CN107563211A - Safe encryption method and system - Google Patents
Safe encryption method and system Download PDFInfo
- Publication number
- CN107563211A CN107563211A CN201710799680.1A CN201710799680A CN107563211A CN 107563211 A CN107563211 A CN 107563211A CN 201710799680 A CN201710799680 A CN 201710799680A CN 107563211 A CN107563211 A CN 107563211A
- Authority
- CN
- China
- Prior art keywords
- encryption
- processing
- aes
- decodement
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides safe encryption method and system, is related to encryption technology field, including:Obtain decodement;Make a summary processing and encryption are carried out to decodement according to preset rules, obtain cryptographic secret.By self-defined multiple digest algorithm and AES, cryptographic security is improved.
Description
Technical field
The present invention relates to encryption technology field, especially safe encryption method and system.
Background technology
Most of application backstages and website backstage based on internet, which can all have, preserves user account, the demand of password,
Password can typically be carried out simple encryption and then be preserved by background server, and conventional encryption technique is directly with md5 or sha1 etc.
Password is encrypted digest algorithm, and cipher mode has great risk, and hacker can be by previously generating plain/cipher text corresponding table
Mode reduce in plain text, so as to cause user cipher to be revealed, so that cryptographic security is relatively low.
The content of the invention
In view of this, it is an object of the invention to provide safe encryption method and system, at self-defined multiple summary
Reason and encryption process, improve cryptographic security.
In a first aspect, the embodiments of the invention provide safe encryption method, including:
Obtain decodement;
Make a summary processing and encryption are carried out to the decodement according to preset rules, obtain cryptographic secret.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the first of first aspect, wherein, institute
State and make a summary processing and encryption are carried out to the decodement according to preset rules, obtaining cryptographic secret includes:
Advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering processing;
According to encryption flow executive summary processing or encryption.
With reference to the first possible embodiment of first aspect, the embodiments of the invention provide second of first aspect
Possible embodiment, wherein, it is described to be included according to Custom Encryption flow executive summary processing or encryption, repeat
Following processing is performed, until obtaining the cryptographic secret:
First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain first
Result of making a summary or the first encrypted result;
The described first summary result or first encrypted result are held by the second digest algorithm or the second AES
The processing of the summary of row second or the second encryption.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the third of first aspect, wherein, also
Including:
The cryptographic secret is preserved.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 4th of first aspect kind
Possible embodiment, wherein, first AES and second AES are user-defined encrypted algorithm.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 5th of first aspect kind
Possible embodiment, wherein, first digest algorithm and second digest algorithm include CRC8 checking algorithms,
CRC16 checking algorithms, CRC32 checking algorithms, MD5, MD4, MD2, SHA 1, SHA 256, SHA384 and SHA512.
Second aspect, the embodiment of the present invention also provide secure encryption system, including:
Acquisition module, for obtaining decodement;
Summary encrypting module, for carrying out make a summary processing and encryption to the decodement according to preset rules,
Obtain cryptographic secret.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, institute
Stating summary encrypting module includes:
Self-defined unit, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and it is more
Re-encryption is handled;
Summary ciphering unit, for according to encryption flow executive summary processing or encryption.
With reference to the first possible embodiment of second aspect, the embodiments of the invention provide second of second aspect
Possible embodiment, wherein, the summary ciphering unit includes:
First summary ciphering unit, for by the first digest algorithm or the first AES perform the first summary processing or
First encryption, obtain the first summary result or the first encrypted result;
Second summary ciphering unit, for by the second digest algorithm or the second AES to the described first summary result
Or first encrypted result performs the second summary processing or the second encryption.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, also
Including:
Memory module, for the cryptographic secret to be preserved.
The embodiments of the invention provide safe encryption method and system, including:Obtain decodement;According to preset rules pair
Decodement carries out make a summary processing and encryption, obtains cryptographic secret.By self-defined multiple summary and AES,
Improve cryptographic security
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims
And specifically noted structure is realized and obtained in accompanying drawing.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended accompanying drawing, is described in detail below.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art
The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid
Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the safe encryption method flow chart that the embodiment of the present invention one provides;
Fig. 2 is the step S102 for the safe encryption method that the embodiment of the present invention one provides method flow diagram;
Fig. 3 is the schematic flow sheet for the safe encryption method that the embodiment of the present invention one provides;
Fig. 4 is the schematic diagram for the secure encryption system that the embodiment of the present invention two provides;
Fig. 5 is another schematic diagram for the secure encryption system that the embodiment of the present invention two provides.
