CN104618093B - Data ciphering method and device - Google Patents

Data ciphering method and device Download PDF

Info

Publication number
CN104618093B
CN104618093B CN201510024467.4A CN201510024467A CN104618093B CN 104618093 B CN104618093 B CN 104618093B CN 201510024467 A CN201510024467 A CN 201510024467A CN 104618093 B CN104618093 B CN 104618093B
Authority
CN
China
Prior art keywords
data
key
dispersion factor
master key
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510024467.4A
Other languages
Chinese (zh)
Other versions
CN104618093A (en
Inventor
冯岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gosuncn Iot Technology Co ltd
Original Assignee
Gaoxing Wulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gaoxing Wulian Technology Co Ltd filed Critical Gaoxing Wulian Technology Co Ltd
Priority to CN201510024467.4A priority Critical patent/CN104618093B/en
Publication of CN104618093A publication Critical patent/CN104618093A/en
Application granted granted Critical
Publication of CN104618093B publication Critical patent/CN104618093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data ciphering method and device, the data ciphering method is comprising steps of default at least two group keys;One group is chosen from preset key as master key;Data are encrypted according to the master key and 3DES encryption algorithm.To choose one group when encryption from multiple groups key every time as master key, so that used key is all not quite similar when encrypting every time, therefore be not easy to be cracked by other people, improve the safety of data by default multiple groups key.Dispersion factor Kc (session key) further can also be generated according to master key, dispersion factor Kc is recycled to carry out 3DES encryption to data as encryption key, it is more difficult to be cracked by other people, further increase the safety of data.

Description

Data ciphering method and device
Technical field
The present invention relates to fields of communication technology, more particularly, to a kind of data ciphering method and device.
Background technique
In traditional 2G/3G module application, module data is generally used clear-text way.But with Internet of Things It rapidly develops, module application is more and more extensive, and security request data is also more and more important, therefore starts to protect using cipher mode Demonstrate,prove data safety.
In the prior art, to the data encryption in Internet of Things communication, there are mainly two types of modes.A kind of cipher mode is to logical Road is encrypted, and exit passageway is provided, and SSH is capable of providing the safe channel socket, and the data based on SSH can carry out It passes, but this cipher mode is inflexible, specific safe cipher mode cannot be designed for specific application.
Another cipher mode is encrypted to upper layer data, flexibly can design suitable safety according to various applications Encryption Algorithm, therefore be widely applied.3DES encryption algorithm is mainly applied at present, and 3DES (or being Triple DES) is The common name of triple data encryption algorithm (TDEA, Triple Data Encryption Algorithm) block encryptions.It is equivalent to It is to each data block using des encryption algorithm three times.Due to the enhancing of Computing ability, the key of master DES password Length becomes easy by Brute Force;3DES is to be designed to provide for a kind of relatively simple method, i.e., by increasing DES's Key length avoids similar attack.But existing 3DES encryption mode, the key used be it is unique, fixed, have by The safety of the risk that other people crack, data is not high.
Summary of the invention
The main purpose of the present invention is to provide a kind of data ciphering method and devices, it is intended to improve Information Security.
To achieve these objectives, the present invention proposes a kind of data ciphering method, comprising steps of
Default at least two group keys;
One group is chosen from preset key as master key;
Data are encrypted according to the master key and 3DES encryption algorithm.
Preferably, described to choose one group from preset key as master key and include:
A random number is generated, chooses one group from preset key as main close according to the random number and preset algorithm Key.
Preferably, preset every group key has a call number, the preset algorithm are as follows: N=<(n &0x07) %5>, Middle N is cipher key index number, and n is random number.
Preferably, described encryption is carried out to data according to the master key and 3DES encryption algorithm to include:
Dispersion factor Kc is generated according to the master key, random number and terminal exclusive identification code;
Data are encrypted using the dispersion factor Kc and 3DES encryption algorithm.
Preferably, described to include: according to the master key, random number and terminal exclusive identification code generation dispersion factor Kc
A, dispersion factor 1 is obtained according to the terminal exclusive identification code, dispersion factor 2 is obtained according to the random number;
B, it regard the dispersion factor 1 as source data, carries out 3des-ecb calculating with the master key, obtain data k1;
C, the result obtained after the dispersion factor 1 being carried out XOR operation is carried out as source data with the master key 3des-ecb is calculated, and obtains data k2;
D, the dispersion factor 1 is replaced using the dispersion factor 2, replaces the master key using k1+k2, repeats step B and c obtains K1 and K2, defines dispersion factor Kc=k1+k2.
The present invention proposes a kind of data encryption device, including setup module, selection module and encrypting module simultaneously, in which:
Setup module, for default at least two group keys;
Module is chosen, for choosing one group from preset key as master key;
Encrypting module, for being encrypted according to the master key and 3DES encryption algorithm to data.
Preferably, the selection module is used for: a random number is generated, according to the random number and preset algorithm from preset One group is chosen in key as master key.
Preferably, the setup module is used for: working out a call number for preset every group key;The preset algorithm are as follows: N =<(n&0x07) %5>, wherein N is cipher key index number, and n is random number.
Preferably, the encrypting module is used for:
Dispersion factor Kc is generated according to the master key, random number and terminal exclusive identification code;
Data are encrypted using the dispersion factor Kc and 3DES encryption algorithm.
Preferably, the encrypting module generates the dispersion factor Kc by following steps:
A, dispersion factor 1 is obtained according to the terminal exclusive identification code, dispersion factor 2 is obtained according to the random number;
B, it regard the dispersion factor 1 as source data, carries out 3des-ecb calculating with the master key, obtain data k1;
C, the result obtained after the dispersion factor 1 being carried out XOR operation is carried out as source data with the master key 3des-ecb is calculated, and obtains data k2;
D, the dispersion factor 1 is replaced using the dispersion factor 2, replaces the master key using k1+k2, repeats step B and c obtains K1 and K2, defines the dispersion factor Kc=K1+K2.
A kind of data ciphering method provided by the present invention, by presetting multiple groups key, from multiple groups key when encrypting every time It is middle to choose one group as master key, so that used key is all not quite similar when encrypting every time, therefore it is not easy to be broken by other people Solution, improves the safety of data.
Further, dispersion factor Kc (session key) is generated according to master key, recycles dispersion factor Kc as encryption Data key carries out 3DES encryption, more difficult to be cracked by other people, further improves the safety of data.
Detailed description of the invention
Fig. 1 is the flow chart of data ciphering method first embodiment of the invention;
Fig. 2 is the flow chart of data ciphering method second embodiment of the invention;
Fig. 3 is the flow chart that mono- example of dispersion factor Kc is generated in the embodiment of the present invention;
Fig. 4 is the flow chart in the embodiment of the present invention to data deciphering;
Fig. 5 is the module diagram of one embodiment of data encryption device of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Then data ciphering method of the invention chooses one group by presetting at least two group keys from preset key As master key, finally data are encrypted according to master key and 3DES encryption algorithm, including directly utilize master key logarithm Dispersion factor Kc is generated according to progress 3DES encryption, or according to master key, recycles dispersion factor Kc to carry out 3DES to data and adds It is close.It is described in detail below by way of specific embodiment.
Referring to Fig. 1, data ciphering method first embodiment of the invention is proposed, the data ciphering method includes following step It is rapid:
Step S10: default multiple groups key
Pre-buried multiple groups key or at least two groups key are needed in the present embodiment, in terminal and server, it is more in principle It is better, the present embodiment preferably pre-buried 5 group key.
Step S11: one group is chosen from multiple groups key as master key
Before encrypting to data, one group of master key as encryption is selected from pre-buried multiple groups key first.? When selecting master key, it can be randomly selected, can also be selected according to preset rules or preset algorithm.
Step S12: data are encrypted using master key and 3DES encryption algorithm
After having selected master key, then using the master key to data carry out 3DES encryption, specific cipher mode with it is existing The 3DES encryption of technology is identical, and this will not be repeated here.
According to 3DES encryption principle, before being encrypted to data, it is necessary to assure the integer that data length to be encrypted is 8 Times, if the multiple less than 8, need to be filled the be-encrypted data, mends " 20 " such as behind be-encrypted data, until Add to 8 integral multiple.Such as, it is assumed that be-encrypted data is one group of 16 binary data: 0x31,0x32,0x33,0x34, 0x35,0x36,0x37,0x38,0x39 }, become after being filled to it: 0x31,0x32,0x33,0x34,0x35,0x36, 0x37,0x38,0x39,0x20,0x20,0x20,0x20,0x20,0x20,0x20}。
The data ciphering method of the present embodiment, due to having preset multiple groups key, used key is not when encryption every time It is identical to the greatest extent, therefore be not easy to be cracked by other people, improve the safety of data.
Referring to fig. 2, propose that data encryption algorithm second embodiment of the invention, the data encryption algorithm include following step It is rapid:
Step S20: default multiple groups key
In the present embodiment, each terminal has an exclusive identification code, and pre-buried multiple groups key is needed in terminal and server, Or at least two groups key, The more the better in principle, the present embodiment preferably pre-buried 5 group key, such as set key group are as follows:
{0xd1,0x21,0xf0,0x1c,0x2d,0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f,0x7b, 0x1e,0x6f,0x62,
0x11,0xA2,0xB1,0x1C,0x2D,0xD6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B, 0x1C,0x6A,0x32,
0x21,0x21,0xF0,0x1C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x54,0x9F,0x7B, 0x11,0x6F,0x66,
0xA1,0x21,0xF0,0x1C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B, 0x1E,0x6B,0x42,
0xB1,0x21,0xF0,0x2C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B, 0x1E,0x6A,0xF3};
Meanwhile the present embodiment is also numbered the key of generation, works out a call number for each key.For example, 5 groups close Key respectively corresponds call number 1-5.
Step S21: a random number is generated
When needing to encrypt data, a random number is firstly generated.
Step S22: one group is chosen from multiple groups key as master key according to random number and preset algorithm
In the present embodiment, preset algorithm is preferably expression formula N=<(n & 0x07) %5>, and wherein N is cipher key index number, n For random number.Assuming that random number is 25, then cipher key index N=<(25 & 0x07) %5>=1 can be obtained according to preset algorithm, i.e., The key that Selecting Index number is 1 is as master key.
It will be understood by those skilled in the art that the preset algorithm is not limited to this, it can according to need and arbitrarily set It is fixed.It, then should be with when generating some random number for example, it is also possible to random number is limited to any one in cipher key index number The corresponding key of machine number is selected as master key, and the random number such as generated is 3, then the key that Selecting Index number is 3.
Step S23: dispersion factor Kc is generated according to master key, random number and terminal exclusive identification code
Step S24: data are encrypted using dispersion factor Kc and 3DES encryption algorithm
The present embodiment generates dispersion factor Kc (session key) according to master key, recycles dispersion factor Kc close as encrypting Key to data carry out 3DES encryption, therefore it is more difficult cracked by other people, further improve the safety of data.
Wherein, as shown in figure 3, for step S23, dispersion factor Kc can preferably be generated in the following manner:
Step S231: obtaining dispersion factor 1 according to terminal exclusive identification code, obtains dispersion factor 2 according to random number
Wherein, it when terminal exclusive identification code (or terminal number) and random number are less than 8 bytes, need to be filled below " 20 " supply 8 bytes as dispersion factor 1 and dispersion factor 2.
Assuming that terminal exclusive identification code is 0x0001020304, then dispersion factor 1 is 0x0001020304202020;At random Number is 0x12345678, then dispersion factor 2 is 0x1234567820202020.
In certain embodiments, dispersion factor 1 can also be obtained according to random number, according to terminal unique identification in turn Code obtains dispersion factor 2.
Step S232: regarding dispersion factor 1 as source data, carries out 3des-ecb calculating with master key, obtains data k1
For example, it is assumed that dispersion factor 1 be 0x001020304202020, master key 0xd1,0x21,0xf0,0x1c, 0x2d, 0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f, 0x7b, 0x1e, 0x6f, 0x62, dispersion factor and master is close Key carries out 3des-ecb calculating, obtains data k1=0xb96a353f973a160a.
Step S233: the result obtained after dispersion factor 1 is carried out XOR operation is carried out as source data with master key 3des-ecb is calculated, and obtains data k2
For example, it is assumed that dispersion factor 1 is 0x0001020304, XOR operation ^0xFF is carried out, obtained result is as source number According to master key 0xd1,0x21,0xf0,0x1c, 0x2d, 0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f, 0x7b, 0x1e, 0x6f, 0x62 carry out 3des-ecb calculating, obtain data k2=0x870ab659763d2d8b.
Step S234: regarding dispersion factor 2 as source data, carries out 3des-ecb calculating with (k1+k2), obtains data K1. It is 0x2123ad971821f2a4 as obtained K1 in the present embodiment.
Step S235: the result obtained after dispersion factor 2 is carried out XOR operation is carried out as source data with (k1+k2) 3des-ecb is calculated, and obtains data K2.If the K2 in the present embodiment is 0xd52991bea64dd60c.
Step S234 and S235 and step S232 and S233 only need to replace dispersion factor 1 using dispersion factor 2 to similar, It utilizes (k1+k2) to replace master key, repeats step S232 and S233, details are not described herein.
Step S236: dispersion factor Kc=K1+K2 is obtained
Finally, (K1+K2) is used as dispersion factor Kc, 3DES encryption is carried out to data using dispersion factor Kc.
It will be understood by those skilled in the art that the mode for generating dispersion factor Kc is not limited to this, it can also be other logical Generating mode.
It is as shown in Figure 4 to the decryption process of aforementioned encryption data, comprising the following steps:
Step S30: random numbers in plain text and terminal exclusive identification code are parsed from encryption data
Step S31: master key is obtained according to random number and preset algorithm
Step S32: dispersion factor Kc is generated according to master key, random number and terminal exclusive identification code
Step S31 and S32 are identical as the step S22 and S23 when encryption respectively, and this will not be repeated here.
Step S33: encryption data is decrypted using dispersion factor Kc
Finally it is decrypted using dispersion factor Kc as key pair encryption data, specific manner of decryption and the prior art 3DES decryption is identical, and this will not be repeated here.If there are extra filling " 20 " in the data after decryption, also need to remove " 20 ".
In the present embodiment, being encrypted to data is terminal, is decrypted data for terminal or server.
Referring to Fig. 5, one embodiment of encryption device of the invention is proposed, the encryption device can be terminal, or answer Module product for terminal.The encryption device includes setup module, chooses module and encrypting module.
Setup module: for default at least two group keys.
Setup module two or more sets pre-buried keys in the terminal, it is The more the better in principle, preferably pre-buried 5 groups of the present embodiment Key.Preferably, the key of generation can also be numbered in setup module, work out a call number for each key.For example, 5 Group key respectively corresponds call number 1-5.
Choose module: for choosing one group from preset key as master key.
Before being encrypted to data, have first choose module selected from pre-buried multiple groups key one group as encrypt Master key.It when selecting master key, can be randomly selected, can also be selected according to preset rules or preset algorithm.
Preferably, it chooses module and firstly generates a random number, then according to random number and preset algorithm from multiple groups key One group is chosen as master key.The preset algorithm is preferably expression formula N=<(n &0x07) %5>, and wherein N is cipher key index Number, n is random number.
It will be understood by those skilled in the art that the preset algorithm is not limited to this, it can according to need and arbitrarily set It is fixed.It, then should be with when generating some random number for example, it is also possible to random number is limited to any one in cipher key index number The corresponding key of machine number is selected as master key, and the random number such as generated is 3, then the key that Selecting Index number is 3.
Encrypting module: for being encrypted according to master key and 3DES encryption algorithm to data.
In certain embodiments, after having selected master key, encrypting module can directly be carried out data using master key 3DES encryption, specific cipher mode is identical as the 3DES encryption of the prior art, and this will not be repeated here.
According to 3DES encryption principle, before being encrypted to data, it is necessary to assure the integer that data length to be encrypted is 8 Times, if the multiple less than 8, encrypting module if, needs to be filled the be-encrypted data, such as mends behind be-encrypted data " 20 ", until adding to 8 integral multiple.Such as, it is assumed that be-encrypted data are as follows: 0x31,0x32,0x33,0x34,0x35, 0x36,0x37,0x38,0x39 }, become after being filled to it: 0x31,0x32,0x33,0x34,0x35,0x36,0x37, 0x38,0x39,0x20,0x20,0x20,0x20,0x20,0x20,0x20}。
To, by presetting multiple groups key so that every time encryption when the key that uses all be not quite similar, therefore be not easy by Other people crack, and improve the safety of data.
In a preferred embodiment, encrypting module according to master key, random number and terminal exclusive identification code generate dispersion because Sub- Kc recycles dispersion factor Kc to carry out 3DES encryption to data.
Specifically, encrypting module obtains dispersion factor 1 according to terminal exclusive identification code, dispersion factor is obtained according to random number 2;It regard dispersion factor 1 as source data, carries out 3des-ecb calculating with master key, obtain data k1;Dispersion factor 1 is carried out different Or the result obtained after operation carries out 3des-ecb calculating with master key, obtains data k2 as source data;By dispersion factor 2 As source data, 3des-ecb calculating is carried out with (k1+k2), obtains data K1;It is obtained after dispersion factor 2 is carried out XOR operation Result as source data, carry out 3des-ecb calculating with (k1+k2), obtain data K2;Finally obtain dispersion factor Kc=K1+ K2。
To which the present embodiment generates dispersion factor Kc (session key) according to master key, recycles dispersion factor Kc conduct Encryption key to data carry out 3DES encryption, therefore it is more difficult cracked by other people, further improve the safety of data.
It should be understood that data encryption device provided by the above embodiment is in encryption data, only with above-mentioned each function The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds Block is completed.In addition, data encryption device provided by the above embodiment and data ciphering method embodiment belong to same design, have Body realizes that process is detailed in embodiment of the method, and the technical characteristic in embodiment of the method is corresponding applicable in Installation practice, this In repeat no more.
Those of ordinary skill in the art will appreciate that implementing the method for the above embodiments can lead to Program is crossed to control relevant hardware and complete, the program can be stored in a computer readable storage medium, described Storage medium can be ROM/RAM, disk, CD etc..
It should be understood that the above is only a preferred embodiment of the present invention, the scope of the patents of the invention cannot be therefore limited, It is all to utilize equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is applied directly or indirectly in Other related technical areas are included within the scope of the present invention.

Claims (4)

1. a kind of data ciphering method, which is characterized in that comprising steps of
Default at least two group keys;
One group is chosen from preset key as master key according to random number and preset algorithm;
Dispersion factor Kc is generated according to the master key, random number and terminal exclusive identification code, comprising:
A, dispersion factor 1 is obtained according to the terminal exclusive identification code, dispersion factor 2 is obtained according to the random number;
B, it regard the dispersion factor 1 as source data, carries out 3des-ecb calculating with the master key, obtain data k1;
C, the result obtained after the dispersion factor 1 being carried out XOR operation carries out 3des- as source data, with the master key Ecb is calculated, and obtains data k2;
D, using the dispersion factor 2 replace the dispersion factor 1, using k1+k2 replace the master key, repeat step b and C obtains K1 and K2, defines dispersion factor Kc=k1+k2;
Data are encrypted using the dispersion factor Kc and 3DES encryption algorithm.
2. data ciphering method according to claim 1, which is characterized in that preset every group key has a call number, The preset algorithm are as follows: N=<(n&0x07) %5>, wherein N is cipher key index number, and n is random number.
3. a kind of data encryption device, which is characterized in that including setup module, choose module and encrypting module, in which:
Setup module, for default at least two group keys;
Module is chosen, for choosing one group from preset key as master key according to random number and preset algorithm;
Encrypting module, for generating dispersion factor Kc according to the master key, random number and terminal exclusive identification code, comprising:
A, dispersion factor 1 is obtained according to the terminal exclusive identification code, dispersion factor 2 is obtained according to the random number;
B, it regard the dispersion factor 1 as source data, carries out 3des-ecb calculating with the master key, obtain data k1;
C, the result obtained after the dispersion factor 1 being carried out XOR operation carries out 3des- as source data, with the master key Ecb is calculated, and obtains data k2;
D, using the dispersion factor 2 replace the dispersion factor 1, using k1+k2 replace the master key, repeat step b and C obtains K1 and K2, defines dispersion factor Kc=k1+k2;And
Data are encrypted using the dispersion factor Kc and 3DES encryption algorithm.
4. data encryption device according to claim 3, which is characterized in that the setup module is used for: being preset every Group key works out a call number;The preset algorithm are as follows: N=<(n&0x07) %5>, wherein N is cipher key index number, and n is random Number.
CN201510024467.4A 2015-01-16 2015-01-16 Data ciphering method and device Active CN104618093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510024467.4A CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510024467.4A CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Publications (2)

Publication Number Publication Date
CN104618093A CN104618093A (en) 2015-05-13
CN104618093B true CN104618093B (en) 2019-07-19

Family

ID=53152388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510024467.4A Active CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Country Status (1)

Country Link
CN (1) CN104618093B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245505A (en) * 2015-09-14 2016-01-13 深圳市优友互联有限公司 Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN105228117A (en) * 2015-09-14 2016-01-06 深圳市优友互联有限公司 Based on low rate communication means and the device of user terminal
CN105827661B (en) * 2016-05-31 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Method and device for secure communication
CN109040132B (en) * 2018-09-26 2021-05-28 南京南瑞继保电气有限公司 Encryption communication method based on random selection of shared secret key
CN110366183B (en) * 2019-08-02 2023-01-24 中国工商银行股份有限公司 Short message safety protection method and device
CN111526016B (en) * 2020-04-26 2022-12-23 南方电网科学研究院有限责任公司 Parameter configuration method and device for cryptographic algorithm
CN111865561B (en) * 2020-06-28 2023-10-13 深圳市七星电气与智能化工程科技有限公司 Data encryption and decryption method and device and electronic equipment
CN114124350A (en) * 2021-11-11 2022-03-01 弥达斯科技(深圳)有限公司 Consensus algorithm for improving performance in network heterogeneous environment
CN114726544B (en) * 2022-04-18 2024-02-09 北京数字认证股份有限公司 Method and system for acquiring digital certificate

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212642A (en) * 2006-12-25 2008-07-02 北京握奇数据系统有限公司 Broadcast signal processing method, system, and receiver
CN103501220A (en) * 2013-09-29 2014-01-08 程碧波 Encryption method and device
CN103716157A (en) * 2013-12-13 2014-04-09 厦门市美亚柏科信息股份有限公司 Grouped multiple-key encryption method and grouped multiple-key encryption device
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212642A (en) * 2006-12-25 2008-07-02 北京握奇数据系统有限公司 Broadcast signal processing method, system, and receiver
CN103501220A (en) * 2013-09-29 2014-01-08 程碧波 Encryption method and device
CN103716157A (en) * 2013-12-13 2014-04-09 厦门市美亚柏科信息股份有限公司 Grouped multiple-key encryption method and grouped multiple-key encryption device
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES

Also Published As

Publication number Publication date
CN104618093A (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN104618093B (en) Data ciphering method and device
CN102377564B (en) Method and device for encrypting private key
CN102546181B (en) Cloud storage encrypting and deciphering method based on secret key pool
KR101744748B1 (en) Contents protection, encryption and decryption apparatus using white-box cryptography
CN102710414B (en) Randomized document block encryption method
CN105260668A (en) File encryption method and electronic device
CN103580855B (en) Usbkey management method based on sharing technology
CN105406969A (en) Apparatus And Method For Data Encryption
CN105049400A (en) Splitting S-boxes in a White-Box implementation to resist attacks
Azimi et al. Color image encryption based on DNA encoding and pair coupled chaotic maps
CN104463040A (en) Secure input method and system for password
CN103283177A (en) Cryptography module for use with fragmented key and methods for use therewith
CN105024992B (en) It realizes in the realization of single white box and is arranged using security related
CN105095695B (en) The incorrect behaviour realized via white box, which is realized, to be authorized
CN110312054B (en) Image encryption and decryption method, related device and storage medium
CN105357003B (en) A kind of method and device of encryption data
CN110378138A (en) Data encryption, decryption method and neural network training method and equipment
CN104717056A (en) Two-dimensional code encryption and decryption method and encryption and decryption device
CN105637801A (en) Polymorphic encryption key matrices
CN105468940A (en) Software protection method and apparatus
CN105184115A (en) Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation
CN105007256A (en) Security module for secure function execution on untrusted platform
CN109005184A (en) File encrypting method and device, storage medium, terminal
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
CN107979458A (en) A kind of two-dimensional bar data ciphering method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant after: SHENZHEN ZTEWELINK TECHNOLOGY Co.,Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant before: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

COR Change of bibliographic data
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: MINDRAY building, 518000 Guangdong city of Shenzhen province Nanshan District Guangdong streets high-tech industrial park of science and technology 12 South Road 2 B zone C

Applicant after: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant before: SHENZHEN ZTEWELINK TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Applicant after: Gaoxing Wulian Technology Co.,Ltd.

Address before: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Applicant before: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 518000 606, block a, sharing building, No. 78, Keyuan North Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: Gosuncn IOT Technology Co.,Ltd.

Address before: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Patentee before: Gaoxing Wulian Technology Co.,Ltd.