CN109388964A - Encryption/decryption system and method, and non-transitory computer-readable recording medium - Google Patents
Encryption/decryption system and method, and non-transitory computer-readable recording medium Download PDFInfo
- Publication number
- CN109388964A CN109388964A CN201810609735.2A CN201810609735A CN109388964A CN 109388964 A CN109388964 A CN 109388964A CN 201810609735 A CN201810609735 A CN 201810609735A CN 109388964 A CN109388964 A CN 109388964A
- Authority
- CN
- China
- Prior art keywords
- original block
- block
- file
- original
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000011084 recovery Methods 0.000 claims description 20
- 238000010586 diagram Methods 0.000 description 24
- 230000000977 initiatory effect Effects 0.000 description 13
- 238000006243 chemical reaction Methods 0.000 description 11
- 230000009467 reduction Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 5
- 230000036651 mood Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000002524 electron diffraction data Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 229930091051 Arenine Natural products 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000005215 recombination Methods 0.000 description 2
- 230000006798 recombination Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000003776 cleavage reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000007017 scission Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses an encryption and decryption system, which comprises: the device comprises a cutting module, an arranging module and a restoring module. The cutting module is used for cutting the file to be encrypted into a plurality of original blocks with original block information respectively. The arrangement module is connected with the cutting module and used for randomly arranging the original blocks to form an encrypted file. The restoring module is connected with the cutting module and the arranging module and used for receiving the original block information of the original block and the encrypted file and restoring the encrypted file into a restoring file corresponding to the file to be encrypted based on the original block information of the original block. The embodiment of the invention also discloses an encryption and decryption method and a non-transitory computer readable recording medium.
Description
Technical field
The present invention relates to a kind of encrypting and deciphering system, encipher-decipher method and non-instantaneous computer-readable medium storings, especially
Refer to a kind of for the encrypting and deciphering system of electronic document, encipher-decipher method and non-instantaneous computer-readable medium storing.
Background technique
To avoid file by the improper use of unauthorized person, in general this file can be encrypted, and will encryption
Key give authorized people and decrypted this file.However, common file encryption-decryption mechanism often to pass through it is a succession of
Calculating and it is excessively complicated, certain burden is caused for encrypting and deciphering system.
Summary of the invention
The embodiment of the present invention provides a kind of encrypting and deciphering system, a kind of encipher-decipher method and a kind of non-instantaneous computer-readable
Record media is taken, it can be to avoid the improper protection for using file to be encrypted, improving to file to be encrypted without permission.
On the one hand, a kind of encrypting and deciphering system provided in an embodiment of the present invention, comprising: a cutting module, to be added by one
Ciphertext part is cut into multiple original blocks respectively with an original block information;One arrangement module, connect with the cutting module,
To the multiple original block of random alignment to form an encryption file;And a recovery module, with the cutting module and should
Module connection is arranged, to receive the multiple original block information and the encryption file of multiple original block, and is based on
The encryption file is reduced into a reduction of the corresponding file to be encrypted by multiple original block information of multiple original block
File.
In one embodiment of the invention, which includes location information, dimension information and rotation letter
Breath.
In one embodiment of the invention, which further includes an adding module, the adding module and the row
The connection of column module, to add multiple addition blocks to combine with multiple original block, the arrangement module is to random alignment
Multiple addition block and multiple original block are to form the encryption file, and the recovery module is to receive multiple region of initiation
The multiple original block information and the encryption file of block, and multiple original block information based on multiple original block
The encryption file is reduced into the also original.
In one embodiment of the invention, which further includes an adding module, the adding module and the row
Column module connection, to add multiple addition blocks to combine with multiple original block through random alignment to form the encryption
File, multiple original block information and the encryption file of the recovery module to receive multiple original block, and base
The encryption file is reduced into the also original in multiple original block information of multiple original block.
Another aspect, a kind of encipher-decipher method provided in an embodiment of the present invention, comprising steps of receiving a file to be encrypted;
The file to be encrypted is cut into multiple original blocks respectively with an original block information;The multiple region of initiation of random alignment
The combination of the multiple original block of block, random alignment and multiple addition blocks, or the multiple addition block of combination are arranged at random with warp
Multiple original block of column;Form an encryption file;And receive multiple original block information of multiple original block
And the encryption file, and the encryption file is reduced into correspondence by multiple original block information based on multiple original block
The also original of the one of the file to be encrypted.
In one embodiment of the invention, it is cut into respectively by the file to be encrypted with the original block information
It is also wrapped between the step of combination of the step of multiple original blocks and the multiple original block of random alignment and multiple addition blocks
Include the step of adding multiple addition blocks.
In one embodiment of the invention, it is cut into respectively by the file to be encrypted with an original block information
The step of multiple original blocks with combine multiple addition block and through between the step of multiple original block of random alignment
Further include the steps that adding multiple addition blocks.
In another aspect, a kind of non-instantaneous computer-readable medium storing provided in an embodiment of the present invention, the non-instantaneous meter
Calculation machine medium capable of reading record record an at least program instruction, an at least program instruction after being loaded onto an encrypting and deciphering system,
It executes step: receiving a file to be encrypted;The file to be encrypted is cut into multiple originals respectively with the original block information
Beginning block;The combination or group of the multiple original block of random alignment, the multiple original block of random alignment and multiple addition blocks
Close multiple addition block and multiple original block through random alignment;Form an encryption file;And receive multiple original
The multiple original block information and the encryption file of beginning block, and multiple original block based on multiple original block
The encryption file is reduced into the one of the corresponding file to be encrypted also original by information.
In one embodiment of the invention, it is cut into respectively by the file to be encrypted with the original block information
Between the step of combination of the step of multiple original block and the multiple original block of random alignment and multiple addition block
Further include the steps that adding multiple addition block.
In one embodiment of the invention, which is being cut into respectively being somebody's turn to do with original block information
The step of multiple original blocks with combine multiple addition block and through between the step of multiple original block of random alignment
Further include the steps that adding multiple addition block.
In conclusion above-mentioned technical proposal of the invention has clear advantage and beneficial effect compared with prior art.
A kind of encrypting and deciphering system, a kind of encipher-decipher method provided by the embodiment of the present invention and a kind of non-instantaneous computer-readable record
Media, can be to avoid the improper protection for using file to be encrypted, improving to file to be encrypted without permission.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others
Attached drawing.
Fig. 1 is the functional block diagram of encrypting and deciphering system provided by one embodiment of the invention;
Fig. 2 is the flow diagram of encipher-decipher method provided by one embodiment of the invention;
Fig. 3 is the flow diagram that file encryption-decryption is carried out using encrypting and deciphering system shown in Fig. 1;
Fig. 4 A is the schematic diagram that the file to be encrypted of 3X3 original block is already cut into provided by one embodiment of the invention;
Fig. 4 B is the location information of original block and the schematic diagram of rotation information shown in corresponding diagram 4A;
Fig. 4 C is original block shown in Fig. 4 A and the location information as shown in Fig. 4 B, dimension information and rotation information group
At original block information the table of comparisons;
Fig. 5 is the functional block diagram of encrypting and deciphering system provided by another embodiment of the present invention;
Fig. 6 is the flow diagram of encipher-decipher method provided by another embodiment of the present invention;
Fig. 7 is the flow diagram that file encryption-decryption is carried out using encrypting and deciphering system shown in fig. 5;
Fig. 8 is the functional block diagram of encrypting and deciphering system provided by further embodiment of this invention;
Fig. 9 is the flow diagram of encipher-decipher method provided by further embodiment of this invention;
Figure 10 is the flow diagram that file encryption-decryption is carried out using encrypting and deciphering system shown in Fig. 8.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this
Embodiment in invention, every other reality obtained by those of ordinary skill in the art without making creative efforts
Example is applied, shall fall within the protection scope of the present invention.
It is open term, i.e., about "comprising" used herein, " comprising ", " having ", " containing " etc.
Mean including but not limited to.
About "and/or" used herein, being includes any of the things or all combinations.
About word used herein (terms), in addition to having and especially indicating, usually have each word using herein
In field, herein in the content disclosed with the usual meaning in special content.It is certain will be under to describe word of the invention
Or discussed in the other places of this specification, to provide those skilled in the art's guidance additional in description for the present invention.
Referring to Fig. 1, Fig. 2 and Fig. 3.Fig. 1 is the function for the encrypting and deciphering system 100 that one embodiment of the invention provides
Module diagram, Fig. 2 are the flow diagram of encipher-decipher method M100 that one embodiment of the invention provides, and Fig. 3 is utilizes Fig. 1 institute
The encrypting and deciphering system 100 shown carries out the flow diagram of file encryption-decryption.
In the present embodiment, encrypting and deciphering system 100 can come to carry out encryption and decryption to file using encipher-decipher method M100.Into one
The step process on step ground, encipher-decipher method M100 can refer to by an a kind of non-instantaneous medium capable of reading record record at least program
It enables, this at least program instruction executes encipher-decipher method M100 after being loaded onto encrypting and deciphering system 100, and encipher-decipher method includes
Step S120, step S140, step S160 and step S180.
Encrypting and deciphering system 100 includes cutting module 120, arrangement module 140 and recovery module 160.Cutting module 120 with
It arranges module 140 and recovery module 160 connects, arrangement module 140 is connect with recovery module 160.
In one embodiment, cutting module 120 can be received according to step S120 having a size of 15 (cm) x15 (cm) (i.e. width
W1 be 15 (cm), height H1 be 15 (cm)) file OD to be encrypted (as shown in the reception stage RCS of Fig. 3).Cutting module 120
File OD to be encrypted is cut into nine original blocks (cutting stage DVS of such as Fig. 3 respectively with original block information OBI
It is shown), be respectively the first original block OB1, the second original block OB2, third original block OB3, the 4th original block OB4,
5th original block OB5, the 6th original block OB6, the 7th original block OB7, the 8th original block OB8 and the 9th region of initiation
Block OB9, wherein the shape of the first original block OB1 to the 9th original block OB9 is rectangular, and the first original block OB1 to the
The size of nine original block OB9 is 5 (cm) x5 (cm) (i.e. width W2 is 5 (cm), and height H2 is 5 (cm)).In one embodiment,
The primary source OS of file OD to be encrypted can be a picture file as shown in Figure 3, but the present invention is not limited thereto.
In another embodiment, the primary source OS of file OD to be encrypted can be the text file of non-picture file, figure
The staggered report of text or webpage etc., encrypting and deciphering system 100 more can further comprise conversion module 110, to by primary source OS
Content Transformation to be encrypted for non-picture file be it is pictured after file OD to be encrypted.In this embodiment, if it is to be encrypted
When the primary source OS of file OD is not picture file (such as the staggered report of text file, picture and text or webpage etc., in Fig. 3 not
Show), above-mentioned primary source OS can be converted to picture format by conversion module 110, and be sent to cutting module 120, cutting module
120 will be pictured after file OD to be encrypted cut, that is to say, that even if primary source OS to be encrypted is plain text
File, encrypting and deciphering system 100 carry out subsequent processing after it can also being converted to file OD to be encrypted through conversion module 110.
It should be noted that the size of file OD to be encrypted described in the present embodiment, the quantity of original block, original block
The size of shape and original block is only to illustrate, and is not limited thereto.
Further, the first original block OB1 to the 9th original block OB9 has more corresponding original block information
OBI, and original block information OBI includes that the location information PI of the first original block OB1 to the 9th original block OB9 is believed with size
SI and rotation information RI is ceased, wherein location information PI, dimension information SI and rotation information RI respectively indicate the first region of initiation
Block OB1 is to the position of the 9th original block OB9, size and rotates angle.
Illustrate original block information OBI to become apparent from, please with reference to Fig. 4 A, Fig. 4 B and Fig. 4 C.Fig. 4 A is the present invention
(i.e. the first original block OB1's to the 9th original block OB9) is to be encrypted for the 3X3 original block that is already cut into that one embodiment provides
The schematic diagram of file OD, Fig. 4 B are the location information of the first original block OB1 to the 9th original block OB9 shown in corresponding diagram 4A
The schematic diagram of PI, dimension information SI and rotation information RI, Fig. 4 C are that the first original block OB1 to the 9th shown in Fig. 4 A is original
The original block information that block OB9 and location information PI, dimension information SI as shown in Fig. 4 B and rotation information RI are combined into
The table of comparisons of OBI.
As shown in Figure 4 A, the size of file OD to be encrypted is 15 (cm) x15 (cm), i.e. width W1 and height H1 are all 15
(cm), and file OD to be encrypted is cut into 3X3 rectangular original block (i.e. the first original block OB1 to the 9th region of initiation
Block OB9), therefore the size of each original block is 5 (cm) x5 (cm) as shown in Figure 4 B, i.e. width W2 and height H2 are all
5(cm)。
Then, the location information PI of each original block, dimension information SI and rotation information RI are defined to come, then
Location information PI, dimension information SI and rotation information RI, which are combined, can define original block information OBI.Specifically
It, location information PI can be indicated with the coordinate of two-dimensional coordinate system, and dimensional data SI can use the width of cut original block
And height indicates that rotation information RI can indicate with the rotation angle of cut original block.
Specifically, as shown in Figure 4 B, two-dimensional coordinate system foundation is first being already cut into the to be encrypted of 3X3 original block
On file OD, then the center point coordinate of the 5th original block OB5 is defined as (0,0), therefore the first original block OB1, second
Original block OB2, third original block OB3, the 4th original block OB4, the 6th original block OB6, the 7th original block OB7,
The center point coordinate of 8th original block OB8 and the 9th original block OB9 be respectively (- 5,5), (0,5), (5,5), (- 5,
0),(5,0),(-5,-5),(0,-5),(5,-5).Whereby, available first original block OB1 to the 9th original block OB9
Location information PI.
Further, since it is 5 that the width W2 of the first original block OB1 to the 9th original block OB9, which is 5 (cm), height H2,
(cm), therefore the dimension information SI of the first original block OB1 to the 9th original block OB9 can be obtained.
Furthermore the first original block OB1 to the 9th original block OB9 is respectively using its center as rotation center, due to first
Original block OB1 to the 9th original block OB9 is not rotated compared to each rotation center, therefore the first original block OB1 is extremely
The rotation angle of 9th original block OB9 is all 0 degree.
The original block information OBI of first original block OB1 to the 9th original block OB9 can with including location information PI,
The matrix of dimension information SI and rotation information RI indicates.In the present embodiment, the first original block OB1 to the 9th region of initiation
The original block information OBI of block OB9 can be expressed as [x-axis position, y-axis position, width, height rotate angle].
It as shown in Figure 4 C, is to arrange out the first original block OB1 to the 9th its corresponding region of initiation original block OB9
Block message OBI.
By taking the first original block OB1 as an example, the center position coordinate of the first original block OB1 is (- 5,5), and this sits
Mark can be used as the location information PI of the first original block OB1;The width W2 and height H2 of first original block OB1 is all 5
(cm), and this cut lengths can be used as the dimension information SI of the first original block OB1;The rotation angle of first original block OB1
It is 0 degree, and this rotation angle can be used as the rotation information RI of the first original block OB1.Then, by the seat as location information PI
Mark, the width as dimension information SI and height and the rotation angle combinations as rotation information RI, therefore the first region of initiation
The original block information OBI of block OB1 can be defined as [- 5,5,5,5,0].
The original block information OBI of second original block OB2 to the 9th original block OB9 is used and the first original block
The identical definition mode of original block information OBI of OB1 and be defined as respectively [0,5,5,5,0], [5,5,5,5,0], [- 5,0,
5,5,0], [0,0,5,5,0], [5,0,5,5,0], [- 5, -5,5,5,0], [0, -5,5,5,0] and [5, -5,5,5,0].
It should be noted that the definition side of the original block information OBI of the first original block OB1 to the 9th original block OB9
Formula is merely illustrative, is not limited thereto.
Fig. 1, Fig. 2 and Fig. 3 are gone back to again.Module 140 is arranged according to step S140 the first original block of random alignment OB1
To the 9th original block OB9 (as shown in the arrangement stage ARS of Fig. 3).That is, the first original block OB1 to the 9th is original
The position of block OB9 and rotation angle will be rearranged.
Specifically, arrangement module 140 first pacifies the position of the first original block OB1 to the 9th original block OB9 again
Row;Then, then the first original block OB1 from position through rearranging selects several originals into the 9th original block OB9 at random
Beginning block, and rotate the original block being selected.Alternatively, arrangement module 140 can be first original from the first original block OB1 to the 9th
Several original blocks are selected in block OB9 at random, and rotate the original block being selected;Then, then will through rotation and without
It rearranges the position of first original block OB1 to the 9th original block OB9 of rotation.
In the present embodiment, the position of the first original block OB1 to the 9th original block OB9 is all rearranged;In addition,
The original block rotated is using the second original block OB2 and the 7th original block OB7 as example, that is, the second original block
The rotation angle of OB2 and the 7th original block OB7 are rearranged, such as when the second original block OB2 system is to be wherein in a good mood
Needle is rotated by 90 °, and the 7th original block OB7 system rotates clockwise 180 degree with the wherein heart.
It should be noted that the original block rotated and its rotation angle degree are merely illustrative, it is not limited thereto.
In detail, the position of the first original block OB1 through random alignment is located at the position of the 5th original block OB5 originally
It sets, the position of the second original block OB2 through random alignment is located at the position of the first original block OB1 originally, through random alignment
Third original block OB3 position be located at originally the 9th original block OB9 position, the 4th original block through random alignment
The position of OB4 is located at the position of the 7th original block OB7 originally, and the position of the 5th original block OB5 through random alignment is located at
The position of script third original block OB3, the position of the 6th original block OB6 through random alignment are located at the 8th region of initiation originally
The position of block OB8, the position of the 7th original block OB7 through random alignment are located at the position of the 6th original block OB6 originally, warp
The position of 8th original block OB8 of random alignment be located at originally the 4th original block OB4 position, the through random alignment the 9th
The position of original block OB9 is located at the position of the second original block OB2 originally.
In addition, the original block information OBI of the first original block OB1 to the 9th original block OB9 can't because of through with
Machine arranges and changes, that is to say, that the first original block OB1 to the 9th original block OB9 through random alignment still possesses its original
Beginning block information OBI.
The original block of the first original block OB1 to the 9th OB9 through random alignment forms the row such as Fig. 3 according to step S160
The size for encrypting file ED shown in column stage ARS, and encrypting file ED is 15 (cm) x15 (cm).In the present embodiment, it encrypts
The format of file ED is picture format.
Recovery module 160 receives the original block of the first original block OB1 to the 9th original block OB9 according to step S180
Information OBI (as [- 5,5,5,5,0], [0,5,5,5,0], [5,5,5,5,0], [- 5,0,5,5,0], [0,0,5,5,0], [5,0,
5,5,0], [- 5, -5,5,5,0], [0, -5,5,5,0] and [5, -5,5,5,0]) and encryption file ED, and it is original based on first
The original block information OBI of block OB1 to the 9th original block OB9 and encryption file ED, will encryption file ED be reduced into as
Also original RD shown in the reduction phase RSS of Fig. 3.
In detail, recovery module 160 is in the original block for receiving the first original block OB1 to the 9th original block OB9
After information OBI and encryption file ED, according to the dimension information SI in original block information OBI, such as the width W2 of original block
And height H2 is all 5 (cm), and encryption file ED is subjected to the block for being cut into 3X3.Then, original block information is recycled
Location information PI in OBI, such as the first original block OB1 to the 9th original block OB9 center point coordinate be respectively (- 5,5),
(0,5), (5,5), (- 5,0), (0,0), (5,0), (- 5, -5), (0, -5) and (5, -5), and by first through random alignment
The position of original block OB1 to the 9th original block OB9 are rearranged into not yet the first original block OB1 through random alignment extremely
The position of 9th original block OB9.Finally, again by the second original block OB2 and the 7th original block OB7 foundation through rotating
The rotation angle for the second original block OB2 for being rotated clockwise 90 degree is reduced to 0 degree by rotation information RI, and will be through up time
The rotation angle of 7th original block OB7 of needle rotation 180 degree is reduced to 0 degree, to be formed as shown in the reduction phase RSS of Fig. 3
Also original RD, wherein the pattern content of also original RD can correspond to and (be entirely identical in one embodiment) it is original to be added
Ciphertext part OD.
In short, can be incited somebody to action if obtaining the original block information OBI of the first original block OB1 to the 9th original block OB9
File ED decryption is encrypted, and is reduced into the also original RD of corresponding file OD to be encrypted.However, if not obtaining the first original block
Encryption file ED decryption then can not be only capable of exporting such as Fig. 3 by the original block information OBI of OB1 to the 9th original block OB9
Non- reduction phase URSS shown in encryption file ED.Furthermore due to encryption file ED pattern content (pattern of smiling face) with
Pattern content (pattern that can not be recognized) difference of original file OD to be encrypted is too big, therefore people without permission is difficult to from adding
Ciphertext part ED and obtain original file OD to be encrypted, and then reach the purpose for protecting file OD to be encrypted.
In another embodiment, if the primary source OS of file OD to be encrypted is non-picture file, in step S180
The also original RD that picture format can be further included the steps that belonging to later is reduced into native format, such as file OD to be encrypted
When primary source OS is text file, then after step S180, the also original RD for belonging to picture format will be reduced into
Text file.
Referring to Fig. 5, Fig. 6 and Fig. 7.Fig. 5 be another embodiment of the present invention provides encrypting and deciphering system 200 function
Energy module diagram, Fig. 6 are the flow diagram of encipher-decipher method M200 shown in one embodiment of the invention, and Fig. 7 is to utilize Fig. 5
Shown in encrypting and deciphering system 200 carry out file encryption-decryption flow diagram.
In the present embodiment, encrypting and deciphering system 200 can come to carry out encryption and decryption to file using encipher-decipher method M200.Into one
The step process on step ground, encipher-decipher method M200 can refer to by an a kind of non-instantaneous medium capable of reading record record at least program
It enables, this at least program instruction executes encipher-decipher method M200 after being loaded onto encrypting and deciphering system 200, and encipher-decipher method includes
Step S220, step S230, step S240, step S260 and step S280.
Encrypting and deciphering system 200 includes cutting module 220, adding module 230, arrangement module 240 and recovery module 260.
Arrangement module 240 includes the assembled unit 242 being connected to each other and breaks up unit 244, arranges the assembled unit 242 of module 240
It is connect with cutting module 220 and adding module 230, the unit 244 of breaing up of arrangement module 240 is connect with recovery module 260.Also
Former module 260 is connect with cutting module 220.In another embodiment, encrypting and deciphering system 200 more can further comprise conversion module
210, conversion module 210 is connect with cutting module 220.Further, since the modulus of conversion of conversion module 210 and encrypting and deciphering system 100
The framework of block 110, function and application timing are roughly the same, therefore do not repeat separately.
Cutting module 220 receives file OD to be encrypted according to step S220, and file OD to be encrypted is cut into respective tool
There are nine original blocks of original block information OBI.About the further explanation of cutting module 220, with encrypting and deciphering system 100
Cutting module 120 it is roughly the same (as shown in the reception stage RCS and cutting stage DVS of Fig. 7), therefore do not repeat separately.
Adding module 230 adds according to the first addition of step S230 addition block AB1, the second addition block AB2 and third
Add block AB3, wherein first addition block AB1, second addition block AB2 and third addition block AB3 shape be it is rectangular,
And first adds block AB1, the second size for adding block AB2 and third addition block AB3 and the first original block OB1 extremely
The size of 9th original block OB9 is all 5 (cm) x5 (cm).
It should be noted that the quantity, shape and size of addition block described in the present embodiment are merely illustrative, not with this
It is limited.
Arrange the first original block OB1 to the 9th original that the assembled unit 242 of module 240 generates Self cleavage module 220
Beginning block OB9 is combined with the first addition block AB1 to third addition block AB3 generated from adding module 230, also
It is the right that the first addition block AB1 fastens adjacent third original block OB3, the second addition block AB2 fastens adjacent 6th region of initiation
The right of block OB6, third add block AB3 and fasten the right of the 9th original block OB9 of neighbour (such as the addition stage ADS institute of Fig. 7
Show).
It should be noted that the position of addition block described in the present embodiment is merely illustrative, it is not limited thereto.
Arrange the first original block of module 240 breaing up unit 244 and combining according to step S240 random alignment
The addition block AB1 of OB1 to the 9th original block OB9 and first to third addition block AB3 is (such as the arrangement stage ARS institute of Fig. 7
Show).That is, the first original block OB1 to the 9th original block OB9 and first adds block AB1 to third addition area
The position of block AB3 and rotation angle will be rearranged.
Specifically, arrangement module 140 first adds the first original block OB1 to the 9th original block OB9 and first
It rearranges the position of block AB1 to third addition block AB3;, then the first original block from position through rearranging then
OB1 selects several original blocks and addition block into the 9th original block OB9 at random, and rotates the original block being selected
And addition block.Alternatively, arrangement module 140 can first add from the first original block OB1 to the 9th original block OB9 and first
Add block AB1 to select several original blocks at random into third addition block AB3, and rotates the original block being selected and add
Add block;It then, then will be through rotation and the first original block OB1 to the 9th original block OB9 and first without rotation
It rearranges the position of addition block AB1 to third addition block AB3.
In the present embodiment, the addition block AB1 to the of the first original block OB1 to the 9th original block OB9 and first
The position of three addition block AB3 is all rearranged;In addition, the original block rotated is with the second original block OB2, the 7th original
Beginning block OB7, the second addition block AB2 and third addition block AB3 are example, that is, the second original block OB2, the 7th
The rotation angle of original block OB7, the second addition block AB2 and third addition block AB3 are rearranged, such as second former
Beginning, block OB2 system was rotated by 90 ° with hour hands of being wherein in a good mood, and the 7th original block OB7 system rotates clockwise 180 degree with the wherein heart, the
Two addition block AB2 systems rotate clockwise 270 degree with the wherein heart, and third original block AB3 system rotates clockwise 90 with the wherein heart
Degree.
It should be noted that the original block rotated and addition block and its rotation angle degree are merely illustrative, not with this
It is limited.
In detail, the position of the first original block OB1 through random alignment is located at the position of the 5th original block OB5 originally
It sets, the position of the second original block OB2 through random alignment is located at the position of the first original block OB1 originally, through random alignment
Third original block OB3 position be located at originally the 9th original block OB9 position, the 4th original block through random alignment
The position of OB4 is located at the position of the second addition block AB2 originally, and the position of the 5th original block OB5 through random alignment is located at
Script third adds the position of block AB3, and the position of the 6th original block OB6 through random alignment is located at the 8th region of initiation originally
The position of block OB8, the position of the 7th original block OB7 through random alignment are located at the position of the 6th original block OB6 originally, warp
The position of 8th original block OB8 of random alignment be located at originally the 4th original block OB4 position, the through random alignment the 9th
The position of original block OB9 is located at the position of the second original block OB2 originally, the first addition block AB1's through random alignment
Position is located at the position of script third original block OB3, and the position of the second addition block AB2 through random alignment is located at originally the
The position of seven original block OB7, the position of the third addition block AB3 through random alignment, which is located at, first adds block AB1 originally
Position.
It should be noted that the original block information OBI of the first original block OB1 to the 9th original block OB9 can't be because
To change through random alignment, that is to say, that the first original block OB1 to the 9th original block OB9 through random alignment is still protected
There is its original block information OBI.
The first original block OB1 to the 9th original block OB9 and first through random alignment adds block AB1 to third
It adds block AB3 and forms the encryption file ED as shown in the arrangement stage ARS of Fig. 7 according to step S260, and encrypt file ED's
Having a size of 15 (cm) x20 (cm).
Recovery module 260 receives the original block of the first original block OB1 to the 9th original block OB9 according to step S280
Information OBI (as [- 5,5,5,5,0], [0,5,5,5,0], [5,5,5,5,0], [- 5,0,5,5,0], [0,0,5,5,0], [5,0,
5,5,0], [- 5, -5,5,5,0], [0, -5,5,5,0] and [5, -5,5,5,0]) and encryption file ED, and it is original based on first
The original block information OBI of block OB1 to the 9th original block OB9 and encryption file ED, will encryption file ED be reduced into as
Also original RD shown in the reduction phase RSS of Fig. 7.
In detail, recovery module 260 is in the original block for receiving the first original block OB1 to the 9th original block OB9
After information OBI and encryption file ED, according to the dimension information SI in original block information OBI, such as the width W2 of original block
And height H2 is all 5 (cm), and encryption file ED is subjected to the block for being cut into 3X3.Then, original block information is recycled
Location information PI in OBI, such as the first original block OB1 to the 9th original block OB9 center point coordinate be respectively (- 5,5),
(0,5), (5,5), (- 5,0), (0,0), (5,0), (- 5, -5), (0, -5) and (5, -5), and by first through random alignment
The position of original block OB1 to the 9th original block OB9 are rearranged into not yet the first original block OB1 through random alignment extremely
The position of 9th original block OB9, and skip over or delete the first addition block AB1 to third addition block AB3 of addition.Most
Afterwards, it then by the second original block OB2 and the 7th original block OB7 foundation rotation information RI through rotating, will be revolved clockwise
The rotation angle for the second original block OB2 turning 90 degrees is reduced to 0 degree, and the 7th region of initiation that will be rotated clockwise 180 degree
The rotation angle of block OB7 is reduced to 0 degree, to form the also original RD as shown in the reduction phase RSS of Fig. 7, wherein going back original text
The pattern content of part RD can correspond to and (be entirely identical in one embodiment) original file OD to be encrypted.
In short, can be incited somebody to action if obtaining the original block information OBI of the first original block OB1 to the 9th original block OB9
File ED decryption is encrypted, and is reduced into the also original RD of corresponding file OD to be encrypted.However, if not obtaining the first original block
Encryption file ED decryption then can not be only capable of exporting such as Fig. 7 by the original block information OBI of OB1 to the 9th original block OB9
Non- reduction phase URSS shown in encryption file ED.Furthermore due to encryption file ED pattern content (pattern of smiling face) with
Pattern content (pattern that can not be recognized) difference of original file OD to be encrypted is too big, therefore people without permission is difficult to from adding
Ciphertext part ED and obtain original file OD to be encrypted, and then reach the purpose for protecting file OD to be encrypted.
In another embodiment, if the primary source OS of file OD to be encrypted is non-picture file, in step S280
The also original RD that picture format can be further included the steps that belonging to later is reduced into native format, such as file OD to be encrypted
When primary source OS is text file, then after step S280, the also original RD for belonging to picture format will be reduced into
Text file.
Referring to Fig. 8, Fig. 9 and Figure 10.Fig. 8 is the encrypting and deciphering system 300 that further embodiment of this invention provides
The functional block diagram, Fig. 9 are the flow diagram for the encipher-decipher method M300 that one embodiment of the invention provides, and Figure 10 is to utilize
Encrypting and deciphering system 300 shown in Fig. 8 carries out the flow diagram of file encryption-decryption.
In the present embodiment, encrypting and deciphering system 300 can come to carry out encryption and decryption to file using encipher-decipher method M300.Into one
The step process on step ground, encipher-decipher method M300 can refer to by an a kind of non-instantaneous medium capable of reading record record at least program
It enables, this at least program instruction executes encipher-decipher method M300 after being loaded onto encrypting and deciphering system 300, and encipher-decipher method includes
Step S320, step S330, step S340, step S360 and step S380.
Encrypting and deciphering system 300 includes cutting module 320, adding module 330, arrangement module 340 and recovery module 360.
Arrangement module 340 includes the assembled unit 342 being connected to each other and breaks up unit 344, arranges the assembled unit 342 of module 340
It is connect with adding module 330 and recovery module 360.The unit 344 of breaing up of arrangement module 340 is connect with cutting module 320.Also
Former module 360 is connect with cutting module 320.In another embodiment, encrypting and deciphering system 300 more can further comprise conversion module
310, conversion module 310 is connect with cutting module 320.Further, since the modulus of conversion of conversion module 310 and encrypting and deciphering system 100
The framework of block 110, function and application timing are roughly the same, therefore do not repeat separately.
Cutting module 320 receives file OD to be encrypted according to step S320, and file OD to be encrypted is cut into respective tool
There are nine original blocks of original block information OBI.About the further explanation of cutting module 320, with encrypting and deciphering system 100
Cutting module 120 it is roughly the same (as shown in the reception stage RCS and cutting stage DVS of Figure 10), therefore do not repeat separately.
Adding module 330 adds according to the first addition of step S330 addition block AB1, the second addition block AB2 and third
Add block AB3, wherein first addition block AB1, second addition block AB2 and third addition block AB3 shape be it is rectangular,
And first adds block AB1, the second size for adding block AB2 and third addition block AB3 and the first original block OB1 extremely
The size of 9th original block OB9 is all 5 (cm) x5 (cm).
It should be noted that the quantity, shape and size of addition block described in the present embodiment are merely illustrative, not with this
It is limited.
Firstly, arrangement module 340 breaks up 344 random alignment the first original block OB1 to the 9th original block OB9 of unit
(as shown in the arrangement stage ARS of Figure 10), since the 10th arrangement stage ARS is roughly the same with the arrangement stage ARS of Fig. 3, therefore
The random alignment mode of first original block OB1 to the 9th original block OB9 does not repeat separately.
First addition block AB1 to third is added block according to step S340 by the assembled unit 342 for arranging module 340
AB3 (identical to third addition block AB3 as the first addition block AB1 shown in the addition stage ADS in Fig. 7) is arranged at random with warp
The first original block OB1 to the 9th original block OB9 of column is combined, that is, the first addition block AB1 fastens adjacent the
The right of three original block OB3, the second elder generation, addition block AB2 system close to behind the right of the 5th original block OB5 again with its center
270 degree are rotated clockwise (alternatively, the second addition block AB2 first rotates clockwise 270 degree with the wherein heart, then original close to the 5th
The right of block OB5), third add elder generation, block AB3 system close to behind the right of the 7th original block OB7 again with hour hands of being wherein in a good mood
It is rotated by 90 ° (alternatively, third addition block AB3 is first rotated by 90 ° with hour hands of being wherein in a good mood, then close to the 5th original block OB5's
The right) (as shown in the addition stage ADS of Figure 10).
It should be noted that the position of addition block described in the present embodiment, the addition block rotated and its rotation angle
It spends merely illustrative, is not limited thereto.
First original block OB1 to nineth of the first addition block AB1 to third addition block AB3 and through random alignment
Original block OB9 forms encryption file ED as shown in Figure 10 according to step S360, and the size for encrypting file ED is 15 (cm)
x20(cm)。
Recovery module 360 receives the original block of the first original block OB1 to the 9th original block OB9 according to step S380
Information OBI (as [- 5,5,5,5,0], [0,5,5,5,0], [5,5,5,5,0], [- 5,0,5,5,0], [0,0,5,5,0], [5,0,
5,5,0], [- 5, -5,5,5,0], [0, -5,5,5,0] and [5, -5,5,5,0]) and encryption file ED, and it is original based on first
The original block information OBI of block OB1 to the 9th original block OB9 and encryption file ED, will encryption file ED be reduced into as
Also original RD shown in the reduction phase RSS of Figure 10.
In detail, recovery module 360 is in the original block for receiving the first original block OB1 to the 9th original block OB9
After information OBI and encryption file ED, according to the dimension information SI in original block information OBI, such as the width W2 of original block
And height H2 is all 5 (cm), and encryption file ED is subjected to the block for being cut into 3X3.Then, original block information is recycled
Location information PI in OBI, such as the first original block OB1 to the 9th original block OB9 center point coordinate be respectively (- 5,5),
(0,5), (5,5), (- 5,0), (0,0), (5,0), (- 5, -5), (0, -5) and (5, -5), and by first through random alignment
The position of original block OB1 to the 9th original block OB9 are rearranged into not yet the first original block OB1 through random alignment extremely
The position of 9th original block OB9, and skip over or delete the first addition block AB1 to third addition block AB3 of addition.Most
Afterwards, it then by the second original block OB2 and the 7th original block OB7 foundation rotation information RI through rotating, will be revolved clockwise
The rotation angle for the second original block OB2 turning 90 degrees is reduced to 0 degree, and the 7th region of initiation that will be rotated clockwise 180 degree
The rotation angle of block OB7 is reduced to 0 degree, to form the also original RD as shown in the reduction phase RSS of Figure 10, wherein going back original text
The pattern content of part RD can correspond to and (be entirely identical in one embodiment) original file OD to be encrypted.
In short, can be incited somebody to action if obtaining the original block information OBI of the first original block OB1 to the 9th original block OB9
File ED decryption is encrypted, and is reduced into the also original RD of corresponding file OD to be encrypted.However, if not obtaining the first original block
Encryption file ED decryption then can not be only capable of exporting such as Figure 10 by the original block information OBI of OB1 to the 9th original block OB9
Non- reduction phase URSS shown in encryption file ED.Furthermore due to encryption file ED pattern content (pattern of smiling face) with
Pattern content (pattern that can not be recognized) difference of original file OD to be encrypted is too big, therefore people without permission is difficult to from adding
Ciphertext part ED and obtain original file OD to be encrypted, and then reach the purpose for protecting file OD to be encrypted.
In another embodiment, if the primary source OS of file OD to be encrypted is non-picture file, in step S380
The also original RD that picture format can be further included the steps that belonging to later is reduced into native format, such as file OD to be encrypted
When primary source OS is text file, then after step S380, the also original RD for belonging to picture format will be reduced into
Text file.
Above-mentioned encrypting and deciphering system 100~300 and encipher-decipher method M100~M300 system are using simple and permanent protective property
Cutting and recombination encryption and decryption mechanism carry out file encryption and decryption;In addition, encrypting and deciphering system 100~300 and encryption and decryption
Method M100~M300 is equally applicable for the field of any required encryption and decryption file, such as webpage field.It is led when being applied to webpage
When in domain, the technology of cutting and recombination can utilize stacking style sheet (cascading style sheets, CSS) typesetting skill
Art is completed, and is so not limited thereto.
In conclusion encrypting and deciphering system of the invention, encipher-decipher method and non-instantaneous computer-readable medium storing
File to be encrypted multiple original blocks and arrangement module can be cut by cutting module to arrange multiple original blocks at random
Column, and can be by file encryption to be encrypted at encryption file, and by recovery module by the position of the original block through random alignment
Be reduced into home position, therefore and the also original that file will be encrypted is reduced into corresponding file to be encrypted, use and avoid without awarding
Power person is improper to use file to be encrypted, such as downloading or printing, therefore improves the protection to file to be encrypted.
Although this case is disclosed above with embodiment, so it is not limited to this case, has in any technical field
Usually intellectual, in the spirit and scope for not departing from this case, when can make it is a little change and retouch, therefore the protection model of this case
It encloses subject to attached claim institute defender after view.
In several embodiments provided herein, it should be understood that disclosed system, device and/or method, it can
To realize by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit/
The division of module, only a kind of logical function partition, there may be another division manner in actual implementation, such as multichannel unit
Or module can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit
Indirect coupling or communication connection can be electrical property, mechanical or other forms.
The units/modules as illustrated by the separation member may or may not be physically separated, as
The component that units/modules are shown may or may not be physical unit, it can and it is in one place, or can also be with
It is distributed on multi-channel network unit.Some or all of units/modules therein can be selected to realize according to the actual needs
This embodiment scheme purpose.
In addition, each functional unit/module in each embodiment of the present invention can integrate in a processing unit/module
In, it is also possible to each unit/module and physically exists alone, one can also be integrated in two or more units/modules
In units/modules.Above-mentioned integrated units/modules both can take the form of hardware realization, can also add software using hardware
Functional unit/module form is realized.
The above-mentioned integrated units/modules realized in the form of SFU software functional unit/module, can store and calculate at one
In machine read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions use so that
The one or more processors of one computer equipment (can be personal computer, server or the network equipment etc.) execute
The part steps of each embodiment the method for the present invention.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only storage
Device (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic
The various media that can store program code such as dish or CD.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of encrypting and deciphering system characterized by comprising
One cutting module, a file to be encrypted is cut into multiple original blocks respectively with an original block information;
One arrangement module, connect, to the multiple original block of random alignment to form an encryption file with the cutting module;With
And
One recovery module is connect, to receive the multiple of multiple original block with the cutting module and the arrangement module
Original block information and the encryption file, and multiple original block information based on multiple original block is literary by the encryption
Part is reduced into the one of the corresponding file to be encrypted also original.
2. encrypting and deciphering system as described in claim 1, which is characterized in that the original block information includes location information, size
Information and rotation information.
3. encrypting and deciphering system as described in claim 1, which is characterized in that the encrypting and deciphering system further includes an adding module, should
Adding module is connect with the arrangement module, to add multiple addition blocks to combine with multiple original block, the arrangement mould
Block is to the multiple addition block of random alignment and multiple original block to form the encryption file, and the recovery module is to connect
The multiple original block information and the encryption file of multiple original block are received, and more based on this of multiple original block
The encryption file is reduced into the also original by a original block information.
4. encrypting and deciphering system as described in claim 1, which is characterized in that the encrypting and deciphering system further includes an adding module, should
Adding module is connect with the arrangement module, to add multiple addition blocks with multiple original block group through random alignment
It closes to form the encryption file, the recovery module is to receive multiple original block information of multiple original block and be somebody's turn to do
File is encrypted, and the encryption file is reduced into this and goes back original text by multiple original block information based on multiple original block
Part.
5. a kind of encipher-decipher method, which is characterized in that comprising steps of
Receive a file to be encrypted;
The file to be encrypted is cut into multiple original blocks respectively with an original block information;
The combination of the multiple original block of random alignment, the multiple original block of random alignment and multiple addition blocks, or combination
Multiple addition block and multiple original block through random alignment;
Form an encryption file;And
The multiple original block information and the encryption file of multiple original block are received, and is based on multiple original block
Multiple original block information the encryption file is reduced into the one of the corresponding file to be encrypted also original.
6. encipher-decipher method as claimed in claim 5, which is characterized in that be somebody's turn to do the file to be encrypted to be cut into respectively to have
The combination of the step of multiple original blocks of original block information and the multiple original block of random alignment and multiple addition blocks
The step of between further include the steps that adding multiple addition blocks.
7. encipher-decipher method as claimed in claim 5, which is characterized in that respectively have one the file to be encrypted to be cut into
The step of multiple original blocks of original block information with combine multiple addition block with it is multiple original through random alignment
Further include the steps that adding multiple addition blocks between the step of block.
8. a kind of non-instantaneous computer-readable medium storing, which records an at least journey
Sequence instruction, which is characterized in that an at least program instruction executes step after being loaded onto an encrypting and deciphering system:
Receive a file to be encrypted;
The file to be encrypted is cut into multiple original blocks respectively with the original block information;
The combination of the multiple original block of random alignment, the multiple original block of random alignment and multiple addition blocks, or combination
Multiple addition block and multiple original block through random alignment;
Form an encryption file;And
The multiple original block information and the encryption file of multiple original block are received, and is based on multiple original block
Multiple original block information the encryption file is reduced into the one of the corresponding file to be encrypted also original.
9. non-instantaneous computer-readable medium storing as claimed in claim 8, which is characterized in that by the file to be encrypted
The step of being cut into multiple original block respectively with the original block information and the multiple original block of random alignment with
Further include the steps that adding multiple addition block between the step of combination of multiple addition block.
10. non-instantaneous computer-readable medium storing as claimed in claim 8, which is characterized in that by the ciphertext to be added
Part be cut into respectively have the step of multiple original block of original block information with combine multiple addition block with pass through with
Further include the steps that adding multiple addition block between the step of multiple original block of machine arrangement.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106127364 | 2017-08-11 | ||
TW106127364A TW201911105A (en) | 2017-08-11 | 2017-08-11 | Encryption and decryption system, encryption and decryption method, and non-transitory computer readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109388964A true CN109388964A (en) | 2019-02-26 |
Family
ID=65416597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810609735.2A Pending CN109388964A (en) | 2017-08-11 | 2018-06-13 | Encryption/decryption system and method, and non-transitory computer-readable recording medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109388964A (en) |
TW (1) | TW201911105A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110363016A (en) * | 2019-07-15 | 2019-10-22 | 宜春宜联打印设备有限公司 | A kind of printing encryption method and device, Method of printing and printing device |
-
2017
- 2017-08-11 TW TW106127364A patent/TW201911105A/en unknown
-
2018
- 2018-06-13 CN CN201810609735.2A patent/CN109388964A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110363016A (en) * | 2019-07-15 | 2019-10-22 | 宜春宜联打印设备有限公司 | A kind of printing encryption method and device, Method of printing and printing device |
Also Published As
Publication number | Publication date |
---|---|
TW201911105A (en) | 2019-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2330533A1 (en) | Recording/reproducing system, recording medium device, and recording/reproducing device | |
US20200186354A1 (en) | Digital composition hashing | |
CN104145274A (en) | Media encryption based on biometric data | |
CN106233292B (en) | Synthesize document access | |
CN103748827A (en) | System and method for wireless data protection | |
CN104463529A (en) | Logistics distribution bill generating method based on two-dimension code and encryption technology | |
CN102138300A (en) | Message authentication code pre-computation with applications to secure memory | |
JPH05244150A (en) | Method and device for intelligent information processing | |
CN103907308A (en) | Host device, semiconductor memory device, and authentication method | |
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
JP2007206762A (en) | Communication method and communication device using two-dimensional code | |
CN101652987A (en) | Paper media information encryption system, decryption system, program and method | |
CN106682521B (en) | File transparent encryption and decryption system and method based on driver layer | |
AU2006221275A1 (en) | Data processing apparatus | |
CN101641701A (en) | Device and method for digital processing management of content so as to enable an imposed work flow | |
CN109388964A (en) | Encryption/decryption system and method, and non-transitory computer-readable recording medium | |
CN107169911A (en) | A kind of image encryption method converted based on Arnold transformation | |
JPWO2002027501A1 (en) | Electronic information organization restoration method | |
CN101739532B (en) | Method and system for processing digital content according to a workflow | |
CN115952529B (en) | User data processing method, computing device and storage medium | |
JP2006239928A (en) | Image forming apparatus | |
JP2007072643A (en) | Data storage system | |
JP2008312156A (en) | Information processing apparatus, encryption processing method, and encryption processing program | |
CN103491384B (en) | Encrypting method and device of video and decrypting method and device of video | |
CN110428259A (en) | Block chain business datum transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190226 |