CN109005196A - Data transmission method, data decryption method, device and electronic equipment - Google Patents

Data transmission method, data decryption method, device and electronic equipment Download PDF

Info

Publication number
CN109005196A
CN109005196A CN201811048158.0A CN201811048158A CN109005196A CN 109005196 A CN109005196 A CN 109005196A CN 201811048158 A CN201811048158 A CN 201811048158A CN 109005196 A CN109005196 A CN 109005196A
Authority
CN
China
Prior art keywords
data
key
encryption
encryption key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811048158.0A
Other languages
Chinese (zh)
Inventor
滕飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201811048158.0A priority Critical patent/CN109005196A/en
Publication of CN109005196A publication Critical patent/CN109005196A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

It includes: to be encrypted using the first encryption key to be-encrypted data that the embodiment of the present invention, which provides a kind of data transmission method, data decryption method, device and electronic equipment, the data transmission method, obtains encryption data;First encryption key is encrypted using the second encryption key, obtains protection key;And the encryption data and the protection key are sent to data receiver.

Description

Data transmission method, data decryption method, device and electronic equipment
Technical field
The present invention relates to data processing fields, in particular to a kind of data transmission method, data decryption method, dress It sets and electronic equipment.
Background technique
With the development of computer technology, the various aspects in life can be realized by computer technology, for example, religion It educates, finance, the fields such as security protection.Every field all passes through computer technology and has obtained developing well, consequently also brings The safety problem of personal information, the information transmission between each equipment are transmitted or the mode of single encryption by clear-text way, All there is security risk in more or less personal information.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of data transmission method, data decryption method, device And electronic equipment.
In a first aspect, a kind of data transmission method provided in an embodiment of the present invention, comprising:
Be-encrypted data is encrypted using the first encryption key, obtains encryption data;
First encryption key is encrypted using the second encryption key, obtains protection key;And
The encryption data and the protection key are sent to data receiver.
Optionally, before the second encryption key of the use encrypts first encryption key, further includes:
The second encryption key is obtained from the library so.
Optionally, described the step of obtaining the second encryption key from the library so, comprising:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
Optionally, before the second encryption key of the use encrypts first encryption key, further includes:
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas with The form of byte arrays is stored in the library so;
Record position of the every part of key data in the library so.
Optionally, described the step of obtaining the second encryption key from the library shared object so, comprising:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it then will be more after recovery Part key data merges to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and is obtained Second encryption key.
Optionally, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to recovery operation.
It is optionally, described that key data is restored into the step of obtaining the second encryption key, comprising:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
It is optionally, described that key data is restored into the step of obtaining the second encryption key, comprising:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are carried out Inversion operation;Or,
By the key data carry out inversion operation, obtain the 4th data, by the 4th data high-order digit with Low data carries out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, it will be in the 5th data High-order digit and low data carry out mixed bit recovery operation.
Optionally, first recovery operation includes: by the digit deletion operation of designated position, inversion operation, high-low-position Mix at least one of recovery operation.
Optionally, first encryption key is symmetric cryptographic key.
Optionally, first encryption key is Advanced Encryption Standard key.
Optionally, second encryption key is asymmetric cryptographic key.
Optionally, second encryption key is RSA key.
Optionally, before being encrypted using the first encryption key to be-encrypted data, further includes: random to generate one Target AES key is as the first encryption key;
Described the step of be-encrypted data is encrypted using the first encryption key, comprising: close using the target AES Key be-encrypted data is encrypted, and encryption key is obtained.
Optionally, the be-encrypted data includes that the testimony of a witness compares record, in the first encryption key of use to be-encrypted data Before the step of being encrypted, obtaining encryption data, the method also includes:
Acquire the face image of target user;
The certificate information of the target user is obtained, it includes that face image and the certificate are believed that the testimony of a witness, which compares record, Breath.
Second aspect, the embodiment of the present invention also provide a kind of data decryption method, comprising:
Encryption data and protection key are received, the encryption data is the data using the first encryption keys, described Protecting key is the key obtained using the second encryption key to first encryption key;
The protection key is decrypted to obtain described first using second encryption key corresponding decruption key Encryption key;
The encryption data is decrypted to obtain initial data using first encryption key.
Optionally, first encryption key is symmetric cryptographic key.
Optionally, the corresponding decruption key of second encryption key is asymmetric decruption key.
