing system and information comparing method using the system
KR101974411B1 (en) In-vehicle secure communication support device and operating method thereof
CN113434837A (en) Method and device for equipment identity authentication and smart home system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant