CN107563211A - Safe encryption method and system - Google Patents

Safe encryption method and system Download PDF

Info

Publication number
CN107563211A
CN107563211A CN201710799680.1A CN201710799680A CN107563211A CN 107563211 A CN107563211 A CN 107563211A CN 201710799680 A CN201710799680 A CN 201710799680A CN 107563211 A CN107563211 A CN 107563211A
Authority
CN
China
Prior art keywords
encryption
processing
aes
decodement
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710799680.1A
Other languages
Chinese (zh)
Inventor
王林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lotus Technology Beijing Co Ltd
Original Assignee
Lotus Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lotus Technology Beijing Co Ltd filed Critical Lotus Technology Beijing Co Ltd
Priority to CN201710799680.1A priority Critical patent/CN107563211A/en
Publication of CN107563211A publication Critical patent/CN107563211A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides safe encryption method and system, is related to encryption technology field, including:Obtain decodement;Make a summary processing and encryption are carried out to decodement according to preset rules, obtain cryptographic secret.By self-defined multiple digest algorithm and AES, cryptographic security is improved.

Description

Safe encryption method and system
Technical field
The present invention relates to encryption technology field, especially safe encryption method and system.
Background technology
Most of application backstages and website backstage based on internet, which can all have, preserves user account, the demand of password, Password can typically be carried out simple encryption and then be preserved by background server, and conventional encryption technique is directly with md5 or sha1 etc. Password is encrypted digest algorithm, and cipher mode has great risk, and hacker can be by previously generating plain/cipher text corresponding table Mode reduce in plain text, so as to cause user cipher to be revealed, so that cryptographic security is relatively low.
The content of the invention
In view of this, it is an object of the invention to provide safe encryption method and system, at self-defined multiple summary Reason and encryption process, improve cryptographic security.
In a first aspect, the embodiments of the invention provide safe encryption method, including:
Obtain decodement;
Make a summary processing and encryption are carried out to the decodement according to preset rules, obtain cryptographic secret.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the first of first aspect, wherein, institute State and make a summary processing and encryption are carried out to the decodement according to preset rules, obtaining cryptographic secret includes:
Advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering processing;
According to encryption flow executive summary processing or encryption.
With reference to the first possible embodiment of first aspect, the embodiments of the invention provide second of first aspect Possible embodiment, wherein, it is described to be included according to Custom Encryption flow executive summary processing or encryption, repeat Following processing is performed, until obtaining the cryptographic secret:
First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain first Result of making a summary or the first encrypted result;
The described first summary result or first encrypted result are held by the second digest algorithm or the second AES The processing of the summary of row second or the second encryption.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the third of first aspect, wherein, also Including:
The cryptographic secret is preserved.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 4th of first aspect kind Possible embodiment, wherein, first AES and second AES are user-defined encrypted algorithm.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 5th of first aspect kind Possible embodiment, wherein, first digest algorithm and second digest algorithm include CRC8 checking algorithms, CRC16 checking algorithms, CRC32 checking algorithms, MD5, MD4, MD2, SHA 1, SHA 256, SHA384 and SHA512.
Second aspect, the embodiment of the present invention also provide secure encryption system, including:
Acquisition module, for obtaining decodement;
Summary encrypting module, for carrying out make a summary processing and encryption to the decodement according to preset rules, Obtain cryptographic secret.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, institute Stating summary encrypting module includes:
Self-defined unit, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and it is more Re-encryption is handled;
Summary ciphering unit, for according to encryption flow executive summary processing or encryption.
With reference to the first possible embodiment of second aspect, the embodiments of the invention provide second of second aspect Possible embodiment, wherein, the summary ciphering unit includes:
First summary ciphering unit, for by the first digest algorithm or the first AES perform the first summary processing or First encryption, obtain the first summary result or the first encrypted result;
Second summary ciphering unit, for by the second digest algorithm or the second AES to the described first summary result Or first encrypted result performs the second summary processing or the second encryption.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, also Including:
Memory module, for the cryptographic secret to be preserved.
The embodiments of the invention provide safe encryption method and system, including:Obtain decodement;According to preset rules pair Decodement carries out make a summary processing and encryption, obtains cryptographic secret.By self-defined multiple summary and AES, Improve cryptographic security
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and obtained in accompanying drawing.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the safe encryption method flow chart that the embodiment of the present invention one provides;
Fig. 2 is the step S102 for the safe encryption method that the embodiment of the present invention one provides method flow diagram;
Fig. 3 is the schematic flow sheet for the safe encryption method that the embodiment of the present invention one provides;
Fig. 4 is the schematic diagram for the secure encryption system that the embodiment of the present invention two provides;
Fig. 5 is another schematic diagram for the secure encryption system that the embodiment of the present invention two provides.
Icon:
10- acquisition modules;20- summary encrypting modules;The self-defined units of 21-;22- summary ciphering units.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention Technical scheme be clearly and completely described, it is clear that described embodiment is part of the embodiment of the present invention, rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Directly password is encrypted with digest algorithms such as md5 or sha1 for conventional encryption technique at present, and cipher mode has very Risks, hacker can be reduced by way of previously generating plain/cipher text corresponding table in plain text, so as to cause user cipher to be let out Dew, so that cryptographic security is relatively low, based on this, safe encryption method provided in an embodiment of the present invention and system, by more Summary and AES again, improve cryptographic security.
For ease of understanding the present embodiment, the safe encryption method disclosed in the embodiment of the present invention is carried out first detailed It is thin to introduce.
Embodiment one:
Fig. 1 is the safe encryption method flow chart that the embodiment of the present invention one provides.
Reference picture 1, safe encryption method, including:
Step S101, obtain decodement;
Step S102, make a summary processing and encryption are carried out to decodement according to preset rules, obtain cryptographic secret.
Preset rules are advance customized encryption flows, usually, directly carry out summary calculation in Crypted password from the background Method is encrypted, and hacker still can be made a summary pre-establishing all passwords and its and reduction ciphertext is attempted by way of corresponding table;It is this Cipher mode risk is still bigger.The embodiment of the present invention is performed at multiple summary processing and multi-enciphering according to preset rules Reason, can resist the attack carried out in a manner of previously generating corresponding table, even if hacker is aware of AES, he still needs Attacked by re-establishing this violence mode of corresponding table, intrusion scene is very high.
Further, as shown in Fig. 2 step S102 can take following steps to realize:
Step S201, advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering Processing;
Step S202, according to encryption flow executive summary processing or encryption.
After decodement is got, first have to create encrypted object, Custom Encryption when encrypted object is created Flow, various AES plug-in units are at this moment stored as a set.Each plug-in unit can perform a kind of encryption.Perform encryption stream Cheng Shi, plug-in unit is taken out according to execution sequence successively from set, data are encrypted.
Further, step S202 includes repeating following processing, until obtaining the cryptographic secret:
First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain first Result of making a summary or the first encrypted result;
The described first summary result or first encrypted result are held by the second digest algorithm or the second AES The processing of the summary of row second or the second encryption.
Specifically, encryption flow can arbitrarily be set, and executive summary processing or encryption, that is, pluck step by step Handle and do not fixed with the order of encryption, number of steps is not also fixed.
As shown in figure 3, multiple summary processing and multi-enciphering processing procedure are exemplified below:
Step 1:Obtain user cipher in plain text;
Step 2:Summary processing is carried out using digest algorithm 1;
Step 3:The summary result of previous step is encrypted using custom algorithm 1;
Step 4:Summary processing is carried out using digest algorithm 2;
Step 5:The summary result of previous step is encrypted using custom algorithm 2;
Step 6:Made a summary according to actual conditions using multiple steps and encryption;
Step 7:Summary processing is carried out using digest algorithm n;
Step 8:Obtain cryptographic secret to the end and be saved into database, operation terminates.
For example, getting a decodement A, first pass through digest algorithm 1 and handle, obtain data B.Data B is carried out again Custom Encryption, such as XOR, data C is obtained, digest algorithm 2 is carried out to data C again afterwards, the like, it is pre- until having performed All summary processing steps and encryption processing step first set, obtain cryptographic secret to the end.
It should be noted that above-mentioned processing procedure is example, specific encryption flow can optionally carry out it is self-defined, i.e., The order of digest algorithm and AES is unfixed, performs number nor fixed.In addition, digest algorithm can also replace It is changed to symmetric encipherment algorithm.
Further, the first digest algorithm and the second digest algorithm include CRC8 checking algorithms, CRC16 checking algorithms, CRC32 checking algorithms, MD5 (Message Digest Algorithm, Message Digest Algorithm 5), MD4, MD2, SHA 1 (Secure Hash Algorithm, Secure Hash Algorithm), SHA 256, SHA384 and SHA512.
Wherein, CRC (Cyclic Redundancy Check, CRC) series include CRC8 checking algorithms, CRC16 checking algorithms and CRC32 checking algorithms;MD4, MD2 represent Message Digest 5 fourth edition and the second edition respectively;SHA1 is 20 bytes (160), SHA256 are 32 bytes (256), SHA384 is 48 bytes (384), SHA512 is 64 bytes (512 Position).It should be noted that digest algorithm is not limited to these.
Further, in addition to:Cryptographic secret is preserved.
The embodiments of the invention provide safe encryption method and system, including:Obtain decodement;According to preset rules pair The decodement carries out make a summary processing and encryption, obtains cryptographic secret.By it is self-defined it is multiple summary processing and Encryption process, improve cryptographic security.
Embodiment two:
Fig. 4 is the schematic diagram for the secure encryption system that the embodiment of the present invention two provides.
Reference picture 4, secure encryption system, including:
Acquisition module 10, for obtaining decodement;
Summary encrypting module 20, for being carried out according to preset rules to the decodement at summary processing and encryption Reason, obtains cryptographic secret.
Further, as shown in figure 5, summary encrypting module 20 includes:
Self-defined unit 21, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and Multi-enciphering processing;
Summary ciphering unit 22, for according to encryption flow executive summary processing or encryption.
Further, the summary ciphering unit 22 includes:
First summary ciphering unit (not shown), is performed at the first summary by the first digest algorithm or the first AES Reason or the first encryption, obtain the first summary result or the first encrypted result;
Second summary ciphering unit (not shown), is made a summary by the second digest algorithm or the second AES to described first As a result or first encrypted result performs the second summary processing or the second encryption.
Further, in addition to memory module, the cryptographic secret is preserved by memory module.
Secure encryption system provided in an embodiment of the present invention, the safe encryption method provided with above-described embodiment have identical Technical characteristic, so can also solve identical technical problem, reach identical technique effect.
The embodiments of the invention provide secure encryption system, including:Acquisition module, for obtaining decodement;Summary adds Close module, for carrying out make a summary processing and encryption to decodement according to preset rules, obtain cryptographic secret.By certainly Multiple summary processing and encryption process are defined, improves cryptographic security.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor, and being stored with memory to locate The computer program that runs on reason device, the safe encryption method that above-described embodiment provides is realized during computing device computer program The step of.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium Calculation machine program, the step of safe encryption method of above-described embodiment is performed when computer program is run by processor.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
In the description of the invention, it is necessary to explanation, term " " center ", " on ", " under ", "left", "right", " vertical ", The orientation or position relationship of the instruction such as " level ", " interior ", " outer " be based on orientation shown in the drawings or position relationship, merely to Be easy to the description present invention and simplify description, rather than instruction or imply signified device or element must have specific orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ", " the 3rd " is only used for describing purpose, and it is not intended that instruction or hint relative importance.
The computer program product for the progress safe encryption method that the embodiment of the present invention is provided, including store processor The computer-readable recording medium of executable non-volatile program code, the instruction that described program code includes can be used for performing Method described in previous methods embodiment, specific implementation can be found in embodiment of the method, will not be repeated here.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, can be with Realize by another way.Device embodiment described above is only schematical, for example, the division of the unit, Only a kind of division of logic function, can there is other dividing mode when actually realizing, in another example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or beg for The mutual coupling of opinion or direct-coupling or communication connection can be by some communication interfaces, device or unit it is indirect Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in the executable non-volatile computer read/write memory medium of a processor.Based on such understanding, the present invention The part that is substantially contributed in other words to prior art of technical scheme or the part of the technical scheme can be with software The form of product is embodied, and the computer software product is stored in a storage medium, including some instructions are causing One computer equipment (can be personal computer, server, or network equipment etc.) performs each embodiment institute of the present invention State all or part of step of method.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with The medium of store program codes.
Finally it should be noted that:Embodiment described above, it is only the embodiment of the present invention, to illustrate the present invention Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

  1. A kind of 1. safe encryption method, it is characterised in that including:
    Obtain decodement;
    Make a summary processing and encryption are carried out to the decodement according to preset rules, obtain cryptographic secret.
  2. 2. safe encryption method according to claim 1, it is characterised in that described bright to the password according to preset rules Text carries out make a summary processing and encryption, and obtaining cryptographic secret includes:
    Advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering processing;
    According to encryption flow executive summary processing or encryption.
  3. 3. safe encryption method according to claim 2, it is characterised in that described to be held according to the Custom Encryption flow The processing of row summary or encryption include, and repeat following processing, until obtaining the cryptographic secret:
    First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain the first summary Or the first encrypted result as a result;
    The is performed to the described first summary result or first encrypted result by the second digest algorithm or the second AES Two summary processing or the second encryption.
  4. 4. safe encryption method according to claim 1, it is characterised in that also include:
    The cryptographic secret is preserved.
  5. 5. safe encryption method according to claim 3, it is characterised in that first AES and described second adds Close algorithm is user-defined encrypted algorithm.
  6. 6. safe encryption method according to claim 3, it is characterised in that first digest algorithm and described second is plucked Algorithm is wanted to include CRC8 checking algorithms, CRC16 checking algorithms, CRC32 checking algorithms, MD5, MD4, MD2, SHA 1, SHA 256th, SHA384 and SHA512.
  7. A kind of 7. secure encryption system, it is characterised in that including:
    Acquisition module, for obtaining decodement;
    Summary encrypting module, for carrying out make a summary processing and encryption to the decodement according to preset rules, obtain Cryptographic secret.
  8. 8. secure encryption system according to claim 7, it is characterised in that the summary encrypting module includes:
    Self-defined unit, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and it is multiple plus Close processing;
    Summary ciphering unit, for according to encryption flow executive summary processing or encryption.
  9. 9. secure encryption system according to claim 8, it is characterised in that the summary ciphering unit includes:
    First summary ciphering unit, for performing the first summary processing or first by the first digest algorithm or the first AES Encryption, obtain the first summary result or the first encrypted result;
    Second summary ciphering unit, for by the second digest algorithm or the second AES to the described first summary result or institute State the first encrypted result and perform the second summary processing or the second encryption.
  10. 10. secure encryption system according to claim 7, it is characterised in that also include:
    Memory module, for the cryptographic secret to be preserved.
CN201710799680.1A 2017-09-06 2017-09-06 Safe encryption method and system Pending CN107563211A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710799680.1A CN107563211A (en) 2017-09-06 2017-09-06 Safe encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710799680.1A CN107563211A (en) 2017-09-06 2017-09-06 Safe encryption method and system

Publications (1)

Publication Number Publication Date
CN107563211A true CN107563211A (en) 2018-01-09

Family

ID=60979523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710799680.1A Pending CN107563211A (en) 2017-09-06 2017-09-06 Safe encryption method and system

Country Status (1)

Country Link
CN (1) CN107563211A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134666A (en) * 2018-02-07 2018-06-08 北京安博通科技股份有限公司 A kind of encrypting and decrypting method and device
CN108566270A (en) * 2018-04-26 2018-09-21 成都盛拓源科技有限公司 Use the novel encryption method of double block ciphers
CN108712388A (en) * 2018-04-20 2018-10-26 广州市玄武无线科技股份有限公司 A kind of data safe transmission method and device based on HTTP
CN109347858A (en) * 2018-11-16 2019-02-15 上海敬信软件技术有限公司 Cipher code protection method, auth method, device, equipment and storage medium
CN114374519A (en) * 2021-12-09 2022-04-19 深圳太极数智技术有限公司 Data transmission method, system and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452514A (en) * 2007-12-06 2009-06-10 中国长城计算机深圳股份有限公司 User data protection method for safety computer
CN101459661A (en) * 2007-12-14 2009-06-17 鸿富锦精密工业(深圳)有限公司 Electronic document protection system and method
CN103914666A (en) * 2013-09-17 2014-07-09 亚欧宝龙信息安全技术(湖南)有限公司 File encryption and decryption method and device on the basis of partitions
CN106204038A (en) * 2016-06-24 2016-12-07 广州正峰电子科技有限公司 The method and device that a kind of password string generates
CN106355106A (en) * 2016-08-30 2017-01-25 深圳市引导美电子商务有限公司 Account information storing method and system
CN106919810A (en) * 2017-02-22 2017-07-04 广州广电运通金融电子股份有限公司 Registration code generating method and device, software registration method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452514A (en) * 2007-12-06 2009-06-10 中国长城计算机深圳股份有限公司 User data protection method for safety computer
CN101459661A (en) * 2007-12-14 2009-06-17 鸿富锦精密工业(深圳)有限公司 Electronic document protection system and method
CN103914666A (en) * 2013-09-17 2014-07-09 亚欧宝龙信息安全技术(湖南)有限公司 File encryption and decryption method and device on the basis of partitions
CN106204038A (en) * 2016-06-24 2016-12-07 广州正峰电子科技有限公司 The method and device that a kind of password string generates
CN106355106A (en) * 2016-08-30 2017-01-25 深圳市引导美电子商务有限公司 Account information storing method and system
CN106919810A (en) * 2017-02-22 2017-07-04 广州广电运通金融电子股份有限公司 Registration code generating method and device, software registration method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
武安状 等: "《空间数据处理系统理论与方法》", 31 August 2012, 黄河水利出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134666A (en) * 2018-02-07 2018-06-08 北京安博通科技股份有限公司 A kind of encrypting and decrypting method and device
CN108712388A (en) * 2018-04-20 2018-10-26 广州市玄武无线科技股份有限公司 A kind of data safe transmission method and device based on HTTP
CN108712388B (en) * 2018-04-20 2020-09-15 广州市玄武无线科技股份有限公司 Data secure transmission method and device based on HTTP
CN108566270A (en) * 2018-04-26 2018-09-21 成都盛拓源科技有限公司 Use the novel encryption method of double block ciphers
CN109347858A (en) * 2018-11-16 2019-02-15 上海敬信软件技术有限公司 Cipher code protection method, auth method, device, equipment and storage medium
CN114374519A (en) * 2021-12-09 2022-04-19 深圳太极数智技术有限公司 Data transmission method, system and equipment

Similar Documents

Publication Publication Date Title
CN107563211A (en) Safe encryption method and system
CN106850221B (en) Information encryption and decryption method and device
US9158931B2 (en) Block encryption method and block decryption method having integrity verification
CN107634832B (en) Character string encryption, verification method, device, computer readable storage medium
US8601285B2 (en) Method for secure program code execution in an electronic device
WO2015156786A1 (en) Redactable document signatures
US20100220853A1 (en) Method and Apparatus for Compound Hashing Via Iteration
CN110636070B (en) Data sending method, data query method, device, electronic equipment and system
CN107579813A (en) information encryption and decryption method and device
US20220006621A1 (en) Multi-factor-protected private key distribution
CN109462602A (en) Log-on message storage method, login validation method, device, equipment and medium
CN109672521A (en) Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation
CN110224834A (en) Identity identifying method, decryption and ciphering terminal based on dynamic token
CN111859435B (en) Data security processing method and device
CN109687966A (en) Encryption method and its system
CN110245466A (en) Software integrity protection and verification method, system, equipment and storage medium
CN103888942A (en) Data processing method based on negotiation secret keys
CN111066077A (en) Encryption device, encryption method, decryption device, and decryption method
CN110730167B (en) Data sending method, data query method, device, electronic equipment and system
CN104008344A (en) Method and system for ePub document data safety protection
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN108537038A (en) Custom rule cipher management method, device, terminal device and storage medium
US20180309579A1 (en) Secure representation via a format preserving hash function
CN104504309A (en) Data encryption method and terminal for application program
CN111064577A (en) Security authentication method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109