The third aspect, the embodiment of the present invention also provide a kind of data transmission device, comprising:
First encrypting module obtains encryption data for encrypting using the first encryption key to be-encrypted data;
Second encrypting module is protected for being encrypted using the second encryption key to first encryption key Key;And
Sending module, for the encryption data and the protection key to be sent to data receiver.
Fourth aspect, the embodiment of the present invention also provide a kind of data decryption apparatus, comprising:
Receiving module, for receiving encryption data and protection key, the encryption data is to be added using the first encryption key Close data, the protection key is the key obtained using the second encryption key to first encryption key;
First deciphering module, for being carried out using the corresponding decruption key of second encryption key to the protection key Decryption obtains first encryption key;
Second deciphering module, for being decrypted to obtain original number to the encryption data using first encryption key According to.
5th aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising: memory and processor, it is described to deposit Reservoir for storing computer program, the processor is used to that the computer program to be read and run from the memory, To execute the above method.
6th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program executes above-mentioned method when being run by processor the step of.
Compared with prior art, the data transmission method of the embodiment of the present invention, by the base for encrypting be-encrypted data On plinth, further the key of encryption be-encrypted data is encrypted, to realize double-encryption, improves be-encrypted data Safety.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the block diagram of electronic equipment provided in an embodiment of the present invention.
Fig. 2 is the flow chart of data transmission method provided in an embodiment of the present invention.
Fig. 3 is the flow chart of data decryption method provided in an embodiment of the present invention.
Fig. 4 is the functional block diagram of data transmission device provided in an embodiment of the present invention.
Fig. 5 is the functional block diagram of data decryption apparatus provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The each embodiment of the application can be used in technical field of face recognition.Wherein, face recognition technology is widely used in Education, finance, the fields such as security protection.It is that face recognition technology lands an embodiment that the testimony of a witness, which veritifies all-in-one machine,.After the completion of the testimony of a witness is veritified, The personal information verified can be needed to upload to backstage by collecting.It may be comprising being compared personal identity in the personal information The sensitive informations such as information, name, passport NO., address, date of birth, certificate photograph, on-the-spot testing photo.Existing some numbers It according to upper crossing, may be uploaded using clear-text way, but the mode of upload is not due to encrypting personal information in plain text, institute To store bigger risk, for example, leakage personally identifiable information.
Based on deficiency present in foregoing description, the application, which provides multiple embodiments, can efficiently solve above-mentioned deficiency, It is described in detail below.
Embodiment one
Firstly, describing the exemplary electronic device of the data transmission method for realizing the embodiment of the present invention referring to Fig.1 100.The exemplary electronic device 100 can be computer, be also possible to the mobile terminals such as smart phone, tablet computer.
As shown in Figure 1, electronic equipment 100 includes one or more processors 102, one or more storage devices 104.It can Selection of land, electronic equipment 100 can also include input unit 106, output device 108 and image collecting device 110, these components It is interconnected by bindiny mechanism's (not shown) of bus system 112 and/or other forms.It should be noted that electronic equipment shown in FIG. 1 100 component and structure be it is illustrative, and not restrictive, as needed, the electronic equipment also can have other Component and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data The processing unit of reason ability and/or the other forms of instruction execution capability, and can control its in the electronic equipment 100 Its component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non- Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute The client functionality (realized by processor) in the embodiment of the present invention stated and/or other desired functions.In the meter Can also store various application programs and various data in calculation machine readable storage medium storing program for executing, for example, the application program use and/or The various data etc. generated.
The input unit 106 can be the device that user is used to input instruction, and may include keyboard, mouse, wheat One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and It and may include one or more of display, loudspeaker etc..
Described image acquisition device 110 can shoot the desired image of user (such as photo, video etc.), and will be clapped The image taken the photograph is stored in the storage device 104 for the use of other components.
Illustratively, for realizing data statistical approach according to an embodiment of the present invention, the exemplary electron of apparatus and system Each device in equipment can integrate setting, such as can also be filled processor 102, storage device 104, input with scattering device Set 106 and output device 108 it is integrally disposed in one, and it is image collecting device 110 is separately positioned.
In the present embodiment, electronic equipment 100 may be implemented as the above-mentioned testimony of a witness and veritify all-in-one machine;Also it may be implemented as The server of all-in-one machine communication connection is veritified with the testimony of a witness.Wherein, server veritifies one by network and one or more testimony of a witnesies Machine is communicatively coupled, to carry out data communication or interaction.The server can be network server, database server Deng.
In the present embodiment, veritifying the data transmitted between all-in-one machine and server in the testimony of a witness can be used asymmetric encryption side Method is encrypted.In a usage scenario, the testimony of a witness is veritified in all-in-one machine and sends the data for needing to authenticate, server to server The data received are authenticated, and veritify all-in-one machine return authentication as a result, then testimony of a witness veritification all-in-one machine can be to clothes to the testimony of a witness Business device transmission needs data to be protected, can veritify public key of the storage for encryption in all-in-one machine in the testimony of a witness, store in server There is the private key for decryption.In another scene, the public key for encryption can also be stored in the server, and the testimony of a witness veritifies one Private key of the storage for decryption in machine.In other scenes, server and the testimony of a witness, which veritify all-in-one machine, can all send mutually some privates The relatively high data of close property can be veritified in server and the testimony of a witness and be stored for the public key of encryption in all-in-one machine and for decrypting Private key.
Embodiment two
Referring to Fig. 2, being the flow chart of data transmission method provided in an embodiment of the present invention.It below will be to shown in Fig. 2 Detailed process is described in detail.
Step S201 encrypts be-encrypted data using the first encryption key, obtains encryption data.
In the present embodiment, the first encryption key can be generated by setting regular random.
Step S202 encrypts first encryption key using the second encryption key, obtains protection key.
In the present embodiment, the second encryption key can be stored in the library so (Shared Object), need using when from The second encryption key is obtained in the library so.Wherein, the library so is a binary file, is difficult by decompiling, so as to improve The safety of two encryption keys.
So file is the dynamic link library of unix, is binary file.In Android project, dynamic library file (* is called It .so) is the api that load so file provides by way of jni.
The encryption data and the protection key are sent to data receiver by step S203.
Data receiver in the present embodiment can be server, or can be authenticated, be known to be-encrypted data Not Deng processing management terminal.
In the present embodiment, the first encryption key can be symmetric cryptographic key.Wherein, symmetric encryption method is using same Key realizes encryption and decryption.Therefore, it is necessary to which the first encryption key is sent to data receiver, so that data receiver The first encryption key can be used the encryption data received is decrypted.
In one embodiment, first encryption key is Advanced Encryption Standard key (Advanced Encryption Standard, AES).
When needing to encrypt using AES key, a target AES key can be generated at random as the first encryption key.
In other embodiment, the first encryption key can also be other symmetric cryptographic key, for example, DES (Data Encryption Standard, i.e. data encryption standards), 3DES (Triple DES, i.e., triple data encryption algorithm), TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK etc..Those skilled in the art can select any according to specific requirements Encryption key is as the first encryption key.
In the present embodiment, the second encryption key can be asymmetric cryptographic key.Wherein, it is stored in for the public key of encryption In the electronic equipment for executing the data transmission method in the present embodiment;Private key for decryption is stored in receiving step S203 transmission Encryption data data receiver.
In the present embodiment, second encryption key can be RSA key.RSA key is using RSA cryptographic algorithms to be added Ciphertext data is encrypted.RSA cryptographic algorithms are a kind of rivest, shamir, adelmans.
In the present embodiment, RSA key can be stored in code, can also be stored in text file.It is optional at one Embodiment in, RSA key can be stored in code.For example, RSA key can be converted to binary data, this A binary data can be split into more parts according to length, and every part is all stored in code in the form of byte arrays.Example Such as, saved in code be just analogous to 011110010 as binary data.It in another embodiment can be by RSA Key is stored in the library so.The library so is a binary file, is difficult by by decompiling.RSA data are stored in the library so, Than being placed in java code, safety can be improved.When needing using RSA public key, RSA key is obtained from the library so.
The data transmission method of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.Further Ground, in the data obtained by above-mentioned data encryption algorithm, the data for needing to transmit all are encryption datas, and transmission can be used It is safer.
In the present embodiment, described the step of obtaining the second encryption key from the library so, can be implemented by following steps: from So obtains key data in library;Key data is restored to obtain the second encryption key.
It is to be first converted into binary data in the library so since the second encryption key is stored in, after obtaining key data It needs binary data being converted into key parameter.
In detail, the second encryption key can be converted to binary data, this binary data, can be according to length Degree, is split into four parts of key datas, every part of key data is all stored in the library so in the form of byte arrays, and records every part Position of the key data in the library so.This four parts of key datas can store under the same catalogue in the library so, also can store Under the different directories in the library so, the present embodiment is not construed as limiting this.When using the second encryption key, it is necessary to by four parts of keys Data are taken out from the library so and carry out union operation to restore the second encryption key, alternatively, four parts of key datas are merged, Then the key data after merging is subjected to recovery operation again and obtains the second encryption key, added so as to further increase second The safety of key.
It can be in the corresponding binary data of the second encryption key of storage in order to increase the difficulty that cracks of the second encryption key Added with some hashes as interference when into the library so.Second encryption key is when being stored in the library so, in addition to cipher key number According to being also possible to will include some other hashes for interference, if desired restores to obtain the second encryption key, then need First hash is removed.
In one embodiment, described that key data is restored into the step of obtaining the second encryption key, it can be by reality It applies are as follows:
The hash in the key data is removed, valid data are obtained;
The valid data are restored to obtain the second encryption key.
Wherein, hash can be inserted into useful data according to the rule of setting.Second encryption key is converted into two After binary data, multiple groups byte arrays are split into, the hash for interference, example can be added in every part of byte arrays Such as, M hash is initially inserted at N.Therefore, after obtaining key data, need to delete M nothing of N beginnings Use data.It is, of course, also possible to be obtained according to other rule insertion hashes so as to effectively improve key data by other people The difficulty cracked after taking.
In the present embodiment, in order to which increase by the second encryption key cracks difficulty, the safety of data encryption is improved, it can be with Further one or more operation bidirectionals can be carried out to the corresponding binary data of the second key data in storage, thus The safety of the second encryption key is further improved, to also can be improved the safety of data.
In another embodiment, it is described key data is restored into the step of obtaining the second encryption key can be by reality It applies are as follows:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation and obtain the second encryption key.
Wherein, the first recovery operation is used to carry out recovery operation to the key data for carrying out operation bidirectional, to obtain Positive sequence data.Positive sequence data can be expressed as the second encryption key and carry out the corresponding data of Binary Conversion.
In order to further improve the safety of the second encryption key, increase by the second encryption key cracks difficulty, can be with Cryptographic operation is executed when storing the corresponding binary data of the second encryption key into the library so.Such as: by the second encryption key Corresponding binary data overall execution cryptographic operation, then stores into the library so;Alternatively, by the second encryption key corresponding two Binary data splits into more parts of data, executes cryptographic operation to every part of data respectively, then by more parts of data storages into the library so; Alternatively, first executing cryptographic operation to the corresponding binary data of the second encryption key, then encrypted data are split into again More parts of storages are into the library so.In the present embodiment, cryptographic operation can be the operation or additional of above-described addition hash Operation, or add the operation of hash and the combination of operation bidirectional.
In some embodiments, first added with some hashes as interference, further, can also further into The one or more operation bidirectionals of row, to realize dual interference.The operation for adding hash is fixed on the second encryption key The first step for carrying out cryptographic operation, without the step of recording the operation, in decryption oprerations when to the second encryption key decryption The hash of addition is removed in final step, advantageously reduces the complexity of operation.
When obtaining out the corresponding data of the second encryption key from the library so, using the decryption oprerations corresponding with cryptographic operation It can restore to obtain the second encryption key.
There are also in a kind of embodiment, it is described key data is restored into the step of obtaining the second encryption key can be by reality It applies are as follows:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation and obtain the second encryption key.
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume Outer operation can be in the designated position of data addition additional characters, data be carried out inversion operation or by the high position in data Data exchange the operation of position with low data.
In detail, described that the key data is subjected to the first recovery operation, comprising: will be specified in the key data The digit deletion of position.
For example, increasing several numbers by the head in the binary data of the second encryption key conversion, cipher key number is formed According to being stored in the library so again.At this point, the first recovery operation can be the increased several digit deletions in the head in key data. In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Further, then Increase a number 1 on the head of digital " 011110010 ", obtains key data " 1011110010 ".Then the first recovery operation It can be the first bit digital deleted in key data " 1011110010 ", obtain positive sequence data " 011110010 ".The example above In only head increase a number be it is schematical, those skilled in the art can increase on head more according to demand Number, present embodiment can't be limited with the quantity of increased number.
For another example several numbers, shape can be increased in the tail portion in the binary data converted by the second encryption key It is stored in the library so again at key data.At this point, the first recovery operation can be the tail portion in key data is increased several Digit deletion.In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Into One step, then increase a number 1 in the tail portion of digital " 011110010 ", obtain key data " 0111100101 ".Then first Recovery operation can be the last one-bit digital deleted in key data " 1011110010 ", obtain positive sequence data “011110010”。
In detail, described that the key data is subjected to the first recovery operation, comprising: to negate the key data Operation.
For example, carrying out inversion operation by the number in the binary data of the second encryption key conversion, number 0 is become 1, Number 1 becomes 0.At this point, the first recovery operation, which can be, carries out inversion operation again for 0 or 1 in key data, to restore number According to.In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Further Ground, then inversion operation is carried out in digital " 011110010 ", obtain key data " 100001101 ".Then the first recovery operation can be with Inversion operation is carried out to key data " 100001101 ", obtains positive sequence data " 011110010 ".
In detail, described that the key data is subjected to the first recovery operation, comprising: by the high position in the key data Number carries out mixed bit recovery operation with low data.
For example, carrying out high-order digit and low data progress by the number in the binary data of the second encryption key conversion Mixed bit manipulation, by high-order digit and status data place-exchange.At this point, the first recovery operation can be the height in key data Bit digital and status data place-exchange, to restore data.In an example, the second encryption key is carried out being converted to two Binary data indicates are as follows: 01111001.Further, then in digital " 01111001 " high-order digit " 0111 " and lower-order digit are carried out According to " 1001 " place-exchange, key data " 10010111 " are obtained.Then the first recovery operation can be to key data The high-order digit and status data place-exchange of " 10010111 ", obtain positive sequence data " 01111001 ".
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume Outer operation may include the designated position addition additional characters of data, data be carried out to inversion operation and by the high position in data Data exchange three kinds of operation bidirectionals of the operation of position with low data.Not to the correspondence of three kinds of operation bidirectionals in the present embodiment Recovery operation execution sequence be limited, specifically can with storage when execute the sequence of operation bidirectional it is opposite.Below with three kinds It is described for one of operation bidirectional combination sequence.It is corresponding to it, it is described that the key data is subjected to the first recovery Operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume Outer operation may include the designated position addition additional characters of data, data be carried out to inversion operation and by the high position in data Data exchange any two kinds of operation bidirectionals of the operation of position with low data.Not to any two kinds additional behaviour in the present embodiment The execution sequence for the corresponding recovery operation made is limited, specifically can be opposite with the execution sequence of operation bidirectional when storage.Under Face is described by taking one of combination of two sequence as an example.It is corresponding to it, it is described that the key data is subjected to the first recovery Operation can be implemented by following various ways.
The first embodiment, it is described by the key data carry out the first recovery operation include: by the key data In designated position digit deletion, obtain third data;The third data are subjected to inversion operation.
Second of embodiment, it is described by the key data carry out the first recovery operation include: by the key data Inversion operation is carried out, the 4th data are obtained;High-order digit in 4th data is subjected to mixed bit recovery behaviour with low data Make.
The third embodiment, it is described by the key data carry out the first recovery operation include: by the key data In designated position digit deletion, obtain the 5th data;High-order digit in 5th data is carried out with low data Mixed bit recovery operation.
About above-mentioned each embodiment can with specific reference to front the designated position of data addition additional characters, Data are subjected to inversion operation or high position data and the low data in data are exchanged into the corresponding each embodiment party of the operation of position It is described in detail in formula.
Data transmission method in the present embodiment can be applied in all kinds of scenes that there are transmission data, for example, passing through It is interacted with background server in being verified;In the message transmission of instant messaging tools;The transmission of cloud storage data is medium.Below By a specific scene, the use of the data ciphering method in the present embodiment is described.
In an application scenarios, the data transmission method in the present embodiment can be used for use the testimony of a witness veritify all-in-one machine Data transmission when being verified to the identity of user.Then the be-encrypted data in step S201 can be testimony of a witness comparison record, Specifically, it may comprise steps of: the face image of a. acquisition target user;B. the certificate letter of the target user is obtained Breath, it includes face image and the certificate information that the testimony of a witness, which compares record,;C. the testimony of a witness is compared using the first encryption key and is remembered Record is encrypted, and encryption data is obtained;D. first encryption key is encrypted using the second encryption key, is protected Key;E. the encryption data and the protection key are sent to data receiver.
In this application scenarios, above-mentioned data receiver, which can be, compares the backstage clothes that record is verified to the testimony of a witness Verification result can be returned to data sending terminal by business device, background server, be demonstrate,proved with realizing without results.
About under this scene use data transmission method other details can further refer to front detailed description, Details are not described herein.
By being encrypted to data, so as to improve number before transmitting data to the data receiver on backstage According to the safety of transmission.Further, it also avoids the data in transmission from being tampered, causes to be likely to occur authentication error, so as to To improve the accuracy rate of verifying.
Embodiment three
Referring to Fig. 3, being the flow chart of data decryption method provided in an embodiment of the present invention.It below will be to shown in Fig. 3 Detailed process is described in detail.
Step S301 receives encryption data and protection key.
In the present embodiment, the encryption data is the data using the first encryption keys, and the protection key is to make The key that first encryption key is obtained with the second encryption key.
Step S302 is decrypted to obtain using the corresponding decruption key of second encryption key to the protection key First encryption key.
Step S303 is decrypted to obtain initial data using first encryption key to the encryption data.
In the present embodiment, first encryption key is symmetric cryptographic key.
In the present embodiment, the corresponding decruption key of second encryption key is asymmetric cryptographic key.
In the present embodiment, the corresponding decruption key of the second encryption key can be according to the second encryption key in embodiment two Storage mode stored.
Implementablely, can be when storing decruption key, in the designated position of decruption key, insertion is for the useless of interference Data.Therefore, it obtains decruption key to need to delete hash, retains useful data, then restore useful data Decruption key can be obtained.
In the present embodiment, when storing decruption key, one or more operation bidirectionals can also be executed, operation bidirectional can be with It is in the designated position of data addition additional characters, data is subjected to inversion operation, by the high position data and lower-order digit in data One of operation according to exchange position or a variety of operations.Therefore, when obtaining decruption key, each operation bidirectional pair is needed to be implemented The recovery operation answered is to obtain decruption key.
Recovery operation about operation bidirectional can be with the detailed description in reference implementation example two, and details are not described herein.
Data decryption method in through this embodiment is cooperated with data transmission method shown in Fig. 2, can be used The transmission of data is safer, also being capable of effectively restoring data.
Example IV
Referring to Fig. 4, being the functional block diagram of data transmission device provided in an embodiment of the present invention.In the present embodiment Data transmission device in modules be used to execute each step in method in above-described embodiment two.The data pass Defeated device comprises the following modules.
First encrypting module 401 obtains encryption number for encrypting using the first encryption key to be-encrypted data According to.
Second encrypting module 402 is protected for being encrypted using the second encryption key to first encryption key Protect key.
Sending module 403, for the encryption data and the protection key to be sent to data receiver.
The second encryption key in the present embodiment can store in the library so, and therefore, the data in the present embodiment transmit dress It sets, further includes: module 404 is obtained, for obtaining the second encryption key from the library so.
Data transmission device in the present embodiment can also include: memory module, and being used for can by second encryption key To be converted to binary data;
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas with The form of byte arrays is stored in the library so, wherein the more parts of key datas are stored under the same catalogue in the library so, or are deposited Storage is under the different directories in the library so;
Record position of the every part of key data in the library so.
In the present embodiment, the acquisition module 404 is also used to:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
The acquisition module 404, is also used to:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it then will be more after recovery Part key data merges to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and is obtained Second encryption key.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to recovery operation.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are carried out Inversion operation;Or,
By the key data carry out inversion operation, obtain the 4th data, by the 4th data high-order digit with Low data carries out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, it will be in the 5th data High-order digit and low data carry out mixed bit recovery operation.
In the present embodiment, first encryption key is symmetric cryptographic key.
In the present embodiment, first encryption key is Advanced Encryption Standard key.
In the present embodiment, second encryption key is asymmetric cryptographic key.
In the present embodiment, second encryption key is RSA key.
Data transmission device in the present embodiment can also include: generation module, close for generating a target AES at random Key is as the first encryption key;
First encrypting module 401, is also used to: being encrypted, is obtained using the target AES key be-encrypted data Encryption key.
Data transmission device in the present embodiment can also include: acquisition module, and the face for acquiring target user schemes Picture;
Module is obtained, for obtaining the certificate information of the target user, it includes face image that the testimony of a witness, which compares record, With the certificate information.
First encrypting module 401 is also used for the first encryption key and encrypts to testimony of a witness comparison record, Obtain encryption data.
The data transmission device of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.
Other details about the present embodiment can also further refer to the description in the method in above-described embodiment two, Details are not described herein.
Embodiment five
Referring to Fig. 5, being the functional block diagram of data decryption apparatus provided in an embodiment of the present invention.In the present embodiment Data decryption apparatus modules be used for execute above-described embodiment three offer embodiment of the method in each step.It is described Data decryption apparatus comprises the following modules.
Receiving module 501, for receiving encryption data and protection key, the encryption data is to use the first encryption key The data of encryption, the protection key is the key obtained using the second encryption key to first encryption key.
First deciphering module 502, for using the corresponding decruption key of second encryption key to the protection key It is decrypted to obtain first encryption key.
Second deciphering module 503, for being decrypted to obtain original to the encryption data using first encryption key Beginning data.
Wherein, the first encryption key is symmetric cryptographic key.
In the present embodiment, the corresponding decruption key of second encryption key is asymmetric decruption key.
About the present embodiment other details can further reference implementation example three provide embodiment of the method in retouch It states, details are not described herein.
The data decryption apparatus of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.
The embodiment of the present invention also provides a kind of computer readable storage medium, stores on the computer readable storage medium There is computer program, the step in above method embodiment is executed when the computer program is run by processor.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (20)

1. a kind of data transmission method characterized by comprising
Be-encrypted data is encrypted using the first encryption key, obtains encryption data;
First encryption key is encrypted using the second encryption key, obtains protection key;And
The encryption data and the protection key are sent to data receiver.
2. data transmission method as described in claim 1, which is characterized in that described to use the second encryption key to described first Before encryption key is encrypted, further includes:
The second encryption key is obtained from the library shared object so.
3. data transmission method as claimed in claim 2, which is characterized in that it is described obtained from the library shared object so second plus The step of key, comprising:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
4. data transmission method as claimed in claim 2, which is characterized in that further include:
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas is with byte The form of array is stored in the library so;
Record position of the every part of key data in the library so.
5. data transmission method as claimed in claim 4, which is characterized in that it is described obtained from the library shared object so second plus The step of key, comprising:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it is then that more parts after recovery are close Key data merge to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and obtains second Encryption key.
6. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data Following manner is realized:
The hash in the key data is removed, valid data are obtained;
The valid data are restored.
7. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data Following manner is realized:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
8. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data Following manner is realized:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
9. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first Recovery operation, comprising:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
10. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first Recovery operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
11. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first Recovery operation, comprising:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are negated Operation;Or,
The key data is subjected to inversion operation, the 4th data are obtained, by the high-order digit and low level in the 4th data Data carry out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, by the high position in the 5th data Number carries out mixed bit recovery operation with low data.
12. data transmission method as described in claim 1, which is characterized in that first encryption key is that symmetric cryptography is close Key, second encryption key is asymmetric cryptographic key.
13. data transmission method as claimed in claim 12, which is characterized in that in the first encryption key of use to number to be encrypted According to before being encrypted, further includes: generate a target AES key at random as the first encryption key;
Described the step of be-encrypted data is encrypted using the first encryption key, comprising: waited for using the target AES key Encryption data is encrypted, and encryption key is obtained.
14. the data transmission method as described in claim 1-13 any one, which is characterized in that the be-encrypted data includes The testimony of a witness compares record, before the step of being encrypted to be-encrypted data using the first encryption key, obtain encryption data, institute State method further include:
Acquire the face image of target user;
The certificate information of the target user is obtained, it includes face image and the certificate information that the testimony of a witness, which compares record,.
15. a kind of data decryption method characterized by comprising
Encryption data and protection key are received, the encryption data is the data using the first encryption keys, the protection Key is the key obtained using the second encryption key to first encryption key;
The protection key is decrypted using second encryption key corresponding decruption key to obtain first encryption Key;
The encryption data is decrypted to obtain initial data using first encryption key.
16. data decryption method as claimed in claim 15, which is characterized in that first encryption key is that symmetric cryptography is close Key, the corresponding decruption key of second encryption key is asymmetric cryptographic key.
17. a kind of data transmission device characterized by comprising
First encrypting module obtains encryption data for encrypting using the first encryption key to be-encrypted data;
Second encrypting module obtains protection key for encrypting using the second encryption key to first encryption key; And
Sending module, for the encryption data and the protection key to be sent to data receiver.
18. a kind of data decryption apparatus characterized by comprising
Receiving module, for receiving encryption data and protection key, the encryption data is to use the first encryption keys Data, the protection key is the key obtained using the second encryption key to first encryption key;
First deciphering module, for the protection key to be decrypted using second encryption key corresponding decruption key Obtain first encryption key;
Second deciphering module, for being decrypted to obtain initial data to the encryption data using first encryption key.
19. a kind of electronic equipment characterized by comprising memory and processor, the memory is for storing computer Program, the processor require 1~16 for the computer program to be read and run from the memory, with perform claim Any one the method.
20. a kind of computer readable storage medium, computer program, feature are stored on the computer readable storage medium It is, the computer program executes method described in any one of above-mentioned claim 1~16 when being run by processor Step.
CN201811048158.0A 2018-09-10 2018-09-10 Data transmission method, data decryption method, device and electronic equipment Pending CN109005196A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811048158.0A CN109005196A (en) 2018-09-10 2018-09-10 Data transmission method, data decryption method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811048158.0A CN109005196A (en) 2018-09-10 2018-09-10 Data transmission method, data decryption method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN109005196A true CN109005196A (en) 2018-12-14

Family

ID=64591543

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811048158.0A Pending CN109005196A (en) 2018-09-10 2018-09-10 Data transmission method, data decryption method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109005196A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN110535642A (en) * 2019-09-02 2019-12-03 北京智游网安科技有限公司 A kind of method, intelligent terminal and the storage medium of dispersion storage key
CN113127911A (en) * 2021-05-06 2021-07-16 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal
CN113360859A (en) * 2021-05-28 2021-09-07 湖南大学 Python interpreter-based encrypted file security control method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064812A (en) * 2006-04-24 2007-10-31 深圳Tcl新技术有限公司 Method for reencrypting the cipher key of HDCP
US20140281511A1 (en) * 2013-03-15 2014-09-18 Microsoft Corporation Secure data processing on sensitive data using trusted hardware
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device
CN104579689A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Soft secret key system and implementation method
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device
CN108173644A (en) * 2017-12-04 2018-06-15 珠海格力电器股份有限公司 Data transmission encryption method and device, storage medium, equipment and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064812A (en) * 2006-04-24 2007-10-31 深圳Tcl新技术有限公司 Method for reencrypting the cipher key of HDCP
US20140281511A1 (en) * 2013-03-15 2014-09-18 Microsoft Corporation Secure data processing on sensitive data using trusted hardware
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device
CN104579689A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Soft secret key system and implementation method
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device
CN108173644A (en) * 2017-12-04 2018-06-15 珠海格力电器股份有限公司 Data transmission encryption method and device, storage medium, equipment and server

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN110535642A (en) * 2019-09-02 2019-12-03 北京智游网安科技有限公司 A kind of method, intelligent terminal and the storage medium of dispersion storage key
CN113127911A (en) * 2021-05-06 2021-07-16 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal
CN113127911B (en) * 2021-05-06 2022-05-20 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal
CN113360859A (en) * 2021-05-28 2021-09-07 湖南大学 Python interpreter-based encrypted file security control method and device
CN113360859B (en) * 2021-05-28 2022-08-09 湖南大学 Python interpreter-based encrypted file security control method and device

Similar Documents

Publication Publication Date Title
US11880831B2 (en) Encryption system, encryption key wallet and method
CN110881063B (en) Storage method, device, equipment and medium of private data
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
Sanka et al. Secure data access in cloud computing
KR20210066867A (en) An encrypted asset encryption key portion that allows assembly of an asset encryption key using a subset of the encrypted asset encryption key portion.
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN106452775A (en) Method and apparatus for accomplishing electronic signing and signing server
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
WO2021231087A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN108809655B (en) Data processing method, device, equipment and storage medium
CN110445840B (en) File storage and reading method based on block chain technology
CN111314069A (en) Block chain-based shaking system and method, electronic device and storage medium
CN112199697A (en) Information processing method, device, equipment and medium based on shared root key
WO2021098152A1 (en) Blockchain-based data processing method, device, and computer apparatus
TWI476629B (en) Data security and security systems and methods
CN112069525A (en) Encryption method, device and equipment for generating key based on attribute of information
CN106888213B (en) Cloud ciphertext access control method and system
CN111177748A (en) Fingerprint storage encryption method, device and system
CN112822010B (en) Removable storage medium management method based on quantum key and block chain
CN113365264A (en) Block chain wireless network data transmission method, device and system
CN106529316B (en) Image data encryption method and device, web camera
CN109302400B (en) Asset password exporting method for operation and maintenance auditing system
Beugin et al. Building a privacy-preserving smart camera system
US10892892B1 (en) Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory
CN115499141A (en) Data encryption method and device based on attributes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181214