Icon:
10- acquisition modules;20- summary encrypting modules;The self-defined units of 21-;22- summary ciphering units.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Technical scheme be clearly and completely described, it is clear that described embodiment is part of the embodiment of the present invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Directly password is encrypted with digest algorithms such as md5 or sha1 for conventional encryption technique at present, and cipher mode has very
Risks, hacker can be reduced by way of previously generating plain/cipher text corresponding table in plain text, so as to cause user cipher to be let out
Dew, so that cryptographic security is relatively low, based on this, safe encryption method provided in an embodiment of the present invention and system, by more
Summary and AES again, improve cryptographic security.
For ease of understanding the present embodiment, the safe encryption method disclosed in the embodiment of the present invention is carried out first detailed
It is thin to introduce.
Embodiment one:
Fig. 1 is the safe encryption method flow chart that the embodiment of the present invention one provides.
Reference picture 1, safe encryption method, including:
Step S101, obtain decodement;
Step S102, make a summary processing and encryption are carried out to decodement according to preset rules, obtain cryptographic secret.
Preset rules are advance customized encryption flows, usually, directly carry out summary calculation in Crypted password from the background
Method is encrypted, and hacker still can be made a summary pre-establishing all passwords and its and reduction ciphertext is attempted by way of corresponding table;It is this
Cipher mode risk is still bigger.The embodiment of the present invention is performed at multiple summary processing and multi-enciphering according to preset rules
Reason, can resist the attack carried out in a manner of previously generating corresponding table, even if hacker is aware of AES, he still needs
Attacked by re-establishing this violence mode of corresponding table, intrusion scene is very high.
Further, as shown in Fig. 2 step S102 can take following steps to realize:
Step S201, advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering
Processing;
Step S202, according to encryption flow executive summary processing or encryption.
After decodement is got, first have to create encrypted object, Custom Encryption when encrypted object is created
Flow, various AES plug-in units are at this moment stored as a set.Each plug-in unit can perform a kind of encryption.Perform encryption stream
Cheng Shi, plug-in unit is taken out according to execution sequence successively from set, data are encrypted.
Further, step S202 includes repeating following processing, until obtaining the cryptographic secret:
First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain first
Result of making a summary or the first encrypted result;
The described first summary result or first encrypted result are held by the second digest algorithm or the second AES
The processing of the summary of row second or the second encryption.
Specifically, encryption flow can arbitrarily be set, and executive summary processing or encryption, that is, pluck step by step
Handle and do not fixed with the order of encryption, number of steps is not also fixed.
As shown in figure 3, multiple summary processing and multi-enciphering processing procedure are exemplified below:
Step 1:Obtain user cipher in plain text;
Step 2:Summary processing is carried out using digest algorithm 1;
Step 3:The summary result of previous step is encrypted using custom algorithm 1;
Step 4:Summary processing is carried out using digest algorithm 2;
Step 5:The summary result of previous step is encrypted using custom algorithm 2;
Step 6:Made a summary according to actual conditions using multiple steps and encryption;
Step 7:Summary processing is carried out using digest algorithm n;
Step 8:Obtain cryptographic secret to the end and be saved into database, operation terminates.
For example, getting a decodement A, first pass through digest algorithm 1 and handle, obtain data B.Data B is carried out again
Custom Encryption, such as XOR, data C is obtained, digest algorithm 2 is carried out to data C again afterwards, the like, it is pre- until having performed
All summary processing steps and encryption processing step first set, obtain cryptographic secret to the end.
It should be noted that above-mentioned processing procedure is example, specific encryption flow can optionally carry out it is self-defined, i.e.,
The order of digest algorithm and AES is unfixed, performs number nor fixed.In addition, digest algorithm can also replace
It is changed to symmetric encipherment algorithm.
Further, the first digest algorithm and the second digest algorithm include CRC8 checking algorithms, CRC16 checking algorithms,
CRC32 checking algorithms, MD5 (Message Digest Algorithm, Message Digest Algorithm 5), MD4, MD2, SHA 1
(Secure Hash Algorithm, Secure Hash Algorithm), SHA 256, SHA384 and SHA512.
Wherein, CRC (Cyclic Redundancy Check, CRC) series include CRC8 checking algorithms,
CRC16 checking algorithms and CRC32 checking algorithms;MD4, MD2 represent Message Digest 5 fourth edition and the second edition respectively;SHA1 is
20 bytes (160), SHA256 are 32 bytes (256), SHA384 is 48 bytes (384), SHA512 is 64 bytes (512
Position).It should be noted that digest algorithm is not limited to these.
Further, in addition to:Cryptographic secret is preserved.
The embodiments of the invention provide safe encryption method and system, including:Obtain decodement;According to preset rules pair
The decodement carries out make a summary processing and encryption, obtains cryptographic secret.By it is self-defined it is multiple summary processing and
Encryption process, improve cryptographic security.
Embodiment two:
Fig. 4 is the schematic diagram for the secure encryption system that the embodiment of the present invention two provides.
Reference picture 4, secure encryption system, including:
Acquisition module 10, for obtaining decodement;
Summary encrypting module 20, for being carried out according to preset rules to the decodement at summary processing and encryption
Reason, obtains cryptographic secret.
Further, as shown in figure 5, summary encrypting module 20 includes:
Self-defined unit 21, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and
Multi-enciphering processing;
Summary ciphering unit 22, for according to encryption flow executive summary processing or encryption.
Further, the summary ciphering unit 22 includes:
First summary ciphering unit (not shown), is performed at the first summary by the first digest algorithm or the first AES
Reason or the first encryption, obtain the first summary result or the first encrypted result;
Second summary ciphering unit (not shown), is made a summary by the second digest algorithm or the second AES to described first
As a result or first encrypted result performs the second summary processing or the second encryption.
Further, in addition to memory module, the cryptographic secret is preserved by memory module.
Secure encryption system provided in an embodiment of the present invention, the safe encryption method provided with above-described embodiment have identical
Technical characteristic, so can also solve identical technical problem, reach identical technique effect.
The embodiments of the invention provide secure encryption system, including:Acquisition module, for obtaining decodement;Summary adds
Close module, for carrying out make a summary processing and encryption to decodement according to preset rules, obtain cryptographic secret.By certainly
Multiple summary processing and encryption process are defined, improves cryptographic security.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor, and being stored with memory to locate
The computer program that runs on reason device, the safe encryption method that above-described embodiment provides is realized during computing device computer program
The step of.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium
Calculation machine program, the step of safe encryption method of above-described embodiment is performed when computer program is run by processor.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can
To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, Ke Yishi
The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
In the description of the invention, it is necessary to explanation, term " " center ", " on ", " under ", "left", "right", " vertical ",
The orientation or position relationship of the instruction such as " level ", " interior ", " outer " be based on orientation shown in the drawings or position relationship, merely to
Be easy to the description present invention and simplify description, rather than instruction or imply signified device or element must have specific orientation,
With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ",
" the 3rd " is only used for describing purpose, and it is not intended that instruction or hint relative importance.
The computer program product for the progress safe encryption method that the embodiment of the present invention is provided, including store processor
The computer-readable recording medium of executable non-volatile program code, the instruction that described program code includes can be used for performing
Method described in previous methods embodiment, specific implementation can be found in embodiment of the method, will not be repeated here.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, can be with
Realize by another way.Device embodiment described above is only schematical, for example, the division of the unit,
Only a kind of division of logic function, can there is other dividing mode when actually realizing, in another example, multiple units or component can
To combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or beg for
The mutual coupling of opinion or direct-coupling or communication connection can be by some communication interfaces, device or unit it is indirect
Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with
It is stored in the executable non-volatile computer read/write memory medium of a processor.Based on such understanding, the present invention
The part that is substantially contributed in other words to prior art of technical scheme or the part of the technical scheme can be with software
The form of product is embodied, and the computer software product is stored in a storage medium, including some instructions are causing
One computer equipment (can be personal computer, server, or network equipment etc.) performs each embodiment institute of the present invention
State all or part of step of method.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with
The medium of store program codes.
Finally it should be noted that:Embodiment described above, it is only the embodiment of the present invention, to illustrate the present invention
Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art
The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light
Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention, should all cover the protection in the present invention
Within the scope of.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
- A kind of 1. safe encryption method, it is characterised in that including:Obtain decodement;Make a summary processing and encryption are carried out to the decodement according to preset rules, obtain cryptographic secret.
- 2. safe encryption method according to claim 1, it is characterised in that described bright to the password according to preset rules Text carries out make a summary processing and encryption, and obtaining cryptographic secret includes:Advance Custom Encryption flow, the encryption flow include multiple summary processing and multi-enciphering processing;According to encryption flow executive summary processing or encryption.
- 3. safe encryption method according to claim 2, it is characterised in that described to be held according to the Custom Encryption flow The processing of row summary or encryption include, and repeat following processing, until obtaining the cryptographic secret:First summary processing or the first encryption are performed by the first digest algorithm or the first AES, obtain the first summary Or the first encrypted result as a result;The is performed to the described first summary result or first encrypted result by the second digest algorithm or the second AES Two summary processing or the second encryption.
- 4. safe encryption method according to claim 1, it is characterised in that also include:The cryptographic secret is preserved.
- 5. safe encryption method according to claim 3, it is characterised in that first AES and described second adds Close algorithm is user-defined encrypted algorithm.
- 6. safe encryption method according to claim 3, it is characterised in that first digest algorithm and described second is plucked Algorithm is wanted to include CRC8 checking algorithms, CRC16 checking algorithms, CRC32 checking algorithms, MD5, MD4, MD2, SHA 1, SHA 256th, SHA384 and SHA512.
- A kind of 7. secure encryption system, it is characterised in that including:Acquisition module, for obtaining decodement;Summary encrypting module, for carrying out make a summary processing and encryption to the decodement according to preset rules, obtain Cryptographic secret.
- 8. secure encryption system according to claim 7, it is characterised in that the summary encrypting module includes:Self-defined unit, for advance Custom Encryption flow, the encryption flow include it is multiple summary processing and it is multiple plus Close processing;Summary ciphering unit, for according to encryption flow executive summary processing or encryption.
- 9. secure encryption system according to claim 8, it is characterised in that the summary ciphering unit includes:First summary ciphering unit, for performing the first summary processing or first by the first digest algorithm or the first AES Encryption, obtain the first summary result or the first encrypted result;Second summary ciphering unit, for by the second digest algorithm or the second AES to the described first summary result or institute State the first encrypted result and perform the second summary processing or the second encryption.
- 10. secure encryption system according to claim 7, it is characterised in that also include:Memory module, for the cryptographic secret to be preserved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710799680.1A CN107563211A (en) | 2017-09-06 | 2017-09-06 | Safe encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710799680.1A CN107563211A (en) | 2017-09-06 | 2017-09-06 | Safe encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563211A true CN107563211A (en) | 2018-01-09 |
Family
ID=60979523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710799680.1A Pending CN107563211A (en) | 2017-09-06 | 2017-09-06 | Safe encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563211A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108134666A (en) * | 2018-02-07 | 2018-06-08 | 北京安博通科技股份有限公司 | A kind of encrypting and decrypting method and device |
CN108566270A (en) * | 2018-04-26 | 2018-09-21 | 成都盛拓源科技有限公司 | Use the novel encryption method of double block ciphers |
CN108712388A (en) * | 2018-04-20 | 2018-10-26 | 广州市玄武无线科技股份有限公司 | A kind of data safe transmission method and device based on HTTP |
CN109347858A (en) * | 2018-11-16 | 2019-02-15 | 上海敬信软件技术有限公司 | Cipher code protection method, auth method, device, equipment and storage medium |
CN114374519A (en) * | 2021-12-09 | 2022-04-19 | 深圳太极数智技术有限公司 | Data transmission method, system and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101452514A (en) * | 2007-12-06 | 2009-06-10 | 中国长城计算机深圳股份有限公司 | User data protection method for safety computer |
CN101459661A (en) * | 2007-12-14 | 2009-06-17 | 鸿富锦精密工业(深圳)有限公司 | Electronic document protection system and method |
CN103914666A (en) * | 2013-09-17 | 2014-07-09 | 亚欧宝龙信息安全技术(湖南)有限公司 | File encryption and decryption method and device on the basis of partitions |
CN106204038A (en) * | 2016-06-24 | 2016-12-07 | 广州正峰电子科技有限公司 | The method and device that a kind of password string generates |
CN106355106A (en) * | 2016-08-30 | 2017-01-25 | 深圳市引导美电子商务有限公司 | Account information storing method and system |
CN106919810A (en) * | 2017-02-22 | 2017-07-04 | 广州广电运通金融电子股份有限公司 | Registration code generating method and device, software registration method and device |
-
2017
- 2017-09-06 CN CN201710799680.1A patent/CN107563211A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101452514A (en) * | 2007-12-06 | 2009-06-10 | 中国长城计算机深圳股份有限公司 | User data protection method for safety computer |
CN101459661A (en) * | 2007-12-14 | 2009-06-17 | 鸿富锦精密工业(深圳)有限公司 | Electronic document protection system and method |
CN103914666A (en) * | 2013-09-17 | 2014-07-09 | 亚欧宝龙信息安全技术(湖南)有限公司 | File encryption and decryption method and device on the basis of partitions |
CN106204038A (en) * | 2016-06-24 | 2016-12-07 | 广州正峰电子科技有限公司 | The method and device that a kind of password string generates |
CN106355106A (en) * | 2016-08-30 | 2017-01-25 | 深圳市引导美电子商务有限公司 | Account information storing method and system |
CN106919810A (en) * | 2017-02-22 | 2017-07-04 | 广州广电运通金融电子股份有限公司 | Registration code generating method and device, software registration method and device |
Non-Patent Citations (1)
Title |
---|
武安状 等: "《空间数据处理系统理论与方法》", 31 August 2012, 黄河水利出版社 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108134666A (en) * | 2018-02-07 | 2018-06-08 | 北京安博通科技股份有限公司 | A kind of encrypting and decrypting method and device |
CN108712388A (en) * | 2018-04-20 | 2018-10-26 | 广州市玄武无线科技股份有限公司 | A kind of data safe transmission method and device based on HTTP |
CN108712388B (en) * | 2018-04-20 | 2020-09-15 | 广州市玄武无线科技股份有限公司 | Data secure transmission method and device based on HTTP |
CN108566270A (en) * | 2018-04-26 | 2018-09-21 | 成都盛拓源科技有限公司 | Use the novel encryption method of double block ciphers |
CN109347858A (en) * | 2018-11-16 | 2019-02-15 | 上海敬信软件技术有限公司 | Cipher code protection method, auth method, device, equipment and storage medium |
CN114374519A (en) * | 2021-12-09 | 2022-04-19 | 深圳太极数智技术有限公司 | Data transmission method, system and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107563211A (en) | Safe encryption method and system | |
CN106850221B (en) | Information encryption and decryption method and device | |
US9158931B2 (en) | Block encryption method and block decryption method having integrity verification | |
CN107634832B (en) | Character string encryption, verification method, device, computer readable storage medium | |
US8601285B2 (en) | Method for secure program code execution in an electronic device | |
WO2015156786A1 (en) | Redactable document signatures | |
US20100220853A1 (en) | Method and Apparatus for Compound Hashing Via Iteration | |
CN110636070B (en) | Data sending method, data query method, device, electronic equipment and system | |
CN107579813A (en) | information encryption and decryption method and device | |
US20220006621A1 (en) | Multi-factor-protected private key distribution | |
CN109462602A (en) | Log-on message storage method, login validation method, device, equipment and medium | |
CN109672521A (en) | Safe storage system and method based on encription algorithms approved by the State Password Administration Committee Office engine implementation | |
CN110224834A (en) | Identity identifying method, decryption and ciphering terminal based on dynamic token | |
CN111859435B (en) | Data security processing method and device | |
CN109687966A (en) | Encryption method and its system | |
CN110245466A (en) | Software integrity protection and verification method, system, equipment and storage medium | |
CN103888942A (en) | Data processing method based on negotiation secret keys | |
CN111066077A (en) | Encryption device, encryption method, decryption device, and decryption method | |
CN110730167B (en) | Data sending method, data query method, device, electronic equipment and system | |
CN104008344A (en) | Method and system for ePub document data safety protection | |
US8769301B2 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
CN108537038A (en) | Custom rule cipher management method, device, terminal device and storage medium | |
US20180309579A1 (en) | Secure representation via a format preserving hash function | |
CN104504309A (en) | Data encryption method and terminal for application program | |
CN111064577A (en) | Security authentication method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |