CN108768938A - A kind of web data encryption and decryption method and device - Google Patents

A kind of web data encryption and decryption method and device Download PDF

Info

Publication number
CN108768938A
CN108768938A CN201810332854.8A CN201810332854A CN108768938A CN 108768938 A CN108768938 A CN 108768938A CN 201810332854 A CN201810332854 A CN 201810332854A CN 108768938 A CN108768938 A CN 108768938A
Authority
CN
China
Prior art keywords
encryption
decryption
web data
browser
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810332854.8A
Other languages
Chinese (zh)
Other versions
CN108768938B (en
Inventor
丁敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201810332854.8A priority Critical patent/CN108768938B/en
Publication of CN108768938A publication Critical patent/CN108768938A/en
Application granted granted Critical
Publication of CN108768938B publication Critical patent/CN108768938B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention relates to field of information security technology, more particularly to a kind of web data encryption and decryption method and device.This method is:Mark of the browser based on the current accessed page, determine encryption and decryption strategy corresponding with the current accessed page, wherein, include the mark of current web page described in unique mark in the encryption and decryption strategy, wait for encryption and decryption web data attribute type set and encryption and decryption scheme;Browser is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data.Using the above method, browser is according to encryption and decryption strategy corresponding with the current accessed page, the web data interacted between operation system to itself carries out encryption and decryption processing, this makes it possible under the premise of not carrying out upgrading to operation system, for the increase of each Webpage, deletion or the corresponding encryption and decryption strategy of dynamic configuration that operation system provides, the flexibility of configuration encryption and decryption strategy is improved.

Description

A kind of web data encryption and decryption method and device
Technical field
The present invention relates to field of information security technology, more particularly to a kind of web data encryption and decryption method and device.
Background technology
Currently, browser is mainly used for that the web data that background server push comes, browser and operation system is presented Web data interactive process in, the protection to web data realized by way of to web data encryption and decryption.
In the prior art, it is to rely on operation system to carry out to the encryption and decryption of web data, by being uploaded to browser Web data to operation system is encrypted, and the data downloaded from operation system to browser are decrypted.Currently, common Operation system is to there are two types of the encryption and decryption modes of web data:
First way:After web data is uploaded to operation system by browser, net that operation system uploads browser Page data is encrypted;When browser needs to download web data from operation system, under operation system needs browser The web data of load is decrypted, and is sent to the presentation that browser carries out web data.
The second way:The web data that operation system calls encryption and decryption control to upload to operation system to browser carries out Encryption;The web data that operation system calls encryption and decryption control to download browser from operation system is decrypted, And web data presentation is carried out by browser.
However, when needing to execute web data encryption and decryption number for the operation system for not carrying out web data encryption and decryption When according to strategy, alternatively, needing to upgrade the existing encryption and decryption scheme of operation system, it is also desirable to be carried out to operation system corresponding Upgrading, needs to be transformed operation system, and improvement cost is high, and transformation difficulty is big.
Invention content
The purpose of the embodiment of the present invention is to provide a kind of web data encryption and decryption method and device, to solve the prior art Present in web data encryption and decryption strategy is increased, when deleting, changing, the problem of needing to be transformed operation system.
The specific technical solution provided in the embodiment of the present invention is as follows:
In a first aspect, the present invention provides a kind of web data encipher-decipher method, which includes:It is clear It lookes at mark of the device based on the current accessed page, determines encryption and decryption strategy corresponding with the current accession page, wherein should plus solve Include the mark of the unique mark current web page in close strategy, waits for encryption and decryption web data attribute type set and encryption and decryption side Case;Browser is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data.
Using web data encipher-decipher method provided by the invention, browser is according to the webpage of the operation system of current accessed The page determines and is directed to the pre-set encryption and decryption strategy of the Webpage accordingly, and based on the encryption and decryption strategy determined, Encryption and decryption processing is carried out to the web data that browser is interacted with the operation system, it is opposite according to the Webpage in browser lateral root The encryption and decryption strategy answered executes encryption and decryption operation to web data, under the premise of without being transformed upgrading to operation system, Increase, deletion or the change of the encryption and decryption strategy of the web data interacted with operation system to each Webpage can be achieved.
