CN106788995A - File encrypting method and device - Google Patents
File encrypting method and device Download PDFInfo
- Publication number
- CN106788995A CN106788995A CN201611118321.7A CN201611118321A CN106788995A CN 106788995 A CN106788995 A CN 106788995A CN 201611118321 A CN201611118321 A CN 201611118321A CN 106788995 A CN106788995 A CN 106788995A
- Authority
- CN
- China
- Prior art keywords
- character
- file
- string
- encrypted
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
The present invention provides a kind of file encrypting method and device, belongs to technical field of data security.The method includes:The encrypted characters string of acquisition first object file to be encrypted and user input;Encrypted characters string is parsed, encryption key is generated according to analysis result;Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted, the data after encryption are written in the encryption file of preservation.The present invention is by obtaining the encrypted characters string of first object file to be encrypted and user input.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted.Because encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character species of input is more various, thus the encryption key of correspondence generation to crack difficulty larger.Therefore, the security of file encryption is higher.
Description
Technical field
The present invention relates to technical field of data security, more particularly, to a kind of file encrypting method and device.
Background technology
With the fast development of computer networking technology and information technology, the digitlization industry such as ecommerce is just alive
Emerged rapidly in the range of boundary.Either government, enterprise or individual, in storage medium during storage file, are required for some
Vital document is encrypted, to prevent information leakage.Therefore, it is problem of concern how file to be encrypted.It is existing
File encrypting method be mainly by be pre-stored encryption key file is encrypted, the data after being encrypted.Accordingly
Ground, decrypting process be mainly by be pre-stored decruption key the data after encryption are decrypted, the file after being decrypted.
Wherein, encryption key is consistent with decruption key.
Realize it is of the invention during, find prior art at least there is problems with:Because encryption key is advance
The fixed character of storage, related cracker is easy to invasion mobile terminal to obtain pre-stored encryption key, and according to encryption
The first data after key pair encryption are cracked and are stolen the file after encryption, so as to cause fileinfo to be revealed.Therefore, text
The security of part encryption is not high.
The content of the invention
The present invention provide it is a kind of overcome above mentioned problem or the file encrypting method that solves the above problems at least in part and
Device.
According to an aspect of the present invention, there is provided a kind of file encrypting method, the method includes:
The encrypted characters string of acquisition first object file to be encrypted and user input;
Encrypted characters string is parsed, encryption key is generated according to analysis result;
Based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted, after encryption
Data be written in the encryption file of preservation.
According to another aspect of the present invention, there is provided a kind of document encrypting apparatus, the device includes:
First acquisition module, the encrypted characters string for obtaining first object file to be encrypted and user input;
Parsing module, for being parsed to encrypted characters string, encryption key is generated according to analysis result;
Encrypting module, for based on encryption key, the corresponding file stream of first object file is added into encryption stream to be carried out
Encryption, the data after encryption are written in the encryption file of preservation.
The beneficial effect brought of technical scheme that the application is proposed is:
By the encrypted characters string for obtaining first object file to be encrypted and user input.Encrypted characters string is solved
Analysis, encryption key is generated according to analysis result.Based on encryption key, the corresponding file stream of first object file is added to encryption
Stream is encrypted, and the data after encryption are written in the encryption file of preservation.Because encrypted characters string is user input, and
User be input into encrypted characters string when thinking randomness it is larger, and input character species it is more various so that correspondence generation plus
It is larger that key cracks difficulty.Further, since preset kind expression character can be added in user inputs character, such as emoji expressions,
So that the encryption key of correspondence generation to crack difficulty bigger.Therefore, the security of file encryption is higher.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of file encrypting method of the embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet of file encrypting method of the embodiment of the present invention;
Fig. 3 is a kind of structural representation of document encrypting apparatus of the embodiment of the present invention;
Fig. 4 is a kind of structural representation of document encrypting apparatus of the embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples, specific embodiment of the invention is described in further detail.Hereinafter implement
Example is not limited to the scope of the present invention for illustrating the present invention.
Existing file encryption process be mainly by be pre-stored encryption key file is encrypted, after being encrypted
Data.Correspondingly, when being decrypted to file, the data after encryption are decrypted by pre-stored decruption key.
Wherein, pre-stored encryption key by English character set in advance or can be digitally generated, encryption key and decruption key one
Cause.Due to encryption key and decruption key by terminal locally preserving, and encryption key and decruption key are by set in advance
Fixed character is generated, so as to cause related cracker easily to invade mobile terminal to obtain pre-stored encryption key, and
According to encryption key to encryption after the first data cracked and stolen encryption after file, so as to cause fileinfo to be let out
Dew.Therefore, the security of file encryption is not high
For the problems of the prior art, a kind of file encrypting method is the embodiment of the invention provides.It should be noted that
The file encrypting method that the present embodiment and subsequent embodiment are provided, and the corresponding file decryption method of the encryption method can be fitted
For any type terminal, including but not limited to mobile terminal or the local terminal with processing function, the present embodiment and follow-up
Embodiment is not especially limited to this.It is of a relatively high in view of nowadays mobile terminal utilization rate, the present embodiment and subsequent implementation
The terminal that example is previously mentioned can all refer to mobile terminal.Mobile terminal may include mobile phone, panel computer and intelligent watch etc., this implementation
Example is not especially limited to this.
Further, since be provided with different operating systems on mobile terminal so that for convenience of description, the present embodiment and after
Continuous embodiment is mainly to file encrypting method in android system, and the corresponding file decryption side of this document encryption method
Method is illustrated.Certainly, other operating systems such as IOS, file encryption or file decryption side that the present embodiment that can also sample is provided
Method, only need to correspond to modification realizes code, and the present embodiment is not especially limited to this.
Referring to Fig. 1, the method flow that the present embodiment is provided includes:101st, first object file and user to be encrypted is obtained
The encrypted characters string of input;102nd, encrypted characters string is parsed, encryption key is generated according to analysis result;103rd, based on plus
Key, is added to the corresponding file stream of first object file encryption stream and is encrypted, and the data after encryption are written into guarantor
In the encryption file deposited.
Method provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input
Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text
The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to
Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into
Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default
Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption
Security it is higher.
As a kind of alternative embodiment, first object file to be encrypted is obtained, including:
File selection instruction according to user input, obtains file address character string;
In the presence of the corresponding file of file address character string is detected, the corresponding data class of file address character string is obtained
Type;
When character string corresponding data type in file address is file, the corresponding file of file address character string is obtained,
And as first object file to be encrypted.
As a kind of alternative embodiment, encrypted characters string is parsed, key is generated according to analysis result, including:
Obtain the corresponding preset kind coding of each character in encrypted characters string;
According to the corresponding preset kind coding generation encryption key of each character.
As a kind of alternative embodiment, the corresponding preset kind coding of each character in encrypted characters string is obtained, including:
Any character in for encrypted characters string, judges whether any character is preset kind expression character;
When any character is for default expression type character, the preset kind coding of any character is obtained.
As a kind of alternative embodiment, judge whether any character is preset kind expression character, including:
Obtain the coding information of any character;
When coding information within a preset range when, determine any character for preset kind express one's feelings character;
When coding information not within a preset range when, determine any character for preset kind express one's feelings character.
As a kind of alternative embodiment, according to the corresponding preset kind coding generation encryption key of each character, including:
The corresponding preset kind coding of each character is spliced, key string is obtained;
Choose the character in key string;
Character to choosing splices, and obtains encryption key.
As a kind of alternative embodiment, the character in key string is chosen, including:
Obtain the corresponding predetermined interval of key string;
According to predetermined interval, predetermined number character is chosen from key string.
Used as a kind of alternative embodiment, preset kind expresses one's feelings character for emoji expresses one's feelings, and preset kind is encoded to unicode
Coding, is parsed to encrypted characters string, and encryption key is generated according to analysis result, including:
For any character in encrypted characters string, when the corresponding coding information of any character between 0xd800 and 0xdbff it
Between, or between 0x2100 and 0x27ff and when being not equal to 0x263b, expressed one's feelings any character as emoji, and obtain
Corresponding unicode codings, corresponding unicode codings are deposited into unicode character strings;
When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, the unicode that will be changed
Coding is deposited into unicode character strings;
The predetermined interval of user input is obtained, according to predetermined interval, character is chosen from unicode character strings;
Each character selected is spliced according to the character sequence selected, obtains encryption key.
As a kind of alternative embodiment, by encryption key, after being encrypted to first object file, also include:
The decryption character string of acquisition the second file destination to be decrypted and user input;
When the encryption file that the second file destination is generated by first object file, character string and encrypted characters will be decrypted
String is compared;
When decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, according to corresponding parsing knot
Fruit generation decruption key;
According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will decryption
File stream is written in the decryption file of preservation.
As a kind of alternative embodiment, after decryption character string and encrypted characters string are compared, also include:
When decrypting character string and being inconsistent with encrypted characters string, user file decryption failure is pointed out.
As a kind of alternative embodiment, will also include before decryption file stream is written in the decryption file of preservation:
The decryption file for obtaining user's selection preserves address;
According to taking up room for the second file destination, estimate that corresponding decryption file takes up room;
Decryption file is preserved the corresponding memory space in address and taken up room with decryption file and is compared;
When decryption file takes up room more than memory space, user is pointed out the memory space inadequate of selection.
Above-mentioned all optional technical schemes, can form alternative embodiment of the invention, herein no longer using any combination
Repeat one by one.
Due to being easy to be cracked according to fixed character generation encryption key, and it is based on user's thinking randomness and character kind
The diversity of class, the encrypted characters string of generation is corresponding, and to crack difficulty larger.It is real based on above-mentioned Fig. 1 correspondences according to above-mentioned theory
The content in example is applied, a kind of file encrypting method and file decryption method is the embodiment of the invention provides, below to the text of terminal
Part ciphering process and corresponding file decryption process are specifically addressed.
Referring to Fig. 2, the method flow that the present embodiment is provided includes:201st, first object file and user to be encrypted is obtained
The encrypted characters string of input;202nd, encrypted characters string is parsed, encryption key is generated according to analysis result;203rd, based on plus
Key, is added to the corresponding file stream of first object file encryption stream and is encrypted, and the data after encryption are written into guarantor
In the encryption file deposited;204th, the decryption character string of acquisition the second file destination to be decrypted and user input;205th, when second
During the encryption file that file destination is generated by first object file, decryption character string is compared with encrypted characters string;
206th, when decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, is given birth to according to corresponding analysis result
Into decruption key;207th, according to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and
Decryption file stream is written in the decryption file of preservation.
Wherein, 201 the encrypted characters string of first object file to be encrypted and user input, is obtained.
Because the file that terminal is commonly stored is more, so as to one to be encrypted first can be obtained before this step is performed
File destination.Mode of the present embodiment not to obtaining first object file to be encrypted makees specific restriction, including but not limited to:Root
According to the file selection instruction of user input, file address character string is obtained;When detecting the corresponding file of file address character string
In the presence of, obtain the corresponding data type of file address character string;When character string corresponding data type in file address is file
When, the corresponding file of file address character string is obtained, and as first object file to be encrypted.
Specifically, user can be carried by terminal system file browser selects a file.Correspondingly, terminal root
According to the file selection instruction of user input, a file address character string can be obtained.Wherein, file address character string is corresponding interior
Appearance can be the file directory information where file, and the present embodiment does not make specific restriction to the content of file address character string.
In android system, by the way that corresponding file address word during user's select file can be obtained in onActivityResult methods
Symbol string.
Due to that when file is obtained according to file address, may there is fortuitous event and file cannot be obtained, so that eventually
End can first detect that character string corresponding file in file address whether there is after file address character string is got.In Android
In system, a File object can be created according to file address character string, perform exists methods by the File objects to sentence
Disconnected file whether there is.When exists methods return be false when, represent file do not exist.When the return of exists methods
During true, show that file is present.
In the presence of the corresponding file of file address character string is detected, because what the present embodiment was directed to is mainly to one
File is encrypted, so as to after the corresponding file presence of file address character string is detected, can also further judge text
It is a file or a file that part address character string is corresponding, and the present embodiment is not especially limited to this.Specifically, may be used
The corresponding data type of file address character string is obtained, when character string corresponding data type in file address is file, can be again
Obtain the corresponding file of file address character string.In android system, isDirectory side can be performed by File objects
Method judges whether this document is file.When isDirectory methods return be false when, represent this document for text
Part is pressed from both sides.As the true that isDirectory methods are returned, show that this document is file.
After first object file to be encrypted is got, the encrypted characters string of user input can be obtained.Wherein, encrypted word
Symbol string can be arbitrary string, and its content for including may include letter, word, numeral, Chinese, foreign language and preset kind expression
Character etc., the present embodiment does not make specific restriction to the content of encrypted characters string, and also the length not to encrypted characters string makees specific limit
It is fixed.Preset kind expression character can be that emoji expresses one's feelings or the expression that carry of instant messaging application etc., the present embodiment to this not
Make specific restriction.
Wherein, the visual emotion symbol that emoji expressions are used in wireless communications for Japan, at present by most of existing
Adopt for the compatible Unicode codings of computer system, and be widely used in various SMSs and social networks.Compare
Fixed character of the prior art or fixed character string, due to user, when encrypted characters string is input into, thinking randomness is larger, and
The character species of input is more various, larger so as to crack difficulty.In addition, the encrypted characters string for adding emoji expressions is corresponding
Crack difficulty then bigger.Correspondingly, the security of file encryption is also higher.
Wherein, 202, encrypted characters string is parsed, encryption key is generated according to analysis result.
Because encryption key is typically one group of binary system or hexadecimal coding, so as to be encrypted it to file
It is preceding, it is necessary to first be parsed to the encrypted characters string comprising all kinds character.On being parsed to encrypted characters string, according to
The mode that analysis result generation encryption key is parsed, the present embodiment is not especially limited to this, including but not limited to:Obtain
The corresponding preset kind coding of each character in encrypted characters string;According to the corresponding preset kind coding generation encryption of each character
Key.
When the corresponding preset kind of each character is encoded in obtaining encrypted characters string, due to both existing in encrypted characters string
The recognizable character of terminal, such as Chinese, alphabetical and numeral, also exist terminal cannot Direct Recognition character, such as emoji tables
Feelings, thus can first allow terminal judges go out those cannot Direct Recognition character.Correspondingly, the present embodiment is not to obtaining encrypted characters
The mode of the corresponding preset kind coding of each character makees specific restriction in string, including but not limited to:For in encrypted characters string
Any character, judge any character whether be preset kind expression character;When any character is for default expression type character,
Obtain the preset kind coding of any character.
The coding information of fixed range is generally corresponds in the terminal due to preset kind expression character, so that can be according to volume
Code information, allows terminal to can recognize that default expression type character.Correspondingly, the present embodiment not to judge any character whether be
The mode of preset kind expression character makees specific restriction, including but not limited to:Obtain the coding information of any character;When coding is believed
Cease when within a preset range, determine that any character is preset kind expression character;When coding information not within a preset range when, really
Fixed any character is not preset kind expression character.
For example, so that default expression type character is emoji expressions as an example.Because the coding information of emoji expressions is generally situated between
Between 0xd800 and 0xdbff, so as to when the coding information of any character is between the two 16 binary datas, then the word
Accord with as emoji expresses one's feelings.Correspondingly, preset range is 0xd800 to 0xdbff.
It should be noted that because emoji expressions are real-time updates, increasing the corresponding coding information of emoji expressions newly can
Can not between 0xd800 and 0xdbff, so that the latest data that can be expressed one's feelings according to emoji when being embodied determines accordingly
Preset range and deterministic process, the present embodiment are not especially limited to this.It is with the partial data that emoji expressions are newly-increased recently
Example, when the coding information of any character is judged not between 0xd800 and 0xdbff, can carry out secondary judgement, that is, judge the word
Whether the coding information of symbol judges whether to be equal to 0x263b between 0x2100 and 0x27ff.When the coding information of the character
Between 0x2100 and 0x27ff, and the coding information of the character when being not equal to 0x263b, then the character is emoji expressions.When
The character is not in above-mentioned preset range or when being unsatisfactory for above-mentioned Rule of judgment, it may be determined that the character is not expressed one's feelings for emoji, i.e.,
The character is can be by the Chinese, digital and alphabetical etc. of terminal Direct Recognition.
When any character is for default expression type character, can direct access preset the preset kind of expression type character and compile
Code.When any character is not for default expression type character, the character can be converted to corresponding preset kind coding.Wherein,
Preset kind coding can be unicode codings or UTF-8 etc., and the present embodiment is not especially limited to this.
Due to that may there are multiple default expression type characters in encrypted characters string, and multiple default expression type words can
Different position in encrypted characters string can be in, so as to after the preset kind coding for getting default expression type character,
And each preset table can be recorded by preset kind code storage to an interim character string of each default expression type character
Feelings type character location in encrypted characters string.Non-default expression class type-word in accordingly for encrypted characters string
Symbol, also by the preset kind code storage after conversion to the interim character string, and can simultaneously record each non-default expression class
Ocra font ocr location in encrypted characters string.By said process, can be easy to subsequently multiple preset kinds are encoded into
Row splicing, the present embodiment is not especially limited to this.
Based on above-mentioned resolving, after the corresponding preset kind coding of each character in getting encrypted characters string, can
According to the corresponding preset kind coding generation encryption key of each character.The present embodiment is not to corresponding default according to each character
The mode of type coding generation encryption key makees specific restriction, including but not limited to:The corresponding preset kind of each character is compiled
Code is spliced, and obtains key string;Choose the character in key string;Character to choosing splices, and is added
Key.
From above-mentioned resolving, preset kind expression character and non-default expression type character institute in encrypted characters string
The position at place is typically what is staggered.Therefore, when splicing to the corresponding preset kind coding of each character, will first can preset
The corresponding preset kind coding of type expression character is spliced, and obtains the first sub-key character string.By non-default type expression
The corresponding preset kind coding of character is spliced, and obtains the second sub-key character string.By the first sub-key character string and second
Sub-key character string is spliced, and obtains key string.Wherein, the first sub-key character string is above, the second sub-key word
Symbol string is later.Or, later, above, the present embodiment is not to word for the second sub-key character string for the first sub-key character string
Symbol string splicing order makees specific restriction
Timing when preferably, in order to embody user input encrypted characters string between character, can be based in said process
Each character of record location in encrypted characters string, splices to the corresponding preset kind coding of each character,
The present embodiment is not especially limited to this.
After key string is obtained, it is made up of preset kind coding because key string is mainly, such as unicode is compiled
Code, word length is long, so as in order to reduce follow-up amount of calculation and improve calculating speed, can first choosing key string
Character.After a number of character is filtered out, then to choose character splice, obtain encryption key.
Mode of the present embodiment not to choosing the character in key string makees specific restriction, including but not limited to:Obtain
The predetermined number of character in encryption key;According to predetermined interval, predetermined number character is chosen from key string.Wherein,
Predetermined number be choose key string in character when the character quantity to be chosen.Predetermined number can be by user input, i.e.,
Determined to choose the number of character by user, the present embodiment is not especially limited this.In addition, predetermined interval also can be defeated by user
Enter, the length of predetermined interval can be 1, and the present embodiment is not especially limited to this.
By above-mentioned selection process, because after the character in choosing key string, the encryption key that splicing is obtained is
What be contacted by without through the encrypted characters string with user input, so that cracker is made instantly available encrypted characters string, it is also difficult to broken
Solve encryption key.Thinking randomness and character diversity during the user inputs character being previously mentioned based on said process, from close
The process that character generates encryption key is chosen in key character string, the security of subsequent file encryption can be further improved.
In order to make it easy to understand, with reference to the above, expressing one's feelings character as emoji expresses one's feelings with preset kind, preset kind coding
As a example by unicode codings.Encrypted characters string is parsed, the specific implementation of encryption key is generated according to analysis result
Can be as follows:For any character in encrypted characters string, when the corresponding coding information of any character between 0xd800 and 0xdbff it
Between, or between 0x2100 and 0x27ff and when being not equal to 0x263b, expressed one's feelings any character as emoji, and obtain
Corresponding unicode codings, corresponding unicode codings are deposited into unicode character strings;When any character is not
When emoji expresses one's feelings, any character is converted into unicode codings, the unicode codings of conversion are deposited into unicode characters
In string;The predetermined interval of user input is obtained, according to predetermined interval, character is chosen from unicode character strings;According to what is selected
Character sequence is spliced to each character selected, and obtains encryption key.
Wherein, 203, based on encryption key, the corresponding file stream of first object file is added to encryption stream and is encrypted,
Data after encryption are written in the encryption file of preservation.
The AES that this step is used can be DSE arithmetic AES, and the present embodiment is not made specifically to this
Limit.In android system, the ciphering process can use following code to realize:
Said process mainly first creates an encryption class using Cipher, and incoming using this.Key as parameter.Its
In, DES represents DSE arithmetic AES, and this.key represents the encryption key generated in above-mentioned steps 202.The key
After being write, file stream can be started.File stream is added in encryption stream CipherInputStream and is encrypted, and will
Data after encryption are written in the file of preservation.Finally, preserve the file for obtaining and be the first object file after encryption.
In view of after being encrypted to file, user may also need to be decrypted file when file is read, from
And the present embodiment additionally provides a kind of file decryption method, detailed process refers to subsequent step 204 to the content in step 207.
Wherein, 204 the decryption character string of the second file destination to be decrypted and user input, is obtained.
This step the second file destination to be decrypted can be the first object file after being encrypted in above-mentioned steps 203,
Can be other file destinations according to above-mentioned steps 201 to the method in step 203 after encrypted, the present embodiment is not made to this
It is specific to limit.In the decryption character string of acquisition the second file destination to be decrypted and user input, above-mentioned steps 201 are referred to
The middle mode for obtaining first object file and encrypted characters string, here is omitted.
Wherein, 205, when the encryption file that the second file destination is generated by first object file, character string will be decrypted
Compare with encrypted characters string.
When the encryption file that the second file destination is generated by first object file, due to using symmetric cryptography machine
AES processed, so that the decryption character string of user input is, it is necessary to long with the encrypted characters string of user input in above-mentioned steps 201
Degree is identical and content is consistent, to ensure successful decryption.Therefore, this step needs to be compared decryption character string with encrypted characters string
It is right, it is ensured that whether decryption character string is consistent with encrypted characters string.
Wherein, 206, when decrypting character string and being consistent with encrypted characters string, decryption character string is parsed, according to correspondingly
Analysis result generation decruption key.
Due to the encrypted characters string not encryption key of user input in above-mentioned steps 201, but encrypted characters string is entered
Row parsing, according to the encryption key that analysis result is generated, simultaneously because encryption key is consistent with decruption key needs, so as at this
Decryption character string can be parsed according to identical process in above-mentioned steps 202 in step, given birth to according to corresponding analysis result
Into decruption key.
It should be noted that when decrypting character string and being inconsistent with encrypted characters string, user file can be pointed out to decrypt failure.
Now user repeats above-mentioned steps 204 and subsequent step, and the present embodiment is not especially limited to this.
Wherein, 207, according to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated,
And decryption file stream is written in the decryption file of preservation.
Based on the content in above-mentioned steps 203, this step equally can be using DSE arithmetic AES to the second mesh
Mark file is decrypted, and the present embodiment is not especially limited to this.In android system, the decrypting process can use following generation
Code is realized:
Said process is mainly one des method Cipher of initialization, by establishment file stream and by file stream and decryption
Information is incoming together, generates a file stream for decryption and is written in file.When the decryption character-string error of input, solve
The meeting for coming is mess code.Correspondingly, the meaningless file that a user cannot use can be generated.When decrypting character string and being correct, then
A decryption file can be generated, this document is the final required file of user.
It should be noted that deposited because the file for after to file decryption, decrypting is also required to particular location,
So as to before decryption file stream is written in the decryption file of preservation, the decryption file that can also obtain user's selection is preserved
Address;According to taking up room for the second file destination, estimate that corresponding decryption file takes up room;Decryption file is preserved into address
Corresponding memory space takes up room with decryption file and compares;When decryption file takes up room more than memory space, carry
Show the memory space inadequate of user's selection.
Wherein, decryption file is preserved address and can be specified by select file directory path by user, the present embodiment
This is not especially limited.When decryption file takes up room no more than memory space, it is decrypted to the second file destination
After obtaining decryption file, decryption file can be stored in preserving the corresponding memory space in address to decryption file.
By way of decryption character string being input into above-mentioned steps 204 to step 207 file is decrypted, except knowing
Outside the user of encrypted characters string, other people cannot obtain corresponding decryption character string, and cannot otherwise solve ciphertext
Part such that it is able to improve the security of file encryption.
Method provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input
Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text
The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to
Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into
Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default
Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption
Security it is higher.
Further, since when encryption key is generated according to key string, can be screened according to the character number of user input
Going out a number of character splice obtaining encryption key such that it is able to reduces the complexity of encryption key, and then subsequently exists
During according to encryption keys file, follow-up amount of calculation can be reduced and follow-up calculating speed is improved.Therefore, encryption effect can be improved
Rate.
Again, due to after the character in choosing key string, the encryption key that obtains of splicing with user input
Encrypted characters string contacted by without what so that cracker is made instantly available encrypted characters string, it is also difficult to crack out encryption key.
Thinking randomness, character diversity, the length of encryption key and encryption key character in itself during based on user inputs character
String sequentially, can further improve the security of subsequent file encryption.
Finally, by obtaining the decryption character string of the second file destination to be decrypted and user input, when the second target text
During the encryption file that part is generated by first object file, decryption character string is compared with encrypted characters string.Work as decrypted word
When symbol string is consistent with encrypted characters string, decryption character string is parsed, decruption key is generated according to corresponding analysis result.Root
According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will the stream write-in of decryption file
To in the decryption file for preserving.Because decryption file needs to be input into corresponding decryption character string, and except knowing encrypted characters string
User outside, other people cannot obtain corresponding decryption character string, and cannot otherwise decrypt file, so as in text
Part decrypts this aspect and can also improve the security of file.
A kind of document encrypting apparatus are the embodiment of the invention provides, the device is used to perform the corresponding realities of above-mentioned Fig. 1 or Fig. 2
Apply the file encrypting method that example is provided.Referring to Fig. 3, the device includes:
First acquisition module 301, the encrypted characters string for obtaining first object file to be encrypted and user input;
First parsing module 302, for being parsed to encrypted characters string, encryption key is generated according to analysis result;
Encrypting module 303, for based on encryption key, the corresponding file stream of first object file being added into encryption and being flowed into
Row encryption, the data after encryption are written in the encryption file of preservation.
Used as a kind of alternative embodiment, the first acquisition module 301, for the file selection instruction according to user input, is obtained
Take file address character string;In the presence of the corresponding file of file address character string is detected, file address character string pair is obtained
The data type answered;When character string corresponding data type in file address is file, file address character string is obtained corresponding
File, and as first object file to be encrypted.
As a kind of alternative embodiment, parsing module 302, including:
Acquiring unit, for obtaining the corresponding preset kind coding of each character in encrypted characters string;
Generation unit, for according to the corresponding preset kind coding generation encryption key of each character.
As a kind of alternative embodiment, acquiring unit, including:
Judgment sub-unit, for any character in for encrypted characters string, judges whether any character is preset kind
Expression character;
Subelement is obtained, for when any character is for default expression type character, obtaining the preset kind of any character
Coding.
As a kind of alternative embodiment, judgment sub-unit, the coding information for obtaining any character;When coding information exists
When in preset range, determine that any character is preset kind expression character;When coding information not within a preset range when, it is determined that appoint
One character is not preset kind expression character.
As a kind of alternative embodiment, generation unit, including:
First splicing subelement, for splicing to the corresponding preset kind coding of each character, obtains key character
String;
Subelement is chosen, for choosing the character in key string;
Second splicing subelement, for splicing to the character chosen, obtains encryption key.
As a kind of alternative embodiment, subelement, the predetermined number for obtaining character in encryption key are chosen;According to pre-
If interval, predetermined number character is chosen from key string.
Used as a kind of alternative embodiment, preset kind expresses one's feelings character for emoji expresses one's feelings, and preset kind is encoded to unicode
Coding, parsing module 302, for for any character in encrypted characters string, when the corresponding coding information of any character between
Between 0xd800 and 0xdbff, or between 0x2100 and 0x27ff and when being not equal to 0x263b, using any character as
Emoji is expressed one's feelings, and obtains corresponding unicode codings, and corresponding unicode codings are deposited into unicode character strings;When
When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, the unicode codings of conversion are deposited into
In unicode character strings;The predetermined interval of user input is obtained, according to predetermined interval, word is chosen from unicode character strings
Symbol;Each character selected is spliced according to the character sequence selected, obtains encryption key.
Used as a kind of alternative embodiment, referring to Fig. 4, the device also includes:
Second acquisition module 304, the decryption character string for obtaining the second file destination to be decrypted and user input;
Comparing module 305, for when the encryption file that the second file destination is generated by first object file, will decrypt
Character string is compared with encrypted characters string;
Second parsing module 306, for when decrypting character string and being consistent with encrypted characters string, being solved to decryption character string
Analysis, decruption key is generated according to corresponding analysis result;
Deciphering module 307, according to the corresponding file stream of the second file destination and decruption key, generates corresponding decryption file
Stream, and decryption file stream is written in the decryption file of preservation.
Device provided in an embodiment of the present invention, by the encrypted word for obtaining first object file to be encrypted and user input
Symbol string.Encrypted characters string is parsed, encryption key is generated according to analysis result.Based on encryption key, by first object text
The corresponding file stream of part is added to encryption stream and is encrypted, and the data after encryption are written in the encryption file of preservation.Due to
Encrypted characters string is user input, and user's thinking randomness when encrypted characters string is input into is larger, and the character kind being input into
Class is more various, thus the encryption key of correspondence generation to crack difficulty larger.Further, since can be added in user inputs character default
Type is expressed one's feelings character, such as emoji expressions so that the encryption key of correspondence generation to crack difficulty bigger.Therefore, file encryption
Security it is higher.
Further, since when encryption key is generated according to key string, can be screened according to the character number of user input
Going out a number of character splice obtaining encryption key such that it is able to reduces the complexity of encryption key, and then subsequently exists
During according to encryption keys file, follow-up amount of calculation can be reduced and follow-up calculating speed is improved.Therefore, encryption effect can be improved
Rate.
Again, due to after the character in choosing key string, the encryption key that obtains of splicing with user input
Encrypted characters string contacted by without what so that cracker is made instantly available encrypted characters string, it is also difficult to crack out encryption key.
Thinking randomness, character diversity, the length of encryption key and encryption key character in itself during based on user inputs character
String sequentially, can further improve the security of subsequent file encryption.
Finally, by obtaining the decryption character string of the second file destination to be decrypted and user input, when the second target text
During the encryption file that part is generated by first object file, decryption character string is compared with encrypted characters string.Work as decrypted word
When symbol string is consistent with encrypted characters string, decryption character string is parsed, decruption key is generated according to corresponding analysis result.Root
According to the corresponding file stream of the second file destination and decruption key, corresponding decryption file stream is generated, and will the stream write-in of decryption file
To in the decryption file for preserving.Because decryption file needs to be input into corresponding decryption character string, and except knowing encrypted characters string
User outside, other people cannot obtain corresponding decryption character string, and cannot otherwise decrypt file, so as in text
Part decrypts this aspect and can also improve the security of file.
Finally, the present processes are only preferably embodiment, are not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc. should be included in protection of the invention
Within the scope of.
Claims (12)
1. a kind of file encrypting method, it is characterised in that methods described includes:
The encrypted characters string of acquisition first object file to be encrypted and user input;
The encrypted characters string is parsed, encryption key is generated according to analysis result;
Based on the encryption key, the corresponding file stream of the first object file is added to encryption stream and is encrypted, will added
Data after close are written in the encryption file of preservation.
2. method according to claim 1, it is characterised in that acquisition first object file to be encrypted, including:
File selection instruction according to user input, obtains file address character string;
In the presence of the corresponding file of the file address character string is detected, the corresponding number of the file address character string is obtained
According to type;
When the corresponding data type of the file address character string is file, the corresponding text of the file address character string is obtained
Part, and as first object file to be encrypted.
3. method according to claim 1, it is characterised in that described to be parsed to the encrypted characters string, according to solution
Analysis result generation key, including:
Obtain the corresponding preset kind coding of each character in the encrypted characters string;
According to the corresponding preset kind coding generation encryption key of each character.
4. method according to claim 3, it is characterised in that each character correspondence in the acquisition encrypted characters string
Preset kind coding, including:
For any character in the encrypted characters string, judge whether any character is preset kind expression character;
When any character is for default expression type character, the preset kind coding of any character is obtained.
5. method according to claim 4, it is characterised in that described to judge whether any character is preset kind table
Feelings character, including:
Obtain the coding information of any character;
When the coding information within a preset range when, determine any character for preset kind express one's feelings character;
When the coding information not within a preset range when, determine any character for preset kind express one's feelings character.
6. method according to claim 3, it is characterised in that described according to the corresponding preset kind coding life of each character
Into encryption key, including:
The corresponding preset kind coding of each character is spliced, key string is obtained;
Choose the character in the key string;
Character to choosing splices, and obtains encryption key.
7. method according to claim 6, it is characterised in that the character in the selection key string, including:
Obtain the corresponding predetermined interval of the key string;
According to the predetermined interval, predetermined number character is chosen from the key string.
8. the method according to any claim in claim 1 to 7, it is characterised in that the preset kind is expressed one's feelings word
Accord with as emoji expresses one's feelings, the preset kind is encoded to unicode codings, described that the encrypted characters string is parsed, according to
Analysis result generates encryption key, including:
For any character in the encrypted characters string, when the corresponding coding information of any character between 0xd800 with
Between 0xdbff, or between 0x2100 and 0x27ff and when being not equal to 0x263b, using any character as emoji
Expression, and corresponding unicode codings are obtained, corresponding unicode codings are deposited into unicode character strings;
When any character is not expressed one's feelings for emoji, any character is converted into unicode codings, by what is changed
Unicode codings are deposited into the unicode character strings;
The predetermined interval of user input is obtained, according to the predetermined interval, character is chosen from the unicode character strings;
Each character selected is spliced according to the character sequence selected, obtains encryption key.
9. method according to claim 1, it is characterised in that described by the encryption key, to the first object
After file is encrypted, also include:
The decryption character string of acquisition the second file destination to be decrypted and user input;
When the encryption file that second file destination is generated by the first object file, by it is described decryption character string with
The encrypted characters string is compared;
When the decryption character string is consistent with the encrypted characters string, the decryption character string is parsed, according to correspondence
Analysis result generation decruption key;
According to the corresponding file stream of second file destination and the decruption key, corresponding decryption file stream is generated, and will
The decryption file stream is written in the decryption file of preservation.
10. method according to claim 9, it is characterised in that described by decryption character string and the encrypted characters
After string is compared, also include:
When the decryption character string is inconsistent with the encrypted characters string, user file decryption failure is pointed out.
11. methods according to claim 9, it is characterised in that the solution that the decryption file stream is written to preservation
Before in ciphertext part, also include:
The decryption file for obtaining user's selection preserves address;
According to taking up room for second file destination, estimate that corresponding decryption file takes up room;
The decryption file is preserved the corresponding memory space in address and taken up room with the decryption file and is compared;
When the decryption file takes up room more than the memory space, user is pointed out the memory space inadequate of selection.
12. a kind of document encrypting apparatus, it is characterised in that described device includes:
First acquisition module, the encrypted characters string for obtaining first object file to be encrypted and user input;
First parsing module, for being parsed to the encrypted characters string, encryption key is generated according to analysis result;
Encrypting module, for based on the encryption key, the corresponding file stream of the first object file being added into encryption stream
It is encrypted, the data after encryption is written in the encryption file of preservation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611118321.7A CN106788995B (en) | 2016-12-07 | 2016-12-07 | File encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611118321.7A CN106788995B (en) | 2016-12-07 | 2016-12-07 | File encryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106788995A true CN106788995A (en) | 2017-05-31 |
CN106788995B CN106788995B (en) | 2020-09-04 |
Family
ID=58881270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611118321.7A Active CN106788995B (en) | 2016-12-07 | 2016-12-07 | File encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106788995B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819569A (en) * | 2017-12-14 | 2018-03-20 | 平安科技(深圳)有限公司 | The encryption method and terminal device of log-on message |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
CN110321673A (en) * | 2018-03-28 | 2019-10-11 | 北京京东尚科信息技术有限公司 | Information ciphering method and device, information decryption method and device, security system |
CN110414249A (en) * | 2019-07-24 | 2019-11-05 | Oppo广东移动通信有限公司 | Information processing method, device, storage medium and electronic equipment |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN112217806A (en) * | 2020-09-23 | 2021-01-12 | 深圳杰微芯片科技有限公司 | Data transmission encryption method, server and storage medium |
CN112968899A (en) * | 2021-02-26 | 2021-06-15 | 上海掌门科技有限公司 | Method and equipment for encrypted communication |
CN113259438A (en) * | 2021-05-14 | 2021-08-13 | 北京达佳互联信息技术有限公司 | Method and device for sending model file and method and device for receiving model file |
CN113468544A (en) * | 2020-03-30 | 2021-10-01 | 杭州海康威视数字技术股份有限公司 | Training method and device of application model |
CN113642033A (en) * | 2021-10-19 | 2021-11-12 | 太平金融科技服务(上海)有限公司深圳分公司 | Encryption method, decryption method, device, equipment and storage medium |
CN114340113A (en) * | 2021-12-30 | 2022-04-12 | 智马达汽车有限公司 | Information processing method and device based on vehicle light |
CN114567676A (en) * | 2022-03-14 | 2022-05-31 | 杭州电子科技大学 | Private file container entry hiding method based on multi-level encryption |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090217359A1 (en) * | 2008-01-18 | 2009-08-27 | Norifumi Kikkawa | Connection authentication system, terminal apparaus, connection authentication server, connection authentication method, and program |
CN101894244A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN102983972A (en) * | 2012-10-18 | 2013-03-20 | 郎六琪 | Dynamic encryption and decryption method based on stream cipher |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN106022147A (en) * | 2016-05-26 | 2016-10-12 | 珠海市魅族科技有限公司 | Method and device for file encryption and decryption |
-
2016
- 2016-12-07 CN CN201611118321.7A patent/CN106788995B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090217359A1 (en) * | 2008-01-18 | 2009-08-27 | Norifumi Kikkawa | Connection authentication system, terminal apparaus, connection authentication server, connection authentication method, and program |
CN101894244A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN102983972A (en) * | 2012-10-18 | 2013-03-20 | 郎六琪 | Dynamic encryption and decryption method based on stream cipher |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN106022147A (en) * | 2016-05-26 | 2016-10-12 | 珠海市魅族科技有限公司 | Method and device for file encryption and decryption |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819569B (en) * | 2017-12-14 | 2018-09-11 | 平安科技(深圳)有限公司 | The encryption method and terminal device of log-on message |
CN107819569A (en) * | 2017-12-14 | 2018-03-20 | 平安科技(深圳)有限公司 | The encryption method and terminal device of log-on message |
CN110321673A (en) * | 2018-03-28 | 2019-10-11 | 北京京东尚科信息技术有限公司 | Information ciphering method and device, information decryption method and device, security system |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
CN109150499B (en) * | 2018-08-29 | 2021-06-08 | 深圳市迷你玩科技有限公司 | Method and device for dynamically encrypting data, computer equipment and storage medium |
CN110414249A (en) * | 2019-07-24 | 2019-11-05 | Oppo广东移动通信有限公司 | Information processing method, device, storage medium and electronic equipment |
CN113468544A (en) * | 2020-03-30 | 2021-10-01 | 杭州海康威视数字技术股份有限公司 | Training method and device of application model |
CN113468544B (en) * | 2020-03-30 | 2024-04-05 | 杭州海康威视数字技术股份有限公司 | Training method and device for application model |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN112217806A (en) * | 2020-09-23 | 2021-01-12 | 深圳杰微芯片科技有限公司 | Data transmission encryption method, server and storage medium |
CN112968899A (en) * | 2021-02-26 | 2021-06-15 | 上海掌门科技有限公司 | Method and equipment for encrypted communication |
CN112968899B (en) * | 2021-02-26 | 2022-11-08 | 上海掌门科技有限公司 | Method and equipment for encrypted communication |
CN113259438B (en) * | 2021-05-14 | 2023-03-31 | 北京达佳互联信息技术有限公司 | Method and device for sending model file and method and device for receiving model file |
CN113259438A (en) * | 2021-05-14 | 2021-08-13 | 北京达佳互联信息技术有限公司 | Method and device for sending model file and method and device for receiving model file |
CN113642033A (en) * | 2021-10-19 | 2021-11-12 | 太平金融科技服务(上海)有限公司深圳分公司 | Encryption method, decryption method, device, equipment and storage medium |
CN114340113A (en) * | 2021-12-30 | 2022-04-12 | 智马达汽车有限公司 | Information processing method and device based on vehicle light |
CN114340113B (en) * | 2021-12-30 | 2023-10-13 | 浙江智马达智能科技有限公司 | Information processing method and device based on vehicle lamplight |
CN114567676A (en) * | 2022-03-14 | 2022-05-31 | 杭州电子科技大学 | Private file container entry hiding method based on multi-level encryption |
CN114567676B (en) * | 2022-03-14 | 2024-02-02 | 杭州电子科技大学 | Private based on multistage encryption File container entry concealing method |
Also Published As
Publication number | Publication date |
---|---|
CN106788995B (en) | 2020-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106788995A (en) | File encrypting method and device | |
CN106161006B (en) | Digital encryption algorithm | |
CN106599723B (en) | File encryption method and device and file decryption method and device | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN102662767B (en) | A kind of method based on Synchronizing Passwords between mobile terminal each browser and mobile terminal | |
CN102782692A (en) | System, apparatus and method for encryption and decryption of data transmitted over a network | |
JP6346942B2 (en) | Blocking password attacks | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN106027228A (en) | Encryption and decryption methods and encryption and decryption systems for webpage identification | |
CN106817358A (en) | The encryption and decryption method and equipment of a kind of user resources | |
CN103873250B (en) | A kind of ciphertext generation method, ciphertext decryption method and encrypting and decrypting device | |
Hamdan et al. | AH4S: an algorithm of text in text steganography using the structure of omega network | |
CN109117670A (en) | A kind of realization shear plate data encryption and decryption method, apparatus and hardware device | |
US10063590B1 (en) | Secure message protocol | |
US20150363588A1 (en) | Apparatus and method for password authentication | |
CA2763860C (en) | System, architecture and method for secure encryption and decryption | |
WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
Iranmanesh et al. | On using emoticons and lingoes for hiding data in SMS | |
CN116192445A (en) | User login verification method, device, equipment and storage medium | |
CN105678185A (en) | Data security protection method and intelligent terminal management system | |
CN101848172A (en) | Instant messaging text processing system and method | |
EP2876569A1 (en) | Apparatuses and methods for password authentication | |
CN114584407A (en) | System for embedding and extracting multilingual hidden data in online message | |
CN108701195B (en) | Data security protection method and device | |
US8966254B2 (en) | Keyless challenge and response system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |