CN108337233B - Method for encrypting content information, electronic equipment and storage medium - Google Patents
Method for encrypting content information, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN108337233B CN108337233B CN201711437747.3A CN201711437747A CN108337233B CN 108337233 B CN108337233 B CN 108337233B CN 201711437747 A CN201711437747 A CN 201711437747A CN 108337233 B CN108337233 B CN 108337233B
- Authority
- CN
- China
- Prior art keywords
- content information
- information
- encrypted data
- encrypting
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Abstract
The invention discloses a method for encrypting content information, which comprises the following steps: a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information; an encryption step: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal. The invention also provides an electronic device, a computer readable storage medium and a method for decrypting content information. The method for encrypting and decrypting the content information provided by the invention encrypts the obtained content to obtain corresponding encrypted data, and then decrypts the encrypted data to finish the decryption of the password.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for encrypting content information, an electronic device, and a storage medium.
Background
At present, with the rapid development of information technology, communication becomes one of the main means for people to communicate information on a daily basis. Since the communication depends on a widely distributed network, the method provides a way for illegal interception and modification of information. Meanwhile, due to the prevalence of trojans and viruses or the loss of electronic equipment, huge potential safety hazards exist in data and privacy of enterprises and individuals. And also provides opportunities for criminal acts such as fraud.
And whether the cipher text is easy to identify in the daily encryption process, when the messy code appears, the cipher text can be identified through the machine with high probability, so that the mode is easy to attract attention and is easy to crack.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for encrypting content information, which can solve the technical problem of information encryption.
Another object of the present invention is to provide an electronic device, which can solve the technical problem of information encryption.
It is a further object of the present invention to provide a computer-readable storage medium that solves the technical problem of information encryption.
It is a fourth object of the present invention to provide a method for decrypting content information, which can solve the technical problem of information encryption.
It is a fifth objective of the present invention to provide a computer-readable storage medium, which can solve the technical problem of information encryption.
One of the purposes of the invention is realized by adopting the following technical scheme:
a method of encrypting content information, comprising the steps of:
a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information;
an encryption step: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal.
Further, the content information is text information, and the encrypted data is a numeric character string.
Further, the starting character and the ending character of the numeric character string are both 1, and the numeric characters between the starting character and the ending character are other numeric characters except 1.
Further, the content information is picture information, and the encrypted data is picture encrypted data.
Furthermore, blank areas are arranged on the left side and the right side of the picture encryption data.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of encrypting content information according to any one of the objects of the invention when executing the program.
The third purpose of the invention is realized by adopting the following technical scheme:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of the objects of the invention.
The fourth purpose of the invention is realized by adopting the following technical scheme:
a method of decrypting content information, comprising the steps of:
a receiving step: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data, and the encrypted data is digital encrypted data and picture encrypted data;
a judging step: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step;
and (3) decryption: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
Further, the encrypted data includes part of the content information and the encrypted data.
The fifth purpose of the invention is realized by adopting the following technical scheme:
a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of the four objects of the invention.
Compared with the prior art, the invention has the beneficial effects that:
the method for encrypting and decrypting the central information provided by the invention encrypts the obtained content to obtain corresponding encrypted data, and then decrypts the encrypted data to finish the decryption of the password.
Drawings
FIG. 1 is a flow chart of a method of encrypting content information in accordance with the present invention;
fig. 2 is a flow chart of a method of decrypting content information in accordance with the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
The first embodiment is as follows:
as shown in fig. 1, the present embodiment provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the program, the method for encrypting content information as described below is implemented, and specifically includes the following sub-steps:
s101: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information; the setting of the credit granting secret key is flexible, and the credit granting code with any length can be set according to the protection level;
s102: and encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal. The above steps are mainly used for encrypting specific data, and the following conditions are mainly adopted in the encryption process: 1. the content information to be encrypted is literal content information; 2. the content to be encrypted is picture content information; 3. the content to be encrypted is a mixture of text content information and picture content information.
When encrypting the first case, usually a numeric string is obtained, which has corresponding start and end characters, and when designing, the start and end characters are designed as the same number, and the number does not appear in the intermediate content information, such as: the initial character and the terminal character of the numeric character string are both 1, and the numeric characters between the initial character and the terminal character are other characters except 1.
When the second case is encrypted, picture encrypted data is obtained in general, and the picture encrypted data is generally composed of different color blocks, and most preferably, blank areas are arranged on the left side and the right side of the picture encrypted data. The purpose of setting the blank area is to make the areas on both sides look different from the ordinary picture, so that the user who knows the encryption mode can conveniently know whether the picture is the real picture or the encrypted data.
When encryption is performed for the third case, the result is a combination of the first and second cases. So that the encryption method of the embodiment can be more generally applicable.
In the method for encrypting the content, the encrypted ciphertext consists of 0-9 digits, so that mixed transmission of the plaintext and the ciphertext can be realized, usually, the encrypted data cannot be directly read, a corresponding secret key must be input to be decrypted, or a string of scrambled data cannot be obtained, under the condition that the encrypted data is transmitted through the encrypted data, the encrypted data is easily known by the outside, and the encrypted data cannot be distinguished by the outside usually by converting the encrypted data into a digital character string, so that the security of the data is ensured to a certain extent; in addition, the method for encrypting content in this embodiment introduces a time variable, so that the obtained encrypted data may also be different with time change, for example, a data string obtained when "hello" is encrypted for the first time is "10256305575257632257633246325542001", but a string obtained when data is encrypted for the second time is: 102563055752576322576369875345565455781, which obtains different character strings to make the password more difficult to decode, further ensuring the data security.
The working principle of the embodiment is as follows:
in this embodiment, in the process of chatting over WeChat, when a user needs to encrypt corresponding content, the user needs to select the content information first and place the content information in software storing the method of this embodiment, so that an encrypted picture and a string of encrypted characters can be obtained. Such as: "you are just! Communication protection system! "characters and picturesThe following is the result after the treatment.
155032755622755092755897558092755892475589975586207558420755822375589227558927558622755839755842975589375583227558622755862075582247558696755859755822275583975589237558620755842071The part of the content can be transmitted to another user, so that the encryption of information is completed, the encrypted data can effectively prevent illegal monitoring and protect the communication content. In the method for encrypting the content information of the embodiment, the form of encryption is not added, but a ciphertext and plaintext conversion mode is adopted, and in this case, the encryption stage is not passed in the process of communicating information, so that the information is not easily identified by a listener. When information is transmitted, encrypted data and contents to be transmitted can be mixed, so that the whole information transmission process has a local encryption function.
Example two
The second embodiment discloses a readable computer storage medium, which is used for storing a program, and when the program is executed by a processor, the method for encrypting the content information of the first embodiment is realized.
Example three:
as shown in fig. 2, the present embodiment provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the program, the method for decrypting content information as described below is implemented, and specifically includes the following sub-steps:
s201: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data, and the encrypted data is digital encrypted data and picture encrypted data; a second terminal which, when receiving the encrypted information, is likely to be a string of character strings or picture encrypted data, or is also likely to be a combination of information content and character strings;
s202: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step; the method mainly aims to prevent the password from being decoded by other users except software, so that the content can be transmitted and decoded only in a specific crowd;
s203: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
The working principle of the embodiment is as follows:
when receiving the encrypted data provided by the content according to embodiment one, and the first trust key and the second trust key are the same, the combination of the character string and the picture can be directly added to translate into "good you! Communication protection system!". The decryption method of the present embodiment may interpret the combination of the content information and the encrypted data, such as when "hello 102562256365332555236443263231" is received, it may automatically identify whether it is the content information or the encrypted data, decrypt it memorialically when the identified encrypted data is identified, and do not operate on it when the textual content information is identified.
The first terminal described in the first embodiment and the second terminal described in the third embodiment may be the same device, for example, when the user encrypts the data content in the word file on his or her own computer, he or she saves the word content on the computer, so as to prevent someone from stealing the data, and when he or she needs to read the content, he or she can directly decrypt and read the encrypted data.
Example four
The fourth embodiment discloses a readable computer storage medium, which is used for storing a program, and when the program is executed by a processor, the method for decrypting content information of the third embodiment is realized.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (6)
1. A method of encrypting content information, comprising the steps of:
a receiving step: receiving content information and a first authorization key sent by a first terminal, wherein the content information is text information or picture information or a combination of the text information and the picture information;
an encryption step: encrypting the received content information to obtain encrypted data, and returning the encrypted data to the first terminal; when the content information is character information, the encrypted data is converted into a digital character string, and a time variable is introduced in the encryption process; the initial character and the terminal character of the numeric character string are both 1, and the numeric characters between the initial character and the terminal character are other numeric characters except 1.
2. The method of encrypting content information according to claim 1, wherein the content information is picture information, and the encrypted data is picture encrypted data.
3. The method of encrypting content information according to claim 2, wherein the picture encryption data is provided with blank areas on both left and right sides.
4. The method of encrypting content information according to claim 1, further comprising the steps of:
a receiving step: receiving encrypted information data and a credit authorization key sent by a second terminal, wherein the encrypted information data comprises encrypted data and content information in the encryption step;
a judging step: judging whether the second trust key is consistent with the first trust key or not, and if so, executing a decryption step;
and (3) decryption: and decrypting the received encrypted information data to obtain corresponding content information, and returning the content information to the second terminal.
5. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of encrypting content information of any one of claims 1-4 when executing the program.
6. A computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program, when executed by a processor, implements the method of any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437747.3A CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437747.3A CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108337233A CN108337233A (en) | 2018-07-27 |
CN108337233B true CN108337233B (en) | 2021-07-23 |
Family
ID=62923280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711437747.3A Active CN108337233B (en) | 2017-12-26 | 2017-12-26 | Method for encrypting content information, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108337233B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN114553549B (en) * | 2022-02-24 | 2024-01-02 | 江苏商贸职业学院 | Data encryption method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708160A (en) * | 2005-05-27 | 2005-12-14 | 上海贝豪通讯电子有限公司 | Mobile communication terminal capable of carrying out encrypting to user information and method thereof |
CN102055582A (en) * | 2009-11-06 | 2011-05-11 | Vega格里沙贝两合公司 | Data processing device for field device |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN106411719A (en) * | 2016-11-22 | 2017-02-15 | 北京奇虎科技有限公司 | Method for processing instant messages and equipment thereof |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080109889A1 (en) * | 2003-07-01 | 2008-05-08 | Andrew Bartels | Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications |
-
2017
- 2017-12-26 CN CN201711437747.3A patent/CN108337233B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1708160A (en) * | 2005-05-27 | 2005-12-14 | 上海贝豪通讯电子有限公司 | Mobile communication terminal capable of carrying out encrypting to user information and method thereof |
CN102055582A (en) * | 2009-11-06 | 2011-05-11 | Vega格里沙贝两合公司 | Data processing device for field device |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN106411719A (en) * | 2016-11-22 | 2017-02-15 | 北京奇虎科技有限公司 | Method for processing instant messages and equipment thereof |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
CN108337233A (en) | 2018-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111079128B (en) | Data processing method and device, electronic equipment and storage medium | |
CN104244237B (en) | Data sending, receiving method and reception send terminal and data transmitter-receiver set | |
CN106506487A (en) | A kind of information Encrypt and Decrypt method and device | |
CN103036674B (en) | Computer permission control method based on mobile dynamic password | |
CN100566337C (en) | Strengthen the method for wireless LAN safety | |
KR20050007830A (en) | Method for Domain Authentication for exchanging contents between devices | |
CN102572750A (en) | Method and terminal for protecting short messages | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN106797381B (en) | Communication adapter for user authentication | |
CN105391677A (en) | Information transmission method and mobile terminal | |
US10699021B2 (en) | Method and a device for secure storage of at least one element of digital information, and system comprising such device | |
CN102056156B (en) | Computer Data Security is downloaded to the method and system of mobile terminal | |
CN112995204A (en) | Method, device, equipment and storage medium for safely reading Protonmail encrypted mail | |
CN107135074B (en) | Advanced security method and device | |
CN102833243A (en) | Communication system making use of fingerprint information and application of communication system | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
US20150100777A1 (en) | Secure Federated Identity Service | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
US20020001388A1 (en) | High speed copy protection method | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content | |
Erondu et al. | An encryption and decryption model for data security using vigenere with advanced encryption standard | |
CN113507468A (en) | Encryption method, decryption method and authorization method based on block chain technology | |
JP4034946B2 (en) | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM | |
KR101271464B1 (en) | Method for coding private key in dual certificate system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |