CN109977684A - A kind of data transmission method, device and terminal device - Google Patents

A kind of data transmission method, device and terminal device Download PDF

Info

Publication number
CN109977684A
CN109977684A CN201910111103.8A CN201910111103A CN109977684A CN 109977684 A CN109977684 A CN 109977684A CN 201910111103 A CN201910111103 A CN 201910111103A CN 109977684 A CN109977684 A CN 109977684A
Authority
CN
China
Prior art keywords
data
encrypted data
encrypted
encryption
location information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910111103.8A
Other languages
Chinese (zh)
Other versions
CN109977684B (en
Inventor
黄锦伦
杨益
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910111103.8A priority Critical patent/CN109977684B/en
Priority to PCT/CN2019/091503 priority patent/WO2020164211A1/en
Publication of CN109977684A publication Critical patent/CN109977684A/en
Application granted granted Critical
Publication of CN109977684B publication Critical patent/CN109977684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The present invention provides a kind of data transmission method, device and terminal devices, are suitable for technical field of data processing, this method comprises: the file type based on be-encrypted data and file size carry out snippet extraction, obtain multiple data slots and location information;Randomly ordered merging is carried out to data slot, obtains the location information of merging data and each data slot in merging data;Search the corresponding irreversible encryption algorithm of file size and reversible encryption decipherment algorithm of merging data;Merging data is handled based on irreversible encryption algorithm to obtain check code, and location information is handled based on reversible encryption decipherment algorithm, obtains encryption information;By check code and encryption information, carry out data transmission together with be-encrypted data.It cracks index of difficulty rising to the relatively fixed single Processing Algorithm of the embodiment of the present invention, so that criminal can not predict the algorithm that may be used and the result being likely to be obtained, it is more difficult to crack corresponding process.

Description

A kind of data transmission method, device and terminal device
Technical field
The invention belongs to technical field of data processing more particularly to data transmission methods and terminal device.
Background technique
In data transmission procedure, data are extremely easy to be malfunctioned by network failure or criminal's attack, in order to Guarantee the safe and reliable of data transmission, is all that directly data are verified using the fixed-encryption algorithm chosen in the prior art Code calculates, then carries out verifying judges whether data are complete using check code in receiving end, but due to the encryption of prior art use Algorithm is often fixed and single, and criminal is easy to pointedly crack.Therefore, in order to guarantee data transmission safety Completely, a kind of higher data transfer check method of safety and reliability is needed.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of data transmission method and terminal device, to solve the prior art In middle data transmission procedure, data encryption verifies the lower problem of safety and reliability.
The first aspect of the embodiment of the present invention provides a kind of data transmission method, comprising:
File type and file size based on be-encrypted data carry out data slot to the be-encrypted data and mention It takes, obtains first of corresponding multiple first data slots and each first data slot in the be-encrypted data Location information;
Randomly ordered merging is carried out to first data slot, obtains corresponding first merging data and each described Second location information of first data slot in first merging data;
Search first merging data the corresponding first irreversible encryption algorithm of file size and first it is reversible plus Close decipherment algorithm;
First merging data is handled based on the first irreversible encryption algorithm to obtain the first check code, and The first location information and the second location information are handled based on the first reversible encryption decipherment algorithm, obtained Encryption information;
By first check code and the encryption information, recipient is transmitted to together with the be-encrypted data, wherein First check code and the encryption information are used for the recipient and carry out data integrity verifying to the be-encrypted data.
The second aspect of the embodiment of the present invention provides a kind of data verification method, comprising:
Obtain the be-encrypted datas of data transfer means transfers as described in claim 1, first check code with And the encryption information;
File type and file size based on the be-encrypted data carry out data slot to the be-encrypted data Extract, obtain corresponding multiple second data slots and each described the and data slot in the be-encrypted data the Three location informations;
Search the file size and corresponding second irreversible encryption algorithm and second reversible of second data slot Encryption-decryption algorithm, and being handled the encryption information based on the second reversible encryption decipherment algorithm obtains described the One location information and the second location information;
Based on the third place information, the first location information and the second location information, to second number It is ranked up merging according to segment, obtains corresponding second merging data;
Second merging data is handled based on the second irreversible encryption algorithm to obtain the second check code, and Judge whether second check code and first check code are identical;
If second check code is identical as first check code, determine that the be-encrypted data verification is complete.
The third aspect of the embodiment of the present invention provides a kind of data transmission device, comprising:
First snippet extraction module, for file type and file size based on be-encrypted data, to described to be added Ciphertext data carries out data slot extraction, obtains corresponding multiple first data slots and each first data slot in institute State the first location information in be-encrypted data;
Segment sorting module obtains corresponding first and closes for carrying out randomly ordered merging to first data slot And the second location information of data and each first data slot in first merging data;
First algorithmic match module, file size for searching first merging data it is corresponding first it is irreversible plus Close algorithm and the first reversible encryption decipherment algorithm;
Double-encryption module, for being handled based on the first irreversible encryption algorithm first merging data The first check code is obtained, and based on the first reversible encryption decipherment algorithm to the first location information and the second position Information is handled, and encryption information is obtained;
Data transmission module is used for by first check code and the encryption information, together with the be-encrypted data It is transmitted to recipient, wherein first check code and the encryption information are used for the recipient to the be-encrypted data Carry out data integrity verifying.
The second aspect of the embodiment of the present invention provides a kind of terminal device, and the terminal device includes memory, processing Device, the computer program that can be run on the processor is stored on the memory, and the processor executes the calculating Following steps are realized when machine program.
The fourth aspect of the embodiment of the present invention provides a kind of data transmission device, comprising:
Data acquisition module, for obtain data transmission device as claimed in claim 7 transmission the be-encrypted data, First check code and the encryption information;
Second snippet extraction module, for file type and file size based on the be-encrypted data, to described Be-encrypted data carries out data slot extraction, obtain corresponding multiple second data slots and each described the and data slot The third place information in the be-encrypted data;
Second algorithmic match module, for searching the file size of second data slot and corresponding second irreversible Encryption Algorithm and the second reversible encryption decipherment algorithm, and based on the second reversible encryption decipherment algorithm to the encryption information It is handled, obtains the first location information and the second location information;
Segment merging module, for being based on the third place information, the first location information and the second position Information is ranked up merging to second data slot, obtains corresponding second merging data;
Data check module, for being handled based on the second irreversible encryption algorithm second merging data The second check code is obtained, and judges whether second check code and first check code are identical;
Determination module determines the be-encrypted data if identical as first check code for second check code Verification is complete.
5th aspect of the embodiment of the present invention provides a kind of terminal device, and the terminal device includes memory, processing Device, the computer program that can be run on the processor is stored on the memory, and the processor executes the calculating The step of realizing data transmission method as described above when machine program.
6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, comprising: is stored with computer Program, which is characterized in that the step of computer program realizes data transmission method as described above when being executed by processor.
Existing beneficial effect is the embodiment of the present invention compared with prior art: in ciphering process, according to number to be encrypted According to actual file type and volume situation choose corresponding data fragment extracting method, and carry out the extraction of data slot, The data slot obtained again to extraction merges into row stochastic sequence, while choosing one according to the practical total volume of data slot A irreversible encryption algorithm and reversible encryption decipherment algorithm are finally based on irreversible encryption algorithm and reversible encryption decipherment algorithm again Respectively two location informations to merging obtained merging data and data slot in be-encrypted data and merging data into Row processing, obtains corresponding check code and encryption information, to subsequent verification.Due to data slot extraction and and data slice The encryption of section is determined by the data of actually required transmission, while being also each completely random to the sequence of data slot , so that three steps of data transmission procedure all have great randomness and uniqueness every time, and three random phases Multiply the combination that theoretically can produce a large amount of Different treatments, relatively fixed single Processing Algorithm its crack on index of difficulty It rises, so that criminal can not predict the algorithm that may be used and the result being likely to be obtained, it is more difficult to crack corresponding process.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram for the data transmission method that the embodiment of the present invention one provides;
Fig. 2 is the implementation process schematic diagram of data transmission method provided by Embodiment 2 of the present invention;
Fig. 3 is the implementation process schematic diagram for the data transmission method that the embodiment of the present invention three provides;
Fig. 4 is the implementation process schematic diagram for the data transmission method that the embodiment of the present invention four provides;
Fig. 5 is the implementation process schematic diagram for the data transmission method that the embodiment of the present invention five provides;
Fig. 6 is the implementation process schematic diagram for the data verification method that the embodiment of the present invention four provides;
Fig. 7 is the structural schematic diagram for the data transmission device that the embodiment of the present invention six provides;
Fig. 8 is the structural schematic diagram for the data calibration device that the embodiment of the present invention six provides;
Fig. 9 is the schematic diagram for the terminal device that the embodiment of the present invention seven provides.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 shows the implementation flow chart of the data transmission method of the offer of the embodiment of the present invention one, and details are as follows:
S101, file type and file size based on be-encrypted data carry out data slot to be-encrypted data and mention It takes, obtains the first position letter of corresponding multiple first data slots and each first data slot in be-encrypted data Breath.
Wherein specific accessible file type can be set according to actual needs by technical staff, including but not limited to as schemed Picture, audio, video and text.In view of the data of different file types, its feature is different, and for every kind of Encryption Algorithm to not With the encryption efficiency also difference of file size size, therefore, in order to guarantee that the data slot extracted is representative, with It ensures the validity of subsequent encryption, while guaranteeing the efficiency of encryption and to the randomness of subsequent encryption to improve cryptographic check Different snippet extractions can be arranged for the data of different file types and different file sizes in the embodiment of the present invention in safety Method can also be by technical staff's sets itself according to actual needs specifically, can refer to the embodiment of the present invention two to five.? While extracting the first required data slot, the embodiment of the present invention also will record the first data slot in be-encrypted data Practical first location information, such as when be-encrypted data is audio data, record each audio data section for extracting to Initial time and termination time in encryption data, to obtain its first location information in be-encrypted data.
S102 carries out randomly ordered merging to the first data slot, obtains corresponding first merging data and each the Second location information of one data slot in the first merging data.
After multiple first data slots extracted in obtaining be-encrypted data, the embodiment of the present invention it can be carried out with The sequence and merging of machine, while the second location information after record ordering, this location information is either merge number first Absolute position in, it is such as above-mentioned when be-encrypted data is audio data, it records each audio data section extracted and exists Initial time and termination time in be-encrypted data, are also possible to the relative position in the first merging data, after sorting Serial number, specifically voluntarily chosen by technical staff.
S103, search the first merging data the corresponding first irreversible encryption algorithm of file size and first it is reversible plus Close decipherment algorithm.
S104 handles the first merging data based on the first irreversible encryption algorithm to obtain the first check code, and base First location information and second location information are handled in the first reversible encryption decipherment algorithm, obtain encryption information.
In order to guarantee the reliability of data transmission encrypted authentication, merging of the meeting to different file sizes in the embodiment of the present invention Different irreversible encryption algorithm and reversible encryption decipherment algorithm is arranged in data, since above-mentioned merging data is the first data slot Extraction be that there is certain randomness (related to the type of specific transmission data and volume every time) so that obtain the The volume of one merging data is also to have corresponding randomness, is arranged for the merging data of different volumes corresponds on this basis Irreversible encryption algorithm and reversible encryption decipherment algorithm so that being also to the specific Encryption Algorithm of use in the embodiment of the present invention With certain randomness, simultaneously as the first data slot is randomly ordered merging, therefore obtained check code is encrypted Also all there is extremely strong randomness with encryption information, therefore in embodiments of the present invention, data fragment extracting method, data , there is randomness in segment sequence and merging data Encryption Algorithm, can with the variation for the data transmitted needed for specific and Variation, even and to same Data duplication carry out transfer check, finally obtained check code and encryption information are also to have Randomness, so that transfer check process each in the embodiment of the present invention has uniqueness, and because of three random phases Multiplying, theoretically can produce a large amount of different Processing Algorithm combinations, it cracks index of difficulty rising to more general list algorithm process, Crack that difficulty is very big so that criminal can not predict the algorithm that may be used and be likely to be obtained as a result, it is even more impossible to crack Corresponding process.
Wherein, the specific corresponding irreversible encryption algorithm of every kind of file size and reversible encryption decipherment algorithm, can be by technology Personnel set according to actual needs, including but not limited to such as: irreversible MD5 algorithm and sha1 algorithm, reversible 3DES algorithm With IDEA algorithm etc., but the algorithm type of irreversible encryption algorithm and reversible encryption decipherment algorithm used by need to guaranteeing is all big In 1.
First check code and encryption information are transmitted to recipient by S105 together with be-encrypted data, wherein the first school It tests code and encryption information and data integrity verifying is carried out to be-encrypted data for recipient.
After generating corresponding first check code of be-encrypted data and encryption information, the embodiment of the present invention can be by the first school It tests code and encryption information is sent to recipient together with be-encrypted data, so that recipient can be to the number to be encrypted received According to progress completeness check.
In embodiments of the present invention, in ciphering process, according to the actual file type and volume situation of be-encrypted data It chooses corresponding data fragment extracting method, and carries out the extraction of data slot, then the data slot that extraction obtains is carried out Random sequence merges, while an irreversible encryption algorithm and reversible encryption are chosen according to the practical total volume of data slot Decipherment algorithm, the merging data that finally merging is obtained respectively based on irreversible encryption algorithm and reversible encryption decipherment algorithm again, And two location informations of the data slot in be-encrypted data and merging data are handled, obtain corresponding check code with And encryption information, to subsequent verification.Due to data slot extract and and the encryption of data slot be by actually required biography What defeated data determined, while being also each completely random to the sequence of data slot, so that data are transmitted across every time Three steps of journey all have great randomness and uniqueness, and three random multiplications theoretically can produce and not exist together largely The combination of reason mode, it cracks index of difficulty rising to relatively fixed single Processing Algorithm, so that can not predict can by criminal The algorithm that can be used and the result being likely to be obtained, it is more difficult to crack corresponding process.
As a kind of specific implementation side for carrying out the first data slot extraction in the embodiment of the present invention one to be-encrypted data Formula, as shown in Fig. 2, the embodiment of the present invention two, comprising:
S201 is extracted to be added if the file type of be-encrypted data is image and file size is less than preset vol threshold value The image characteristic point of ciphertext data, and line is carried out based on the Edge Feature Points in image characteristic point, draw corresponding polygon.
S202 is split the picture material in polygon, obtains and the first data slot multiple figures correspondingly As region, and obtain first location information of each image-region in be-encrypted data.
When be-encrypted data is image and smaller file size, in order to guarantee the effective of the first data slot extracted Property, the embodiment of the present invention be directed to image the characteristics of, with to image carry out feature point extraction and draw include all image characteristic points Polygon mode, all characteristic points of image are remained, then the picture material in polygon is split, are obtained Multiple images content, as multiple first data slots needed for the embodiment of the present invention.Wherein, the specific size of volume threshold can By technical staff's sets itself.
Wherein, specific dividing method can be by technical staff's sets itself, including but not limited to such as according to pre-set image area Domain size is split, and is such as split according to 10 pixels × 10 pixels size.First location information, either image district The absolute position in pending data, the absolute position can be constituted again with the coordinate of each marginal point of image-region in domain, at this time The first location information of each image-region can use one group of array record, be also possible to image-region all pixels point coordinate and The virtual center pixel coordinate position that value obtains is as first location information, the first location information of each image-region at this time An only pixel coordinate, specifically can be by technical staff's sets itself.
It is implemented as the another of the first data slot extraction is carried out to be-encrypted data in the embodiment of the present invention one Mode, as shown in figure 3, the embodiment of the present invention three, comprising:
S301, if the file type of be-encrypted data is text and file size is less than preset vol threshold value, to be encrypted Data carry out key character lookup, filter out in text with the first data slot multiple key characters correspondingly, and obtain First location information of each key character in be-encrypted data.
When be-encrypted data is text data and smaller file size, in order to guarantee the effective of the data slot extracted Property, the embodiment of the present invention can carry out key character lookup to be-encrypted data, wherein can pre-set pass by technical staff Key characters table, and character match is carried out to be-encrypted data according to the key character content for including in key character table, with reality Now to the lookup of key character.In view of the demand of different user transmission data is different, i.e., its keyword for different user Content can also have differences, therefore in embodiments of the present invention, specific key character table content can by technical staff according to The actual demand of user determines.Wherein, the specific size of volume threshold can be by technical staff's sets itself.
A kind of preferred embodiment of key character lookup is carried out as the embodiment of the present invention, it is contemplated that right in practical application For different data, the particular content of key character possibly can not be determined, for example, it is assumed that required transmission is to be encrypted suitable To insure order data, order number therein, insurer, beneficiary and insured amount etc. are key characters at this time, but this The content of a little key characters is different from every insurance order, if therefore only comprising fixed some passes in key character table Key characters may be unable to satisfy the actual demand of different user.
In order to meet the actual demand of different user, in the embodiment of the present invention, include in key character table not only includes Some specific key characters, while also comprising some key character rules, when carrying out key character lookup, as long as meeting crucial Specific key character or the key character rule for including in character list, can be judged as key character, for example, for upper For stating insurance order data, key character rule can be set are as follows: n-bit character after " order number " is key character, n by Technical staff is set according to actual conditions, and at this time when carrying out key character lookup, " order number " subsequent n bit digital i.e. can quilt It is determined as key character.
It is implemented as the another of the first data slot extraction is carried out to be-encrypted data in the embodiment of the present invention one Mode, as shown in figure 4, the embodiment of the present invention four, comprising:
S401, if the file type of be-encrypted data is audio and file size is less than preset vol threshold value, to be encrypted Data carry out speech recognition, judge whether be-encrypted data is voice data.
S402 carries out keyword lookup to the word content that speech recognition obtains, obtains if be-encrypted data is voice data To the corresponding keyword of be-encrypted data.
S403, from be-encrypted data extract with one-to-one first data slot of keyword, and obtain each first First location information of the data slot in be-encrypted data.
When be-encrypted data is audio data and smaller file size, the embodiment of the present invention can carry out language to audio data Sound identification, if it includes word content that speech recognition, which goes out, illustrates it for voice data to judge whether it is voice data.Its In, the specific size of volume threshold can be by technical staff's sets itself.
In order to guarantee that the validity of the data slot extracted, the embodiment of the present invention can be in the texts that speech recognition obtains Hold and carries out keyword lookup, wherein specific lookup method not limits herein, it can be by technical staff's sets itself or reference To the lookup method of key character, (keyword in the embodiment of the present invention is equivalent to the embodiment of the present invention in the embodiment of the present invention three Key character in three).After determining keyword wherein included, the embodiment of the present invention can be further from number to be processed The corresponding audio fragment of these keywords is found out in, so that the first data slot needed for the embodiment of the present invention is obtained, by The critical data of word content is contained in keyword, therefore it is with certain representativeness, to ensure that subsequent extracted The validity of the first data slot out.In embodiments of the present invention, first location information includes the first data slot to be added Initial time and termination time in ciphertext data.
It is implemented as the another of the first data slot extraction is carried out to be-encrypted data in the embodiment of the present invention one Mode, as shown in figure 5, the embodiment of the present invention five, comprising:
S501, if be-encrypted data is any file type, and file size is greater than or equal to preset vol threshold value, with pre- If data break carries out data segment extraction to be-encrypted data, multiple first data slots and each first data slot are obtained First location information in be-encrypted data.
When file size is larger, either which kind of file type when carrying out data slot extraction its extract workload All bigger, the efficiency that can directly result in data transmission is lower, therefore, when the file size of be-encrypted data is larger, no matter Which kind of file type it is, the embodiment of the present invention, which can be all used uniformly, carries out data slot according to the form at preset data interval It extracts, to obtain required multiple first data slots, wherein specific data break can be by technical staff according to actual needs Sets itself, either an absolute figure, such as can be set to being converted to be-encrypted data into binary data, and The data slot of a setting length is extracted every a specific data break length, such as every 200 bits, extracts one The long data slot of a 500 binary systems is also possible to a relative value, example to obtain the first required data slot It such as can be set to being converted to be-encrypted data into binary data, and every the extraction of n% be-encrypted data total length one Length is the data slot of m% be-encrypted data total length, such as extracts a length every 5% be-encrypted data total length and is The data slot of 15% be-encrypted data total length.Wherein, the specific size of volume threshold can be by technical staff's sets itself.
Should explanatorily, the embodiments of the present invention two to five are the data fragment extracting methods to be-encrypted data, But each embodiment is directed to the case where different file types or file size size, thus the embodiment of the present invention two to five it Between can't exist implement when conflict, those skilled in the art can therefrom choose any number of embodiment and this Inventive embodiments one are combined application implementation, should all be included in the protection scope of the present invention.
In the embodiment of the present invention two to five, for different file types be-encrypted data the characteristics of, be respectively set pair The data fragment extracting method answered, to ensure that the validity of the data slot extracted.
As the embodiment of the present invention six, corresponds to the embodiment of the present invention one, propose a kind of utilization in the embodiment of the present invention The method that the first check code and encryption information that the embodiment of the present invention one is transmitted carry out data integrity verifying to be-encrypted data, Fig. 6 shows the implementation flow chart of the data verification method of the offer of the embodiment of the present invention six, and details are as follows:
S601, obtain as the be-encrypted datas of one data transfer means transfers of the embodiment of the present invention, the first check code and Encryption information.
S602, file type and file size based on be-encrypted data carry out data slot to be-encrypted data and mention Take, obtain corresponding multiple second data slots and each the and the third place letter of the data slot in be-encrypted data Breath.
Data fragment extracting method in the embodiment of the present invention can be by technical staff's sets itself, but should ensure that and the present invention Data fragment extracting method used in embodiment one is identical, i.e., for file type and the identical data of file size, Data fragment extracting method selected by the embodiment of the present invention and the embodiment of the present invention one should be consistent, subsequent to guarantee Normal verification can specifically refer to the embodiments of the present invention one to five, and it will not go into details herein.
S603 searches the file size and corresponding second irreversible encryption algorithm and second reversible of the second data slot Encryption-decryption algorithm, and encryption information being handled based on the second reversible encryption decipherment algorithm, obtain first location information and Second location information.
It the file size of the second data slot and is decrypted with irreversible encryption algorithm and reversible encryption in the embodiment of the present invention The rule of correspondence of algorithm can be by technical staff's sets itself, but should ensure that the text with the first merging data in the embodiment of the present invention one Part volume is identical as the rule of correspondence of irreversible encryption algorithm and reversible encryption decipherment algorithm, i.e. the file when the second data slot Volume and it is identical as the file size of the first merging data when, can not selected by the embodiment of the present invention and the embodiment of the present invention one Reverse encryption algorithm and reversible encryption decipherment algorithm should be consistent, and to guarantee subsequent normal verification, can specifically be referred to upper The embodiment of the present invention one is stated, it will not go into details herein.
S604 is based on the third place information, first location information and second location information, arranges the second data slot Sequence merges, and obtains corresponding second merging data.
It is theoretical when the be-encrypted data sent in the be-encrypted data received and the embodiment of the present invention one is identical The second data slot extracted in upper S602 is and the data content of the first data slot in the embodiment of the present invention one and position It should be completely the same, while the irreversible encryption algorithm and reversible encryption decipherment algorithm that select should also be as being completely the same , therefore, when the be-encrypted data sent in the be-encrypted data received and the embodiment of the present invention one is identical, third Location information with first location information be it is identical, closed at this time according to first location information is corresponding with second location information The sequence to the second data slot can be realized in system, and guarantees that the result randomly ordered with the first data slot is completely the same.
S605 handles the second merging data to obtain the second check code, and is sentenced based on the second irreversible encryption algorithm Whether disconnected second check code and the first check code are identical.
S606 determines that be-encrypted data verification is complete if the second check code is identical as the first check code.
When the be-encrypted data sent in the be-encrypted data and the embodiment of the present invention one received is not exactly the same, i.e., It malfunctions there are the reasons such as network failure or criminal's attack, directly results in the data content and/or text of be-encrypted data When part volume changes, it will lead in the embodiment of the present invention and change generated to the extraction of data slot, merging encrypting and decrypting process Change, due to extract, merge encrypting and decrypting it is different with content according to the specific data type of be-encrypted data and have it is extremely strong with Machine, will lead to the first location information decrypted and error occurs in second location information, while obtained the third place information Also there can be mistake, so that the third place information is difficult to rise corresponding with first location information in S604 of the embodiment of the present invention Come, so that the second merging data can not normally be obtained, so that subsequent refueling process can not be normally carried out, even if backward The third place information and first location information are mapped, when due to subsequent second irreversible encryption algorithm picks with The variation of second data slot and change, and the data content of the second merging data also with be-encrypted data variation and become Change, so that the second obtained check code necessarily has differences with the first check code, therefore is only connect in the embodiment of the present invention When the be-encrypted data that receives and the completely the same be-encrypted data sent in the embodiment of the present invention one, final the can be just obtained Two check codes and the first check code as a result, to realize the safe and complete verification to data transmission.
Corresponding to the data transmission method of foregoing embodiments, Fig. 7 shows the data transmission of the offer of the embodiment of the present invention seven The structural block diagram of device, for ease of description, only parts related to embodiments of the present invention are shown.The exemplary data of Fig. 7 pass Defeated device can be the executing subject of the data transmission method of the offer of previous embodiment one.
Referring to Fig. 7, which includes:
First snippet extraction module 71, for file type and file size based on be-encrypted data, to it is described to Encryption data carries out data slot extraction, obtains corresponding multiple first data slots and each first data slot exists First location information in the be-encrypted data.
Segment sorting module 72 obtains corresponding first for carrying out randomly ordered merging to first data slot The second location information of merging data and each first data slot in first merging data.
First algorithmic match module 73, file size for searching first merging data are corresponding first irreversible Encryption Algorithm and the first reversible encryption decipherment algorithm.
Double-encryption module 74, for based on the first irreversible encryption algorithm to first merging data at Reason obtains the first check code, and based on the first reversible encryption decipherment algorithm to the first location information and the second Confidence breath is handled, and encryption information is obtained.
Data transmission module 75 is used for by first check code and the encryption information, with the be-encrypted data one It is same to be transmitted to recipient, wherein first check code and the encryption information are used for the recipient to the number to be encrypted According to progress data integrity verifying.
Further, the first snippet extraction module 71, comprising:
If the file type of the be-encrypted data is that image and file size are less than preset vol threshold value, extract it is described to The image characteristic point of encryption data, and line is carried out based on the Edge Feature Points in described image characteristic point, it draws corresponding more Side shape.
Picture material in the polygon is split, is obtained multiple correspondingly with first data slot Image-region, and obtain the first location information of each described image region in the be-encrypted data.
Further, the first snippet extraction module 71, comprising:
If the file type of the be-encrypted data is text and file size is less than preset vol threshold value, to described to be added Ciphertext data carries out key character lookup, filter out in the text with first data slot multiple keywords correspondingly Symbol, and obtain the first location information of each key character in the be-encrypted data.
Further, the first snippet extraction module 71, comprising:
If the file type of the be-encrypted data is audio and file size is less than preset vol threshold value, to described to be added Ciphertext data carries out speech recognition, judges whether the be-encrypted data is voice data.
If the be-encrypted data is voice data, keyword lookup is carried out to the word content that speech recognition obtains, is obtained To the corresponding keyword of the be-encrypted data.
From the be-encrypted data extract with one-to-one first data slot of the keyword, and obtain every The first location information of a first data slot in the be-encrypted data.
Further, the first snippet extraction module 71, comprising:
If the be-encrypted data is any file type, and file size is greater than or equal to preset vol threshold value, with pre- If data break carries out data segment extraction to the be-encrypted data, multiple first data slots and each described are obtained The first location information of first data slot in the be-encrypted data.
Each module realizes the process of respective function in data transmission device provided in an embodiment of the present invention, before specifically referring to The description of embodiment illustrated in fig. 1 one is stated, details are not described herein again.
Corresponding to the data verification method of foregoing embodiments, Fig. 8 shows data check dress provided in an embodiment of the present invention The structural block diagram set, for ease of description, only parts related to embodiments of the present invention are shown.The exemplary data check of Fig. 8 Device can be the executing subject of the data verification method of the offer of previous embodiment six.
Data acquisition module 81, it is to be added as described in the data transmission device transmission as described in the embodiment of the present invention seven for obtaining Ciphertext data, first check code and the encryption information.
Second snippet extraction module 82, for file type and file size based on the be-encrypted data, to institute State be-encrypted data and carry out data slot extraction, obtain corresponding multiple second data slots and each described the and data slice The third place information of the section in the be-encrypted data.
Second algorithmic match module 83, file size and corresponding second for searching second data slot can not Reverse encryption algorithm and the second reversible encryption decipherment algorithm, and the encryption is believed based on the second reversible encryption decipherment algorithm Breath is handled, and the first location information and the second location information are obtained.
Segment merging module 84, for being based on the third place information, the first location information and the second Confidence breath, is ranked up merging to second data slot, obtains corresponding second merging data.
Data check module 85, for based on the second irreversible encryption algorithm to second merging data at Reason obtains the second check code, and judges whether second check code and first check code are identical.
Determination module 86 determines the number to be encrypted if identical as first check code for second check code It is complete according to verification.
Each module realizes the process of respective function in data calibration device provided in an embodiment of the present invention, before specifically referring to The description of embodiment illustrated in fig. 6 six is stated, details are not described herein again.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Although will also be appreciated that term " first ", " second " etc. are used in some embodiment of the present invention in the text Various elements are described, but these elements should not be limited by these terms.These terms are used only to an element It is distinguished with another element.For example, the first table can be named as the second table, and similarly, the second table can be by It is named as the first table, without departing from the range of various described embodiments.First table and the second table are all tables, but It is them is not same table.
Fig. 9 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in figure 9, the terminal of the embodiment is set Standby 9 include: processor 90, memory 91, and the computer that can be run on the processor 90 is stored in the memory 91 Program 92.The processor 90 realizes the step in above-mentioned each data transmission method embodiment when executing the computer program 92 Suddenly, such as step 101 shown in FIG. 1 is to 105.Alternatively, the processor 90 realized when executing the computer program 92 it is above-mentioned The function of each module/unit in each Installation practice, such as the function of module 71 to 75 shown in Fig. 7.
The terminal device 9 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 90, memory 91.It will be understood by those skilled in the art that Fig. 9 The only example of terminal device 9 does not constitute the restriction to terminal device 9, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input sending device, net Network access device, bus etc..
Alleged processor 90 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 91 can be the internal storage unit of the terminal device 9, such as the hard disk or interior of terminal device 9 It deposits.The memory 91 is also possible to the External memory equipment of the terminal device 9, such as be equipped on the terminal device 9 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 91 can also both include the storage inside list of the terminal device 9 Member also includes External memory equipment.The memory 91 is for storing needed for the computer program and the terminal device Other programs and data.The memory 91, which can be also used for temporarily storing, have been sent or data to be sent.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the essence of corresponding technical solution is departed from the spirit and scope of the technical scheme of various embodiments of the present invention, it should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of data transmission method characterized by comprising
File type and file size based on be-encrypted data carry out data slot extraction to the be-encrypted data, obtain To the first position of corresponding multiple first data slots and each first data slot in the be-encrypted data Information;
Randomly ordered merging is carried out to first data slot, obtains corresponding first merging data and each described first Second location information of the data slot in first merging data;
Search the corresponding first irreversible encryption algorithm of file size and the first reversible encryption solution of first merging data Close algorithm;
First merging data is handled to obtain the first check code based on the first irreversible encryption algorithm, and is based on The first reversible encryption decipherment algorithm handles the first location information and the second location information, is encrypted Information;
By first check code and the encryption information, recipient is transmitted to together with the be-encrypted data, wherein described First check code and the encryption information are used for the recipient and carry out data integrity verifying to the be-encrypted data.
2. data transmission method as described in claim 1, which is characterized in that it is described based on the file type of be-encrypted data with And file size, data slot extraction is carried out to the be-encrypted data, obtains corresponding multiple first data slots and every First location information of a first data slot in the be-encrypted data, comprising:
If the file type of the be-encrypted data is image and file size is less than preset vol threshold value, extract described to be encrypted The image characteristic point of data, and line is carried out based on the Edge Feature Points in described image characteristic point, draw corresponding polygon;
Picture material in the polygon is split, is obtained and the one-to-one multiple images of the first data slot Region, and obtain the first location information of each described image region in the be-encrypted data.
3. data transmission method as described in claim 1, which is characterized in that it is described based on the file type of be-encrypted data with And file size, data slot extraction is carried out to the be-encrypted data, obtains corresponding multiple first data slots and every First location information of a first data slot in the be-encrypted data, further includes:
If the file type of the be-encrypted data is text and file size is less than preset vol threshold value, to the number to be encrypted According to key character lookup is carried out, filter out in the text with first data slot multiple key characters correspondingly, And obtain the first location information of each key character in the be-encrypted data.
4. data transmission method as described in claim 1, which is characterized in that it is described based on the file type of be-encrypted data with And file size, data slot extraction is carried out to the be-encrypted data, obtains corresponding multiple first data slots and every First location information of a first data slot in the be-encrypted data, further includes:
If the file type of the be-encrypted data is audio and file size is less than preset vol threshold value, to the number to be encrypted According to speech recognition is carried out, judge whether the be-encrypted data is voice data;
If the be-encrypted data is voice data, keyword lookup is carried out to the word content that speech recognition obtains, obtains institute State the corresponding keyword of be-encrypted data;
From the be-encrypted data extract with one-to-one first data slot of the keyword, and obtain each institute State the first location information of first data slot in the be-encrypted data.
5. the data transmission method as described in Claims 1-4 any one, which is characterized in that described to be based on be-encrypted data File type and file size, to the be-encrypted data carry out data slot extraction, obtain it is corresponding it is multiple first number According to the first location information of segment and each first data slot in the be-encrypted data, further includes:
If the be-encrypted data is any file type, and file size is greater than or equal to preset vol threshold value, with present count Data segment extraction is carried out to the be-encrypted data according to interval, obtains multiple first data slots and each described first The first location information of the data slot in the be-encrypted data.
6. a kind of data verification method characterized by comprising
Obtain the be-encrypted data, first check code and the institute of data transfer means transfers as described in claim 1 State encryption information;
File type and file size based on the be-encrypted data carry out data slot to the be-encrypted data and mention Take, obtain corresponding multiple second data slots and each described and third of the data slot in the be-encrypted data Location information;
Search the file size and corresponding second irreversible encryption algorithm and the second reversible encryption of second data slot Decipherment algorithm, and the encryption information is handled based on the second reversible encryption decipherment algorithm, obtain described first Confidence breath and the second location information;
Based on the third place information, the first location information and the second location information, to second data slice Section is ranked up merging, obtains corresponding second merging data;
Second merging data is handled to obtain the second check code based on the second irreversible encryption algorithm, and is judged Whether second check code and first check code are identical;
If second check code is identical as first check code, determine that the be-encrypted data verification is complete.
7. a kind of data transmission device characterized by comprising
First snippet extraction module, for file type and file size based on be-encrypted data, to the number to be encrypted According to carry out data slot extraction, obtain corresponding multiple first data slots and each first data slot it is described to First location information in encryption data;
Segment sorting module obtains corresponding first and merges number for carrying out randomly ordered merging to first data slot Accordingly and second location information of each first data slot in first merging data;
First algorithmic match module, corresponding first irreversible encryption of file size for searching first merging data are calculated Method and the first reversible encryption decipherment algorithm;
Double-encryption module, for being handled to obtain to first merging data based on the first irreversible encryption algorithm First check code, and based on the first reversible encryption decipherment algorithm to the first location information and the second location information It is handled, obtains encryption information;
Data transmission module, for being transmitted together with the be-encrypted data by first check code and the encryption information To recipient, wherein first check code and the encryption information carry out the be-encrypted data for the recipient Data integrity verifying.
8. a kind of data calibration device characterized by comprising
Data acquisition module, for obtaining the be-encrypted data, described of data transmission device as claimed in claim 7 transmission First check code and the encryption information;
Second snippet extraction module, for file type and file size based on the be-encrypted data, to described to be added Ciphertext data carries out data slot extraction, obtain corresponding multiple second data slots and each described the and data slot in institute State the third place information in be-encrypted data;
Second algorithmic match module, for searching the file size and corresponding second irreversible encryption of second data slot Algorithm and the second reversible encryption decipherment algorithm, and the encryption information is carried out based on the second reversible encryption decipherment algorithm Processing, obtains the first location information and the second location information;
Segment merging module, for being based on the third place information, the first location information and the second location information, Merging is ranked up to second data slot, obtains corresponding second merging data;
Data check module, for being handled to obtain to second merging data based on the second irreversible encryption algorithm Second check code, and judge whether second check code and first check code are identical;
Determination module determines the be-encrypted data verification if identical as first check code for second check code Completely.
9. a kind of terminal device, which is characterized in that the terminal device includes memory, processor, is stored on the memory There is the computer program that can be run on the processor, is realized when the processor executes the computer program as right is wanted The step of seeking any one of 1 to 5 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
CN201910111103.8A 2019-02-12 2019-02-12 Data transmission method and device and terminal equipment Active CN109977684B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910111103.8A CN109977684B (en) 2019-02-12 2019-02-12 Data transmission method and device and terminal equipment
PCT/CN2019/091503 WO2020164211A1 (en) 2019-02-12 2019-06-17 Data transmission method and apparatus, terminal device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910111103.8A CN109977684B (en) 2019-02-12 2019-02-12 Data transmission method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN109977684A true CN109977684A (en) 2019-07-05
CN109977684B CN109977684B (en) 2024-02-20

Family

ID=67076930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910111103.8A Active CN109977684B (en) 2019-02-12 2019-02-12 Data transmission method and device and terminal equipment

Country Status (2)

Country Link
CN (1) CN109977684B (en)
WO (1) WO2020164211A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291268A (en) * 2020-11-26 2021-01-29 上海优扬新媒信息技术有限公司 Information transmission method, device, equipment and storage medium
CN113434561A (en) * 2021-06-24 2021-09-24 北京金山云网络技术有限公司 Live broadcast data verification method and system, electronic device and storage medium
CN113689321A (en) * 2021-08-23 2021-11-23 陈凤妹 Image information transmission method and device based on stereoscopic projection encryption
CN113721956A (en) * 2021-08-26 2021-11-30 广州擎天实业有限公司 Method for updating control program of excitation system
CN115220972A (en) * 2022-06-07 2022-10-21 中科驭数(北京)科技有限公司 Equipment fault detection method, device, equipment and computer readable storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112039898A (en) * 2020-09-01 2020-12-04 广州小鹏汽车科技有限公司 Encrypted communication method, encrypted communication device and vehicle

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006118896A2 (en) * 2005-04-29 2006-11-09 Sony Electronics Inc. Method and apparatus for detecting the falsification of metadata
WO2009143749A1 (en) * 2008-05-30 2009-12-03 华为技术有限公司 Data encryption and decryption method, device and communications system
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103488952A (en) * 2013-09-24 2014-01-01 华为技术有限公司 File integrity verification method and file processor
CN103885723A (en) * 2014-03-04 2014-06-25 广东数字证书认证中心有限公司 Digital certificate storage method, digital certificate storage system, digital certificate reading method and digital certificate reading system
CN104636444A (en) * 2015-01-13 2015-05-20 大唐移动通信设备有限公司 Database encryption and decryption method and device
WO2016036995A1 (en) * 2014-09-05 2016-03-10 Alibaba Group Holding Limited Encrypting and decrypting information
WO2016187529A1 (en) * 2015-05-20 2016-11-24 Paul Rad Systems and methods for secure file transmission and cloud storage
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091129B (en) * 2014-06-26 2016-12-14 腾讯科技(深圳)有限公司 A kind of data processing method and device
CN109145639B (en) * 2018-07-27 2020-07-14 北京北信源信息安全技术有限公司 File encryption method, file decryption method and file encryption device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006118896A2 (en) * 2005-04-29 2006-11-09 Sony Electronics Inc. Method and apparatus for detecting the falsification of metadata
WO2009143749A1 (en) * 2008-05-30 2009-12-03 华为技术有限公司 Data encryption and decryption method, device and communications system
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103488952A (en) * 2013-09-24 2014-01-01 华为技术有限公司 File integrity verification method and file processor
CN103885723A (en) * 2014-03-04 2014-06-25 广东数字证书认证中心有限公司 Digital certificate storage method, digital certificate storage system, digital certificate reading method and digital certificate reading system
WO2016036995A1 (en) * 2014-09-05 2016-03-10 Alibaba Group Holding Limited Encrypting and decrypting information
US20160072801A1 (en) * 2014-09-05 2016-03-10 Alibaba Group Holding Limited Encrypting and decrypting information
CN104636444A (en) * 2015-01-13 2015-05-20 大唐移动通信设备有限公司 Database encryption and decryption method and device
WO2016187529A1 (en) * 2015-05-20 2016-11-24 Paul Rad Systems and methods for secure file transmission and cloud storage
CN107122634A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The method for reinforcing and protecting and device of software installation bag

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291268A (en) * 2020-11-26 2021-01-29 上海优扬新媒信息技术有限公司 Information transmission method, device, equipment and storage medium
CN112291268B (en) * 2020-11-26 2023-05-26 度小满科技(北京)有限公司 Information transmission method, device, equipment and storage medium
CN113434561A (en) * 2021-06-24 2021-09-24 北京金山云网络技术有限公司 Live broadcast data verification method and system, electronic device and storage medium
CN113689321A (en) * 2021-08-23 2021-11-23 陈凤妹 Image information transmission method and device based on stereoscopic projection encryption
CN113689321B (en) * 2021-08-23 2023-12-22 深圳普汇智为科技有限公司 Image information transmission method and device based on stereoscopic projection encryption
CN113721956A (en) * 2021-08-26 2021-11-30 广州擎天实业有限公司 Method for updating control program of excitation system
CN113721956B (en) * 2021-08-26 2024-02-20 广州擎天实业有限公司 Method for updating excitation system control program
CN115220972A (en) * 2022-06-07 2022-10-21 中科驭数(北京)科技有限公司 Equipment fault detection method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
WO2020164211A1 (en) 2020-08-20
CN109977684B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN109977684A (en) A kind of data transmission method, device and terminal device
Sun et al. Data security and privacy in cloud computing
Bojinov et al. Kamouflage: Loss-resistant password management
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN107948152B (en) Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment
CN109690549B (en) Tracking objects across different parties
CN112347508A (en) Block chain data sharing encryption and decryption method and system
CN112100679B (en) Data processing method and device based on privacy protection and server
CN108764902B (en) Method, node and blockchain system for storing data
JP2012164031A (en) Data processor, data storage device, data processing method, data storage method and program
CN108881230B (en) Secure transmission method and device for government affair big data
US9641328B1 (en) Generation of public-private key pairs
CN108768963A (en) The communication means and system of trusted application and safety element
CN108038128A (en) A kind of search method, system, terminal device and storage medium for encrypting file
Al Sibahee et al. Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
CN116980230B (en) Information security protection method and device
CN115567188A (en) Multi-key value hiding intersection solving method and device and storage medium
CN112073444A (en) Data set processing method and device and server
CN110457916B (en) Electronic contract encryption method and device and terminal equipment
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
KR102375973B1 (en) Security server using case based reasoning engine and storage medium for installing security function
KR101444828B1 (en) Method for storing encrypted image and searching the image
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN113452783B (en) Digital PAAS open platform system of block chain cloud architecture and implementation method
CN115001768A (en) Data interaction method, device and equipment based on block chain and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant