CN108337233A - It is a kind of to the encrypted method of content information, electronic equipment and storage medium - Google Patents
It is a kind of to the encrypted method of content information, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN108337233A CN108337233A CN201711437747.3A CN201711437747A CN108337233A CN 108337233 A CN108337233 A CN 108337233A CN 201711437747 A CN201711437747 A CN 201711437747A CN 108337233 A CN108337233 A CN 108337233A
- Authority
- CN
- China
- Prior art keywords
- content information
- information
- data
- encrypted
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of to the encrypted method of content information, includes the following steps:Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is the combination of text information either pictorial information or text information and pictorial information;Encrypting step:The content information received is encrypted to obtain encryption data, and encryption data is back to first terminal.The present invention also provides a kind of electronic equipment, computer readable storage medium and the methods decrypted to content information.Then the method that decryption is encrypted to content information of the present invention is again decrypted encryption data to complete the interpretation of password by the content got being encrypted so that it obtains corresponding encryption data.
Description
Technical field
The present invention relates to a kind of fields of communication technology more particularly to a kind of to the encrypted method of content information, electronic equipment
And storage medium.
Background technology
Currently, with the rapid development of information technology, communication becomes one of the main means of the daily information communication of people.By
Widely distributed network is depended in communication, this provides approach to illegal retention, the modification of information.Meanwhile wooden horse and virus
Prevalence or electronic equipment loss so that data, the privacy of enterprises and individuals deposits huge security risk.Also it is swindle etc.
Criminal offence provides chance.
And in daily ciphering process, if be easier identification for ciphertext, when there is mess code, lead to
It is one section of encrypted word to cross machine maximum probability and can recognize this, so this mode is also more prone to arouse attention and be broken
Solution.
Invention content
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of encrypted to content information
Method can solve the technical issues of information is encrypted.
The technical issues of second object of the present invention is to provide a kind of electronic equipment, can solve information encryption.
The third object of the present invention is to provide a kind of computer readable storage medium, can solve the encrypted technology of information
Problem.
The fourth object of the present invention is to provide a kind of method for decrypting content information, can solve the encrypted skill of information
Art problem.
The fifth object of the present invention is to provide a kind of computer readable storage medium, can solve the encrypted technology of information
Problem.
An object of the present invention adopts the following technical scheme that realization:
It is a kind of to the encrypted method of content information, include the following steps:
Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is text
The combination of word information either pictorial information or text information and pictorial information;
Encrypting step:To the content information received be encrypted with encryption data, and encryption data is back to the
One terminal.
Further, the content information is text information, and the encryption data is digit strings.
Further, the bebinning character and final character of the digit strings are 1, bebinning character and final character it
Between numerical character be other numerical characters in addition to 1.
Further, the content information is pictorial information, and the encryption data is image ciphering data.
Further, it is both provided with white space at left and right sides of the image ciphering data.
The second object of the present invention adopts the following technical scheme that realization:
A kind of electronic equipment, including memory, processor and storage can be run on a memory and on a processor
Computer program, the processor realize believing content described in any one of one of the object of the invention when executing described program
The method of encryption for information.
The third object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The method as described in any one of one of the object of the invention is realized when row.
The fourth object of the present invention adopts the following technical scheme that realization:
A method of content information is decrypted, is included the following steps:
Receiving step:The credit key that receiving encryption key data and second terminal are sent, the encryption information data
Including encryption data, the encryption data is digital encryption data and image ciphering data;
Judgment step:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step
Suddenly;
Decryption step:To the encryption information data of reception be decrypted with corresponding content information, and by the content
Information is back to second terminal.
Further, the encryption data includes partial content information and encryption data.
The fifth object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The method as described in any one of four of the object of the invention is realized when row.
Compared with prior art, the beneficial effects of the present invention are:
The method that decryption is encrypted to heart information of the present invention, by the way that the content got is encrypted so that
It obtains it and obtains corresponding encryption data, then encryption data is decrypted again to complete the interpretation of password.
Description of the drawings
Fig. 1 is the flow chart to the encrypted method of content information of the present invention;
Fig. 2 is the flow chart of the method to content information decryption of the present invention.
Specific implementation mode
In the following, in conjunction with attached drawing and specific implementation mode, the present invention is described further, it should be noted that not
Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination
Example.
Embodiment one:
As shown in Figure 1, present embodiments provide a kind of electronic equipment, including memory, processor and it is stored in storage
On device and the computer program that can run on a processor, the processor is realized as described below internal when executing described program
Hold the encrypted method of information, specifically includes following sub-step:
S101:Content information and the first credit key that first terminal is sent are received, the content information is believed for word
Cease the combination of either pictorial information or text information and pictorial information;The setting of the credit key is flexible, he can be with
The credit code of random length is set according to protection class;
S102:The content information received is encrypted to obtain encryption data, and encryption data is back to first eventually
End.Above-mentioned steps are mainly the following situation primarily to specific data are encrypted during encrypted:1, it needs
It is word content information to want encrypted content information;2, it is picture content information to need encrypted content;3, it needs to encrypt
Content be that word content information is mixed with picture content information.
When the first situation is encrypted, what is obtained under normal conditions is digit strings, this numerical character
String is that have corresponding bebinning character and final character, and when being designed, bebinning character and final character are designed as
The same number, and this number does not occur in intermediate content information, such as:The bebinning character of the digit strings
It is 1 with final character, the numerical character between bebinning character and final character is other characters in addition to 1.
When the second situation is encrypted, what is obtained under normal conditions is image ciphering data, this picture adds
Ciphertext data is usually made of each different color block, most preferably, being both provided at left and right sides of the image ciphering data
White space.The purpose that white space is set be in order to allow the region of both sides to seem to seem different from usual picture, this
Sample, which can easily allow, knows that the user of this cipher mode knows that this is real picture or the data that were encrypted.
When the third situation is encrypted, it is obtaining the result is that the first and the second situation combination.Make
The cipher mode for obtaining the present embodiment can have more common of be applicable in.
The method that content is encrypted of the present embodiment, encrypted ciphertext are made of the number of 0-9, then it can be with
Realize that the mixing with ciphertext is transmitted in plain text, it is generally the case that by encrypted data otherwise it is exactly to directly read out, it must
Corresponding key, which need be inputted, can just unlock, otherwise be exactly to obtain the data of a string of mess codes, under such circumstances, it is easy to outer
Boundary knows it is to be transmitted by encrypted data, and the present embodiment by encryption data then by being converted to numerical character at this time
String, the then so that external world can not usually distinguish that these are to add encrypted data, to ensure that the peace of data to a certain extent
Quan Xing;And the method that content is encrypted of the present embodiment, which passes through, introduces time variable so that in the change with the time,
Obtained encryption data also has a difference, for example the data character string that " hello " is encrypted for the first time when obtains is
" 10256305575257632257633246325542001 ", but carry out the word obtained when data encryption at second
Symbol is gone here and there:" 102563055752576322576369875345565455781 ", what is obtained is different character string to make
The difficulty that must be broken a code increases, and is further ensured that the safety of data.
The operation principle of the present embodiment:
In the present embodiment, in wechat chat process, when user needs that corresponding content is encrypted,
It needs first choice to choose the content information, and the content information is positioned in the software for the method for being stored with the present embodiment, to
It can obtain passing through encrypted character by encrypted picture and a string.Such as:" you are good!Communications protection system!" word
And pictureBecome following content after processing.
15503275562275509275589755809275589247558997558620755842075582237558922755892
75586227558397558429755893755832275586227558620755822475586967558597558222755
83975589237558620755842071This partial content can be transmitted to another user, to complete information
Encryption, these encryption datas can effectively prevent from illegally monitoring, and protect the content of communication.The present embodiment to content information into
The encrypted method of row, the encrypted form of not instead of shell adding used, in such a way that ciphertext is converted with plaintext, such case
Under, not in communication information process by encrypting stage so that its be not easy listened person pick out come.Also carrying out
When information is sent, encryption data can be added to carry out the mode of mixing with the content for needing to send, so that entirely believing
Has the function of local cypher during breath transmission.
Embodiment two
Embodiment two discloses a kind of readable computer storage media, which is somebody's turn to do for storing program
When program is executed by processor, realize embodiment one to the encrypted method of content information.
Embodiment three:
As shown in Fig. 2, present embodiments provide a kind of electronic equipment, including memory, processor and it is stored in storage
On device and the computer program that can run on a processor, the processor is realized as described below internal when executing described program
The method for holding information decryption, specifically includes following sub-step:
S201:The credit key that receiving encryption key data and second terminal are sent, the encryption information data include
Encryption data, the encryption data are digital encryption data and image ciphering data;Second terminal, when the encryption information received
When, at this time its be likely to be a string of character strings either image ciphering data or it is also possible that the information content with
The combination of character string;
S202:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step;It is main
If using the decoding for being carried out password by the other users except software in order to prevent, so that the transmission of content and deciphering
It can be understood in specific crowd;
S203:To the encryption information data of reception be decrypted with corresponding content information, and by the content information
It is back to second terminal.
The operation principle of the present embodiment:
When the encryption data provided such as the content of embodiment one received, and the first credit key and
Two credit keys are also identical, when being decrypted, can directly add and state character string and the combination of picture is translated as " you
It is good!Communications protection system!”.The decryption method of the present embodiment can understand the combination of content information and encryption data, such as
Can be content letter with automatic identification when " hello 102562256365332555236443263231 " received
Breath or encryption data, when its memory is decrypted in the identification for being the encryption data recognized, when recognizing word content information
When do not operate on it.
The second terminal described in first terminal and embodiment three described in embodiment one, can be same set sometimes
It is standby, for example, when it is when user is encrypted the data content in word document on the computer of oneself, and should
Word contents are stored on the computer, its purpose is to prevent others from stealing data, when it needs to read the content,
It can directly can be read from this by encryption data decryption.
Example IV
Example IV discloses a kind of readable computer storage media, which is somebody's turn to do for storing program
When program is executed by processor, the method to content information decryption of embodiment three is realized.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto,
The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention
Claimed range.
Claims (10)
1. a kind of to the encrypted method of content information, which is characterized in that include the following steps:
Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is believed for word
Cease the combination of either pictorial information or text information and pictorial information;
Encrypting step:The content information received is encrypted to obtain encryption data, and encryption data is back to first eventually
End.
2. as described in claim 1 to the encrypted method of content information, which is characterized in that the content information is believed for word
Breath, the encryption data are digit strings.
3. as claimed in claim 2 to the encrypted method of content information, which is characterized in that the banner word of the digit strings
Symbol and final character are 1, and the numerical character between bebinning character and final character is other numerical characters in addition to 1.
4. as described in claim 1 to the encrypted method of content information, which is characterized in that the content information is believed for picture
Breath, the encryption data are image ciphering data.
5. as claimed in claim 4 to the encrypted method of content information, which is characterized in that described image ciphering data or so two
Side is both provided with white space.
6. a kind of electronic equipment, including memory, processor and storage are on a memory and the meter that can run on a processor
Calculation machine program, which is characterized in that the processor realizes pair described in any one of claim 1-5 when executing described program
The encrypted method of content information.
7. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program quilt
The method as described in claim 1-5 any one is realized when processor executes.
8. a kind of method to content information decryption, which is characterized in that include the following steps:
Receiving step:The credit key that receiving encryption key data and second terminal are sent, the encryption information data include
Encryption data;
Judgment step:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step;
Decryption step:The encryption information data of reception are decrypted to obtain corresponding content information, and the content is believed
Breath is back to second terminal.
9. as claimed in claim 8 to the method for content information decryption, which is characterized in that the encryption information data further include
Content information.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program
Method as claimed in claim 8 or 9 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437747.3A CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437747.3A CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108337233A true CN108337233A (en) | 2018-07-27 |
CN108337233B CN108337233B (en) | 2021-07-23 |
Family
ID=62923280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711437747.3A Active CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108337233B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN114553549A (en) * | 2022-02-24 | 2022-05-27 | 江苏商贸职业学院 | Data encryption method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708160A (en) * | 2005-05-27 | 2005-12-14 | 上海贝豪通讯电子有限公司 | Mobile communication terminal capable of carrying out encrypting to user information and method thereof |
US20080109889A1 (en) * | 2003-07-01 | 2008-05-08 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
CN102055582A (en) * | 2009-11-06 | 2011-05-11 | Vega格里沙贝两合公司 | Data processing device for field device |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN106411719A (en) * | 2016-11-22 | 2017-02-15 | 北京奇虎科技有限公司 | Method for processing instant messages and equipment thereof |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
-
2017
- 2017-12-26 CN CN201711437747.3A patent/CN108337233B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080109889A1 (en) * | 2003-07-01 | 2008-05-08 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
CN1708160A (en) * | 2005-05-27 | 2005-12-14 | 上海贝豪通讯电子有限公司 | Mobile communication terminal capable of carrying out encrypting to user information and method thereof |
CN102055582A (en) * | 2009-11-06 | 2011-05-11 | Vega格里沙贝两合公司 | Data processing device for field device |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN106411719A (en) * | 2016-11-22 | 2017-02-15 | 北京奇虎科技有限公司 | Method for processing instant messages and equipment thereof |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN114553549A (en) * | 2022-02-24 | 2022-05-27 | 江苏商贸职业学院 | Data encryption method and system |
CN114553549B (en) * | 2022-02-24 | 2024-01-02 | 江苏商贸职业学院 | Data encryption method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108337233B (en) | 2021-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahvanooey et al. | AITSteg: An innovative text steganography technique for hidden transmission of text message via social media | |
WO2013176491A1 (en) | Method for authenticating web service user | |
EP3185466B1 (en) | Encrypted communications method and communications terminal, and computer storage medium | |
CN103378971B (en) | A kind of data encryption system and method | |
CN109150903A (en) | A kind of account management method, device, storage medium and terminal device | |
CN112287372A (en) | Method and apparatus for protecting clipboard privacy | |
Pande | Introduction to cyber security | |
CN107210915A (en) | It is mutually authenticated | |
Yin et al. | Protecting private data by honey encryption | |
CN115795538B (en) | Anti-desensitization method, device, computer equipment and storage medium for desensitizing document | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN102572750A (en) | Method and terminal for protecting short messages | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN108337233A (en) | It is a kind of to the encrypted method of content information, electronic equipment and storage medium | |
CN108206738A (en) | A kind of quantum key output method and system | |
CN107124407B (en) | Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system | |
Sheshasaayee et al. | A framework to enhance security for otp sms in e-banking environment using cryptography and text steganography | |
Rahnama et al. | Securing RFID-based authentication systems using ParseKey+ | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
US9203607B2 (en) | Keyless challenge and response system | |
CN110247878A (en) | A kind of data transfer encryption method | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN108696355A (en) | A kind of method and system for preventing user's head portrait from usurping | |
Thitme et al. | A recent study of various encryption and decryption techniques | |
Asole et al. | A survey on securing databases from unauthorized users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |