CN108337233A - It is a kind of to the encrypted method of content information, electronic equipment and storage medium - Google Patents

It is a kind of to the encrypted method of content information, electronic equipment and storage medium Download PDF

Info

Publication number
CN108337233A
CN108337233A CN201711437747.3A CN201711437747A CN108337233A CN 108337233 A CN108337233 A CN 108337233A CN 201711437747 A CN201711437747 A CN 201711437747A CN 108337233 A CN108337233 A CN 108337233A
Authority
CN
China
Prior art keywords
content information
information
data
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711437747.3A
Other languages
Chinese (zh)
Other versions
CN108337233B (en
Inventor
易朝刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Chen Yi Mdt Infotech Ltd
Original Assignee
Guangdong Chen Yi Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Chen Yi Mdt Infotech Ltd filed Critical Guangdong Chen Yi Mdt Infotech Ltd
Priority to CN201711437747.3A priority Critical patent/CN108337233B/en
Publication of CN108337233A publication Critical patent/CN108337233A/en
Application granted granted Critical
Publication of CN108337233B publication Critical patent/CN108337233B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of to the encrypted method of content information, includes the following steps:Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is the combination of text information either pictorial information or text information and pictorial information;Encrypting step:The content information received is encrypted to obtain encryption data, and encryption data is back to first terminal.The present invention also provides a kind of electronic equipment, computer readable storage medium and the methods decrypted to content information.Then the method that decryption is encrypted to content information of the present invention is again decrypted encryption data to complete the interpretation of password by the content got being encrypted so that it obtains corresponding encryption data.

Description

It is a kind of to the encrypted method of content information, electronic equipment and storage medium
Technical field
The present invention relates to a kind of fields of communication technology more particularly to a kind of to the encrypted method of content information, electronic equipment And storage medium.
Background technology
Currently, with the rapid development of information technology, communication becomes one of the main means of the daily information communication of people.By Widely distributed network is depended in communication, this provides approach to illegal retention, the modification of information.Meanwhile wooden horse and virus Prevalence or electronic equipment loss so that data, the privacy of enterprises and individuals deposits huge security risk.Also it is swindle etc. Criminal offence provides chance.
And in daily ciphering process, if be easier identification for ciphertext, when there is mess code, lead to It is one section of encrypted word to cross machine maximum probability and can recognize this, so this mode is also more prone to arouse attention and be broken Solution.
Invention content
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of encrypted to content information Method can solve the technical issues of information is encrypted.
The technical issues of second object of the present invention is to provide a kind of electronic equipment, can solve information encryption.
The third object of the present invention is to provide a kind of computer readable storage medium, can solve the encrypted technology of information Problem.
The fourth object of the present invention is to provide a kind of method for decrypting content information, can solve the encrypted skill of information Art problem.
The fifth object of the present invention is to provide a kind of computer readable storage medium, can solve the encrypted technology of information Problem.
An object of the present invention adopts the following technical scheme that realization:
It is a kind of to the encrypted method of content information, include the following steps:
Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is text The combination of word information either pictorial information or text information and pictorial information;
Encrypting step:To the content information received be encrypted with encryption data, and encryption data is back to the One terminal.
Further, the content information is text information, and the encryption data is digit strings.
Further, the bebinning character and final character of the digit strings are 1, bebinning character and final character it Between numerical character be other numerical characters in addition to 1.
Further, the content information is pictorial information, and the encryption data is image ciphering data.
Further, it is both provided with white space at left and right sides of the image ciphering data.
The second object of the present invention adopts the following technical scheme that realization:
A kind of electronic equipment, including memory, processor and storage can be run on a memory and on a processor Computer program, the processor realize believing content described in any one of one of the object of the invention when executing described program The method of encryption for information.
The third object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The method as described in any one of one of the object of the invention is realized when row.
The fourth object of the present invention adopts the following technical scheme that realization:
A method of content information is decrypted, is included the following steps:
Receiving step:The credit key that receiving encryption key data and second terminal are sent, the encryption information data Including encryption data, the encryption data is digital encryption data and image ciphering data;
Judgment step:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step Suddenly;
Decryption step:To the encryption information data of reception be decrypted with corresponding content information, and by the content Information is back to second terminal.
Further, the encryption data includes partial content information and encryption data.
The fifth object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The method as described in any one of four of the object of the invention is realized when row.
Compared with prior art, the beneficial effects of the present invention are:
The method that decryption is encrypted to heart information of the present invention, by the way that the content got is encrypted so that It obtains it and obtains corresponding encryption data, then encryption data is decrypted again to complete the interpretation of password.
Description of the drawings
Fig. 1 is the flow chart to the encrypted method of content information of the present invention;
Fig. 2 is the flow chart of the method to content information decryption of the present invention.
Specific implementation mode
In the following, in conjunction with attached drawing and specific implementation mode, the present invention is described further, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Embodiment one:
As shown in Figure 1, present embodiments provide a kind of electronic equipment, including memory, processor and it is stored in storage On device and the computer program that can run on a processor, the processor is realized as described below internal when executing described program Hold the encrypted method of information, specifically includes following sub-step:
S101:Content information and the first credit key that first terminal is sent are received, the content information is believed for word Cease the combination of either pictorial information or text information and pictorial information;The setting of the credit key is flexible, he can be with The credit code of random length is set according to protection class;
S102:The content information received is encrypted to obtain encryption data, and encryption data is back to first eventually End.Above-mentioned steps are mainly the following situation primarily to specific data are encrypted during encrypted:1, it needs It is word content information to want encrypted content information;2, it is picture content information to need encrypted content;3, it needs to encrypt Content be that word content information is mixed with picture content information.
When the first situation is encrypted, what is obtained under normal conditions is digit strings, this numerical character String is that have corresponding bebinning character and final character, and when being designed, bebinning character and final character are designed as The same number, and this number does not occur in intermediate content information, such as:The bebinning character of the digit strings It is 1 with final character, the numerical character between bebinning character and final character is other characters in addition to 1.
When the second situation is encrypted, what is obtained under normal conditions is image ciphering data, this picture adds Ciphertext data is usually made of each different color block, most preferably, being both provided at left and right sides of the image ciphering data White space.The purpose that white space is set be in order to allow the region of both sides to seem to seem different from usual picture, this Sample, which can easily allow, knows that the user of this cipher mode knows that this is real picture or the data that were encrypted.
When the third situation is encrypted, it is obtaining the result is that the first and the second situation combination.Make The cipher mode for obtaining the present embodiment can have more common of be applicable in.
The method that content is encrypted of the present embodiment, encrypted ciphertext are made of the number of 0-9, then it can be with Realize that the mixing with ciphertext is transmitted in plain text, it is generally the case that by encrypted data otherwise it is exactly to directly read out, it must Corresponding key, which need be inputted, can just unlock, otherwise be exactly to obtain the data of a string of mess codes, under such circumstances, it is easy to outer Boundary knows it is to be transmitted by encrypted data, and the present embodiment by encryption data then by being converted to numerical character at this time String, the then so that external world can not usually distinguish that these are to add encrypted data, to ensure that the peace of data to a certain extent Quan Xing;And the method that content is encrypted of the present embodiment, which passes through, introduces time variable so that in the change with the time, Obtained encryption data also has a difference, for example the data character string that " hello " is encrypted for the first time when obtains is " 10256305575257632257633246325542001 ", but carry out the word obtained when data encryption at second Symbol is gone here and there:" 102563055752576322576369875345565455781 ", what is obtained is different character string to make The difficulty that must be broken a code increases, and is further ensured that the safety of data.
The operation principle of the present embodiment:
In the present embodiment, in wechat chat process, when user needs that corresponding content is encrypted, It needs first choice to choose the content information, and the content information is positioned in the software for the method for being stored with the present embodiment, to It can obtain passing through encrypted character by encrypted picture and a string.Such as:" you are good!Communications protection system!" word And pictureBecome following content after processing.
15503275562275509275589755809275589247558997558620755842075582237558922755892 75586227558397558429755893755832275586227558620755822475586967558597558222755 83975589237558620755842071This partial content can be transmitted to another user, to complete information Encryption, these encryption datas can effectively prevent from illegally monitoring, and protect the content of communication.The present embodiment to content information into The encrypted method of row, the encrypted form of not instead of shell adding used, in such a way that ciphertext is converted with plaintext, such case Under, not in communication information process by encrypting stage so that its be not easy listened person pick out come.Also carrying out When information is sent, encryption data can be added to carry out the mode of mixing with the content for needing to send, so that entirely believing Has the function of local cypher during breath transmission.
Embodiment two
Embodiment two discloses a kind of readable computer storage media, which is somebody's turn to do for storing program When program is executed by processor, realize embodiment one to the encrypted method of content information.
Embodiment three:
As shown in Fig. 2, present embodiments provide a kind of electronic equipment, including memory, processor and it is stored in storage On device and the computer program that can run on a processor, the processor is realized as described below internal when executing described program The method for holding information decryption, specifically includes following sub-step:
S201:The credit key that receiving encryption key data and second terminal are sent, the encryption information data include Encryption data, the encryption data are digital encryption data and image ciphering data;Second terminal, when the encryption information received When, at this time its be likely to be a string of character strings either image ciphering data or it is also possible that the information content with The combination of character string;
S202:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step;It is main If using the decoding for being carried out password by the other users except software in order to prevent, so that the transmission of content and deciphering It can be understood in specific crowd;
S203:To the encryption information data of reception be decrypted with corresponding content information, and by the content information It is back to second terminal.
The operation principle of the present embodiment:
When the encryption data provided such as the content of embodiment one received, and the first credit key and Two credit keys are also identical, when being decrypted, can directly add and state character string and the combination of picture is translated as " you It is good!Communications protection system!”.The decryption method of the present embodiment can understand the combination of content information and encryption data, such as Can be content letter with automatic identification when " hello 102562256365332555236443263231 " received Breath or encryption data, when its memory is decrypted in the identification for being the encryption data recognized, when recognizing word content information When do not operate on it.
The second terminal described in first terminal and embodiment three described in embodiment one, can be same set sometimes It is standby, for example, when it is when user is encrypted the data content in word document on the computer of oneself, and should Word contents are stored on the computer, its purpose is to prevent others from stealing data, when it needs to read the content, It can directly can be read from this by encryption data decryption.
Example IV
Example IV discloses a kind of readable computer storage media, which is somebody's turn to do for storing program When program is executed by processor, the method to content information decryption of embodiment three is realized.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto, The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention Claimed range.

Claims (10)

1. a kind of to the encrypted method of content information, which is characterized in that include the following steps:
Receiving step:Content information and the first credit key that first terminal is sent are received, the content information is believed for word Cease the combination of either pictorial information or text information and pictorial information;
Encrypting step:The content information received is encrypted to obtain encryption data, and encryption data is back to first eventually End.
2. as described in claim 1 to the encrypted method of content information, which is characterized in that the content information is believed for word Breath, the encryption data are digit strings.
3. as claimed in claim 2 to the encrypted method of content information, which is characterized in that the banner word of the digit strings Symbol and final character are 1, and the numerical character between bebinning character and final character is other numerical characters in addition to 1.
4. as described in claim 1 to the encrypted method of content information, which is characterized in that the content information is believed for picture Breath, the encryption data are image ciphering data.
5. as claimed in claim 4 to the encrypted method of content information, which is characterized in that described image ciphering data or so two Side is both provided with white space.
6. a kind of electronic equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, which is characterized in that the processor realizes pair described in any one of claim 1-5 when executing described program The encrypted method of content information.
7. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program quilt The method as described in claim 1-5 any one is realized when processor executes.
8. a kind of method to content information decryption, which is characterized in that include the following steps:
Receiving step:The credit key that receiving encryption key data and second terminal are sent, the encryption information data include Encryption data;
Judgment step:Judge whether the second credit key and the first credit key are consistent, if it is, executing decryption step;
Decryption step:The encryption information data of reception are decrypted to obtain corresponding content information, and the content is believed Breath is back to second terminal.
9. as claimed in claim 8 to the method for content information decryption, which is characterized in that the encryption information data further include Content information.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that:The computer program Method as claimed in claim 8 or 9 is realized when being executed by processor.
CN201711437747.3A 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium Active CN108337233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711437747.3A CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711437747.3A CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108337233A true CN108337233A (en) 2018-07-27
CN108337233B CN108337233B (en) 2021-07-23

Family

ID=62923280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711437747.3A Active CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108337233B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN114553549A (en) * 2022-02-24 2022-05-27 江苏商贸职业学院 Data encryption method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
US20080109889A1 (en) * 2003-07-01 2008-05-08 Andrew Bartels Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107360139A (en) * 2017-06-19 2017-11-17 努比亚技术有限公司 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080109889A1 (en) * 2003-07-01 2008-05-08 Andrew Bartels Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107360139A (en) * 2017-06-19 2017-11-17 努比亚技术有限公司 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN114553549A (en) * 2022-02-24 2022-05-27 江苏商贸职业学院 Data encryption method and system
CN114553549B (en) * 2022-02-24 2024-01-02 江苏商贸职业学院 Data encryption method and system

Also Published As

Publication number Publication date
CN108337233B (en) 2021-07-23

Similar Documents

Publication Publication Date Title
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
WO2013176491A1 (en) Method for authenticating web service user
EP3185466B1 (en) Encrypted communications method and communications terminal, and computer storage medium
CN103378971B (en) A kind of data encryption system and method
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN112287372A (en) Method and apparatus for protecting clipboard privacy
Pande Introduction to cyber security
CN107210915A (en) It is mutually authenticated
Yin et al. Protecting private data by honey encryption
CN115795538B (en) Anti-desensitization method, device, computer equipment and storage medium for desensitizing document
CN107666395A (en) One population file management method, user terminal, group chat system
CN102572750A (en) Method and terminal for protecting short messages
KR101358375B1 (en) Prevention security system and method for smishing
CN108337233A (en) It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN108206738A (en) A kind of quantum key output method and system
CN107124407B (en) Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system
Sheshasaayee et al. A framework to enhance security for otp sms in e-banking environment using cryptography and text steganography
Rahnama et al. Securing RFID-based authentication systems using ParseKey+
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
US9203607B2 (en) Keyless challenge and response system
CN110247878A (en) A kind of data transfer encryption method
CN111541652B (en) System for improving security of secret information keeping and transmission
CN108696355A (en) A kind of method and system for preventing user's head portrait from usurping
Thitme et al. A recent study of various encryption and decryption techniques
Asole et al. A survey on securing databases from unauthorized users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant