CN105447401A - Text encryption method and device - Google Patents

Text encryption method and device Download PDF

Info

Publication number
CN105447401A
CN105447401A CN201410432993.XA CN201410432993A CN105447401A CN 105447401 A CN105447401 A CN 105447401A CN 201410432993 A CN201410432993 A CN 201410432993A CN 105447401 A CN105447401 A CN 105447401A
Authority
CN
China
Prior art keywords
text
setting pattern
legible
place
character background
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410432993.XA
Other languages
Chinese (zh)
Inventor
刘阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201410432993.XA priority Critical patent/CN105447401A/en
Publication of CN105447401A publication Critical patent/CN105447401A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the invention discloses a text encryption method and device. The method comprises the following steps: after a user terminal receives a text file sent by a network side, conducing encryption on the text file by utilizing identification information of the user terminal or set part information in the identification information, and generating a unique encrypted image on the text file; converting the text file and the encrypted image into an image file to be outputted. Or, the method comprises the following steps: when the network side sends the text file to the user terminal, conducing encryption on the text file by utilizing the identification information of the user terminal or the set part information in the identification information, and generating the unique encrypted image on the text file; converting the text file and the encrypted image into a graphic file, and sending the graphic file to the user terminal. According to the embodiment, through the setting of a graphic password on the text file, the identity of an infringer can be accurately positioned.

Description

Text encryption method and device
Technical field
The embodiment of the present invention relates to encryption technology, particularly relates to a kind of text encryption method and device.
Background technology
At present, in existing text dissemination system, mainly by being encrypted text message, after being distributed to user, user checks relevant text message after being decrypted by key.Or, after network side is directly by text pattern, be distributed to user.By making the graphical of text, preventing user to text direct copying, stopping the piracy to text.But in existing text dissemination system, the piracy of text class file can only be prevented, for the text after graphical, browse user and can directly download graphical file, and carry out Web Publishing etc.That is, for the text after graphical treatment, also do not have effective means to supervise pirate phenomenon at present.
Summary of the invention
The embodiment of the present invention is for solving the problems of the technologies described above, a kind of text encryption method and device are provided, figure encryption can be carried out to the text that this user terminal is watched according to the identification information of different user terminals, once the user of user terminal issues text form the infringement of literary property, the identity of the person that can orient piracy.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of text encryption method, comprising:
User terminal utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic after receiving the text of network side transmission;
Described text and described Cryptographic are converted to graphic file and export.
Preferably, describedly utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generate unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data;
By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
Preferably, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Preferably, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
Preferably, the setting pattern arranged in different literals in one text file is identical or different.
A kind of text encryption method, comprising:
When network side sends text file to user terminal, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
Described text and described Cryptographic are converted to graphic file, and described graphic file is sent to described user terminal.
Preferably, describedly utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generate unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data;
By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
Preferably, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Preferably, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
Preferably, the setting pattern arranged in different literals in one text file is identical or different.
A kind of text encryption device, comprising: receiving element, ciphering unit, the first converting unit and output unit, wherein:
Receiving element, for receiving the text that network side sends;
Ciphering unit, for utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit, for being converted to graphic file by described text and described Cryptographic;
Output unit, for exporting described graphic file.
Preferably, described device also comprises:
Second converting unit, for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
Preferably, described ciphering unit, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Preferably, described ciphering unit, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
Preferably, the setting pattern arranged in different literals in one text file is identical or different.
A kind of text encryption device, comprising: ciphering unit, the first converting unit and transmitting element, wherein:
Ciphering unit, for when sending text file to user terminal, utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit, for being converted to graphic file by described text and described Cryptographic;
Transmitting element, for sending described graphic file to described user terminal.
Preferably, described device also comprises:
Second converting unit, for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
Preferably, described ciphering unit, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Preferably, described ciphering unit, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
Preferably, the setting pattern arranged in different literals in one text file is identical or different.
In the embodiment of the present invention, after user terminal receives the text of network side transmission, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic; Described text and described Cryptographic are converted to graphic file and export.Or, when network side sends text file to user terminal, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generate unique Cryptographic; Described text and described Cryptographic are converted to graphic file, and described graphic file is sent to described user terminal.
Compared with prior art; the technical scheme of the embodiment of the present invention; the identification information of user terminal is utilized to form Cryptographic in text to be encrypted; and Cryptographic is inlayed in patterned text, like this, not only facilitate user terminal user read text file; once there is the abuse to text; by the identity of Cryptographic identification infringer, thus accurately can determine infringer, strengthen the copyright protection to text.The content of user ID and network side distribution is bound by the technical scheme of the embodiment of the present invention, can carry out reverse user ID according to content; No matter how bootlegger is split and reorganizes figure, can the ID that uses of this bootlegger identified.So that copyright owner is for further processing.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the text encryption method one of the embodiment of the present invention;
Fig. 2 is the schematic diagram of text after the encryption of the embodiment of the present invention;
Fig. 3 is the schematic diagram of another text after the encryption of the embodiment of the present invention;
Fig. 4 is the process flow diagram of the text encryption method two of the embodiment of the present invention;
Fig. 5 is example one process flow diagram of the text encryption method of the embodiment of the present invention;
Fig. 6 is example two process flow diagram of the text encryption method of the embodiment of the present invention;
Fig. 7 is the composition structural representation of the text encryption device of the embodiment of the present invention;
Fig. 8 is another composition structural representation of the text encryption device of the embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, by the following examples also with reference to accompanying drawing, the present invention is described in more detail.
Fig. 1 is the process flow diagram of the text encryption method one of the embodiment of the present invention, and as shown in Figure 1, the text encryption method of the embodiment of the present invention comprises the following steps:
Step 101, user terminal utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic after receiving the text of network side transmission.
In the embodiment of the present invention, after user terminal receives the text of network side transmission, if text file is encrypted by network side, need first to decipher text file, before display text, also need to carry out graphically text, and need be encrypted text.In the embodiment of the present invention, user terminal is encrypted text, is actually the identification information inlaying user terminal on text, with when being formed infringement to text, accurately can orient infringer.
Particularly, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generate unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data; By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
In the embodiment of the present invention, the identification information of user terminal comprises subscriber identification module (SIM, the information of SubscriberIdentityModule) blocking, or be the mobile device international identity code (IMEI of SIM card, InternationalMobileEquipmentIdentity) information also can be that the identification information of hardware in user terminal is as the identification information etc. that can be process chip.
It should be noted that, also can using the Crypted password of the partial information in the identification information of above-mentioned user terminal as text.
Particularly, in the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
As shown in Figure 2, in the display page of a text, setting pattern " ■ " can be set for the end of stroke in the literature, suppose to set the stem that pattern " ■ " is arranged at stroke to represent " 1 ", the afterbody that setting pattern " ■ " is arranged at stroke represents " 0 ", then according to the value on each bit of binary message corresponding to the identification information of user terminal, the word in text can be selected successively to carry out setting the setting of pattern, represents the identification information of this user terminal.As shown in Figure 2, the identification information of three selected textual representation is " 010 ".It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the word being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Or as the setting means of another kind of graphical passwords, the setting position, non-legible place in the character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
As shown in Figure 3, the password setting mode shown in the manner with Fig. 2 is substantially identical, and difference is, watches text for not affecting user, only arranges setting pattern at the non-legible place of the character background of text, identifies encrypted message to be identified with this.
Suppose that the non-legible place of the first half of the character background at described text arranges described setting pattern and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; The identification information that graphical passwords then shown in Fig. 3 is corresponding is " 010 ".
As a kind of implementation, the setting of setting pattern also can carry out the binary message of identifying subscriber terminal by the left-right parts being arranged on character background.
It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the character background being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Step 102, is converted to graphic file by described text and described Cryptographic and exports.
After graphical passwords is provided with to text, text and Cryptographic are converted to graphic file, and show to the user of user terminal.It should be noted that, after text is converted to graphic file, will text directly be copied limited subscriber.If user transmits text in the mode of graphic file to other users or issue this graphic file on network, graphical passwords then in graphic file will be carried in the lump, once be known by the shareholder of text, especially easily infringing party will be located.
It will be appreciated by those skilled in the art that the text encryption method shown in Fig. 1 is applicable to subscriber terminal side.
Fig. 4 is the process flow diagram of the text encryption method two of the embodiment of the present invention, and as shown in Figure 4, the text encryption method of the embodiment of the present invention comprises the following steps:
Step 401, when network side sends text file to user terminal, utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic.
In the embodiment of the present invention; network side as receive user terminal download request need to user terminal send text time; first the identification information of user terminal is obtained; before text is sent to user terminal; figure encryption need be carried out to text; and text need be converted to graphic file, to protect the copyright of text.In the embodiment of the present invention, network side is encrypted text, is actually the identification information inlaying user terminal on text, with when being formed infringement to text, accurately can orient infringer.
Particularly, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generate unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data; By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
In the embodiment of the present invention, the identification information of user terminal comprises subscriber identification module (SIM, the information of SubscriberIdentityModule) blocking, or be the mobile device international identity code (IMEI of SIM card, InternationalMobileEquipmentIdentity) information also can be that the identification information of hardware in user terminal is as the identification information etc. that can be process chip.
It should be noted that, also can using the Crypted password of the partial information in the identification information of above-mentioned user terminal as text.
Particularly, in the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
As shown in Figure 2, in the display page of a text, setting pattern " ■ " can be set for the end of stroke in the literature, suppose to set the stem that pattern " ■ " is arranged at stroke to represent " 1 ", the afterbody that setting pattern " ■ " is arranged at stroke represents " 0 ", then according to the value on each bit of binary message corresponding to the identification information of user terminal, the word in text can be selected successively to carry out setting the setting of pattern, represents the identification information of this user terminal.As shown in Figure 2, the identification information of three selected textual representation is " 010 ".It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the word being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Or as the setting means of another kind of graphical passwords, the setting position, non-legible place in the character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
As shown in Figure 3, the password setting mode shown in the manner with Fig. 2 is substantially identical, and difference is, watches text for not affecting user, only arranges setting pattern at the non-legible place of the character background of text, identifies encrypted message to be identified with this.
Suppose that the non-legible place of the first half of the character background at described text arranges described setting pattern and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; The identification information that graphical passwords then shown in Fig. 3 is corresponding is " 010 ".
As a kind of implementation, the setting of setting pattern also can carry out the binary message of identifying subscriber terminal by the left-right parts being arranged on character background.
It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the character background being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Step 402, is converted to graphic file by described text and described Cryptographic, and is sent to described user terminal by described graphic file.
After being provided with graphical passwords to text, also need text and Cryptographic to be converted to graphic file, encryption and graphical text could be sent to user terminal.It should be noted that, after text is converted to graphic file, will text directly be copied limited subscriber.If user transmits text in the mode of graphic file to other users or issue this graphic file on network, graphical passwords then in graphic file will be carried in the lump, once be known by the shareholder of text, especially easily infringing party will be located.
The content of user ID and network side distribution is bound by the technical scheme of the embodiment of the present invention, can carry out reverse user ID according to content; No matter how bootlegger is split and reorganizes figure, can the ID that uses of this bootlegger identified.So that copyright owner is for further processing.
Below by way of concrete example, illustrate the essence of technical solution of the present invention further.
Fig. 5 is example one process flow diagram of the text encryption method of the embodiment of the present invention, and Fig. 5 relates to the text encryption process of subscriber terminal side, and the text encryption method of this example comprises the following steps:
1, server (network side) issues the text of encryption.
2, user terminal receives relevant ciphertext file, is decrypted, becomes e-book text.Or, after text is decrypted, directly generate graphic file.
3, user terminal carries out re-encrypted according to the SIM card of user or other user terminal ID to e-book text expressly, generates the version graph e-book with the Crypted password with uniqueness.
It should be noted that, the embodiment of the present invention also according to the screen size of the user terminal of user, can carry out screen adaptation.
4, the graphic file after the encryption after these being encrypted is presented on mobile phone screen.Graphic file comprises Cryptographic.
Particularly, in the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
As shown in Figure 2, in the display page of a text, setting pattern " ■ " can be set for the end of stroke in the literature, suppose to set the stem that pattern " ■ " is arranged at stroke to represent " 1 ", the afterbody that setting pattern " ■ " is arranged at stroke represents " 0 ", then according to the value on each bit of binary message corresponding to the identification information of user terminal, the word in text can be selected successively to carry out setting the setting of pattern, represents the identification information of this user terminal.As shown in Figure 2, the identification information of three selected textual representation is " 010 ".It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the word being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Or as the setting means of another kind of graphical passwords, the setting position, non-legible place in the character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
As shown in Figure 3, the password setting mode shown in the manner with Fig. 2 is substantially identical, and difference is, watches text for not affecting user, only arranges setting pattern at the non-legible place of the character background of text, identifies encrypted message to be identified with this.
Suppose that the non-legible place of the first half of the character background at described text arranges described setting pattern and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; The identification information that graphical passwords then shown in Fig. 3 is corresponding is " 010 ".
As a kind of implementation, the setting of setting pattern also can carry out the binary message of identifying subscriber terminal by the left-right parts being arranged on character background.
It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the character background being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
5, content publisher such as content supplier or operator according to the Cryptographic of correspondence, can identify that the user ID having this graphics electronic book is as cell-phone number etc.
That is, by the encryption of the embodiment of the present invention, when occur infringer graphic file is directly published on network or to graphic file carry out printing sell time, determine the identity of infringer by cipher graphic.
Fig. 6 is example two process flow diagram of the text encryption method of the embodiment of the present invention, and Fig. 6 relates to the text encryption process of subscriber terminal side, and the text encryption method of this example comprises the following steps:
1, when receiving the text download request etc. of user terminal, server obtains the relevant information of user terminal as SIM card IMEI, and the relevant information of user ID and mobile phone is as model, screen size etc.
2, server generates the version graph e-book with Crypted password matched with user terminal with uniqueness according to user terminal relevant information.
Particularly, in the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
As shown in Figure 2, in the display page of a text, setting pattern " ■ " can be set for the end of stroke in the literature, suppose to set the stem that pattern " ■ " is arranged at stroke to represent " 1 ", the afterbody that setting pattern " ■ " is arranged at stroke represents " 0 ", then according to the value on each bit of binary message corresponding to the identification information of user terminal, the word in text can be selected successively to carry out setting the setting of pattern, represents the identification information of this user terminal.As shown in Figure 2, the identification information of three selected textual representation is " 010 ".It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the word being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
Or as the setting means of another kind of graphical passwords, the setting position, non-legible place in the character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
As shown in Figure 3, the password setting mode shown in the manner with Fig. 2 is substantially identical, and difference is, watches text for not affecting user, only arranges setting pattern at the non-legible place of the character background of text, identifies encrypted message to be identified with this.
Suppose that the non-legible place of the first half of the character background at described text arranges described setting pattern and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; The identification information that graphical passwords then shown in Fig. 3 is corresponding is " 010 ".
As a kind of implementation, the setting of setting pattern also can carry out the binary message of identifying subscriber terminal by the left-right parts being arranged on character background.
It should be noted that, the word of selected setting pattern to be placed can be continuous print, also can be discrete.If selected word is discrete, then successively by the binary number represented by the character background being provided with identification information successively along connecing, the identification information of user terminal can be determined.
For increasing the complexity of graphical passwords, in a text, multiple patterns can be selected as the pattern of cipher graphic.This different setting pattern can occur in a page.
3, this version graph e-book is handed down to corresponding user terminal by server.
4, user terminal by the figure display after these encryptions on the screen of the subscriber terminal.
5, content publisher (as content supplier or operator) according to the Cryptographic of correspondence, can identify the user ID (as cell-phone number) having this graphics electronic book
Fig. 7 is the composition structural representation of the text encryption device of the embodiment of the present invention, and as shown in Figure 7, the text encryption device of this example comprises: receiving element 70, ciphering unit 71, first converting unit 72 and output unit 73, wherein:
Receiving element 70, for receiving the text that network side sends;
Ciphering unit 71, for utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit 72, for being converted to graphic file by described text and described Cryptographic;
Output unit 73, for exporting described graphic file.
On the basis of the text encryption device shown in Fig. 7, the text encryption device of the embodiment of the present invention also comprises:
Second converting unit (not shown in Fig. 7), for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit 71, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
In the embodiment of the present invention, described ciphering unit 71, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Or, in the embodiment of the present invention, described ciphering unit 71, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
In the embodiment of the present invention, the setting pattern arranged in different literals in one text file is identical or different.
It will be appreciated by those skilled in the art that the practical function of each processing unit in the text encryption device shown in Fig. 7 can refer to the description of the related embodiment of aforementioned texts encryption method and understands.It will be appreciated by those skilled in the art that the function of each processing unit in the text encryption device shown in Fig. 7 realizes by the program run on processor, also realize by concrete logical circuit.
Fig. 8 is another composition structural representation of the text encryption device of the embodiment of the present invention, and as shown in Figure 8, the text encryption device of this example comprises: ciphering unit 80, first converting unit 81 and transmitting element 82, wherein:
Ciphering unit 80, for when sending text file to user terminal, utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit 81, for being converted to graphic file by described text and described Cryptographic;
Transmitting element 82, for sending described graphic file to described user terminal.
On the basis of the text encryption device shown in Fig. 8, the text encryption device of the embodiment of the present invention also comprises:
Second converting unit (not shown in Fig. 8), for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit 80, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
In the embodiment of the present invention, described ciphering unit 80, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
Or, in the embodiment of the present invention, described ciphering unit 80, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
In the embodiment of the present invention, the setting pattern arranged in different literals in one text file is identical or different.
It will be appreciated by those skilled in the art that the practical function of each processing unit in the text encryption device shown in Fig. 8 can refer to the description of the related embodiment of aforementioned texts encryption method and understands.It will be appreciated by those skilled in the art that the function of each processing unit in the text encryption device shown in Fig. 8 realizes by the program run on processor, also realize by concrete logical circuit.
Between technical scheme described in the embodiment of the present invention, when not conflicting, can combination in any.
In several embodiment provided by the present invention, should be understood that, disclosed method, device and electronic equipment, can realize by another way.Apparatus embodiments described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, and as: multiple unit or assembly can be in conjunction with, maybe can be integrated into another system, or some features can be ignored, or do not perform.In addition, the coupling each other of shown or discussed each ingredient or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of equipment or unit or communication connection can be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, also can be distributed in multiple network element; Part or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can all be integrated in a processing unit, also can be each unit individually as a unit, also can two or more unit in a unit integrated; Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that hardware also can be adopted to add application function unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: movable storage device, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
Or, if the above-mentioned integrated unit of the embodiment of the present invention using the form of applied function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme of the embodiment of the present invention can embody with the form of application product the part that prior art contributes in essence in other words, these computer application products are stored in a storage medium, comprise some instructions and perform all or part of of method described in each embodiment of the present invention in order to make a computer equipment (can be personal computer, server or the network equipment etc.).And aforesaid storage medium comprises: movable storage device, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
Protection scope of the present invention is not limited thereto, and is familiar with those skilled in the art in the technical scope that the present invention discloses, and can expect change easily or replace, all should be encompassed within protection scope of the present invention.

Claims (20)

1. a text encryption method, is characterized in that, described method comprises:
User terminal utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic after receiving the text of network side transmission;
Described text and described Cryptographic are converted to graphic file and export.
2. method according to claim 1, is characterized in that, describedly utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data;
By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
3. method according to claim 2, is characterized in that, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
4. method according to claim 2, is characterized in that, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
5. the method according to claim 3 or 4, is characterized in that,
The setting pattern arranged in different literals in one text file is identical or different.
6. a text encryption method, is characterized in that, described method comprises:
When network side sends text file to user terminal, utilize the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
Described text and described Cryptographic are converted to graphic file, and described graphic file is sent to described user terminal.
7. method according to claim 6, is characterized in that, describedly utilizes the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic, comprising:
The identification information of described user terminal or identification information are converted to binary data;
By setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
8. method according to claim 7, is characterized in that, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
9. method according to claim 7, is characterized in that, described pressing on described text sets the form of the rules Cryptographic, and described Cryptographic characterizes described binary data, comprising:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
10. method according to claim 8 or claim 9, is characterized in that,
The setting pattern arranged in different literals in one text file is identical or different.
11. 1 kinds of text encryption devices, is characterized in that, described device comprises: receiving element, ciphering unit, the first converting unit and output unit, wherein:
Receiving element, for receiving the text that network side sends;
Ciphering unit, for utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit, for being converted to graphic file by described text and described Cryptographic;
Output unit, for exporting described graphic file.
12. devices according to claim 11, is characterized in that, described device also comprises:
Second converting unit, for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
13. devices according to claim 12, is characterized in that, described ciphering unit, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
14. devices according to claim 12, is characterized in that, described ciphering unit, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
15. devices according to claim 13 or 14, is characterized in that,
The setting pattern arranged in different literals in one text file is identical or different.
16. 1 kinds of text encryption devices, is characterized in that, described device comprises: ciphering unit, the first converting unit and transmitting element, wherein:
Ciphering unit, for when sending text file to user terminal, utilizing the setting section information in the identification information of described user terminal or identification information to be encrypted described text, described text generates unique Cryptographic;
First converting unit, for being converted to graphic file by described text and described Cryptographic;
Transmitting element, for sending described graphic file to described user terminal.
17. devices according to claim 16, is characterized in that, described device also comprises:
Second converting unit, for being converted to binary data by the identification information of described user terminal or identification information;
Described ciphering unit, also for pressing setting the form of the rules Cryptographic on described text, described Cryptographic characterizes described binary data.
18. devices according to claim 17, is characterized in that, described ciphering unit, also for:
In the more than one stroke of the word segment in described text, the end of at least one stroke of Stochastic choice arranges setting pattern;
Wherein, the afterbody of at least one stroke described arranges described setting pattern and represents " 0 ", and the stem of at least one stroke described arranges described setting pattern and represents " 1 "; Or the afterbody of at least one stroke described arranges described setting pattern and represents " 1 ", the stem of at least one stroke described arranges described setting pattern and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order afterbody of at least one stroke described in selected word in described binary data.
19. devices according to claim 17, is characterized in that, described ciphering unit, also for:
Setting position, non-legible place in character background in described text arranges setting pattern;
Wherein, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the first half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the latter half of the character background of described text and represents " 0 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 0 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 1 "; Or, described setting pattern is set at the non-legible place of the left-half of the character background of described text and represents " 1 ", described setting pattern is set at the non-legible place of the right half part of the character background of described text and represents " 0 ";
The word of Stochastic choice and described binary data number on word in described text, arranges described setting pattern by the bit order correspondence position at non-legible place in selected character background in described binary data.
20. devices according to claim 18 or 19, is characterized in that,
The setting pattern arranged in different literals in one text file is identical or different.
CN201410432993.XA 2014-08-28 2014-08-28 Text encryption method and device Pending CN105447401A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410432993.XA CN105447401A (en) 2014-08-28 2014-08-28 Text encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410432993.XA CN105447401A (en) 2014-08-28 2014-08-28 Text encryption method and device

Publications (1)

Publication Number Publication Date
CN105447401A true CN105447401A (en) 2016-03-30

Family

ID=55557564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410432993.XA Pending CN105447401A (en) 2014-08-28 2014-08-28 Text encryption method and device

Country Status (1)

Country Link
CN (1) CN105447401A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN110674489A (en) * 2019-09-12 2020-01-10 维沃移动通信有限公司 Encryption method and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102867157A (en) * 2012-09-11 2013-01-09 东莞宇龙通信科技有限公司 Mobile terminal and data protecting method
CN103092991A (en) * 2013-02-08 2013-05-08 宁波江丰生物信息技术有限公司 Image information processing method and device and image displaying method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102867157A (en) * 2012-09-11 2013-01-09 东莞宇龙通信科技有限公司 Mobile terminal and data protecting method
CN103092991A (en) * 2013-02-08 2013-05-08 宁波江丰生物信息技术有限公司 Image information processing method and device and image displaying method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN110674489A (en) * 2019-09-12 2020-01-10 维沃移动通信有限公司 Encryption method and mobile terminal

Similar Documents

Publication Publication Date Title
CN101923660B (en) Dynamic password identity authorization system and method based on RFID
DE102012219618B4 (en) A method of creating a soft token, computer program product, and service computer system
CN103906054A (en) Method and system for authorization of software function modules of internet of things
CN107181714A (en) Verification method and device, the generation method of service code and device based on service code
CN103020682B (en) Books Quick Response Code identification generation apparatus, Quick Response Code identification recognition device and system
CN102799803A (en) Secure removable media and method for managing the same
CN110210591B (en) Writing method of intelligent IC card personalized data, computer device and computer readable storage medium
CN101578608B (en) Methods and apparatuses for accessing content based on a session ticket
CN1997953A (en) Method and device for protecting digital content in mobile applications
CN103888475B (en) A kind of guard method and device to multi-medium data
CN104766113A (en) Plain and secret code type anti-fake label and anti-fake method thereof
CN109635610A (en) The read-write system and method for RFID tag data
CN102819704A (en) Document copyright protection method for intelligent terminal
CN104794626A (en) Anti-counterfeiting method and anti-counterfeiting device based on hardware information
CN103592927A (en) Method for binding product server and service function through license
CN105447401A (en) Text encryption method and device
CN102222195A (en) E-book reading method and system
CN111984989A (en) Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)
CN104102859A (en) JavaScript-based middleware authorization method and device
CN104462872A (en) Terminal, server and authorization method of digital contents
CN102855419A (en) Copyright protection method for data files of intelligent terminals
CN107026841B (en) Method and device for publishing works in network
CN101727547A (en) Device and method used for protecting DRM license file
CN104348800A (en) Method and device for generating and using digital content certificate
CN109150813A (en) A kind of verification method and device of equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330

RJ01 Rejection of invention patent application after publication