CN103281299B - A kind of ciphering and deciphering device and information processing method and system - Google Patents

A kind of ciphering and deciphering device and information processing method and system Download PDF

Info

Publication number
CN103281299B
CN103281299B CN201310150540.3A CN201310150540A CN103281299B CN 103281299 B CN103281299 B CN 103281299B CN 201310150540 A CN201310150540 A CN 201310150540A CN 103281299 B CN103281299 B CN 103281299B
Authority
CN
China
Prior art keywords
ciphertext
information
policy
deciphering device
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310150540.3A
Other languages
Chinese (zh)
Other versions
CN103281299A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201310150540.3A priority Critical patent/CN103281299B/en
Publication of CN103281299A publication Critical patent/CN103281299A/en
Priority to PCT/CN2014/075933 priority patent/WO2014173288A1/en
Application granted granted Critical
Publication of CN103281299B publication Critical patent/CN103281299B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention provides a kind of ciphering and deciphering device and message processing information and system, described information processing method, including: deciphering device obtains coded data packet, described coded data packet includes the text control information with the described text that communicates that communicates, wherein said communication text includes in plain text and at least one section of ciphertext, and wherein said control information includes the ciphertext identification information of described ciphertext;Described deciphering device, according to the ciphertext identification information of ciphertext described in described control information, determines the ciphertext of described communication text;Described deciphering device obtains the decryption policy that described ciphertext is corresponding;Described deciphering device utilizes described decryption policy that the described ciphertext obtained is decrypted process, obtains character information;Described deciphering device triggers the operation exporting described character information.

Description

A kind of ciphering and deciphering device and information processing method and system
Technical field
The present invention relates to a kind of electronic technology field, particularly relate to a kind of ciphering and deciphering device and message processing information and be System.
Background technology
For the safety of the communication information such as certified mail, instant messages, in prior art, sender can be to the communication information Send after being encrypted in full, accordingly, after recipient's communication information after receiving encryption, by corresponding deciphering Algorithm obtains the full text of this communication information, just can obtain the content of the communication information.
In actual applications, generally use ciphering and deciphering device that the communication information is encrypted and decrypted, but at communication letter Breath quantity of information excessive time, for comprehend at the enciphering/deciphering of the full text of the communication information spend ciphering and deciphering device plenty of time and Internal memory, affects the processing speed of ciphering and deciphering device, reduces the output speed of information.
Summary of the invention
Present invention seek to address that the problems referred to above/one of.
The present invention provides following technical scheme:
A kind of information processing method, including: deciphering device obtains coded data packet, coded data packet include communicating text and The control information of communication text, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes ciphertext Ciphertext identification information;Deciphering device, according to the ciphertext identification information of ciphertext in control information, determines the ciphertext of communication text;Deciphering Device obtains the decryption policy that ciphertext is corresponding;Deciphering device utilizes decryption policy that the ciphertext obtained is decrypted process, obtains Character information;Deciphering device triggers the operation of output character information.
Wherein, the step of the operation that deciphering device triggers output character information includes: deciphering device output character information;Or Person deciphers device and sends character information to terminal, terminal demonstration character information.
Wherein, control information also includes time control information;Deciphering device utilizes the decryption policy ciphertext to obtaining to carry out Decryption processing, obtains the step of character information, including: deciphering device obtains time control information;Deciphering device reads deciphering dress The clock information put;Clock information is compared by deciphering device with time control information;If comparison is passed through, then decipher device Utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Deciphering Device utilizes decryption policy that the ciphertext obtained is decrypted process, also includes before obtaining the step of character information: deciphering dress Put and the first signed data is carried out sign test;If sign test is passed through, then trigger and utilize decryption policy that the ciphertext obtained is decrypted Process, obtain the step of character information.
A kind of information processing method, including: terminal obtains coded data packet, and coded data packet includes communicating text and communicating The control information of text, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the ciphertext of ciphertext Identification information;Terminal demonstration communication text;Terminal is after receiving decoding request, to the deciphering that deciphering device inquiry ciphertext is corresponding Strategy;Decryption policy is sent to terminal by deciphering device;Terminal receiving and deciphering strategy;Terminal obtains ciphertext;Terminal utilizes deciphering Strategy is decrypted process to ciphertext, obtains character information;Terminal output character information.
Wherein, terminal obtains the step of ciphertext and includes: terminal is according to the start position information of ciphertext in control information and knot Bundle positional information, determines the ciphertext of communication text;Or terminal receiving and deciphering device is according to the start bit of ciphertext in control information The ciphertext of the text that communicates that confidence breath determines with end position information.
Wherein, control information also includes time control information;Deciphering device utilizes the decryption policy ciphertext to obtaining to carry out Decryption processing, obtains the step of character information, including: deciphering device obtains time control information;Deciphering device reads deciphering dress The clock information put;Clock information is compared by deciphering device with time control information;If comparison is passed through, then decipher device Utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Terminal Also include before the step of display communication text: terminal sends the first signed data to deciphering device;Deciphering device detected To communication text the first signed data sign test pass through after, display communication text.
A kind of information processing method, including: terminal obtains coded data packet, and coded data packet includes communicating text and communicating The control information of text, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the ciphertext of ciphertext Mark;Terminal demonstration communication text;Terminal, after receiving decoding request, determines according to the ciphertext mark of ciphertext in control information The ciphertext of communication text;The ciphertext of communication text is sent to decipher device by terminal;Deciphering device obtains the deciphering that ciphertext is corresponding Strategy;Deciphering device utilizes decryption policy that the ciphertext obtained is decrypted process, obtains character information;Deciphering device triggers defeated Go out the operation of character information.
Wherein, the step of the operation that deciphering device triggers output character information includes: deciphering device output character information;Or Person deciphers device and sends character information to terminal, terminal demonstration character information.
Wherein, control information also includes time control information;Deciphering device utilizes the decryption policy ciphertext to obtaining to carry out Decryption processing, obtains the step of character information, including: deciphering device obtains time control information;Deciphering device reads deciphering dress The clock information put;Clock information is compared by deciphering device with time control information;If comparison is passed through, then decipher device Utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Deciphering Device utilizes decryption policy that the ciphertext obtained is decrypted process, also includes before obtaining the step of character information: deciphering dress Put and the first signed data is carried out sign test;If sign test is passed through, then trigger and utilize decryption policy that the ciphertext obtained is decrypted Process, obtain the step of character information.
A kind of information processing method, including: encryption device obtains communication text and to Partial encryption in communication text CIPHERING REQUEST;Encryption device determines the ciphertext mark of character information to be encrypted and character information to be encrypted according to CIPHERING REQUEST Knowledge information, and according to the encryption policy pre-set, character information to be encrypted is encrypted, obtain the text that communicates At least one section of ciphertext;Encryption device generates the control information of ciphertext according to ciphertext identification information;Encryption device at least exports at least One section of ciphertext and the information of control.
Wherein, control information also includes time control information.
Wherein, before the step of encryption device outputting encoded data bag, also include: communication text is signed by encryption device Name, and generate the first signed data for sign test communication text;Wherein, the coded data packet of encryption device output also includes the One signed data.
A kind of deciphering device, including: the first acquisition module, it is used for obtaining coded data packet, coded data packet includes communication The control information of text and the text that communicates, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes The ciphertext identification information of ciphertext;Determine module, be connected with the first acquisition module, for according to the ciphertext mark of ciphertext in control information Knowledge information, determines the ciphertext of communication text;Second acquisition module, is connected with the first acquisition module, corresponding for obtaining ciphertext Decryption policy;Deciphering module, and determines that module and the second acquisition module are connected, for utilizing decryption policy to enter the ciphertext obtained Row decryption processing, obtains character information;Trigger module, is connected with deciphering module, for triggering the operation of output character information.
Wherein, trigger module includes: output unit, for output character information;Or transmitting element, for character information Send to terminal, by terminal demonstration character information.
Wherein, control information also includes time control information;Deciphering module includes: acquiring unit, is used for obtaining time control Information processed;Read unit, for reading the clock information of deciphering device;Comparing unit, is connected with acquiring unit and reading unit, For clock information is compared with time control information;Decryption unit, is connected with comparing unit, for passing through in comparison Time, utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Deciphering Device also includes: the first sign test module, is connected with deciphering module, for the first signed data carries out sign test, and leads in sign test Cross, trigger deciphering module and be decrypted process.
Wherein, control information also includes the encryption policy of at least a section and/or the instruction information of encryption policy, wherein encrypts The instruction information of strategy and/or encryption policy is by obtaining after deciphering the private key encryption of device;Deciphering device obtains The decryption policy that ciphertext is corresponding, including: deciphering device utilizes the private key decryption indication information of deciphering device, obtains encryption policy; Deciphering device obtains the decryption policy that encryption policy is corresponding.
Wherein, control information also includes at the instruction Information Signature of the encryption policy at least a section and/or encryption policy The second signed data after reason;Before deciphering device obtains the decryption policy that ciphertext is corresponding, also include: deciphering device is signed second Name data carry out sign test;If sign test is passed through, then obtain the decryption policy that ciphertext is corresponding.
A kind of information processing system, including terminal and deciphering device, wherein: the first acquisition module in terminal, is used for obtaining Taking coded data packet, coded data packet includes the text control information with the text that communicates that communicates, and wherein communication text includes in plain text At least one section of ciphertext, the information that wherein controls includes the ciphertext identification information of ciphertext;Display module in terminal, obtains with first Module is connected, for display communication text;Enquiry module in terminal, display module is connected, for receiving decoding request After, to the decryption policy that deciphering device inquiry ciphertext is corresponding;The second acquisition module in deciphering device, is connected with enquiry module, For obtaining the decryption policy that ciphertext is corresponding;Sending module in deciphering device, is connected with the second acquisition module, for deciphering Strategy sends to terminal;Receiver module in terminal, is connected with sending module, for receiving and deciphering strategy;In terminal the 3rd Acquisition module, is used for obtaining ciphertext;Deciphering module in terminal, is connected with receiver module and the 3rd acquisition module, is used for utilizing Decryption policy is decrypted process to ciphertext, obtains character information;Output module in terminal, is connected with deciphering module, is used for Output character information.
Wherein, the 3rd acquisition module includes:
Determine unit, for according to the start position information of ciphertext in control information and end position information, determining communication The ciphertext of text;Or
Receive unit, for receiving and deciphering device according to the start position information of ciphertext in control information and stop bits confidence The ciphertext of the communication text that breath determines.
Wherein, control information also includes time control information;Deciphering module includes: acquiring unit, is used for obtaining time control Information processed;Read unit, for reading the clock information of deciphering device;Comparing unit, is connected with acquiring unit and reading unit, For clock information is compared with time control information;Decryption unit, is connected with comparing unit, for passing through in comparison Time, utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Display Module includes: transmitting element, for sending the first signed data to deciphering device;Display unit, for detecting deciphering dress Put after utilizing the first signed data that the signature sign test of communication text is passed through, display communication text;Deciphering device also includes: first Sign test module, is connected with transmitting element, for utilizing the first signed data that the signature of communication text is carried out sign test, obtains sign test Result;3rd transmitting element, is connected with the first sign test module and display unit, is used for sending sign test result.
A kind of information processing system, including terminal and deciphering device, wherein: the first acquisition module in terminal, is used for obtaining Taking coded data packet, coded data packet includes the text control information with the text that communicates that communicates, and wherein communication text includes in plain text At least one section of ciphertext, the information that wherein controls includes the ciphertext identification information of ciphertext;Display module in terminal, obtains with first Module is connected, for display communication text;
Really cover half block in terminal, is connected with display module, for after receiving decoding request, according in control information The ciphertext identification information of ciphertext determines the ciphertext of communication text;
Sending module in terminal, and determines that module and the first acquisition module are connected, for the ciphertext of communication text being sent out Give deciphering device;The second acquisition module in deciphering device, is connected with sending module, for obtaining the deciphering plan that ciphertext is corresponding Slightly;Deciphering module in deciphering device, is connected with sending module and the second acquisition module, is used for utilizing decryption policy to obtaining Ciphertext is decrypted process, obtains character information;Trigger module in deciphering device, is connected with deciphering module, is used for triggering defeated Go out the operation of character information.
Wherein, trigger module includes: output unit, for output character information;Or transmitting element, for character information Send to terminal, by terminal demonstration character information.
Wherein, control information also includes time control information;Deciphering module includes: acquiring unit, is used for obtaining time control Information processed;Read unit, for reading the clock information of deciphering device;Comparing unit, is connected with acquiring unit and reading unit, For clock information is compared with time control information;Decryption unit, is connected with comparing unit, for passing through in comparison Time, utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;Deciphering Device also includes: the first sign test module, is connected with deciphering module, for the first signed data carries out sign test, and leads in sign test Cross, trigger deciphering module and be decrypted process.
Wherein, control information also includes the encryption policy of at least a section and/or the instruction information of encryption policy, wherein encrypts The instruction information of strategy and/or encryption policy is by obtaining after deciphering the private key encryption of device;Second acquisition module For utilizing the private key decryption indication information of deciphering device, obtain encryption policy, then obtain the decryption policy that encryption policy is corresponding.
Wherein, control information also includes at the instruction Information Signature of the encryption policy at least a section and/or encryption policy The second signed data after reason;Deciphering device also includes: the second authentication module, for the second signed data is carried out sign test, and Pass through in sign test, trigger the operation obtaining decryption policy corresponding to ciphertext.
A kind of encryption device, including: acquisition module, for obtaining communication text and to Partial encryption in communication text CIPHERING REQUEST;Determine module, be connected with acquisition module, for determining character information to be encrypted according to CIPHERING REQUEST and treating Encryption character information communication text in start position information and end position information;Encrypting module, with acquisition module phase Even, for according to the encryption policy pre-set, character information to be encrypted being encrypted, obtain communicating text extremely Few one section of ciphertext;First generation module, and determines that module and encrypting module are connected, for according to start position information with terminate letter The encryption policy that breath and communication text are used generates the control information of ciphertext;Output module, raw with encrypting module and first Becoming module to be connected, for outputting encoded data bag, coded data packet includes: the plaintext, at least that in communication text, unencryption processes One section of ciphertext and the information of control.
Wherein, control information also includes time control information.
Wherein, encryption device also includes: signature blocks, for signing communication message;Second generation module, with label Name module is connected with output module, for communication message is carried out signature process, obtains the first signed data;Wherein, output mould The coded data packet of block output also includes the first signed data.
As seen from the above technical solution provided by the invention, the invention provides a kind of ciphering and deciphering device and information Process information and system, choose information to be encrypted in communication text by obtaining, it is achieved only high to safety information Encryption, it is achieved the Partial encryption to communication text, thus decrease the quantity of encrypted object, reduce the process pressure of cryptographic operation Power;In like manner, after the communication text of fetching portion encryption, only partial content in communication text is decrypted, decreases deciphering The quantity of object, reduces the processing pressure of decryption oprerations.For the equipment that disposal ability is limited, as outstanding in electronic signature token etc. It is suitable for.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, required use in embodiment being described below Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for this From the point of view of the those of ordinary skill in field, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings Accompanying drawing.
The schematic flow sheet of the information processing method embodiment that Fig. 1 provides for the embodiment of the present invention 1;
The schematic flow sheet of the information processing method embodiment that Fig. 2 provides for the embodiment of the present invention 2;
The schematic flow sheet of the information processing method embodiment that Fig. 3 provides for the embodiment of the present invention 3;
The schematic flow sheet of the information processing method embodiment that Fig. 4 provides for the embodiment of the present invention 4;
A kind of structural representation deciphering device embodiment that Fig. 5 provides for the present invention;
The structural representation of a kind of information processing system embodiment that Fig. 6 provides for the present invention;
The structural representation of the another kind of information processing system embodiment that Fig. 7 provides for the present invention;
The structural representation of a kind of encryption device embodiment that Fig. 8 provides for the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on this Inventive embodiment, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into protection scope of the present invention.
In describing the invention, it is to be understood that term " " center ", " longitudinally ", " laterally ", " on ", D score, Orientation or the position relationship of the instruction such as "front", "rear", "left", "right", " vertically ", " level ", " top ", " end ", " interior ", " outward " are Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description rather than instruction or dark The device or the element that show indication must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that right The restriction of the present invention.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relatively Importance or quantity or position.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " is installed ", " phase Even ", " connection " should be interpreted broadly, for example, it may be fixing connection, it is also possible to be to removably connect, or be integrally connected;Can To be mechanical connection, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, can understand that above-mentioned term is at this with concrete condition Concrete meaning in invention.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Embodiment 1
The schematic flow sheet of the information processing method embodiment that Fig. 1 provides for the embodiment of the present invention 1.Method shown in Fig. 1 is real Execute example to include:
Step 101, deciphering device obtain coded data packet, and coded data packet includes the text control with the text that communicates that communicates Information, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the ciphertext identification information of ciphertext;
Concrete, communication text includes two parts, and a portion is in plain text, another part ciphertext, wherein this ciphertext Can obtain after one section of continuous print character encryption in communication text, it is also possible to be to multistage continuous print word in communication text Obtain after symbol encryption.
Wherein, described ciphertext identification information is for determining that information that ciphertext comprised, can in the position of communication text To be start position information and end position information, it is also possible to be some differences and the form of expression in plain text, tilt such as font or The representation that font increases the weight of, it is also possible to be that the mode increasing wave, double horizontal line or dotted line below ciphertext represents.
Wherein, the encryption policy of described ciphertext can consult in advance, it is not necessary to notifies.
Optionally, described control information also includes that the instruction information for indicating encryption policy and/or encryption policy is permissible For encryption policy itself, it is also possible to for being used for determining the identification information of encryption policy, such as the numbering etc. of encryption policy.If used Identification information determines encryption policy, the data volume encryption policy to be less than of the information of its transmission itself, and due in transmission Holding is identification information, after lawless person gets this numbering, the encryption policy corresponding owing to cannot know this identification information, also The decryption policy of correspondence cannot be obtained, thus this ciphertext can not be cracked, it is ensured that the safety of information transmission.
Wherein, encryption policy can include AES and/or encryption key, is used to refer to the information of manner of decryption.
Wherein, if ciphertext is made up of multistage continuation character, then the information that controls includes multiple control entries, each control The corresponding one section of continuation character of entry processed, the original position of each control entries and end position information are in order to identify this section of consecutive word Accord with at the communication original position of text and end position, encryption policy in order to this section of continuation character of labelling in the encryption of communication text Strategy.
Wherein, the encryption policy that all of continuation character is corresponding can be identical, it is also possible to multistage continuation character uses multiple Encryption policy, wherein, if the encryption policy that multistage continuation character is used has at least two.Use identical relative to the former Encryption policy, the encryption policy that the latter uses is different, reduces the probability cracked, improves the safety of information.
Step 102, deciphering device, according to the ciphertext identification information of ciphertext in control information, determine the ciphertext of communication text;
Step 103, deciphering device obtain the decryption policy that ciphertext is corresponding;
Wherein this decryption policy can be that the sender with the text that communicates consults in advance, certainly, and encryption and decryption strategy bag Include algorithm and key, wherein one of them is consulted in advance.When communicating every time, do not consult being carried by control information Good part is held consultation.
Concrete, described control information also include described in the encryption policy of at least a section and/or the instruction letter of encryption policy Breath, the instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device 's;Described deciphering device obtains the decryption policy that described ciphertext is corresponding, including: described deciphering device utilizes described deciphering device Private key deciphers described instruction information, obtains encryption policy;Described deciphering device obtains the decryption policy that described encryption policy is corresponding, Thus ensure the safety of encryption policy.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include: Described deciphering device carries out sign test to described second signed data;If sign test is passed through, then obtain the deciphering that described ciphertext is corresponding Strategy.
After signed data, it is achieved the further protection to encryption policy, improve the safety of signed data further.
Wherein, the execution sequence of step 102 and step 103 can exchange.
Step 104, deciphering device utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information;
Wherein, it is preferred that control information also includes time control information;This step includes:
Step A1, deciphering device obtain time control information;
Such as, time control information is 9:00~12:00 on March 12nd, 2013.
Step A2, deciphering device read the clock information of deciphering device;
Such as, clock information is 10:45 on March 12nd, 2013.
Clock information is compared by step A3, deciphering device with time control information;
Specifically, it is judged that whether this temporal information is in the range of this time control information record, if in this scope In, then it represents that comparison is passed through, it is allowed to ciphertext is decrypted operation;Otherwise, comparison is not passed through, and flow process terminates.
As seen from the above, before being decrypted operation, utilize the time control information decryption time to communication text Being controlled, the recipient reaching control communication text gets the purpose of communication text in the range of special time, effectively controls The purpose of the reading time of system communication text.
Wherein, the clock information of the deciphering device of the present invention can configure in the way of using ciphertext, tries when there being external equipment When figure reads the clock information of deciphering device, without corresponding key, the most i.e. enable and read clock information, can not be light Easily it is distorted, thus the leakage of information preventing the clock information deciphering device to be tampered and causing, it is ensured that the peace of communication Entirely.
If the comparison of step A4 is passed through, then deciphering device utilizes decryption policy that the ciphertext obtained is decrypted process, To character information.
Step 105, deciphering device trigger the operation of output character information.
Wherein the way of output can be to play or display, but is not limited to this.
Concrete, the output function of character information can have a following two ways:
Mode one: deciphering device direct output character information;
Mode two: character information is sent to terminal, terminal demonstration character information by deciphering device.
Wherein, in the case of the safety of terminal is low, in order to avoid the character information obtained from ciphertext deciphering is stolen, Preferably employ mode one to show, it is ensured that the safety of information.
In mode two, in order to clear complete output character information, terminal can obtain rising in control information Beginning positional information and end position information, and according to start position information and end position information, revert to lead to by character information In letter text, obtain content and be communication text in plain text, and export content and be communication text in plain text.
Such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, and wherein X and Y is cipher-text information.Warp The character information of the X obtained after crossing deciphering is 123456789, and Y is 000, then the communication body matter of display is updated to by terminal Account 123456789, the sign test code paying 50 yuan is 000.
Optionally, after coded data packet also includes communication text is carried out signature process, the signature that obtains carries out the of sign test One signed data;The object wherein signed can communicate in text at least one in plain text and in ciphertext.
Deciphering device utilizes decryption policy that the ciphertext obtained is decrypted process, goes back before obtaining the step of character information Including:
Deciphering device carries out sign test to the first signed data;
If sign test is passed through, then trigger and utilize decryption policy that the ciphertext obtained is decrypted process, obtain character information Step.
By communication text being carried out sign test before deciphering, it is achieved the authentication to the recipient of communication text, it is to avoid Other deciphering devices with identical decryption policy parse this communication text, improve the safety of information.
Optionally, deciphering device acquisition coded data packet, by obtaining after terminal, specifically includes:
Step B1, terminal obtain coded data packet;
Step B2, terminal demonstration communication text;
Concrete, terminal demonstration communication text, such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, Wherein X and Y is cipher-text information.
Coded data packet, after receiving decoding request, is sent to decipher device by step B3, terminal;
Wherein, terminal can be connected by the Peripheral Interface of terminal, such as USB interface etc. with deciphering device, it is also possible to passes through Wirelessly or non-wirelessly mode is connected, such as bluetooth, NFC interface, infrared etc..
If it should be noted that deciphering device is the coded data packet just got after terminal demonstration communication text, Then deciphering device carries out sign test execution before terminal demonstration communication text to the first signed data.
The technical scheme that the embodiment of the present invention 1 provides, after the communication text of fetching portion encryption, only in communication text Partial content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations, have for disposal ability The equipment of limit, as especially suitable in electronic signature token etc..
Embodiment 2
The schematic flow sheet of the information processing method embodiment that Fig. 2 provides for the embodiment of the present invention 2.Method shown in Fig. 2 is real Execute example to include:
Step 201, terminal obtain coded data packet, and coded data packet includes the text control letter with the text that communicates that communicates Breath, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the ciphertext identification information of ciphertext;
Concrete, communication text includes two parts, and a portion is in plain text, another part ciphertext, wherein this ciphertext Can obtain after one section of continuous print character encryption in communication text, it is also possible to be to multistage continuous print word in communication text Obtain after symbol encryption.
Wherein, described ciphertext identification information is for determining that information that ciphertext comprised, can in the position of communication text To be start position information and end position information, it is also possible to be some differences and the form of expression in plain text, tilt such as font or The representation that font increases the weight of, it is also possible to be that the mode increasing wave, double horizontal line or dotted line below ciphertext represents.
Wherein, the encryption policy of described ciphertext can consult in advance, it is not necessary to notifies.
Optionally, described control information also includes that the instruction information for indicating encryption policy and/or encryption policy is permissible For encryption policy itself, it is also possible to for being used for determining the identification information of encryption policy, such as the numbering etc. of encryption policy.If used Identification information determines encryption policy, the data volume encryption policy to be less than of the information of its transmission itself, and due in transmission Holding is identification information, after lawless person gets this numbering, the encryption policy corresponding owing to cannot know this identification information, also The decryption policy of correspondence cannot be obtained, thus this ciphertext can not be cracked, it is ensured that the safety of information transmission.
Wherein, encryption policy can include AES and/or encryption key, is used to refer to the information of manner of decryption.
Wherein, if ciphertext is made up of multistage continuation character, then the information that controls includes multiple control entries, each control The corresponding one section of continuation character of entry processed, the original position of each control entries and end position information are in order to identify this section of consecutive word Accord with at the communication original position of text and end position, encryption policy in order to this section of continuation character of labelling in the encryption of communication text Strategy.
Wherein, the encryption policy that all of continuation character is corresponding can be identical, it is also possible to multistage continuation character uses multiple Encryption policy, wherein, if the encryption policy that multistage continuation character is used has at least two.Use identical relative to the former Encryption policy, the encryption policy that the latter uses is different, reduces the probability cracked, improves the safety of information.
Such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, and wherein X and Y is ciphertext.Ciphertext X and The encryption policy of Y can be identical, it is also possible to different.
Step 202, terminal demonstration communication text;
Concrete, terminal demonstration communication text, such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, Wherein X and Y is cipher-text information.
Step 203, terminal, after receiving decoding request, inquire about the decryption policy of described ciphertext to deciphering device;
Wherein, terminal can be connected by the Peripheral Interface of terminal, such as USB interface etc. with deciphering device, it is also possible to passes through Wirelessly or non-wirelessly mode is connected, such as bluetooth, NFC interface, infrared etc..
Optionally, the first signed data that coded data packet obtains after also including communication text is carried out signature process;
Also include before the step of terminal demonstration communication text:
Terminal sends the first signed data to deciphering device;
After detecting that deciphering device utilizes the first signed data to pass through the signature sign test of communication text, display communication is just Literary composition.
By communication text being carried out sign test before deciphering, it is achieved the authentication to the recipient of communication text, it is to avoid Other deciphering devices with identical decryption policy parse this communication text, improve the safety of information.
Decryption policy is sent to terminal by step 204, deciphering device;
Wherein this decryption policy can be that the sender with the text that communicates consults in advance, certainly, and encryption and decryption strategy bag Include algorithm and key, wherein one of them is consulted in advance.When communicating every time, do not consult being carried by control information Good part is held consultation.
Concrete, described control information also include described in the encryption policy of at least a section and/or the instruction letter of encryption policy Breath, the instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device 's;Described deciphering device obtains the decryption policy that described ciphertext is corresponding, including: described deciphering device utilizes described deciphering device Private key deciphers described instruction information, obtains encryption policy;Described deciphering device obtains the decryption policy that described encryption policy is corresponding, Thus ensure the safety of encryption policy.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include: Described deciphering device carries out sign test to described second signed data;If sign test is passed through, then obtain the deciphering that described ciphertext is corresponding Strategy.
After signed data, it is achieved the further protection to encryption policy, improve the safety of signed data further.
Step 205, terminal receiving and deciphering strategy;
Step 206, terminal obtain ciphertext;
Wherein, the step of terminal acquisition ciphertext includes:
Terminal, according to the ciphertext identification information of ciphertext in control information, determines the ciphertext of communication text;Or
The ciphertext of the communication text that terminal receiving and deciphering device determines according to the ciphertext identification information of ciphertext in control information.
Step 207, terminal utilize decryption policy that ciphertext is decrypted process, obtain character information;
Wherein, it is preferred that control information also includes time control information;This step includes:
Step C1, deciphering device obtain time control information;
Such as, time control information is 9:00~12:00 on March 12nd, 2013.
Step C2, deciphering device read the clock information of deciphering device;
Such as, clock information is 10:45 on March 12nd, 2013.
Clock information is compared by step C3, deciphering device with time control information;
Specifically, it is judged that whether this temporal information is in the range of this time control information record, if in this scope In, then it represents that comparison is passed through, it is allowed to ciphertext is decrypted operation;Otherwise, comparison is not passed through, and flow process terminates.
If the comparison of step C4 is passed through, then terminal utilizes decryption policy that the ciphertext obtained is decrypted process, obtains word Symbol information.
As seen from the above, before being decrypted operation, utilize the time control information decryption time to communication text Being controlled, the recipient reaching control communication text gets the purpose of communication text in the range of special time, effectively controls The purpose of the reading time of system communication text.
Wherein, the clock information of the deciphering device of the present invention can configure in the way of using ciphertext, tries when there being external equipment When figure reads the clock information of deciphering device, without corresponding key, the most i.e. enable and read clock information, can not be light Easily it is distorted, thus the leakage of information preventing the clock information deciphering device to be tampered and causing, it is ensured that the peace of communication Entirely.
Step 208, terminal output character information.
It addition, the clock information of the deciphering device of the present invention can configure in the way of using ciphertext, try when there being external equipment When figure reads the clock information of deciphering device, without corresponding key, the most i.e. enable and read clock information, can not be light Easily it is distorted, thus the leakage of information preventing the clock information deciphering device to be tampered and causing, it is ensured that the peace of communication Entirely.
The technical scheme that the embodiment of the present invention 2 provides, after the communication text of fetching portion encryption, only in communication text Partial content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations.
Embodiment 3
The schematic flow sheet of the information processing method embodiment that Fig. 3 provides for the embodiment of the present invention 3.Method shown in Fig. 3 is real Execute example to include:
Step 301, terminal obtain coded data packet, and coded data packet includes the text control letter with the text that communicates that communicates Breath, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the ciphertext identification information of ciphertext;
Concrete, communication text includes two parts, and a portion is in plain text, another part ciphertext, wherein this ciphertext Can obtain after one section of continuous print character encryption in communication text, it is also possible to be to multistage continuous print word in communication text Obtain after symbol encryption.
Wherein, described ciphertext identification information is for determining that information that ciphertext comprised, can in the position of communication text To be start position information and end position information, it is also possible to be some differences and the form of expression in plain text, tilt such as font or The representation that font increases the weight of, it is also possible to be that the mode increasing wave, double horizontal line or dotted line below ciphertext represents.
Wherein, the encryption policy of described ciphertext can consult in advance, it is not necessary to notifies.
Optionally, described control information also includes that the instruction information for indicating encryption policy and/or encryption policy is permissible For encryption policy itself, it is also possible to for being used for determining the identification information of encryption policy, such as the numbering etc. of encryption policy.If used Identification information determines encryption policy, the data volume encryption policy to be less than of the information of its transmission itself, and due in transmission Holding is identification information, after lawless person gets this numbering, the encryption policy corresponding owing to cannot know this identification information, also The decryption policy of correspondence cannot be obtained, thus this ciphertext can not be cracked, it is ensured that the safety of information transmission.
Wherein, encryption policy can include AES and/or encryption key, is used to refer to the information of manner of decryption.
Wherein, if ciphertext is made up of multistage continuation character, then the information that controls includes multiple control entries, each control The corresponding one section of continuation character of entry processed, the original position of each control entries and end position information are in order to identify this section of consecutive word Accord with at the communication original position of text and end position, encryption policy in order to this section of continuation character of labelling in the encryption of communication text Strategy.
Wherein, the encryption policy that all of continuation character is corresponding can be identical, it is also possible to multistage continuation character uses multiple Encryption policy, wherein, if the encryption policy that multistage continuation character is used has at least two.Use identical relative to the former Encryption policy, the encryption policy that the latter uses is different, reduces the probability cracked, improves the safety of information.
Such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, and wherein X and Y is ciphertext.Ciphertext X and The encryption policy of Y can be identical, it is also possible to different.
Step 302, terminal demonstration communication text;
Concrete, terminal demonstration communication text, such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, Wherein X and Y is cipher-text information.
Step 303, terminal, after receiving decoding request, identify letter according to the ciphertext of ciphertext described in described control information Breath determines the ciphertext of described communication text;
Such as, communication body matter is account X, and the sign test code paying 50 yuan is Y, and wherein X and Y is ciphertext.According to control Start position information in information processed and end position information, determine that the content of ciphertext is X and Y.
Optionally, the first signed data that coded data packet obtains after also including communication text is carried out signature process;
Also include before the step of terminal demonstration communication text:
Terminal sends the first signed data to deciphering device;
After detecting that deciphering device utilizes the first signed data to pass through the signature sign test of communication text, display communication is just Literary composition.
By communication text being carried out sign test before deciphering, it is achieved the authentication to the recipient of communication text, it is to avoid Other deciphering devices with identical decryption policy parse this communication text, improve the safety of information.
The ciphertext of described communication text is sent to described deciphering device by step 304, terminal.
Wherein, terminal can be connected by the Peripheral Interface of terminal, such as USB interface etc. with deciphering device, it is also possible to passes through Wirelessly or non-wirelessly mode is connected, such as bluetooth, NFC interface, infrared etc..
Step 305, deciphering device obtain the decryption policy that ciphertext is corresponding;
Wherein this decryption policy can be that the sender with the text that communicates consults in advance, certainly, and encryption and decryption strategy bag Include algorithm and key, wherein one of them is consulted in advance.When communicating every time, do not consult being carried by control information Good part is held consultation.
Concrete, described control information also include described in the encryption policy of at least a section and/or the instruction letter of encryption policy Breath, the instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device 's;Described deciphering device obtains the decryption policy that described ciphertext is corresponding, including: described deciphering device utilizes described deciphering device Private key deciphers described instruction information, obtains encryption policy;Described deciphering device obtains the decryption policy that described encryption policy is corresponding, Thus ensure the safety of encryption policy.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include: Described deciphering device carries out sign test to described second signed data;If sign test is passed through, then obtain the deciphering that described ciphertext is corresponding Strategy.
After signed data, it is achieved the further protection to encryption policy, improve the safety of signed data further.
Step 306, deciphering device utilize decryption policy that ciphertext is decrypted process, obtain character information;
Wherein, it is preferred that control information also includes time control information;This step includes:
Step C1, deciphering device obtain time control information;
Such as, time control information is 9:00~13:00 on March 13rd, 3013.
Step C3, deciphering device read the clock information of deciphering device;
Such as, clock information is 10:45 on March 13rd, 3013.
Clock information is compared by step C3, deciphering device with time control information;
Specifically, it is judged that whether this temporal information is in the range of this time control information record, if in this scope In, then it represents that comparison is passed through, it is allowed to ciphertext is decrypted operation;Otherwise, comparison is not passed through, and flow process terminates.
If the comparison of step C4 is passed through, then deciphering device utilizes decryption policy that the ciphertext obtained is decrypted process, To character information.
As seen from the above, before being decrypted operation, utilize the time control information decryption time to communication text Being controlled, the recipient reaching control communication text gets the purpose of communication text in the range of special time, effectively controls The purpose of the reading time of system communication text.
Wherein, the clock information of the deciphering device of the present invention can configure in the way of using ciphertext, tries when there being external equipment When figure reads the clock information of deciphering device, without corresponding key, the most i.e. enable and read clock information, can not be light Easily it is distorted, thus the leakage of information preventing the clock information deciphering device to be tampered and causing, it is ensured that the peace of communication Entirely.
Step 309, deciphering device trigger the operation of output character information.
Wherein, described deciphering device exports described character information;Or described character information is sent by described deciphering device To terminal, character information described in described terminal demonstration.
It addition, the clock information of the deciphering device of the present invention can configure in the way of using ciphertext, try when there being external equipment When figure reads the clock information of deciphering device, without corresponding key, the most i.e. enable and read clock information, can not be light Easily it is distorted, thus the leakage of information preventing the clock information deciphering device to be tampered and causing, it is ensured that the peace of communication Entirely.
The technical scheme that the embodiment of the present invention 3 provides, after the communication text of fetching portion encryption, only in communication text Partial content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations.
Embodiment 4
The schematic flow sheet of the information processing method embodiment that Fig. 4 provides for the embodiment of the present invention 4.Method shown in Fig. 4 is real Execute example to include:
Step 401, terminal obtain communication text and to the CIPHERING REQUEST of Partial encryption in communication text;
Such as, communication text is that " account 124456789, the sign test code paying 50 yuan is 000.", wherein CIPHERING REQUEST is " 124456789 " and " 000 " are encrypted.
Communication text and CIPHERING REQUEST are sent to encryption device by step 402, terminal;
Wherein, terminal can be connected by the Peripheral Interface of terminal, such as USB interface etc. with encryption device, it is also possible to passes through Wirelessly or non-wirelessly mode is connected, such as bluetooth, NFC interface, infrared etc..
Step 403, encryption device after receiving CIPHERING REQUEST, according to CIPHERING REQUEST determine character information to be encrypted, And character information to be encrypted communication text in start position information and end position information;
In this example, the character information of acquisition is " 124456789 " and " 000 ", and above-mentioned character information is in communication just The start position information of literary composition and end position information.
Step 404, encryption device, according to the encryption policy pre-set, are encrypted place to character information to be encrypted Reason, obtains at least one ciphertext of communication text;
In this example, character information is two sections, is respectively " 124456789 " and " 000 ", and the mode wherein encrypted can be Identical, it is also possible to it is different.Using multiple encryption policy in a communication text, what the information that can reduce was cracked can Can, improve the safety of information.
The encryption plan that step 405, encryption device are used with ending message and the text that communicates according to start position information Slightly generate the control information of ciphertext;
If it should be noted that character information is at least two sections, then the information that controls includes multiple control entries, each control The corresponding one section of continuation character of entry processed, the original position of each control entries and end position information are in order to identify this section of consecutive word Accord with at the communication original position of text and end position, permissible for the instruction information indicating encryption policy and/or encryption policy For encryption policy itself, it is also possible to for being used for determining the identification information of encryption policy, such as the numbering etc. of encryption policy.If used Identification information determines encryption policy, the data volume encryption policy to be less than of the information of its transmission itself, and due in transmission Holding is identification information, after lawless person gets this numbering, the encryption policy corresponding owing to cannot know this identification information, also The decryption policy of correspondence cannot be obtained, thus this ciphertext can not be cracked, it is ensured that the safety of information transmission.
Wherein, encryption policy can include AES and/or encryption key, is used to refer to the information of manner of decryption.
Optionally, control information also includes time control information, right in order to determine whether according to time control information Ciphertext is decrypted operation.
Ciphertext and control information are sent to terminal by step 406, encryption device;
Step 407, terminal send coded data packet, coded data packet includes: communication text in unencryption process plaintext, At least one ciphertext and the information of control.
Wherein optional, described control information also include described in the encryption policy of at least a section and/or the finger of encryption policy Show information, after the instruction information of wherein said encryption policy and/or encryption policy is the private key encryption by deciphering device Obtain;
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;
Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include:
Described deciphering device carries out sign test to described second signed data;
If sign test is passed through, then obtain the decryption policy that described ciphertext is corresponding.
The technical scheme that the embodiment of the present invention 4 provides, chooses information to be encrypted in communication text by obtaining, it is achieved The encryption of only high to safety information, it is achieved the Partial encryption to communication text, thus decrease the quantity of encrypted object, fall The low processing pressure of cryptographic operation, for the equipment that disposal ability is limited, as especially suitable in electronic signature token etc..
A kind of structural representation deciphering device embodiment that Fig. 5 provides for the present invention.Fig. 5 shown device embodiment bag Include:
First acquisition module 501, is used for obtaining coded data packet, and coded data packet includes communicate text and the text that communicates Control information, wherein communication text includes in plain text and at least one section of ciphertext, and wherein said control information includes the close of described ciphertext Literary composition identification information;
Determine module 502, be connected with the first acquisition module 501, for according to the ciphertext mark letter of ciphertext in control information Breath, determines the ciphertext of communication text;
Second acquisition module 503, is connected with the first acquisition module, for obtaining the decryption policy that described ciphertext is corresponding;
Deciphering module 504, and determines that module 502 and the second acquisition module 503 are connected, and is used for utilizing decryption policy to obtaining Ciphertext be decrypted process, obtain character information;
Trigger module 505, is connected with deciphering module 505, for triggering the operation of output character information.
Wherein, trigger module 505 includes:
Output unit, for output character information;Or
Transmitting element, sends to terminal for character information, by terminal demonstration character information.
Wherein, control information also includes time control information;
Deciphering module 505 includes:
Acquiring unit, is used for obtaining time control information;
Read unit, for reading the clock information of deciphering device;
Comparing unit, is connected with acquiring unit and reading unit, for being compared with time control information by clock information Right;
Decryption unit, is connected with comparing unit, for when comparison is passed through, utilizes the decryption policy ciphertext to obtaining to carry out Decryption processing, obtains character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;
Deciphering device also includes:
First sign test module, is connected with deciphering module, for the first signed data is carried out sign test, and passes through in sign test, Trigger deciphering module and be decrypted process.
Wherein, described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, The instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, Obtain the decryption policy that described encryption policy is corresponding again.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers described in obtaining The operation of the decryption policy that ciphertext is corresponding.
The present invention provide device technique scheme, fetching portion encryption communication text after, only to communication text in the middle part of Point content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations, limited for disposal ability Equipment, as especially suitable in electronic signature token etc..
The structural representation of a kind of information processing system embodiment that Fig. 6 provides for the present invention.System shown in Figure 5 embodiment Including terminal and deciphering device, wherein:
The first acquisition module 601 in terminal, is used for obtaining coded data packet, and coded data packet includes communicating text with logical The control information of letter text, wherein communication text includes in plain text and at least one section of ciphertext, and the information that wherein controls includes the close of ciphertext Literary composition identification information;
Display module 602 in terminal, is connected with the first acquisition module 601, for display communication text;
Enquiry module 603 in terminal, is connected with display module 602, for after receiving decoding request, to described solution Close device inquires about the decryption policy that described ciphertext is corresponding;
The second acquisition module 604 in deciphering device, is connected with enquiry module 603, for obtaining the deciphering that ciphertext is corresponding Strategy;
Sending module 605 in deciphering device, is connected with the second acquisition module 604, for sending decryption policy to end End;
Receiver module 606 in terminal, is connected with sending module 606, for receiving and deciphering strategy;
The 3rd acquisition module 607 in terminal, is used for obtaining ciphertext;
Deciphering module 608 in terminal, is connected with receiver module 606 and the 3rd acquisition module 607, is used for utilizing deciphering plan Slightly ciphertext is decrypted process, obtains character information;
Output module 609 in terminal, is connected with deciphering module 608, for output character information.
Wherein, the 3rd acquisition module 607 includes:
Determine unit, for according to the start position information of ciphertext in control information and end position information, determining communication The ciphertext of text;Or
Receive unit, for receiving and deciphering device according to the start position information of ciphertext in control information and stop bits confidence The ciphertext of the communication text that breath determines.
Wherein, control information also includes time control information;
Deciphering module 608 includes:
Acquiring unit, is used for obtaining time control information;
Read unit, for reading the clock information of deciphering device;
Comparing unit, is connected with acquiring unit and reading unit, for being compared with time control information by clock information Right;
Decryption unit, is connected with comparing unit, for when comparison is passed through, utilizes the decryption policy ciphertext to obtaining to carry out Decryption processing, obtains character information.
Wherein, the first signed data that coded data packet obtains after also including communication text is carried out signature process;
Display module 602 includes:
Transmitting element, for sending the first signed data to deciphering device;
Display unit, for detecting that deciphering device utilizes the first signed data to pass through the signature sign test of communication text After, display communication text;
Deciphering device also includes:
First sign test module, is connected with transmitting element, for utilizing the first signed data to carry out the signature of communication text Sign test, obtains sign test result;
3rd transmitting element, is connected with the first sign test module and display unit, is used for sending sign test result.
Wherein, described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, The instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, Obtain the decryption policy that described encryption policy is corresponding again.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers described in obtaining The operation of the decryption policy that ciphertext is corresponding.
The present invention provide information processing system, fetching portion encryption communication text after, only to communication text in the middle part of Point content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations.
The structural representation of the information processing system embodiment that Fig. 7 provides for the present invention.System shown in Figure 7 embodiment includes Terminal and deciphering device, wherein:
The first acquisition module 701 in described terminal, is used for obtaining coded data packet, and described coded data packet includes communication The control information of text and the described text that communicates, wherein said communication text includes in plain text and at least one section of ciphertext, wherein said Control information includes the ciphertext identification information of described ciphertext;
Display module 702 in described terminal, is connected with described first acquisition module 701, is used for just showing described communication Literary composition;
Really cover half block 703 in described terminal, is connected with described display module 702, for after receiving decoding request, Ciphertext identification information according to ciphertext described in described control information determines the ciphertext of described communication text;
With described, sending module 704 in described terminal, determines that module 703 and described first acquisition module 701 are connected, use In the ciphertext of described communication text is sent to described deciphering device;
The second acquisition module 705 in described deciphering device, is connected with described sending module 704, is used for obtaining described close The decryption policy that literary composition is corresponding;
Deciphering module 706 in described deciphering device, with described sending module 704 and described second acquisition module 705 phase Even, for utilizing described decryption policy that the described ciphertext obtained is decrypted process, character information is obtained;
Trigger module 707 in described deciphering device, is connected with described deciphering module, is used for triggering output described character letter The operation of breath.
Wherein, described trigger module 707 includes:
Output unit, is used for exporting described character information;Or
Transmitting element, sends to terminal for described character information, by character information described in described terminal demonstration.
Wherein, described control information also includes time control information;
Described deciphering module 706 includes:
Acquiring unit, is used for obtaining described time control information;
Read unit, for reading the clock information of described deciphering device;
Comparing unit, is connected with described acquiring unit and described reading unit, for by described clock information with described time Between control information compare;
Decryption unit, is connected with described comparing unit, for when comparison is passed through, utilizes described decryption policy to obtaining Described ciphertext is decrypted process, obtains character information.
Wherein, the first signed data that described coded data packet obtains after also including communication text is carried out signature process;
Described deciphering device also includes:
First sign test module, is connected with described deciphering module, for described first signed data is carried out sign test, and is testing Label pass through, and trigger deciphering module and are decrypted process.
Wherein, described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, The instruction information of wherein said encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, Obtain the decryption policy that described encryption policy is corresponding again.
Wherein, described control information also includes the instruction letter of the encryption policy to described at least a section and/or encryption policy The second signed data after breath signature process;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers described in obtaining The operation of the decryption policy that ciphertext is corresponding.
The present invention provide information processing system, fetching portion encryption communication text after, only to communication text in the middle part of Point content is decrypted, and decreases the quantity of deciphering object, reduces the processing pressure of decryption oprerations.
The structural representation of a kind of encryption device embodiment that Fig. 8 provides for the present invention.Embodiment illustrated in fig. 8 includes:
Acquisition module 801, for obtaining communication text and to the CIPHERING REQUEST of Partial encryption in communication text;
Determine module 802, be connected with acquisition module 801, for according to CIPHERING REQUEST determine character information to be encrypted, with And the ciphertext identification information that character information to be encrypted is in communication text;
Encrypting module 803, is connected with acquisition module 801, for according to the encryption policy pre-set, to word to be encrypted Symbol information is encrypted, and obtains at least one section of ciphertext of communication text;
First generation module 804, and determines that module 802 and encrypting module 803 are connected, for raw according to ciphertext identification information Become the control information of ciphertext;
Output module 805, is connected with encrypting module 803 and the first generation module 804, close at least exporting at least one section Literary composition and the information of control.
Wherein, control information also includes time control information.
Wherein, encryption device also includes:
Signature blocks, for signing to communication message;
Second generation module, is connected with signature blocks and output module, for described communication message is carried out signature process, Obtain the first signed data;
Wherein, the coded data packet of output module output also includes the first signed data.
The encryption device of the embodiment of the present invention, chooses information to be encrypted in communication text by obtaining, it is achieved the most right The encryption of the information that safety is high, it is achieved the Partial encryption to communication text, thus decrease the quantity of encrypted object, reduce The processing pressure of cryptographic operation, for the equipment that disposal ability is limited, as especially suitable in electronic signature token etc..
In flow chart or at this, any process described otherwise above or method description are construed as, and expression includes One or more is for realizing the module of code, fragment or the portion of the executable instruction of the step of specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not by shown or discuss suitable Sequence, including according to involved function by basic mode simultaneously or in the opposite order, performs function, and this should be by the present invention Embodiment person of ordinary skill in the field understood.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method in memory and can be performed by suitable instruction execution system with storage Or firmware realizes.Such as, if realized with hardware, with the most the same, available well known in the art under Any one or their combination in row technology realize: have the logic gates for data signal realizes logic function Discrete logic, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), on-the-spot Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that and realize all or part of step that above-described embodiment method is carried Suddenly the program that can be by completes to instruct relevant hardware, program can be stored in a kind of computer-readable recording medium In, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated mould Block both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.If integrated module with The form of software function module realizes and as independent production marketing or when using, it is also possible to be stored in a computer-readable Take in storage medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " specifically show Example " or the description of " some examples " etc. means to combine this embodiment or example describes specific features, structure, material or spy Point is contained at least one embodiment or the example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is example Property, it is impossible to be interpreted as limitation of the present invention, those of ordinary skill in the art is without departing from the principle of the present invention and objective In the case of above-described embodiment can be changed within the scope of the invention, revise, replace and modification.The scope of the present invention Limited by claims and equivalent thereof.

Claims (21)

1. an information processing method, it is characterised in that including:
Deciphering device obtains coded data packet, and described coded data packet includes the text control letter with the described text that communicates that communicates Breath, wherein said communication text includes in plain text and at least one section of ciphertext, and wherein said control information includes the ciphertext of described ciphertext Identification information and time control information;
Described deciphering device, according to the ciphertext identification information of ciphertext described in described control information, determines the close of described communication text Literary composition;
Described deciphering device obtains the decryption policy that described ciphertext is corresponding;
Described deciphering device obtains described time control information;
Described deciphering device reads the clock information of described deciphering device;
Described clock information is compared by described deciphering device with described time control information, if comparison is passed through, and described solution Close device utilizes described decryption policy that the described ciphertext obtained is decrypted process, obtains character information;
Described deciphering device triggers the operation exporting described character information.
2. an information processing method, it is characterised in that including:
Terminal obtains coded data packet, and described coded data packet includes the text control information with the described text that communicates that communicates, its Described in the text that communicates include in plain text and at least one section of ciphertext, wherein said control information includes the ciphertext mark letter of described ciphertext Breath and time control information;
Communicate described in described terminal demonstration text;
Described terminal, after receiving decoding request, identifies according to the ciphertext of ciphertext described in described control information and determines described leading to The ciphertext of letter text, inquires about, to described deciphering device, the decryption policy that described ciphertext is corresponding;
Described deciphering device obtains the decryption policy that described ciphertext is corresponding;
Described decryption policy is sent to described terminal by described deciphering device;
Described terminal receives described decryption policy;
Described terminal obtains described ciphertext;
Described deciphering device obtains described time control information;
Described deciphering device reads the clock information of described deciphering device;
Described clock information is compared by described deciphering device with described time control information, if comparison is passed through, and described end End utilizes described decryption policy that described ciphertext is decrypted process, obtains character information;
Described terminal exports described character information.
3. an information processing method, it is characterised in that including:
Terminal obtains coded data packet, and described coded data packet includes the text control information with the described text that communicates that communicates, its Described in the text that communicates include in plain text and at least one section of ciphertext, wherein said control information include described ciphertext ciphertext mark and Time control information;
Communicate described in described terminal demonstration text;
Described terminal, after receiving decoding request, identifies according to the ciphertext of ciphertext described in described control information and determines described leading to The ciphertext of letter text;
The ciphertext of described communication text is sent to described deciphering device by described terminal;
Described deciphering device obtains the decryption policy that described ciphertext is corresponding;
Described deciphering device obtains described time control information;
Described deciphering device reads the clock information of described deciphering device;
Described clock information is compared by described deciphering device with described time control information;
If comparison is passed through, described deciphering device utilizes described decryption policy that the described ciphertext obtained is decrypted process, To character information;
Described deciphering device triggers the operation exporting described character information.
4. according to the method described in any one of claims 1 to 3, it is characterised in that
The first signed data that described coded data packet obtains after also including communication text is carried out signature process;
Described deciphering device utilizes described decryption policy that the described ciphertext obtained is decrypted process, obtains the step of character information Also include before rapid:
Deciphering device carries out sign test to described first signed data;
If sign test is passed through, then trigger and utilize described decryption policy that the described ciphertext obtained is decrypted process, obtain character The step of information.
5. the information processing method as described in any one of claims 1 to 3, it is characterised in that
Described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, wherein said The instruction information of encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Described deciphering device obtains the decryption policy that described ciphertext is corresponding, including:
Described deciphering device utilizes the private key of described deciphering device to decipher described instruction information, obtains encryption policy;
Described deciphering device obtains the decryption policy that described encryption policy is corresponding.
6. information processing method as claimed in claim 4, it is characterised in that
Described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, wherein said The instruction information of encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Described deciphering device obtains the decryption policy that described ciphertext is corresponding, including:
Described deciphering device utilizes the private key of described deciphering device to decipher described instruction information, obtains encryption policy;
Described deciphering device obtains the decryption policy that described encryption policy is corresponding.
Method the most according to claim 5, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include:
Described deciphering device carries out sign test to described second signed data;
If sign test is passed through, then obtain the decryption policy that described ciphertext is corresponding.
Method the most according to claim 6, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Before described deciphering device obtains the decryption policy that described ciphertext is corresponding, also include:
Described deciphering device carries out sign test to described second signed data;
If sign test is passed through, then obtain the decryption policy that described ciphertext is corresponding.
9. a deciphering device, it is characterised in that including:
First acquisition module, is used for obtaining coded data packet, and described coded data packet includes communicate text and the described text that communicates Control information, wherein said communication text includes in plain text and at least one section of ciphertext, and wherein said control information includes described close The ciphertext identification information of literary composition and time control information;
Determine module, be connected with described first acquisition module, identify for the ciphertext according to ciphertext described in described control information Information, determines the ciphertext of described communication text;
Second acquisition module, is connected with described first acquisition module, for obtaining the decryption policy that described ciphertext is corresponding;
With described, deciphering module, determines that module and the second acquisition module are connected, be used for obtaining described time control information, reads institute State the clock information of deciphering device, described clock information is compared with described time control information, when comparison is passed through, profit By described decryption policy, the ciphertext obtained is decrypted process, obtains character information;
Trigger module, is connected with described deciphering module, for triggering the operation exporting described character information.
Device the most according to claim 9, it is characterised in that
The first signed data that described coded data packet obtains after also including communication text is carried out signature process;
Described deciphering device also includes:
First sign test module, is connected with described deciphering module, for described first signed data carries out sign test, and leads in sign test Cross, trigger deciphering module and be decrypted process.
11. devices as described in claim 9 or 10, it is characterised in that
Described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, wherein said The instruction information of encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, then obtains Take the decryption policy that described encryption policy is corresponding.
12. according to the arbitrary described device of claim 9 to 10, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers and obtains described ciphertext The operation of corresponding decryption policy.
13. devices according to claim 11, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers and obtains described ciphertext The operation of corresponding decryption policy.
14. 1 kinds of information processing systems, it is characterised in that include terminal and deciphering device, wherein:
The first acquisition module in described terminal, is used for obtaining coded data packet, described coded data packet include communicate text and The control information of described communication text, wherein said communication text includes in plain text and at least one section of ciphertext, and wherein said control is believed Breath includes the ciphertext identification information of described ciphertext and controls letter for determining whether to be decrypted ciphertext the time of operation Breath;
Display module in described terminal, is connected with described first acquisition module, is used for showing described communication text;
Enquiry module in described terminal, is connected with described display module, for after receiving decoding request, to described deciphering Device inquires about the decryption policy that described ciphertext is corresponding;
The second acquisition module in described deciphering device, is connected with described enquiry module, for obtaining the solution that described ciphertext is corresponding Close strategy;
Sending module in described deciphering device, is connected with described second acquisition module, for described decryption policy being sent extremely Described terminal;
Receiver module in described terminal, is connected with described sending module, is used for receiving described decryption policy;
The 3rd acquisition module in described terminal, is used for obtaining described ciphertext;Deciphering module in described terminal, with described reception Module is connected with the 3rd acquisition module, is used for obtaining described time control information, reads the clock information of described deciphering module;Will Described clock information is compared with described time control information, if comparison is by utilizing described decryption policy to described ciphertext It is decrypted process, obtains character information;
Output module in described terminal, is connected with described deciphering module, is used for exporting described character information.
15. 1 kinds of information processing systems, it is characterised in that include terminal and deciphering device, wherein:
The first acquisition module in described terminal, is used for obtaining coded data packet, described coded data packet include communicate text and The control information of described communication text, wherein said communication text includes in plain text and at least one section of ciphertext, and wherein said control is believed Breath includes the ciphertext identification information of described ciphertext and controls letter for determining whether to be decrypted ciphertext the time of operation Breath;
Display module in described terminal, is connected with described first acquisition module, is used for showing described communication text;
Really cover half block in described terminal, is connected with described display module, for after receiving decoding request, according to described control The ciphertext identification information of ciphertext described in information processed determines the ciphertext of described communication text;
With described, sending module in described terminal, determines that module and described first acquisition module are connected, for by described communication The ciphertext of text is sent to described deciphering device;
The second acquisition module in described deciphering device, is connected with described sending module, for obtaining the solution that described ciphertext is corresponding Close strategy;
Deciphering module in described deciphering device, is connected with described sending module and described second acquisition module, is used for obtaining institute State time control information, read the clock information of described deciphering device;Described clock information is entered with described time control information Row comparison, if comparison is by utilizing described decryption policy that the described ciphertext obtained is decrypted process, obtains character information.
16. according to the system described in claims 14 or 15, it is characterised in that
The first signed data that described coded data packet obtains after also including communication text is carried out signature process;
Described deciphering device also includes:
First sign test module, is connected with described deciphering module, for described first signed data carries out sign test, and leads in sign test Cross, trigger deciphering module and be decrypted process.
17. systems as described in claims 14 or 15, it is characterised in that
Described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, wherein said The instruction information of encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, then obtains Take the decryption policy that described encryption policy is corresponding.
18. systems as claimed in claim 16, it is characterised in that
Described control information also include described in the encryption policy of at least a section and/or the instruction information of encryption policy, wherein said The instruction information of encryption policy and/or encryption policy is by obtaining after deciphering the private key encryption of device;
Second acquisition module, for utilizing the private key of described deciphering device to decipher described instruction information, obtains encryption policy, then obtains Take the decryption policy that described encryption policy is corresponding.
19. according to the system described in claim 14,15 or 18, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers and obtains described ciphertext The operation of corresponding decryption policy.
20. systems according to claim 16, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers and obtains described ciphertext The operation of corresponding decryption policy.
21. systems according to claim 17, it is characterised in that
Described control information also includes that the instruction Information Signature of the encryption policy to described at least a section and/or encryption policy processes After the second signed data;
Described deciphering device also includes:
Second authentication module, for described second signed data is carried out sign test, and passes through in sign test, triggers and obtains described ciphertext The operation of corresponding decryption policy.
CN201310150540.3A 2013-04-26 2013-04-26 A kind of ciphering and deciphering device and information processing method and system Active CN103281299B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310150540.3A CN103281299B (en) 2013-04-26 2013-04-26 A kind of ciphering and deciphering device and information processing method and system
PCT/CN2014/075933 WO2014173288A1 (en) 2013-04-26 2014-04-22 Encryption/decryption device and information processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310150540.3A CN103281299B (en) 2013-04-26 2013-04-26 A kind of ciphering and deciphering device and information processing method and system

Publications (2)

Publication Number Publication Date
CN103281299A CN103281299A (en) 2013-09-04
CN103281299B true CN103281299B (en) 2016-12-28

Family

ID=49063746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310150540.3A Active CN103281299B (en) 2013-04-26 2013-04-26 A kind of ciphering and deciphering device and information processing method and system

Country Status (2)

Country Link
CN (1) CN103281299B (en)
WO (1) WO2014173288A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281299B (en) * 2013-04-26 2016-12-28 天地融科技股份有限公司 A kind of ciphering and deciphering device and information processing method and system
CN106161762A (en) * 2015-04-24 2016-11-23 神讯电脑(昆山)有限公司 The decryption method of video data
WO2017143611A1 (en) * 2016-02-27 2017-08-31 华为技术有限公司 Method, device and system for processing vxlan packet
CN107248951B (en) * 2017-08-10 2018-12-04 北京明朝万达科技股份有限公司 A kind of post-processing system, method and device
CN108055127A (en) * 2017-12-14 2018-05-18 吉旗(成都)科技有限公司 It calculates and supports heat update Encryption Algorithm and key data encryption method with data separating
CN110601814B (en) * 2019-09-24 2021-08-27 深圳前海微众银行股份有限公司 Federal learning data encryption method, device, equipment and readable storage medium
CN112888024B (en) * 2019-11-29 2023-03-21 腾讯科技(深圳)有限公司 Data processing method, data processing device, storage medium and electronic equipment
CN111212068B (en) * 2019-12-31 2022-02-08 北京升鑫网络科技有限公司 Method for encrypting and decrypting characters by input method
CN112153078B (en) * 2020-10-26 2021-07-27 广州欧赛斯信息科技有限公司 Encryption method and system based on time release

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
CN101997880A (en) * 2010-12-01 2011-03-30 湖南智源信息网络技术开发有限公司 Method and device for verifying security of network page or interface
CN102254127A (en) * 2011-08-11 2011-11-23 华为技术有限公司 Method, device and system for encrypting and decrypting files
CN102739406A (en) * 2012-07-17 2012-10-17 飞天诚信科技股份有限公司 Method for securely transmitting equipment information

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0325527D0 (en) * 2003-11-01 2003-12-03 Hewlett Packard Development Co Identifier-based signcryption
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
CN103281299B (en) * 2013-04-26 2016-12-28 天地融科技股份有限公司 A kind of ciphering and deciphering device and information processing method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
CN101997880A (en) * 2010-12-01 2011-03-30 湖南智源信息网络技术开发有限公司 Method and device for verifying security of network page or interface
CN102254127A (en) * 2011-08-11 2011-11-23 华为技术有限公司 Method, device and system for encrypting and decrypting files
CN102739406A (en) * 2012-07-17 2012-10-17 飞天诚信科技股份有限公司 Method for securely transmitting equipment information

Also Published As

Publication number Publication date
CN103281299A (en) 2013-09-04
WO2014173288A1 (en) 2014-10-30

Similar Documents

Publication Publication Date Title
CN103281299B (en) A kind of ciphering and deciphering device and information processing method and system
US20200372503A1 (en) Transaction messaging
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN101765996B (en) Device and method for remote authentication and transaction signatures
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN107733656A (en) A kind of cipher authentication method and device
CN104618115B (en) ID card information acquisition methods and system
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
CN101149768B (en) Special processor software encryption and decryption method
CN108306727A (en) For encrypting, decrypting and the method and apparatus of certification
CN103065168A (en) Anti-fake method and system of radio frequency identification
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN109635610A (en) The read-write system and method for RFID tag data
CN103326864A (en) Electronic tag anti-fake authentication method
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN103236929B (en) A kind of information processing method and deciphering device
CN102685121A (en) Digital signature method and digital signature device
US20110081016A1 (en) Secure data communication using elliptic curve cryptology
US10200348B2 (en) Method to detect an OTA (over the air) standard message affected by an error
CN106027256A (en) Identity card reading response system
CN104796266A (en) Authentication method, device and system
CN106022140A (en) Method and system for reading identity card
CN102026182A (en) Safety control method and system of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant