CN103646068A - Encryption method, decryption method, method for group messaging and corresponding devices thereof - Google Patents

Encryption method, decryption method, method for group messaging and corresponding devices thereof Download PDF

Info

Publication number
CN103646068A
CN103646068A CN201310648356.1A CN201310648356A CN103646068A CN 103646068 A CN103646068 A CN 103646068A CN 201310648356 A CN201310648356 A CN 201310648356A CN 103646068 A CN103646068 A CN 103646068A
Authority
CN
China
Prior art keywords
text message
character
binary sequence
converted
replacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310648356.1A
Other languages
Chinese (zh)
Other versions
CN103646068B (en
Inventor
张霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201310648356.1A priority Critical patent/CN103646068B/en
Publication of CN103646068A publication Critical patent/CN103646068A/en
Application granted granted Critical
Publication of CN103646068B publication Critical patent/CN103646068B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention belongs to the field of information safety, and provides an encryption method and a decryption method. The encryption method comprises the steps that a character matching library is built, and comprises a plurality of sets of uniquely matched first characters and second characters; a first text message and a second text messages are obtained; character positions are determined according to the second text information, the first characters at the corresponding character positions in the first text message are replaced with the second characters, and a third text message is formed so that the second text message can be restored from the third text message through a decryption client side. The identical character matching libraries are built on an encryption client side and the decryption client side, the first characters at the corresponding character positions in the first text message are replaced with the second characters according to the character positions determined after the second text message is transcoded through the encryption client side, the third text message is formed and sent to the decryption client side, and a customizing message is snugly sent under the condition of not influencing normal communication.

Description

The method of encryption method, decryption method, sending bulk message and corresponding intrument thereof
Technical field
The invention belongs to information security field, relate in particular to method and the corresponding intrument thereof of encryption method, decryption method, sending bulk message.
Background technology
Along with the fast development of internet, the information security issue while communicating by letter between user can not be ignored.For example, between relatives and friends, during by chat software transmission of information, some information can be open to all good friends, but for some sensitive informations, as bank card password etc., do not wish that all good friends see; User issues when comment on microblogging, only wishes that some comment allows specific user see, avoids comment to be forwarded in a large number and finally develops into rumour; While receiving and dispatching the note that comprises sensitive information, if directly transmit sensitive information, note is intercepted and captured rear sensitive information and is easily revealed.
Summary of the invention
The object of the present invention is to provide a kind of method of encryption method, decryption method and sending bulk message, be intended to realize when not affecting proper communication, sending snugly customizing messages.
The present invention is achieved in that a kind of encryption method, comprising:
Set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups;
Obtain the first text message and the second text message;
According to described the second text message, determine character position, described the first character with respective symbols position in the first text message described in described the second character replacement, form the 3rd text message, so that described deciphering client restores described the second text message from described the 3rd text message.
Another object of the present invention is to provide a kind of decryption method, comprising:
Set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, described character match storehouse is identical with the character match storehouse of encrypting client;
Obtain the 3rd text message, described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message;
In described the 3rd text message, search the first character and the second character, and the first character finding and the second character are counted;
According to count value corresponding to the second character finding, generate described the second text message.
Another object of the present invention is to provide a kind of encryption device, comprising:
First sets up unit, for setting up character match storehouse, and the first character and the second character that described character match storehouse comprises the unique coupling of many groups;
The first acquiring unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to described the second text message, described the first character with respective symbols position in the first text message described in described the second character replacement, form the 3rd text message, so that described deciphering client restores described the second text message from described the 3rd text message.
Another object of the present invention is to provide a kind of decryption device, comprising:
Second sets up subelement, for setting up character match storehouse, and the first character and the second character that described character match storehouse comprises the unique coupling of many groups, described character match storehouse is identical with the character match storehouse of encrypting client;
Second acquisition unit, for obtaining the 3rd text message, described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message;
Search and record cell, for searching the first character and the second character at described the 3rd text message, and the first character finding and the second character are counted;
Generation unit, for generating described the second text message according to count value corresponding to the second character finding.
A kind of method that another object of the present invention is to provide sending bulk message, comprising:
Receive the first text message and second text message of user's input;
According to described the first text message and the second text message, generate the 3rd text message;
Obtain secret mass-sending member and limiter stage group members that user arranges;
To secret mass-sending member and limiter stage group members, send described the 3rd text message;
For secret mass-sending member, comprise described the 3rd text message deciphering is restored to the second text message, for limiter stage group members, directly show described the 3rd text message.
The device that another object of the present invention is to provide a kind of sending bulk message, comprising:
Receiving element, for receiving the first text message and second text message of user's input; And
Encryption device as above, for generating the 3rd text message according to described the first text message and the second text message;
The 3rd acquiring unit, the secret mass-sending member and the limiter stage group members that for obtaining user, arrange;
Transmitting element, for sending described the 3rd text message to secret mass-sending member and limiter stage group members; And
Decryption device as above, restores the second text message for comprising for secret mass-sending member described the 3rd text message deciphering;
For limiter stage group members, directly show the 3rd text message.
In the present invention, encrypting client and deciphering client and set up identical character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, encrypt the client character position definite according to the second text message, the first character with respective symbols position in second character replacement the first text message, form the 3rd text message and the 3rd text message is sent to deciphering client, so that deciphering client in the 3rd text message by searching, record the character position of the first character and the second character, according to the character position of the second character, restore the second text message, user for non-deciphering client, only show the 3rd text message, realized and when not affecting proper communication, sent snugly customizing messages.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of a kind of encryption method of providing of the embodiment of the present invention;
Fig. 2 is the specific implementation process flow diagram of step S103 in Fig. 1;
Fig. 3 is the specific implementation process flow diagram of step S201 in Fig. 1;
Fig. 4 is the realization flow figure of a kind of decryption method of providing of the embodiment of the present invention;
Fig. 5 is the specific implementation process flow diagram of step S404 in Fig. 4;
Fig. 6 is the realization flow figure of the method for a kind of sending bulk message of providing of the embodiment of the present invention;
Fig. 7 is the structured flowchart of the device of the embodiment of the present invention a kind of encryption device, decryption device and the sending bulk message that provide.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
In embodiments of the present invention, encrypting client and deciphering client and set up identical character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, encrypt the client character position definite according to the second text message, the first character with respective symbols position in second character replacement the first text message, form the 3rd text message and the 3rd text message is sent to deciphering client, so that deciphering client in the 3rd text message by searching, record the character position of the first character and the second character, according to the character position of the second character, restore the second text message, user for non-deciphering client, only show the 3rd text message, realized and when not affecting proper communication, sent snugly customizing messages.
Fig. 1 shows the realization flow of a kind of encryption method that the embodiment of the present invention provides, and executive agent is for encrypting client, and details are as follows:
In step S101, set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups.
In embodiments of the present invention, encrypting client and deciphering client and set up identical character match storehouse, wherein comprise the first character and second characters of the unique coupling of many groups, character can be word, punctuation mark or its combination etc., and relevant semantically.The first character can be one to one or the mapping relations of one-to-many to the second character.As, the first character " is opened " corresponding with the second character " Zhang "; The first character "! " corresponding with the second character " O (∩ _ ∩) O " and " (^o^)/" etc.
In step S102, obtain the first text message and the second text message.
In embodiments of the present invention, obtain the first text message and second text message of user's input, urtext when the first text message is proper communication, the second text message is some sensitive informations, during communication, encrypt client the second Text information hiding is sent in the first text message, the take over party who has corresponding deciphering client could restore the second text message.
In step S103, according to described the second text message, determine character position, described the first character with respective symbols position in the first text message described in described the second character replacement, form the 3rd text message, so that described deciphering client restores described the second text message from described the 3rd text message.
In embodiments of the present invention, the character position definite according to the second text message, selectively with the first character in second character replacement the first text message, for example, in the first text message, there are a plurality of " opening ", the definite character position of the second text message is 5, and ciphering process replaces with " Zhang " by the 5th " opening " wherein, and remaining does not process.
As one embodiment of the present of invention, according to the character position that the second text message is definite, replace, as shown in Figure 2, S103 detailed process is as follows:
In S201, described the second text message is converted to numerical information.
The second text message is converted to numerical information, and as shown in Figure 3, S201 detailed process is as follows:
In S301, described the second text message is converted to binary sequence.
In embodiments of the present invention, whole the second text message, according to the transformation rule of character and binary number, is converted to the binary sequence as ASCII character.
In S302, described binary sequence is divided into N the binary sequence section that length is identical, N is more than or equal to 1 integer.
This binary sequence is divided into N the binary sequence section that length is identical, and the length of two-stage system tract and N can be used as configuration parameter and are inputted by user, and encrypt client and decipher client and must use identical configuration parameter.
In S303, each binary sequence section is converted to tens digit.
In embodiments of the present invention, each binary sequence section is converted to decimal number.Arrive this, the second text message has been converted to N tens digit.
In S202, in described the first text message, search the first character, and the number of the first character of arriving of record search.
In embodiments of the present invention, the number of the first described character is also the position ordinal number of the first character, since the first character of the first text message, searches and belongs to the first character in character match storehouse and record its character position, often find first character, counter adds 1; For non-the first character, counter is left intact, and the value of counter has represented the character position of the first character.
In S203, when the described number of statistics conforms to described numerical information, by the first character replacement of this character position, be the second corresponding character, form the 3rd text message.
In embodiments of the present invention, when the value of counter is when being equated by the converted tens digit of the second text message, the first character replacement that character position is equaled to described tens digit is the second corresponding character, and tens digit is first tens digit that above-mentioned steps obtains.Once, counter O reset starts to continue to search from the character position of replacing backward in every replacement, and counter restarts counting, and with next tens digit contrast, the above step that circulates is until replace N time.By total N of the converted tens digit of the second text message, replace after N time, the second text message is hidden in the first text message completely, form the 3rd text message.
Because in character match storehouse, the first character of coupling is semantic relevant with the second character mutually, the 3rd text message forming after replacing is semantically identical with the first text message, can not change original implication, the Information hiding that the second text message passes through character position is in the 3rd text message.
Fig. 4 shows the realization flow of a kind of decryption method that the embodiment of the present invention provides, and executive agent is deciphering client, and details are as follows:
In step S401, set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, described character match storehouse is identical with the character match storehouse of encrypting client.
In embodiments of the present invention, the character match storehouse of setting up in deciphering client is identical with encryption client, and guarantee is correctly deciphered.
In step S402, obtain the 3rd text message, described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message.
In the 3rd text message receiving, hidden the second text message.
In step S403, in described the 3rd text message, search the first character and the second character, and the first character finding and the second character are counted.
In embodiments of the present invention, corresponding with ciphering process, since the first character of the 3rd text message, search the first character and the second character that belong in character match storehouse, often find first character or the second character, counter adds 1; For neither the first character neither the second character, counter is left intact.When finding the second character, the value of counter has represented the character position of the second character in the first character finding and the second character, and this character position has been the character position of the second text message of having encrypted interval scale.
In step S404, according to count value corresponding to the second character finding, generate described the second text message.
As one embodiment of the present of invention, according to count value, reduce the second text message, as shown in Figure 5, S404 idiographic flow is as follows:
In S501, count value corresponding to each the second character finding is converted to binary sequence section.
In embodiments of the present invention, when finding the second character, the value of counter is converted to binary sequence section.Counter O reset after each conversion continues to search from this character position by above-mentioned steps backward, and counter restarts counting, and the above step that circulates until searched the second all characters in the 3rd text message.
In S502, splice described binary sequence section and obtain binary sequence.
A plurality of binary sequence sections that splicing obtains, form a binary sequence.The configuration parameter that deciphering customer end adopted is corresponding with encrypting client if the length of binary sequence section is less than the length of cutting apart while encrypting, splices after the leading zero of binary sequence section again.
In S503, described binary sequence is converted to the second text message.
When the binary sequence being obtained by above step is encryption, by the converted binary sequence of the second text message, binary sequence is converted to text and can restores the second text message.
For non-deciphering client, only show the 3rd text message, and the 3rd text message is semantically identical with the first text message, does not affect normal reading.
Fig. 6 shows the realization flow of the method for a kind of sending bulk message that the embodiment of the present invention provides, and details are as follows:
At step S601, receive the first text message and second text message of user's input.
In the scene of sending bulk message, transmit leg input allows everyone visible the first text message and only limits to visible the second text message of part good friend.
At step S602, according to described the first text message and the second text message, generate the 3rd text message.
In embodiments of the present invention, transmit leg is by the encryption method described in above-described embodiment, by the second Text information hiding in the first text message.
At step S603, obtain secret mass-sending member and limiter stage group members that user arranges.
At step S604, to secret mass-sending member and limiter stage group members, send described the 3rd text message.
At step S605, for secret mass-sending member, comprise described the 3rd text message deciphering is restored to the second text message, for limiter stage group members, directly show described the 3rd text message.
In embodiments of the present invention, take over party, by the decryption method described in above-described embodiment, restores the second text message from the 3rd text message, for the user who does not possess above-mentioned decryption method, only shows the 3rd text message.
For example, user uses microblogging to forward news item and makes comments simultaneously, and the news of forwarding is open to everyone, and a comment hope is limited in specific friend circle visible, need comment to be hidden in the news of forwarding, the news of forwarding is the first text message, and comment is the second text message.The good friend who has corresponding deciphering client can see news and comment simultaneously, and other users are merely able to see the news of forwarding.
In embodiments of the present invention, encrypting client and deciphering client and set up identical character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, encrypt the client character position definite according to the second text message, the first character with respective symbols position in second character replacement the first text message, form the 3rd text message and the 3rd text message is sent to deciphering client, so that deciphering client in the 3rd text message by searching, record the character position of the first character and the second character, according to the character position of the second character, restore the second text message, user for non-deciphering client, only show the 3rd text message, realized and when not affecting proper communication, sent snugly customizing messages.
Fig. 7 shows the structured flowchart of the device of a kind of encryption device, decryption device and sending bulk message that the embodiment of the present invention provides, for carrying out a kind of method of encryption method, decryption method and sending bulk message described in Fig. 1 to Fig. 6 embodiment of the present invention.For convenience of explanation, only show the part relevant to the present embodiment.
With reference to Fig. 7, in encrypting client, encryption device comprises:
First sets up unit 701, sets up character match storehouse, the first character and the second character that character match storehouse comprises the unique coupling of many groups.
The first acquiring unit 702, obtains the first text message and the second text message.
Replacement unit 703, determines character position according to the second text message, with the first character of respective symbols position in second character replacement the first text message, forms the 3rd text message, so that deciphering client restores the second text message from the 3rd text message.
Alternatively, described replacement unit 703 comprises:
Conversion subelement, is converted to numerical information by the second text message.
Search and record subelement, in the first text message, search the first character, and the number of the first character of arriving of record search.
Replacing subelement, when the described number of statistics conforms to numerical information, is the second corresponding character by the first character replacement of this character position, forms the 3rd text message.
Alternatively, described conversion subelement comprises:
Text, to Binary Conversion subelement, is converted to binary sequence by the second text message.
Cut apart subelement, binary sequence is divided into N the binary sequence section that length is identical, N is more than or equal to 1 integer.
Scale-of-two, to decimal system conversion subelement, is converted to tens digit by each binary sequence section.
Described replacement subelement is specially: when the described number of statistics equals described tens digit, by the first character replacement of this character position, be the second corresponding character.
In deciphering client, decryption device comprises:
Second sets up unit 704, sets up character match storehouse, the first character and the second character that character match storehouse comprises the unique coupling of many groups, and described character match storehouse is identical with the character match storehouse of encrypting client.
Second acquisition unit 705, obtains the 3rd text message, and described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message.
Search and record cell 706, in the 3rd text message, search the first character and the second character, and the first character finding and the second character are counted.
Generation unit 707, for generating the second text message according to count value corresponding to the second character finding.
Alternatively, described generation unit 707 comprises:
Decimal to binary conversion subelement, is converted to binary sequence section by count value corresponding to each the second character finding.
Splicing subelement, splicing binary sequence section obtains binary sequence.
Scale-of-two, to text-converted subelement, is converted to the second text message by binary sequence.
The device of sending bulk message comprises:
Receiving element 708, receives the first text message and the second text message that user inputs.
Encryption device as above, generates the 3rd text message according to the first text message and the second text message.
The 3rd acquiring unit 709, obtains secret mass-sending member and limiter stage group members that user arranges.
Transmitting element 710, sends described the 3rd text message to secret mass-sending member and limiter stage group members.
Decryption device as above, comprises the 3rd text message deciphering is restored to the second text message for secret mass-sending member, for limiter stage group members, directly shows the 3rd text message.
In embodiments of the present invention, encrypting client and deciphering client and set up identical character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, encrypt the client character position definite according to the second text message, the first character with respective symbols position in second character replacement the first text message, form the 3rd text message and the 3rd text message is sent to deciphering client, so that deciphering client in the 3rd text message by searching, record the character position of the first character and the second character, according to the character position of the second character, restore the second text message, user for non-deciphering client, only show the 3rd text message, realized and when not affecting proper communication, sent snugly customizing messages.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (13)

1. an encryption method, is characterized in that, described method comprises:
Set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups;
Obtain the first text message and the second text message;
According to described the second text message, determine character position, described the first character with respective symbols position in the first text message described in described the second character replacement, form the 3rd text message, so that described deciphering client restores described the second text message from described the 3rd text message.
2. the method for claim 1, is characterized in that, describedly according to described the second text message, determines character position, with described first character of respective symbols position in the first text message described in described the second character replacement, forms the 3rd text message and comprises:
Described the second text message is converted to numerical information;
In described the first text message, search the first character, and the number of the first character of arriving of record search;
When the described number of statistics conforms to described numerical information, by the first character replacement of this character position, be the second corresponding character, form the 3rd text message.
3. method as claimed in claim 2, is characterized in that, describedly described the second text message is converted to numerical information comprises:
Described the second text message is converted to binary sequence;
Described binary sequence is divided into N the binary sequence section that length is identical, and N is more than or equal to 1 integer;
Each binary sequence section is converted to tens digit;
When the described described number when statistics conforms to described numerical information, the second character by the first character replacement of this character position for correspondence comprises:
When the described number of statistics equals described tens digit, by the first character replacement of this character position, be the second corresponding character.
4. a decryption method, is characterized in that, described method comprises:
Set up character match storehouse, the first character and the second character that described character match storehouse comprises the unique coupling of many groups, described character match storehouse is identical with the character match storehouse of encrypting client;
Obtain the 3rd text message, described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message;
In described the 3rd text message, search the first character and the second character, and the first character finding and the second character are counted;
According to count value corresponding to the second character finding, generate described the second text message.
5. method as claimed in claim 4, is characterized in that, count value corresponding to the second character that described basis finds generates described the second text message and comprise:
Count value corresponding to each the second character finding is converted to binary sequence section;
Splice described binary sequence section and obtain binary sequence;
Described binary sequence is converted to the second text message.
6. an encryption device, is characterized in that, described device comprises:
First sets up unit, for setting up character match storehouse, and the first character and the second character that described character match storehouse comprises the unique coupling of many groups;
The first acquiring unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to described the second text message, described the first character with respective symbols position in the first text message described in described the second character replacement, form the 3rd text message, so that described deciphering client restores described the second text message from described the 3rd text message.
7. device as claimed in claim 6, is characterized in that, described replacement unit comprises:
Conversion subelement, for being converted to numerical information by described the second text message;
Search and record subelement, for searching the first character at described the first text message, and the number of the first character of arriving of record search;
Replacing subelement, while conforming to described numerical information for the described number when statistics, is the second corresponding character by the first character replacement of this character position, forms the 3rd text message.
8. device as claimed in claim 7, is characterized in that, described conversion subelement comprises:
Text is to Binary Conversion subelement, for described the second text message is converted to binary sequence;
Cut apart subelement, for described binary sequence being divided into N the binary sequence section that length is identical, N is more than or equal to 1 integer;
Scale-of-two is to decimal system conversion subelement, for each binary sequence section is converted to tens digit;
Described replacement subelement is specially: when the described number of statistics equals described tens digit, by the first character replacement of this character position, be the second corresponding character.
9. a decryption device, is characterized in that, described device comprises:
Second sets up subelement, for setting up character match storehouse, and the first character and the second character that described character match storehouse comprises the unique coupling of many groups, described character match storehouse is identical with the character match storehouse of encrypting client;
Second acquisition unit, for obtaining the 3rd text message, described the 3rd text message incorporates the second text message and forms by encrypting client in the first text message;
Search and record cell, for searching the first character and the second character at described the 3rd text message, and the first character finding and the second character are counted;
Generation unit, for generating described the second text message according to count value corresponding to the second character finding.
10. device as claimed in claim 9, is characterized in that, described generation unit comprises:
Decimal to binary conversion subelement, for being converted to binary sequence section by count value corresponding to each the second character finding;
Splicing subelement, obtains binary sequence for splicing described binary sequence section;
Scale-of-two is to text-converted subelement, for described binary sequence is converted to the second text message.
The method of 11. 1 kinds of sending bulk messages, is characterized in that, described method comprises:
Receive the first text message and second text message of user's input;
According to described the first text message and the second text message, generate the 3rd text message;
Obtain secret mass-sending member and limiter stage group members that user arranges;
To secret mass-sending member and limiter stage group members, send described the 3rd text message;
For secret mass-sending member, comprise described the 3rd text message deciphering is restored to the second text message, for limiter stage group members, directly show described the 3rd text message.
12. methods as shown in claim 11, is characterized in that, describedly according to described the first text message and the second text message, generate the method that the 3rd text message comprises the encryption as described in claim 1~3 any one;
Describedly for secret mass-sending member, described the 3rd text message is deciphered and restored the second text message and comprise: the method for the deciphering as described in claim 4~5 any one.
The device of 13. 1 kinds of sending bulk messages, is characterized in that, described device comprises:
Receiving element, for receiving the first text message and second text message of user's input; And
Encryption device as described in claim 6~8 any one, for generating the 3rd text message according to described the first text message and the second text message;
The 3rd acquiring unit, the secret mass-sending member and the limiter stage group members that for obtaining user, arrange;
Transmitting element, for sending described the 3rd text message to secret mass-sending member and limiter stage group members; And
Decryption device as described in claim 9~10 any one, restores the second text message for comprising for secret mass-sending member described the 3rd text message deciphering;
For limiter stage group members, directly show described the 3rd text message.
CN201310648356.1A 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument Expired - Fee Related CN103646068B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310648356.1A CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310648356.1A CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Publications (2)

Publication Number Publication Date
CN103646068A true CN103646068A (en) 2014-03-19
CN103646068B CN103646068B (en) 2017-10-20

Family

ID=50251282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310648356.1A Expired - Fee Related CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Country Status (1)

Country Link
CN (1) CN103646068B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763424A (en) * 2016-03-22 2016-07-13 网易有道信息技术(北京)有限公司 Method and device for processing text information
CN107105324A (en) * 2017-03-31 2017-08-29 武汉斗鱼网络科技有限公司 A kind of method and client of protection barrage information
CN103646068B (en) * 2013-12-04 2017-10-20 Tcl集团股份有限公司 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
CN108694326A (en) * 2017-04-11 2018-10-23 北京京东尚科信息技术有限公司 Text encryption method, apparatus and server
CN112368973A (en) * 2018-07-04 2021-02-12 I&G科技阿玛迪奥吉安卡罗股份有限公司 Method for encoding, transmitting and/or storing and decoding digital information in a non-breakable manner

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN102486834A (en) * 2010-12-06 2012-06-06 北大方正集团有限公司 Method and device for processing characters

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646068B (en) * 2013-12-04 2017-10-20 Tcl集团股份有限公司 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
CN102486834A (en) * 2010-12-06 2012-06-06 北大方正集团有限公司 Method and device for processing characters
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646068B (en) * 2013-12-04 2017-10-20 Tcl集团股份有限公司 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
CN105763424A (en) * 2016-03-22 2016-07-13 网易有道信息技术(北京)有限公司 Method and device for processing text information
CN105763424B (en) * 2016-03-22 2019-05-07 网易有道信息技术(北京)有限公司 A kind of literal information processing method and device
CN107105324A (en) * 2017-03-31 2017-08-29 武汉斗鱼网络科技有限公司 A kind of method and client of protection barrage information
CN108694326A (en) * 2017-04-11 2018-10-23 北京京东尚科信息技术有限公司 Text encryption method, apparatus and server
CN112368973A (en) * 2018-07-04 2021-02-12 I&G科技阿玛迪奥吉安卡罗股份有限公司 Method for encoding, transmitting and/or storing and decoding digital information in a non-breakable manner

Also Published As

Publication number Publication date
CN103646068B (en) 2017-10-20

Similar Documents

Publication Publication Date Title
He et al. Certificateless public key authenticated encryption with keyword search for industrial internet of things
US8990566B2 (en) Privacy-preserving publish-subscribe protocol in a cloud-assisted broadcast model
CN103646068A (en) Encryption method, decryption method, method for group messaging and corresponding devices thereof
CN105359154B (en) A kind of terminal matching method and pairing terminal
WO2020211485A1 (en) Data processing method and apparatus, and electronic device
CN105637798A (en) A method and system for privacy preserving counting
US10805077B2 (en) Partially encrypted conversations via keys on member change
Gupta et al. Pretzel: Email encryption and provider-supplied functions are compatible
US20220021521A1 (en) Secure consensus over a limited connection
CN104243149A (en) Encrypting and decrypting method, device and server
CN107820614B (en) Privacy enhanced personal search index
AU2017308060A1 (en) Devices and methods for enabling portable secure communication using random cipher pad cryptography
US11190495B2 (en) One-time-pad encryption
US20200145389A1 (en) Controlling Access to Data
WO2022105518A1 (en) Electronic voting method and device
CN114547082A (en) Data aggregation method, related device, equipment and storage medium
CN107682303B (en) System and method for encrypting and inquiring personal sensitive information
CN104935783A (en) Safe and active image tampering detection method and device
US20220109657A1 (en) Email encryption system
US20210352470A1 (en) Sender verification for encrypted electronic messaging
CN114666048A (en) Data processing method and device, electronic equipment and storage medium
EP2795477B1 (en) Privacy system
US9154471B2 (en) Method and apparatus for unified encrypted messaging
CN112839132B (en) Method and system for realizing mobile phone input method with information encryption function
TWI766327B (en) Method and system for obtaining information in real time

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171020

CF01 Termination of patent right due to non-payment of annual fee