CN106961324A - A kind of message encryption method and device - Google Patents

A kind of message encryption method and device Download PDF

Info

Publication number
CN106961324A
CN106961324A CN201710256697.2A CN201710256697A CN106961324A CN 106961324 A CN106961324 A CN 106961324A CN 201710256697 A CN201710256697 A CN 201710256697A CN 106961324 A CN106961324 A CN 106961324A
Authority
CN
China
Prior art keywords
filling
message
encrypted message
piecemeal
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710256697.2A
Other languages
Chinese (zh)
Inventor
沈文策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Cnfol Information Technology Co Ltd
Original Assignee
Fujian Cnfol Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Cnfol Information Technology Co Ltd filed Critical Fujian Cnfol Information Technology Co Ltd
Priority to CN201710256697.2A priority Critical patent/CN106961324A/en
Publication of CN106961324A publication Critical patent/CN106961324A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]

Abstract

The embodiments of the invention provide a kind of message encryption method, applied to the terminal device for installing iOS system, methods described includes:Using default AES encryption algorithm, the first message is encrypted, the first encrypted message is generated, wherein, the encryption includes piecemeal and handled and filling processing;The corresponding default first piecemeal mark of the first partitioned mode that piecemeal processing is used, writes the first flag bit reserved in first encrypted message;The filling is handled to the corresponding default first filling mark of the first filling mode used, the second flag bit reserved in first encrypted message is write;The first encrypted message write after first flag bit and second flag bit is sent to JAVA application servers.Using the embodiment of the present invention JAVA application servers can be made accurately to decrypt and the message that the terminal device of iOS system is sent is installed.

Description

A kind of message encryption method and device
Technical field
The present invention relates to message encryption technical field, more particularly to a kind of message encryption method and device.
Background technology
With the fast development of mobile terminal technology, the information security issue of mobile terminal is also more and more closed Note.High-level data encryption standard (Advanced Encryption Standard, AES) AES is that one kind is widely used in The AES of mobile terminal and the information interaction of server.
In AES encryption algorithm, the partitioned mode to message and more flexible, the partitioned mode to the filling mode of message Can be cipher block chaining (Cipher Block Chaining, CBC) partitioned mode or code book pattern (Electronic Codebook Book, ECB) partitioned mode or cipher feedback (Cipher FeedBack, CFB) piecemeal The partitioned modes such as mode, filling mode can be without filling (NoPadding) mode or the 5th public key cryptography standard The filling modes such as (The Public-Key Cryptography Standards5Padding, PKCS5Padding) mode.
But, in actual applications, the situation of decrypting end decryption failure often occurs, to install the movement of iOS system Illustrated exemplified by interacting between terminal and JAVA application servers:
Message to be sent is encrypted using AES encryption algorithm for mobile terminal, generates encrypted message, wherein, plus Close processing to message to be sent is filled processing including the use of the NoPadding modes that C language is given tacit consent to, then encrypted message is sent out Deliver to JAVA application servers;JAVA application servers are also entered using AES encryption algorithm to the encrypted message from mobile terminal Row decryption processing, the message after being decrypted, wherein, the PKCS5Padding side that decryption processing is given tacit consent to including the use of JAVA language Formula carries out going filling to handle to message to be sent;So, message and movement after the decryption that JAVA application servers finally give The message to be sent of terminal is inconsistent, causes the decryption failure of JAVA application servers.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of message encryption method and device, so that JAVA application server energy Enough accurately decrypt installs the message that the terminal device of iOS system is sent.Concrete technical scheme is as follows:
A kind of embodiment of the present invention proposes a kind of message encryption method, applied to the terminal device for installing iOS system, Methods described includes:Using default AES encryption algorithm, the first message is encrypted, the first encrypted message is generated, its In, the encryption includes piecemeal and handled and filling processing;The first partitioned mode that piecemeal processing is used is corresponding Default first piecemeal mark, writes the first flag bit reserved in first encrypted message;The filling is handled what is used The corresponding default first filling mark of first filling mode, writes the second flag bit reserved in first encrypted message;Will The first encrypted message write after first flag bit and second flag bit is sent to JAVA application servers.
It is preferred that, first partitioned mode includes ECB partitioned modes, and first filling mode includes PKCS5Padding modes;It is described to use default AES encryption algorithm, default first message is encrypted, generated First encrypted message, wherein, the encryption includes the step of piecemeal handles and fills processing, including:Use the ECB points Block mode, piecemeal processing is carried out to default first message;Using the PKCS5Padding modes, to the after piecemeal processing One message is filled processing;Using default AES encryption algorithm, the first message after handling filling is encrypted, Generate the first encrypted message.
It is preferred that, methods described also includes:Receive the second encrypted message from the JAVA application servers;Parsing institute State the second encrypted message, analytically after the second encrypted message in default 3rd flag bit and default 4th flag bit, The second piecemeal mark and the second filling mark are read respectively;Identified according to second piecemeal, determine the second partitioned mode;According to The second filling mark, determines the second filling mode;Using the AES encryption algorithm, to the second encrypted message after parsing Processing is decrypted, the second message after being decrypted, wherein, the decryption processing is including the use of second partitioned mode pair The second encrypted message after the parsing is combined processing, and using second filling mode to the after the parsing Two encrypted messages carry out going filling to handle.
Another embodiment of the present invention proposes a kind of message encryption method, described applied to JAVA application servers Method includes:Receive the first encrypted message of the terminal device for carrying out self installation iOS system;First encrypted message is parsed, from In the first encrypted message after parsing in default first flag bit and default second flag bit, the first piecemeal mark is read respectively Know and the first filling mark;Identified according to first piecemeal, determine the first partitioned mode;Identified according to the described first filling, Determine the first filling mode;Using default AES encryption algorithm, processing is decrypted to the first encrypted message after parsing, obtained The first message after to decryption, wherein, the decryption processing is including the use of first partitioned mode to after the parsing One encrypted message is combined processing, and the first encrypted message after the parsing is carried out using first filling mode Filling is gone to handle.
It is preferred that, methods described also includes:Using the AES encryption algorithm, place is encrypted to default second message Reason, generates the second encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;Piecemeal processing is made The corresponding default second piecemeal mark of second partitioned mode, writes the 3rd mark reserved in second encrypted message Position;The filling is handled to the corresponding default second filling mark of the second filling mode used, the second encryption report is write The 4th flag bit reserved in text;The second encrypted message for having been written into the 3rd flag bit and the 4th flag bit is sent To the terminal device of the installation iOS system.
It is preferred that, methods described also includes:Receive the first encrypted message from the terminal device;Parse described first Encrypted message, analytically after the first encrypted message in default first flag bit and default second flag bit, read respectively Take the first piecemeal mark and the first filling mark;Identified according to first piecemeal, determine the first partitioned mode;According to described One filling mark, determines the first filling mode;Using the AES encryption algorithm, the first encrypted message after parsing is solved Close processing, the first message after being decrypted, wherein, the decryption processing is including the use of first partitioned mode to the solution The first encrypted message after analysis is combined processing, and using first filling mode to the first encryption after the parsing Message carries out going filling to handle.
Another embodiment of the present invention proposes a kind of message encryption device, is set applied to the terminal for installing iOS system Standby, described device includes:Ciphering unit, for using default AES encryption algorithm, the first message is encrypted, raw Into the first encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;Writing unit, for that described will divide The corresponding default first piecemeal mark of the first partitioned mode for using of block processing, writes the reserved in first encrypted message One flag bit;Writing unit, is additionally operable to handling the filling into the corresponding default first filling mark of the first filling mode used Know, write the second flag bit reserved in first encrypted message;Transmitting element, for will write first flag bit and The first encrypted message after second flag bit is sent to JAVA application servers.
It is preferred that, first partitioned mode includes ECB partitioned modes, and first filling mode includes PKCS5Padding modes;The ciphering unit, including piecemeal subelement, filling subelement and generation subelement;The piecemeal Subelement, for using the ECB partitioned modes, piecemeal processing is carried out to default first message;The filling subelement, is used In using the PKCS5Padding modes, processing is filled to the first message after piecemeal processing;The generation subelement, For using default AES encryption algorithm, the first message after handling filling is encrypted, the encryption report of generation first Text.
It is preferred that, described device also includes:Receiving unit, for receive from the JAVA application servers second plus Secret report text;Resolution unit, for parsing second encrypted message, analytically after the second encrypted message in it is default 3rd mark In will position and default 4th flag bit, the second piecemeal mark and the second filling mark are read respectively;Determining unit, for basis The second piecemeal mark, determines the second partitioned mode;Determining unit, is additionally operable to be identified according to the described second filling, determines the Two filling modes;Decryption unit, for using the AES encryption algorithm, place is decrypted to the second encrypted message after parsing Reason, the second message after being decrypted, wherein, the decryption processing including the use of second partitioned mode to the parsing after The second encrypted message be combined processing, and using second filling mode to the second encrypted message after the parsing Progress goes filling to handle.
The another embodiment of the present invention proposes a kind of message encryption device, described applied to JAVA application servers Device includes:Receiving unit, the first encrypted message for receiving the terminal device for carrying out self installation iOS system;Resolution unit, is used In parsing first encrypted message, analytically after the first encrypted message in default first flag bit and default second mark In will position, the first piecemeal mark and the first filling mark are read respectively;Determining unit, for being identified according to first piecemeal, Determine the first partitioned mode;Determining unit, is additionally operable to be identified according to the described first filling, determines the first filling mode;Decryption is single Member, for using default AES encryption algorithm, is decrypted processing, after being decrypted to the first encrypted message after parsing First message, wherein, the decryption processing is including the use of first partitioned mode to the first encrypted message after the parsing Processing is combined, and the first encrypted message progress after the parsing is gone at filling using first filling mode Reason.
It is preferred that, first partitioned mode includes ECB partitioned modes, and first filling mode includes PKCS5Padding modes;The decryption unit, including combine subelement, remove filling subelement and decrypt subelement;Described group Zygote unit, for using the ECB partitioned modes, processing is combined to the first encrypted message after parsing;It is described to go to fill out Subelement is filled, for using the PKCS5Padding modes, the first encrypted message after piecemeal processing go at filling Reason;The decryption subelement, for using the AES encryption algorithm, is solved to the first encrypted message after going filling to handle Close processing, the first message after being decrypted.
It is preferred that, described device also includes:Ciphering unit, for using the AES encryption algorithm, is reported to default second Text is encrypted, and generates the second encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;Write-in Unit, the corresponding default second piecemeal mark of the second partitioned mode for piecemeal processing to be used, write-in described second The 3rd flag bit reserved in encrypted message;Writing unit, is additionally operable to handling the filling into the second filling mode pair used The default second filling mark answered, writes the 4th flag bit reserved in second encrypted message;Transmitting element, for by The second encrypted message for writing the 3rd flag bit and the 4th flag bit sends to the terminal of the installation iOS system and set It is standby.
A kind of message encryption method and device provided in an embodiment of the present invention, in the process, installs the end of iOS system End equipment first uses AES encryption algorithm, and the first message is encrypted, and generates the first encrypted message;Next, by piecemeal Handle the first mark reserved in the corresponding default first piecemeal mark of the first partitioned mode used, the first encrypted message of write-in Position, and filling is handled in the corresponding default first filling mark of the first filling mode used, the first encrypted message of write-in The second reserved flag bit;Finally, the first encrypted message write after the first flag bit and the second flag bit is sent to JAVA Application server.
So, receiving the JAVA application servers of the first encrypted message can indicate according to the first flag bit and second Position, it is determined that the partitioned mode and filling mode that are used during decryption so that install terminal device and the JAVA application services of iOS system The partitioned mode and filling mode that device is used are consistent, it is ensured that JAVA application server successful decryptions.Certainly, the present invention is implemented Any product or method it is not absolutely required to while reaching all the above advantage.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the message encryption method of the embodiment of the present invention;
Fig. 2 is another flow chart of the message encryption method of the embodiment of the present invention;
Fig. 3 is another flow chart of the message encryption method of the embodiment of the present invention;
Fig. 4 is another flow chart of the message encryption method of the embodiment of the present invention;
Fig. 5 is a kind of structure chart of the message encryption device of the embodiment of the present invention;
Fig. 6 is another structure chart of the message encryption device of the embodiment of the present invention;
Fig. 7 is another structure chart of the message encryption device of the embodiment of the present invention;
Fig. 8 is the yet another construction figure of the message encryption device of the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of message encryption method, applied to the terminal device for installing iOS system.Referring to figure 1, Fig. 1 is a kind of flow chart of the message encryption method of the embodiment of the present invention, is comprised the following steps:
Step 101, using default AES encryption algorithm, the first message is encrypted, the encryption report of generation first Text;
Wherein, the encryption includes piecemeal processing and filling processing.
In actual applications, when the terminal device for installing iOS system runs a certain JAVA application programs, it is necessary to and JAVA Application server carries out data interaction;In order to ensure the security of data, the embodiment of the present invention is using AES encryption algorithm to installing The first message to be sent is encrypted in the terminal device of iOS system.
It should be noted that including during the first message is encrypted using AES encryption algorithm to first The piecemeal processing and filling processing of message.Wherein, piecemeal processing can use one kind in a variety of partitioned modes, such as CBC points Block mode, ECB partitioned modes and CFB block modes, similarly, filling processing can use one kind in multiple filling mode, such as NoPadding modes and PKCS5Padding modes.
Optionally, in embodiments of the present invention, first partitioned mode includes ECB partitioned modes, first filling Mode includes PKCS5Padding modes;Step 101 can specifically include:
Using the ECB partitioned modes, piecemeal processing is carried out to first message;
Using the PKCS5Padding modes, processing is filled to the first message after piecemeal processing;
Using default AES encryption algorithm, the first message after handling filling is encrypted, and generation first is encrypted Message.
Specifically, first, using ECB partitioned modes, the first message is divided into some groups of equal length, wherein, finally One group of length is likely less than other groups;Next, being filled using PKCS5Padding modes to last group;Such as, When last group is than few 1 byte of other groups, then byte 0x01 is just filled up to last group, when last group is than it He organizes few 2 byte, and that just fills up byte 0x02 to last group, is organized when last and organizes few 3 byte than other, that Byte 0x03 is just filled up to last group;Then, using AES encryption algorithm, the first message after handling filling It is encrypted, generates the first encrypted message.
It should also be noted that, piecemeal processing, filling processing and encryption detailed process may be referred to it is existing Technology, will not be repeated here.
Step 102, the corresponding default first piecemeal mark of the first partitioned mode piecemeal processing used, writes institute State the first flag bit reserved in the first encrypted message;
In actual applications, the first reserved flag bit can be located at the header position of the first encrypted message, normal conditions Under, receiving terminal parses header when receiving the first encrypted message first, so, and receiving terminal can be first got positioned at header bit The first flag bit put, further according to the information carried in the first flag bit, is handled the first encrypted message;Certainly, also may be used According to actual needs, to determine the reserved location of the first flag bit.
, can be according to the corresponding relation between default partitioned mode and piecemeal mark, by step 101 in specific implementation The first flag bit reserved in the corresponding first piecemeal mark of middle the first partitioned mode used, the first encrypted message of write-in.
Step 103, the filling is handled to corresponding default first filling of the first filling mode used to identify, institute is write State the second flag bit reserved in the first encrypted message;
In actual applications, with the first flag bit similarly, the second reserved flag bit can be located at the first encrypted message Header position, it is of course also possible to according to actual needs, determine the reserved location of the second flag bit.
, can be according to the corresponding relation between default filling mode and filling mark, by step 101 in specific implementation Middle the first filling mode used corresponding first fills the second flag bit reserved in mark, the first encrypted message of write-in.
It should be noted that the present invention is not any limitation as to the execution sequence of step 102 and step 103, it can first carry out Step 102 performs step 103 again, can also first carry out step 103 and perform step 102 again, it is of course also possible to perform step simultaneously 102 and step 103.
Step 104, by the first encrypted message write after first flag bit and second flag bit send to JAVA application servers.
In this step, the terminal device for installing iOS system adds carry the first flag bit and the second flag bit first Secret report text is sent to JAVA application servers.
So, JAVA application servers are after the first encrypted message of the terminal device for carrying out self installation iOS system is received, The first flag bit and the second flag bit can be obtained by parsing the first encrypted message, and then determine the first partitioned mode and first Filling mode.
It can be seen that, in embodiments of the present invention, the first piecemeal used during by the way that the terminal device for installing iOS system being encrypted Mode corresponding first piecemeal mark, and the corresponding first filling mark of the first filling mode are write such as the first encrypted message, are made JAVA application servers when being parsed to the first encrypted message, it may be determined that the first partitioned mode for being used during encryption with First filling mode, it is to avoid occur due to JAVA application servers and install the partitioned mode that the terminal device of iOS system is used And/or filling mode is inconsistent, caused by JAVA application servers decryption failure.
Next, when JAVA application servers receive the first encrypted message of the terminal device for carrying out self installation iOS system, The embodiment of the invention also discloses a kind of message encryption method, applied to JAVA application servers;Referring to Fig. 2, Fig. 2 is the present invention Another flow chart of the message encryption method of embodiment, comprises the following steps:
Step 201, the first encrypted message of the terminal device for carrying out self installation iOS system is received;
Step 202, parse first encrypted message, analytically after the first encrypted message in default first flag bit In default second flag bit, the first piecemeal mark and the first filling mark are read respectively;
In this step, JAVA application servers are reserved by parsing the first encrypted message from the first encrypted message The first piecemeal mark and the first filling mark are read in first flag bit and the second flag bit respectively.
Step 203, identified according to first piecemeal, determine the first partitioned mode;
, can be according to the corresponding relation between default partitioned mode and piecemeal mark, according to first in specific implementation Piecemeal is identified, and determines corresponding first partitioned mode;It should be understood that the corresponding relation between partitioned mode and piecemeal mark is What JAVA application servers and the terminal device of installation iOS system were consulted in advance.
Step 204, identified according to the described first filling, determine the first filling mode;
, can be according to the corresponding relation between default filling mode and filling mark, according to first in specific implementation Filling mark, determines corresponding first filling mode;It should be understood that the corresponding relation between filling mode and filling mark It is that JAVA application servers are consulted in advance with the terminal device for installing iOS system.
It should be noted that the present invention is not any limitation as to the execution sequence of step 203 and step 204, it can first carry out Step 203 performs step 204 again, can also first carry out step 204 and perform step 203 again, it is of course also possible to perform step simultaneously 203 and step 204.
Step 205, using default AES encryption algorithm, processing is decrypted to the first encrypted message after parsing, obtained The first message after decryption.
Wherein, the decryption processing is entered including the use of first partitioned mode to the first encrypted message after the parsing Row combined treatment, and go filling to handle the first encrypted message progress after the parsing using first filling mode.
In this step, JAVA application servers use the first partitioned mode and the first filling mode to the first encrypted message Processing is decrypted.
Optionally, corresponding with step 101, first partitioned mode includes ECB partitioned modes, the first filling side Formula includes PKCS5Padding modes;Step 205 can specifically include:
Using the ECB partitioned modes, processing is combined to the first encrypted message after parsing;
Using the PKCS5Padding modes, the first encrypted message after piecemeal processing is carried out going filling to handle;
Using the AES encryption algorithm, processing is decrypted to the first encrypted message after going filling to handle, decrypted The first message afterwards.
Specifically, first, using ECB partitioned modes, the first encrypted message after parsing, being divided into some groups is carried out Combined treatment;Next, carrying out going filling to the first encrypted message using PKCS5Padding modes, remove installation iOS system The field added in ciphering process of terminal device;Then, using AES encryption algorithm, to going first after filling processing to add Processing is decrypted in secret report text, the first message after being decrypted.
It should also be noted that, combined treatment, go filling handle and decryption processing detailed process may be referred to it is existing There is technology, will not be repeated here.
It should be understood that the first message after the decryption that JAVA application servers are obtained after decryption processing, it should with First message to be sent in the terminal device of iOS system is installed identical.
It can be seen that, in embodiments of the present invention, JAVA application servers by being parsed to the first encrypted message, it is determined that plus The first partitioned mode used when close and the first filling mode, and then using the first partitioned mode to the first encrypted message carry out group Conjunction handle, and using the first filling mode to the first encrypted message carry out go filling to handle, it is ensured that JAVA application servers and The partitioned mode and/or filling mode that the terminal device of installation iOS system is used are consistent, it is to avoid the decryption of JAVA application servers is lost Lose.
In addition, in actual applications, data transfer is initiated to the terminal device for installing iOS system in JAVA application servers Scene under;Based on the embodiment described in Fig. 2, the embodiment of the present invention discloses a kind of message encryption method again, applied to JAVA Application server;Referring to Fig. 3, Fig. 3 is another flow chart of the message encryption method of the embodiment of the present invention, including step as follows Suddenly:
Step 301, using the AES encryption algorithm, default second message is encrypted, generation second is encrypted Message;
Wherein, the encryption includes piecemeal processing and filling processing.
In actual applications, when JAVA application servers send data to the terminal device for installing iOS system, in order to protect The security of data is demonstrate,proved, the embodiment of the present invention is using AES encryption algorithm to the second message to be sent in JAVA application servers It is encrypted.
Step 302, the corresponding default second piecemeal mark of the second partitioned mode piecemeal processing used, writes institute State the 3rd flag bit reserved in the second encrypted message;
In actual applications, with the first flag bit similarly, the 3rd reserved flag bit can be located at the second encrypted message Header position, it is of course also possible to according to actual needs, determine the reserved location of the 3rd flag bit.
, can be according to the corresponding relation between default partitioned mode and piecemeal mark, by step 301 in specific implementation The 3rd flag bit reserved in the corresponding second piecemeal mark of middle the second partitioned mode used, the second encrypted message of write-in.
Wherein, the corresponding relation in step 302 between default partitioned mode and piecemeal mark can with it is pre- in step 102 If partitioned mode and piecemeal identify between corresponding relation it is identical, can also be different, can specifically be determined according to actual conditions.
Step 303, the filling is handled to corresponding default second filling of the second filling mode used to identify, institute is write State the 4th flag bit reserved in the second encrypted message;
In actual applications, with the first flag bit similarly, the 4th reserved flag bit can be located at the second encrypted message Header position, it is of course also possible to according to actual needs, determine the reserved location of the 4th flag bit.
, can be according to the corresponding relation between default filling mode and filling mark, by step 301 in specific implementation Middle the second filling mode used corresponding second fills the 4th flag bit reserved in mark, the second encrypted message of write-in.
Similarly, the corresponding relation in step 303 between default filling mode and filling mark can with it is pre- in step 103 If filling mode it is identical with the corresponding relation between filling mark, can also be different, can specifically be determined according to actual conditions.
It should be noted that the present invention is not any limitation as to the execution sequence of step 302 and step 303, it can first carry out Step 302 performs step 303 again, can also first carry out step 303 and perform step 302 again, it is of course also possible to perform step simultaneously 302 and step 303.
Step 304, the second encrypted message for having been written into the 3rd flag bit and the 4th flag bit is sent to institute State the terminal device for installing iOS system.
In this step, JAVA application servers send out the second encrypted message for carrying the 3rd flag bit and the 4th flag bit Deliver to the terminal device for installing iOS system.
So, the terminal device of iOS system is installed after the second encrypted message from JAVA application servers is received, The 3rd flag bit and the 4th flag bit can be obtained by parsing the second encrypted message, and then determine the second partitioned mode and second Filling mode.
It can be seen that, in embodiments of the present invention, the first partitioned mode pair used during by the way that JAVA application servers being encrypted The the first piecemeal mark answered, and the corresponding first filling mark of the first filling mode are write such as the first encrypted message so that install The terminal device of iOS system to the first encrypted message when parsing, it may be determined that the first partitioned mode used during encryption With the first filling mode, it is to avoid occur due to JAVA application servers and install the piecemeal side that the terminal device of iOS system is used Formula and/or filling mode are inconsistent, caused by install iOS system terminal device decryption failure.
Next, when the terminal device for installing iOS system receives the first encrypted message from JAVA application servers, Based on the embodiment described in Fig. 1, the embodiment of the present invention separately discloses a kind of message encryption method, applied to installation iOS system Terminal device;Referring to Fig. 4, Fig. 4 is another flow chart of the message encryption method of the embodiment of the present invention, is comprised the following steps:
Step 401, the second encrypted message from the JAVA application servers is received;
Step 402, parse second encrypted message, analytically after the second encrypted message in default 3rd flag bit In default 4th flag bit, the second piecemeal mark and the second filling mark are read respectively;
In this step, the terminal device of iOS system is installed by parsing the second encrypted message, from the second encrypted message The second piecemeal mark and the second filling mark are read in the 3rd reserved flag bit and the 4th flag bit respectively.
Step 403, identified according to second piecemeal, determine the second partitioned mode;
, can be according to the corresponding relation between default partitioned mode and piecemeal mark, according to second in specific implementation Piecemeal is identified, and determines corresponding second partitioned mode;It should be understood that the corresponding relation between partitioned mode and piecemeal mark is What JAVA application servers and the terminal device of installation iOS system were consulted in advance.
Step 404, identified according to the described second filling, determine the second filling mode;
, can be according to the corresponding relation between default filling mode and filling mark, according to second in specific implementation Filling mark, determines corresponding second filling mode;It should be understood that the corresponding relation between filling mode and filling mark It is that JAVA application servers are consulted in advance with the terminal device for installing iOS system.
It should be noted that the present invention is not any limitation as to the execution sequence of step 403 and step 404, it can first carry out Step 403 performs step 404 again, can also first carry out step 404 and perform step 403 again, it is of course also possible to perform step simultaneously 403 and step 404.
Step 405, using the AES encryption algorithm, processing is decrypted to the second encrypted message after parsing, solved The second message after close.
Wherein, the decryption processing is entered including the use of second partitioned mode to the second encrypted message after the parsing Row combined treatment, and go filling to handle the second encrypted message progress after the parsing using second filling mode.
It should be understood that the second message after the decryption that the terminal device for installing iOS system is obtained after decryption processing, Should be identical with the second message to be sent in JAVA application servers.
It can be seen that, in embodiments of the present invention, the terminal device of iOS system is installed by being solved to the second encrypted message Analysis, it is determined that the second partitioned mode used during encryption and the second filling mode, and then encrypted using the second partitioned mode to second Message is combined processing, and goes filling to handle the progress of the second encrypted message using the second filling mode, it is ensured that JAVA should It is consistent with the partitioned mode and/or filling mode that the terminal device for installing iOS system is used with server, it is to avoid iOS systems are installed The terminal device decryption failure of system.
The embodiment of the present invention discloses a kind of message encryption device again, applied to the terminal device for installing iOS system.Referring to Fig. 5, Fig. 5 are a kind of structure chart of the message encryption device of the embodiment of the present invention, and the device is relative with the method flow shown in Fig. 1 Should, described device includes:
Ciphering unit 501, for using default high-level data Encryption Standard AES AES, is carried out to the first message Encryption, generates the first encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;
Writing unit 502, the corresponding default first piecemeal mark of the first partitioned mode for piecemeal processing to be used Know, write the first flag bit reserved in first encrypted message;
Writing unit 502, is additionally operable to handling the filling into corresponding default first filling of the first filling mode used Mark, writes the second flag bit reserved in first encrypted message;
Transmitting element 503, for the first encrypted message after first flag bit and second flag bit will to be write Send to JAVA application servers.
It can be seen that, in embodiments of the present invention, the first piecemeal used during by the way that the terminal device for installing iOS system being encrypted Mode corresponding first piecemeal mark, and the corresponding first filling mark of the first filling mode are write such as the first encrypted message, are made JAVA application servers when being parsed to the first encrypted message, it may be determined that the first partitioned mode for being used during encryption with First filling mode, it is to avoid occur due to JAVA application servers and install the partitioned mode that the terminal device of iOS system is used And/or filling mode is inconsistent, caused by JAVA application servers decryption failure.
Optionally, first partitioned mode includes ECB partitioned modes, and first filling mode includes PKCS5Padding modes;
The ciphering unit 501, including piecemeal subelement, filling subelement and generation subelement;
The piecemeal subelement, for using the ECB partitioned modes, piecemeal processing is carried out to default first message;
The filling subelement, for using the PKCS5Padding modes, enters to the first message after piecemeal processing Row filling is handled;
The generation subelement, for using default AES encryption algorithm, the first message after handling filling is added Close processing, generates the first encrypted message.
It is preferred that, based on the message encryption device shown in Fig. 5, the embodiment of the present invention discloses a kind of message encryption dress again Put, applied to the terminal device for installing iOS system;Referring to Fig. 6, Fig. 6 is another for the message encryption device of the embodiment of the present invention Structure chart is planted, the device is corresponding with the method flow shown in Fig. 3, and described device also includes:
Receiving unit 601, for receiving the second encrypted message from the JAVA application servers;
Resolution unit 602, for parsing second encrypted message, analytically after the second encrypted message in default In three flag bits and default 4th flag bit, the second piecemeal mark and the second filling mark are read respectively;
Determining unit 603, for being identified according to second piecemeal, determines the second partitioned mode;
Determining unit 603, is additionally operable to be identified according to the described second filling, determines the second filling mode;
Decryption unit 604, for using the AES encryption algorithm, place is decrypted to the second encrypted message after parsing Reason, the second message after being decrypted, wherein, the decryption processing including the use of second partitioned mode to the parsing after The second encrypted message be combined processing, and using second filling mode to the second encrypted message after the parsing Progress goes filling to handle.
It can be seen that, in embodiments of the present invention, the first partitioned mode pair used during by the way that JAVA application servers being encrypted The the first piecemeal mark answered, and the corresponding first filling mark of the first filling mode are write such as the first encrypted message so that install The terminal device of iOS system to the first encrypted message when parsing, it may be determined that the first partitioned mode used during encryption With the first filling mode, it is to avoid occur due to JAVA application servers and install the piecemeal side that the terminal device of iOS system is used Formula and/or filling mode are inconsistent, caused by install iOS system terminal device decryption failure.
The embodiment of the present invention discloses a kind of message encryption device again, applied to JAVA application servers.Referring to Fig. 7, Fig. 7 For another structure chart of the message encryption device of the embodiment of the present invention, the device is corresponding with the method flow shown in Fig. 2, institute Stating device includes:
Receiving unit 701, the first encrypted message for receiving the terminal device for carrying out self installation iOS system;
Resolution unit 702, for parsing first encrypted message, analytically after the first encrypted message in default In one flag bit and default second flag bit, the first piecemeal mark and the first filling mark are read respectively;
Determining unit 703, for being identified according to first piecemeal, determines the first partitioned mode;
Determining unit 703, is additionally operable to be identified according to the described first filling, determines the first filling mode;
Decryption unit 704, for using default high-level data Encryption Standard AES AES, to first after parsing Processing is decrypted in encrypted message, the first message after being decrypted, wherein, the decryption processing is including the use of described first point Block mode is combined processing to the first encrypted message after the parsing, and using first filling mode to the solution The first encrypted message after analysis carries out going filling to handle.
Optionally, first partitioned mode includes ECB partitioned modes, and first filling mode includes PKCS5Padding modes;
The decryption unit 704, including combine subelement, remove filling subelement and decrypt subelement;
The combination subelement, for using the ECB partitioned modes, is combined to the first encrypted message after parsing Processing;
It is described to go to fill subelement, for using the PKCS5Padding modes, to the first encryption after piecemeal processing Message carries out going filling to handle;
The decryption subelement, for using the AES encryption algorithm, enters to the first encrypted message after going filling to handle Row decryption processing, the first message after being decrypted.
It can be seen that, in embodiments of the present invention, JAVA application servers by being parsed to the first encrypted message, it is determined that plus The first partitioned mode used when close and the first filling mode, and then using the first partitioned mode to the first encrypted message carry out group Conjunction handle, and using the first filling mode to the first encrypted message carry out go filling to handle, it is ensured that JAVA application servers and The partitioned mode and/or filling mode that the terminal device of installation iOS system is used are consistent, it is to avoid the decryption of JAVA application servers is lost Lose.
It is preferred that, based on the message encryption device shown in Fig. 7, the embodiment of the present invention discloses a kind of message encryption dress again Put, applied to JAVA application servers;Referring to Fig. 8, Fig. 8 is the yet another construction of the message encryption device of the embodiment of the present invention Figure, the device is corresponding with the method flow shown in Fig. 4, and described device also includes:
Ciphering unit 801, for using the AES encryption algorithm, default second message is encrypted, and generates Second encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;
Writing unit 802, the corresponding default second piecemeal mark of the second partitioned mode for piecemeal processing to be used Know, write the 3rd flag bit reserved in second encrypted message;
Writing unit 802, is additionally operable to handling the filling into corresponding default second filling of the second filling mode used Mark, writes the 4th flag bit reserved in second encrypted message;
Transmitting element 803, for the second encrypted message by the 3rd flag bit and the 4th flag bit is had been written into Send to the terminal device of the installation iOS system.
It can be seen that, in embodiments of the present invention, the terminal device of iOS system is installed by being solved to the second encrypted message Analysis, it is determined that the second partitioned mode used during encryption and the second filling mode, and then encrypted using the second partitioned mode to second Message is combined processing, and goes filling to handle the progress of the second encrypted message using the second filling mode, it is ensured that JAVA should It is consistent with the partitioned mode and/or filling mode that the terminal device for installing iOS system is used with server, it is to avoid iOS systems are installed The terminal device decryption failure of system.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there is other identical element in process, method, article or equipment including the key element.
Each embodiment in this specification is described by the way of related, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Presently preferred embodiments of the present invention is the foregoing is only, is not intended to limit the scope of the present invention.It is all Any modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., are all contained in protection scope of the present invention It is interior.

Claims (10)

1. a kind of message encryption method, it is characterised in that applied to the terminal device for installing iOS system, methods described includes:
Using default high-level data Encryption Standard AES AES, the first message is encrypted, generation first is encrypted Message, wherein, the encryption includes piecemeal and handled and filling processing;
The corresponding default first piecemeal mark of the first partitioned mode that piecemeal processing is used, writes the first encryption report The first flag bit reserved in text;
The filling is handled to the corresponding default first filling mark of the first filling mode used, the first encryption report is write The second flag bit reserved in text;
The first encrypted message write after first flag bit and second flag bit is sent to JAVA application servers.
2. according to the method described in claim 1, it is characterised in that first partitioned mode includes code book ECB piecemeal sides Formula, first filling mode includes the 5th public key cryptography standard and fills PKCS5Padding modes;
It is described to use default high-level data Encryption Standard AES AES, first message is encrypted, generated First encrypted message, wherein, the encryption includes the step of piecemeal handles and fills processing, including:
Using the ECB partitioned modes, piecemeal processing is carried out to default first message;
Using the PKCS5Padding modes, processing is filled to the first message after piecemeal processing;
Using default AES encryption algorithm, the first message after handling filling is encrypted, the encryption report of generation first Text.
3. according to the method described in claim 1, it is characterised in that methods described also includes:
Receive the second encrypted message from the JAVA application servers;
Parse second encrypted message, analytically after the second encrypted message in default 3rd flag bit and the default 4th In flag bit, the second piecemeal mark and the second filling mark are read respectively;
Identified according to second piecemeal, determine the second partitioned mode;
Identified according to the described second filling, determine the second filling mode;
Using the AES encryption algorithm, processing is decrypted to the second encrypted message after parsing, the second report after being decrypted Text, wherein, the decryption processing is including the use of second partitioned mode to the second encrypted message carry out group after the parsing Conjunction is handled, and goes filling to handle the second encrypted message progress after the parsing using second filling mode.
4. a kind of message encryption method, it is characterised in that applied to JAVA application servers, methods described includes:
Receive the first encrypted message of the terminal device for carrying out self installation iOS system;
Parse first encrypted message, analytically after the first encrypted message in default first flag bit and default second In flag bit, the first piecemeal mark and the first filling mark are read respectively;
Identified according to first piecemeal, determine the first partitioned mode;
Identified according to the described first filling, determine the first filling mode;
Using default high-level data Encryption Standard AES AES, processing is decrypted to the first encrypted message after parsing, The first message after being decrypted, wherein, the decryption processing including the use of first partitioned mode to the parsing after First encrypted message is combined processing, and the first encrypted message after the parsing is entered using first filling mode Row goes filling to handle.
5. method according to claim 4, it is characterised in that first partitioned mode includes code book ECB piecemeal sides Formula, first filling mode includes the 5th public key cryptography standard and fills PKCS5Padding modes;
It is described to use default high-level data Encryption Standard AES AES, the first encrypted message after parsing is decrypted Processing, the first message after being decrypted, wherein, the decryption processing is including the use of first partitioned mode to the parsing The first encrypted message afterwards is combined processing, and the first encryption after the parsing is reported using first filling mode Text carries out going the step of filling is handled, including:
Using the ECB partitioned modes, processing is combined to the first encrypted message after parsing;
Using the PKCS5Padding modes, the first encrypted message after piecemeal processing is carried out going filling to handle;
Using the AES encryption algorithm, processing is decrypted to the first encrypted message after going filling to handle, after being decrypted First message.
6. method according to claim 4, it is characterised in that methods described also includes:
Using the AES encryption algorithm, default second message is encrypted, the second encrypted message is generated, wherein, institute Encryption is stated to handle including piecemeal and filling processing;
The corresponding default second piecemeal mark of the second partitioned mode that piecemeal processing is used, writes the second encryption report The 3rd flag bit reserved in text;
The filling is handled to the corresponding default second filling mark of the second filling mode used, the second encryption report is write The 4th flag bit reserved in text;
The second encrypted message for having been written into the 3rd flag bit and the 4th flag bit is sent to the installation iOS system Terminal device.
7. a kind of message encryption device, it is characterised in that applied to the terminal device for installing iOS system, described device includes:
Ciphering unit, for using default high-level data Encryption Standard AES AES, place is encrypted to the first message Reason, generates the first encrypted message, wherein, the encryption includes piecemeal and handled and filling processing;
Writing unit, the corresponding default first piecemeal mark of the first partitioned mode for piecemeal processing to be used, write-in The first flag bit reserved in first encrypted message;
Writing unit, is additionally operable to handling the filling into the corresponding default first filling mark of the first filling mode used, writes Enter the second flag bit reserved in first encrypted message;
Transmitting element, for by the first encrypted message write after first flag bit and second flag bit send to JAVA application servers.
8. device according to claim 7, it is characterised in that described device also includes:
Receiving unit, for receiving the second encrypted message from the JAVA application servers;
Resolution unit, for parsing second encrypted message, analytically after the second encrypted message in it is default 3rd mark In position and default 4th flag bit, the second piecemeal mark and the second filling mark are read respectively;
Determining unit, for being identified according to second piecemeal, determines the second partitioned mode;
Determining unit, is additionally operable to be identified according to the described second filling, determines the second filling mode;
Decryption unit, for using the AES encryption algorithm, is decrypted processing to the second encrypted message after parsing, obtains The second message after decryption, wherein, the decryption processing is including the use of second partitioned mode to second after the parsing Encrypted message is combined processing, and the second encrypted message after the parsing is gone using second filling mode Filling is handled.
9. a kind of message encryption device, it is characterised in that applied to JAVA application servers, described device includes:
Receiving unit, the first encrypted message for receiving the terminal device for carrying out self installation iOS system;
Resolution unit, for parsing first encrypted message, analytically after the first encrypted message in it is default first mark In position and default second flag bit, the first piecemeal mark and the first filling mark are read respectively;
Determining unit, for being identified according to first piecemeal, determines the first partitioned mode;
Determining unit, is additionally operable to be identified according to the described first filling, determines the first filling mode;
Decryption unit, for using default high-level data Encryption Standard AES AES, to the first encrypted message after parsing Processing is decrypted, the first message after being decrypted, wherein, the decryption processing is including the use of first partitioned mode pair The first encrypted message after the parsing is combined processing, and using first filling mode to the after the parsing One encrypted message carries out going filling to handle.
10. device according to claim 9, it is characterised in that described device also includes:
Ciphering unit, for using the AES encryption algorithm, default second message is encrypted, and generation second adds Secret report text, wherein, the encryption includes piecemeal and handled and filling processing;
Writing unit, the corresponding default second piecemeal mark of the second partitioned mode for piecemeal processing to be used, write-in The 3rd flag bit reserved in second encrypted message;
Writing unit, is additionally operable to handling the filling into the corresponding default second filling mark of the second filling mode used, writes Enter the 4th flag bit reserved in second encrypted message;
Transmitting element, for the second encrypted message for having been written into the 3rd flag bit and the 4th flag bit to be sent to institute State the terminal device for installing iOS system.
CN201710256697.2A 2017-04-19 2017-04-19 A kind of message encryption method and device Pending CN106961324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710256697.2A CN106961324A (en) 2017-04-19 2017-04-19 A kind of message encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710256697.2A CN106961324A (en) 2017-04-19 2017-04-19 A kind of message encryption method and device

Publications (1)

Publication Number Publication Date
CN106961324A true CN106961324A (en) 2017-07-18

Family

ID=59483733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710256697.2A Pending CN106961324A (en) 2017-04-19 2017-04-19 A kind of message encryption method and device

Country Status (1)

Country Link
CN (1) CN106961324A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979615A (en) * 2018-01-05 2018-05-01 新华三信息安全技术有限公司 Message encryption transmission, authentication method, device, client and fire wall

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984031A (en) * 2005-12-14 2007-06-20 中兴通讯股份有限公司 Method and device for converting data-packet-mode into element-frame-mode
CN102546156A (en) * 2012-02-01 2012-07-04 李智虎 Method, system and device for grouping encryption
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission
US20150222637A1 (en) * 2012-08-24 2015-08-06 Vmware, Inc. Secure inter-process communication and virtual workspaces on a mobile device
CN105635141A (en) * 2015-12-29 2016-06-01 沈文策 Information transmission method and device
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN106209401A (en) * 2015-04-30 2016-12-07 杭州华三通信技术有限公司 A kind of transmission method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984031A (en) * 2005-12-14 2007-06-20 中兴通讯股份有限公司 Method and device for converting data-packet-mode into element-frame-mode
CN102546156A (en) * 2012-02-01 2012-07-04 李智虎 Method, system and device for grouping encryption
US20150222637A1 (en) * 2012-08-24 2015-08-06 Vmware, Inc. Secure inter-process communication and virtual workspaces on a mobile device
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN104717213A (en) * 2015-03-05 2015-06-17 沈文策 Encryption and decryption method and system for network data transmission
CN106209401A (en) * 2015-04-30 2016-12-07 杭州华三通信技术有限公司 A kind of transmission method and device
CN105635141A (en) * 2015-12-29 2016-06-01 沈文策 Information transmission method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
COYOTEK: "AES加密-iOS与Java的同步实现", 《CSDN博客》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979615A (en) * 2018-01-05 2018-05-01 新华三信息安全技术有限公司 Message encryption transmission, authentication method, device, client and fire wall
CN107979615B (en) * 2018-01-05 2020-07-03 新华三信息安全技术有限公司 Message encryption sending and authentication method, device, client and firewall

Similar Documents

Publication Publication Date Title
CN102325320B (en) A kind of Wireless security communication method and system
KR100785810B1 (en) Apparatus and method for rfid data protection
CN107483192B (en) Data transmission method and device based on quantum communication
AU2019271965A1 (en) POS System with white box encryption key sharing
CN102045333B (en) Method for generating safety message process key
CN105897748B (en) A kind of transmission method and equipment of symmetric key
CN112332975A (en) Internet of things equipment secure communication method and system
CN113114654B (en) Terminal equipment access security authentication method, device and system
CN105430640A (en) Short message encryption and authentication method, terminal and system
CN103428204A (en) Data security implementation method capable of resisting timing attacks and devices
CN104079532A (en) Online reading method and system, client and server
CN112653719A (en) Automobile information safety storage method and device, electronic equipment and storage medium
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN107896222A (en) A kind of data processing method and system
CN104486321A (en) Web data interaction method and system and corresponding Web server
KR102585405B1 (en) Data security apparatus
CN105262759A (en) Method and system for encrypted communication
CN103856938A (en) Encryption and decryption method, system and device
CN106131801B (en) One kind being based on the connectionless environment enciphered data transmission method of android system
CN106961324A (en) A kind of message encryption method and device
CN113746642B (en) Method and system for communication between computers
CN102665204B (en) A kind of positioning service safety protecting method and system
CN104601451A (en) Instant message communication method and system
CN101437145B (en) Safety management method and apparatus for layering cipher key, and enciphering/deciphering device
CN116781265A (en) Data encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170718

WD01 Invention patent application deemed withdrawn after publication