CN107483432A - File encryption processing method and processing device - Google Patents

File encryption processing method and processing device Download PDF

Info

Publication number
CN107483432A
CN107483432A CN201710679658.3A CN201710679658A CN107483432A CN 107483432 A CN107483432 A CN 107483432A CN 201710679658 A CN201710679658 A CN 201710679658A CN 107483432 A CN107483432 A CN 107483432A
Authority
CN
China
Prior art keywords
encryption
file
algorithm
user terminal
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710679658.3A
Other languages
Chinese (zh)
Inventor
谭巍
魏西鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jie Liang Software Co Ltd
Original Assignee
Guangzhou Jie Liang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jie Liang Software Co Ltd filed Critical Guangzhou Jie Liang Software Co Ltd
Priority to CN201710679658.3A priority Critical patent/CN107483432A/en
Publication of CN107483432A publication Critical patent/CN107483432A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of file encryption processing method and processing device, it is related to Internet technical field.Wherein, methods described includes:The file download request of the first user terminal transmission is received, the terminal number of first user terminal is carried in the download request;Using current time as encryption times, according to the terminal number and the encryption times, encryption key is generated using preset algorithm;File corresponding to file download request is encrypted by predetermined encryption algorithm using the encryption key, obtains encryption file;The encryption file is sent to first user terminal, the terminal number and the encryption times are sent to file should be encrypted simultaneously, so that the terminal number and encryption times are stored as the identification number to the encryption file operating time operated and the user terminal operated on it by the first user terminal.

Description

File encryption processing method and processing device
Technical field
The present invention relates to Internet technical field, in particular to a kind of file encryption processing method and processing device.
Background technology
Mobile Internet is applied more and more extensive now, and download, the transmission of file become increasingly prevalent, for file Credible and confidentiality demand, generally file is encrypted.
In the prior art, generally by user oneself, arbitrarily one encryption key for meeting demand of setting adds to file It is close, then the key is informed into associated user, associated user is decrypted by the key-pair file, the encryption key is not With variability, easy quilt.
But in certain situations it is desirable to ensure the file not being modified that file is most original, prior art provides This kind of cipher mode, it is possible to file is changed in transmitting procedure by other users, and it can not be ensured to be most believable original File.
The content of the invention
In view of this, the embodiments of the invention provide a kind of file encryption processing method and processing device, to improve above mentioned problem.
To achieve these goals, the technical solution adopted by the present invention is as follows:
A kind of file encryption processing method, methods described include:The file download request of the first user terminal transmission is received, The terminal number of first user terminal is carried in the download request;Using current time as encryption times, according to institute Terminal number and the encryption times are stated, encryption key is generated using preset algorithm;Passed through using the encryption key default File corresponding to file download request is encrypted AES, obtains encryption file;The encryption file is sent The terminal number and the encryption times are sent to first user terminal, while to file should be encrypted, so that the One user terminal by the terminal number and encryption times be stored as to encryption operating time for being operated of file with And the identification number of the user terminal operated on it.
A kind of file encryption processing unit, described device include:CIPHERING REQUEST receiving module, it is whole for receiving the first user The file download that end is sent is asked, and the terminal number of first user terminal is carried in the download request;Encryption key Generation module, for using current time as encryption times, according to the terminal number and the encryption times, using default Algorithm generates encryption key;Encrypting module, for utilizing the encryption key by predetermined encryption algorithm to the file download File is encrypted corresponding to request, obtains encryption file;File sending module, it is described for the encryption file to be sent to First user terminal, while the terminal number and the encryption times are sent to file should be encrypted, so that the first user The terminal number and encryption times are stored as to encryption operating time for being operated of file and to it by terminal The identification number of the user terminal operated.
File encryption processing method and processing device provided in an embodiment of the present invention, when receiving under the file of the first user terminal When carrying request, i.e., encryption key is generated according to the terminal number of first user terminal and encryption times, and utilize the encryption File corresponding to key-pair file download request is encrypted, and the encryption file of acquisition is sent into the first user terminal, and right Terminal number and encryption times should be sent.Therefore, the file that the first user terminal obtains is to encrypt file, the first user terminal The terminal number and encryption times were stored as to encryption operating time for being operated of file and it is carried out The identification number of the user terminal of operation, if the encryption file is modified in terminal, it is operated corresponding to the encryption file Operating time can change, identification number may be changed corresponding to the user terminal operated to it, by encrypting file pair The identification number and operating time answered are decrypted, and can fail, so as to ensure that the file of successful decryption is original trusty Beginning file.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
What Fig. 1 showed server provided in an embodiment of the present invention and user terminal interacts schematic diagram;
Fig. 2 shows the block diagram of server provided in an embodiment of the present invention;
Fig. 3 shows the flow chart for the file encryption processing method that first embodiment of the invention provides;
Fig. 4 shows the flow chart of the part steps for the file encryption processing method that first embodiment of the invention provides;
Fig. 5 shows the functional block diagram for the file encryption processing unit that second embodiment of the invention provides.
Embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Generally exist The component of the embodiment of the present invention described and illustrated in accompanying drawing can be configured to arrange and design with a variety of herein.Cause This, the detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing The every other embodiment obtained on the premise of going out creative work, belongs to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent accompanying drawing in individual accompanying drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
As shown in figure 1, it is that the server 100 that present pre-ferred embodiments provide shows with what user terminal 110 interacted It is intended to.The server 100 is communicatively coupled by network and one or more user terminals 110, to enter row data communication Or interaction.The system that server 100 and user terminal 110 are formed can be used for safety-protection system, realize the text in safety-protection system Part encryption, this document can be video file or audio file in safety-protection system.
Wherein, the server 100 can be the webserver, database server etc..The user terminal 110 can be with It is PC (personal computer, PC), tablet personal computer, smart mobile phone, personal digital assistant (personal Digital assistant, PDA) etc..Wherein, client can be installed in user terminal 110, such as some specific applications Program etc., user terminal 110 can sign in server 100 by the client of installation, and specific login mode can be passed through The account number of user is logged in, and after user terminal 110 is by accessing server by customer end 100, user terminal 110 can service Device 100 interacts, and realizes file encryption processing method provided in an embodiment of the present invention.Certainly, user is needed beforehand through clothes Business device 100 carries out account registration.
In the present embodiment, the transmission of file can be carried out between multiple user terminals 110, that is to say, that the first user File can be transferred to second user terminal by terminal, specific transmission means can be transmitted by network or File is copied to second user terminal by other storage mediums from the first user terminal, and its specific transmission means is in this implementation Do not limited in example.Wherein, first user terminal and second user terminal respectively corresponding to the first and second not table Show the meanings such as priority primary and secondary, be used only for the reference to user terminal.
Fig. 2 shows a kind of structured flowchart for the server 100 that can be applied in the embodiment of the present invention.As shown in Fig. 2 clothes Business device 100 includes memory 102, storage control 104, and one or more (one is only shown in figure) processors 106, peripheral hardware connect Mouth 108, radio frequency unit 110 etc..These components are mutually communicated by one or more communication bus/signal wire 116.
Memory 102 can be used for storage software program and module, such as the file encryption processing side in the embodiment of the present invention Programmed instruction/module corresponding to method and device, processor 106 by operation be stored in software program in memory 102 and Module, so as to perform various function application and data processing, such as file encryption processing method.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.Processor 106 and other possible components are to storage The access of device 102 can be carried out under the control of storage control 104.
Various input/output devices are coupled to processor 106 and memory 102 by Peripheral Interface 108.In some implementations In example, Peripheral Interface 108, processor 106 and storage control 104 can be realized in one single chip.In some other reality In example, they can be realized by independent chip respectively.
Radio frequency unit 110 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with Communication network or other equipment are communicated.
It is appreciated that structure shown in Fig. 2 is only to illustrate, server 100 may also include than shown in Fig. 2 more or more Few component, or there is the configuration different from shown in Fig. 2.Each component shown in Fig. 2 can use hardware, software or its group Close and realize.
First embodiment
A kind of file encryption processing method is present embodiments provided, this method is mainly used in server 100, refers to figure 3, this method can include:
Step S110:The file download request of the first user terminal transmission is received, is carried in the download request described The terminal number of first user terminal.
When user needs to download file, file download can be sent to server 100 by the first user terminal and asked, and And the terminal number of first user terminal is carried in file download request.
Certainly, it is common, the file identification of the file to have been downloaded is carried in this document download request, so that server 100 identify the determination file to be downloaded of the first user terminal according to this document.
Step S120:Using current time as encryption times, according to the terminal number and the encryption times, utilize Preset algorithm generates encryption key.
Using current time as encryption times, when server 100 is according to terminal number and the encryption of the first user terminal Between, generate encryption key using preset algorithm.The time difference of file download request is initiated server 100, then encryption times Difference, and the file download request that generally same user terminal is initiated, its corresponding current time is different, different user terminals hair The file download request risen, its corresponding terminal number is different, therefore, corresponding different file download request, the encryption of production Key is different.Wherein, the preset algorithm can be that any one can carry out calculating the algorithm so as to acquisition value to numeral, or It is that other can calculate the algorithm for obtaining a new value, such as polynary polynomial equation by one or two value.
Further, in the present embodiment, server 100 can be using the method for preset algorithm generation encryption key:
Step S121:The terminal number is converted into by the first encryption factor by the first algorithm.
Wherein it is possible to after terminal number is converted into numerical data, the first encryption factor is used as using the numerical data.Example Such as, if terminal number is made up of metric numeral in itself, the first encryption factor directly can be used as using the terminal number;If eventually End numbering is made up of hexadecimal data or binary data, can be translated into metric numerical data as first Encryption factor;If terminal number is made up of a variety of letters, can be translated into according to the ASCII tables of comparisons metric Numerical data is as the first encryption factor.
It is after the terminal number is converted into numerical data, the numerical data is pre- by first alternatively, it is also possible to be Imputation formula model, which calculates, obtains multidigit numerical value.The first default formula model does not limit in the present embodiment, can be any The formula model that can be calculated numerical data, such as unitary polynomial equation or other more complicated calculating formulas, pass through One default formula obtains a multidigit numerical value with long number, such as terminal number is calculated by certain unitary polynomial equation Obtain a five figure five-digit number value.
Each position of the multidigit numerical value is subjected to addition summation again, obtains first and value.That is, multidigit numerical value bag Multidigit is included, as five-digit number value includes 10,010,000,000 five-digit numbers, then the number in each numerical digit can be summed up, obtain first And value.
If described first and the digit of value be more than one, then each position of described first and value is summed up, acquisition the Two and value;If described second and the digit of value be more than one, then each position of described second and value is summed up, judge to add with And value whether be one digit number value;If second and value be one, using this second and value as the first encryption factor, if this Two and value be not one, continue to this second and each numerical digit of value sum up, be one digit number until adding and obtaining with value Value, the first encryption factor is used as using the one digit number value.That is, constantly being summed up to obtain and value, adding sum When being as a result one digit number value, the first encryption factor is used as using the one digit number value.Certainly, in the present embodiment, add and also may be used with number Be it is set in advance, by it is set in advance plus and number plus and after, obtained value is used as the first encryption factor, no It is to include the value of how many individual numerical digits to manage first encryption factor.
Step S122:The encryption times are converted into by the second encryption factor by the second algorithm.
Wherein, the encryption times can be the time for including date numeral, and such as on July 20th, 2017, then it includes Numeral is 20170720.Encryption times are converted into or similar in appearance to by by the second encryption factor by the second algorithm One algorithm terminal number is converted into the first encryption factor, specifically, can be, numeral corresponding to encryption times is pre- by second Imputation formula model, which calculates, obtains multidigit numerical value, and the second formula model and the first formula model can be the same or different, or Which kind of formula model parameter difference in person's formula model, the first formula model and the second formula model are specially in this reality Do not limited in applying.
Each position of the multidigit numerical value is subjected to addition summation again, obtains the 3rd and value;If the described 3rd and the position of value Number is more than one, then each position of the described 3rd and value are summed up, and obtains the 4th and value;If the described 4th and the digit of value Summed up more than one, then to each position of the described 4th and value, until add and obtain and value be one digit number value, with this one Bit value is as the second encryption factor.Likewise, in the present embodiment, adding with number for corresponding encryption times can also be set in advance It is fixed, by this it is set in advance plus and number plus and after, obtained value is used as the first encryption factor, regardless of this first Encryption factor is to include the value of how many individual numerical digits.
In addition, either divide in this embodiment, when encryption times can also be accurate to or the second, no matter encryption times are accurate to When or every minute and second, the time can be indicated by numeral, during such as July in 2017 of afternoon four on the 20th, numeral corresponding to it Can be 201772016, then numerical calculation corresponding to passage time obtains the second encryption factor.
Step S123:It is close by third algorithm generation encryption using first encryption factor and the second encryption factor Key.
In this step, i.e., so that the first encryption factor, the second encryption factor as condition, to be produced close by special algorithm Spoon.Certainly, in the present embodiment, third algorithm is specially which kind of algorithm does not also limit, and can be polynomial equation, or more multiple Other miscellaneous algorithms, it is used as key as long as being calculated by the first encryption factor and the second encryption factor and obtaining a value.
In the present embodiment, each formula model used in ciphering process, the first algorithm, the second algorithm, the three ways of calculating Method etc. can be customized algorithm, also, improve its complexity to a certain extent, and difficulty is cracked with lifting.
Step S130:Using the encryption key by predetermined encryption algorithm to file corresponding to file download request It is encrypted, obtains encryption file.
Server 100 can obtain the file corresponding to this document download request after file download request is received. Such as, demand file corresponding to this document download request is video A, then server 100 can be searched and regarded from database Frequency A.
Server 100 is after encryption key is obtained, further according to the encryption key of acquisition, by predetermined encryption algorithm to file File is encrypted corresponding to download request.Wherein, the predetermined encryption algorithm can be any one AES, such as DES (Data Encryption Standard) AES, AES (Advanced Encryption Standard) AES Deng.
After file is encrypted, this document turns into encryption file.
Step S140:The encryption file is sent to first user terminal, while sent to file should be encrypted The terminal number and the encryption times, so that the terminal number and encryption times are stored as by the first user terminal To the encryption file operating time operated and the identification number of the user terminal operated on it.
Encryption file is sent to the first user terminal by server 100 again, so that the first user terminal obtains from server 100 The file obtained is the encryption file after file corresponding to file download request is encrypted.
In addition, terminal number and encryption times are sent to user terminal by server 100 simultaneously, the terminal number and add The close time is that server 100 is used to used terminal number and encryption times be encrypted to encryption file.
, can be to the encryption file after the first user terminal receives encryption file, terminal number and encryption times Stored, meanwhile, stored terminal number as the identification number of the terminal operated to the encryption file, by this Encryption times store as the operating time operated to encryption file.
In the present embodiment, the file of corresponding storage, user terminal are stored with the machine of the terminal operated to this document Device is numbered, the operating time operated to this document, and the operation includes the operation to file content such as foundation, change.Such as text When part is established, the time for establishing this document is the operating time, and the terminal number for establishing the terminal of this document is identification number.If should File is modified, then is updated to the operating time corresponding to this document to the time that it is modified, the terminal being modified to it Terminal number be updated to its corresponding identification number.
The encryption file that user terminal is downloaded from server 100, Action number of operation terminal is to service corresponding to it The terminal number that device 100 is sent, its corresponding operating time is encryption times.Therefore, if the first user terminal downloads add Ciphertext part is changed by the first user terminal, or by other users terminal after the first user terminal is transferred to other users terminal Change, then in the user terminal for changing the encryption file, the time being modified to the encryption file is to that should encrypt text The operating time of part, the terminal number for the user terminal being modified to encryption file are to be compiled to that should encrypt the machine of file Number.
Further, in the present embodiment, as shown in figure 4, can also comprise the following steps:
Step S150:Receive the file decryption request that second user terminal is sent, the file decryption request includes pair The identification number of the user terminal of the last operation of file to be decrypted and the behaviour of the last operation of the file to be decrypted Make the time.
When user, which needs that encryption file is decrypted, to be checked, can be sent out by second user terminal to server 100 File decryption is sent to ask.Wherein, the second user terminal and the first user terminal can be same user terminal, or Different user terminals.
In the case of encryption file is complete, when being stored with its corresponding identification number and operation to file should be encrypted Between.Using the encryption file as file to be decrypted, second user terminal to server 100 sends file decryption and asked, also, Portable numbering and operating time in this document decoding request.Because encryption file is often once changed, corresponding to it For identification number to change the terminal number of the terminal of the encryption file, its corresponding operating time is that encryption file is modified When time, therefore, the identification number that carries is the use to the last operation of the file to be decrypted in file decryption request The identification number of family terminal, the operating time carried in file decryption request are the operation to the last operation of file to be decrypted Time.
Step S160:According to the identification number and the operating time, decruption key is generated using preset algorithm.
Server 100 can be asked according to file decryption in identification number and the operating time, given birth to using preset algorithm Into decruption key, the preset algorithm is to generate preset algorithm used in encryption key.If it should be understood that file to be decrypted It was not modified after the download of server 100, then it is close that the decruption key generated can be equal to encryption corresponding to the file to be decrypted Key, if the decryption file was modified, the terminal number used is encrypted to it because its corresponding identification number may be not equal to, Its corresponding operating time is not equal to the encryption times for being encrypted and using to it, then the decruption key obtained is not equal to be treated to this The encryption key used is encrypted in decryption file.
