CN103646068B - Encryption method, decryption method, the method for sending bulk message and its corresponding intrument - Google Patents

Encryption method, decryption method, the method for sending bulk message and its corresponding intrument Download PDF

Info

Publication number
CN103646068B
CN103646068B CN201310648356.1A CN201310648356A CN103646068B CN 103646068 B CN103646068 B CN 103646068B CN 201310648356 A CN201310648356 A CN 201310648356A CN 103646068 B CN103646068 B CN 103646068B
Authority
CN
China
Prior art keywords
character
text message
text
decryption
binary sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310648356.1A
Other languages
Chinese (zh)
Other versions
CN103646068A (en
Inventor
张霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201310648356.1A priority Critical patent/CN103646068B/en
Publication of CN103646068A publication Critical patent/CN103646068A/en
Application granted granted Critical
Publication of CN103646068B publication Critical patent/CN103646068B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/248Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention is applied to information security field there is provided a kind of encryption method and decryption method, including:Character match storehouse is set up, character match storehouse includes the first character and the second character of multigroup unique match;Obtain the first text message and the second text message;Character position is determined according to the second text message, the first character of respective symbols position in the first text message is replaced with the second character, the 3rd text message is formed, so that decryption client restores the second text message from the 3rd text message.In the present invention, identical character match storehouse is set up in encryption client and decryption client, client is encrypted according to the character position determined after the second text message transcoding, the first character of respective symbols position in the first text message is replaced with the second character, form the 3rd text message to send to decryption client, realize and snugly send customizing messages while proper communication is not influenceed.

Description

Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
Technical field
The invention belongs to information security field, more particularly to the method for encryption method, decryption method, sending bulk message and its right Answer device.
Background technology
With the fast development of internet, information security issue when being communicated between user can not be ignored.For example, relatives and friends Between by chat software transmission information when, some information can be disclosed all good friends, but for some sensitive informations, such as bank Clip pin etc., it is undesirable to which all good friends see;User issued on microblogging comment when, only want to it is some comment allow it is specific use See at family, it is to avoid comment is largely forwarded and finally develops into rumour;During short message of the send and receive packets containing sensitive information, if directly passed Defeated sensitive information, short message is trapped rear sensitive information and easily revealed.
The content of the invention
It is an object of the invention to provide a kind of method of encryption method, decryption method and sending bulk message, it is intended to realizes Do not influence snugly to send customizing messages while proper communication.
The present invention is achieved in that a kind of encryption method, including:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match;
Obtain the first text message and the second text message;
Character position is determined according to second text message, replaced with second character in first text message First character of respective symbols position, forms the 3rd text message, so that the client of decrypting is from the 3rd text Second text message is restored in information.
Another object of the present invention is to provide a kind of decryption method, including:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match, institute It is identical with the character match storehouse for encrypting client to state character match storehouse;
The 3rd text message is obtained, the 3rd text message incorporates second by encryption client in the first text message Text message is formed;
The first character and the second character are searched in the 3rd text message, and to the first character found and second Character is counted;
Second text message is generated according to the corresponding count value of the second character found.
Another object of the present invention is to provide a kind of encryption device, including:
First sets up unit, and for setting up character match storehouse, the character match storehouse includes the first of multigroup unique match Character and the second character;
First acquisition unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to second text message, replaces described with second character First character of respective symbols position in first text message, forms the 3rd text message, so that the decryption client Second text message is restored from the 3rd text message.
Another object of the present invention is to provide a kind of decryption device, including:
Second sets up subelement, for setting up character match storehouse, the character match storehouse comprising multigroup unique match the One character and the second character, the character match storehouse are identical with the character match storehouse for encrypting client;
Second acquisition unit, for obtaining the 3rd text message, the 3rd text message is by encryption client first The second text message is incorporated in text message to be formed;
Search and recording unit, for searching the first character and the second character in the 3rd text message, and to looking into The first character and the second character found is counted;
Generation unit, for generating second text message according to the corresponding count value of the second character found.
Another object of the present invention is to provide a kind of method of sending bulk message, including:
Receive the first text message and the second text message of user's input;
3rd text message is generated according to first text message and the second text message;
Obtain secret mass-sending member and limiter stage group members that user is set;
Member is mass-sended to secret and limiter stage group members send the 3rd text message;
Include the 3rd text message decryption to restore the second text message for secret mass-sending member, for limitation Level group members directly display the 3rd text message.
Another object of the present invention is to provide a kind of device of sending bulk message, including:
Receiving unit, the first text message and the second text message for receiving user's input;And
Encryption device as described above, for according to first text message and the text of the second text message generation the 3rd This information;
3rd acquiring unit, secret mass-sending member and limiter stage group members for obtaining user's setting;
Transmitting element, for mass-sending member and limiter stage group members transmission the 3rd text message to secret;And
Decryption device as described above, is reduced for for secret mass-sending member including the 3rd text message to decrypt Go out the second text message;
The 3rd text message is directly displayed for limiter stage group members.
In the present invention, identical character match storehouse, the character match are set up in encryption client and decryption client Storehouse includes the first character and the second character of multigroup unique match, the character bit that encryption client is determined according to the second text message Put, the first character of respective symbols position in the first text message is replaced with the second character, form the 3rd text message and by the Three text messages are sent to decryption client, so that decryption client passes through lookup, the first word of record in the 3rd text message The character position of symbol and the second character, the second text message is restored according to the character position of the second character, for non-decryption visitor The user at family end, only shows the 3rd text message, realizes and snugly send customizing messages while proper communication is not influenceed.
Brief description of the drawings
Fig. 1 is a kind of implementation process figure of encryption method provided in an embodiment of the present invention;
Fig. 2 is that step S103 implements flow chart in Fig. 1;
Fig. 3 is that step S201 implements flow chart in Fig. 1;
Fig. 4 is a kind of implementation process figure of decryption method provided in an embodiment of the present invention;
Fig. 5 is that step S404 implements flow chart in Fig. 4;
Fig. 6 is a kind of implementation process figure of the method for sending bulk message provided in an embodiment of the present invention;
Fig. 7 is the structure of the device of a kind of encryption device provided in an embodiment of the present invention, decryption device and sending bulk message Block diagram.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed Determine information.
Fig. 1 shows a kind of implementation process of encryption method provided in an embodiment of the present invention, and executive agent is encryption client End, details are as follows:
In step S101, character match storehouse is set up, the character match storehouse includes the first character of multigroup unique match With the second character.
In embodiments of the present invention, identical character match storehouse is set up in encryption client and decryption client, wherein wrapping The first character and the second character containing multigroup unique match, character can be word, punctuation mark or its combination etc., and It is semantically related.First character to the second character can be one-to-one or one-to-many mapping relations.Such as, the first character " opening " It is corresponding with the second character " Zhang ";First character "!" corresponding with the second character " O (∩ _ ∩) O " and " (^o^)/" etc..
In step s 102, the first text message and the second text message are obtained.
In embodiments of the present invention, the first text message and the second text message of user's input, the first text envelope are obtained Urtext when breath is proper communication, the second text message is some sensitive informations, during communication, and encryption client is literary by second This Information hiding is sent in the first text message, and the recipient for possessing corresponding decryption client could be by the second text message also Original comes out.
In step s 103, character position is determined according to second text message, replaces described with second character First character of respective symbols position in first text message, forms the 3rd text message, so that the decryption client Second text message is restored from the 3rd text message.
In embodiments of the present invention, the character position determined according to the second text message, is selectively replaced with the second character The first character changed in the first text message, for example, having in the first text message multiple " ", the word that the second text message is determined It is 5 to accord with position, then the 5th " opening " therein is replaced with " Zhang " by ciphering process, and remaining is not processed.
As one embodiment of the present of invention, it is replaced according to the character position that the second text message is determined, such as Fig. 2 institutes Show, S103 detailed processes are as follows:
In S201, second text message is converted into digital information.
Second text message is converted into digital information, as shown in figure 3, S201 detailed processes are as follows:
In S301, second text message is converted into binary sequence.
In embodiments of the present invention, by whole second text message according to character and the transformation rule of binary number, conversion For the binary sequence of such as ASCII character.
In S302, the binary sequence is divided into the N number of binary sequence section of length identical, N is more than or equal to 1 Integer.
The binary sequence is divided into the N number of binary sequence section of length identical, the length and N of two-stage system tract can Inputted as configuration parameter by user, and encryption client and decryption client must use identical configuration parameter.
In S303, each binary sequence section is converted into ten's digit.
In embodiments of the present invention, each binary sequence section is converted into decimal number.This is arrived, by the second text Information is converted to N number of ten's digit.
In S202, the first character is searched in first text message, and of the first character that record search is arrived Number.
In embodiments of the present invention, the position ordinal number of the number of the first described character namely the first character, from the first text The first character of this information starts, and searches the first character belonged in character match storehouse and records its character position, often finds One the first character, counter adds 1;For non-first character, counter is without any processing, and the value of counter is to illustrate The character position of one character.
In S203, when the number of statistics is consistent with the digital information, by the first character of the character position Corresponding second character is replaced with, the 3rd text message is formed.
In embodiments of the present invention, when the value of counter is equal with by the converted ten's digit of the second text message When, the first character that character position is equal to the ten's digit is replaced with into corresponding second character, ten's digit is upper State first ten's digit that step is obtained.Often replace once, counter O reset, continue past since the character position of replacement After search, counter restart count, with next ten's digit contrast, circulation above step until replace n times.By The converted ten's digit of two text messages has N number of, replaces after n times, i.e., the second text message is hidden into the completely In one text message, the 3rd text message is formed.
Because the first character being mutually matched in character match storehouse and the second character are semantic related, the 3rd formed after replacement Text message is identical with the first text message semantically, will not change original implication, and the second text message then passes through word The Information hiding of position is accorded with the 3rd text message.
Fig. 4 shows a kind of implementation process of decryption method provided in an embodiment of the present invention, and executive agent is decryption client End, details are as follows:
In step S401, character match storehouse is set up, the character match storehouse includes the first character of multigroup unique match With the second character, the character match storehouse with encrypt client character match storehouse it is identical.
In embodiments of the present invention, identical, the ability in the character match storehouse of decryption client foundation with encrypting client Ensure correct decryption.
In step S402, the 3rd text message is obtained, the 3rd text message is by encryption client in the first text The second text message is incorporated in information to be formed.
The second text message is concealed in the 3rd text message received.
In step S403, search the first character and the second character in the 3rd text message, and to finding First character and the second character are counted.
In embodiments of the present invention, corresponding with ciphering process, since the first character of the 3rd text message, lookup belongs to The first character and the second character in character match storehouse, often find first character or the second character, and counter adds 1; For neither the first character is nor second character, counter is without any processing.When finding the second character, count The value of device is the character position for illustrating the second character in the first character and the second character found, and the character position is Encrypt the interval scale character position of the second text message.
In step s 404, second text message is generated according to the corresponding count value of the second character found.
As one embodiment of the present of invention, the second text message is reduced according to count value, as shown in figure 5, S404 is specific Flow is as follows:
In S501, the corresponding count value of each second character found is converted into binary sequence section.
In embodiments of the present invention, when finding the second character, the value of counter is converted into binary sequence section.Often Counter O reset after secondary conversion, is continued to search backward, counter restarts to count, circulation by above-mentioned steps from the character position Above step in the 3rd text message until searched the second all characters.
In S502, splice the binary sequence section and obtain binary sequence.
Splice obtained multiple binary sequences section, form a binary sequence.Client is decrypted to use and encryption visitor The corresponding configuration parameter in family end, if the length of binary sequence section is less than the length split during encryption, in binary sequence Spliced again after section leading zero.
In S503, the binary sequence is converted into the second text message.
By binary system sequence that the second text message is converted when the binary sequence obtained by above step is encryption Row, binary sequence is converted into text can restore the second text message.
For non-decryption client, only show the 3rd text message, and the 3rd text message semantically with the first text Information is identical, and normal reading is not influenceed.
Fig. 6 shows a kind of implementation process of the method for sending bulk message provided in an embodiment of the present invention, and details are as follows:
In step S601, the first text message and the second text message of user's input are received.
In the scene of sending bulk message, sender's input allows visible first text message of owner and is only limitted to part Visible second text message of good friend.
In step S602, the 3rd text message is generated according to first text message and the second text message.
In embodiments of the present invention, sender is hidden by the second text message by the encryption method described in above-described embodiment It is hidden within the first text message.
In step S603, secret mass-sending member and limiter stage group members that user is set are obtained.
In step S604, mass-send member to secret and limiter stage group members send the 3rd text message.
In step S605, include the 3rd text message decryption to restore the second text envelope for secret mass-sending member Breath, the 3rd text message is directly displayed for limiter stage group members.
In embodiments of the present invention, recipient is by the decryption method described in above-described embodiment, from the 3rd text message also Original goes out the second text message, for not possessing the user of above-mentioned decryption method, only shows the 3rd text message.
For example, user is made comments using microblogging forwarding news item simultaneously, the news of forwarding is disclosed owner, and is commented It is visible in specific friend circle by only wanting to be limited in, then need comment being hidden in the news of forwarding, the news of forwarding is First text message, is commented on as the second text message.Possess corresponding decryption client good friend can while see news and comment, Other users are merely able to see the news of forwarding.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed Determine information.
Fig. 7 shows the device of a kind of encryption device provided in an embodiment of the present invention, decryption device and sending bulk message Structured flowchart, for performing a kind of encryption method, decryption method and sending bulk message described in Fig. 1 of the present invention to Fig. 6 embodiments Method.For convenience of description, it illustrate only part related to the present embodiment.
Reference picture 7, in encryption client, encryption device includes:
First sets up unit 701, sets up character match storehouse, first character of the character match storehouse comprising multigroup unique match and Second character.
First acquisition unit 702, obtains the first text message and the second text message.
Replacement unit 703, character position is determined according to the second text message, is replaced with the second character in the first text message First character of respective symbols position, forms the 3rd text message, so that decryption client is restored from the 3rd text message Second text message.
Alternatively, the replacement unit 703 includes:
Conversion subunit, digital information is converted to by the second text message.
Search and record subelement, the first character, and the first character that record search is arrived are searched in the first text message Number.
Subelement is replaced, when the number of statistics is consistent with digital information, the first character of the character position is replaced Corresponding second character is changed to, the 3rd text message is formed.
Alternatively, the conversion subunit includes:
Second text message is converted to binary sequence by text to Binary Conversion subelement.
Split subelement, binary sequence is divided into the N number of binary sequence section of length identical, N is more than or equal to 1 Integer.
Each binary sequence section is converted to ten's digit by binary system to decimal system conversion subunit.
It is described replacement subelement be specially:When the number of statistics is equal to the ten's digit, by the character bit The first character put replaces with corresponding second character.
In decryption client, decryption device includes:
Second sets up unit 704, sets up character match storehouse, first character of the character match storehouse comprising multigroup unique match and Second character, the character match storehouse is identical with the character match storehouse for encrypting client.
Second acquisition unit 705, obtains the 3rd text message, the 3rd text message is by encryption client in the first text The second text message is incorporated in this information to be formed.
Search and recording unit 706, search the first character and the second character in the 3rd text message, and to finding First character and the second character are counted.
Generation unit 707, for generating the second text message according to the corresponding count value of the second character found.
Alternatively, the generation unit 707 includes:
Decimal to binary conversion subelement, is converted to two by the corresponding count value of each second character found and enters Tract processed.
Splice subelement, splicing binary sequence section obtains binary sequence.
Binary sequence is converted to the second text message by binary system to text conversion subunit.
The device of sending bulk message includes:
Receiving unit 708, receives the first text message and the second text message of user's input.
Encryption device as described above, the 3rd text message is generated according to the first text message and the second text message.
3rd acquiring unit 709, obtains secret mass-sending member and limiter stage group members that user is set.
Transmitting element 710, mass-sends member to secret and limiter stage group members sends the 3rd text message.
Decryption device as described above, includes the decryption of the 3rd text message to restore the second text for secret mass-sending member This information, the 3rd text message is directly displayed for limiter stage group members.
In embodiments of the present invention, identical character match storehouse, the word are set up in encryption client and decryption client Symbol matching library includes the first character and the second character of multigroup unique match, and encryption client is determined according to the second text message Character position, the first character of respective symbols position in the first text message is replaced with the second character, forms the 3rd text message And send the 3rd text message to decryption client, so that decryption client passes through lookup, record in the 3rd text message The character position of first character and the second character, restores the second text message, for non-according to the character position of the second character The user for decrypting client, only shows the 3rd text message, realizes and snugly send spy while proper communication is not influenceed Determine information.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.

Claims (8)

1. a kind of encryption method, it is characterised in that methods described includes:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match;
Obtain the first text message and the second text message;
Character position is determined according to second text message, replaces corresponding in first text message with second character First character of character position, forms the 3rd text message, so that decryption client is gone back from the 3rd text message Original goes out second text message;
Wherein, it is described that character position is determined according to second text message, first text is replaced with second character First character of respective symbols position in information, forming the 3rd text message includes:
Second text message is converted into digital information;
Search the first character in first text message, and the number of the first character that record search is arrived;
When the number of statistics is consistent with the digital information, the first character of the character position is replaced with corresponding Two characters, form the 3rd text message.
2. the method as described in claim 1, it is characterised in that described that second text message is converted into digital packet Include:
Second text message is converted into binary sequence;
The binary sequence is divided into the N number of binary sequence section of length identical, N is the integer more than or equal to 1;
Each binary sequence section is converted into ten's digit;
It is described when the number of statistics is consistent with the digital information, by the first character of the character position replace with correspondence The second character include:
When the number of statistics is equal to the ten's digit, the first character of the character position is replaced with corresponding the Two characters.
3. a kind of decryption method, it is characterised in that methods described includes:
Character match storehouse is set up, the character match storehouse includes the first character and the second character of multigroup unique match, the word It is identical with the character match storehouse for encrypting client to accord with matching library;
The 3rd text message is obtained, the 3rd text message incorporates the second text by encryption client in the first text message Information is formed;
The first character and the second character, and the first character and the second character to finding are searched in the 3rd text message Counted;
Second text message is generated according to the corresponding count value of the second character found, including:
The corresponding count value of each second character found is converted into binary sequence section;
Splice the binary sequence section and obtain binary sequence;
The binary sequence is converted into the second text message.
4. a kind of encryption device, it is characterised in that described device includes:
First sets up unit, and for setting up character match storehouse, the character match storehouse includes the first character of multigroup unique match With the second character;
First acquisition unit, for obtaining the first text message and the second text message;
Replacement unit, for determining character position according to second text message, described first is replaced with second character First character of respective symbols position in text message, forms the 3rd text message, so that decryption client is from described the Second text message is restored in three text messages;
Wherein, the replacement unit includes:
Conversion subunit, for second text message to be converted into digital information;
Search and record subelement, for searching the first character in first text message, and record search arrive first The number of character;
Subelement is replaced, for when the number of statistics is consistent with the digital information, by the first word of the character position Symbol replaces with corresponding second character, forms the 3rd text message.
5. device as claimed in claim 4, it is characterised in that the conversion subunit includes:
Text is to Binary Conversion subelement, for second text message to be converted into binary sequence;
Split subelement, for the binary sequence to be divided into length identical N number of binary sequence section, N be more than etc. In 1 integer;
Binary system is to decimal system conversion subunit, for each binary sequence section to be converted into ten's digit;
It is described replacement subelement be specially:When the number of statistics is equal to the ten's digit, by the character position First character replaces with corresponding second character.
6. one kind decryption device, it is characterised in that described device includes:
Second sets up subelement, and for setting up character match storehouse, the character match storehouse includes the first word of multigroup unique match Symbol and the second character, the character match storehouse are identical with the character match storehouse for encrypting client;
Second acquisition unit, for obtaining the 3rd text message, the 3rd text message is by encryption client in the first text The second text message is incorporated in information to be formed;
Search and recording unit, for searching the first character and the second character in the 3rd text message, and to finding The first character and the second character counted;
Generation unit, for generating second text message according to the corresponding count value of the second character found;
Wherein, the generation unit includes:
Decimal to binary conversion subelement, enters for the corresponding count value of each second character found to be converted into two Tract processed;
Splice subelement, binary sequence is obtained for splicing the binary sequence section;
Binary system is to text conversion subunit, for the binary sequence to be converted into the second text message.
7. a kind of method of sending bulk message, it is characterised in that methods described includes:
Receive the first text message and the second text message of user's input;
3rd text message is generated according to first text message and the second text message;
Obtain secret mass-sending member and limiter stage group members that user is set;
Member is mass-sended to secret and limiter stage group members send the 3rd text message;
Include the 3rd text message decryption to restore the second text message for secret mass-sending member, for limiter stage group Member directly displays the 3rd text message;
Wherein, it is described to include right such as according to first text message and the second text message the 3rd text message of generation and want The method for asking the encryption described in 1 or 2;
It is described for secret mass-send member the 3rd text message decryption restore the second text message include as right want The method for asking the decryption described in 3.
8. a kind of device of sending bulk message, it is characterised in that described device includes:
Receiving unit, the first text message and the second text message for receiving user's input;And
Encryption device as described in claim 4 or 5, for according to first text message and the generation of the second text message 3rd text message;
3rd acquiring unit, secret mass-sending member and limiter stage group members for obtaining user's setting;
Transmitting element, for mass-sending member and limiter stage group members transmission the 3rd text message to secret;And
Decryption device as claimed in claim 6, for for secret mass-sending member including the 3rd text message to decrypt Restore the second text message;
The 3rd text message is directly displayed for limiter stage group members.
CN201310648356.1A 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument Expired - Fee Related CN103646068B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310648356.1A CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310648356.1A CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Publications (2)

Publication Number Publication Date
CN103646068A CN103646068A (en) 2014-03-19
CN103646068B true CN103646068B (en) 2017-10-20

Family

ID=50251282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310648356.1A Expired - Fee Related CN103646068B (en) 2013-12-04 2013-12-04 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument

Country Status (1)

Country Link
CN (1) CN103646068B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646068B (en) * 2013-12-04 2017-10-20 Tcl集团股份有限公司 Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
CN105763424B (en) * 2016-03-22 2019-05-07 网易有道信息技术(北京)有限公司 A kind of literal information processing method and device
CN107105324B (en) * 2017-03-31 2020-10-16 武汉斗鱼网络科技有限公司 Method and client for protecting bullet screen information
CN108694326A (en) * 2017-04-11 2018-10-23 北京京东尚科信息技术有限公司 Text encryption method, apparatus and server
IT201800006911A1 (en) * 2018-07-04 2020-01-04 METHOD OF ENCODING AND DECODING DIGITAL INFORMATION

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN102486834A (en) * 2010-12-06 2012-06-06 北大方正集团有限公司 Method and device for processing characters
CN103646068A (en) * 2013-12-04 2014-03-19 Tcl集团股份有限公司 Encryption method, decryption method, method for group messaging and corresponding devices thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
CN102486834A (en) * 2010-12-06 2012-06-06 北大方正集团有限公司 Method and device for processing characters
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN103646068A (en) * 2013-12-04 2014-03-19 Tcl集团股份有限公司 Encryption method, decryption method, method for group messaging and corresponding devices thereof

Also Published As

Publication number Publication date
CN103646068A (en) 2014-03-19

Similar Documents

Publication Publication Date Title
US20190020630A1 (en) Encrypted query-based access to data
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
KR101933840B1 (en) Geo-location based event gallery
US9426126B2 (en) Method and system for automatic generation of context-aware cover message
CN103646068B (en) Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
CA2893764C (en) System and method for assigning security levels for instant messaging contacts across device partitions
US9160719B2 (en) Hiding ciphertext using a linguistics algorithm with dictionaries
US20140140508A1 (en) Method, System and Program Product for Secure Storage of Content
US11201729B2 (en) Devices and methods for enabling portable secure communication using random cipher pad cryptography by enabling communications to be passed to the device from a host, encrypted and/or decrypted, and passed back to the host
CN104243149A (en) Encrypting and decrypting method, device and server
KR20160029590A (en) Method and Apparatus For Data Encrypting
EP2953321B1 (en) System and method for assigning security levels for instant messaging contacts across device partitions
CN104935783A (en) Safe and active image tampering detection method and device
JP2008245145A (en) Security program and server
US8473516B2 (en) Computer storage apparatus for multi-tiered data security
US9325674B2 (en) Privacy system
JP2021527377A (en) Chromosome identification
US20100246817A1 (en) System for data security using user selectable one-time pad
WO2016075459A1 (en) Hiding information in a digital environment
Onodueze et al. Rijndael algorithm for database encryption on a course management system
Desoky Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm—High Level of Security for Fooling the Enemy
KR20140139393A (en) User apparatus, server, contents providing system and method for decryption encrypted contents thereof
CHAMALA Mr CONFIDENTIALITY: THE PRIMARY GOAL OF CYBER SECURITY
Gandhi Evolution of Cryptography Based Sheltered Messaging System
Grooms Secure messaging with Apple's iPhone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171020