CN103646068B - Encryption method, decryption method, the method for sending bulk message and its corresponding intrument - Google Patents
Encryption method, decryption method, the method for sending bulk message and its corresponding intrument Download PDFInfo
- Publication number
- CN103646068B CN103646068B CN201310648356.1A CN201310648356A CN103646068B CN 103646068 B CN103646068 B CN 103646068B CN 201310648356 A CN201310648356 A CN 201310648356A CN 103646068 B CN103646068 B CN 103646068B
- Authority
- CN
- China
- Prior art keywords
- character
- text message
- text
- decryption
- binary sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000006243 chemical reaction Methods 0.000 claims description 14
- 229910002056 binary alloy Inorganic materials 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 8
- 230000008569 process Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention is applied to information security field there is provided a kind of encryption method and decryption method, including:Character match storehouse is set up, character match storehouse includes the first character and the second character of multigroup unique match;Obtain the first text message and the second text message;Character position is determined according to the second text message, the first character of respective symbols position in the first text message is replaced with the second character, the 3rd text message is formed, so that decryption client restores the second text message from the 3rd text message.In the present invention, identical character match storehouse is set up in encryption client and decryption client, client is encrypted according to the character position determined after the second text message transcoding, the first character of respective symbols position in the first text message is replaced with the second character, form the 3rd text message to send to decryption client, realize and snugly send customizing messages while proper communication is not influenceed.
Description
Technical field
The invention belongs to information security field, more particularly to the method for encryption method, decryption method, sending bulk message and its right
Answer device.
Background technology
With the fast development of internet, information security issue when being communicated between user can not be ignored.For example, relatives and friends
Between by chat software transmission information when, some information can be disclosed all good friends, but for some sensitive informations, such as bank
Clip pin etc., it is undesirable to which all good friends see;User issued on microblogging comment when, only want to it is some comment allow it is specific use
See at family, it is to avoid comment is largely forwarded and finally develops into rumour;During short message of the send and receive packets containing sensitive information, if directly passed
Defeated sensitive information, short message is trapped rear sensitive information and easily revealed.
The content of the invention
It is an object of the invention to provide a kind of method of encryption method, decryption method and sending bulk message, it is intended to realizes
Do not influence snugly to send customizing messages while proper communication.
The present invention is achieved in that a kind of encryption method, including:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match;
Obtain the first text message and the second text message;
Character position is determined according to second text message, replaced with second character in first text message
First character of respective symbols position, forms the 3rd text message, so that the client of decrypting is from the 3rd text
Second text message is restored in information.
Another object of the present invention is to provide a kind of decryption method, including:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match, institute
It is identical with the character match storehouse for encrypting client to state character match storehouse;
The 3rd text message is obtained, the 3rd text message incorporates second by encryption client in the first text message
Text message is formed;
The first character and the second character are searched in the 3rd text message, and to the first character found and second
Character is counted;
Second text message is generated according to the corresponding count value of the second character found.
Another object of the present invention is to provide a kind of encryption device, including:
First sets up unit, and for setting up character match storehouse, the character match storehouse includes the first of multigroup unique match
Character and the second character;
First acquisition unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to second text message, replaces described with second character
First character of respective symbols position in first text message, forms the 3rd text message, so that the decryption client
Second text message is restored from the 3rd text message.
Another object of the present invention is to provide a kind of decryption device, including:
Second sets up subelement, for setting up character match storehouse, the character match storehouse comprising multigroup unique match the
One character and the second character, the character match storehouse are identical with the character match storehouse for encrypting client;
Second acquisition unit, for obtaining the 3rd text message, the 3rd text message is by encryption client first
The second text message is incorporated in text message to be formed;
Search and recording unit, for searching the first character and the second character in the 3rd text message, and to looking into
The first character and the second character found is counted;
Generation unit, for generating second text message according to the corresponding count value of the second character found.
Another object of the present invention is to provide a kind of method of sending bulk message, including:
Receive the first text message and the second text message of user's input;
3rd text message is generated according to first text message and the second text message;
Obtain secret mass-sending member and limiter stage group members that user is set;
Member is mass-sended to secret and limiter stage group members send the 3rd text message;
Include the 3rd text message decryption to restore the second text message for secret mass-sending member, for limitation
Level group members directly display the 3rd text message.
Another object of the present invention is to provide a kind of device of sending bulk message, including:
Receiving unit, the first text message and the second text message for receiving user's input;And
Encryption device as described above, for according to first text message and the text of the second text message generation the 3rd
This information;
3rd acquiring unit, secret mass-sending member and limiter stage group members for obtaining user's setting;
Transmitting element, for mass-sending member and limiter stage group members transmission the 3rd text message to secret;And
Decryption device as described above, is reduced for for secret mass-sending member including the 3rd text message to decrypt
Go out the second text message;
The 3rd text message is directly displayed for limiter stage group members.
In the present invention, identical character match storehouse, the character match are set up in encryption client and decryption client
Storehouse includes the first character and the second character of multigroup unique match, the character bit that encryption client is determined according to the second text message
Put, the first character of respective symbols position in the first text message is replaced with the second character, form the 3rd text message and by the
Three text messages are sent to decryption client, so that decryption client passes through lookup, the first word of record in the 3rd text message
The character position of symbol and the second character, the second text message is restored according to the character position of the second character, for non-decryption visitor
The user at family end, only shows the 3rd text message, realizes and snugly send customizing messages while proper communication is not influenceed.
Brief description of the drawings
Fig. 1 is a kind of implementation process figure of encryption method provided in an embodiment of the present invention;
Fig. 2 is that step S103 implements flow chart in Fig. 1;
Fig. 3 is that step S201 implements flow chart in Fig. 1;
Fig. 4 is a kind of implementation process figure of decryption method provided in an embodiment of the present invention;
Fig. 5 is that step S404 implements flow chart in Fig. 4;
Fig. 6 is a kind of implementation process figure of the method for sending bulk message provided in an embodiment of the present invention;
Fig. 7 is the structure of the device of a kind of encryption device provided in an embodiment of the present invention, decryption device and sending bulk message
Block diagram.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client
Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message
Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message
And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message
The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character
The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed
Determine information.
Fig. 1 shows a kind of implementation process of encryption method provided in an embodiment of the present invention, and executive agent is encryption client
End, details are as follows:
In step S101, character match storehouse is set up, the character match storehouse includes the first character of multigroup unique match
With the second character.
In embodiments of the present invention, identical character match storehouse is set up in encryption client and decryption client, wherein wrapping
The first character and the second character containing multigroup unique match, character can be word, punctuation mark or its combination etc., and
It is semantically related.First character to the second character can be one-to-one or one-to-many mapping relations.Such as, the first character " opening "
It is corresponding with the second character " Zhang ";First character "!" corresponding with the second character " O (∩ _ ∩) O " and " (^o^)/" etc..
In step s 102, the first text message and the second text message are obtained.
In embodiments of the present invention, the first text message and the second text message of user's input, the first text envelope are obtained
Urtext when breath is proper communication, the second text message is some sensitive informations, during communication, and encryption client is literary by second
This Information hiding is sent in the first text message, and the recipient for possessing corresponding decryption client could be by the second text message also
Original comes out.
In step s 103, character position is determined according to second text message, replaces described with second character
First character of respective symbols position in first text message, forms the 3rd text message, so that the decryption client
Second text message is restored from the 3rd text message.
In embodiments of the present invention, the character position determined according to the second text message, is selectively replaced with the second character
The first character changed in the first text message, for example, having in the first text message multiple " ", the word that the second text message is determined
It is 5 to accord with position, then the 5th " opening " therein is replaced with " Zhang " by ciphering process, and remaining is not processed.
As one embodiment of the present of invention, it is replaced according to the character position that the second text message is determined, such as Fig. 2 institutes
Show, S103 detailed processes are as follows:
In S201, second text message is converted into digital information.
Second text message is converted into digital information, as shown in figure 3, S201 detailed processes are as follows:
In S301, second text message is converted into binary sequence.
In embodiments of the present invention, by whole second text message according to character and the transformation rule of binary number, conversion
For the binary sequence of such as ASCII character.
In S302, the binary sequence is divided into the N number of binary sequence section of length identical, N is more than or equal to 1
Integer.
The binary sequence is divided into the N number of binary sequence section of length identical, the length and N of two-stage system tract can
Inputted as configuration parameter by user, and encryption client and decryption client must use identical configuration parameter.
In S303, each binary sequence section is converted into ten's digit.
In embodiments of the present invention, each binary sequence section is converted into decimal number.This is arrived, by the second text
Information is converted to N number of ten's digit.
In S202, the first character is searched in first text message, and of the first character that record search is arrived
Number.
In embodiments of the present invention, the position ordinal number of the number of the first described character namely the first character, from the first text
The first character of this information starts, and searches the first character belonged in character match storehouse and records its character position, often finds
One the first character, counter adds 1;For non-first character, counter is without any processing, and the value of counter is to illustrate
The character position of one character.
In S203, when the number of statistics is consistent with the digital information, by the first character of the character position
Corresponding second character is replaced with, the 3rd text message is formed.
In embodiments of the present invention, when the value of counter is equal with by the converted ten's digit of the second text message
When, the first character that character position is equal to the ten's digit is replaced with into corresponding second character, ten's digit is upper
State first ten's digit that step is obtained.Often replace once, counter O reset, continue past since the character position of replacement
After search, counter restart count, with next ten's digit contrast, circulation above step until replace n times.By
The converted ten's digit of two text messages has N number of, replaces after n times, i.e., the second text message is hidden into the completely
In one text message, the 3rd text message is formed.
Because the first character being mutually matched in character match storehouse and the second character are semantic related, the 3rd formed after replacement
Text message is identical with the first text message semantically, will not change original implication, and the second text message then passes through word
The Information hiding of position is accorded with the 3rd text message.
Fig. 4 shows a kind of implementation process of decryption method provided in an embodiment of the present invention, and executive agent is decryption client
End, details are as follows:
In step S401, character match storehouse is set up, the character match storehouse includes the first character of multigroup unique match
With the second character, the character match storehouse with encrypt client character match storehouse it is identical.
In embodiments of the present invention, identical, the ability in the character match storehouse of decryption client foundation with encrypting client
Ensure correct decryption.
In step S402, the 3rd text message is obtained, the 3rd text message is by encryption client in the first text
The second text message is incorporated in information to be formed.
The second text message is concealed in the 3rd text message received.
In step S403, search the first character and the second character in the 3rd text message, and to finding
First character and the second character are counted.
In embodiments of the present invention, corresponding with ciphering process, since the first character of the 3rd text message, lookup belongs to
The first character and the second character in character match storehouse, often find first character or the second character, and counter adds 1;
For neither the first character is nor second character, counter is without any processing.When finding the second character, count
The value of device is the character position for illustrating the second character in the first character and the second character found, and the character position is
Encrypt the interval scale character position of the second text message.
In step s 404, second text message is generated according to the corresponding count value of the second character found.
As one embodiment of the present of invention, the second text message is reduced according to count value, as shown in figure 5, S404 is specific
Flow is as follows:
In S501, the corresponding count value of each second character found is converted into binary sequence section.
In embodiments of the present invention, when finding the second character, the value of counter is converted into binary sequence section.Often
Counter O reset after secondary conversion, is continued to search backward, counter restarts to count, circulation by above-mentioned steps from the character position
Above step in the 3rd text message until searched the second all characters.
In S502, splice the binary sequence section and obtain binary sequence.
Splice obtained multiple binary sequences section, form a binary sequence.Client is decrypted to use and encryption visitor
The corresponding configuration parameter in family end, if the length of binary sequence section is less than the length split during encryption, in binary sequence
Spliced again after section leading zero.
In S503, the binary sequence is converted into the second text message.
By binary system sequence that the second text message is converted when the binary sequence obtained by above step is encryption
Row, binary sequence is converted into text can restore the second text message.
For non-decryption client, only show the 3rd text message, and the 3rd text message semantically with the first text
Information is identical, and normal reading is not influenceed.
Fig. 6 shows a kind of implementation process of the method for sending bulk message provided in an embodiment of the present invention, and details are as follows:
In step S601, the first text message and the second text message of user's input are received.
In the scene of sending bulk message, sender's input allows visible first text message of owner and is only limitted to part
Visible second text message of good friend.
In step S602, the 3rd text message is generated according to first text message and the second text message.
In embodiments of the present invention, sender is hidden by the second text message by the encryption method described in above-described embodiment
It is hidden within the first text message.
In step S603, secret mass-sending member and limiter stage group members that user is set are obtained.
In step S604, mass-send member to secret and limiter stage group members send the 3rd text message.
In step S605, include the 3rd text message decryption to restore the second text envelope for secret mass-sending member
Breath, the 3rd text message is directly displayed for limiter stage group members.
In embodiments of the present invention, recipient is by the decryption method described in above-described embodiment, from the 3rd text message also
Original goes out the second text message, for not possessing the user of above-mentioned decryption method, only shows the 3rd text message.
For example, user is made comments using microblogging forwarding news item simultaneously, the news of forwarding is disclosed owner, and is commented
It is visible in specific friend circle by only wanting to be limited in, then need comment being hidden in the news of forwarding, the news of forwarding is
First text message, is commented on as the second text message.Possess corresponding decryption client good friend can while see news and comment,
Other users are merely able to see the news of forwarding.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client
Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message
Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message
And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message
The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character
The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed
Determine information.
Fig. 7 shows the device of a kind of encryption device provided in an embodiment of the present invention, decryption device and sending bulk message
Structured flowchart, for performing a kind of encryption method, decryption method and sending bulk message described in Fig. 1 of the present invention to Fig. 6 embodiments
Method.For convenience of description, it illustrate only part related to the present embodiment.
Reference picture 7, in encryption client, encryption device includes:
First sets up unit 701, sets up character match storehouse, first character of the character match storehouse comprising multigroup unique match and
Second character.
First acquisition unit 702, obtains the first text message and the second text message.
Replacement unit 703, character position is determined according to the second text message, is replaced with the second character in the first text message
First character of respective symbols position, forms the 3rd text message, so that decryption client is restored from the 3rd text message
Second text message.
Alternatively, the replacement unit 703 includes:
Conversion subunit, digital information is converted to by the second text message.
Search and record subelement, the first character, and the first character that record search is arrived are searched in the first text message
Number.
Subelement is replaced, when the number of statistics is consistent with digital information, the first character of the character position is replaced
Corresponding second character is changed to, the 3rd text message is formed.
Alternatively, the conversion subunit includes:
Second text message is converted to binary sequence by text to Binary Conversion subelement.
Split subelement, binary sequence is divided into the N number of binary sequence section of length identical, N is more than or equal to 1
Integer.
Each binary sequence section is converted to ten's digit by binary system to decimal system conversion subunit.
It is described replacement subelement be specially:When the number of statistics is equal to the ten's digit, by the character bit
The first character put replaces with corresponding second character.
In decryption client, decryption device includes:
Second sets up unit 704, sets up character match storehouse, first character of the character match storehouse comprising multigroup unique match and
Second character, the character match storehouse is identical with the character match storehouse for encrypting client.
Second acquisition unit 705, obtains the 3rd text message, the 3rd text message is by encryption client in the first text
The second text message is incorporated in this information to be formed.
Search and recording unit 706, search the first character and the second character in the 3rd text message, and to finding
First character and the second character are counted.
Generation unit 707, for generating the second text message according to the corresponding count value of the second character found.
Alternatively, the generation unit 707 includes:
Decimal to binary conversion subelement, is converted to two by the corresponding count value of each second character found and enters
Tract processed.
Splice subelement, splicing binary sequence section obtains binary sequence.
Binary sequence is converted to the second text message by binary system to text conversion subunit.
The device of sending bulk message includes:
Receiving unit 708, receives the first text message and the second text message of user's input.
Encryption device as described above, the 3rd text message is generated according to the first text message and the second text message.
3rd acquiring unit 709, obtains secret mass-sending member and limiter stage group members that user is set.
Transmitting element 710, mass-sends member to secret and limiter stage group members sends the 3rd text message.
Decryption device as described above, includes the decryption of the 3rd text message to restore the second text for secret mass-sending member
This information, the 3rd text message is directly displayed for limiter stage group members.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client
Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message
Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message
And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message
The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character
The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed
Determine information.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (8)
1. a kind of encryption method, it is characterised in that methods described includes:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match;
Obtain the first text message and the second text message;
Character position is determined according to second text message, replaces corresponding in first text message with second character
First character of character position, forms the 3rd text message, so that decryption client is gone back from the 3rd text message
Original goes out second text message;
Wherein, it is described that character position is determined according to second text message, first text is replaced with second character
First character of respective symbols position in information, forming the 3rd text message includes:
Second text message is converted into digital information;
Search the first character in first text message, and the number of the first character that record search is arrived;
When the number of statistics is consistent with the digital information, the first character of the character position is replaced with corresponding
Two characters, form the 3rd text message.
2. the method as described in claim 1, it is characterised in that described that second text message is converted into digital packet
Include:
Second text message is converted into binary sequence;
The binary sequence is divided into the N number of binary sequence section of length identical, N is the integer more than or equal to 1;
Each binary sequence section is converted into ten's digit;
It is described when the number of statistics is consistent with the digital information, by the first character of the character position replace with correspondence
The second character include:
When the number of statistics is equal to the ten's digit, the first character of the character position is replaced with corresponding the
Two characters.
3. a kind of decryption method, it is characterised in that methods described includes:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match, the word
It is identical with the character match storehouse for encrypting client to accord with matching library;
The 3rd text message is obtained, the 3rd text message incorporates the second text by encryption client in the first text message
Information is formed;
The first character and the second character, and the first character and the second character to finding are searched in the 3rd text message
Counted;
Second text message is generated according to the corresponding count value of the second character found, including:
The corresponding count value of each second character found is converted into binary sequence section;
Splice the binary sequence section and obtain binary sequence;
The binary sequence is converted into the second text message.
4. a kind of encryption device, it is characterised in that described device includes:
First sets up unit, and for setting up character match storehouse, the character match storehouse includes the first character of multigroup unique match
With the second character;
First acquisition unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to second text message, described first is replaced with second character
First character of respective symbols position in text message, forms the 3rd text message, so that decryption client is from described the
Second text message is restored in three text messages;
Wherein, the replacement unit includes:
Conversion subunit, for second text message to be converted into digital information;
Search and record subelement, for searching the first character in first text message, and record search arrive first
The number of character;
Subelement is replaced, for when the number of statistics is consistent with the digital information, by the first word of the character position
Symbol replaces with corresponding second character, forms the 3rd text message.
5. device as claimed in claim 4, it is characterised in that the conversion subunit includes:
Text is to Binary Conversion subelement, for second text message to be converted into binary sequence;
Split subelement, for the binary sequence to be divided into length identical N number of binary sequence section, N be more than etc.
In 1 integer;
Binary system is to decimal system conversion subunit, for each binary sequence section to be converted into ten's digit;
It is described replacement subelement be specially:When the number of statistics is equal to the ten's digit, by the character position
First character replaces with corresponding second character.
6. one kind decryption device, it is characterised in that described device includes:
Second sets up subelement, and for setting up character match storehouse, the character match storehouse includes the first word of multigroup unique match
Symbol and the second character, the character match storehouse are identical with the character match storehouse for encrypting client;
Second acquisition unit, for obtaining the 3rd text message, the 3rd text message is by encryption client in the first text
The second text message is incorporated in information to be formed;
Search and recording unit, for searching the first character and the second character in the 3rd text message, and to finding
The first character and the second character counted;
Generation unit, for generating second text message according to the corresponding count value of the second character found;
Wherein, the generation unit includes:
Decimal to binary conversion subelement, enters for the corresponding count value of each second character found to be converted into two
Tract processed;
Splice subelement, binary sequence is obtained for splicing the binary sequence section;
Binary system is to text conversion subunit, for the binary sequence to be converted into the second text message.
7. a kind of method of sending bulk message, it is characterised in that methods described includes:
Receive the first text message and the second text message of user's input;
3rd text message is generated according to first text message and the second text message;
Obtain secret mass-sending member and limiter stage group members that user is set;
Member is mass-sended to secret and limiter stage group members send the 3rd text message;
Include the 3rd text message decryption to restore the second text message for secret mass-sending member, for limiter stage group
Member directly displays the 3rd text message;
Wherein, it is described to include right such as according to first text message and the second text message the 3rd text message of generation and want
The method for asking the encryption described in 1 or 2;
It is described for secret mass-send member the 3rd text message decryption restore the second text message include as right want
The method for asking the decryption described in 3.
8. a kind of device of sending bulk message, it is characterised in that described device includes:
Receiving unit, the first text message and the second text message for receiving user's input;And
Encryption device as described in claim 4 or 5, for according to first text message and the generation of the second text message
3rd text message;
3rd acquiring unit, secret mass-sending member and limiter stage group members for obtaining user's setting;
Transmitting element, for mass-sending member and limiter stage group members transmission the 3rd text message to secret;And
Decryption device as claimed in claim 6, for for secret mass-sending member including the 3rd text message to decrypt
Restore the second text message;
The 3rd text message is directly displayed for limiter stage group members.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310648356.1A CN103646068B (en) | 2013-12-04 | 2013-12-04 | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310648356.1A CN103646068B (en) | 2013-12-04 | 2013-12-04 | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103646068A CN103646068A (en) | 2014-03-19 |
CN103646068B true CN103646068B (en) | 2017-10-20 |
Family
ID=50251282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310648356.1A Expired - Fee Related CN103646068B (en) | 2013-12-04 | 2013-12-04 | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103646068B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646068B (en) * | 2013-12-04 | 2017-10-20 | Tcl集团股份有限公司 | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument |
CN105763424B (en) * | 2016-03-22 | 2019-05-07 | 网易有道信息技术(北京)有限公司 | A kind of literal information processing method and device |
CN107105324B (en) * | 2017-03-31 | 2020-10-16 | 武汉斗鱼网络科技有限公司 | Method and client for protecting bullet screen information |
CN108694326A (en) * | 2017-04-11 | 2018-10-23 | 北京京东尚科信息技术有限公司 | Text encryption method, apparatus and server |
IT201800006911A1 (en) * | 2018-07-04 | 2020-01-04 | METHOD OF ENCODING AND DECODING DIGITAL INFORMATION |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7418098B1 (en) * | 2000-11-27 | 2008-08-26 | Protegrity Corporation | Data type preserving encryption |
CN102073831A (en) * | 2011-02-23 | 2011-05-25 | 上海帝埃碧化学科技有限公司 | System and method for encrypting and decrypting electronic documents |
CN102486834A (en) * | 2010-12-06 | 2012-06-06 | 北大方正集团有限公司 | Method and device for processing characters |
CN103646068A (en) * | 2013-12-04 | 2014-03-19 | Tcl集团股份有限公司 | Encryption method, decryption method, method for group messaging and corresponding devices thereof |
-
2013
- 2013-12-04 CN CN201310648356.1A patent/CN103646068B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7418098B1 (en) * | 2000-11-27 | 2008-08-26 | Protegrity Corporation | Data type preserving encryption |
CN102486834A (en) * | 2010-12-06 | 2012-06-06 | 北大方正集团有限公司 | Method and device for processing characters |
CN102073831A (en) * | 2011-02-23 | 2011-05-25 | 上海帝埃碧化学科技有限公司 | System and method for encrypting and decrypting electronic documents |
CN103646068A (en) * | 2013-12-04 | 2014-03-19 | Tcl集团股份有限公司 | Encryption method, decryption method, method for group messaging and corresponding devices thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103646068A (en) | 2014-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190020630A1 (en) | Encrypted query-based access to data | |
US9485096B2 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
KR101933840B1 (en) | Geo-location based event gallery | |
US9426126B2 (en) | Method and system for automatic generation of context-aware cover message | |
CN103646068B (en) | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument | |
CA2893764C (en) | System and method for assigning security levels for instant messaging contacts across device partitions | |
US9160719B2 (en) | Hiding ciphertext using a linguistics algorithm with dictionaries | |
US20140140508A1 (en) | Method, System and Program Product for Secure Storage of Content | |
US11201729B2 (en) | Devices and methods for enabling portable secure communication using random cipher pad cryptography by enabling communications to be passed to the device from a host, encrypted and/or decrypted, and passed back to the host | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
KR20160029590A (en) | Method and Apparatus For Data Encrypting | |
EP2953321B1 (en) | System and method for assigning security levels for instant messaging contacts across device partitions | |
CN104935783A (en) | Safe and active image tampering detection method and device | |
JP2008245145A (en) | Security program and server | |
US8473516B2 (en) | Computer storage apparatus for multi-tiered data security | |
US9325674B2 (en) | Privacy system | |
JP2021527377A (en) | Chromosome identification | |
US20100246817A1 (en) | System for data security using user selectable one-time pad | |
WO2016075459A1 (en) | Hiding information in a digital environment | |
Onodueze et al. | Rijndael algorithm for database encryption on a course management system | |
Desoky | Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm—High Level of Security for Fooling the Enemy | |
KR20140139393A (en) | User apparatus, server, contents providing system and method for decryption encrypted contents thereof | |
CHAMALA Mr | CONFIDENTIALITY: THE PRIMARY GOAL OF CYBER SECURITY | |
Gandhi | Evolution of Cryptography Based Sheltered Messaging System | |
Grooms | Secure messaging with Apple's iPhone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171020 |