Step S170:The decruption key is sent to the second user terminal, so that the second user terminal is sharp The file to be decrypted is decrypted by default decipherment algorithm with the decruption key, wherein, the default decipherment algorithm It is corresponding with the predetermined encryption algorithm.
The default decipherment algorithm that file to be decrypted is decrypted can be known or be previously stored with to second user terminal, should Default decipherment algorithm is corresponding with predetermined encryption algorithm, that is to say, that the default decipherment algorithm is that the predetermined encryption algorithm is added The algorithm that file after close is decrypted.
In the present embodiment, second user terminal is the terminal being in server 100 in same system, and second user is whole End can be checked by specific software to the file to be decrypted, if the file to be decrypted is video, then can pass through spy Fixed video playback then can include default decipherment algorithm using being checked to it in the specific software.
Second user terminal can utilize the decruption key after decruption key is obtained, and be treated by default decipherment algorithm Decryption file is decrypted.If the file to be decrypted was not modified, its decruption key is equal to encryption key, then can be successfully right File to be decrypted is decrypted, if file to be encrypted was modified, its decruption key is not equal to encryption key, then to text to be decrypted The solution secret meeting failure of part, so as to ensure that the decryption file that decryption obtains is genuine and believable original document.
In addition, in the present embodiment, the decryption to file to be decrypted can also be carried out in server 100.Wherein it is possible to It is also to include file to be decrypted in the file decryption request, server 100 is calculated using the decruption key by default decryption The file to be decrypted is decrypted method, wherein, the default decipherment algorithm is corresponding with the predetermined encryption algorithm;Will solution File after close is sent to the second user terminal.
Further, in the present embodiment, user can initiate again after account number login is carried out by the first user terminal File download is asked, then server 100 can also obtain the user's mark for the user for sending this document download request, also, can User mark is stored with the terminal number in corresponding this document download request and above-mentioned encryption times.Therefore, can basis File is arbitrarily encrypted, in other words any one file to be decrypted, corresponding encryption times and identification number, from server 100 In find the user being downloaded to the encryption file user mark, so as to lock registrant's information at that time.
In addition, when the file corresponding to ask file download is encrypted, can also be identified by the user and terminal Numbering and encryption times, encryption key is generated using preset algorithm.Specifically, similar in appearance to terminal number and encryption times, An encryption factor can be obtained using user's mark.Wherein, the user mark can be value number, alpha code or its He, user mark, which can be converted to calculate by formula after numerical data, obtains encryption factor, in conjunction with the first encryption factor, Second encryption factor generates encryption key.
Second embodiment
A kind of file encryption processing unit 200 is present embodiments provided, refers to Fig. 5, described device 200 includes:
CIPHERING REQUEST receiving module 210, the file download request sent for receiving the first user terminal, the download please The terminal number of first user terminal is carried in asking;Encryption key generation module 220, for using current time as plus The close time, according to the terminal number and the encryption times, encryption key is generated using preset algorithm;Encrypting module 230, For file corresponding to file download request to be encrypted by predetermined encryption algorithm using the encryption key, obtain Encrypt file;File sending module 240, for the encryption file to be sent into first user terminal, while to should Encrypt file and send the terminal number and the encryption times, so that the first user terminal is by the terminal number and adds The close time is stored as the machine to the encryption file operating time operated and the user terminal operated on it Numbering.
Further, the key production module 220 includes:First encryption factor generation unit, for being calculated by first The terminal number is converted into the first encryption factor by method;Second encryption factor generation unit, for by the second algorithm by institute State encryption times and be converted into the second encryption factor;Key generating unit, for being added using first encryption factor and second The close factor, encryption key is generated by third algorithm.
Specifically, the first encryption factor generation unit can be used for the terminal number being converted into numerical data;With institute Numerical data is stated as first encryption factor.
Either, the first encryption factor generation unit can be used for the terminal number being converted into numerical data;By institute State numerical data and acquisition multidigit numerical value is calculated by the first default formula model;Each position of the multidigit numerical value is added Summation, obtain first and value;If described first is more than one with the digit being worth, then each position of described first and value is added With acquisition second and value;If described second is more than one with the digit being worth, then each position of described second and value is added With, judge plus sum and value whether be one digit number value;Until add and obtain and value be one digit number value, using the one digit number value as First encryption factor.
In addition, the second encryption factor generation unit can be used for numeral corresponding to encryption times passing through the second default formula Model, which calculates, obtains multidigit numerical value;Each position of the multidigit numerical value is subjected to addition summation, obtains the 3rd and value;If described Three are more than one with the digit being worth, then each position of the described 3rd and value are summed up, and obtain the 4th and value;If the described 4th It is more than one with the digit of value, then each position of the described 4th and value is summed up, until add and obtain and value is one Numerical value, the second encryption factor is used as using the one digit number value.
Further, in the present embodiment, described device 200 can also include:
Decoding request receiving module 250, for receiving the file decryption request of second user terminal transmission, the file solution Close request include the user terminal of operation the last to file to be decrypted identification number and the file to be decrypted most The operating time of nearly once-through operation;Decruption key generation module 260, during for according to the identification number and the operation Between, generate decruption key using preset algorithm;Key sending module 270, for the decruption key to be sent into described second User terminal, so that the second user terminal utilizes the decruption key by default decipherment algorithm to the file to be decrypted It is decrypted, wherein, the default decipherment algorithm is corresponding with the predetermined encryption algorithm.
Alternatively, it is also possible to be, file to be decrypted can also be included in the file decryption request, the device includes decryption Module, for the file to be decrypted to be decrypted by default decipherment algorithm using the decruption key, wherein, it is described pre- If decipherment algorithm is corresponding with the predetermined encryption algorithm;And the file after decryption is sent to the second user terminal. Wherein, for deciphering module and key sending module 270, one of them can be only included in the device 200, or both Including.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and block diagram in accompanying drawing Show the device of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used to realize holding for defined logic function Row instruction.It should also be noted that at some as in the implementation replaced, the function that is marked in square frame can also with different from The order marked in accompanying drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart The combination of individual square frame and block diagram and/or the square frame in flow chart, function or the special base of action as defined in performing can be used Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server 100, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention Suddenly.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), deposit at random Access to memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes. It should be noted that herein, such as first and second or the like relational terms are used merely to an entity or behaviour Make with another entity or operation make a distinction, and not necessarily require or imply these entities or operate between exist it is any this Kind actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Include so that process, method, article or equipment including a series of elements not only include those key elements, but also Including the other element being not expressly set out, or also include for this process, method, article or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Other identical element also be present in the process of element, method, article or equipment.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.It should be noted that:Similar label and letter exists Similar terms is represented in following accompanying drawing, therefore, once being defined in a certain Xiang Yi accompanying drawing, is then not required in subsequent accompanying drawing It is further defined and explained.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of file encryption processing method, it is characterised in that methods described includes:
The file download request of the first user terminal transmission is received, first user terminal is carried in the download request Terminal number;
Using current time as encryption times, according to the terminal number and the encryption times, generated using preset algorithm Encryption key;
File corresponding to file download request is encrypted by predetermined encryption algorithm using the encryption key, obtained Encrypt file;
The encryption file is sent to first user terminal, at the same to should encrypt file send the terminal number with And the encryption times, so that the terminal number and encryption times are stored as to the encryption file by the first user terminal The operating time operated and the identification number of the user terminal operated on it.
2. according to the method for claim 1, it is characterised in that it is described according to terminal number and encryption times, using pre- Imputation method generation encryption key includes:
The terminal number is converted into by the first encryption factor by the first algorithm;
The encryption times are converted into by the second encryption factor by the second algorithm;
Using first encryption factor and the second encryption factor, encryption key is generated by third algorithm.
3. according to the method for claim 2, it is characterised in that described to be converted into the terminal number by the first algorithm First encryption factor includes:
The terminal number is converted into numerical data;
First encryption factor is used as using the numerical data.
4. according to the method for claim 2, it is characterised in that described to be converted into the terminal number by the first algorithm First encryption factor includes:
The terminal number is converted into numerical data;
The numerical data is calculated by the first default formula model and obtains multidigit numerical value;
Each position of the multidigit numerical value is subjected to addition summation, obtains first and value;
If described first is more than one with the digit being worth, then each position of described first and value is summed up, the second He is obtained Value;
If described second is more than one with the digit being worth, then each position of described second and value is summed up, judge to add sum Whether it is one digit number value with value;
It is one digit number value until adding and obtaining with value, the first encryption factor is used as using the one digit number value.
5. according to the method for claim 2, it is characterised in that the encryption times be include the date it is digital when Between, it is described the encryption times are converted into by the second encryption factor by the second algorithm to include:
Numeral corresponding to encryption times is calculated by the second default formula model and obtains multidigit numerical value;
Each position of the multidigit numerical value is subjected to addition summation, obtains the 3rd and value;
If the described 3rd is more than one with the digit being worth, then each position of the described 3rd and value are summed up, the 4th He is obtained Value;
If the described 4th is more than one with the digit being worth, then each position of the described 4th and value are summed up, until adding and obtaining Arrive and value is one digit number value, and the second encryption factor is used as using the one digit number value.
6. according to the method for claim 1, it is characterised in that methods described also includes:
The file decryption request that second user terminal is sent is received, the file decryption request includes nearest to file to be decrypted The identification number of the user terminal of once-through operation and the operating time of the last operation of the file to be decrypted;
According to the identification number and the operating time, decruption key is generated using preset algorithm;
The decruption key is sent to the second user terminal, so that the second user terminal utilizes the decruption key The file to be decrypted is decrypted by default decipherment algorithm, wherein, the default decipherment algorithm and the predetermined encryption Algorithm is corresponding.
7. according to the method for claim 6, it is characterised in that also include file to be decrypted in the file decryption request, After the generation decruption key using preset algorithm, methods described includes:
The file to be decrypted is decrypted by default decipherment algorithm using the decruption key, wherein, the default solution Close algorithm is corresponding with the predetermined encryption algorithm;
File after decryption is sent to the second user terminal.
8. a kind of file encryption processing unit, it is characterised in that described device includes:
CIPHERING REQUEST receiving module, ask for receiving the file download that the first user terminal is sent, taken in the download request Terminal number with first user terminal;
Encryption key generation module, for using current time as encryption times, according to the terminal number and the encryption Time, encryption key is generated using preset algorithm;
Encrypting module, for utilizing the encryption key by predetermined encryption algorithm to file corresponding to file download request It is encrypted, obtains encryption file;
File sending module, for the encryption file to be sent into first user terminal, while to file should be encrypted The terminal number and the encryption times are sent, so that the first user terminal deposits the terminal number and encryption times Store up as the identification number to the encryption file operating time operated and the user terminal operated on it.
9. device according to claim 8, it is characterised in that the key production module includes:
First encryption factor generation unit, for the terminal number to be converted into the first encryption factor by the first algorithm;
Second encryption factor generation unit, for the encryption times to be converted into the second encryption factor by the second algorithm;
Key generating unit, for utilizing first encryption factor and the second encryption factor, added by third algorithm generation Key.
10. device according to claim 8, it is characterised in that described device also includes:
Decoding request receiving module, for receiving the file decryption request of second user terminal transmission, the file decryption request Include the last to the identification number of the user terminal of the last operation of file to be decrypted and the file to be decrypted The operating time of operation;
Decruption key generation module, for according to the identification number and the operating time, being generated and being solved using preset algorithm Key;
Key sending module, for the decruption key to be sent into the second user terminal, so that the second user is whole The file to be decrypted is decrypted by default decipherment algorithm using the decruption key for end, wherein, the default decryption Algorithm is corresponding with the predetermined encryption algorithm.
CN201710679658.3A 2017-08-10 2017-08-10 File encryption processing method and processing device Pending CN107483432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710679658.3A CN107483432A (en) 2017-08-10 2017-08-10 File encryption processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710679658.3A CN107483432A (en) 2017-08-10 2017-08-10 File encryption processing method and processing device

Publications (1)

Publication Number Publication Date
CN107483432A true CN107483432A (en) 2017-12-15

Family

ID=60599089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710679658.3A Pending CN107483432A (en) 2017-08-10 2017-08-10 File encryption processing method and processing device

Country Status (1)

Country Link
CN (1) CN107483432A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388867A (en) * 2018-02-26 2018-08-10 银川网曌科技有限公司 logistics distribution method, device and server
CN108389017A (en) * 2018-02-26 2018-08-10 银川网曌科技有限公司 Logistics Distribution Method, device, server and storage medium
CN108399521A (en) * 2018-02-26 2018-08-14 银川网曌科技有限公司 Logistics Distribution Method, device, server and storage medium
CN110008654A (en) * 2018-01-04 2019-07-12 北大方正集团有限公司 Electronic document treating method and apparatus
CN112287369A (en) * 2020-11-02 2021-01-29 珠海格力电器股份有限公司 Decryption method, decryption device, computer equipment and storage medium
CN114401426A (en) * 2021-12-31 2022-04-26 珠海迈科智能科技股份有限公司 Method and system for generating dynamic key
CN115484353A (en) * 2021-06-16 2022-12-16 中移动信息技术有限公司 Processing method suitable for watermark picture, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012134806A (en) * 2010-12-22 2012-07-12 Kyocera Document Solutions Inc Image forming device
CN103188242A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Data protecting method, data protecting server and system
CN105024827A (en) * 2015-08-25 2015-11-04 苏州科贝尔实业有限公司 System and method for performing digital rights management for terminal equipment
CN105095783A (en) * 2014-05-20 2015-11-25 中兴通讯股份有限公司 File encryption method and apparatus, encrypted file reading method and apparatus and terminal
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
CN106156654A (en) * 2016-08-30 2016-11-23 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106685487A (en) * 2017-02-21 2017-05-17 北京小米移动软件有限公司 Identity information obtaining method and device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012134806A (en) * 2010-12-22 2012-07-12 Kyocera Document Solutions Inc Image forming device
CN103188242A (en) * 2011-12-30 2013-07-03 中国移动通信集团广东有限公司 Data protecting method, data protecting server and system
CN105095783A (en) * 2014-05-20 2015-11-25 中兴通讯股份有限公司 File encryption method and apparatus, encrypted file reading method and apparatus and terminal
CN105024827A (en) * 2015-08-25 2015-11-04 苏州科贝尔实业有限公司 System and method for performing digital rights management for terminal equipment
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
CN106156654A (en) * 2016-08-30 2016-11-23 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106685487A (en) * 2017-02-21 2017-05-17 北京小米移动软件有限公司 Identity information obtaining method and device and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008654A (en) * 2018-01-04 2019-07-12 北大方正集团有限公司 Electronic document treating method and apparatus
CN110008654B (en) * 2018-01-04 2021-04-09 北大方正集团有限公司 Electronic file processing method and device
CN108388867A (en) * 2018-02-26 2018-08-10 银川网曌科技有限公司 logistics distribution method, device and server
CN108389017A (en) * 2018-02-26 2018-08-10 银川网曌科技有限公司 Logistics Distribution Method, device, server and storage medium
CN108399521A (en) * 2018-02-26 2018-08-14 银川网曌科技有限公司 Logistics Distribution Method, device, server and storage medium
CN112287369A (en) * 2020-11-02 2021-01-29 珠海格力电器股份有限公司 Decryption method, decryption device, computer equipment and storage medium
CN115484353A (en) * 2021-06-16 2022-12-16 中移动信息技术有限公司 Processing method suitable for watermark picture, electronic equipment and storage medium
CN114401426A (en) * 2021-12-31 2022-04-26 珠海迈科智能科技股份有限公司 Method and system for generating dynamic key
CN114401426B (en) * 2021-12-31 2023-05-05 珠海迈科智能科技股份有限公司 Dynamic key generation method and system

Similar Documents

Publication Publication Date Title
CN107483432A (en) File encryption processing method and processing device
CN106850221B (en) Information encryption and decryption method and device
CA3024362C (en) Secure transmission of sensitive data
JP4866863B2 (en) Security code generation method and user device
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
CN105722067B (en) Data method for encryption/decryption and device on mobile terminal
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
CN107707347A (en) The backup method and device of user key, the introduction method and device of user key
CN111191255B (en) Information encryption processing method, server, terminal, device and storage medium
CN105005731A (en) Data encryption and decryption methods and mobile terminal
US11251936B2 (en) System and method for performing homomorphic aggregation over encrypted data
CN106572076A (en) Web service access method, client side and server side
CN103378971A (en) Data encryption system and method
Jammula et al. Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
WO2008113617A1 (en) A method and system for a subscription to a derived symmetric key
CN103336928A (en) Method and device for encrypting and decrypting database
Şengel et al. A survey on white box cryptography model for mobile payment systems
CN107889102B (en) Method and device for encrypting and decrypting information in short message
JPWO2011058629A1 (en) Information management system
CN108038383A (en) File encrypting method, file decryption method and device
US11394545B2 (en) Communication system, server device, user device, method, and computer program
CN108418826A (en) Video file processing method, device, server and storage medium
CN114500006B (en) Query request processing method and device
CN110719264B (en) Information processing method and device, electronic equipment and storage medium
US11811920B1 (en) Secure computation and communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171215

WD01 Invention patent application deemed withdrawn after publication