Optionally, for browser in the mark based on the current accessed page, determination is corresponding with the current accessed page Before encryption and decryption strategy, further comprise:
Browser obtains encryption and decryption strategy set from encryption and decryption policy management system.
Optionally, mark of the browser based on the current accessed page determines add corresponding with the current accessed page Decryption policy, including:
Browser obtains the uniform resource position mark URL of the current accessed page;
Browser determines to include described according to the URL of the current accessed page from the encryption and decryption strategy set The encryption and decryption strategy of the URL of the current accessed page.
Optionally, browser is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data, including:
Browser is belonged to and described waits for encryption and decryption web data attribute type collection for needing to be uploaded to operation system The first web data closed determines corresponding encryption key, and using the encryption key to institute according to the encryption and decryption scheme It states the first web data to be encrypted, wherein the encryption and decryption scheme encrypts the webpage number of each attribute type for determining According to when, the encryption key that is respectively adopted.
Optionally, browser determines corresponding encryption key, and use the encryption key according to the encryption and decryption scheme First web data is encrypted, including:
Browser is directed to web data disclosed in all users, using all public keys with the cipher key pair held per family It is encrypted;Alternatively,
Browser is directed to web data disclosed in designated user, using the public affairs for the cipher key pair that the designated user holds Key is encrypted.
Optionally, browser is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data, including:
Browser is directed to and is downloaded from operation system, and waits for encryption and decryption web data attribute type set described in belonging to Second web data determines corresponding decruption key according to the encryption and decryption scheme, and using the decruption key to described the Two web datas are decrypted, wherein when the encryption and decryption scheme is for determining the web data for decrypting each attribute type, The decruption key being respectively adopted.
Optionally, browser determines corresponding decruption key, and use the decruption key according to the encryption and decryption scheme Second web data is decrypted, including:
Browser is directed to web data disclosed in all users, using all private keys with the cipher key pair held per family It is decrypted;Alternatively,
Browser is directed to itself disclosed web data, and place is decrypted in the private key for the cipher key pair held using itself Reason.
Second aspect, the present invention provide a kind of web data ciphering and deciphering device, which includes:
Determination unit is used for the mark based on the current accessed page, determines add corresponding with the current accessed page Decryption policy, wherein include the mark of current web page described in unique mark in the encryption and decryption strategy, wait for encryption and decryption webpage number According to attribute type set and encryption and decryption scheme;
Encryption/decryption element, for carrying out encryption and decryption processing to web data based on the encryption and decryption strategy.
Optionally, in the mark based on the current accessed page, encryption and decryption corresponding with the current accessed page is determined Before strategy, the web data ciphering and deciphering device further comprises:
Acquiring unit, for obtaining encryption and decryption strategy set from encryption and decryption policy management system.
Optionally, in the mark based on the current accessed page, encryption and decryption corresponding with the current accessed page is determined When tactful, the determination unit is used for:
Obtain the uniform resource position mark URL of the current accessed page;
It determines to include the current visit from the encryption and decryption strategy set according to the URL of the current accessed page Ask the encryption and decryption strategy of the URL of the page.
Optionally, when carrying out encryption and decryption processing to web data based on the encryption and decryption strategy, the encryption/decryption element For:
For needing to be uploaded to operation system, and belongs to and described wait for the of encryption and decryption web data attribute type set One web data determines corresponding encryption key, and using the encryption key to described first according to the encryption and decryption scheme Web data is encrypted, wherein when the encryption and decryption scheme is for determining the web data for encrypting each attribute type, point The encryption key not used.
Optionally, according to the encryption and decryption scheme, corresponding encryption key is determined, and using the encryption key to institute When stating the first web data and being encrypted, the encryption/decryption element is used for:
For to web data disclosed in all users, added using all public keys with the cipher key pair held per family Close processing;Alternatively,
For to web data disclosed in designated user, the public key for the cipher key pair held using the designated user is carried out Encryption.
Optionally, when carrying out encryption and decryption processing to web data based on the encryption and decryption strategy, the encryption/decryption element For:
For what is downloaded from operation system, and belong to second net for waiting for encryption and decryption web data attribute type set Page data determines corresponding decruption key, and using the decruption key to second webpage according to the encryption and decryption scheme Data are decrypted, wherein when the encryption and decryption scheme is for determining the web data for decrypting each attribute type, adopt respectively Decruption key.
Optionally, according to the encryption and decryption scheme, corresponding decruption key is determined, and using the decruption key to institute When stating the second web data and being decrypted, the encryption/decryption element is used for:
For to web data disclosed in all users, solved using all private keys with the cipher key pair held per family Close processing;Alternatively,
For to itself disclosed web data, the private key for the cipher key pair held using itself is decrypted.
The third aspect, the present invention provide a kind of computing device, which includes:Memory refers to for storing program It enables;Processor is executed according to the program of acquisition in above-mentioned first aspect for calling the program instruction stored in the memory Any one method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, the computer-readable recording medium storage There are computer executable instructions, the computer executable instructions any in above-mentioned first aspect for making the computer execute Item method.
The present invention has the beneficial effect that:
In conclusion in the embodiment of the present invention, during carrying out encryption and decryption to web data, browser is based on current The mark of accession page determines encryption and decryption strategy corresponding with the current accessed page, wherein in the encryption and decryption strategy Include the mark of current web page described in unique mark, waits for encryption and decryption web data attribute type set and encryption and decryption scheme;It is clear Device of looking at is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data.
Using the above method, browser obtains encryption and decryption strategy corresponding with the current accessed page, and in browser sheet Ground carries out encryption and decryption based on the encryption and decryption strategy to the web data itself interacted with the current accessed page that operation system provides Processing, this makes it possible under the premise of not upgrading to operation system, for each Webpage that operation system provides, with Meaning increase, deletion or the corresponding encryption and decryption strategy of dynamic recognition, improve the flexibility of encryption and decryption strategy configuration, reduce The cost of encryption and decryption strategy upgrading.
Description of the drawings
Fig. 1 is a kind of detail flowchart of web data encipher-decipher method in the embodiment of the present invention;
Fig. 2 is in the embodiment of the present invention, and a kind of browser is handed over the data of encryption and decryption policy management system and operation system Mutual schematic diagram;
Fig. 3 is a kind of structural schematic diagram of web data ciphering and deciphering device in the embodiment of the present invention.
Specific implementation mode
The technical solution introduced in embodiment to facilitate the understanding of the present invention now provides the definition of part term:
1, it waits for encryption and decryption web data attribute type set, refers to belonging to the specific of which user for specifically limiting The web data of which type needs to carry out the set of encryption and decryption processing.
2, encryption and decryption scheme, when referring to for different ownership and/or different types of web data encryption and decryption, institute The encryption key and/or decruption key that need to be used.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, is not whole embodiment.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
First, term in the embodiment of the present invention " and ", a kind of only incidence relation of description affiliated partner, expression can be with There are three kinds of relationships, for example, A and B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
When the present invention refers to ordinal numbers such as " first ", " second ", " third " or " the 4th ", unless based on context its The meaning of certain order of representation, it is appreciated that being only to distinguish to be used.
The solution of the present invention will be described in detail by specific embodiment below, certainly, the present invention is not limited to Lower embodiment.
As shown in fig.1, in the embodiment of the present invention, a kind of detailed process of web data encipher-decipher method is as follows:
Step 100:Browser obtains encryption and decryption strategy set from encryption and decryption policy management system.
In practical application, user can be by each business for being provided in browser access operation system, and each business can be right Corresponding Webpage is answered, corresponding, browser can carry out the interaction of web data with operation system, for example, browser can Web data input by user is uploaded to operation system, browser can also download web data from operation system, and be in On present browser page.Operation system is used for each webpage of operation system for the business function needed for carrying client, browser The presentation of the page.So, it in order to ensure the safety of the web data interacted between browser and operation system, needs to browsing The web data interacted between device and operation system carries out encryption and decryption processing, optionally, can be directed to from browser and be uploaded to industry The web data of business system is encrypted, and is downloaded from operation system for browser, needs to be presented on browser page On web data be decrypted.
In the embodiment of the present invention, a kind of system (i.e. encryption and decryption tactical management system for encryption and decryption tactical management is provided System), be connected (or being connected with the terminal where browser) with browser, can be advance in encryption and decryption policy management system Corresponding encryption and decryption strategy is respectively configured in each Webpage provided for operation system, and browser can be from encryption and decryption strategy pipe The encryption and decryption strategy set for each Webpage configuration in operation system is obtained in reason system, encryption and decryption policy management system exists In operational process, the encryption and decryption strategy of any one Webpage can be arbitrarily added, deletes or changed.It can be carried for operation system Each Webpage supplied, pre-sets corresponding encryption and decryption strategy, and be stored in encryption and decryption policy management system.
For example, it is assumed that browser 1 carries out web data interaction with operation system 1, operation system includes Webpage 11, net The page page 12, Webpage 13 and Webpage 14, then, encryption and decryption plan corresponding with browser 1 and/or operation system 1 Webpage 11 can be directed in advance by slightly managing in system 1, Webpage 13 and Webpage 14 are configured with corresponding encryption and decryption Strategy 11, encryption and decryption strategy 13 and encryption and decryption strategy 14.If it is determined that needing that corresponding encryption and decryption plan is arranged for Webpage 12 Slightly, then corresponding encryption and decryption strategy 12 can be configured for Webpage 12 directly in encryption and decryption policy management system 1;If really It is fixed to be not necessarily to that corresponding encryption and decryption strategy is arranged for Webpage 11, then it can directly be deleted in encryption and decryption policy management system 1 Except the encryption and decryption strategy configured for Webpage 11;If it is determined that needing to adjust encryption and decryption strategy for Webpage 14, then may be used Directly to carry out adaptation adjustment to encryption and decryption strategy 14 in encryption and decryption policy management system.
In the embodiment of the present invention, when executing step 100, it can specifically include:When starting browser, browser from Connected encryption and decryption policy management system in obtain encryption and decryption strategy set.
Certainly, browser in first time after getting encryption and decryption strategy set in encryption and decryption policy management system, can Encryption and decryption strategy set is stored in local, and it is based on the preset period, periodically from encryption and decryption policy management system Newest encryption and decryption strategy set is obtained, it is of course also possible to the encryption and decryption strategy set acquisition instruction based on user's triggering, from adding Newest encryption and decryption strategy set is obtained in decryption policy management system.
In practical application, browser can be directed to the preset corresponding public keys pair of user during installing initialization And private cipher key pair, certainly, private cipher key pair can only browser home subscriber can be used, that is to say, that using private cipher key Clock synchronization need to verify user identity, and optionally, in the embodiment of the present invention, a kind of preferable embodiment is to use private cipher key Clock synchronization need to input correctly verification password.
Step 110:Mark of the browser based on the current accessed page determines add corresponding with the above-mentioned current accessed page Decryption policy, wherein include the mark of the above-mentioned current web page of unique mark in above-mentioned encryption and decryption strategy, wait for encryption and decryption webpage number According to attribute type set and encryption and decryption scheme.
In practical application, each Webpage is corresponding with the mark for being mutually applied to unique mark Webpage in operation system Know, then, in the embodiment of the present invention, browser can be according to the mark of the webpage of current accessed, from the encryption and decryption plan got Encryption and decryption strategy corresponding with the webpage of current accessed is determined in slightly gathering.
Specifically, in the embodiment of the present invention, when executing step 110, browser obtains the unified money of the current accessed page Source finger URL (Uniform Resource Locator, URL), and solution is added from what is got according to the URL of the current accessed page Determined in close strategy set include the URL of the current accessed page encryption and decryption strategy.
In practical application, the corresponding encryption and decryption strategy of a Webpage includes at least:For unique mark this The mark of Webpage needs the set of the attribute type for the web data for being encrypted and/or decrypting, any attribute type , need execute cryptographic operation the corresponding encryption key of web data, any attribute type, need execute decryption oprerations The corresponding decruption key ... ... of web data.
Certainly, in the embodiment of the present invention, according to the attribute type information of any web data, this can be at least determined The user information that the type of one web data and/or any web data are belonged to.
For example, encryption and decryption web data Attribute class can be waited for according in the corresponding encryption and decryption strategy of a Webpage Type set is determined:For user A (i.e. browser A), the 1st class webpage number that user A is uploaded to operation system is needed It is encrypted, is needed to user A the 2nd class web datas downloaded from operation system and the 4th class according to the 3rd class web data Web data is decrypted;For user B (i.e. browser B), need for user B to be uploaded to the 1st of operation system Class web data and the 4th class web data are encrypted, and need the 3rd class webpage number downloaded from operation system to user B According to being decrypted;…….
Further, the encryption and decryption scheme that encryption and decryption strategy includes refers to the attribute according to a web data, determines Whether need to execute cryptographic operation, or determine the need for executing decryption oprerations, and when determination needs to execute cryptographic operation, It determines encryption key, when determination needs to execute decryption oprerations, determines decruption key.
Step 120:Browser is based on above-mentioned encryption and decryption strategy and carries out encryption and decryption processing to web data.
In the embodiment of the present invention, when executing step 120, browser is carried out plus is solved to web data according to encryption and decryption strategy The mode of close processing includes but not limited to any one or combination in following two modes:
First way is:Browser is belonged to and above-mentioned waits for encryption and decryption webpage for needing to be uploaded to operation system First web data of data attribute type set determines corresponding encryption key, and using upper according to above-mentioned encryption and decryption scheme It states encryption key above-mentioned first web data is encrypted, wherein above-mentioned encryption and decryption scheme encrypts each category for determining When the web data of property type, the encryption key that is respectively adopted.
Specifically, browser determines corresponding encryption key, and close using above-mentioned encryption according to above-mentioned encryption and decryption scheme When above-mentioned first web data is encrypted in key, it is specifically including but not limited to any one in following two situations:
The first situation is:Browser is directed to web data disclosed in all users, is held per family using all use The public key of cipher key pair is encrypted.
In practical application, due to when browser is installed, for each with corresponding Public key pair is preset per family, i.e., respectively With holding the Public key pair per family, then, browser will be uploaded to any web data of operation system as to institute in determination There is web data disclosed in user, then place is encrypted to any web data in the public key that the Public key centering may be used Reason, and encrypted any web data is uploaded to operation system.
The second situation is:Browser is directed to web data disclosed in designated user, is held using above-mentioned designated user The public key of cipher key pair be encrypted.
In practical application, due to when browser is installed, presetting corresponding private cipher key pair respectively for each user, i.e., It is each with holding the private cipher key pair for only belonging to oneself per family, then, browser will be uploaded to any of operation system in determination Web data is that the private cipher key centering that the designated user holds then may be used only to web data disclosed in designated user Any web data is encrypted in public key, and encrypted any web data is uploaded to operation system.
The second way is:Browser is directed to and is downloaded from operation system, and belongs to and above-mentioned wait for encryption and decryption web data Second web data of attribute type set determines corresponding decruption key, and use above-mentioned solution according to above-mentioned encryption and decryption scheme Close above-mentioned second web data of key pair is decrypted, wherein above-mentioned encryption and decryption scheme decrypts each Attribute class for determining When the web data of type, the decruption key that is respectively adopted.
Specifically, browser determines corresponding decruption key, and close using the decryption according to the encryption and decryption scheme When second web data is decrypted in key, it is specifically including but not limited to any one in following two situations:
The first situation is:Browser is directed to web data disclosed in all users, is held per family using all use The private key of cipher key pair is decrypted.
In practical application, browser determines encrypted any web data for being downloaded from operation system for useful Web data disclosed in family then uses the private key for the Public key centering itself held that place is decrypted to any web data Reason, any web data after being decrypted, and by parsing, rendering, which is presented on browser page On face.
The second situation is:Browser is directed to itself disclosed web data, the cipher key pair held using itself Private key is decrypted.
In practical application, browser determines that the encrypted any web data downloaded from operation system is only to oneself Disclosed web data, then after determining user identity, the private key for the private cipher key centering held using itself is any to this Web data is decrypted, any web data after being decrypted, and by parsing, rendering, by any webpage Data are presented on browser page.
Above-described embodiment is described in further detail using specific application scenarios below, as shown in fig.2, of the invention In embodiment, a kind of data interaction schematic diagram of browser and encryption and decryption policy management system and operation system.Pacify in client Equipped with browser, browser carries out web data interaction with operation system, and browser can upload web data input by user Into operation system, web data can also be downloaded from operation system, and be illustrated on browser page.Encryption and decryption strategy pipe Preset in reason system operation system offer the corresponding encryption and decryption strategy of each Webpage, then, any client it is clear Device of looking at can synchronize encryption and decryption strategy set from encryption and decryption policy management system, and in access service system, according to current The mark of accession page determines corresponding encryption and decryption strategy from encryption and decryption strategy set, and uses the encryption and decryption strategy pair The web data itself interacted with the current accessed page carries out encryption and decryption processing.
Based on above-described embodiment, as shown in fig.3, in the embodiment of the present invention, a kind of web data ciphering and deciphering device, at least Including determination unit 30 and encryption/decryption element 31, wherein
Determination unit 30, is used for the mark based on the current accessed page, and determination is corresponding with the current accessed page Encryption and decryption strategy, wherein include the mark of current web page described in unique mark in the encryption and decryption strategy, wait for encryption and decryption webpage Data attribute set and encryption and decryption scheme;
Encryption/decryption element 31, for carrying out encryption and decryption processing to web data based on the encryption and decryption strategy.
Optionally, in the mark based on the current accessed page, encryption and decryption corresponding with the current accessed page is determined Before strategy, the web data ciphering and deciphering device further comprises:
Acquiring unit, for obtaining encryption and decryption strategy set from encryption and decryption policy management system.
Optionally, in the mark based on the current accessed page, encryption and decryption corresponding with the current accessed page is determined When tactful, the determination unit 30 is used for:
Obtain the uniform resource position mark URL of the current accessed page;
It determines to include the current visit from the encryption and decryption strategy set according to the URL of the current accessed page Ask the encryption and decryption strategy of the URL of the page.
Optionally, when carrying out encryption and decryption processing to web data based on the encryption and decryption strategy, the encryption/decryption element 31 are used for:
For needing to be uploaded to operation system, and belong to first net for waiting for encryption and decryption web data attribute set Page data determines corresponding encryption key, and using the encryption key to first webpage according to the encryption and decryption scheme Data are encrypted, wherein when the encryption and decryption scheme is for determining the web data for encrypting each attribute type, adopt respectively Encryption key.
Optionally, according to the encryption and decryption scheme, corresponding encryption key is determined, and using the encryption key to institute When stating the first web data and being encrypted, the encryption/decryption element 31 is used for:
For to web data disclosed in all users, added using all public keys with the cipher key pair held per family Close processing;Alternatively,
For to web data disclosed in designated user, the public key for the cipher key pair held using the designated user is carried out Encryption.
Optionally, when carrying out encryption and decryption processing to web data based on the encryption and decryption strategy, the encryption/decryption element 31 are used for:
For what is downloaded from operation system, and belong to the second webpage number for waiting for encryption and decryption web data attribute set According to according to the encryption and decryption scheme, determining corresponding decruption key, and using the decruption key to second web data It is decrypted, wherein when the encryption and decryption scheme is for determining the web data for decrypting each attribute type, be respectively adopted Decruption key.
Optionally, according to the encryption and decryption scheme, corresponding decruption key is determined, and using the decruption key to institute When stating the second web data and being decrypted, the encryption/decryption element 31 is used for:
For to web data disclosed in all users, solved using all private keys with the cipher key pair held per family Close processing;Alternatively,
For to itself disclosed web data, the private key for the cipher key pair held using itself is decrypted.
In conclusion in the embodiment of the present invention, during carrying out encryption and decryption to web data, browser is based on current The mark of accession page determines encryption and decryption strategy corresponding with the current accessed page, wherein in the encryption and decryption strategy Include the mark of current web page described in unique mark, waits for encryption and decryption web data attribute set and encryption and decryption scheme;Browser Encryption and decryption processing is carried out to web data based on the encryption and decryption strategy.
Using the above method, browser obtains encryption and decryption strategy corresponding with the current accessed page, and in browser sheet Ground carries out encryption and decryption based on the encryption and decryption strategy to the web data itself interacted with the current accessed page that operation system provides Processing, this makes it possible under the premise of not upgrading to operation system, for each Webpage that operation system provides, with Meaning increase, deletion or the corresponding encryption and decryption strategy of dynamic recognition, improve the flexibility of encryption and decryption strategy configuration, reduce The cost of encryption and decryption strategy upgrading.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be according to the method for the embodiment of the present invention, the flow chart of equipment (system) and computer program product and/ Or block diagram describes.It should be understood that each flow that can be realized by computer program instructions in flowchart and/or the block diagram and/ Or the combination of the flow and/or box in box and flowchart and/or the block diagram.These computer program instructions can be provided To all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one A machine so that by the instruction that computer or the processor of other programmable data processing devices execute generate for realizing The device for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out the embodiment of the present invention various modification and variations without departing from this hair The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of web data encipher-decipher method, which is characterized in that including:
Mark of the browser based on the current accessed page determines encryption and decryption strategy corresponding with the current accessed page, In, include the mark of current web page described in unique mark in the encryption and decryption strategy, waits for encryption and decryption web data attribute type Set and encryption and decryption scheme;
Browser is based on the encryption and decryption strategy and carries out encryption and decryption processing to web data.
2. the method as described in claim 1, which is characterized in that browser in the mark based on the current accessed page, determine with Before the corresponding encryption and decryption strategy of the current accessed page, further comprise:
Browser obtains encryption and decryption strategy set from encryption and decryption policy management system.
3. method as claimed in claim 2, which is characterized in that mark of the browser based on the current accessed page, determining and institute The corresponding encryption and decryption strategy of the current accessed page is stated, including:
Browser obtains the uniform resource position mark URL of the current accessed page;
Browser determines to include described current according to the URL of the current accessed page from the encryption and decryption strategy set The encryption and decryption strategy of the URL of accession page.
4. method as described in any one of claims 1-3, which is characterized in that browser is based on the encryption and decryption strategy to webpage Data carry out encryption and decryption processing, including:
Browser is belonged to and described waits for encryption and decryption web data attribute type set for needing to be uploaded to operation system First web data determines corresponding encryption key according to the encryption and decryption scheme, and using the encryption key to described the One web data is encrypted, wherein when the encryption and decryption scheme is for determining the web data for encrypting each attribute type, The encryption key being respectively adopted.
5. method as claimed in claim 4, which is characterized in that browser determines corresponding add according to the encryption and decryption scheme Key, and first web data is encrypted using the encryption key, including:
Browser is directed to web data disclosed in all users, is carried out with the public key for the cipher key pair held per family using all Encryption;Alternatively,
Browser is directed to web data disclosed in designated user, the public key of the cipher key pair held using the designated user into Row encryption.
6. method as described in any one of claims 1-3, which is characterized in that browser is based on the encryption and decryption strategy to webpage Data carry out encryption and decryption processing, including:
Browser is directed to and is downloaded from operation system, and waits for the second of encryption and decryption web data attribute type set described in belonging to Web data determines corresponding decruption key, and using the decruption key to second net according to the encryption and decryption scheme Page data is decrypted, wherein when the encryption and decryption scheme is for determining the web data for decrypting each attribute type, respectively The decruption key of use.
7. method as claimed in claim 6, which is characterized in that browser determines corresponding solution according to the encryption and decryption scheme Key, and second web data is decrypted using the decruption key, including:
Browser is directed to web data disclosed in all users, is carried out with the private key for the cipher key pair held per family using all Decryption processing;Alternatively,
Browser is directed to itself disclosed web data, and the private key for the cipher key pair held using itself is decrypted.
8. a kind of web data ciphering and deciphering device, which is characterized in that including:
Determination unit is used for the mark based on the current accessed page, determines encryption and decryption corresponding with the current accessed page Strategy, wherein include the mark of current web page described in unique mark in the encryption and decryption strategy, wait for encryption and decryption web data category Property type set and encryption and decryption scheme;
Encryption/decryption element, for carrying out encryption and decryption processing to web data based on the encryption and decryption strategy.
9. a kind of computing device, which is characterized in that including:
Memory, for storing program instruction;
Processor, for calling the program instruction stored in the memory, according to acquisition program execute as claim 1 to 7 any one of them methods.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer can It executes instruction, the computer executable instructions are for making the computer execute side as described in any one of claim 1 to 7 Method.
CN201810332854.8A 2018-04-13 2018-04-13 A kind of web data encryption and decryption method and device Active CN108768938B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810332854.8A CN108768938B (en) 2018-04-13 2018-04-13 A kind of web data encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810332854.8A CN108768938B (en) 2018-04-13 2018-04-13 A kind of web data encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN108768938A true CN108768938A (en) 2018-11-06
CN108768938B CN108768938B (en) 2019-08-09

Family

ID=64010769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810332854.8A Active CN108768938B (en) 2018-04-13 2018-04-13 A kind of web data encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN108768938B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111222075A (en) * 2020-01-15 2020-06-02 平安普惠企业管理有限公司 Data transmission method based on multiple Webviews, server and storage medium
CN112579998A (en) * 2019-09-30 2021-03-30 北京京东尚科信息技术有限公司 Webpage access method, management system and electronic equipment in information interaction platform
CN112632585A (en) * 2020-12-31 2021-04-09 北京海泰方圆科技股份有限公司 Webpage data transmission system, method, device, medium and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506518A (en) * 2014-12-22 2015-04-08 中软信息系统工程有限公司 Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system
CN105095694A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and system for calling plug-ins by webpages
CN105516208A (en) * 2016-01-28 2016-04-20 邱铭钗 WEB site link dynamic hiding method and device capable of effectively preventing network attacks
US20170118029A1 (en) * 2015-10-26 2017-04-27 Online Solutions Oy Method and a system for verifying the authenticity of a certificate in a web browser using the ssl/tls protocol in an encrypted internet connection to an https website
CN107305610A (en) * 2016-04-22 2017-10-31 腾讯科技(深圳)有限公司 The method and apparatus of access path processing, the methods, devices and systems of automatic machine identification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095694A (en) * 2014-05-14 2015-11-25 腾讯科技(深圳)有限公司 Method and system for calling plug-ins by webpages
CN104506518A (en) * 2014-12-22 2015-04-08 中软信息系统工程有限公司 Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system
US20170118029A1 (en) * 2015-10-26 2017-04-27 Online Solutions Oy Method and a system for verifying the authenticity of a certificate in a web browser using the ssl/tls protocol in an encrypted internet connection to an https website
CN105516208A (en) * 2016-01-28 2016-04-20 邱铭钗 WEB site link dynamic hiding method and device capable of effectively preventing network attacks
CN107305610A (en) * 2016-04-22 2017-10-31 腾讯科技(深圳)有限公司 The method and apparatus of access path processing, the methods, devices and systems of automatic machine identification

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579998A (en) * 2019-09-30 2021-03-30 北京京东尚科信息技术有限公司 Webpage access method, management system and electronic equipment in information interaction platform
CN112579998B (en) * 2019-09-30 2023-09-26 北京京东尚科信息技术有限公司 Webpage access method, management system and electronic equipment in information interaction platform
CN111222075A (en) * 2020-01-15 2020-06-02 平安普惠企业管理有限公司 Data transmission method based on multiple Webviews, server and storage medium
CN112632585A (en) * 2020-12-31 2021-04-09 北京海泰方圆科技股份有限公司 Webpage data transmission system, method, device, medium and equipment

Also Published As

Publication number Publication date
CN108768938B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
US11676133B2 (en) Method and system for mobile cryptocurrency wallet connectivity
CN104852925B (en) Mobile intelligent terminal anti-data-leakage secure storage, backup method
JP5679018B2 (en) Database encryption system, method and program
CN107077559B (en) Verification System reminds terminal and information recording carrier
CN106506159A (en) Encryption method and equipment for key safety
JP2019503533A5 (en)
CN104104692A (en) Virtual machine encryption method, decryption method and encryption-decryption control system
CN108154038A (en) Data processing method and device
CN108768938B (en) A kind of web data encryption and decryption method and device
CN109936546B (en) Data encryption storage method and device and computing equipment
JP2006301992A (en) Authentication management method and system
US20190182293A1 (en) System and method for sharing information in a private ecosystem
CN107040520A (en) A kind of cloud computing data-sharing systems and method
WO2019120038A1 (en) Encrypted storage of data
US20170200020A1 (en) Data management system, program recording medium, communication terminal, and data management server
CN102724328B (en) Read client refreshes method, system and device after a while
JP5678150B2 (en) User terminal, key management system, and program
US10592682B2 (en) Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state
CN110266641A (en) Information-reading method and device
WO2011058629A1 (en) Information management system
CN102724212A (en) Read-later server realization method, read-later server realization system and read-later read server
CN110034922A (en) Request processing method, processing unit and requests verification method, verifying device
CN109194663A (en) A kind of method and device of file storage and downloading based on cloud computing
US10043015B2 (en) Method and apparatus for applying a customer owned encryption
CN111125734B (en) Data processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant