CN106788995A - File encrypting method and device - Google Patents

File encrypting method and device Download PDF

Info

Publication number
CN106788995A
CN106788995A CN201611118321.7A CN201611118321A CN106788995A CN 106788995 A CN106788995 A CN 106788995A CN 201611118321 A CN201611118321 A CN 201611118321A CN 106788995 A CN106788995 A CN 106788995A
Authority
CN
China
Prior art keywords
character
file
string
encrypted
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611118321.7A
Other languages
Chinese (zh)
Other versions
CN106788995B (en
Inventor
丁鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201611118321.7A priority Critical patent/CN106788995B/en
Publication of CN106788995A publication Critical patent/CN106788995A/en
Application granted granted Critical
Publication of CN106788995B publication Critical patent/CN106788995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The present invention provides a kind of file encrypting method and device, belongs to technical field of data security.The method includes:The encrypted characters string of acquisition first object file to be encrypted and user input;Encrypted characters string is parsed, encryption key is generated according to analysis result;Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted, the data after encryption are written in the encryption file of preservation.The present invention is by obtaining the encrypted characters string of first object file to be encrypted and user input.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted.Because encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character species of input is more various, thus the encryption key of correspondence generation to crack difficulty larger.Therefore, the security of file encryption is higher.

Description

File encrypting method and device
Technical field
The present invention relates to technical field of data security, more particularly, to a kind of file encrypting method and device.
Background technology
With the fast development of computer networking technology and information technology, the digitlization industry such as ecommerce is just alive Emerged rapidly in the range of boundary.Either government, enterprise or individual, in storage medium during storage file, are required for some Vital document is encrypted, to prevent information leakage.Therefore, it is problem of concern how file to be encrypted.It is existing File encrypting method be mainly by be pre-stored encryption key file is encrypted, the data after being encrypted.Accordingly Ground, decrypting process be mainly by be pre-stored decruption key the data after encryption are decrypted, the file after being decrypted. Wherein, encryption key is consistent with decruption key.
Realize it is of the invention during, find prior art at least there is problems with:Because encryption key is advance The fixed character of storage, related cracker is easy to invasion mobile terminal to obtain pre-stored encryption key, and according to encryption The first data after key pair encryption are cracked and are stolen the file after encryption, so as to cause fileinfo to be revealed.Therefore, text The security of part encryption is not high.
The content of the invention
The present invention provide it is a kind of overcome above mentioned problem or the file encrypting method that solves the above problems at least in part and Device.
According to an aspect of the present invention, there is provided a kind of file encrypting method, the method includes:
The encrypted characters string of acquisition first object file to be encrypted and user input;
Encrypted characters string is parsed, encryption key is generated according to analysis result;
Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted, after encryption Data be written in the encryption file of preservation.
According to another aspect of the present invention, there is provided a kind of document encrypting apparatus, the device includes:
First acquisition module, the encrypted characters string for obtaining first object file to be encrypted and user input;
Parsing module, for being parsed to encrypted characters string, encryption key is generated according to analysis result;
Encrypting module, for based on encryption key, the corresponding file stream of first object file is added into encryption stream to be carried out Encryption, the data after encryption are written in the encryption file of preservation.
The beneficial effect brought of technical scheme that the application is proposed is:
By the encrypted characters string for obtaining first object file to be encrypted and user input.Encrypted characters string is solved Analysis, encryption key is generated according to analysis result.Based on encryption key, the corresponding file stream of first object file is added to encryption Stream is encrypted, and the data after encryption are written in the encryption file of preservation.Because encrypted characters string is user input, and User be input into encrypted characters string when thinking randomness it is larger, and input character species it is more various so that correspondence generation plus It is larger that key cracks difficulty.Further, since preset kind expression character can be added in user inputs character, such as emoji expressions, So that the encryption key of correspondence generation to crack difficulty bigger.Therefore, the security of file encryption is higher.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of file encrypting method of the embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet of file encrypting method of the embodiment of the present invention;
Fig. 3 is a kind of structural representation of document encrypting apparatus of the embodiment of the present invention;
Fig. 4 is a kind of structural representation of document encrypting apparatus of the embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiment of the invention is described in further detail.Hereinafter implement Example is not limited to the scope of the present invention for illustrating the present invention.
Existing file encryption process be mainly by be pre-stored encryption key file is encrypted, after being encrypted Data.Correspondingly, when being decrypted to file, the data after encryption are decrypted by pre-stored decruption key. Wherein, pre-stored encryption key by English character set in advance or can be digitally generated, encryption key and decruption key one Cause.Due to encryption key and decruption key by terminal locally preserving, and encryption key and decruption key are by set in advance Fixed character is generated, so as to cause related cracker easily to invade mobile terminal to obtain pre-stored encryption key, and According to encryption key to encryption after the first data cracked and stolen encryption after file, so as to cause fileinfo to be let out Dew.Therefore, the security of file encryption is not high
For the problems of the prior art, a kind of file encrypting method is the embodiment of the invention provides.It should be noted that The file encrypting method that the present embodiment and subsequent embodiment are provided, and the corresponding file decryption method of the encryption method can be fitted For any type terminal, including but not limited to mobile terminal or the local terminal with processing function, the present embodiment and follow-up Embodiment is not especially limited to this.It is of a relatively high in view of nowadays mobile terminal utilization rate, the present embodiment and subsequent implementation The terminal that example is previously mentioned can all refer to mobile terminal.Mobile terminal may include mobile phone, panel computer and intelligent watch etc., this implementation Example is not especially limited to this.
Further, since be provided with different operating systems on mobile terminal so that for convenience of description, the present embodiment and after Continuous embodiment is mainly to file encrypting method in android system, and the corresponding file decryption side of this document encryption method Method is illustrated.Certainly, other operating systems such as IOS, file encryption or file decryption side that the present embodiment that can also sample is provided Method, only need to correspond to modification realizes code, and the present embodiment is not especially limited to this.
Referring to Fig. 1, the method flow that the present embodiment is provided includes:101st, first object file and user to be encrypted is obtained The encrypted characters string of input;102nd, encrypted characters string is parsed, encryption key is generated according to analysis result;103rd, based on plus Key, is added to the corresponding file stream of first object file encryption stream and is encrypted, and the data after encryption are written into guarantor In the encryption file deposited.
Method provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption Security it is higher.
As a kind of alternative embodiment, first object file to be encrypted is obtained, including:
File selection instruction according to user input, obtains file address character string;
In the presence of the corresponding file of file address character string is detected, the corresponding data class of file address character string is obtained Type;
When character string corresponding data type in file address is file, the corresponding file of file address character string is obtained, And as first object file to be encrypted.
As a kind of alternative embodiment, encrypted characters string is parsed, key is generated according to analysis result, including:
Obtain the corresponding preset kind coding of each character in encrypted characters string;
According to the corresponding preset kind coding generation encryption key of each character.
As a kind of alternative embodiment, the corresponding preset kind coding of each character in encrypted characters string is obtained, including:
Any character in for encrypted characters string, judges whether any character is preset kind expression character;
When any character is for default expression type character, the preset kind coding of any character is obtained.
As a kind of alternative embodiment, judge whether any character is preset kind expression character, including:
Obtain the coding information of any character;
When coding information within a preset range when, determine any character for preset kind express one's feelings character;
When coding information not within a preset range when, determine any character for preset kind express one's feelings character.
As a kind of alternative embodiment, according to the corresponding preset kind coding generation encryption key of each character, including:
The corresponding preset kind coding of each character is spliced, key string is obtained;
Choose the character in key string;
Character to choosing splices, and obtains encryption key.
As a kind of alternative embodiment, the character in key string is chosen, including:
Obtain the corresponding predetermined interval of key string;
According to predetermined interval, predetermined number character is chosen from key string.
Used as a kind of alternative embodiment, preset kind expresses one's feelings character for emoji expresses one's feelings, and preset kind is encoded to unicode Coding, is parsed to encrypted characters string, and encryption key is generated according to analysis result, including:
For any character in encrypted characters string, when the corresponding coding information of any character between 0xd800 and 0xdbff it Between, or between 0x2100 and 0x27ff and when being not equal to 0x263b, expressed one's feelings any character as emoji, and obtain Corresponding unicode codings, corresponding unicode codings are deposited into unicode character strings;
When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, the unicode that will be changed Coding is deposited into unicode character strings;
The predetermined interval of user input is obtained, according to predetermined interval, character is chosen from unicode character strings;
Each character selected is spliced according to the character sequence selected, obtains encryption key.
As a kind of alternative embodiment, by encryption key, after being encrypted to first object file, also include:
The decryption character string of acquisition the second file destination to be decrypted and user input;
When the encryption file that the second file destination is generated by first object file, character string and encrypted characters will be decrypted String is compared;
When decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, according to corresponding parsing knot Fruit generation decruption key;
According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will decryption File stream is written in the decryption file of preservation.
As a kind of alternative embodiment, after decryption character string and encrypted characters string are compared, also include:
When decrypting character string and being inconsistent with encrypted characters string, user file decryption failure is pointed out.
As a kind of alternative embodiment, will also include before decryption file stream is written in the decryption file of preservation:
The decryption file for obtaining user's selection preserves address;
According to taking up room for the second file destination, estimate that corresponding decryption file takes up room;
Decryption file is preserved the corresponding memory space in address and taken up room with decryption file and is compared;
When decryption file takes up room more than memory space, user is pointed out the memory space inadequate of selection.
Above-mentioned all optional technical schemes, can form alternative embodiment of the invention, herein no longer using any combination Repeat one by one.
Due to being easy to be cracked according to fixed character generation encryption key, and it is based on user's thinking randomness and character kind The diversity of class, the encrypted characters string of generation is corresponding, and to crack difficulty larger.It is real based on above-mentioned Fig. 1 correspondences according to above-mentioned theory The content in example is applied, a kind of file encrypting method and file decryption method is the embodiment of the invention provides, below to the text of terminal Part ciphering process and corresponding file decryption process are specifically addressed.
Referring to Fig. 2, the method flow that the present embodiment is provided includes:201st, first object file and user to be encrypted is obtained The encrypted characters string of input;202nd, encrypted characters string is parsed, encryption key is generated according to analysis result;203rd, based on plus Key, is added to the corresponding file stream of first object file encryption stream and is encrypted, and the data after encryption are written into guarantor In the encryption file deposited;204th, the decryption character string of acquisition the second file destination to be decrypted and user input;205th, when second During the encryption file that file destination is generated by first object file, decryption character string is compared with encrypted characters string; 206th, when decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, is given birth to according to corresponding analysis result Into decruption key;207th, according to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and Decryption file stream is written in the decryption file of preservation.
Wherein, 201 the encrypted characters string of first object file to be encrypted and user input, is obtained.
Because the file that terminal is commonly stored is more, so as to one to be encrypted first can be obtained before this step is performed File destination.Mode of the present embodiment not to obtaining first object file to be encrypted makees specific restriction, including but not limited to:Root According to the file selection instruction of user input, file address character string is obtained;When detecting the corresponding file of file address character string In the presence of, obtain the corresponding data type of file address character string;When character string corresponding data type in file address is file When, the corresponding file of file address character string is obtained, and as first object file to be encrypted.
Specifically, user can be carried by terminal system file browser selects a file.Correspondingly, terminal root According to the file selection instruction of user input, a file address character string can be obtained.Wherein, file address character string is corresponding interior Appearance can be the file directory information where file, and the present embodiment does not make specific restriction to the content of file address character string. In android system, by the way that corresponding file address word during user's select file can be obtained in onActivityResult methods Symbol string.
Due to that when file is obtained according to file address, may there is fortuitous event and file cannot be obtained, so that eventually End can first detect that character string corresponding file in file address whether there is after file address character string is got.In Android In system, a File object can be created according to file address character string, perform exists methods by the File objects to sentence Disconnected file whether there is.When exists methods return be false when, represent file do not exist.When the return of exists methods During true, show that file is present.
In the presence of the corresponding file of file address character string is detected, because what the present embodiment was directed to is mainly to one File is encrypted, so as to after the corresponding file presence of file address character string is detected, can also further judge text It is a file or a file that part address character string is corresponding, and the present embodiment is not especially limited to this.Specifically, may be used The corresponding data type of file address character string is obtained, when character string corresponding data type in file address is file, can be again Obtain the corresponding file of file address character string.In android system, isDirectory side can be performed by File objects Method judges whether this document is file.When isDirectory methods return be false when, represent this document for text Part is pressed from both sides.As the true that isDirectory methods are returned, show that this document is file.
After first object file to be encrypted is got, the encrypted characters string of user input can be obtained.Wherein, encrypted word Symbol string can be arbitrary string, and its content for including may include letter, word, numeral, Chinese, foreign language and preset kind expression Character etc., the present embodiment does not make specific restriction to the content of encrypted characters string, and also the length not to encrypted characters string makees specific limit It is fixed.Preset kind expression character can be that emoji expresses one's feelings or the expression that carry of instant messaging application etc., the present embodiment to this not Make specific restriction.
Wherein, the visual emotion symbol that emoji expressions are used in wireless communications for Japan, at present by most of existing Adopt for the compatible Unicode codings of computer system, and be widely used in various SMSs and social networks.Compare Fixed character of the prior art or fixed character string, due to user, when encrypted characters string is input into, thinking randomness is larger, and The character species of input is more various, larger so as to crack difficulty.In addition, the encrypted characters string for adding emoji expressions is corresponding Crack difficulty then bigger.Correspondingly, the security of file encryption is also higher.
Wherein, 202, encrypted characters string is parsed, encryption key is generated according to analysis result.
Because encryption key is typically one group of binary system or hexadecimal coding, so as to be encrypted it to file It is preceding, it is necessary to first be parsed to the encrypted characters string comprising all kinds character.On being parsed to encrypted characters string, according to The mode that analysis result generation encryption key is parsed, the present embodiment is not especially limited to this, including but not limited to:Obtain The corresponding preset kind coding of each character in encrypted characters string;According to the corresponding preset kind coding generation encryption of each character Key.
When the corresponding preset kind of each character is encoded in obtaining encrypted characters string, due to both existing in encrypted characters string The recognizable character of terminal, such as Chinese, alphabetical and numeral, also exist terminal cannot Direct Recognition character, such as emoji tables Feelings, thus can first allow terminal judges go out those cannot Direct Recognition character.Correspondingly, the present embodiment is not to obtaining encrypted characters The mode of the corresponding preset kind coding of each character makees specific restriction in string, including but not limited to:For in encrypted characters string Any character, judge any character whether be preset kind expression character;When any character is for default expression type character, Obtain the preset kind coding of any character.
The coding information of fixed range is generally corresponds in the terminal due to preset kind expression character, so that can be according to volume Code information, allows terminal to can recognize that default expression type character.Correspondingly, the present embodiment not to judge any character whether be The mode of preset kind expression character makees specific restriction, including but not limited to:Obtain the coding information of any character;When coding is believed Cease when within a preset range, determine that any character is preset kind expression character;When coding information not within a preset range when, really Fixed any character is not preset kind expression character.
For example, so that default expression type character is emoji expressions as an example.Because the coding information of emoji expressions is generally situated between Between 0xd800 and 0xdbff, so as to when the coding information of any character is between the two 16 binary datas, then the word Accord with as emoji expresses one's feelings.Correspondingly, preset range is 0xd800 to 0xdbff.
It should be noted that because emoji expressions are real-time updates, increasing the corresponding coding information of emoji expressions newly can Can not between 0xd800 and 0xdbff, so that the latest data that can be expressed one's feelings according to emoji when being embodied determines accordingly Preset range and deterministic process, the present embodiment are not especially limited to this.It is with the partial data that emoji expressions are newly-increased recently Example, when the coding information of any character is judged not between 0xd800 and 0xdbff, can carry out secondary judgement, that is, judge the word Whether the coding information of symbol judges whether to be equal to 0x263b between 0x2100 and 0x27ff.When the coding information of the character Between 0x2100 and 0x27ff, and the coding information of the character when being not equal to 0x263b, then the character is emoji expressions.When The character is not in above-mentioned preset range or when being unsatisfactory for above-mentioned Rule of judgment, it may be determined that the character is not expressed one's feelings for emoji, i.e., The character is can be by the Chinese, digital and alphabetical etc. of terminal Direct Recognition.
When any character is for default expression type character, can direct access preset the preset kind of expression type character and compile Code.When any character is not for default expression type character, the character can be converted to corresponding preset kind coding.Wherein, Preset kind coding can be unicode codings or UTF-8 etc., and the present embodiment is not especially limited to this.
Due to that may there are multiple default expression type characters in encrypted characters string, and multiple default expression type words can Different position in encrypted characters string can be in, so as to after the preset kind coding for getting default expression type character, And each preset table can be recorded by preset kind code storage to an interim character string of each default expression type character Feelings type character location in encrypted characters string.Non-default expression class type-word in accordingly for encrypted characters string Symbol, also by the preset kind code storage after conversion to the interim character string, and can simultaneously record each non-default expression class Ocra font ocr location in encrypted characters string.By said process, can be easy to subsequently multiple preset kinds are encoded into Row splicing, the present embodiment is not especially limited to this.
Based on above-mentioned resolving, after the corresponding preset kind coding of each character in getting encrypted characters string, can According to the corresponding preset kind coding generation encryption key of each character.The present embodiment is not to corresponding default according to each character The mode of type coding generation encryption key makees specific restriction, including but not limited to:The corresponding preset kind of each character is compiled Code is spliced, and obtains key string;Choose the character in key string;Character to choosing splices, and is added Key.
From above-mentioned resolving, preset kind expression character and non-default expression type character institute in encrypted characters string The position at place is typically what is staggered.Therefore, when splicing to the corresponding preset kind coding of each character, will first can preset The corresponding preset kind coding of type expression character is spliced, and obtains the first sub-key character string.By non-default type expression The corresponding preset kind coding of character is spliced, and obtains the second sub-key character string.By the first sub-key character string and second Sub-key character string is spliced, and obtains key string.Wherein, the first sub-key character string is above, the second sub-key word Symbol string is later.Or, later, above, the present embodiment is not to word for the second sub-key character string for the first sub-key character string Symbol string splicing order makees specific restriction
Timing when preferably, in order to embody user input encrypted characters string between character, can be based in said process Each character of record location in encrypted characters string, splices to the corresponding preset kind coding of each character, The present embodiment is not especially limited to this.
After key string is obtained, it is made up of preset kind coding because key string is mainly, such as unicode is compiled Code, word length is long, so as in order to reduce follow-up amount of calculation and improve calculating speed, can first choosing key string Character.After a number of character is filtered out, then to choose character splice, obtain encryption key.
Mode of the present embodiment not to choosing the character in key string makees specific restriction, including but not limited to:Obtain The predetermined number of character in encryption key;According to predetermined interval, predetermined number character is chosen from key string.Wherein, Predetermined number be choose key string in character when the character quantity to be chosen.Predetermined number can be by user input, i.e., Determined to choose the number of character by user, the present embodiment is not especially limited this.In addition, predetermined interval also can be defeated by user Enter, the length of predetermined interval can be 1, and the present embodiment is not especially limited to this.
By above-mentioned selection process, because after the character in choosing key string, the encryption key that splicing is obtained is What be contacted by without through the encrypted characters string with user input, so that cracker is made instantly available encrypted characters string, it is also difficult to broken Solve encryption key.Thinking randomness and character diversity during the user inputs character being previously mentioned based on said process, from close The process that character generates encryption key is chosen in key character string, the security of subsequent file encryption can be further improved.
In order to make it easy to understand, with reference to the above, expressing one's feelings character as emoji expresses one's feelings with preset kind, preset kind coding As a example by unicode codings.Encrypted characters string is parsed, the specific implementation of encryption key is generated according to analysis result Can be as follows:For any character in encrypted characters string, when the corresponding coding information of any character between 0xd800 and 0xdbff it Between, or between 0x2100 and 0x27ff and when being not equal to 0x263b, expressed one's feelings any character as emoji, and obtain Corresponding unicode codings, corresponding unicode codings are deposited into unicode character strings;When any character is not When emoji expresses one's feelings, any character is converted into unicode codings, the unicode codings of conversion are deposited into unicode characters In string;The predetermined interval of user input is obtained, according to predetermined interval, character is chosen from unicode character strings;According to what is selected Character sequence is spliced to each character selected, and obtains encryption key.
Wherein, 203, based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted, Data after encryption are written in the encryption file of preservation.
The AES that this step is used can be DSE arithmetic AES, and the present embodiment is not made specifically to this Limit.In android system, the ciphering process can use following code to realize:
Said process mainly first creates an encryption class using Cipher, and incoming using this.Key as parameter.Its In, DES represents DSE arithmetic AES, and this.key represents the encryption key generated in above-mentioned steps 202.The key After being write, file stream can be started.File stream is added in encryption stream CipherInputStream and is encrypted, and will Data after encryption are written in the file of preservation.Finally, preserve the file for obtaining and be the first object file after encryption.
In view of after being encrypted to file, user may also need to be decrypted file when file is read, from And the present embodiment additionally provides a kind of file decryption method, detailed process refers to subsequent step 204 to the content in step 207.
Wherein, 204 the decryption character string of the second file destination to be decrypted and user input, is obtained.
This step the second file destination to be decrypted can be the first object file after being encrypted in above-mentioned steps 203, Can be other file destinations according to above-mentioned steps 201 to the method in step 203 after encrypted, the present embodiment is not made to this It is specific to limit.In the decryption character string of acquisition the second file destination to be decrypted and user input, above-mentioned steps 201 are referred to The middle mode for obtaining first object file and encrypted characters string, here is omitted.
Wherein, 205, when the encryption file that the second file destination is generated by first object file, character string will be decrypted Compare with encrypted characters string.
When the encryption file that the second file destination is generated by first object file, due to using symmetric cryptography machine AES processed, so that the decryption character string of user input is, it is necessary to long with the encrypted characters string of user input in above-mentioned steps 201 Degree is identical and content is consistent, to ensure successful decryption.Therefore, this step needs to be compared decryption character string with encrypted characters string It is right, it is ensured that whether decryption character string is consistent with encrypted characters string.
Wherein, 206, when decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, according to correspondingly Analysis result generation decruption key.
Due to the encrypted characters string not encryption key of user input in above-mentioned steps 201, but encrypted characters string is entered Row parsing, according to the encryption key that analysis result is generated, simultaneously because encryption key is consistent with decruption key needs, so as at this Decryption character string can be parsed according to identical process in above-mentioned steps 202 in step, given birth to according to corresponding analysis result Into decruption key.
It should be noted that when decrypting character string and being inconsistent with encrypted characters string, user file can be pointed out to decrypt failure. Now user repeats above-mentioned steps 204 and subsequent step, and the present embodiment is not especially limited to this.
Wherein, 207, according to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, And decryption file stream is written in the decryption file of preservation.
Based on the content in above-mentioned steps 203, this step equally can be using DSE arithmetic AES to the second mesh Mark file is decrypted, and the present embodiment is not especially limited to this.In android system, the decrypting process can use following generation Code is realized:
Said process is mainly one des method Cipher of initialization, by establishment file stream and by file stream and decryption Information is incoming together, generates a file stream for decryption and is written in file.When the decryption character-string error of input, solve The meeting for coming is mess code.Correspondingly, the meaningless file that a user cannot use can be generated.When decrypting character string and being correct, then A decryption file can be generated, this document is the final required file of user.
It should be noted that deposited because the file for after to file decryption, decrypting is also required to particular location, So as to before decryption file stream is written in the decryption file of preservation, the decryption file that can also obtain user's selection is preserved Address;According to taking up room for the second file destination, estimate that corresponding decryption file takes up room;Decryption file is preserved into address Corresponding memory space takes up room with decryption file and compares;When decryption file takes up room more than memory space, carry Show the memory space inadequate of user's selection.
Wherein, decryption file is preserved address and can be specified by select file directory path by user, the present embodiment This is not especially limited.When decryption file takes up room no more than memory space, it is decrypted to the second file destination After obtaining decryption file, decryption file can be stored in preserving the corresponding memory space in address to decryption file.
By way of decryption character string being input into above-mentioned steps 204 to step 207 file is decrypted, except knowing Outside the user of encrypted characters string, other people cannot obtain corresponding decryption character string, and cannot otherwise solve ciphertext Part such that it is able to improve the security of file encryption.
Method provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption Security it is higher.
Further, since when encryption key is generated according to key string, can be screened according to the character number of user input Going out a number of character splice obtaining encryption key such that it is able to reduces the complexity of encryption key, and then subsequently exists During according to encryption keys file, follow-up amount of calculation can be reduced and follow-up calculating speed is improved.Therefore, encryption effect can be improved Rate.
Again, due to after the character in choosing key string, the encryption key that obtains of splicing with user input Encrypted characters string contacted by without what so that cracker is made instantly available encrypted characters string, it is also difficult to crack out encryption key. Thinking randomness, character diversity, the length of encryption key and encryption key character in itself during based on user inputs character String sequentially, can further improve the security of subsequent file encryption.
Finally, by obtaining the decryption character string of the second file destination to be decrypted and user input, when the second target text During the encryption file that part is generated by first object file, decryption character string is compared with encrypted characters string.Work as decrypted word When symbol string is consistent with encrypted characters string, decryption character string is parsed, decruption key is generated according to corresponding analysis result.Root According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will the stream write-in of decryption file To in the decryption file for preserving.Because decryption file needs to be input into corresponding decryption character string, and except knowing encrypted characters string User outside, other people cannot obtain corresponding decryption character string, and cannot otherwise decrypt file, so as in text Part decrypts this aspect and can also improve the security of file.
A kind of document encrypting apparatus are the embodiment of the invention provides, the device is used to perform the corresponding realities of above-mentioned Fig. 1 or Fig. 2 Apply the file encrypting method that example is provided.Referring to Fig. 3, the device includes:
First acquisition module 301, the encrypted characters string for obtaining first object file to be encrypted and user input;
First parsing module 302, for being parsed to encrypted characters string, encryption key is generated according to analysis result;
Encrypting module 303, for based on encryption key, the corresponding file stream of first object file being added into encryption and being flowed into Row encryption, the data after encryption are written in the encryption file of preservation.
Used as a kind of alternative embodiment, the first acquisition module 301, for the file selection instruction according to user input, is obtained Take file address character string;In the presence of the corresponding file of file address character string is detected, file address character string pair is obtained The data type answered;When character string corresponding data type in file address is file, file address character string is obtained corresponding File, and as first object file to be encrypted.
As a kind of alternative embodiment, parsing module 302, including:
Acquiring unit, for obtaining the corresponding preset kind coding of each character in encrypted characters string;
Generation unit, for according to the corresponding preset kind coding generation encryption key of each character.
As a kind of alternative embodiment, acquiring unit, including:
Judgment sub-unit, for any character in for encrypted characters string, judges whether any character is preset kind Expression character;
Subelement is obtained, for when any character is for default expression type character, obtaining the preset kind of any character Coding.
As a kind of alternative embodiment, judgment sub-unit, the coding information for obtaining any character;When coding information exists When in preset range, determine that any character is preset kind expression character;When coding information not within a preset range when, it is determined that appoint One character is not preset kind expression character.
As a kind of alternative embodiment, generation unit, including:
First splicing subelement, for splicing to the corresponding preset kind coding of each character, obtains key character String;
Subelement is chosen, for choosing the character in key string;
Second splicing subelement, for splicing to the character chosen, obtains encryption key.
As a kind of alternative embodiment, subelement, the predetermined number for obtaining character in encryption key are chosen;According to pre- If interval, predetermined number character is chosen from key string.
Used as a kind of alternative embodiment, preset kind expresses one's feelings character for emoji expresses one's feelings, and preset kind is encoded to unicode Coding, parsing module 302, for for any character in encrypted characters string, when the corresponding coding information of any character between Between 0xd800 and 0xdbff, or between 0x2100 and 0x27ff and when being not equal to 0x263b, using any character as Emoji is expressed one's feelings, and obtains corresponding unicode codings, and corresponding unicode codings are deposited into unicode character strings;When When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, the unicode codings of conversion are deposited into In unicode character strings;The predetermined interval of user input is obtained, according to predetermined interval, word is chosen from unicode character strings Symbol;Each character selected is spliced according to the character sequence selected, obtains encryption key.
Used as a kind of alternative embodiment, referring to Fig. 4, the device also includes:
Second acquisition module 304, the decryption character string for obtaining the second file destination to be decrypted and user input;
Comparing module 305, for when the encryption file that the second file destination is generated by first object file, will decrypt Character string is compared with encrypted characters string;
Second parsing module 306, for when decrypting character string and being consistent with encrypted characters string, being solved to decryption character string Analysis, decruption key is generated according to corresponding analysis result;
Deciphering module 307, according to the corresponding file stream of the second file destination and decruption key, generates corresponding decryption file Stream, and decryption file stream is written in the decryption file of preservation.
Device provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption Security it is higher.
Further, since when encryption key is generated according to key string, can be screened according to the character number of user input Going out a number of character splice obtaining encryption key such that it is able to reduces the complexity of encryption key, and then subsequently exists During according to encryption keys file, follow-up amount of calculation can be reduced and follow-up calculating speed is improved.Therefore, encryption effect can be improved Rate.
Again, due to after the character in choosing key string, the encryption key that obtains of splicing with user input Encrypted characters string contacted by without what so that cracker is made instantly available encrypted characters string, it is also difficult to crack out encryption key. Thinking randomness, character diversity, the length of encryption key and encryption key character in itself during based on user inputs character String sequentially, can further improve the security of subsequent file encryption.
Finally, by obtaining the decryption character string of the second file destination to be decrypted and user input, when the second target text During the encryption file that part is generated by first object file, decryption character string is compared with encrypted characters string.Work as decrypted word When symbol string is consistent with encrypted characters string, decryption character string is parsed, decruption key is generated according to corresponding analysis result.Root According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will the stream write-in of decryption file To in the decryption file for preserving.Because decryption file needs to be input into corresponding decryption character string, and except knowing encrypted characters string User outside, other people cannot obtain corresponding decryption character string, and cannot otherwise decrypt file, so as in text Part decrypts this aspect and can also improve the security of file.
Finally, the present processes are only preferably embodiment, are not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc. should be included in protection of the invention Within the scope of.

Claims (12)

1. a kind of file encrypting method, it is characterised in that methods described includes:
The encrypted characters string of acquisition first object file to be encrypted and user input;
The encrypted characters string is parsed, encryption key is generated according to analysis result;
Based on the encryption key, the corresponding file stream of the first object file is added to encryption stream and is encrypted, will added Data after close are written in the encryption file of preservation.
2. method according to claim 1, it is characterised in that acquisition first object file to be encrypted, including:
File selection instruction according to user input, obtains file address character string;
In the presence of the corresponding file of the file address character string is detected, the corresponding number of the file address character string is obtained According to type;
When the corresponding data type of the file address character string is file, the corresponding text of the file address character string is obtained Part, and as first object file to be encrypted.
3. method according to claim 1, it is characterised in that described to be parsed to the encrypted characters string, according to solution Analysis result generation key, including:
Obtain the corresponding preset kind coding of each character in the encrypted characters string;
According to the corresponding preset kind coding generation encryption key of each character.
4. method according to claim 3, it is characterised in that each character correspondence in the acquisition encrypted characters string Preset kind coding, including:
For any character in the encrypted characters string, judge whether any character is preset kind expression character;
When any character is for default expression type character, the preset kind coding of any character is obtained.
5. method according to claim 4, it is characterised in that described to judge whether any character is preset kind table Feelings character, including:
Obtain the coding information of any character;
When the coding information within a preset range when, determine any character for preset kind express one's feelings character;
When the coding information not within a preset range when, determine any character for preset kind express one's feelings character.
6. method according to claim 3, it is characterised in that described according to the corresponding preset kind coding life of each character Into encryption key, including:
The corresponding preset kind coding of each character is spliced, key string is obtained;
Choose the character in the key string;
Character to choosing splices, and obtains encryption key.
7. method according to claim 6, it is characterised in that the character in the selection key string, including:
Obtain the corresponding predetermined interval of the key string;
According to the predetermined interval, predetermined number character is chosen from the key string.
8. the method according to any claim in claim 1 to 7, it is characterised in that the preset kind is expressed one's feelings word Accord with as emoji expresses one's feelings, the preset kind is encoded to unicode codings, described that the encrypted characters string is parsed, according to Analysis result generates encryption key, including:
For any character in the encrypted characters string, when the corresponding coding information of any character between 0xd800 with Between 0xdbff, or between 0x2100 and 0x27ff and when being not equal to 0x263b, using any character as emoji Expression, and corresponding unicode codings are obtained, corresponding unicode codings are deposited into unicode character strings;
When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, by what is changed Unicode codings are deposited into the unicode character strings;
The predetermined interval of user input is obtained, according to the predetermined interval, character is chosen from the unicode character strings;
Each character selected is spliced according to the character sequence selected, obtains encryption key.
9. method according to claim 1, it is characterised in that described by the encryption key, to the first object After file is encrypted, also include:
The decryption character string of acquisition the second file destination to be decrypted and user input;
When the encryption file that second file destination is generated by the first object file, by it is described decryption character string with The encrypted characters string is compared;
When the decryption character string is consistent with the encrypted characters string, the decryption character string is parsed, according to correspondence Analysis result generation decruption key;
According to the corresponding file stream of second file destination and the decruption key, corresponding decryption file stream is generated, and will The decryption file stream is written in the decryption file of preservation.
10. method according to claim 9, it is characterised in that described by decryption character string and the encrypted characters After string is compared, also include:
When the decryption character string is inconsistent with the encrypted characters string, user file decryption failure is pointed out.
11. methods according to claim 9, it is characterised in that the solution that the decryption file stream is written to preservation Before in ciphertext part, also include:
The decryption file for obtaining user's selection preserves address;
According to taking up room for second file destination, estimate that corresponding decryption file takes up room;
The decryption file is preserved the corresponding memory space in address and taken up room with the decryption file and is compared;
When the decryption file takes up room more than the memory space, user is pointed out the memory space inadequate of selection.
12. a kind of document encrypting apparatus, it is characterised in that described device includes:
First acquisition module, the encrypted characters string for obtaining first object file to be encrypted and user input;
First parsing module, for being parsed to the encrypted characters string, encryption key is generated according to analysis result;
Encrypting module, for based on the encryption key, the corresponding file stream of the first object file being added into encryption stream It is encrypted, the data after encryption is written in the encryption file of preservation.
CN201611118321.7A 2016-12-07 2016-12-07 File encryption method and device Active CN106788995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611118321.7A CN106788995B (en) 2016-12-07 2016-12-07 File encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611118321.7A CN106788995B (en) 2016-12-07 2016-12-07 File encryption method and device

Publications (2)

Publication Number Publication Date
CN106788995A true CN106788995A (en) 2017-05-31
CN106788995B CN106788995B (en) 2020-09-04

Family

ID=58881270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611118321.7A Active CN106788995B (en) 2016-12-07 2016-12-07 File encryption method and device

Country Status (1)

Country Link
CN (1) CN106788995B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system
CN110414249A (en) * 2019-07-24 2019-11-05 Oppo广东移动通信有限公司 Information processing method, device, storage medium and electronic equipment
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN112217806A (en) * 2020-09-23 2021-01-12 深圳杰微芯片科技有限公司 Data transmission encryption method, server and storage medium
CN112968899A (en) * 2021-02-26 2021-06-15 上海掌门科技有限公司 Method and equipment for encrypted communication
CN113259438A (en) * 2021-05-14 2021-08-13 北京达佳互联信息技术有限公司 Method and device for sending model file and method and device for receiving model file
CN113468544A (en) * 2020-03-30 2021-10-01 杭州海康威视数字技术股份有限公司 Training method and device of application model
CN113642033A (en) * 2021-10-19 2021-11-12 太平金融科技服务(上海)有限公司深圳分公司 Encryption method, decryption method, device, equipment and storage medium
CN114340113A (en) * 2021-12-30 2022-04-12 智马达汽车有限公司 Information processing method and device based on vehicle light
CN114567676A (en) * 2022-03-14 2022-05-31 杭州电子科技大学 Private file container entry hiding method based on multi-level encryption

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217359A1 (en) * 2008-01-18 2009-08-27 Norifumi Kikkawa Connection authentication system, terminal apparaus, connection authentication server, connection authentication method, and program
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102983972A (en) * 2012-10-18 2013-03-20 郎六琪 Dynamic encryption and decryption method based on stream cipher
CN104320377A (en) * 2014-09-25 2015-01-28 华为技术有限公司 An anti-stealing-link method and device for stream media file
CN106022147A (en) * 2016-05-26 2016-10-12 珠海市魅族科技有限公司 Method and device for file encryption and decryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217359A1 (en) * 2008-01-18 2009-08-27 Norifumi Kikkawa Connection authentication system, terminal apparaus, connection authentication server, connection authentication method, and program
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102983972A (en) * 2012-10-18 2013-03-20 郎六琪 Dynamic encryption and decryption method based on stream cipher
CN104320377A (en) * 2014-09-25 2015-01-28 华为技术有限公司 An anti-stealing-link method and device for stream media file
CN106022147A (en) * 2016-05-26 2016-10-12 珠海市魅族科技有限公司 Method and device for file encryption and decryption

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569B (en) * 2017-12-14 2018-09-11 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN109150499B (en) * 2018-08-29 2021-06-08 深圳市迷你玩科技有限公司 Method and device for dynamically encrypting data, computer equipment and storage medium
CN110414249A (en) * 2019-07-24 2019-11-05 Oppo广东移动通信有限公司 Information processing method, device, storage medium and electronic equipment
CN113468544A (en) * 2020-03-30 2021-10-01 杭州海康威视数字技术股份有限公司 Training method and device of application model
CN113468544B (en) * 2020-03-30 2024-04-05 杭州海康威视数字技术股份有限公司 Training method and device for application model
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN112217806A (en) * 2020-09-23 2021-01-12 深圳杰微芯片科技有限公司 Data transmission encryption method, server and storage medium
CN112968899A (en) * 2021-02-26 2021-06-15 上海掌门科技有限公司 Method and equipment for encrypted communication
CN112968899B (en) * 2021-02-26 2022-11-08 上海掌门科技有限公司 Method and equipment for encrypted communication
CN113259438B (en) * 2021-05-14 2023-03-31 北京达佳互联信息技术有限公司 Method and device for sending model file and method and device for receiving model file
CN113259438A (en) * 2021-05-14 2021-08-13 北京达佳互联信息技术有限公司 Method and device for sending model file and method and device for receiving model file
CN113642033A (en) * 2021-10-19 2021-11-12 太平金融科技服务(上海)有限公司深圳分公司 Encryption method, decryption method, device, equipment and storage medium
CN114340113A (en) * 2021-12-30 2022-04-12 智马达汽车有限公司 Information processing method and device based on vehicle light
CN114340113B (en) * 2021-12-30 2023-10-13 浙江智马达智能科技有限公司 Information processing method and device based on vehicle lamplight
CN114567676A (en) * 2022-03-14 2022-05-31 杭州电子科技大学 Private file container entry hiding method based on multi-level encryption
CN114567676B (en) * 2022-03-14 2024-02-02 杭州电子科技大学 Private based on multistage encryption File container entry concealing method

Also Published As

Publication number Publication date
CN106788995B (en) 2020-09-04

Similar Documents

Publication Publication Date Title
CN106788995A (en) File encrypting method and device
CN106161006B (en) Digital encryption algorithm
CN106599723B (en) File encryption method and device and file decryption method and device
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN102662767B (en) A kind of method based on Synchronizing Passwords between mobile terminal each browser and mobile terminal
CN102782692A (en) System, apparatus and method for encryption and decryption of data transmitted over a network
JP6346942B2 (en) Blocking password attacks
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN106027228A (en) Encryption and decryption methods and encryption and decryption systems for webpage identification
CN106817358A (en) The encryption and decryption method and equipment of a kind of user resources
CN103873250B (en) A kind of ciphertext generation method, ciphertext decryption method and encrypting and decrypting device
Hamdan et al. AH4S: an algorithm of text in text steganography using the structure of omega network
CN109117670A (en) A kind of realization shear plate data encryption and decryption method, apparatus and hardware device
US10063590B1 (en) Secure message protocol
US20150363588A1 (en) Apparatus and method for password authentication
CA2763860C (en) System, architecture and method for secure encryption and decryption
WO2016188079A1 (en) Data storage method for terminal device and terminal device
Iranmanesh et al. On using emoticons and lingoes for hiding data in SMS
CN116192445A (en) User login verification method, device, equipment and storage medium
CN105678185A (en) Data security protection method and intelligent terminal management system
CN101848172A (en) Instant messaging text processing system and method
EP2876569A1 (en) Apparatuses and methods for password authentication
CN114584407A (en) System for embedding and extracting multilingual hidden data in online message
CN108701195B (en) Data security protection method and device
US8966254B2 (en) Keyless challenge and response system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant