CN107172108A - Data encryption, decryption method, data encryption, decryption device and communication system - Google Patents

Data encryption, decryption method, data encryption, decryption device and communication system Download PDF

Info

Publication number
CN107172108A
CN107172108A CN201710620884.4A CN201710620884A CN107172108A CN 107172108 A CN107172108 A CN 107172108A CN 201710620884 A CN201710620884 A CN 201710620884A CN 107172108 A CN107172108 A CN 107172108A
Authority
CN
China
Prior art keywords
data
encryption
terminal
receiving terminal
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710620884.4A
Other languages
Chinese (zh)
Inventor
袁忠
何盼
唐凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SANLINGSHENG-AN INFORMATION SYSTEM Co Ltd CHENGDU CITY
Original Assignee
SANLINGSHENG-AN INFORMATION SYSTEM Co Ltd CHENGDU CITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SANLINGSHENG-AN INFORMATION SYSTEM Co Ltd CHENGDU CITY filed Critical SANLINGSHENG-AN INFORMATION SYSTEM Co Ltd CHENGDU CITY
Priority to CN201710620884.4A priority Critical patent/CN107172108A/en
Publication of CN107172108A publication Critical patent/CN107172108A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems

Abstract

The present invention relates to data encryption, decryption method, data encryption, decryption device and communication system, belong to end message security technology area.The data ciphering method is applied to the transmission terminal of communication system, and the communication system also includes:Receiving terminal, the data ciphering method includes:The identification information of the receiving terminal is obtained, and the public key prestored;According to the operating system of the transmission terminal, the AES corresponding with the operating system of the transmission terminal is obtained by default encryption interface;Be-encrypted data is encrypted according to the public key, the identification information and acquired AES;Data after encryption are sent to the receiving terminal.Compared with prior art, because each platform employs unified encryption interface, it is achieved thereby that the purpose of the cross-platform end-to-end encryption and decryption of terminal, simplifies workload, need to only use a set of code, just can many places use.

Description

Data encryption, decryption method, data encryption, decryption device and communication system
Technical field
The invention belongs to end message security technology area, and in particular to data encryption, decryption method, data encryption, solution Close device and communication system.
Background technology
With networking, information-based high speed development, the secure access problem of information resources becomes increasingly conspicuous.User is to terminal The Safety Cognition and demand for security more and more higher of information, to ensure user terminal information safety, at the encryption and decryption of end message Reason pays close attention to direction as this area.
Encryption to end message at present, each platform has an a set of implementation of oneself, such as android, IOS with And PC etc..So that upper layer application is when calling underlying algorithm, each platform needs to be implemented separately, and not only increases workload, and Professional platform independence is poor, or even can only realize the coded communication in platform.Therefore, be badly in need of it is a kind of can carry out cross-platform operation plus solution Close treatment technology come solve prior art presence defect.
The content of the invention
In consideration of it, it is an object of the invention to provide a kind of data encryption, decryption method, data encryption, decryption device and Communication system, effectively to improve above mentioned problem.
What embodiments of the invention were realized in:
On the one hand, the embodiments of the invention provide a kind of data ciphering method, applied to the transmission terminal of communication system, institute Stating communication system also includes:Receiving terminal.The data ciphering method includes:The identification information of the receiving terminal is obtained, and The public key prestored;According to the operating system of the transmission terminal, obtained and sent eventually with described by default encryption interface The corresponding AES of the operating system at end;Treated according to the public key, the identification information and acquired AES Encryption data is encrypted;Data after encryption are sent to the receiving terminal.
Second aspect, the embodiment of the present invention additionally provides a kind of data decryption method, and the reception applied to communication system is whole End, the communication system also includes:Send terminal.The data decryption method includes:Receive and identify by the transmission terminal The encryption information of transmission;When it is encryption information to identify received information, obtain the key that prestores, the key with it is upper Public key in described data ciphering method is corresponding;According to the operating system of the receiving terminal, connect by default encryption Mouth obtains the decipherment algorithm corresponding with the operating system of the receiving terminal;According to the key and acquired decipherment algorithm The encryption information is decrypted, obtains solving confidential information.
The third aspect, the embodiment of the present invention additionally provides a kind of data encryption device, applied to communication system, the communication System also includes:Receiving terminal.The transmission terminal includes:First acquisition module, the mark for obtaining the receiving terminal Information, and the public key prestored.Second acquisition module, for the operating system according to the transmission terminal, by default Encrypt interface and obtain the AES corresponding with the operating system of the transmission terminal.Data encryption module, for according to institute Public key, the identification information and acquired AES is stated be-encrypted data is encrypted.Sending module, for that will encrypt Data afterwards are sent to the receiving terminal.
Fourth aspect, the embodiment of the present invention additionally provides a kind of data decryption apparatus, and the reception applied to communication system is whole End, the communication system also includes:Send terminal.The receiving terminal includes:Module is received and recognized, for receiving and identifying The encryption information sent by the transmission terminal.3rd acquisition module, for when identify received information be encryption information when, The key prestored is obtained, the key is corresponding with the public key in above-mentioned data ciphering method.4th acquisition module, is used In the operating system according to the receiving terminal, the operating system phase with the receiving terminal is obtained by default encryption interface Corresponding decipherment algorithm.Data decryption module, is carried out according to the key and acquired decipherment algorithm to the encryption information Decryption, obtains solving confidential information.
5th aspect, the embodiment of the present invention additionally provides a kind of communication system, including:Above-mentioned transmission terminal and above-mentioned Receiving terminal, the transmission terminal and the receiving terminal pass through Coupled processors.
Data encryption provided in an embodiment of the present invention, decryption method, data encryption, decryption device and communication system, with showing There is technology to compare, because each platform employs unified encryption interface so that upper layer application need to only be adopted when calling underlying algorithm Use a set of code, just can many places use, workload is simplified, it is achieved thereby that the mesh of the cross-platform end-to-end encryption and decryption of terminal 's.
Other features and advantages of the present invention will be illustrated in subsequent specification, also, partly be become from specification It is clear that or being understood by implementing the embodiment of the present invention.The purpose of the present invention and other advantages can be by being write Specifically noted structure is realized and obtained in specification, claims and accompanying drawing.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.By shown in accompanying drawing, above and other purpose of the invention, feature and advantage will become apparent from.In whole Identical reference indicates identical part in accompanying drawing.Deliberately accompanying drawing, emphasis are not drawn by actual size equal proportion scaling It is the purport for showing the present invention.
Fig. 1 shows the server in the communication system that the embodiment of the present invention is provided and the interaction figure of local terminal.
Fig. 2 shows the structured flowchart of a kind of electronic equipment provided in an embodiment of the present invention.
Fig. 3 shows a kind of method flow diagram of data ciphering method provided in an embodiment of the present invention.
Fig. 4 shows a kind of method flow diagram of data decryption method provided in an embodiment of the present invention.
Fig. 5 shows a kind of functional block diagram of data encrypting and deciphering device provided in an embodiment of the present invention.
Fig. 6 shows the functional block diagram of the data encryption device in Fig. 5 provided in an embodiment of the present invention.
Fig. 7 shows the functional block diagram of the data decryption apparatus in Fig. 5 provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.The present invention implementation being generally described and illustrated herein in the accompanying drawings The component of example can be arranged and designed with a variety of configurations.
Therefore, the detailed description of embodiments of the invention below to providing in the accompanying drawings is not intended to limit claimed The scope of the present invention, but be merely representative of the present invention selected embodiment.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model that the present invention is protected Enclose.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined in individual accompanying drawing, then it further need not be defined and explained in subsequent accompanying drawing.
In the description of the invention, it is necessary to which explanation, term " first ", " second ", " the 3rd " etc. are only used for differentiation and retouched State, and it is not intended that indicating or implying relative importance.
As shown in figure 1, in being the communication system 100 that data encryption provided in an embodiment of the present invention, decryption method are applied Server 101 and the schematic diagram that sends terminal 102, multiple local terminals such as receiving terminal 103 are interacted.The server 101 are communicatively coupled by network and one or more transmission terminals 102, receiving terminal 103 etc., to enter row data communication Or interaction.The server 101 can be the webserver, database server etc. or the webserver, database The integrated form server system of server etc..Each terminal device such as the transmission terminal 102, receiving terminal 103 can be individual People's computer (personal computer, PC), tablet personal computer, smart mobile phone, personal digital assistant (personal digital Assistant, PDA) etc..
As shown in Fig. 2 Fig. 2 shows the structured flowchart of a kind of electronic equipment 200 provided in an embodiment of the present invention.The electricity Sub- equipment 200 includes:Data encrypting and deciphering device 210, memory 220, storage control 230 and processor 240.
The memory 220, storage control 230, each element of processor 240 directly or indirectly electrically connect each other Connect, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or signal each other Line, which is realized, to be electrically connected with.The data encrypting and deciphering device 210 can be with the shape of software or firmware (firmware) including at least one Formula is stored in the memory 220 or is solidificated in the operating system (operating system, OS) of the electronic equipment 200 In software function module.The processor 240 is used to perform the executable module stored in memory 220, such as described number The software function module or computer program included according to ciphering and deciphering device 210.
Wherein, memory 220 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only storage (Read Only Memory, ROM), programmable read only memory (Programmable Read- Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 220 is used for storage program, and the processor 240 is performed described after execute instruction is received Program, the method performed by the electronic equipment 200 for the flow definition that aftermentioned any embodiment of the embodiment of the present invention is disclosed can be answered Realized in processor 240, or by processor 240.
Processor 240 is probably a kind of IC chip, the disposal ability with signal.Above-mentioned processor can be General processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (DSP), application specific integrated circuit (ASIC), ready-made programmable gate array Arrange (FPGA) or other PLDs, discrete gate or transistor logic, discrete hardware components.It can realize Or disclosed each method, step and logic diagram in the execution embodiment of the present invention.General processor can be microprocessor Or the processor can also be any conventional processor etc..
The embodiments of the invention provide the data ciphering method in a kind of communication system 100 being applied in Fig. 1, such as Fig. 3 It is shown.This method is that the encryption relevant interface that basic technology and JCE based on PKI systems are provided is realized.PKI(Public Key Infrastructure) it is " PKIX ", it is a kind of key management platform for following written standards, it can be All-network application provides cryptographic service and necessary key and the certificate management systems such as encrypted and digitally signed, according to PKI System can set up the infrastructure of security service.
Wherein, Fig. 3 shows the data encryption in a kind of communication system being applied in Fig. 1 provided in an embodiment of the present invention The flow chart of method, is specifically included:Step S301-S304.
Step S301:The identification information of the receiving terminal is obtained, and the public key prestored.
Terminal is sent when sending data, it is necessary to obtain the identification information of intended recipient terminal, could be by number to be sent According to corresponding receiving terminal is sent to, if data to be sent need to encrypt when sending, in addition it is also necessary to obtain the public key prestored Data can be encrypted.Wherein it is preferred to, the public key prestored is stored in server end, so as to multiple terminals Share.
Step S302:According to the operating system of the transmission terminal, obtained and sent with described by default encryption interface The corresponding AES of the operating system of terminal.
In order to avoid in existing encryption technology, each platform uses different encryption calling interfaces, such different platform it is upper Layer is applied when calling underlying algorithm, it is necessary to different program codes, not only increases its workload, also add use, dimension The costs such as shield so that the leap between platform is poor.In the present embodiment, the unification of different platform is realized by default encryption interface Call, for example, Android system is when calling underlying algorithm, calls encryption interface A, IOS system when calling underlying algorithm, also adjust With encryption interface A, so allow for a set of code can many places use, reduce workload, saved use, maintenance cost, So that the leap between platform is good.Wherein, the calling interface that predetermined encryption interface is according to actual needs and is pre-designed, The AES corresponding with the operating system of the transmission terminal can be obtained by the encryption interface.Wherein, it is whole when sending When the operating system at end is PC or Android operation system, the AES got by default encryption interface is The AES encapsulated using Java language.When the operating system for sending terminal is IOS, pass through default encryption The AES that interface is got is the AES encapsulated using OpenSSL.
Step S303:Be-encrypted data is carried out according to the public key, the identification information and acquired AES Encryption.
Get after public key, the identification information of receiving terminal and corresponding AES, according to the public key, the mark Know information and be-encrypted data is encrypted acquired AES, the data after being encrypted.Wherein, can during encryption To use symmetric encipherment algorithm or rivest, shamir, adelman.
Step S304:Data after encryption are sent to the receiving terminal.
After data after being encrypted, receiving terminal is sent it to.Wherein, including, the data after encryption are saved in Server database, is sent the data after encryption to the receiving terminal by the server.During transmission, according to getting Identification information, server is sent the data after encryption to the receiving terminal corresponding with the identification information.
The embodiments of the invention provide the data decryption method in a kind of communication system 100 being applied in Fig. 1, such as Fig. 4 It is shown.Wherein, Fig. 4 shows a kind of flow chart of data decryption method provided in an embodiment of the present invention, specifically includes:Step S401-S404.
Step S401:Receive and identify the encryption information sent by the transmission terminal.
Receiving terminal is got by transmission terminal after the data message that server is sent, to received data message Judged, judge whether received data message is encryption information, if received data message is encryption information When, then perform step S402.
Wherein, mode is preferably carried out as one kind, whether can possesses encryption according to received data message Header is come whether judge received data message be encryption information.
Step S402:When it is encryption information to identify received information, obtain the key that prestores, the key with Public key in above-mentioned data ciphering method is corresponding.
When it is encryption information to identify received information, the key prestored is obtained, in order to the encryption information Operation is decrypted.Wherein, the key is corresponding with the public key in above-mentioned data ciphering method.Even the encryption information is to adopt It is encrypted what is obtained with symmetric encipherment algorithm, then the key is identical with public key, for example, public key is 123456, then key is also 123456.Obtained if the encryption information is encrypted using rivest, shamir, adelman, the key is corresponding with public key Private key, for example, public key is 123456, then the key is corresponding private key, for example, being 654321.Wherein public key and private Key can be defined according to user using rule oneself.It should be appreciated that cited public key and private key in above-mentioned are only It is for only for ease of and understands and illustrated example, can not be understood as being limitation of the present invention.
Step S403:According to the operating system of the receiving terminal, obtained and received with described by default encryption interface The corresponding decipherment algorithm of the operating system of terminal.
In order to avoid in existing decryption technology, each platform uses different decryption calling interfaces, such different platform it is upper Layer is applied when calling underlying algorithm, it is necessary to different program codes, not only increases its workload, also add use, dimension The costs such as shield so that the leap between platform is poor.In the present embodiment, the unification of different platform is realized by default decryption interface Call, for example, Android system is when calling underlying algorithm, calls decryption interface A, IOS system when calling underlying algorithm, also adjust Use decryption interface A, so allow for a set of code can many places use, reduce workload, saved use, maintenance cost, So that the leap between platform is good.Wherein, the calling interface that default decryption interface is according to actual needs and is pre-designed, The decipherment algorithm corresponding with the operating system of the receiving terminal can be obtained by the decryption interface.Wherein, it is whole when receiving When the operating system at end is PC or Android operation system, the decipherment algorithm got by default decryption interface is The decipherment algorithm encapsulated using Java language.When the operating system of receiving terminal is IOS, pass through default decryption The decipherment algorithm that interface is got is the decipherment algorithm encapsulated using OpenSSL.
Step S404:The encryption information is decrypted according to the key and acquired decipherment algorithm, solved Confidential information.
Get after key and corresponding decipherment algorithm, added according to the key and acquired decipherment algorithm to described Confidential information is decrypted, and obtains solving confidential information.Wherein, during decryption, symmetrical decipherment algorithm or asymmetric decipherment algorithm can be used.
The embodiment of the present invention additionally provides the data encrypting and deciphering device in a kind of communication system 100 applied to shown in Fig. 1 210, as shown in Figure 5.The data encrypting and deciphering device 210 includes:Data encryption device 211 and data decryption apparatus 212.
Wherein, data encryption device 211 is used to data are encrypted, and obtains encryption information.Preferably, as shown in fig. 6, The data encryption device 211 includes:First acquisition module 2111, the second acquisition module 2112, data encryption module 2113 and hair Send module 2114
First acquisition module 2111, for obtaining the identification information of the receiving terminal, and the public key prestored.
Second acquisition module 2112, for the operating system according to the transmission terminal, is obtained by default encryption interface Take the AES corresponding with the operating system of the transmission terminal.
Data encryption module 2113, for being treated according to the public key, the identification information and acquired AES Encryption data is encrypted.
Sending module 2114, for the data after encryption to be sent to the receiving terminal.
Wherein, data decryption apparatus 212 is used to encryption information is decrypted, and obtains solving confidential information.Preferably, such as Fig. 7 Shown, the data decryption apparatus 212 includes:Receive and recognize module 2121, the 3rd acquisition module 2122, the 4th acquisition module 2123 and data decryption module 2124.
Module 2121 is received and recognized, for receiving and identifying the encryption information sent by the transmission terminal.
3rd acquisition module 2122, what is prestored for when it is encryption information to identify received information, obtaining is close Key, the key is corresponding with the public key in above-mentioned data ciphering method.
4th acquisition module 2123, for the operating system according to the receiving terminal, is obtained by default encryption interface Take the decipherment algorithm corresponding with the operating system of the receiving terminal.
Data decryption module 2124, is solved according to the key and acquired decipherment algorithm to the encryption information It is close, obtain solving confidential information.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to.
The technique effect of the data encrypting and deciphering device 210 that the embodiment of the present invention is provided, its realization principle and generation is with before State embodiment of the method identical, to briefly describe, device embodiment part does not refer to part, refers to phase in preceding method embodiment Answer content.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can also pass through Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and block diagram in accompanying drawing Show according to the device of multiple embodiments of the present invention, the architectural framework in the cards of method and computer program product, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part a, part for the module, program segment or code is used to realize holding for defined logic function comprising one or more Row instruction.It should also be noted that in some implementations as replacement, the function of being marked in square frame can also with different from The order marked in accompanying drawing occurs.For example, two continuous square frames can essentially be performed substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is also noted that every in block diagram and/or flow chart The combination of individual square frame and block diagram and/or the square frame in flow chart, can use the special base for performing defined function or action Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each functional module in each embodiment of the invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized using in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access Memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need It is noted that herein, such as first and second or the like relational terms are used merely to an entity or operation Made a distinction with another entity or operation, and not necessarily require or imply these entities or exist between operating any this Actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, article or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, article or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, article or the equipment of element.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (10)

1. a kind of data ciphering method, it is characterised in that applied to the transmission terminal of communication system, the communication system is also wrapped Include:Receiving terminal, the data ciphering method includes:
The identification information of the receiving terminal is obtained, and the public key prestored;
According to the operating system of the transmission terminal, the operating system with the transmission terminal is obtained by default encryption interface Corresponding AES;
Be-encrypted data is encrypted according to the public key, the identification information and acquired AES;
Data after encryption are sent to the receiving terminal.
2. data ciphering method according to claim 1, it is characterised in that the step for the public key that described acquisition is prestored Suddenly include:
Obtain the public key prestored that server end is sent.
3. data ciphering method according to claim 1, it is characterised in that the data by after encryption are sent to institute The step of stating receiving terminal includes:
Data after encryption are saved in server database, the data after encryption are sent to described by the server and connect Receive terminal.
4. data ciphering method according to claim 1, it is characterised in that the operating system of the transmission terminal be PC or During Android operation system, the AES got by default encryption interface is to be encapsulated using Java language AES.
5. data ciphering method according to claim 1, it is characterised in that the operating system of the transmission terminal is IOS During operating system, the AES got by default encryption interface is the AES encapsulated using OpenSSL.
6. a kind of data decryption method, it is characterised in that applied to the receiving terminal of communication system, the communication system is also wrapped Include:Terminal is sent, the data decryption method includes:
Receive and identify the encryption information sent by the transmission terminal;
When it is encryption information to identify received information, the key prestored, the key and claim 1-5 are obtained The public key in data ciphering method described in any one is corresponding;
According to the operating system of the receiving terminal, the operating system with the receiving terminal is obtained by default encryption interface Corresponding decipherment algorithm;
The encryption information is decrypted according to the key and acquired decipherment algorithm, obtains solving confidential information.
7. method according to claim 6, it is characterised in that the operating system of the receiving terminal is PC or Android During operating system, the decipherment algorithm got by default decryption interface is that the decryption encapsulated using Java language is calculated Method.
8. a kind of data encryption device, it is characterised in that applied to the transmission terminal of communication system, the communication system is also wrapped Include:Receiving terminal, the data encryption device includes:
First acquisition module, for obtaining the identification information of the receiving terminal, and the public key prestored;
Second acquisition module, for according to it is described transmission terminal operating system, by it is default encryption interface obtain with it is described Send the corresponding AES of the operating system of terminal;
Data encryption module, for according to the public key, the identification information and acquired AES to be-encrypted data It is encrypted;
Sending module, for the data after encryption to be sent to the receiving terminal.
9. a kind of data decryption apparatus, it is characterised in that applied to the receiving terminal of communication system, the communication system is also wrapped Include:Terminal is sent, the data decryption apparatus includes:
Module is received and recognized, for receiving and identifying the encryption information sent by the transmission terminal;
3rd acquisition module, it is described close for when it is encryption information to identify received information, obtaining the key prestored Key is corresponding with the public key in the data ciphering method described in claim 1-5 any one;
4th acquisition module, for the operating system according to the receiving terminal, by default encryption interface obtain with it is described The corresponding decipherment algorithm of the operating system of receiving terminal;
Data decryption module, is decrypted to the encryption information according to the key and acquired decipherment algorithm, is solved Confidential information.
10. a kind of communication system, it is characterised in that including:It is as claimed in claim 8 to send terminal and such as claim 9 institute The receiving terminal stated, the transmission terminal and the receiving terminal pass through Coupled processors.
CN201710620884.4A 2017-07-26 2017-07-26 Data encryption, decryption method, data encryption, decryption device and communication system Pending CN107172108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710620884.4A CN107172108A (en) 2017-07-26 2017-07-26 Data encryption, decryption method, data encryption, decryption device and communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710620884.4A CN107172108A (en) 2017-07-26 2017-07-26 Data encryption, decryption method, data encryption, decryption device and communication system

Publications (1)

Publication Number Publication Date
CN107172108A true CN107172108A (en) 2017-09-15

Family

ID=59817589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710620884.4A Pending CN107172108A (en) 2017-07-26 2017-07-26 Data encryption, decryption method, data encryption, decryption device and communication system

Country Status (1)

Country Link
CN (1) CN107172108A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325357A (en) * 2018-08-10 2019-02-12 深圳前海微众银行股份有限公司 Information value calculating method, equipment and readable storage medium storing program for executing based on RSA
CN110311985A (en) * 2019-07-09 2019-10-08 晏保华 Information synchronization system, method and device between a kind of cloud storage gateway
CN110784602A (en) * 2019-09-10 2020-02-11 中国平安财产保险股份有限公司 Soft telephone communication method, device, terminal and storage medium
CN111695958A (en) * 2019-03-12 2020-09-22 新疆丝路大道信息科技有限责任公司 Information safety management system of automobile leasing platform
CN112491884A (en) * 2020-11-27 2021-03-12 中孚安全技术有限公司 Visualized data display method, system and encryption equipment based on state cryptographic algorithm
CN112887336A (en) * 2018-05-04 2021-06-01 广东电网有限责任公司 Communication safety protection method and device
CN113965340A (en) * 2021-08-30 2022-01-21 广东南方通信建设有限公司 Cross-platform data migration method, system and readable medium
CN114095205A (en) * 2021-10-15 2022-02-25 广东电网有限责任公司广州供电局 Communication system and method for encrypted transmission of storage battery remote capacity checking data
CN115277210A (en) * 2022-07-28 2022-11-01 中国工商银行股份有限公司 Token obtaining method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1372192A (en) * 2002-04-02 2002-10-02 成都三零盛安信息系统有限公司 Universal safety encipher interface
US20120011375A1 (en) * 2003-05-16 2012-01-12 Widergren Robert D Multimedia Storage Systems and Methods
CN105450395A (en) * 2015-12-30 2016-03-30 中科创达软件股份有限公司 Information encryption and decryption processing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1372192A (en) * 2002-04-02 2002-10-02 成都三零盛安信息系统有限公司 Universal safety encipher interface
US20120011375A1 (en) * 2003-05-16 2012-01-12 Widergren Robert D Multimedia Storage Systems and Methods
CN105450395A (en) * 2015-12-30 2016-03-30 中科创达软件股份有限公司 Information encryption and decryption processing method and system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887336A (en) * 2018-05-04 2021-06-01 广东电网有限责任公司 Communication safety protection method and device
CN112887336B (en) * 2018-05-04 2023-05-05 广东电网有限责任公司 Communication safety protection method and device
CN109325357B (en) * 2018-08-10 2021-12-14 深圳前海微众银行股份有限公司 RSA-based information value calculation method, device and readable storage medium
CN109325357A (en) * 2018-08-10 2019-02-12 深圳前海微众银行股份有限公司 Information value calculating method, equipment and readable storage medium storing program for executing based on RSA
CN111695958A (en) * 2019-03-12 2020-09-22 新疆丝路大道信息科技有限责任公司 Information safety management system of automobile leasing platform
CN110311985A (en) * 2019-07-09 2019-10-08 晏保华 Information synchronization system, method and device between a kind of cloud storage gateway
CN110784602A (en) * 2019-09-10 2020-02-11 中国平安财产保险股份有限公司 Soft telephone communication method, device, terminal and storage medium
CN110784602B (en) * 2019-09-10 2022-11-29 中国平安财产保险股份有限公司 Soft telephone communication method, device, terminal and storage medium
CN112491884A (en) * 2020-11-27 2021-03-12 中孚安全技术有限公司 Visualized data display method, system and encryption equipment based on state cryptographic algorithm
CN113965340A (en) * 2021-08-30 2022-01-21 广东南方通信建设有限公司 Cross-platform data migration method, system and readable medium
CN114095205A (en) * 2021-10-15 2022-02-25 广东电网有限责任公司广州供电局 Communication system and method for encrypted transmission of storage battery remote capacity checking data
CN115277210A (en) * 2022-07-28 2022-11-01 中国工商银行股份有限公司 Token obtaining method and device, electronic equipment and storage medium
CN115277210B (en) * 2022-07-28 2024-02-27 中国工商银行股份有限公司 Token acquisition method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107172108A (en) Data encryption, decryption method, data encryption, decryption device and communication system
CN107294709A (en) A kind of block chain data processing method, apparatus and system
CN110336774A (en) Hybrid Encryption decryption method, equipment and system
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN107590396B (en) Data processing method and device, storage medium and electronic equipment
CN110933063B (en) Data encryption method, data decryption method and equipment
CN103138938A (en) SM2 certificate application method based on cryptographic service provider (CSP)
EP3920503A1 (en) Resource request method, device and storage medium
CN107248984A (en) Data exchange system, method and apparatus
EP4150879A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN104079404A (en) Sensitive data secure exchange method and system
CN111274611A (en) Data desensitization method, device and computer readable storage medium
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN104281272A (en) Password input processing method and device
CN110677261B (en) Trusted two-dimensional code generation method and device, electronic equipment and storage medium
CN110472429A (en) Data verification method, device, electronic equipment and storage medium
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN103873245B (en) Dummy machine system data ciphering method and equipment
CN105262759A (en) Method and system for encrypted communication
CN109040111A (en) Data ciphering method, device, computer equipment and storage medium
CN112966303A (en) Data encryption and decryption method and device, electronic equipment and computer storage medium
CN111246407A (en) Data encryption and decryption method and device for short message transmission
CN104135458A (en) Establishment of communication connection between mobile equipment and secure carrier
CN113542231B (en) Communication method, electronic device, and storage medium
CN103942484A (en) Security auxiliary device using mobile phone as carrier and identity authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915