CN108989015B - Encryption method and device - Google Patents

Encryption method and device Download PDF

Info

Publication number
CN108989015B
CN108989015B CN201710399445.5A CN201710399445A CN108989015B CN 108989015 B CN108989015 B CN 108989015B CN 201710399445 A CN201710399445 A CN 201710399445A CN 108989015 B CN108989015 B CN 108989015B
Authority
CN
China
Prior art keywords
oscillogram
encryption
carrying
extracting
key value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710399445.5A
Other languages
Chinese (zh)
Other versions
CN108989015A (en
Inventor
李俊涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201710399445.5A priority Critical patent/CN108989015B/en
Publication of CN108989015A publication Critical patent/CN108989015A/en
Application granted granted Critical
Publication of CN108989015B publication Critical patent/CN108989015B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)

Abstract

The invention provides an encryption method and device, which can solve the problem of potential safety hazard caused by simple encryption by adopting a fixed character string in the prior art. The method comprises the following steps: converting the acquired brain wave data into a oscillogram of brain waves by digital-to-analog conversion; extracting a characteristic value of the oscillogram by using a summary algorithm; taking the characteristic value and the public key as a key value pair, and carrying out first encryption storage on the key value pair; and carrying out second encryption storage on the key value pair after the first encryption storage by using the digital certificate.

Description

Encryption method and device
Technical Field
The present invention relates to the field of computers, and in particular, to an encryption method, apparatus, electronic device, and readable storage medium.
Background
The encryption technology is the main security measure adopted by electronic commerce, is the most common security measure, changes important data into messy codes (encryption) by using technical measures for transmission, and restores (decrypts) by using the same or different measures after reaching a destination.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
1. encrypting the fixed field, and converting the original character string into other character strings;
2. the encryption mode used is too single.
Disclosure of Invention
In view of this, embodiments of the present invention provide an encryption method and apparatus, which can solve the problem of potential safety hazard in the prior art due to simple encryption using a fixed string.
To achieve the above object, according to one aspect of the present invention, there is provided an encryption method.
The encryption method of the embodiment of the invention comprises the following steps: converting the acquired brain wave data into a oscillogram of brain waves by digital-to-analog conversion; extracting a characteristic value of the oscillogram by using a summary algorithm; taking the characteristic value and the public key as a key value pair, and carrying out first encryption storage on the key value pair; and carrying out second encryption storage on the key value pair after the first encryption storage by using the digital certificate.
Optionally, before the step of extracting the feature value of the oscillogram by using the digest algorithm in the embodiment of the present invention, the method further includes: carrying out digital conversion on the oscillogram by using a principal component analysis method, and then determining the main characteristics of the oscillogram; the step of extracting the feature value of the oscillogram by using the abstract algorithm comprises the following steps: and extracting characteristic values from the main characteristics of the oscillogram by using a summary algorithm.
Alternatively, an embodiment of the present invention further includes, before the step of converting the acquired brain wave data into a oscillogram of brain waves: and receiving electroencephalogram data sent by the wearable terminal equipment.
To achieve the above object, according to another aspect of the embodiments of the present invention, there is provided an apparatus for encryption.
An encryption apparatus according to an embodiment of the present invention includes: the conversion module is used for converting the acquired brain wave data into a oscillogram of brain waves by using digital-to-analog conversion; the extraction module is used for extracting the characteristic value of the oscillogram by using an abstract algorithm; the first processing module is used for carrying out first encryption storage on the key value pair by taking the characteristic value and the public key as the key value pair; and the second processing module is used for carrying out second encryption storage on the key value pairs after the first encryption storage by using the digital certificate.
Optionally, the embodiment of the present invention further includes an analysis module, configured to: carrying out digital conversion on the oscillogram by using a principal component analysis method, and then determining the main characteristics of the oscillogram; and, the extraction module is further configured to: and extracting the features from the main features of the oscillogram by using a summary algorithm.
Optionally, the embodiment of the present invention further includes a receiving module, configured to: and receiving electroencephalogram data sent by the wearable terminal equipment.
To achieve the above object, according to still another aspect of embodiments of the present invention, an electronic device of an encryption method is provided.
An electronic device of an embodiment of the present invention includes: one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the encryption method of the embodiment of the present invention.
To achieve the above object, according to still another aspect of an embodiment of the present invention, there is provided a computer-readable storage medium.
A computer-readable medium of an embodiment of the present invention has stored thereon a computer program that, when executed by a processor, implements the encryption method of an embodiment of the present invention.
One embodiment of the above invention has the following advantages or benefits: because the dynamic brain wave is used as the source data and the technical means of secondary encryption are adopted, the technical problem of potential safety hazard caused by simple encryption by adopting a fixed character string in the prior art is solved, the technical effect of improving the safety of the password is further achieved, and the difficulty in password cracking is increased; the uncertainty of the source data is increased by the method of obtaining the dynamic password; the whole key value pair is encrypted for the second time, so that the decryption algorithm has randomness, and the security of the password is greatly improved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of the main steps of a method of encryption according to an embodiment of the invention;
FIG. 2 is a schematic diagram of an implementation of a method of encryption according to an embodiment of the invention;
FIG. 3 is a schematic diagram of the main modules of an encrypted device according to an embodiment of the invention;
fig. 4 is a hardware configuration diagram of an electronic device for implementing the encryption method according to the embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
As described in the background of the present invention, in the prior art, encryption methods performed on a local computer or a server are unique, and all encryption methods are composed of a fixed section of symbol, and the symbol transmitted to the server by each machine is often the same; in addition, the encrypted field is also fixed, which reduces the security of the password, and leads the password to be easy to crack. Therefore, the invention provides a plurality of encryption methods by utilizing a dynamic encryption source and a secondary encryption mode while solving the problem of poor password security in the prior art, so that password updating is safe and reliable.
Fig. 1 is a schematic diagram of the main steps of a method of encryption according to an embodiment of the present invention.
As shown in fig. 1, an encryption method according to an embodiment of the present invention mainly includes the following steps:
step S11: the acquired brain wave data is converted into a oscillogram of brain waves by digital-to-analog conversion. The brain wave data acquired in the step is source data when a password is input, so that the accuracy of the source data is ensured, and meanwhile, the brain wave data is acquired by receiving the data sent by the wearable terminal; and then, carrying out digital conversion on the oscillogram by using Principal Component Analysis (PCA) and determining the main characteristics of the oscillogram, so as to carry out digitization and structuralization on the oscillogram, extract the numerical values with significance and characterize the numerical values.
It should be noted that, because the waveform diagram has uncertainty, the main features of the waveform diagram may be stored for the subsequent verification operation.
Step S12: and extracting the characteristic value of the oscillogram by using a summary algorithm. And extracting characteristic values from the main characteristics of the oscillogram by using a summary algorithm. Specifically, the numerical values corresponding to the main features in step S11 are abstracted to determine more accurate feature values, where the feature values need to be stored for the subsequent verification operation.
Step S13: and taking the characteristic value and the public key as a key value pair, and carrying out first encryption storage on the key value pair. The characteristic value and the public key are stored as an integral key value pair, subsequent verification operation is facilitated after storage, and it needs to be noted that the correctness of the characteristic value is verified firstly in the verification process, and then the public key is verified.
Step S14: and carrying out second encryption storage on the key value pair after the first encryption storage by using the digital certificate. In step S13, the key-value pairs are encrypted and stored in sequence, and this step is to encrypt and store the encrypted key-value pairs again, so as to improve the security and reliability.
Fig. 2 is a schematic diagram of an implementation of a method of encryption according to an embodiment of the present invention.
As shown in fig. 2, the implementation manner of the encryption method according to the embodiment of the present invention includes three parts, which are specifically as follows:
first part, acquisition of source data.
It should be explained that brain waves are some spontaneous rhythmic nerve electrical activities, the frequency of which varies from 1 to 30 times per second and can be divided into four bands, namely delta (1-3 Hz), theta (4-7 Hz), alpha (8-13 Hz) and beta (14-30 Hz). In addition, when the person is awake and focuses on a certain event, a gamma wave with a frequency higher than that of a beta wave is often seen, the frequency is 30-80 Hz, and the amplitude range is indefinite; while other normal brain waves with special waveforms, such as hump wave, sigma wave, lambda wave, kappa-complex wave, mu wave, etc., can appear during sleep.
In addition, when a person is focused on a certain event, a gamma wave having a higher frequency than a beta wave is often observed, and the frequency is 30 to 80Hz, and the amplitude range is not constant, so that when the person is focused on a certain event at a fixed time, the frequency difference of the gamma waves plotted by the brain waves has high plasticity.
These waves can be acquired using existing chips, for example, using an electroencephalogram sensor mounted with a ThinkGear AM chip (ThinkGear AM chip, the first world version developed by Neurosky (chinese name: miraculous science) corporation of usa, which can acquire brain waves and transmit them by means of bluetooth because of using a dry electrode sensor (instead of a conductive adhesive coated wet sensor used in hospitals) and an advanced noise elimination function, so that large-scale application in consumer electronics is possible); of course, the manner of acquiring the electroencephalogram data may be set according to different specific use scenarios, and is not particularly limited herein, and the scope of the present invention is not affected.
And a second part, processing of source data.
The digital-to-analog conversion mode is used, and the basic model structure of all the digital-to-analog conversion at present is used so as to extract the oscillogram of brain waves focusing on the crypto time.
Defining a structural body, analyzing the obtained oscillogram, extracting a peak value and a waveform track, performing multiple times of characterization processing on data in order to ensure the correctness and feasibility of the data, and performing digital conversion on the frequency of the oscillogram, wherein the data is subjected to abstraction processing mainly by using Principal Component Analysis (PCA) to ensure that the obtained data is unique and correct, and then the data is compared and verified.
After the oscillogram is processed by Principal Component Analysis (PCA), a large number of numbers can be obtained, and then a summary algorithm is used for extracting characteristic values. The existing algorithm such as the MD5 algorithm performs digest extraction, and in the subsequent process, we need to encrypt and parse the extracted source data, so the digest obtained here must have a standard digest value, and cannot contain definitions such as waves.
And a third part, encrypting the source data.
It should be noted that the common encryption method is to perform encryption operation in the process of determining characters, however, since there is randomness in the process of acquiring brain waves, the main features determined by Principal Component Analysis (PCA) and the feature values determined by the abstract algorithm need to be stored here.
Then, the eigenvalue and the public key (digital certificate) are stored as a key value pair, and subsequently, in the process of verification, the eigenvalue is verified first, and then, the public key is verified.
And finally, encrypting the key value pair by using the signed digital certificate, namely performing secondary encryption. It is noted that the content to be signed here is the public key of the sender of the message, as well as some other information. However, unlike ordinary digital signatures, the signer in the digital certificate is not an ordinary organization at will, but an organization with a certain level of trust. Generally, the root certificates of the public trust mechanisms are pre-installed on the equipment before the equipment is shipped out. Thus, the digital certificate can ensure that the public key in the digital certificate is indeed the owner of the certificate, or the certificate can be used to confirm the identity of the other party. The digital certificate is mainly used for solving the problem of the safe issuing of the public key.
According to the encryption method provided by the embodiment of the invention, the technical means of using dynamic brain waves as source data and carrying out secondary encryption are adopted, so that the technical problem of potential safety hazards caused by simple encryption by using fixed character strings in the prior art is solved, the technical effect of improving the safety of the password is further achieved, and the difficulty in password cracking is increased; the uncertainty of the source data is increased by the method of obtaining the dynamic password; the whole key value pair is encrypted for the second time, so that the decryption algorithm has randomness, and the security of the password is greatly improved.
Fig. 3 is a schematic diagram of the main blocks of an apparatus for encryption according to an embodiment of the present invention.
As shown in fig. 3, the encryption apparatus 30 according to the embodiment of the present invention mainly includes: a conversion module 31, an extraction module 32, a first processing module 33 and a second processing module 34. Wherein:
a conversion module 31 for converting the acquired brain wave data into a oscillogram of brain waves by digital-to-analog conversion; the extraction module 32 is used for extracting the characteristic value of the oscillogram by using a summary algorithm; the first processing module 33 is configured to perform first encryption storage on the key value pair by using the feature value and the public key as the key value pair; and the second processing module 34 is configured to perform a second encrypted storage on the key-value pair after the first encrypted storage by using the digital certificate.
Optionally, the embodiment of the present invention further includes an analysis module 35, configured to: carrying out digital conversion on the oscillogram by using a principal component analysis method, and then determining the main characteristics of the oscillogram; and, the extraction module 32 is further configured to: and extracting characteristic values from the main characteristics of the oscillogram by using a summary algorithm.
Optionally, the embodiment of the present invention further includes a receiving module 36, configured to: and receiving electroencephalogram data sent by the wearable terminal equipment.
From the above description, it can be seen that the technical problem of potential safety hazard caused by simple encryption by using a fixed character string in the prior art is solved because the dynamic brain wave is used as the source data and the technical means of secondary encryption are adopted, so that the technical effect of improving the password security is achieved, and the difficulty in password cracking is increased; the uncertainty of the source data is increased by the method of obtaining the dynamic password; the whole key value pair is encrypted for the second time, so that the decryption algorithm has randomness, and the security of the password is greatly improved.
The invention also provides an electronic device and a readable medium according to the embodiment of the invention.
Referring now to FIG. 4, shown is a block diagram of a computer system 400 suitable for use in implementing a terminal device of an embodiment of the present application. The terminal device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 4, the computer system 400 includes a Central Processing Unit (CPU)401 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the system 400 are also stored. The CPU 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to embodiments of the present disclosure, the processes described above with reference to the main step diagrams may be implemented as computer software programs. For example, the disclosed embodiments of the invention include a computer program product comprising a computer program embodied on a computer readable medium, the computer program containing program code for performing the method illustrated in the main step diagram. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411. The above-described functions defined in the system of the present application are executed when the computer program is executed by a Central Processing Unit (CPU) 401.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present application may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a conversion module, an extraction module, a first processing module, and a second processing module. Wherein the names of the modules do not in some cases constitute a limitation of the module itself.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: converting the acquired brain wave data into a oscillogram of brain waves by digital-to-analog conversion; extracting a characteristic value of the oscillogram by using a summary algorithm; carrying out primary encryption storage on the characteristic value and the public key as a key value pair; and carrying out secondary encryption storage on the key value pair by using the digital certificate.
The product can execute the method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiment of the present invention.
According to the technical scheme of the embodiment of the invention, because the dynamic brain waves are used as the source data and the technical means of secondary encryption are adopted, the technical problem of potential safety hazards caused by simple encryption by adopting fixed character strings in the prior art is solved, the technical effect of improving the safety of the password is further achieved, and the difficulty of password cracking is increased; the uncertainty of the source data is increased by the method of obtaining the dynamic password; the whole key value pair is encrypted for the second time, so that the decryption algorithm has randomness, and the security of the password is greatly improved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method of encryption, comprising:
converting the acquired brain wave data into a oscillogram of brain waves by digital-to-analog conversion;
determining the frequency of the oscillogram according to the peak value of the oscillogram and the track of the waveform;
extracting a characteristic value corresponding to the frequency of the oscillogram by using an abstract algorithm;
taking the characteristic value and the public key as a key value pair, and carrying out first encryption storage on the key value pair;
and carrying out second encryption storage on the key value pair after the first encryption storage by using a digital certificate.
2. The method of claim 1,
before the step of extracting the feature values of the oscillogram by using the abstract algorithm, the method further comprises the following steps: carrying out digital conversion on the oscillogram by using a principal component analysis method, and then determining the main characteristics of the oscillogram;
the step of extracting the feature values of the oscillogram by using the abstract algorithm includes: and extracting the characteristic value from the main characteristic of the oscillogram by using a summary algorithm.
3. The method as claimed in claim 1, further comprising, before the step of converting the acquired brain wave data into a oscillogram of brain waves: and receiving electroencephalogram data sent by the wearable terminal equipment.
4. An apparatus for encryption, comprising:
the conversion module is used for converting the acquired brain wave data into a oscillogram of brain waves by using digital-to-analog conversion;
the extraction module is used for determining the frequency of the oscillogram according to the peak value of the oscillogram and the track of the waveform; extracting a characteristic value corresponding to the frequency of the oscillogram by using an abstract algorithm;
the first processing module is used for carrying out first encryption storage on the key value pair by taking the characteristic value and the public key as the key value pair;
and the second processing module is used for carrying out second encryption storage on the key value pairs after the first encryption storage by using the digital certificate.
5. The apparatus of claim 4,
further comprising an analysis module for: carrying out digital conversion on the oscillogram by using a principal component analysis method, and then determining the main characteristics of the oscillogram;
and, the extraction module is further configured to: and extracting the characteristic value from the main characteristic of the oscillogram by using a summary algorithm.
6. The apparatus of claim 4, further comprising a receiving module configured to: and receiving electroencephalogram data sent by the wearable terminal equipment.
7. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-3.
8. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1-3.
CN201710399445.5A 2017-05-31 2017-05-31 Encryption method and device Active CN108989015B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710399445.5A CN108989015B (en) 2017-05-31 2017-05-31 Encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710399445.5A CN108989015B (en) 2017-05-31 2017-05-31 Encryption method and device

Publications (2)

Publication Number Publication Date
CN108989015A CN108989015A (en) 2018-12-11
CN108989015B true CN108989015B (en) 2021-11-02

Family

ID=64501862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710399445.5A Active CN108989015B (en) 2017-05-31 2017-05-31 Encryption method and device

Country Status (1)

Country Link
CN (1) CN108989015B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711178B (en) * 2018-12-18 2021-02-19 北京城市网邻信息技术有限公司 Key value pair storage method, device, equipment and storage medium
CN115664641B (en) * 2022-12-26 2023-03-14 飞腾信息技术有限公司 Method and device for verifying round key in encryption algorithm

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3878542B2 (en) * 2002-11-29 2007-02-07 株式会社東芝 Recording device
US20070191691A1 (en) * 2005-05-19 2007-08-16 Martin Polanco Identification of guilty knowledge and malicious intent
CN100470572C (en) * 2007-01-08 2009-03-18 北京飞天诚信科技有限公司 Method and device for raising safety of data input
US20100299517A1 (en) * 2009-05-22 2010-11-25 Nuvon, Inc. Network System with a Plurality of Networked Devices with Various Connection Protocols
CN103825727A (en) * 2012-11-19 2014-05-28 厦门雅迅网络股份有限公司 Generation method for random secret key
US9906952B2 (en) * 2014-03-28 2018-02-27 Vivint, Inc. Anti-takeover systems and methods for network attached peripherals
CN103929311B (en) * 2014-04-28 2015-09-09 无锡北斗星通信息科技有限公司 A kind of challenge type dynamic password authentication method based on brain wave wave character
CN103955677B (en) * 2014-05-12 2017-05-24 南京大学 Electrocardiogram recognizing method based on privacy protection
CN106301767B (en) * 2015-05-13 2020-01-03 中兴通讯股份有限公司 Encrypted call processing method, device, terminal and KMC
CN104993922B (en) * 2015-05-26 2018-12-07 惠州Tcl移动通信有限公司 A kind of intelligent wearable device and its encryption and decryption method
CN105868610A (en) * 2016-04-26 2016-08-17 乐视控股(北京)有限公司 Method and system for realizing user authentication through biological characteristic information
CN106027503A (en) * 2016-05-09 2016-10-12 浪潮集团有限公司 Cloud storage data encryption method based on TPM
CN106503517B (en) * 2016-10-12 2019-09-03 中国电子科技集团公司电子科学研究院 A kind of security certification system based on the acquisition of virtual implementing helmet brain line

Also Published As

Publication number Publication date
CN108989015A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
US11683187B2 (en) User authentication with self-signed certificate and identity verification and migration
CN111062024B (en) Application login method and device
EP2963958A1 (en) Network device, terminal device and information security improving method
CN108075888B (en) Dynamic URL generation method and device, storage medium and electronic equipment
CN108989015B (en) Encryption method and device
CN112039826A (en) Login method and device applied to applet terminal
CN108599934A (en) It is a kind of to test safe and secret Enhancement Method for quantum key distribution
CN113806794A (en) Processing method and device for electronic signature of file, computer equipment and storage medium
CN112116474A (en) Electronic contract verification method and device, electronic equipment and storage medium
CN109039997B (en) Secret key obtaining method, device and system
CN110266653B (en) Authentication method, system and terminal equipment
CN114584381A (en) Security authentication method and device based on gateway, electronic equipment and storage medium
CN114710274A (en) Data calling method and device, electronic equipment and storage medium
JP6574265B2 (en) Authentication control system, server device, authentication control method, and program
CN109150898B (en) Method and apparatus for processing information
CN115361450B (en) Request information processing method, apparatus, electronic device, medium, and program product
CN107358032B (en) Product upgrading method and device and product upgrading system
CN114363094B (en) Data sharing method, device, equipment and storage medium
WO2022073336A1 (en) Secure payment method and apparatus, electronic device, and storage medium
CN114239014A (en) File processing method and device based on offline device and electronic device
CN114022161A (en) Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium
CN114036364A (en) Method, apparatus, device, medium and product for identifying a crawler
CN115086428A (en) Network request sending method and device and electronic equipment
CN114024780B (en) Node information processing method and device based on Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant