CN110166493A - A kind of social client address list dynamic protection method and device - Google Patents
A kind of social client address list dynamic protection method and device Download PDFInfo
- Publication number
- CN110166493A CN110166493A CN201910584985.XA CN201910584985A CN110166493A CN 110166493 A CN110166493 A CN 110166493A CN 201910584985 A CN201910584985 A CN 201910584985A CN 110166493 A CN110166493 A CN 110166493A
- Authority
- CN
- China
- Prior art keywords
- address book
- control
- book data
- encryption
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
Abstract
A kind of social client address list dynamic protection method and device provided in an embodiment of the present invention, which comprises receive client and the update of address book data is requested;It is requested based on updating, the address book data for issue client is obtained in preset database, and generate unique control number for each address book data;Corresponding each address book data is encrypted respectively, obtains the encryption information and encryption key of each address book data;The control for generating each address book data is respectively corresponded based on control number, encryption information and encryption key, and obtains final encryption data;Final encryption data is sent to client, so that client, which when needing to carry out address book data display, is decrypted final encryption data and is based on each control number, creates the control.The present invention realizes dynamic encryption by more control real-time display address book datas, and address book data can also be obtained after version iteration by avoiding Virus.
Description
Technical field
The present invention relates to technical field of network security, in particular to a kind of social client address list dynamic protection
Method and device.
Background technique
Current social client can contain address list friend information, and these address list friend informations have been related to using
The privacy at family, some illegal viruses or hacker usually can intercept and capture the address list for intercepting user, some illegal so as to do
Thing, and then obtain interests.Hacker passes through inversely to crack to analyze how to obtain by the logical of the application program in attack equipment
After news record information, it can be diffused on other user equipmenies by writing a Virus by unlawful means, so that it may
Obtain the address list information of other equipment.In the case where Virus does not need update, Virus not only available visitor
The address list information of family end early version, and the address list information of new version can also be obtained.
The prior art provide scheme in prevention rule usually to the network protocol between server and client more
Encryption Algorithm is changed, so that Virus or hacker be prevented to obtain address list information.However, some more advanced viruses are to pass through
The control information of address list obtains title, to bypass the enciphering and deciphering algorithm of network protocol, from but regardless of client how
Update can get corresponding address list information.
Summary of the invention
In view of this, the embodiment of the present invention be designed to provide a kind of social client address list dynamic protection method and
Device realizes dynamic encryption by more control real-time display address book datas, avoids Virus and also can after version iteration
Obtain address book data.
In a first aspect, the application is provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection method, comprising:
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database
The address book data for issue the client is taken, and generates unique control for each address book data
Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data
With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key
The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described
Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display
Number creates the control.
Preferably, the User ID and operational order for updating request and carrying the client, it is described in preset number
According to before obtaining the address book data for issue the client in library, further includes: in preset database
Search address book data corresponding with the User ID;Based on the operational order, address list number corresponding to the User ID
According to being operated;Wherein, the operational order includes following any one or more: being deleted designated communication record data;It is right
Designated communication record data are modified;Add a new address book data.
Preferably, the version number for updating request and carrying the client, described is each address book data
Generate unique control number, comprising: according to the total quantity of the version number of the client and the address book data, generate every
The control of a control is numbered.
Preferably, described that corresponding each address book data is encrypted respectively, obtain each address list
The encryption information and encryption key of data, comprising: each address book data is encrypted using random algorithm, is obtained respectively
Obtain the encrypted encryption information of each address book data and encryption key;Wherein, described to carry out encryption including following any
A kind of mode or various ways: carrying out shift operation to the address book data, carries out XOR operation to the address book data,
Add operation is carried out to the address book data and subtraction is carried out to the address book data.
Preferably, the device id for updating request and carrying the User ID and the client of the client, institute
It states and corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data and add
Key, comprising: numbered according to the control of each address book data, determine that each control number corresponds to respectively
Control coordinate;Based on each control coordinate, the coordinate key of each control coordinate is obtained;According to the User ID
With the device id, the user information key of the client is obtained;According to the total number of the address book data, the user
Information key and each coordinate key, obtain the encryption key of each address book data respectively;Based on each institute
The encryption key for stating address book data respectively encrypts each address book data using TEA Encryption Algorithm, obtains every
The encryption information of a address book data.
Preferably, the total number according to the address book data, the user information key and each seat
Key is marked, obtains the encryption key of each address book data respectively, comprising: respectively to the key of presently described control coordinate
And the user information encryption key distribution weight, the first weight and the second weight are obtained respectively;Wherein, first weight is to work as
The corresponding weight of key of the preceding control coordinate, second weight is the corresponding weight of the user information key, described
First weight is less than second weight;Based on first weight, taken out in the coordinate key of presently described control coordinate
First key character string;Based on second weight, the second key string is taken out in the user information key;It will be described
First key character string and second key string splice, and obtain the encryption key of presently described address book data.
Preferably, described that generation is respectively corresponded often based on control number, the encryption information and the encryption key
The control of a address book data, and obtain final encryption data, comprising: control is generated according to preset control type;Its
In, the control includes attribute section and decryption portion;By the corresponding control number difference of each address book data
It matches to multiple controls, wherein each control corresponding one control number;Each control number is corresponding described
Encryption information and the encryption key, save respectively to the attribute section of each control;By the total quantity of the control with
All controls are encrypted, and the final encryption data is obtained.
Second aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection device, comprising:
Receiving module requests the update of address book data for receiving client;Control number generation module is used for base
It is requested in the update, the address book data for issue the client is obtained in preset database, and
Unique control number is generated for each address book data;Encrypting module, for respectively to corresponding each communication
Record data are encrypted, and the encryption information and encryption key of each address book data are obtained;Control generation module is used for base
The control for generating each address book data is respectively corresponded in control number, the encryption information and the encryption key
Part, and obtain final encryption data;Sending module, for the final encryption data to be sent to the client, so that institute
Client is stated when needing to carry out address book data display, the final encryption data is decrypted and is based on each control
Part number creates the control.
The third aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection device includes memory and one or more than one
Program, perhaps more than one program is stored in memory and is configured to by one or more than one processing for one of them
It includes the instruction for performing the following operation that device, which executes the one or more programs:
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database
The address book data for issue the client is taken, and generates unique control for each address book data
Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data
With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key
The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described
Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display
Number creates the control.
Fourth aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of computer readable storage medium is stored thereon with computer program, when computer program is executed by processor
It performs the steps of
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database
The address book data for issue the client is taken, and generates unique control for each address book data
Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data
With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key
The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described
Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display
Number creates the control.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
A kind of social client address list dynamic protection method and device provided by the invention are receiving client to communication
After the update request for recording data, based on the control for requesting to generate address book data is updated, it ensure that the generation of control not in visitor
Family end carries out;Then each address book data is encrypted respectively, avoids disposably cracking for Virus;Due to taking
The control that each address book data is generated on business device, only after client receives final encryption data, client just meeting
It is decrypted according to final encryption data and is based on each control number creation control, the data received on the client in this way
It will save in an encrypted form always, only just creation control is shown when display, due to every address list
The all corresponding control of data, can also be shown when carrying out address book data display using corresponding multiple and different control,
It avoids Virus while getting all address book datas.Further, due to the generation of control be server into
Capable, it is not to be locally composed to keep in client, just needs to be generated by server again after carrying out version updating to control
Part simultaneously issues, and ensure that dynamic, and address book data can also be obtained after version iteration by avoiding Virus.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart for social client address list dynamic protection method that first embodiment of the invention provides;
Fig. 2 is a kind of functional module for social client address list dynamic protection device that second embodiment of the invention provides
Figure;
Fig. 3 is a kind of structural frames for social client address list dynamic protection device that third embodiment of the invention provides
Figure;
Fig. 4 is a kind of functional block diagram for computer readable storage medium that fourth embodiment of the invention provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
First embodiment
Fig. 1 is please referred to, a kind of social client address list dynamic protection method is provided in the present embodiment, this method can answer
Server for being communicated with client, specifically, this method comprises:
Step S10: it receives client and the update of address book data is requested;
Step S20: being requested based on the update, is obtained in preset database and is carried out issuing the client
The address book data, and unique control number is generated for each address book data;
Step S30: respectively encrypting corresponding each address book data, obtains each address book data
Encryption information and encryption key;
Step S40: it is respectively corresponded based on control number, the encryption information and the encryption key and generates each institute
The control of address book data is stated, and obtains final encryption data;
Step S50: the final encryption data is sent to the client, so that the client is being led to
When news record data display, the final encryption data is decrypted and is based on each control number creation control.
In the present embodiment, it after receiving client to the update request of address book data, is generated based on request is updated
The control of address book data ensure that the generation of control is not carried out in client;Then each address book data is carried out respectively
Encryption avoids disposably cracking for Virus;Due to generating the control of each address book data on the server, only exist
After client receives final encryption data, client can just be decrypted according to final encryption data and be based on each control
Number creation control, the data received on the client in this way will be saved in an encrypted form always, only shown
When just creation control is shown, due to all corresponding control of every address book data, shown carrying out address book data
When can also be shown using corresponding multiple and different control, avoid Virus while getting all address list numbers
According to.
It further, is not to be locally composed to keep in client since the generation of control is carried out in server
, it just needs to generate control by server again after carrying out version updating and issue, avoid Virus in version iteration
Address book data can be also obtained afterwards.
Step S10: it receives client and the update of address book data is requested.
In step slo, updating request is the request that user end to server is sent, and can carry visitor in update request
User ID, device id and the operational order at family end, wherein operational order is the instruction operated to preset database;Its
In, operational order includes following any one or more: being deleted designated communication record data;Designated communication record data are carried out
Modification;Add a new address book data.Update request further includes downloading request, for requesting the user of downloading client
Address list data corresponding to ID.
Operational order is carried it should be noted that if updating in request, then before step S20, further includes: pre-
If database in search corresponding with User ID address book data;Based on the operational order, to the User ID pair
The address book data answered is operated.Step S20 is executed after the completion of operation.
Step S20: being requested based on the update, is obtained in preset database and is carried out issuing the client
The address book data, and unique control number is generated for each address book data.
In step S20, preset database is used to save the address book data of different user ID.Generating control number can
Directly to carry out random number, first control number can also be generated at random, then successively serial number, with no restriction.
In the present embodiment, step S20 includes: to be led to according to the version number of the client with described with specific embodiment
The total quantity of news record data generates the control number of each control.Specifically for example:
Firstly, a random data is generated, then using random data to the total amount (total amount and address list of control of control
The total quantity of data is identical) it rems, to obtain a number.The version number of client and a reorganization number splicing are then obtained most
Whole control number, if client release number is 0001, the number that random data rems is 0001, then final control
Number is 00010001.It then, can be that Base Serial Number is successively allocated control number to each address book data by the number.
The randomness that ensure that control number avoids a certain address book data and corresponds to a specific number always, improves safety.
Step S30: respectively encrypting corresponding each address book data, obtains each address book data
Encryption information and encryption key.
In step s 30, encryption information be the encrypted data of address book data, encryption key be used for encryption information into
Row decryption.Following cipher mode is provided in the present embodiment:
1, it is encrypted using random algorithm.
Specifically, including:
Each address book data is encrypted using random algorithm, each address book data is obtained respectively and adds
Encryption information and encryption key after close;Wherein, it is described carry out encryption include any of the following mode or various ways: to institute
It states address book data and carries out shift operation, XOR operation is carried out to the address book data, the address book data is added
Method operation and to the address book data carry out subtraction.
It may make the encryption specific algorithm of each address book data to have differences by the encryption of random algorithm, improve brokenly
Solve difficulty.For example, ciphering process can are as follows:
Void Encrypt00010001(char*data){
For (int i=0;i<sizeof(data);i++){
* (data+i) ^=0x7a;// XOR operation;
* (data+i) ^=0x34;// XOR operation;
* (data+i) +=0x1;// add operation;
* (data+i) ^=0x15;// XOR operation;
* (data+i)=(* (data+i)<<3) | (* (data+i)>>(8-3));// shift left 3, dextroposition 3;
* (data+i) +=0x34;// add operation;
* (data+i)=(* (data+i)>>4) | (* (data+i)<<(8-4));// dextroposition 4, shift left 4;
};Indicate that each character in the address book data data numbered to control be in 00010001 encrypts,
In, 0x7a, 0x34,0x1,0x15,0x34 are corresponding key.
2, the corresponding address book data of control coordinate pair based on each control is encrypted.
Position of the position of each control in the entire address list of client be it is fixed, server is when issuing control
It just may know that each control in the relative position of entire address list.So it can then be carried out according to the control coordinate of relative position
It participates in calculating, so that Encryption Algorithm is increasingly complex.The address book data of entire address list then can be according to each control
Relative coordinate carries out secondary encryption.So that each address list is only only correctly in the contact information of its decryption of current location
's.
Specifically, including:
Step S311: numbering according to the control of each address book data, determines that each control is compiled respectively
Number corresponding control coordinate.
Step S312: being based on each control coordinate, obtains the coordinate key of each control coordinate;
Step S313: according to the User ID and the device id, the user information key of the client is obtained;
Step S314: according to the total number of the address book data, the user information key and each coordinate
Key obtains the encryption key of each address book data respectively;It is close by user information key and each coordinate
Key realizes secondary encryption, improves safety.
In step S314, the total number of address book data specifically can be used, user information key and each coordinate are close
Key calculates corresponding each address book data encryption key.The mode of calculating with no restriction, such as: add between three
The modes such as method, subtraction, splicing calculate encryption key.Specifically, further including following acquisition modes:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, first is obtained respectively
Weight and the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, second power
Weight is the corresponding weight of the user information key, and first weight is less than second weight;
Based on first weight, first key character string is taken out in the coordinate key of presently described control coordinate;
Based on second weight, the second key string is taken out in the user information key;
The first key character string and second key string are spliced, presently described address book data is obtained
Encryption key.
Step S315: the encryption key based on each address book data, using TEA Encryption Algorithm respectively to each institute
It states address book data to be encrypted, obtains the encryption information of each address book data.
Such as: in server end, it is known that the control of this current address book data is finally in the seat of entire address list
Cursor position, such as the position coordinates of first address book data are (10,0);The position coordinates of so second address book data
It is then the height of this control, so that obtaining position coordinates is (10,20).And so on third address book data position sit
It is designated as (10,40).
Meanwhile also fractional weight can be taken based on User ID, device id in this example, another portion is taken based on position coordinates
Fraction weight;So that the encryption of address book data can add dependent on the position coordinates of User ID, device id and control
It is close, to ensure the only corresponding user of information and equipment and coordinate shows and can just be decrypted correctly in correct position.
For example, Encryption Algorithm can be as follows:
Poskey=md5.create (10+0);It for first contact person its encryption key is come using MD5 algorithm
To Coordinate generation key poskey.
Infokey=sha128.create (userid+deviceid);User's unique identification and equipment are uniquely marked
Knowledge then calculates user information key, and wherein sha128.create is then the interface of hash algorithm sha128, and wherein userid is then
User ID, wherein deviceid is then the device id of user.Finally, obtained result is then the key infokey of user information.
Wherein, poskey is then one 32 character strings;Infokey is then one 128 character strings, character string
Digit is not particularly limited, and 32 and 128 are only used as exemplary illustration.
Then, encryption key (i.e. execution step S314) is obtained based on weight information.
Specifically: key=poskey [0, num*M%X]+infokey [num*M%X, num*N%Y];Wherein, X, Y are
The digit of character string, distribution weight is just like under type in this example: M (the first weight) < N (the second weight).Num is then address list number
According to total number, by this kind of mode can guarantee total number, control coordinate and the user information of address list jointly to key into
Row influences, and improves safety;Simultaneously it may require that weight M < N, since there are identical probability to be higher than user information for control number of coordinates
(User ID, device id), therefore make weight M < N also and the safety of key can be improved, keep influence of the user information to key bigger.
Likewise, X < Y can also be made, guarantee that influence of the user information relative to position coordinates to encryption key is bigger.
Such as: M=0.2, N=0.8, X=32, Y=128;Poskey [0, num*0.2%32] expression takes from poskey
0 num*0.2%32 so multidigit character string is arrived out, wherein weight is 0.2.Infokey [num*0.2%32, num*0.8%
128] it indicates to take out num*0.2%32 to num*0.8%128 so multidigit character string from infokey, wherein weight is 0.8.
Finally, the encryption key key obtained is only the encryption key that Encryption Algorithm is finally carried out to this address book data.
When needing to illustrate, the user gradation of user may be incorporated into other implementations, such as num is replaced
Be changed to user gradation Lv, perhaps increase user gradation Lv or using user gradation Lv to num carry out once-through operation (add, subtract,
Multiplication and division), since user gradation is to change in use with the increase of empirical value, it can further enhance encryption
Dynamic, raising crack difficulty.
Such as: encryption key is obtained according to the address list total number of user, user gradation.
Key=poskey [0, (num+Lv) * M%X]+infokey [(num+Lv) * M%X, (num+Lv) * N%Y] leads to
This kind of mode is crossed, all key can once be updated after user gradation upgrades each time, which is passively, to use
Family upgrading is fast to indicate that user is more frequent using client, with the higher risk for being stolen address book data by virus, uses
User gradation illustrates that the renewal frequency of encryption key can be improved in the update with encryption key, improves the safety of address book data,
Reduce address book data steals risk.
Finally, encrypt to every address book data using TEA Encryption Algorithm.That is, encryptdata=
TEA.encrypt(key,info);Wherein, TEA.encrypt is then the interface of Encryption Algorithm TEA;Info is then contact person
Information;Encrypted result is then encryptdata.
And after client receives the final encryption data of encryption, specific decryption is then as follows:
View*v=new TextView, pos=v.getposition ();By the interface getposition of control come
Obtain the position coordinates of control.Info=TEA.decrypt (key, encryptdata) passes through same mode when encryption
The key key for calculating decryption, to obtain initial data by decipherment algorithm.
Step S40: it is respectively corresponded based on control number, the encryption information and the encryption key and generates each institute
The control of address book data is stated, and obtains final encryption data.
In step s 40, it specifically includes:
Step S401: control is generated according to preset control type;Wherein, the control includes attribute section and decryption part
Point;
Step S402: the corresponding control number of each address book data is matched respectively to multiple controls,
In each control corresponding one control number;
Step S403: each control is numbered into the corresponding encryption information and the encryption key, is saved respectively
To the attribute section of each control;In step S403, each encryption information and encryption key can also add again
It is close, such as: DES.Encrypt (data, key) is encrypted using conventional encryption algorithm DES.The mode of preservation can pass through control
Copy code in the constructed fuction of part carries out, referring specifically to subsequent explanation.
Step S404: the total quantity of the control and all controls are encrypted, and obtain the final encryption number
According to.
In step s 40, the control code that the generation of control can be automatically generated based on type, the type definition of control
The concrete behavior of control and the safety method of attribute information and data.Type based on control we can be used automatically
It generates code instrumentation and generates any number of controls, and realize the different of each control internal cryptographic mode and key, from
And all address book datas can not be obtained simultaneously by guaranteeing Virus.(for being sat based on position by taking the encryption of random algorithm as an example
Target cipher mode can carry out reverse setting based on cipher mode when designing the decryption in control type), specific control type
Design, such as:
Class TextViewxxx1public:View // firstly, can define a class name TextViewxxx1 indicates
This control, subsequent control can then change different titles.Since it is to inherit in the View control on basis, with what can be shown
Function.
The attribute section that control has includes the following:
Char dataxxx [MAX] indicates the title that control is shown;Char keyxxx [KEY] indicates the title of control
Key;Int posxxxx indicates x coordinate of the control in father's control;Int posyxxx indicates that y of the control in father's control is sat
Mark;Father's control of view*parentxxx expression control.
When control is created, its constructed fuction can be as follows:
TextView1(char*data,char*key,int posx,int posy,view*parent);Wherein, including
The key key of encrypted data data and decryption.
Memcpy(dataxxx,src);Indicate the data copy that will encrypt of calling system function Memcpy to dataxxx
In.
Memcpy (keyxxx, key) indicates copy key data into keyxxx.
Posxxxx=posx;Posyxxx=posy;Parentxxx=parent;Wherein, posxxxx and posyxxx is used
In the position for informing that this control is shown;Parent indicates father's control of this control, for being shown to above father's control;The generation side
Method is based on a kind of control that tree-shaped structure is all come tissue.
Type based on above-mentioned definition can automatically generate more set control codes.
Further, it is completed due to ciphering process in server, the address book data that server issues is sent after encrypting
Client is arrived, and client is stored with ciphertext in the whole process, operation is just decrypted when displaying control.
Therefore, it is necessary to define the decryption portion of control, it is decrypted by the way of temporary variable in control, comprising:
Create control title temporary variable and key temporary variable;The title temporary variable, in the client
When end in the encryption data to being decrypted, the encryption information is obtained;The key temporary variable, in the client
When end in the encryption data to being decrypted, encryption key is obtained;The title temporary variable and the key temporary variable,
It is also used to remove the data in presently described control title temporary variable and the key temporary variable after the completion of decryption.
Example is as follows:
Class TextViewxxx1public:View{
This same interface is also a member method ShowTextxxx for belonging to control type.
This interface is then used to show the data in control.For then only just meeting when showing herein
Initial data is decrypted, and the data decrypted are stored in temporary variable, then empty variable after the completion of display, therefore absolutely
Pair ensured this control show data safety.It is implemented as follows:
Void ShowTextxxx () is shown to control;Firstly, it is necessary to operation be decrypted to data, in order not to right
Client is just decrypted final encryption data in downloading, causes leaking data, uses temporary variable in the present embodiment
Operation is decrypted.It is as follows:
Char dataxxxtemp [MAX] indicates the title temporary variable that control is shown;Char keyxxxtemp[KEY]
Indicate the key temporary variable of the title of control;Then pass through Memcpy (dataxxxtemp, dataxxx);Memcpy
(keyxxxtemp, keyxxx) copies data into temporary variable.By Aes.Decrypt (dataxxxtemp,
Keyxxxtemp the decipherment algorithm of address book data) is carried out in temporary variable.
It is to correspond to Encryption Algorithm using step S404 to decrypt to final encryption data first due to having carried out final encryption
Once, corresponding encryption key is obtained.
Then, using random algorithm come the decryption to data again.
It is as follows by taking the random algorithm in step S30 as an example:
For (int i=0;i<sizeof(dataxxxtemp);I++), used for circulation is come to dataxxxtemp
Each byte operation is decrypted.Wherein, sizeof (dataxxxtemp) is the length for calculating data.
* (dataxxxtemp+i)=(* (dataxxxtemp+i)>>4) | (* (dataxxxtemp+i)<<(8-4)) indicate
Data carry out dextroposition 4 and shift left 4 to obtain final data, and so on.
* (dataxxxtemp+i) +=0x34 indicates to add 0x4 to address book data, and wherein 0x4 is then also randomly generated
Key, and so on.
* (dataxxxtemp+i)=(* (dataxxxtemp+i)<<3) | (* (dataxxxtemp+i)>>(8-3));
* (dataxxxtemp+i) ^=0x15;
* (dataxxxtemp+i) +=0x1;
* (dataxxxtemp+i) ^=0x34;
* (dataxxxtemp+i) ^=0x7a.
It should be noted that instruction strip number when random algorithm encrypts is also random.After the completion of decryption, control can be obtained
Text information to be shown is finally needed, finally text is shown.Wherein, then the interface that we then call control to provide
SetText is arranged text information, SetText (dataxxxtemp).
It next needs to remove the ephemeral data of temporary variable after the completion of decryption is shown, prevents leaking data.It can
The content of variable is then all set to 0, Memset (dataxxxtemp, 0) by system function Memset;After removing, then
Statistics is added to father's control to show, Parentxxx- > addchild (this, Posxxxx, Posyxxx).
Server generate control ensure that address book data all places be all in the form of cipher-text information guarantor
It deposits, final encryption data is just decrypted when display, and after address book data is completed to be arranged and be shown to control,
Data in temporary variable are carried out to empty processing, improve safety.
Step S50: the final encryption data is sent to the client, so that the client is being led to
When news record data display, the final encryption data is decrypted and is based on each control number creation control.
It in step s 50, include: creation control when being specifically decrypted when client receives final encryption data
Title temporary variable and key temporary variable;By the address book data copied part in the encryption data to the control name
Claim in temporary variable, and by the key copy in the encryption data into the key temporary variable, in the control
It is decrypted in title temporary variable and the key temporary variable;It removes the control title temporary variable and the key faces
Data in variations per hour improve the safety of address book data.
In order to keep the solution of the present invention more intuitive it can be readily appreciated that being illustrated with a complete example:
When each client released version, server can generate the code of more set controls, then server is also tool simultaneously
Have the algorithmic code of control.Server updates the version number that request carries according to client to take out corresponding algorithm versions
Number.Display of the address book data without regard to control is related only to for server, so server only needs corresponding lead to
News record data and Encryption Algorithm.And Encryption Algorithm is then a reverse process with decipherment algorithm.
It by taking TextViewxxx1 as an example, is realized with C++ code, specific logic is as follows:
One, server to the encryption of address book data with issue
1, encryption communication record data and control distribute
Ciphering process and decrypting process are reverse process first.
Void Encrypt00010001(char*data){
For (int i=0;i<sizeof(data);i++){
* (data+i) ^=0x7a;
* (data+i) ^=0x34;
* (data+i) +=0x1;
* (data+i) ^=0x15;
* (data+i)=(* (data+i)<<3) | (* (data+i)>>(8-3));
* (data+i) +=0x34;
* (data+i)=(* (data+i)>>4) | (* (data+i)<<(8-4));
} // every address book data is encrypted.
DES.Encrypt(data,key);
} // encryption information and encryption key are encrypted again.
There is number for each control, then server then to above-mentioned Encryption Algorithm be numbered for
Encrypt00010001.Then, server from database read the address book data of user and to each information creating it is random
Algorithm numbers and executes Encryption Algorithm.
Vector<string>addressbook defines a communication address book stored array addressbook.
Then, we are inquired database by the user information uid of user and obtain its address list information, can pass through data
Library executes sqlite.excute to obtain address list information, i.e. Addressbook=sqlite.excute (uid).
String result defines the result data result that an address list returns to client.
Then, each information creating data encryption of address list and distribution control, as follows:
For (int i=0;i<addressbook.size();i++)
Int nRand=Rand () %TextViewxxx.size ()
We obtain the number of control first, and acquisition methods are then that we first generate a random data, then random number
It rems according to the total amount to control, to obtain a number.Wherein, Rand () is the interface that system obtains random data;
TextViewxxx.size () is then the sum of control.Obtained random data nRand can correspond to obtain a number, add
Upper version number then obtains final control number, and e.g., version number 0001, the number that complementation obtains is 0001, then control is compiled
Number be 00010001.
2, address book data and the preservation of control are obtained.
Data=addressbook [i] obtains the address book data stored in presetting database.
Key=rand ();Encrypt00010001(Data);The random of corresponding control number is used to address book data
Algorithm is encrypted, and obtains the key key of random algorithm.To obtain the encryption information of this address book data and add
Key.
Then, by encryption information and encryption key storage into control.
Result.append(00010001);Memory communicating records the control number of data.
Result.append(Key);Store encryption key Key.
Result.append(Data);Store encryption information.
So circulation encrypts each address book data using above scheme.
3, each encryption information is always encrypted
After being finally completed encryption and storage, in the total front of result data, we store the sum of a control, i.e. Result
=num+Result.
After the completion of entire data encryption, data safety can be further ensured, it is complete to the data for being ultimately sent to client
Portion carries out a total encryption.Encryption, i.e. Encrypt_result=IDEA.Encrypt are such as completed using IDEA algorithm
(result).Finally obtain final encryption data.
Two, after client receives final encryption data, the creation of control is carried out.
1, after client receives the final encryption data under server, then being decrypted first to final encryption data, then
Data are parsed, and create each independent control.
Result=IDEA.Decrypt (Encrypt_result);Outermost decryption.
2, the encryption information of result is parsed and creates control.
The total num of control is taken out from the head result.
For (int i=0;i<num;i++){
No=Result [i];Key=Result [i];Data=Result [i];
Control number, corresponding encryption key and corresponding encryption information are obtained from result.
View*=new TextView+No (Data, key, posx, posy) };It indicates to number according to control to create pair
The control answered is finally completed the creation of control and display.
Second embodiment
Referring to Fig. 2, providing a kind of social client address list dynamic protection device 300, the device in the present embodiment
300 include:
Receiving module 301 requests the update of address book data for receiving client;
Control number generation module 302 is obtained in preset database for being requested based on the update and needs to carry out
The address book data of the client is issued, and generates unique control number for each address book data;
Encrypting module 303 obtains each described logical for encrypting respectively to corresponding each address book data
The encryption information and encryption key of news record data;
Control generation module 304, for right respectively based on control number, the encryption information and the encryption key
The control of each address book data should be generated, and obtains final encryption data;
Sending module 305, for the final encryption data to be sent to the client, so that the client is needing
When carrying out address book data display, the final encryption data is decrypted and is based on each control number creation institute
State control.
As an alternative embodiment, described update requests the User ID for carrying the client to refer to operation
It enables, described device further includes operation module, for carrying out issuing the client in described obtain in preset database
Before the address book data at end, address book data corresponding with the User ID is searched in preset database;It is based on
The operational order operates the corresponding address book data of the User ID;Wherein, the operational order includes following
It is one or more: designated communication record data are deleted;It modifies to designated communication record data;Add a new communication
Record data.
As an alternative embodiment, the control number generation module 302, is specifically used for:
According to the total quantity of the version number of the client and the address book data, the control of each control is generated
Number.
As an alternative embodiment, the encrypting module 303, is specifically used for:
Each address book data is encrypted using random algorithm, each address book data is obtained respectively and adds
Encryption information and encryption key after close;Wherein, it is described carry out encryption include any of the following mode or various ways: to institute
It states address book data and carries out shift operation, XOR operation is carried out to the address book data, the address book data is added
Method operation and to the address book data carry out subtraction.
As an alternative embodiment, described update the User ID for requesting to carry the client and the visitor
The device id at family end, the encrypting module 303, is specifically used for:
It is numbered according to the control of each address book data, determines that each control numbers corresponding control respectively
Part coordinate;Based on each control coordinate, the coordinate key of each control coordinate is obtained;According to the User ID and institute
Device id is stated, the user information key of the client is obtained;According to the total number of the address book data, the user information
Key and each coordinate key, obtain the encryption key of each address book data respectively;Based on each described logical
The encryption key of news record data, respectively encrypts each address book data using TEA Encryption Algorithm, obtains each institute
State the encryption information of address book data.
As an alternative embodiment, the encrypting module 303 also particularly useful for:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, first is obtained respectively
Weight and the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, second power
Weight is the corresponding weight of the user information key, and first weight is less than second weight;Based on first weight,
First key character string is taken out in the coordinate key of presently described control coordinate;Based on second weight, in the user
The second key string is taken out in information key;The first key character string and second key string are spliced, obtained
Obtain the encryption key of presently described address book data.
As an alternative embodiment, the control generation module 304, is specifically used for:
Control is generated according to preset control type;Wherein, the control includes attribute section and decryption portion;It will be each
The corresponding control number of the address book data is matched respectively to multiple controls, wherein each control corresponds to a control
Part number;Each control is numbered into the corresponding encryption information and the encryption key, is saved respectively to each described
The attribute section of control;The total quantity of the control and all controls are encrypted, the final encryption data is obtained.
As an alternative embodiment, the control generation module 304, also particularly useful for:
Create control title temporary variable and key temporary variable;The title temporary variable, in the client
When end in the encryption data to being decrypted, the encryption information is obtained;The key temporary variable, in the client
When end in the encryption data to being decrypted, encryption key is obtained;The title temporary variable and the key temporary variable,
It is also used to remove the data in presently described control title temporary variable and the key temporary variable after the completion of decryption.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
3rd embodiment
Based on the same inventive concept, as shown in figure 3, present embodiments providing a kind of social client address list dynamic protection
Device 400 including memory 410, processor 420 and is stored in the calculating that can be run on memory 410 and on processor 420
Machine program 411, processor 420 perform the steps of when executing computer program 411
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database
The address book data for issue the client is taken, and generates unique control for each address book data
Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data
With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key
The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described
Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display
Number creates the control.
In the specific implementation process, processor 420 execute computer program 411 when, may be implemented real first embodiment (or
Second embodiment) in any embodiment, details are not described herein.
Fourth embodiment
Based on the same inventive concept, as shown in figure 4, present embodiments providing a kind of computer readable storage medium 500,
On be stored with computer program 511, computer program 511 performs the steps of when being executed by processor
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database
The address book data for issue the client is taken, and generates unique control for each address book data
Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data
With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key
The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described
Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display
Number creates the control.
In the specific implementation process, when computer program 511 is executed by processor, first embodiment (or may be implemented
Two embodiments) in any embodiment, details are not described herein.
Technical solution in above-mentioned the embodiment of the present application, at least have the following technical effects or advantages:
In a kind of social client address list dynamic protection method provided by the invention and device, client is being received to logical
After the update request of news record data, based on the control for requesting to generate address book data is updated, it ensure that the generation of control does not exist
Client carries out;Then each address book data is encrypted respectively, avoids disposably cracking for Virus;Due to
The control of each address book data is generated on server, only after client receives final encryption data, client is
It can be decrypted according to final encryption data and be based on each control number creation control, the number received on the client in this way
According to that will save in an encrypted form always, only just creation control is shown when display, due to every communication
The all corresponding control of data is recorded, can also be shown using corresponding multiple and different control when carrying out address book data display
Show, avoid Virus while getting all address book datas.Further, since the generation of control is in server
It carries out, is not to be locally composed to keep in client, just need to be generated by server again after carrying out version updating
Control simultaneously issues, and ensure that dynamic, and address book data can also be obtained after version iteration by avoiding Virus.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
If the method function in the present invention is realized in the form of software function module and as independent product pin
It sells or in use, can store in a computer readable storage medium.Based on this understanding, technical side of the invention
Substantially the part of the part that contributes to existing technology or the technical solution can be with the shape of software product in other words for case
Formula embodies, which is stored in a storage medium, including some instructions are used so that a calculating
Machine equipment (can be personal computer, server or the network equipment etc.) executes each embodiment the method for the present invention
All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.It should be noted that, in this document, relational terms such as first and second and the like are used merely to one
A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting
Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of social client address list dynamic protection method characterized by comprising
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database
According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with
Encryption key;
Based on control number, the encryption information and the encryption key, respectively corresponds and generate each address list number
According to control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data
When, the final encryption data is decrypted and is based on each control number creation control.
2. the method according to claim 1, wherein the User ID for updating request and carrying the client
With operational order, it is described obtained in preset database issue the client the address book data it
Before, further includes:
Address book data corresponding with the User ID is searched in preset database;
Based on the operational order, the corresponding address book data of the User ID is operated;
Wherein, the operational order includes following any one or more:
Designated communication record data are deleted;
It modifies to designated communication record data;
Add a new address book data.
3. the method according to claim 1, wherein the version for updating request and carrying the client
Number, it is described to generate unique control number for each address book data, comprising:
According to the total quantity of the version number of the client and the address book data, the control for generating each control is compiled
Number.
4. the method according to claim 1, wherein it is described respectively to corresponding each address book data into
Row encryption, obtains the encryption information and encryption key of each address book data, comprising:
Each address book data is encrypted using random algorithm, after obtaining each address book data encryption respectively
Encryption information and encryption key;
Wherein, it is described carry out encryption include any of the following mode or various ways: the address book data is displaced
Operation carries out XOR operation to the address book data, carries out add operation to the address book data and to the communication
It records data and carries out subtraction.
5. the method according to claim 1, wherein the User ID for updating request and carrying the client
And the device id of the client, it is described that corresponding each address book data is encrypted respectively, obtain each institute
State the encryption information and encryption key of address book data, comprising:
It is numbered according to the control of each address book data, determines that each control is numbered corresponding control and sat respectively
Mark;
Based on each control coordinate, the coordinate key of each control coordinate is obtained;
According to the User ID and the device id, the user information key of the client is obtained;
According to the total number of the address book data, the user information key and each coordinate key obtain respectively
The encryption key of each address book data;
Based on the encryption key of each address book data, using TEA Encryption Algorithm respectively to each address book data
It is encrypted, obtains the encryption information of each address book data.
6. according to the method described in claim 5, it is characterized in that, the total number according to the address book data, described
User information key and each coordinate key, obtain the encryption key of each address book data respectively, comprising:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, the first weight is obtained respectively
With the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, and second weight is
The corresponding weight of the user information key, first weight are less than second weight;
Based on first weight, first key character string is taken out in the coordinate key of presently described control coordinate;
Based on second weight, the second key string is taken out in the user information key;
The first key character string and second key string are spliced, the encryption of presently described address book data is obtained
Key.
7. the method according to claim 1, wherein it is described based on the control number, the encryption information with
The encryption key respectively corresponds the control for generating each address book data, and obtains final encryption data, comprising:
Control is generated according to preset control type;Wherein, the control includes attribute section and decryption portion;
The corresponding control number of each address book data is matched respectively to multiple controls, wherein each control is corresponding
One control number;
Each control is numbered into the corresponding encryption information and the encryption key, is saved respectively to each control
Attribute section;
The total quantity of the control and all controls are encrypted, the final encryption data is obtained.
8. a kind of social client address list dynamic protection device characterized by comprising
Receiving module requests the update of address book data for receiving client;
Control number generation module is obtained in preset database for being requested based on the update and is issued institute
The address book data of client is stated, and generates unique control number for each address book data;
Encrypting module obtains each address list number for encrypting respectively to corresponding each address book data
According to encryption information and encryption key;
Control generation module, for respectively corresponding generation based on control number, the encryption information and the encryption key
The control of each address book data, and obtain final encryption data;
Sending module, for the final encryption data to be sent to the client, so that the client is needing to carry out
When address book data is shown, the final encryption data is decrypted and is based on each control number creation control
Part.
9. a kind of social client address list dynamic protection device, which is characterized in that include memory and one or one
A above program, perhaps more than one program is stored in memory and is configured to by one or one for one of them
It includes the instruction for performing the following operation that the above processor, which executes the one or more programs:
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database
According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with
Encryption key;
It is respectively corresponded based on control number, the encryption information and the encryption key and generates each address book data
Control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data
When, the final encryption data is decrypted and is based on each control number creation control.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that computer program is located
Reason device performs the steps of when executing
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database
According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with
Encryption key;
It is respectively corresponded based on control number, the encryption information and the encryption key and generates each address book data
Control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data
When, the final encryption data is decrypted and is based on each control number creation control.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910584985.XA CN110166493B (en) | 2019-07-01 | 2019-07-01 | Social client address book dynamic protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910584985.XA CN110166493B (en) | 2019-07-01 | 2019-07-01 | Social client address book dynamic protection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110166493A true CN110166493A (en) | 2019-08-23 |
CN110166493B CN110166493B (en) | 2021-10-15 |
Family
ID=67637357
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910584985.XA Active CN110166493B (en) | 2019-07-01 | 2019-07-01 | Social client address book dynamic protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110166493B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114226A (en) * | 2007-08-28 | 2008-01-30 | 北京中企开源信息技术有限公司 | Code automatically generating device based on model component, system and method |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
US20170345105A1 (en) * | 2014-03-31 | 2017-11-30 | Monticello Enterprises, Llc | System and method for providing multiple payment method options to users in connection with a browser payment request api |
CN108133139A (en) * | 2017-11-28 | 2018-06-08 | 西安交通大学 | A kind of Android malicious application detecting system compared based on more running environment behaviors |
US20180268407A1 (en) * | 2017-03-19 | 2018-09-20 | TokenID, Inc. | Apparatus and method for payment authorization and authentication based tokenization |
-
2019
- 2019-07-01 CN CN201910584985.XA patent/CN110166493B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114226A (en) * | 2007-08-28 | 2008-01-30 | 北京中企开源信息技术有限公司 | Code automatically generating device based on model component, system and method |
US20170345105A1 (en) * | 2014-03-31 | 2017-11-30 | Monticello Enterprises, Llc | System and method for providing multiple payment method options to users in connection with a browser payment request api |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
US20180268407A1 (en) * | 2017-03-19 | 2018-09-20 | TokenID, Inc. | Apparatus and method for payment authorization and authentication based tokenization |
CN108133139A (en) * | 2017-11-28 | 2018-06-08 | 西安交通大学 | A kind of Android malicious application detecting system compared based on more running environment behaviors |
Non-Patent Citations (1)
Title |
---|
卢成均: "《动态创建ASP.NET服务器控件解析》", 《计算机与现代化》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110166493B (en) | 2021-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10614244B1 (en) | Sensitive data aliasing | |
US11652608B2 (en) | System and method to protect sensitive information via distributed trust | |
US20150371058A1 (en) | Meta-complete data storage | |
US10007803B2 (en) | Searching over encrypted keywords in a database | |
CN108389059A (en) | Digital copyrighted work protection, transaction and distributing method based on ownership and system | |
EP3844934B1 (en) | A computer system and method of operating same for handling anonymous data | |
US20110276490A1 (en) | Security service level agreements with publicly verifiable proofs of compliance | |
JP7235668B2 (en) | REGISTRATION METHOD, COMPUTER AND PROGRAM | |
JPH11143780A (en) | Method and device for managing secret information in database | |
CN109271798A (en) | Sensitive data processing method and system | |
CN111314069A (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN108768938B (en) | A kind of web data encryption and decryption method and device | |
CN111091381A (en) | Hardware wallet and management method thereof | |
CA3179201A1 (en) | Systems and methods for use in segregating data blocks to distributed storage | |
CN110166493A (en) | A kind of social client address list dynamic protection method and device | |
JPWO2011058629A1 (en) | Information management system | |
KR20100112298A (en) | System for searching index according to a pattern encrypted database and method therefor | |
CN103795547A (en) | User data encryption method and device | |
CN113011945A (en) | Order number generation method and device, terminal equipment and storage medium | |
KR101635005B1 (en) | Method for managing metadata in a digital data safe system based on cloud | |
CN113434535B (en) | Data processing method, communication system, device, product and storage medium | |
Puttaswamy et al. | Silverline: Toward data confidentiality in third-party clouds | |
JP4697451B2 (en) | Data input / output device, data input / output method, data input / output program | |
Coles et al. | Expert SQL server 2008 encryption | |
CN117931154A (en) | Method and device for generating and using components in OPM modeling tool and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |