CN108337233B - Method for encrypting content information, electronic equipment and storage medium - Google Patents

Method for encrypting content information, electronic equipment and storage medium Download PDF

Info

Publication number
CN108337233B
CN108337233B CN201711437747.3A CN201711437747A CN108337233B CN 108337233 B CN108337233 B CN 108337233B CN 201711437747 A CN201711437747 A CN 201711437747A CN 108337233 B CN108337233 B CN 108337233B
Authority
CN
China
Prior art keywords
content information
information
encrypted data
encrypting
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711437747.3A
Other languages
Chinese (zh)
Other versions
CN108337233A (en
Inventor
易朝刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Chenyi Info Technology Co ltd
Original Assignee
Guangdong Chenyi Info Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Chenyi Info Technology Co ltd filed Critical Guangdong Chenyi Info Technology Co ltd
Priority to CN201711437747.3A priority Critical patent/CN108337233B/en
Publication of CN108337233A publication Critical patent/CN108337233A/en
Application granted granted Critical
Publication of CN108337233B publication Critical patent/CN108337233B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention discloses a method for encrypting content information, which comprises the following steps: a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information; an encryption step: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal. The invention also provides an electronic device, a computer readable storage medium and a method for decrypting content information. The method for encrypting and decrypting the content information provided by the invention encrypts the obtained content to obtain corresponding encrypted data, and then decrypts the encrypted data to finish the decryption of the password.

Description

Method for encrypting content information, electronic equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for encrypting content information, an electronic device, and a storage medium.
Background
At present, with the rapid development of information technology, communication becomes one of the main means for people to communicate information on a daily basis. Since the communication depends on a widely distributed network, the method provides a way for illegal interception and modification of information. Meanwhile, due to the prevalence of trojans and viruses or the loss of electronic equipment, huge potential safety hazards exist in data and privacy of enterprises and individuals. And also provides opportunities for criminal acts such as fraud.
And whether the cipher text is easy to identify in the daily encryption process, when the messy code appears, the cipher text can be identified through the machine with high probability, so that the mode is easy to attract attention and is easy to crack.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for encrypting content information, which can solve the technical problem of information encryption.
Another object of the present invention is to provide an electronic device, which can solve the technical problem of information encryption.
It is a further object of the present invention to provide a computer-readable storage medium that solves the technical problem of information encryption.
It is a fourth object of the present invention to provide a method for decrypting content information, which can solve the technical problem of information encryption.
It is a fifth objective of the present invention to provide a computer-readable storage medium, which can solve the technical problem of information encryption.
One of the purposes of the invention is realized by adopting the following technical scheme:
a method of encrypting content information, comprising the steps of:
a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information;
an encryption step: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal.
Further, the content information is text information, and the encrypted data is a numeric character string.
Further, the starting character and the ending character of the numeric character string are both 1, and the numeric characters between the starting character and the ending character are other numeric characters except 1.
Further, the content information is picture information, and the encrypted data is picture encrypted data.
Furthermore, blank areas are arranged on the left side and the right side of the picture encryption data.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of encrypting content information according to any one of the objects of the invention when executing the program.
The third purpose of the invention is realized by adopting the following technical scheme:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of the objects of the invention.
The fourth purpose of the invention is realized by adopting the following technical scheme:
a method of decrypting content information, comprising the steps of:
a receiving step: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data, and the encrypted data is digital encrypted data and picture encrypted data;
a judging step: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step;
and (3) decryption: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
Further, the encrypted data includes part of the content information and the encrypted data.
The fifth purpose of the invention is realized by adopting the following technical scheme:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of the four objects of the invention.
Compared with the prior art, the invention has the beneficial effects that:
the method for encrypting and decrypting the central information provided by the invention encrypts the obtained content to obtain corresponding encrypted data, and then decrypts the encrypted data to finish the decryption of the password.
Drawings
FIG. 1 is a flow chart of a method of encrypting content information in accordance with the present invention;
fig. 2 is a flow chart of a method of decrypting content information in accordance with the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
The first embodiment is as follows:
as shown in fig. 1, the present embodiment provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the program, the method for encrypting content information as described below is implemented, and specifically includes the following sub-steps:
s101: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information; the setting of the credit granting secret key is flexible, and the credit granting code with any length can be set according to the protection level;
s102: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal. The above steps are mainly used for encrypting specific data, and the following conditions are mainly adopted in the encryption process: 1. the content information to be encrypted is literal content information; 2. the content to be encrypted is picture content information; 3. the content to be encrypted is a mixture of text content information and picture content information.
When encrypting the first case, usually a numeric string is obtained, which has corresponding start and end characters, and when designing, the start and end characters are designed as the same number, and the number does not appear in the intermediate content information, such as: the initial character and the terminal character of the numeric character string are both 1, and the numeric characters between the initial character and the terminal character are other characters except 1.
When the second case is encrypted, picture encrypted data is obtained in general, and the picture encrypted data is generally composed of different color blocks, and most preferably, blank areas are arranged on the left side and the right side of the picture encrypted data. The purpose of setting the blank area is to make the areas on both sides look different from the ordinary picture, so that the user who knows the encryption mode can conveniently know whether the picture is the real picture or the encrypted data.
When encryption is performed for the third case, the result is a combination of the first and second cases. So that the encryption method of the embodiment can be more generally applicable.
In the method for encrypting the content, the encrypted ciphertext consists of 0-9 digits, so that mixed transmission of the plaintext and the ciphertext can be realized, usually, the encrypted data cannot be directly read, a corresponding secret key must be input to be decrypted, or a string of scrambled data cannot be obtained, under the condition that the encrypted data is transmitted through the encrypted data, the encrypted data is easily known by the outside, and the encrypted data cannot be distinguished by the outside usually by converting the encrypted data into a digital character string, so that the security of the data is ensured to a certain extent; in addition, the method for encrypting content in this embodiment introduces a time variable, so that the obtained encrypted data may also be different with time change, for example, a data string obtained when "hello" is encrypted for the first time is "10256305575257632257633246325542001", but a string obtained when data is encrypted for the second time is: 102563055752576322576369875345565455781, which obtains different character strings to make the password more difficult to decode, further ensuring the data security.
The working principle of the embodiment is as follows:
in this embodiment, in the process of chatting over WeChat, when a user needs to encrypt corresponding content, the user needs to select the content information first and place the content information in software storing the method of this embodiment, so that an encrypted picture and a string of encrypted characters can be obtained. Such as: "you are just! Communication protection system! "characters and pictures
Figure BDA0001526118550000051
The following is the result after the treatment.
155032755622755092755897558092755892475589975586207558420755822375589227558927558622755839755842975589375583227558622755862075582247558696755859755822275583975589237558620755842071
Figure BDA0001526118550000052
The part of the content can be transmitted to another user, so that the encryption of information is completed, the encrypted data can effectively prevent illegal monitoring and protect the communication content. In the method for encrypting the content information of the embodiment, the form of encryption is not added, but a ciphertext and plaintext conversion mode is adopted, and in this case, the encryption stage is not passed in the process of communicating information, so that the information is not easily identified by a listener. When information is transmitted, encrypted data and contents to be transmitted can be mixed, so that the whole information transmission process has a local encryption function.
Example two
The second embodiment discloses a readable computer storage medium, which is used for storing a program, and when the program is executed by a processor, the method for encrypting the content information of the first embodiment is realized.
Example three:
as shown in fig. 2, the present embodiment provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the program, the method for decrypting content information as described below is implemented, and specifically includes the following sub-steps:
s201: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data, and the encrypted data is digital encrypted data and picture encrypted data; a second terminal which, when receiving the encrypted information, is likely to be a string of character strings or picture encrypted data, or is also likely to be a combination of information content and character strings;
s202: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step; the method mainly aims to prevent the password from being decoded by other users except software, so that the content can be transmitted and decoded only in a specific crowd;
s203: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
The working principle of the embodiment is as follows:
when receiving the encrypted data provided by the content according to embodiment one, and the first trust key and the second trust key are the same, the combination of the character string and the picture can be directly added to translate into "good you! Communication protection system!
Figure BDA0001526118550000061
". The decryption method of the present embodiment may interpret the combination of the content information and the encrypted data, such as when "hello 102562256365332555236443263231" is received, it may automatically identify whether it is the content information or the encrypted data, decrypt it memorialically when the identified encrypted data is identified, and do not operate on it when the textual content information is identified.
The first terminal described in the first embodiment and the second terminal described in the third embodiment may be the same device, for example, when the user encrypts the data content in the word file on his or her own computer, he or she saves the word content on the computer, so as to prevent someone from stealing the data, and when he or she needs to read the content, he or she can directly decrypt and read the encrypted data.
Example four
The fourth embodiment discloses a readable computer storage medium, which is used for storing a program, and when the program is executed by a processor, the method for decrypting content information of the third embodiment is realized.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (6)

1. A method of encrypting content information, comprising the steps of:
a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information;
an encryption step: encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal; when the content information is character information, the encrypted data is converted into a digital character string, and a time variable is introduced in the encryption process; the initial character and the terminal character of the numeric character string are both 1, and the numeric characters between the initial character and the terminal character are other numeric characters except 1.
2. The method of encrypting content information according to claim 1, wherein the content information is picture information, and the encrypted data is picture encrypted data.
3. The method of encrypting content information according to claim 2, wherein the picture encryption data is provided with blank areas on both left and right sides.
4. The method of encrypting content information according to claim 1, further comprising the steps of:
a receiving step: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data and content information in the encryption step;
a judging step: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step;
and (3) decryption: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
5. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of encrypting content information of any one of claims 1-4 when executing the program.
6. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program, when executed by a processor, implements the method of any one of claims 1-4.
CN201711437747.3A 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium Active CN108337233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711437747.3A CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711437747.3A CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108337233A CN108337233A (en) 2018-07-27
CN108337233B true CN108337233B (en) 2021-07-23

Family

ID=62923280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711437747.3A Active CN108337233B (en) 2017-12-26 2017-12-26 Method for encrypting content information, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108337233B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN114553549B (en) * 2022-02-24 2024-01-02 江苏商贸职业学院 Data encryption method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107360139A (en) * 2017-06-19 2017-11-17 努比亚技术有限公司 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080109889A1 (en) * 2003-07-01 2008-05-08 Andrew Bartels Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107360139A (en) * 2017-06-19 2017-11-17 努比亚技术有限公司 A kind of mobile terminal, data ciphering method and computer-readable recording medium

Also Published As

Publication number Publication date
CN108337233A (en) 2018-07-27

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN104244237B (en) Data sending, receiving method and reception send terminal and data transmitter-receiver set
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN103036674B (en) Computer permission control method based on mobile dynamic password
CN100566337C (en) Strengthen the method for wireless LAN safety
KR20050007830A (en) Method for Domain Authentication for exchanging contents between devices
CN102572750A (en) Method and terminal for protecting short messages
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
KR101358375B1 (en) Prevention security system and method for smishing
CN106797381B (en) Communication adapter for user authentication
CN105391677A (en) Information transmission method and mobile terminal
US10699021B2 (en) Method and a device for secure storage of at least one element of digital information, and system comprising such device
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
CN112995204A (en) Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
CN107135074B (en) Advanced security method and device
CN102833243A (en) Communication system making use of fingerprint information and application of communication system
KR102053993B1 (en) Method for Authenticating by using Certificate
US20150100777A1 (en) Secure Federated Identity Service
CN111541652B (en) System for improving security of secret information keeping and transmission
US20020001388A1 (en) High speed copy protection method
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
CN113507468A (en) Encryption method, decryption method and authorization method based on block chain technology
JP4034946B2 (en) COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM
KR101271464B1 (en) Method for coding private key in dual certificate system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant