CN109005196A - Data transmission method, data decryption method, device and electronic equipment - Google Patents
Data transmission method, data decryption method, device and electronic equipment Download PDFInfo
- Publication number
- CN109005196A CN109005196A CN201811048158.0A CN201811048158A CN109005196A CN 109005196 A CN109005196 A CN 109005196A CN 201811048158 A CN201811048158 A CN 201811048158A CN 109005196 A CN109005196 A CN 109005196A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- encryption
- encryption key
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
It includes: to be encrypted using the first encryption key to be-encrypted data that the embodiment of the present invention, which provides a kind of data transmission method, data decryption method, device and electronic equipment, the data transmission method, obtains encryption data;First encryption key is encrypted using the second encryption key, obtains protection key;And the encryption data and the protection key are sent to data receiver.
Description
Technical field
The present invention relates to data processing fields, in particular to a kind of data transmission method, data decryption method, dress
It sets and electronic equipment.
Background technique
With the development of computer technology, the various aspects in life can be realized by computer technology, for example, religion
It educates, finance, the fields such as security protection.Every field all passes through computer technology and has obtained developing well, consequently also brings
The safety problem of personal information, the information transmission between each equipment are transmitted or the mode of single encryption by clear-text way,
All there is security risk in more or less personal information.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of data transmission method, data decryption method, device
And electronic equipment.
In a first aspect, a kind of data transmission method provided in an embodiment of the present invention, comprising:
Be-encrypted data is encrypted using the first encryption key, obtains encryption data;
First encryption key is encrypted using the second encryption key, obtains protection key;And
The encryption data and the protection key are sent to data receiver.
Optionally, before the second encryption key of the use encrypts first encryption key, further includes:
The second encryption key is obtained from the library so.
Optionally, described the step of obtaining the second encryption key from the library so, comprising:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
Optionally, before the second encryption key of the use encrypts first encryption key, further includes:
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas with
The form of byte arrays is stored in the library so;
Record position of the every part of key data in the library so.
Optionally, described the step of obtaining the second encryption key from the library shared object so, comprising:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it then will be more after recovery
Part key data merges to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and is obtained
Second encryption key.
Optionally, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to recovery operation.
It is optionally, described that key data is restored into the step of obtaining the second encryption key, comprising:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
It is optionally, described that key data is restored into the step of obtaining the second encryption key, comprising:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
It is optionally, described that the key data is subjected to the first recovery operation, comprising:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are carried out
Inversion operation;Or,
By the key data carry out inversion operation, obtain the 4th data, by the 4th data high-order digit with
Low data carries out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, it will be in the 5th data
High-order digit and low data carry out mixed bit recovery operation.
Optionally, first recovery operation includes: by the digit deletion operation of designated position, inversion operation, high-low-position
Mix at least one of recovery operation.
Optionally, first encryption key is symmetric cryptographic key.
Optionally, first encryption key is Advanced Encryption Standard key.
Optionally, second encryption key is asymmetric cryptographic key.
Optionally, second encryption key is RSA key.
Optionally, before being encrypted using the first encryption key to be-encrypted data, further includes: random to generate one
Target AES key is as the first encryption key;
Described the step of be-encrypted data is encrypted using the first encryption key, comprising: close using the target AES
Key be-encrypted data is encrypted, and encryption key is obtained.
Optionally, the be-encrypted data includes that the testimony of a witness compares record, in the first encryption key of use to be-encrypted data
Before the step of being encrypted, obtaining encryption data, the method also includes:
Acquire the face image of target user;
The certificate information of the target user is obtained, it includes that face image and the certificate are believed that the testimony of a witness, which compares record,
Breath.
Second aspect, the embodiment of the present invention also provide a kind of data decryption method, comprising:
Encryption data and protection key are received, the encryption data is the data using the first encryption keys, described
Protecting key is the key obtained using the second encryption key to first encryption key;
The protection key is decrypted to obtain described first using second encryption key corresponding decruption key
Encryption key;
The encryption data is decrypted to obtain initial data using first encryption key.
Optionally, first encryption key is symmetric cryptographic key.
Optionally, the corresponding decruption key of second encryption key is asymmetric decruption key.
The third aspect, the embodiment of the present invention also provide a kind of data transmission device, comprising:
First encrypting module obtains encryption data for encrypting using the first encryption key to be-encrypted data;
Second encrypting module is protected for being encrypted using the second encryption key to first encryption key
Key;And
Sending module, for the encryption data and the protection key to be sent to data receiver.
Fourth aspect, the embodiment of the present invention also provide a kind of data decryption apparatus, comprising:
Receiving module, for receiving encryption data and protection key, the encryption data is to be added using the first encryption key
Close data, the protection key is the key obtained using the second encryption key to first encryption key;
First deciphering module, for being carried out using the corresponding decruption key of second encryption key to the protection key
Decryption obtains first encryption key;
Second deciphering module, for being decrypted to obtain original number to the encryption data using first encryption key
According to.
5th aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising: memory and processor, it is described to deposit
Reservoir for storing computer program, the processor is used to that the computer program to be read and run from the memory,
To execute the above method.
6th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, the computer program executes above-mentioned method when being run by processor the step of.
Compared with prior art, the data transmission method of the embodiment of the present invention, by the base for encrypting be-encrypted data
On plinth, further the key of encryption be-encrypted data is encrypted, to realize double-encryption, improves be-encrypted data
Safety.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation
Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the block diagram of electronic equipment provided in an embodiment of the present invention.
Fig. 2 is the flow chart of data transmission method provided in an embodiment of the present invention.
Fig. 3 is the flow chart of data decryption method provided in an embodiment of the present invention.
Fig. 4 is the functional block diagram of data transmission device provided in an embodiment of the present invention.
Fig. 5 is the functional block diagram of data decryption apparatus provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The each embodiment of the application can be used in technical field of face recognition.Wherein, face recognition technology is widely used in
Education, finance, the fields such as security protection.It is that face recognition technology lands an embodiment that the testimony of a witness, which veritifies all-in-one machine,.After the completion of the testimony of a witness is veritified,
The personal information verified can be needed to upload to backstage by collecting.It may be comprising being compared personal identity in the personal information
The sensitive informations such as information, name, passport NO., address, date of birth, certificate photograph, on-the-spot testing photo.Existing some numbers
It according to upper crossing, may be uploaded using clear-text way, but the mode of upload is not due to encrypting personal information in plain text, institute
To store bigger risk, for example, leakage personally identifiable information.
Based on deficiency present in foregoing description, the application, which provides multiple embodiments, can efficiently solve above-mentioned deficiency,
It is described in detail below.
Embodiment one
Firstly, describing the exemplary electronic device of the data transmission method for realizing the embodiment of the present invention referring to Fig.1
100.The exemplary electronic device 100 can be computer, be also possible to the mobile terminals such as smart phone, tablet computer.
As shown in Figure 1, electronic equipment 100 includes one or more processors 102, one or more storage devices 104.It can
Selection of land, electronic equipment 100 can also include input unit 106, output device 108 and image collecting device 110, these components
It is interconnected by bindiny mechanism's (not shown) of bus system 112 and/or other forms.It should be noted that electronic equipment shown in FIG. 1
100 component and structure be it is illustrative, and not restrictive, as needed, the electronic equipment also can have other
Component and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data
The processing unit of reason ability and/or the other forms of instruction execution capability, and can control its in the electronic equipment 100
Its component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can
To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy
The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non-
Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium
On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute
The client functionality (realized by processor) in the embodiment of the present invention stated and/or other desired functions.In the meter
Can also store various application programs and various data in calculation machine readable storage medium storing program for executing, for example, the application program use and/or
The various data etc. generated.
The input unit 106 can be the device that user is used to input instruction, and may include keyboard, mouse, wheat
One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and
It and may include one or more of display, loudspeaker etc..
Described image acquisition device 110 can shoot the desired image of user (such as photo, video etc.), and will be clapped
The image taken the photograph is stored in the storage device 104 for the use of other components.
Illustratively, for realizing data statistical approach according to an embodiment of the present invention, the exemplary electron of apparatus and system
Each device in equipment can integrate setting, such as can also be filled processor 102, storage device 104, input with scattering device
Set 106 and output device 108 it is integrally disposed in one, and it is image collecting device 110 is separately positioned.
In the present embodiment, electronic equipment 100 may be implemented as the above-mentioned testimony of a witness and veritify all-in-one machine;Also it may be implemented as
The server of all-in-one machine communication connection is veritified with the testimony of a witness.Wherein, server veritifies one by network and one or more testimony of a witnesies
Machine is communicatively coupled, to carry out data communication or interaction.The server can be network server, database server
Deng.
In the present embodiment, veritifying the data transmitted between all-in-one machine and server in the testimony of a witness can be used asymmetric encryption side
Method is encrypted.In a usage scenario, the testimony of a witness is veritified in all-in-one machine and sends the data for needing to authenticate, server to server
The data received are authenticated, and veritify all-in-one machine return authentication as a result, then testimony of a witness veritification all-in-one machine can be to clothes to the testimony of a witness
Business device transmission needs data to be protected, can veritify public key of the storage for encryption in all-in-one machine in the testimony of a witness, store in server
There is the private key for decryption.In another scene, the public key for encryption can also be stored in the server, and the testimony of a witness veritifies one
Private key of the storage for decryption in machine.In other scenes, server and the testimony of a witness, which veritify all-in-one machine, can all send mutually some privates
The relatively high data of close property can be veritified in server and the testimony of a witness and be stored for the public key of encryption in all-in-one machine and for decrypting
Private key.
Embodiment two
Referring to Fig. 2, being the flow chart of data transmission method provided in an embodiment of the present invention.It below will be to shown in Fig. 2
Detailed process is described in detail.
Step S201 encrypts be-encrypted data using the first encryption key, obtains encryption data.
In the present embodiment, the first encryption key can be generated by setting regular random.
Step S202 encrypts first encryption key using the second encryption key, obtains protection key.
In the present embodiment, the second encryption key can be stored in the library so (Shared Object), need using when from
The second encryption key is obtained in the library so.Wherein, the library so is a binary file, is difficult by decompiling, so as to improve
The safety of two encryption keys.
So file is the dynamic link library of unix, is binary file.In Android project, dynamic library file (* is called
It .so) is the api that load so file provides by way of jni.
The encryption data and the protection key are sent to data receiver by step S203.
Data receiver in the present embodiment can be server, or can be authenticated, be known to be-encrypted data
Not Deng processing management terminal.
In the present embodiment, the first encryption key can be symmetric cryptographic key.Wherein, symmetric encryption method is using same
Key realizes encryption and decryption.Therefore, it is necessary to which the first encryption key is sent to data receiver, so that data receiver
The first encryption key can be used the encryption data received is decrypted.
In one embodiment, first encryption key is Advanced Encryption Standard key (Advanced
Encryption Standard, AES).
When needing to encrypt using AES key, a target AES key can be generated at random as the first encryption key.
In other embodiment, the first encryption key can also be other symmetric cryptographic key, for example, DES (Data
Encryption Standard, i.e. data encryption standards), 3DES (Triple DES, i.e., triple data encryption algorithm), TDEA,
Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK etc..Those skilled in the art can select any according to specific requirements
Encryption key is as the first encryption key.
In the present embodiment, the second encryption key can be asymmetric cryptographic key.Wherein, it is stored in for the public key of encryption
In the electronic equipment for executing the data transmission method in the present embodiment;Private key for decryption is stored in receiving step S203 transmission
Encryption data data receiver.
In the present embodiment, second encryption key can be RSA key.RSA key is using RSA cryptographic algorithms to be added
Ciphertext data is encrypted.RSA cryptographic algorithms are a kind of rivest, shamir, adelmans.
In the present embodiment, RSA key can be stored in code, can also be stored in text file.It is optional at one
Embodiment in, RSA key can be stored in code.For example, RSA key can be converted to binary data, this
A binary data can be split into more parts according to length, and every part is all stored in code in the form of byte arrays.Example
Such as, saved in code be just analogous to 011110010 as binary data.It in another embodiment can be by RSA
Key is stored in the library so.The library so is a binary file, is difficult by by decompiling.RSA data are stored in the library so,
Than being placed in java code, safety can be improved.When needing using RSA public key, RSA key is obtained from the library so.
The data transmission method of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data
The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.Further
Ground, in the data obtained by above-mentioned data encryption algorithm, the data for needing to transmit all are encryption datas, and transmission can be used
It is safer.
In the present embodiment, described the step of obtaining the second encryption key from the library so, can be implemented by following steps: from
So obtains key data in library;Key data is restored to obtain the second encryption key.
It is to be first converted into binary data in the library so since the second encryption key is stored in, after obtaining key data
It needs binary data being converted into key parameter.
In detail, the second encryption key can be converted to binary data, this binary data, can be according to length
Degree, is split into four parts of key datas, every part of key data is all stored in the library so in the form of byte arrays, and records every part
Position of the key data in the library so.This four parts of key datas can store under the same catalogue in the library so, also can store
Under the different directories in the library so, the present embodiment is not construed as limiting this.When using the second encryption key, it is necessary to by four parts of keys
Data are taken out from the library so and carry out union operation to restore the second encryption key, alternatively, four parts of key datas are merged,
Then the key data after merging is subjected to recovery operation again and obtains the second encryption key, added so as to further increase second
The safety of key.
It can be in the corresponding binary data of the second encryption key of storage in order to increase the difficulty that cracks of the second encryption key
Added with some hashes as interference when into the library so.Second encryption key is when being stored in the library so, in addition to cipher key number
According to being also possible to will include some other hashes for interference, if desired restores to obtain the second encryption key, then need
First hash is removed.
In one embodiment, described that key data is restored into the step of obtaining the second encryption key, it can be by reality
It applies are as follows:
The hash in the key data is removed, valid data are obtained;
The valid data are restored to obtain the second encryption key.
Wherein, hash can be inserted into useful data according to the rule of setting.Second encryption key is converted into two
After binary data, multiple groups byte arrays are split into, the hash for interference, example can be added in every part of byte arrays
Such as, M hash is initially inserted at N.Therefore, after obtaining key data, need to delete M nothing of N beginnings
Use data.It is, of course, also possible to be obtained according to other rule insertion hashes so as to effectively improve key data by other people
The difficulty cracked after taking.
In the present embodiment, in order to which increase by the second encryption key cracks difficulty, the safety of data encryption is improved, it can be with
Further one or more operation bidirectionals can be carried out to the corresponding binary data of the second key data in storage, thus
The safety of the second encryption key is further improved, to also can be improved the safety of data.
In another embodiment, it is described key data is restored into the step of obtaining the second encryption key can be by reality
It applies are as follows:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation and obtain the second encryption key.
Wherein, the first recovery operation is used to carry out recovery operation to the key data for carrying out operation bidirectional, to obtain
Positive sequence data.Positive sequence data can be expressed as the second encryption key and carry out the corresponding data of Binary Conversion.
In order to further improve the safety of the second encryption key, increase by the second encryption key cracks difficulty, can be with
Cryptographic operation is executed when storing the corresponding binary data of the second encryption key into the library so.Such as: by the second encryption key
Corresponding binary data overall execution cryptographic operation, then stores into the library so;Alternatively, by the second encryption key corresponding two
Binary data splits into more parts of data, executes cryptographic operation to every part of data respectively, then by more parts of data storages into the library so;
Alternatively, first executing cryptographic operation to the corresponding binary data of the second encryption key, then encrypted data are split into again
More parts of storages are into the library so.In the present embodiment, cryptographic operation can be the operation or additional of above-described addition hash
Operation, or add the operation of hash and the combination of operation bidirectional.
In some embodiments, first added with some hashes as interference, further, can also further into
The one or more operation bidirectionals of row, to realize dual interference.The operation for adding hash is fixed on the second encryption key
The first step for carrying out cryptographic operation, without the step of recording the operation, in decryption oprerations when to the second encryption key decryption
The hash of addition is removed in final step, advantageously reduces the complexity of operation.
When obtaining out the corresponding data of the second encryption key from the library so, using the decryption oprerations corresponding with cryptographic operation
It can restore to obtain the second encryption key.
There are also in a kind of embodiment, it is described key data is restored into the step of obtaining the second encryption key can be by reality
It applies are as follows:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation and obtain the second encryption key.
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume
Outer operation can be in the designated position of data addition additional characters, data be carried out inversion operation or by the high position in data
Data exchange the operation of position with low data.
In detail, described that the key data is subjected to the first recovery operation, comprising: will be specified in the key data
The digit deletion of position.
For example, increasing several numbers by the head in the binary data of the second encryption key conversion, cipher key number is formed
According to being stored in the library so again.At this point, the first recovery operation can be the increased several digit deletions in the head in key data.
In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Further, then
Increase a number 1 on the head of digital " 011110010 ", obtains key data " 1011110010 ".Then the first recovery operation
It can be the first bit digital deleted in key data " 1011110010 ", obtain positive sequence data " 011110010 ".The example above
In only head increase a number be it is schematical, those skilled in the art can increase on head more according to demand
Number, present embodiment can't be limited with the quantity of increased number.
For another example several numbers, shape can be increased in the tail portion in the binary data converted by the second encryption key
It is stored in the library so again at key data.At this point, the first recovery operation can be the tail portion in key data is increased several
Digit deletion.In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Into
One step, then increase a number 1 in the tail portion of digital " 011110010 ", obtain key data " 0111100101 ".Then first
Recovery operation can be the last one-bit digital deleted in key data " 1011110010 ", obtain positive sequence data
“011110010”。
In detail, described that the key data is subjected to the first recovery operation, comprising: to negate the key data
Operation.
For example, carrying out inversion operation by the number in the binary data of the second encryption key conversion, number 0 is become 1,
Number 1 becomes 0.At this point, the first recovery operation, which can be, carries out inversion operation again for 0 or 1 in key data, to restore number
According to.In an example, the second encryption key is carried out being converted to binary data expression are as follows: 011110010.Further
Ground, then inversion operation is carried out in digital " 011110010 ", obtain key data " 100001101 ".Then the first recovery operation can be with
Inversion operation is carried out to key data " 100001101 ", obtains positive sequence data " 011110010 ".
In detail, described that the key data is subjected to the first recovery operation, comprising: by the high position in the key data
Number carries out mixed bit recovery operation with low data.
For example, carrying out high-order digit and low data progress by the number in the binary data of the second encryption key conversion
Mixed bit manipulation, by high-order digit and status data place-exchange.At this point, the first recovery operation can be the height in key data
Bit digital and status data place-exchange, to restore data.In an example, the second encryption key is carried out being converted to two
Binary data indicates are as follows: 01111001.Further, then in digital " 01111001 " high-order digit " 0111 " and lower-order digit are carried out
According to " 1001 " place-exchange, key data " 10010111 " are obtained.Then the first recovery operation can be to key data
The high-order digit and status data place-exchange of " 10010111 ", obtain positive sequence data " 01111001 ".
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume
Outer operation may include the designated position addition additional characters of data, data be carried out to inversion operation and by the high position in data
Data exchange three kinds of operation bidirectionals of the operation of position with low data.Not to the correspondence of three kinds of operation bidirectionals in the present embodiment
Recovery operation execution sequence be limited, specifically can with storage when execute the sequence of operation bidirectional it is opposite.Below with three kinds
It is described for one of operation bidirectional combination sequence.It is corresponding to it, it is described that the key data is subjected to the first recovery
Operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
In the present embodiment, due to the difference of the selection of operation bidirectional, corresponding first recovery operation also may be different.Volume
Outer operation may include the designated position addition additional characters of data, data be carried out to inversion operation and by the high position in data
Data exchange any two kinds of operation bidirectionals of the operation of position with low data.Not to any two kinds additional behaviour in the present embodiment
The execution sequence for the corresponding recovery operation made is limited, specifically can be opposite with the execution sequence of operation bidirectional when storage.Under
Face is described by taking one of combination of two sequence as an example.It is corresponding to it, it is described that the key data is subjected to the first recovery
Operation can be implemented by following various ways.
The first embodiment, it is described by the key data carry out the first recovery operation include: by the key data
In designated position digit deletion, obtain third data;The third data are subjected to inversion operation.
Second of embodiment, it is described by the key data carry out the first recovery operation include: by the key data
Inversion operation is carried out, the 4th data are obtained;High-order digit in 4th data is subjected to mixed bit recovery behaviour with low data
Make.
The third embodiment, it is described by the key data carry out the first recovery operation include: by the key data
In designated position digit deletion, obtain the 5th data;High-order digit in 5th data is carried out with low data
Mixed bit recovery operation.
About above-mentioned each embodiment can with specific reference to front the designated position of data addition additional characters,
Data are subjected to inversion operation or high position data and the low data in data are exchanged into the corresponding each embodiment party of the operation of position
It is described in detail in formula.
Data transmission method in the present embodiment can be applied in all kinds of scenes that there are transmission data, for example, passing through
It is interacted with background server in being verified;In the message transmission of instant messaging tools;The transmission of cloud storage data is medium.Below
By a specific scene, the use of the data ciphering method in the present embodiment is described.
In an application scenarios, the data transmission method in the present embodiment can be used for use the testimony of a witness veritify all-in-one machine
Data transmission when being verified to the identity of user.Then the be-encrypted data in step S201 can be testimony of a witness comparison record,
Specifically, it may comprise steps of: the face image of a. acquisition target user;B. the certificate letter of the target user is obtained
Breath, it includes face image and the certificate information that the testimony of a witness, which compares record,;C. the testimony of a witness is compared using the first encryption key and is remembered
Record is encrypted, and encryption data is obtained;D. first encryption key is encrypted using the second encryption key, is protected
Key;E. the encryption data and the protection key are sent to data receiver.
In this application scenarios, above-mentioned data receiver, which can be, compares the backstage clothes that record is verified to the testimony of a witness
Verification result can be returned to data sending terminal by business device, background server, be demonstrate,proved with realizing without results.
About under this scene use data transmission method other details can further refer to front detailed description,
Details are not described herein.
By being encrypted to data, so as to improve number before transmitting data to the data receiver on backstage
According to the safety of transmission.Further, it also avoids the data in transmission from being tampered, causes to be likely to occur authentication error, so as to
To improve the accuracy rate of verifying.
Embodiment three
Referring to Fig. 3, being the flow chart of data decryption method provided in an embodiment of the present invention.It below will be to shown in Fig. 3
Detailed process is described in detail.
Step S301 receives encryption data and protection key.
In the present embodiment, the encryption data is the data using the first encryption keys, and the protection key is to make
The key that first encryption key is obtained with the second encryption key.
Step S302 is decrypted to obtain using the corresponding decruption key of second encryption key to the protection key
First encryption key.
Step S303 is decrypted to obtain initial data using first encryption key to the encryption data.
In the present embodiment, first encryption key is symmetric cryptographic key.
In the present embodiment, the corresponding decruption key of second encryption key is asymmetric cryptographic key.
In the present embodiment, the corresponding decruption key of the second encryption key can be according to the second encryption key in embodiment two
Storage mode stored.
Implementablely, can be when storing decruption key, in the designated position of decruption key, insertion is for the useless of interference
Data.Therefore, it obtains decruption key to need to delete hash, retains useful data, then restore useful data
Decruption key can be obtained.
In the present embodiment, when storing decruption key, one or more operation bidirectionals can also be executed, operation bidirectional can be with
It is in the designated position of data addition additional characters, data is subjected to inversion operation, by the high position data and lower-order digit in data
One of operation according to exchange position or a variety of operations.Therefore, when obtaining decruption key, each operation bidirectional pair is needed to be implemented
The recovery operation answered is to obtain decruption key.
Recovery operation about operation bidirectional can be with the detailed description in reference implementation example two, and details are not described herein.
Data decryption method in through this embodiment is cooperated with data transmission method shown in Fig. 2, can be used
The transmission of data is safer, also being capable of effectively restoring data.
Example IV
Referring to Fig. 4, being the functional block diagram of data transmission device provided in an embodiment of the present invention.In the present embodiment
Data transmission device in modules be used to execute each step in method in above-described embodiment two.The data pass
Defeated device comprises the following modules.
First encrypting module 401 obtains encryption number for encrypting using the first encryption key to be-encrypted data
According to.
Second encrypting module 402 is protected for being encrypted using the second encryption key to first encryption key
Protect key.
Sending module 403, for the encryption data and the protection key to be sent to data receiver.
The second encryption key in the present embodiment can store in the library so, and therefore, the data in the present embodiment transmit dress
It sets, further includes: module 404 is obtained, for obtaining the second encryption key from the library so.
Data transmission device in the present embodiment can also include: memory module, and being used for can by second encryption key
To be converted to binary data;
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas with
The form of byte arrays is stored in the library so, wherein the more parts of key datas are stored under the same catalogue in the library so, or are deposited
Storage is under the different directories in the library so;
Record position of the every part of key data in the library so.
In the present embodiment, the acquisition module 404 is also used to:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
The acquisition module 404, is also used to:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it then will be more after recovery
Part key data merges to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and is obtained
Second encryption key.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to recovery operation.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
In the present embodiment, the key data is carried out restoring to be accomplished by the following way:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
In the present embodiment, the acquisition module 404 is also used to:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are carried out
Inversion operation;Or,
By the key data carry out inversion operation, obtain the 4th data, by the 4th data high-order digit with
Low data carries out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, it will be in the 5th data
High-order digit and low data carry out mixed bit recovery operation.
In the present embodiment, first encryption key is symmetric cryptographic key.
In the present embodiment, first encryption key is Advanced Encryption Standard key.
In the present embodiment, second encryption key is asymmetric cryptographic key.
In the present embodiment, second encryption key is RSA key.
Data transmission device in the present embodiment can also include: generation module, close for generating a target AES at random
Key is as the first encryption key;
First encrypting module 401, is also used to: being encrypted, is obtained using the target AES key be-encrypted data
Encryption key.
Data transmission device in the present embodiment can also include: acquisition module, and the face for acquiring target user schemes
Picture;
Module is obtained, for obtaining the certificate information of the target user, it includes face image that the testimony of a witness, which compares record,
With the certificate information.
First encrypting module 401 is also used for the first encryption key and encrypts to testimony of a witness comparison record,
Obtain encryption data.
The data transmission device of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data
The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.
Other details about the present embodiment can also further refer to the description in the method in above-described embodiment two,
Details are not described herein.
Embodiment five
Referring to Fig. 5, being the functional block diagram of data decryption apparatus provided in an embodiment of the present invention.In the present embodiment
Data decryption apparatus modules be used for execute above-described embodiment three offer embodiment of the method in each step.It is described
Data decryption apparatus comprises the following modules.
Receiving module 501, for receiving encryption data and protection key, the encryption data is to use the first encryption key
The data of encryption, the protection key is the key obtained using the second encryption key to first encryption key.
First deciphering module 502, for using the corresponding decruption key of second encryption key to the protection key
It is decrypted to obtain first encryption key.
Second deciphering module 503, for being decrypted to obtain original to the encryption data using first encryption key
Beginning data.
Wherein, the first encryption key is symmetric cryptographic key.
In the present embodiment, the corresponding decruption key of second encryption key is asymmetric decruption key.
About the present embodiment other details can further reference implementation example three provide embodiment of the method in retouch
It states, details are not described herein.
The data decryption apparatus of the embodiment of the present invention, it is further right by the basis of encrypting be-encrypted data
The key of encryption be-encrypted data is encrypted, to realize double-encryption, improves the safety of be-encrypted data.
The embodiment of the present invention also provides a kind of computer readable storage medium, stores on the computer readable storage medium
There is computer program, the step in above method embodiment is executed when the computer program is run by processor.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (20)
1. a kind of data transmission method characterized by comprising
Be-encrypted data is encrypted using the first encryption key, obtains encryption data;
First encryption key is encrypted using the second encryption key, obtains protection key;And
The encryption data and the protection key are sent to data receiver.
2. data transmission method as described in claim 1, which is characterized in that described to use the second encryption key to described first
Before encryption key is encrypted, further includes:
The second encryption key is obtained from the library shared object so.
3. data transmission method as claimed in claim 2, which is characterized in that it is described obtained from the library shared object so second plus
The step of key, comprising:
Key data is obtained from the library so;
Key data is restored to obtain the second encryption key.
4. data transmission method as claimed in claim 2, which is characterized in that further include:
Second encryption key is converted into binary data;
The binary data is split into more parts of key datas, every part of key data in the more parts of key datas is with byte
The form of array is stored in the library so;
Record position of the every part of key data in the library so.
5. data transmission method as claimed in claim 4, which is characterized in that it is described obtained from the library shared object so second plus
The step of key, comprising:
More parts of key datas are taken out from the library so, and recovery operation is executed to every part of key data, it is then that more parts after recovery are close
Key data merge to obtain the second encryption key;
Alternatively, more parts of key datas are merged, the key data after merging is then subjected to recovery operation again and obtains second
Encryption key.
6. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data
Following manner is realized:
The hash in the key data is removed, valid data are obtained;
The valid data are restored.
7. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data
Following manner is realized:
The key data is subjected to the first recovery operation, obtains the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
8. data transmission method as claimed in claim 3 or 5, which is characterized in that carry out restoring to pass through the key data
Following manner is realized:
The hash in the key data is removed, valid data are obtained;
The valid data are subjected to the first recovery operation, obtain the corresponding positive sequence data of the key data;
The positive sequence data are subjected to the second recovery operation.
9. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first
Recovery operation, comprising:
By the digit deletion of the designated position in the key data;Or,
The key data is subjected to inversion operation;Or,
High-order digit in the key data is subjected to mixed bit recovery operation with low data.
10. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first
Recovery operation, comprising:
By the digit deletion of the designated position in the key data, the first data are obtained;
First data are subjected to inversion operation, obtain the second data;
High-order digit in second data is subjected to mixed bit recovery operation with low data.
11. data transmission method as claimed in claim 7 or 8, which is characterized in that described that the key data is carried out first
Recovery operation, comprising:
By the digit deletion of the designated position in the key data, third data are obtained, the third data are negated
Operation;Or,
The key data is subjected to inversion operation, the 4th data are obtained, by the high-order digit and low level in the 4th data
Data carry out mixed bit recovery operation;Or,
By the digit deletion of the designated position in the key data, the 5th data are obtained, by the high position in the 5th data
Number carries out mixed bit recovery operation with low data.
12. data transmission method as described in claim 1, which is characterized in that first encryption key is that symmetric cryptography is close
Key, second encryption key is asymmetric cryptographic key.
13. data transmission method as claimed in claim 12, which is characterized in that in the first encryption key of use to number to be encrypted
According to before being encrypted, further includes: generate a target AES key at random as the first encryption key;
Described the step of be-encrypted data is encrypted using the first encryption key, comprising: waited for using the target AES key
Encryption data is encrypted, and encryption key is obtained.
14. the data transmission method as described in claim 1-13 any one, which is characterized in that the be-encrypted data includes
The testimony of a witness compares record, before the step of being encrypted to be-encrypted data using the first encryption key, obtain encryption data, institute
State method further include:
Acquire the face image of target user;
The certificate information of the target user is obtained, it includes face image and the certificate information that the testimony of a witness, which compares record,.
15. a kind of data decryption method characterized by comprising
Encryption data and protection key are received, the encryption data is the data using the first encryption keys, the protection
Key is the key obtained using the second encryption key to first encryption key;
The protection key is decrypted using second encryption key corresponding decruption key to obtain first encryption
Key;
The encryption data is decrypted to obtain initial data using first encryption key.
16. data decryption method as claimed in claim 15, which is characterized in that first encryption key is that symmetric cryptography is close
Key, the corresponding decruption key of second encryption key is asymmetric cryptographic key.
17. a kind of data transmission device characterized by comprising
First encrypting module obtains encryption data for encrypting using the first encryption key to be-encrypted data;
Second encrypting module obtains protection key for encrypting using the second encryption key to first encryption key;
And
Sending module, for the encryption data and the protection key to be sent to data receiver.
18. a kind of data decryption apparatus characterized by comprising
Receiving module, for receiving encryption data and protection key, the encryption data is to use the first encryption keys
Data, the protection key is the key obtained using the second encryption key to first encryption key;
First deciphering module, for the protection key to be decrypted using second encryption key corresponding decruption key
Obtain first encryption key;
Second deciphering module, for being decrypted to obtain initial data to the encryption data using first encryption key.
19. a kind of electronic equipment characterized by comprising memory and processor, the memory is for storing computer
Program, the processor require 1~16 for the computer program to be read and run from the memory, with perform claim
Any one the method.
20. a kind of computer readable storage medium, computer program, feature are stored on the computer readable storage medium
It is, the computer program executes method described in any one of above-mentioned claim 1~16 when being run by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811048158.0A CN109005196A (en) | 2018-09-10 | 2018-09-10 | Data transmission method, data decryption method, device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811048158.0A CN109005196A (en) | 2018-09-10 | 2018-09-10 | Data transmission method, data decryption method, device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109005196A true CN109005196A (en) | 2018-12-14 |
Family
ID=64591543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811048158.0A Pending CN109005196A (en) | 2018-09-10 | 2018-09-10 | Data transmission method, data decryption method, device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109005196A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109703571A (en) * | 2018-12-24 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | A kind of vehicle entertainment system login system and login method based on recognition of face |
CN110535642A (en) * | 2019-09-02 | 2019-12-03 | 北京智游网安科技有限公司 | A kind of method, intelligent terminal and the storage medium of dispersion storage key |
CN113127911A (en) * | 2021-05-06 | 2021-07-16 | 国网河北省电力有限公司信息通信分公司 | Electric power data encryption method and device and terminal |
CN113360859A (en) * | 2021-05-28 | 2021-09-07 | 湖南大学 | Python interpreter-based encrypted file security control method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064812A (en) * | 2006-04-24 | 2007-10-31 | 深圳Tcl新技术有限公司 | Method for reencrypting the cipher key of HDCP |
US20140281511A1 (en) * | 2013-03-15 | 2014-09-18 | Microsoft Corporation | Secure data processing on sensitive data using trusted hardware |
CN104079581A (en) * | 2014-07-16 | 2014-10-01 | 金红宇 | Identity authentication method and device |
CN104579689A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Soft secret key system and implementation method |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN107911370A (en) * | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
CN108173644A (en) * | 2017-12-04 | 2018-06-15 | 珠海格力电器股份有限公司 | Data transmission encryption method and device, storage medium, equipment and server |
-
2018
- 2018-09-10 CN CN201811048158.0A patent/CN109005196A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064812A (en) * | 2006-04-24 | 2007-10-31 | 深圳Tcl新技术有限公司 | Method for reencrypting the cipher key of HDCP |
US20140281511A1 (en) * | 2013-03-15 | 2014-09-18 | Microsoft Corporation | Secure data processing on sensitive data using trusted hardware |
CN104079581A (en) * | 2014-07-16 | 2014-10-01 | 金红宇 | Identity authentication method and device |
CN104579689A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Soft secret key system and implementation method |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN107911370A (en) * | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
CN108173644A (en) * | 2017-12-04 | 2018-06-15 | 珠海格力电器股份有限公司 | Data transmission encryption method and device, storage medium, equipment and server |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109703571A (en) * | 2018-12-24 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | A kind of vehicle entertainment system login system and login method based on recognition of face |
CN110535642A (en) * | 2019-09-02 | 2019-12-03 | 北京智游网安科技有限公司 | A kind of method, intelligent terminal and the storage medium of dispersion storage key |
CN113127911A (en) * | 2021-05-06 | 2021-07-16 | 国网河北省电力有限公司信息通信分公司 | Electric power data encryption method and device and terminal |
CN113127911B (en) * | 2021-05-06 | 2022-05-20 | 国网河北省电力有限公司信息通信分公司 | Electric power data encryption method and device and terminal |
CN113360859A (en) * | 2021-05-28 | 2021-09-07 | 湖南大学 | Python interpreter-based encrypted file security control method and device |
CN113360859B (en) * | 2021-05-28 | 2022-08-09 | 湖南大学 | Python interpreter-based encrypted file security control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11880831B2 (en) | Encryption system, encryption key wallet and method | |
CN110881063B (en) | Storage method, device, equipment and medium of private data | |
US11210658B2 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
Sanka et al. | Secure data access in cloud computing | |
KR20210066867A (en) | An encrypted asset encryption key portion that allows assembly of an asset encryption key using a subset of the encrypted asset encryption key portion. | |
WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
CN106452775A (en) | Method and apparatus for accomplishing electronic signing and signing server | |
CN109005196A (en) | Data transmission method, data decryption method, device and electronic equipment | |
WO2021231087A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
CN108809655B (en) | Data processing method, device, equipment and storage medium | |
CN110445840B (en) | File storage and reading method based on block chain technology | |
CN111314069A (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN112199697A (en) | Information processing method, device, equipment and medium based on shared root key | |
WO2021098152A1 (en) | Blockchain-based data processing method, device, and computer apparatus | |
TWI476629B (en) | Data security and security systems and methods | |
CN112069525A (en) | Encryption method, device and equipment for generating key based on attribute of information | |
CN106888213B (en) | Cloud ciphertext access control method and system | |
CN111177748A (en) | Fingerprint storage encryption method, device and system | |
CN112822010B (en) | Removable storage medium management method based on quantum key and block chain | |
CN113365264A (en) | Block chain wireless network data transmission method, device and system | |
CN106529316B (en) | Image data encryption method and device, web camera | |
CN109302400B (en) | Asset password exporting method for operation and maintenance auditing system | |
Beugin et al. | Building a privacy-preserving smart camera system | |
US10892892B1 (en) | Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory | |
CN115499141A (en) | Data encryption method and device based on attributes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181214 |