CN108134799A - Novel encipher-decipher method and its device - Google Patents

Novel encipher-decipher method and its device Download PDF

Info

Publication number
CN108134799A
CN108134799A CN201810049121.3A CN201810049121A CN108134799A CN 108134799 A CN108134799 A CN 108134799A CN 201810049121 A CN201810049121 A CN 201810049121A CN 108134799 A CN108134799 A CN 108134799A
Authority
CN
China
Prior art keywords
ciphertext
module
encrypted
deciphering
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810049121.3A
Other languages
Chinese (zh)
Other versions
CN108134799B (en
Inventor
陈帆
陈一帆
兰润芬
左勇
周鹏
侯敏
曾柏琛
李春晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Hunan Electric Power Co Ltd
Chenzhou Power Supply Co of State Grid Hunan Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Hunan Electric Power Co Ltd
Chenzhou Power Supply Co of State Grid Hunan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Hunan Electric Power Co Ltd, Chenzhou Power Supply Co of State Grid Hunan Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810049121.3A priority Critical patent/CN108134799B/en
Publication of CN108134799A publication Critical patent/CN108134799A/en
Application granted granted Critical
Publication of CN108134799B publication Critical patent/CN108134799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of novel encipher-decipher method, including encrypting and decrypting;Encryption includes obtaining Encryption Algorithm and compiles encrypting module;Obtain the Encryption Algorithm in plain text and selected;To being encrypted in plain text;Decryption includes obtaining decipherment algorithm and compiles deciphering module;Obtain ciphertext;Deciphering module is selected to decrypt ciphertext.The present invention also provides the device for realizing the novel encipher-decipher method, including input module, encrypting module, deciphering module and display module;Input module input needs the text encrypted or decrypted, and is encrypted by encrypting module or is decrypted, and show and export by display module by deciphering module.The present invention encrypts legal effective word in name text by identification, and the statistical law according to ciphertext in each decipherment algorithm, it can be to being encrypted in plain text, or Automatic-searching decipherment algorithm is decrypted, therefore the method for the present invention and its device are enough suitable for a plurality of types of enciphering and deciphering algorithms, and fault-tolerant ability is strong.

Description

Novel encipher-decipher method and its device
Technical field
Present invention relates particularly to a kind of novel encipher-decipher method and its devices.
Background technology
With the development and the improvement of people's living standards of national economy technology, people are for the protective awareness of personal information Also it is increasingly stronger, and enterprise-like corporation etc. is also higher and higher for the security requirements of core business and data.With Internet era, Intelligent epoch and the arriving of cloud era, the safety in data transmission procedure are also increasingly valued by people.
Encryption and decryption are one of essential links in privacy procedure.In order to improve the safety of message transmitting procedure Property, all the content of transmission can be encrypted during information is transmitted for most of webpage.There is lock necessarily to have key, decrypt Also become the important topic studied in information security.Although present cipher mode huge number, considers Safety and execution efficiency, common encrypting web mode only have Url, Hex, Base64, MD5 etc. several.
The encryption and decryption tool of current same type existing on the market, although huge number, and all contain common The encryption and decryption functions of encryption and decryption mode.But in actual use, user experience is often poor, and main cause is:Fault-tolerant ability is not By force, and when needing the ciphertext decryption to multi-enciphering it operates excessively cumbersome.
Invention content
One of the objects of the present invention is to provide one kind can be suitable for a plurality of types of enciphering and deciphering algorithms, and fault-tolerant energy The strong novel encipher-decipher method of power.
The second object of the present invention is to provide a kind of device for realizing the novel encipher-decipher method.
This novel encipher-decipher method provided by the invention, including ciphering process and decrypting process:
Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext;
Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted.
Encryption Algorithm described in step S1, specifically includes URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm, UNI Encryption Algorithm, MD5x16 Encryption Algorithm, MD5x32 Encryption Algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm.
The encrypting module is specially encrypted to being encrypted in plain text using following principle:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to adding in plain text It is close;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module is in the plaintext of input The part for meeting input rule is encrypted, and encrypted result is shown in plain text.
Decipherment algorithm described in step A, specifically includes URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms, UNI decipherment algorithms, MD5x16 decipherment algorithms and MD5x32 decipherment algorithms.
The ciphertext according to acquisition described in step C automatically selects a kind of deciphering module, is specially selected using following rule Corresponding deciphering module:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm, Deciphering module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert the ciphertext by HEX Encryption Algorithm is encrypted, and deciphering module chooses HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one Or two "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, solve Close module chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert the ciphertext by MD5x16 Decipherment algorithm Encryption Algorithm is encrypted, and deciphering module chooses MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert the ciphertext by MD5x32 Encryption Algorithm is encrypted, and deciphering module chooses MD5x32 decipherment algorithms.
Described in step D invocation step C selection deciphering module ciphertext is decrypted, specially using following steps into Row decryption:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user It can not determine that the ciphertext encodes.
The invention also discloses a kind of device for realizing the novel encipher-decipher method, including input module, encrypting module, Deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is used for will be from input The text of module input is encrypted, and deciphering module for the text inputted from input module to be decrypted, use by display module It is shown and is exported in by the text encrypted or decrypted.
This novel encipher-decipher method and its device provided by the invention legal in encrypting plaintext have by identifying Imitate the statistical law of word and II yard of the ASC according to ciphertext in each decipherment algorithm, can to being encrypted in plain text or The word Automatic-searching decipherment algorithm decrypted to needs is decrypted, therefore the method for the present invention and its device are enough suitable for multiple types The enciphering and deciphering algorithm of type, and fault-tolerant ability is strong.
Description of the drawings
Fig. 1 is the encryption flow figure of the method for the present invention.
Fig. 2 is the decryption flow chart of the method for the present invention.
Fig. 3 is the functional block diagram of apparatus of the present invention.
Specific embodiment
It is the encryption flow figure of the method for the present invention as shown in Figure 1:Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;In the specific implementation, Encryption Algorithm includes URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm, UNI Encryption Algorithm, MD5x16 encryption calculations Method, MD5x32 Encryption Algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm etc.;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext, Specially it is encrypted using following rule:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to adding in plain text It is close;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module is in the plaintext of input The part for meeting input rule is encrypted, and encrypted result is shown in plain text.
It is illustrated in figure 2 the decryption flow chart of the method for the present invention:Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;In the specific implementation, Decipherment algorithm specifically includes URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms, UNI decipherment algorithms, MD5x16 decryption Algorithm and MD5x32 decipherment algorithms etc.;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen, corresponding deciphering module is specially selected using following rule:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm, Deciphering module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert the ciphertext by HEX Encryption Algorithm is encrypted, and deciphering module chooses HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one Or two "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, solve Close module chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert the ciphertext by MD5x16 Decipherment algorithm Encryption Algorithm is encrypted, and deciphering module chooses MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert the ciphertext by MD5x32 Encryption Algorithm is encrypted, and deciphering module chooses MD5x32 decipherment algorithms;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted;Specially adopt It is decrypted with following steps:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
Step (1) and (2) in the specific implementation, it acts as:The deciphering module chosen using step C, to energy in ciphertext The cipher text part being enough decrypted is decrypted, and remaining part can not then decrypt and directly return to ciphertext, and notifies user;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user It can not determine that the ciphertext encodes.
The functional block diagram of the device of the novel encipher-decipher method of the present invention is illustrated in figure 3, including input module, encryption Module, deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is for will be from The text of input module input is encrypted, and deciphering module shows mould for the text inputted from input module to be decrypted Block is used to encrypt or the text of decryption is shown and exported.

Claims (7)

1. a kind of novel encipher-decipher method, including ciphering process and decrypting process:
Ciphering process includes the following steps:
S1. all types of Encryption Algorithm are obtained, and Encryption Algorithm is compiled into corresponding encrypting module;
S2. obtaining needs encrypted plaintext, and is selected in the encrypting module obtained in step sl by user a kind of;
S3. the plaintext of acquisition is encrypted in the encrypting module of invocation step S2 selections, so as to obtain encrypted ciphertext;
Decrypting process includes the following steps:
A. all types of decipherment algorithms is obtained, and decipherment algorithm is compiled into corresponding deciphering module;
B. the ciphertext for needing to decrypt is obtained;
C. corresponding deciphering module is chosen;
D. ciphertext is decrypted in the deciphering module of invocation step C selections, so as to the plaintext after being decrypted.
2. novel encipher-decipher method according to claim 1, it is characterised in that the Encryption Algorithm described in step S1 is specific to wrap Include URL Encryption Algorithm, HEX Encryption Algorithm, BASE64 Encryption Algorithm, UNI Encryption Algorithm, MD5x16 Encryption Algorithm, MD5x32 adds Close algorithm, Caesar substitution Encryption Algorithm and rail fence cipher Encryption Algorithm.
3. novel encipher-decipher method according to claim 2, it is characterised in that the encrypting module to adding in plain text It is close, specially it is encrypted using following principle:
R1. if desired encrypted plaintext meets the input rule of encrypting module, then encrypting module directly to being encrypted in plain text;
R2. if desired encrypted plaintext does not meet the input rule of encrypting module, then encrypting module in the plaintext of input to meeting The part of input rule is encrypted, and encrypted result is shown in plain text.
4. the novel encipher-decipher method according to one of claims 1 to 3, it is characterised in that the decipherment algorithm described in step A, Specifically include URL decipherment algorithms, HEX decipherment algorithms, BASE64 decipherment algorithms, UNI decipherment algorithms, MD5x16 decipherment algorithms and MD5x32 decipherment algorithms.
5. novel encipher-decipher method according to claim 4, it is characterised in that the ciphertext according to acquisition described in step C is certainly A kind of dynamic deciphering module of selection, specially selects corresponding deciphering module using following rule:
If r1. user has clearly selected a kind of deciphering module, it is decrypted using the deciphering module;
If r2. user does not select deciphering module clearly, deciphering module is chosen using following steps:
A. it obtains II yard of the ASC of the ciphertext of input, and each character in II yard of ASC is counted;
B. according to II yard of the ASC counted in step a, corresponding deciphering module is chosen using following rule and is decrypted:
If in II yard of the ASC of ciphertext, " % " accounting is more than 1/3rd, then assert that the ciphertext is encrypted by URL Encryption Algorithm, decrypt Module chooses URL deciphering modules;
If II yard of the ASC of ciphertext, started with " 0x ", and 90% character is 0~9 and A~F, then assert that the ciphertext is encrypted by HEX Algorithm for encryption, deciphering module choose HEX decipherment algorithms;
If in II yard of the ASC of ciphertext, total accounting of capitalization and lowercase be more than 60% or ciphertext with one or two A "=" number terminates, then assert that the ciphertext is encrypted by BASE64 Encryption Algorithm, and deciphering module chooses BASE64 decipherment algorithms;
If II yard of the ASC of ciphertext, all numbers or space then assert that the ciphertext is encoded for ASC II;
If in II yard of the ASC of ciphertext, using " u00 " as separator, then assert that the ciphertext is encrypted by UNI Encryption Algorithm, mould is decrypted Block chooses UNI decipherment algorithms;
If II yard of the ASC of ciphertext, length is 16, and character is 0~9 and A~F, then assert that the ciphertext is decrypted by MD5x16 Algorithm for encryption algorithm for encryption, deciphering module choose MD5x16 decipherment algorithms;
If II yard of the ASC of ciphertext, length is 32, and character is 0~9 and A~F, then assert that the ciphertext is encrypted by MD5x32 Algorithm for encryption, deciphering module choose MD5x32 decipherment algorithms.
6. novel encipher-decipher method according to claim 5, it is characterised in that the invocation step C described in step D was selected Ciphertext is decrypted in deciphering module, is specially decrypted using following steps:
(1) deciphering module chosen according to step C, is checked and is screened to ciphertext content;
(2) ciphertext obtained to step (1) is decrypted using the step C deciphering modules chosen;
(3) if ciphertext can not be decrypted in selected deciphering module, directly original cipher text is returned, and prompt user can not Determine that the ciphertext encodes.
7. a kind of device for realizing the novel encipher-decipher method described in one of claim 1~6 including input module, adds Close module, deciphering module and display module;The text that input module needs to encrypt or decrypt for input;Encrypting module is used for will The text inputted from input module is encrypted, and deciphering module shows for the text inputted from input module to be decrypted Module is used to encrypt or the text of decryption is shown and exported.
CN201810049121.3A 2018-01-18 2018-01-18 Novel coding and decoding method and device thereof Active CN108134799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810049121.3A CN108134799B (en) 2018-01-18 2018-01-18 Novel coding and decoding method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810049121.3A CN108134799B (en) 2018-01-18 2018-01-18 Novel coding and decoding method and device thereof

Publications (2)

Publication Number Publication Date
CN108134799A true CN108134799A (en) 2018-06-08
CN108134799B CN108134799B (en) 2021-06-22

Family

ID=62399817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810049121.3A Active CN108134799B (en) 2018-01-18 2018-01-18 Novel coding and decoding method and device thereof

Country Status (1)

Country Link
CN (1) CN108134799B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818969A (en) * 2019-03-06 2019-05-28 电子科技大学成都学院 Cryptographic algorithm encrypting and deciphering system
CN110287147A (en) * 2019-06-27 2019-09-27 北京奇艺世纪科技有限公司 A kind of character string sorting method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626293A (en) * 2008-07-09 2010-01-13 上海格尔软件股份有限公司 Method for encryption protection and decryption of data
US20140208099A1 (en) * 2013-01-21 2014-07-24 Alcatel-Lucent Canada Inc. Service plane encryption in ip/mpls networks
CN105553934A (en) * 2015-12-01 2016-05-04 辽宁中科信科技有限公司 EAB universal coding and decoding method on the basis of cloud platform SAAS layer
CN106357608A (en) * 2016-08-19 2017-01-25 银江股份有限公司 Method for encrypting and decrypting private data for personal healthcare data
CN106385313A (en) * 2016-09-08 2017-02-08 四川长虹电器股份有限公司 Random cryptograph system based on grouping encryption algorithm and realization method thereof
CN106789053A (en) * 2016-12-13 2017-05-31 四川长虹电器股份有限公司 Random ciphertext generation method and system, decryption method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626293A (en) * 2008-07-09 2010-01-13 上海格尔软件股份有限公司 Method for encryption protection and decryption of data
US20140208099A1 (en) * 2013-01-21 2014-07-24 Alcatel-Lucent Canada Inc. Service plane encryption in ip/mpls networks
CN105553934A (en) * 2015-12-01 2016-05-04 辽宁中科信科技有限公司 EAB universal coding and decoding method on the basis of cloud platform SAAS layer
CN106357608A (en) * 2016-08-19 2017-01-25 银江股份有限公司 Method for encrypting and decrypting private data for personal healthcare data
CN106385313A (en) * 2016-09-08 2017-02-08 四川长虹电器股份有限公司 Random cryptograph system based on grouping encryption algorithm and realization method thereof
CN106789053A (en) * 2016-12-13 2017-05-31 四川长虹电器股份有限公司 Random ciphertext generation method and system, decryption method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109818969A (en) * 2019-03-06 2019-05-28 电子科技大学成都学院 Cryptographic algorithm encrypting and deciphering system
CN110287147A (en) * 2019-06-27 2019-09-27 北京奇艺世纪科技有限公司 A kind of character string sorting method and device

Also Published As

Publication number Publication date
CN108134799B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN100536393C (en) Secret shared key mechanism based user management method
CN103812854B (en) Identity authentication system, device and method and identity authentication requesting device
CN101043326B (en) Dynamic information encrypting system and method
US20120134495A1 (en) Cloud Storage Data Access Method, Apparatus and System Based on OTP
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN101777158B (en) Method and system for secure transaction
CN108123794A (en) The generation method and encryption method of whitepack key, apparatus and system
CN106712946A (en) Data secure transmission method
CN110474908A (en) Transaction monitoring and managing method and device, storage medium and computer equipment
CN109543434A (en) Block chain information encryption method, decryption method, storage method and device
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN113411328B (en) Efficient transmission system based on data pre-identification sensitive data
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN103414552B (en) One utilizes binary tree traversal mode to be encrypted, decryption method and device
Nyarko-Boateng et al. Implementation of advanced encryption standard algorithm with key length of 256 bits for preventing data loss in an organization
CN108134799A (en) Novel encipher-decipher method and its device
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN104301102B (en) Widget communication means, apparatus and system
CN108650277A (en) A kind of data encryption and transmission method
CN107493287A (en) Industry control network data security system
CN103634313B (en) Address list processing method and device, as well as mobile terminal
CN109726583A (en) Cloud data base encryption server system
CN108701195B (en) Data security protection method and device
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant