CN110166493A - A kind of social client address list dynamic protection method and device - Google Patents

A kind of social client address list dynamic protection method and device Download PDF

Info

Publication number
CN110166493A
CN110166493A CN201910584985.XA CN201910584985A CN110166493A CN 110166493 A CN110166493 A CN 110166493A CN 201910584985 A CN201910584985 A CN 201910584985A CN 110166493 A CN110166493 A CN 110166493A
Authority
CN
China
Prior art keywords
address book
control
book data
encryption
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910584985.XA
Other languages
Chinese (zh)
Other versions
CN110166493B (en
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201910584985.XA priority Critical patent/CN110166493B/en
Publication of CN110166493A publication Critical patent/CN110166493A/en
Application granted granted Critical
Publication of CN110166493B publication Critical patent/CN110166493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

A kind of social client address list dynamic protection method and device provided in an embodiment of the present invention, which comprises receive client and the update of address book data is requested;It is requested based on updating, the address book data for issue client is obtained in preset database, and generate unique control number for each address book data;Corresponding each address book data is encrypted respectively, obtains the encryption information and encryption key of each address book data;The control for generating each address book data is respectively corresponded based on control number, encryption information and encryption key, and obtains final encryption data;Final encryption data is sent to client, so that client, which when needing to carry out address book data display, is decrypted final encryption data and is based on each control number, creates the control.The present invention realizes dynamic encryption by more control real-time display address book datas, and address book data can also be obtained after version iteration by avoiding Virus.

Description

A kind of social client address list dynamic protection method and device
Technical field
The present invention relates to technical field of network security, in particular to a kind of social client address list dynamic protection Method and device.
Background technique
Current social client can contain address list friend information, and these address list friend informations have been related to using The privacy at family, some illegal viruses or hacker usually can intercept and capture the address list for intercepting user, some illegal so as to do Thing, and then obtain interests.Hacker passes through inversely to crack to analyze how to obtain by the logical of the application program in attack equipment After news record information, it can be diffused on other user equipmenies by writing a Virus by unlawful means, so that it may Obtain the address list information of other equipment.In the case where Virus does not need update, Virus not only available visitor The address list information of family end early version, and the address list information of new version can also be obtained.
The prior art provide scheme in prevention rule usually to the network protocol between server and client more Encryption Algorithm is changed, so that Virus or hacker be prevented to obtain address list information.However, some more advanced viruses are to pass through The control information of address list obtains title, to bypass the enciphering and deciphering algorithm of network protocol, from but regardless of client how Update can get corresponding address list information.
Summary of the invention
In view of this, the embodiment of the present invention be designed to provide a kind of social client address list dynamic protection method and Device realizes dynamic encryption by more control real-time display address book datas, avoids Virus and also can after version iteration Obtain address book data.
In a first aspect, the application is provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection method, comprising:
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database The address book data for issue the client is taken, and generates unique control for each address book data Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display Number creates the control.
Preferably, the User ID and operational order for updating request and carrying the client, it is described in preset number According to before obtaining the address book data for issue the client in library, further includes: in preset database Search address book data corresponding with the User ID;Based on the operational order, address list number corresponding to the User ID According to being operated;Wherein, the operational order includes following any one or more: being deleted designated communication record data;It is right Designated communication record data are modified;Add a new address book data.
Preferably, the version number for updating request and carrying the client, described is each address book data Generate unique control number, comprising: according to the total quantity of the version number of the client and the address book data, generate every The control of a control is numbered.
Preferably, described that corresponding each address book data is encrypted respectively, obtain each address list The encryption information and encryption key of data, comprising: each address book data is encrypted using random algorithm, is obtained respectively Obtain the encrypted encryption information of each address book data and encryption key;Wherein, described to carry out encryption including following any A kind of mode or various ways: carrying out shift operation to the address book data, carries out XOR operation to the address book data, Add operation is carried out to the address book data and subtraction is carried out to the address book data.
Preferably, the device id for updating request and carrying the User ID and the client of the client, institute It states and corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data and add Key, comprising: numbered according to the control of each address book data, determine that each control number corresponds to respectively Control coordinate;Based on each control coordinate, the coordinate key of each control coordinate is obtained;According to the User ID With the device id, the user information key of the client is obtained;According to the total number of the address book data, the user Information key and each coordinate key, obtain the encryption key of each address book data respectively;Based on each institute The encryption key for stating address book data respectively encrypts each address book data using TEA Encryption Algorithm, obtains every The encryption information of a address book data.
Preferably, the total number according to the address book data, the user information key and each seat Key is marked, obtains the encryption key of each address book data respectively, comprising: respectively to the key of presently described control coordinate And the user information encryption key distribution weight, the first weight and the second weight are obtained respectively;Wherein, first weight is to work as The corresponding weight of key of the preceding control coordinate, second weight is the corresponding weight of the user information key, described First weight is less than second weight;Based on first weight, taken out in the coordinate key of presently described control coordinate First key character string;Based on second weight, the second key string is taken out in the user information key;It will be described First key character string and second key string splice, and obtain the encryption key of presently described address book data.
Preferably, described that generation is respectively corresponded often based on control number, the encryption information and the encryption key The control of a address book data, and obtain final encryption data, comprising: control is generated according to preset control type;Its In, the control includes attribute section and decryption portion;By the corresponding control number difference of each address book data It matches to multiple controls, wherein each control corresponding one control number;Each control number is corresponding described Encryption information and the encryption key, save respectively to the attribute section of each control;By the total quantity of the control with All controls are encrypted, and the final encryption data is obtained.
Second aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection device, comprising:
Receiving module requests the update of address book data for receiving client;Control number generation module is used for base It is requested in the update, the address book data for issue the client is obtained in preset database, and Unique control number is generated for each address book data;Encrypting module, for respectively to corresponding each communication Record data are encrypted, and the encryption information and encryption key of each address book data are obtained;Control generation module is used for base The control for generating each address book data is respectively corresponded in control number, the encryption information and the encryption key Part, and obtain final encryption data;Sending module, for the final encryption data to be sent to the client, so that institute Client is stated when needing to carry out address book data display, the final encryption data is decrypted and is based on each control Part number creates the control.
The third aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of social client address list dynamic protection device includes memory and one or more than one Program, perhaps more than one program is stored in memory and is configured to by one or more than one processing for one of them It includes the instruction for performing the following operation that device, which executes the one or more programs:
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database The address book data for issue the client is taken, and generates unique control for each address book data Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display Number creates the control.
Fourth aspect, based on the same inventive concept, the application are provided the following technical solutions by an embodiment:
A kind of computer readable storage medium is stored thereon with computer program, when computer program is executed by processor It performs the steps of
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database The address book data for issue the client is taken, and generates unique control for each address book data Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display Number creates the control.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
A kind of social client address list dynamic protection method and device provided by the invention are receiving client to communication After the update request for recording data, based on the control for requesting to generate address book data is updated, it ensure that the generation of control not in visitor Family end carries out;Then each address book data is encrypted respectively, avoids disposably cracking for Virus;Due to taking The control that each address book data is generated on business device, only after client receives final encryption data, client just meeting It is decrypted according to final encryption data and is based on each control number creation control, the data received on the client in this way It will save in an encrypted form always, only just creation control is shown when display, due to every address list The all corresponding control of data, can also be shown when carrying out address book data display using corresponding multiple and different control, It avoids Virus while getting all address book datas.Further, due to the generation of control be server into Capable, it is not to be locally composed to keep in client, just needs to be generated by server again after carrying out version updating to control Part simultaneously issues, and ensure that dynamic, and address book data can also be obtained after version iteration by avoiding Virus.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart for social client address list dynamic protection method that first embodiment of the invention provides;
Fig. 2 is a kind of functional module for social client address list dynamic protection device that second embodiment of the invention provides Figure;
Fig. 3 is a kind of structural frames for social client address list dynamic protection device that third embodiment of the invention provides Figure;
Fig. 4 is a kind of functional block diagram for computer readable storage medium that fourth embodiment of the invention provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
First embodiment
Fig. 1 is please referred to, a kind of social client address list dynamic protection method is provided in the present embodiment, this method can answer Server for being communicated with client, specifically, this method comprises:
Step S10: it receives client and the update of address book data is requested;
Step S20: being requested based on the update, is obtained in preset database and is carried out issuing the client The address book data, and unique control number is generated for each address book data;
Step S30: respectively encrypting corresponding each address book data, obtains each address book data Encryption information and encryption key;
Step S40: it is respectively corresponded based on control number, the encryption information and the encryption key and generates each institute The control of address book data is stated, and obtains final encryption data;
Step S50: the final encryption data is sent to the client, so that the client is being led to When news record data display, the final encryption data is decrypted and is based on each control number creation control.
In the present embodiment, it after receiving client to the update request of address book data, is generated based on request is updated The control of address book data ensure that the generation of control is not carried out in client;Then each address book data is carried out respectively Encryption avoids disposably cracking for Virus;Due to generating the control of each address book data on the server, only exist After client receives final encryption data, client can just be decrypted according to final encryption data and be based on each control Number creation control, the data received on the client in this way will be saved in an encrypted form always, only shown When just creation control is shown, due to all corresponding control of every address book data, shown carrying out address book data When can also be shown using corresponding multiple and different control, avoid Virus while getting all address list numbers According to.
It further, is not to be locally composed to keep in client since the generation of control is carried out in server , it just needs to generate control by server again after carrying out version updating and issue, avoid Virus in version iteration Address book data can be also obtained afterwards.
Step S10: it receives client and the update of address book data is requested.
In step slo, updating request is the request that user end to server is sent, and can carry visitor in update request User ID, device id and the operational order at family end, wherein operational order is the instruction operated to preset database;Its In, operational order includes following any one or more: being deleted designated communication record data;Designated communication record data are carried out Modification;Add a new address book data.Update request further includes downloading request, for requesting the user of downloading client Address list data corresponding to ID.
Operational order is carried it should be noted that if updating in request, then before step S20, further includes: pre- If database in search corresponding with User ID address book data;Based on the operational order, to the User ID pair The address book data answered is operated.Step S20 is executed after the completion of operation.
Step S20: being requested based on the update, is obtained in preset database and is carried out issuing the client The address book data, and unique control number is generated for each address book data.
In step S20, preset database is used to save the address book data of different user ID.Generating control number can Directly to carry out random number, first control number can also be generated at random, then successively serial number, with no restriction.
In the present embodiment, step S20 includes: to be led to according to the version number of the client with described with specific embodiment The total quantity of news record data generates the control number of each control.Specifically for example:
Firstly, a random data is generated, then using random data to the total amount (total amount and address list of control of control The total quantity of data is identical) it rems, to obtain a number.The version number of client and a reorganization number splicing are then obtained most Whole control number, if client release number is 0001, the number that random data rems is 0001, then final control Number is 00010001.It then, can be that Base Serial Number is successively allocated control number to each address book data by the number. The randomness that ensure that control number avoids a certain address book data and corresponds to a specific number always, improves safety.
Step S30: respectively encrypting corresponding each address book data, obtains each address book data Encryption information and encryption key.
In step s 30, encryption information be the encrypted data of address book data, encryption key be used for encryption information into Row decryption.Following cipher mode is provided in the present embodiment:
1, it is encrypted using random algorithm.
Specifically, including:
Each address book data is encrypted using random algorithm, each address book data is obtained respectively and adds Encryption information and encryption key after close;Wherein, it is described carry out encryption include any of the following mode or various ways: to institute It states address book data and carries out shift operation, XOR operation is carried out to the address book data, the address book data is added Method operation and to the address book data carry out subtraction.
It may make the encryption specific algorithm of each address book data to have differences by the encryption of random algorithm, improve brokenly Solve difficulty.For example, ciphering process can are as follows:
Void Encrypt00010001(char*data){
For (int i=0;i<sizeof(data);i++){
* (data+i) ^=0x7a;// XOR operation;
* (data+i) ^=0x34;// XOR operation;
* (data+i) +=0x1;// add operation;
* (data+i) ^=0x15;// XOR operation;
* (data+i)=(* (data+i)<<3) | (* (data+i)>>(8-3));// shift left 3, dextroposition 3;
* (data+i) +=0x34;// add operation;
* (data+i)=(* (data+i)>>4) | (* (data+i)<<(8-4));// dextroposition 4, shift left 4;
};Indicate that each character in the address book data data numbered to control be in 00010001 encrypts, In, 0x7a, 0x34,0x1,0x15,0x34 are corresponding key.
2, the corresponding address book data of control coordinate pair based on each control is encrypted.
Position of the position of each control in the entire address list of client be it is fixed, server is when issuing control It just may know that each control in the relative position of entire address list.So it can then be carried out according to the control coordinate of relative position It participates in calculating, so that Encryption Algorithm is increasingly complex.The address book data of entire address list then can be according to each control Relative coordinate carries out secondary encryption.So that each address list is only only correctly in the contact information of its decryption of current location 's.
Specifically, including:
Step S311: numbering according to the control of each address book data, determines that each control is compiled respectively Number corresponding control coordinate.
Step S312: being based on each control coordinate, obtains the coordinate key of each control coordinate;
Step S313: according to the User ID and the device id, the user information key of the client is obtained;
Step S314: according to the total number of the address book data, the user information key and each coordinate Key obtains the encryption key of each address book data respectively;It is close by user information key and each coordinate Key realizes secondary encryption, improves safety.
In step S314, the total number of address book data specifically can be used, user information key and each coordinate are close Key calculates corresponding each address book data encryption key.The mode of calculating with no restriction, such as: add between three The modes such as method, subtraction, splicing calculate encryption key.Specifically, further including following acquisition modes:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, first is obtained respectively Weight and the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, second power Weight is the corresponding weight of the user information key, and first weight is less than second weight;
Based on first weight, first key character string is taken out in the coordinate key of presently described control coordinate;
Based on second weight, the second key string is taken out in the user information key;
The first key character string and second key string are spliced, presently described address book data is obtained Encryption key.
Step S315: the encryption key based on each address book data, using TEA Encryption Algorithm respectively to each institute It states address book data to be encrypted, obtains the encryption information of each address book data.
Such as: in server end, it is known that the control of this current address book data is finally in the seat of entire address list Cursor position, such as the position coordinates of first address book data are (10,0);The position coordinates of so second address book data It is then the height of this control, so that obtaining position coordinates is (10,20).And so on third address book data position sit It is designated as (10,40).
Meanwhile also fractional weight can be taken based on User ID, device id in this example, another portion is taken based on position coordinates Fraction weight;So that the encryption of address book data can add dependent on the position coordinates of User ID, device id and control It is close, to ensure the only corresponding user of information and equipment and coordinate shows and can just be decrypted correctly in correct position.
For example, Encryption Algorithm can be as follows:
Poskey=md5.create (10+0);It for first contact person its encryption key is come using MD5 algorithm To Coordinate generation key poskey.
Infokey=sha128.create (userid+deviceid);User's unique identification and equipment are uniquely marked Knowledge then calculates user information key, and wherein sha128.create is then the interface of hash algorithm sha128, and wherein userid is then User ID, wherein deviceid is then the device id of user.Finally, obtained result is then the key infokey of user information.
Wherein, poskey is then one 32 character strings;Infokey is then one 128 character strings, character string Digit is not particularly limited, and 32 and 128 are only used as exemplary illustration.
Then, encryption key (i.e. execution step S314) is obtained based on weight information.
Specifically: key=poskey [0, num*M%X]+infokey [num*M%X, num*N%Y];Wherein, X, Y are The digit of character string, distribution weight is just like under type in this example: M (the first weight) < N (the second weight).Num is then address list number According to total number, by this kind of mode can guarantee total number, control coordinate and the user information of address list jointly to key into Row influences, and improves safety;Simultaneously it may require that weight M < N, since there are identical probability to be higher than user information for control number of coordinates (User ID, device id), therefore make weight M < N also and the safety of key can be improved, keep influence of the user information to key bigger. Likewise, X < Y can also be made, guarantee that influence of the user information relative to position coordinates to encryption key is bigger.
Such as: M=0.2, N=0.8, X=32, Y=128;Poskey [0, num*0.2%32] expression takes from poskey 0 num*0.2%32 so multidigit character string is arrived out, wherein weight is 0.2.Infokey [num*0.2%32, num*0.8% 128] it indicates to take out num*0.2%32 to num*0.8%128 so multidigit character string from infokey, wherein weight is 0.8. Finally, the encryption key key obtained is only the encryption key that Encryption Algorithm is finally carried out to this address book data.
When needing to illustrate, the user gradation of user may be incorporated into other implementations, such as num is replaced Be changed to user gradation Lv, perhaps increase user gradation Lv or using user gradation Lv to num carry out once-through operation (add, subtract, Multiplication and division), since user gradation is to change in use with the increase of empirical value, it can further enhance encryption Dynamic, raising crack difficulty.
Such as: encryption key is obtained according to the address list total number of user, user gradation.
Key=poskey [0, (num+Lv) * M%X]+infokey [(num+Lv) * M%X, (num+Lv) * N%Y] leads to This kind of mode is crossed, all key can once be updated after user gradation upgrades each time, which is passively, to use Family upgrading is fast to indicate that user is more frequent using client, with the higher risk for being stolen address book data by virus, uses User gradation illustrates that the renewal frequency of encryption key can be improved in the update with encryption key, improves the safety of address book data, Reduce address book data steals risk.
Finally, encrypt to every address book data using TEA Encryption Algorithm.That is, encryptdata= TEA.encrypt(key,info);Wherein, TEA.encrypt is then the interface of Encryption Algorithm TEA;Info is then contact person Information;Encrypted result is then encryptdata.
And after client receives the final encryption data of encryption, specific decryption is then as follows:
View*v=new TextView, pos=v.getposition ();By the interface getposition of control come Obtain the position coordinates of control.Info=TEA.decrypt (key, encryptdata) passes through same mode when encryption The key key for calculating decryption, to obtain initial data by decipherment algorithm.
Step S40: it is respectively corresponded based on control number, the encryption information and the encryption key and generates each institute The control of address book data is stated, and obtains final encryption data.
In step s 40, it specifically includes:
Step S401: control is generated according to preset control type;Wherein, the control includes attribute section and decryption part Point;
Step S402: the corresponding control number of each address book data is matched respectively to multiple controls, In each control corresponding one control number;
Step S403: each control is numbered into the corresponding encryption information and the encryption key, is saved respectively To the attribute section of each control;In step S403, each encryption information and encryption key can also add again It is close, such as: DES.Encrypt (data, key) is encrypted using conventional encryption algorithm DES.The mode of preservation can pass through control Copy code in the constructed fuction of part carries out, referring specifically to subsequent explanation.
Step S404: the total quantity of the control and all controls are encrypted, and obtain the final encryption number According to.
In step s 40, the control code that the generation of control can be automatically generated based on type, the type definition of control The concrete behavior of control and the safety method of attribute information and data.Type based on control we can be used automatically It generates code instrumentation and generates any number of controls, and realize the different of each control internal cryptographic mode and key, from And all address book datas can not be obtained simultaneously by guaranteeing Virus.(for being sat based on position by taking the encryption of random algorithm as an example Target cipher mode can carry out reverse setting based on cipher mode when designing the decryption in control type), specific control type Design, such as:
Class TextViewxxx1public:View // firstly, can define a class name TextViewxxx1 indicates This control, subsequent control can then change different titles.Since it is to inherit in the View control on basis, with what can be shown Function.
The attribute section that control has includes the following:
Char dataxxx [MAX] indicates the title that control is shown;Char keyxxx [KEY] indicates the title of control Key;Int posxxxx indicates x coordinate of the control in father's control;Int posyxxx indicates that y of the control in father's control is sat Mark;Father's control of view*parentxxx expression control.
When control is created, its constructed fuction can be as follows:
TextView1(char*data,char*key,int posx,int posy,view*parent);Wherein, including The key key of encrypted data data and decryption.
Memcpy(dataxxx,src);Indicate the data copy that will encrypt of calling system function Memcpy to dataxxx In.
Memcpy (keyxxx, key) indicates copy key data into keyxxx.
Posxxxx=posx;Posyxxx=posy;Parentxxx=parent;Wherein, posxxxx and posyxxx is used In the position for informing that this control is shown;Parent indicates father's control of this control, for being shown to above father's control;The generation side Method is based on a kind of control that tree-shaped structure is all come tissue.
Type based on above-mentioned definition can automatically generate more set control codes.
Further, it is completed due to ciphering process in server, the address book data that server issues is sent after encrypting Client is arrived, and client is stored with ciphertext in the whole process, operation is just decrypted when displaying control.
Therefore, it is necessary to define the decryption portion of control, it is decrypted by the way of temporary variable in control, comprising:
Create control title temporary variable and key temporary variable;The title temporary variable, in the client When end in the encryption data to being decrypted, the encryption information is obtained;The key temporary variable, in the client When end in the encryption data to being decrypted, encryption key is obtained;The title temporary variable and the key temporary variable, It is also used to remove the data in presently described control title temporary variable and the key temporary variable after the completion of decryption.
Example is as follows:
Class TextViewxxx1public:View{
This same interface is also a member method ShowTextxxx for belonging to control type.
This interface is then used to show the data in control.For then only just meeting when showing herein Initial data is decrypted, and the data decrypted are stored in temporary variable, then empty variable after the completion of display, therefore absolutely Pair ensured this control show data safety.It is implemented as follows:
Void ShowTextxxx () is shown to control;Firstly, it is necessary to operation be decrypted to data, in order not to right Client is just decrypted final encryption data in downloading, causes leaking data, uses temporary variable in the present embodiment Operation is decrypted.It is as follows:
Char dataxxxtemp [MAX] indicates the title temporary variable that control is shown;Char keyxxxtemp[KEY] Indicate the key temporary variable of the title of control;Then pass through Memcpy (dataxxxtemp, dataxxx);Memcpy (keyxxxtemp, keyxxx) copies data into temporary variable.By Aes.Decrypt (dataxxxtemp, Keyxxxtemp the decipherment algorithm of address book data) is carried out in temporary variable.
It is to correspond to Encryption Algorithm using step S404 to decrypt to final encryption data first due to having carried out final encryption Once, corresponding encryption key is obtained.
Then, using random algorithm come the decryption to data again.
It is as follows by taking the random algorithm in step S30 as an example:
For (int i=0;i<sizeof(dataxxxtemp);I++), used for circulation is come to dataxxxtemp Each byte operation is decrypted.Wherein, sizeof (dataxxxtemp) is the length for calculating data.
* (dataxxxtemp+i)=(* (dataxxxtemp+i)>>4) | (* (dataxxxtemp+i)<<(8-4)) indicate Data carry out dextroposition 4 and shift left 4 to obtain final data, and so on.
* (dataxxxtemp+i) +=0x34 indicates to add 0x4 to address book data, and wherein 0x4 is then also randomly generated Key, and so on.
* (dataxxxtemp+i)=(* (dataxxxtemp+i)<<3) | (* (dataxxxtemp+i)>>(8-3));
* (dataxxxtemp+i) ^=0x15;
* (dataxxxtemp+i) +=0x1;
* (dataxxxtemp+i) ^=0x34;
* (dataxxxtemp+i) ^=0x7a.
It should be noted that instruction strip number when random algorithm encrypts is also random.After the completion of decryption, control can be obtained Text information to be shown is finally needed, finally text is shown.Wherein, then the interface that we then call control to provide SetText is arranged text information, SetText (dataxxxtemp).
It next needs to remove the ephemeral data of temporary variable after the completion of decryption is shown, prevents leaking data.It can The content of variable is then all set to 0, Memset (dataxxxtemp, 0) by system function Memset;After removing, then Statistics is added to father's control to show, Parentxxx- > addchild (this, Posxxxx, Posyxxx).
Server generate control ensure that address book data all places be all in the form of cipher-text information guarantor It deposits, final encryption data is just decrypted when display, and after address book data is completed to be arranged and be shown to control, Data in temporary variable are carried out to empty processing, improve safety.
Step S50: the final encryption data is sent to the client, so that the client is being led to When news record data display, the final encryption data is decrypted and is based on each control number creation control.
It in step s 50, include: creation control when being specifically decrypted when client receives final encryption data Title temporary variable and key temporary variable;By the address book data copied part in the encryption data to the control name Claim in temporary variable, and by the key copy in the encryption data into the key temporary variable, in the control It is decrypted in title temporary variable and the key temporary variable;It removes the control title temporary variable and the key faces Data in variations per hour improve the safety of address book data.
In order to keep the solution of the present invention more intuitive it can be readily appreciated that being illustrated with a complete example:
When each client released version, server can generate the code of more set controls, then server is also tool simultaneously Have the algorithmic code of control.Server updates the version number that request carries according to client to take out corresponding algorithm versions Number.Display of the address book data without regard to control is related only to for server, so server only needs corresponding lead to News record data and Encryption Algorithm.And Encryption Algorithm is then a reverse process with decipherment algorithm.
It by taking TextViewxxx1 as an example, is realized with C++ code, specific logic is as follows:
One, server to the encryption of address book data with issue
1, encryption communication record data and control distribute
Ciphering process and decrypting process are reverse process first.
Void Encrypt00010001(char*data){
For (int i=0;i<sizeof(data);i++){
* (data+i) ^=0x7a;
* (data+i) ^=0x34;
* (data+i) +=0x1;
* (data+i) ^=0x15;
* (data+i)=(* (data+i)<<3) | (* (data+i)>>(8-3));
* (data+i) +=0x34;
* (data+i)=(* (data+i)>>4) | (* (data+i)<<(8-4));
} // every address book data is encrypted.
DES.Encrypt(data,key);
} // encryption information and encryption key are encrypted again.
There is number for each control, then server then to above-mentioned Encryption Algorithm be numbered for Encrypt00010001.Then, server from database read the address book data of user and to each information creating it is random Algorithm numbers and executes Encryption Algorithm.
Vector<string>addressbook defines a communication address book stored array addressbook.
Then, we are inquired database by the user information uid of user and obtain its address list information, can pass through data Library executes sqlite.excute to obtain address list information, i.e. Addressbook=sqlite.excute (uid).
String result defines the result data result that an address list returns to client.
Then, each information creating data encryption of address list and distribution control, as follows:
For (int i=0;i<addressbook.size();i++)
Int nRand=Rand () %TextViewxxx.size ()
We obtain the number of control first, and acquisition methods are then that we first generate a random data, then random number It rems according to the total amount to control, to obtain a number.Wherein, Rand () is the interface that system obtains random data; TextViewxxx.size () is then the sum of control.Obtained random data nRand can correspond to obtain a number, add Upper version number then obtains final control number, and e.g., version number 0001, the number that complementation obtains is 0001, then control is compiled Number be 00010001.
2, address book data and the preservation of control are obtained.
Data=addressbook [i] obtains the address book data stored in presetting database.
Key=rand ();Encrypt00010001(Data);The random of corresponding control number is used to address book data Algorithm is encrypted, and obtains the key key of random algorithm.To obtain the encryption information of this address book data and add Key.
Then, by encryption information and encryption key storage into control.
Result.append(00010001);Memory communicating records the control number of data.
Result.append(Key);Store encryption key Key.
Result.append(Data);Store encryption information.
So circulation encrypts each address book data using above scheme.
3, each encryption information is always encrypted
After being finally completed encryption and storage, in the total front of result data, we store the sum of a control, i.e. Result =num+Result.
After the completion of entire data encryption, data safety can be further ensured, it is complete to the data for being ultimately sent to client Portion carries out a total encryption.Encryption, i.e. Encrypt_result=IDEA.Encrypt are such as completed using IDEA algorithm (result).Finally obtain final encryption data.
Two, after client receives final encryption data, the creation of control is carried out.
1, after client receives the final encryption data under server, then being decrypted first to final encryption data, then Data are parsed, and create each independent control.
Result=IDEA.Decrypt (Encrypt_result);Outermost decryption.
2, the encryption information of result is parsed and creates control.
The total num of control is taken out from the head result.
For (int i=0;i<num;i++){
No=Result [i];Key=Result [i];Data=Result [i];
Control number, corresponding encryption key and corresponding encryption information are obtained from result.
View*=new TextView+No (Data, key, posx, posy) };It indicates to number according to control to create pair The control answered is finally completed the creation of control and display.
Second embodiment
Referring to Fig. 2, providing a kind of social client address list dynamic protection device 300, the device in the present embodiment 300 include:
Receiving module 301 requests the update of address book data for receiving client;
Control number generation module 302 is obtained in preset database for being requested based on the update and needs to carry out The address book data of the client is issued, and generates unique control number for each address book data;
Encrypting module 303 obtains each described logical for encrypting respectively to corresponding each address book data The encryption information and encryption key of news record data;
Control generation module 304, for right respectively based on control number, the encryption information and the encryption key The control of each address book data should be generated, and obtains final encryption data;
Sending module 305, for the final encryption data to be sent to the client, so that the client is needing When carrying out address book data display, the final encryption data is decrypted and is based on each control number creation institute State control.
As an alternative embodiment, described update requests the User ID for carrying the client to refer to operation It enables, described device further includes operation module, for carrying out issuing the client in described obtain in preset database Before the address book data at end, address book data corresponding with the User ID is searched in preset database;It is based on The operational order operates the corresponding address book data of the User ID;Wherein, the operational order includes following It is one or more: designated communication record data are deleted;It modifies to designated communication record data;Add a new communication Record data.
As an alternative embodiment, the control number generation module 302, is specifically used for:
According to the total quantity of the version number of the client and the address book data, the control of each control is generated Number.
As an alternative embodiment, the encrypting module 303, is specifically used for:
Each address book data is encrypted using random algorithm, each address book data is obtained respectively and adds Encryption information and encryption key after close;Wherein, it is described carry out encryption include any of the following mode or various ways: to institute It states address book data and carries out shift operation, XOR operation is carried out to the address book data, the address book data is added Method operation and to the address book data carry out subtraction.
As an alternative embodiment, described update the User ID for requesting to carry the client and the visitor The device id at family end, the encrypting module 303, is specifically used for:
It is numbered according to the control of each address book data, determines that each control numbers corresponding control respectively Part coordinate;Based on each control coordinate, the coordinate key of each control coordinate is obtained;According to the User ID and institute Device id is stated, the user information key of the client is obtained;According to the total number of the address book data, the user information Key and each coordinate key, obtain the encryption key of each address book data respectively;Based on each described logical The encryption key of news record data, respectively encrypts each address book data using TEA Encryption Algorithm, obtains each institute State the encryption information of address book data.
As an alternative embodiment, the encrypting module 303 also particularly useful for:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, first is obtained respectively Weight and the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, second power Weight is the corresponding weight of the user information key, and first weight is less than second weight;Based on first weight, First key character string is taken out in the coordinate key of presently described control coordinate;Based on second weight, in the user The second key string is taken out in information key;The first key character string and second key string are spliced, obtained Obtain the encryption key of presently described address book data.
As an alternative embodiment, the control generation module 304, is specifically used for:
Control is generated according to preset control type;Wherein, the control includes attribute section and decryption portion;It will be each The corresponding control number of the address book data is matched respectively to multiple controls, wherein each control corresponds to a control Part number;Each control is numbered into the corresponding encryption information and the encryption key, is saved respectively to each described The attribute section of control;The total quantity of the control and all controls are encrypted, the final encryption data is obtained.
As an alternative embodiment, the control generation module 304, also particularly useful for:
Create control title temporary variable and key temporary variable;The title temporary variable, in the client When end in the encryption data to being decrypted, the encryption information is obtained;The key temporary variable, in the client When end in the encryption data to being decrypted, encryption key is obtained;The title temporary variable and the key temporary variable, It is also used to remove the data in presently described control title temporary variable and the key temporary variable after the completion of decryption.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
3rd embodiment
Based on the same inventive concept, as shown in figure 3, present embodiments providing a kind of social client address list dynamic protection Device 400 including memory 410, processor 420 and is stored in the calculating that can be run on memory 410 and on processor 420 Machine program 411, processor 420 perform the steps of when executing computer program 411
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database The address book data for issue the client is taken, and generates unique control for each address book data Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display Number creates the control.
In the specific implementation process, processor 420 execute computer program 411 when, may be implemented real first embodiment (or Second embodiment) in any embodiment, details are not described herein.
Fourth embodiment
Based on the same inventive concept, as shown in figure 4, present embodiments providing a kind of computer readable storage medium 500, On be stored with computer program 511, computer program 511 performs the steps of when being executed by processor
Client is received to request the update of address book data;It is requested based on the update, is obtained in preset database The address book data for issue the client is taken, and generates unique control for each address book data Number;Corresponding each address book data is encrypted respectively, obtains the encryption information of each address book data With encryption key;It is each described logical that generation is respectively corresponded based on control number, the encryption information and the encryption key The control of news record data, and obtain final encryption data;The final encryption data is sent to the client, so that described Client is decrypted the final encryption data and is based on each control when needing to carry out address book data display Number creates the control.
In the specific implementation process, when computer program 511 is executed by processor, first embodiment (or may be implemented Two embodiments) in any embodiment, details are not described herein.
Technical solution in above-mentioned the embodiment of the present application, at least have the following technical effects or advantages:
In a kind of social client address list dynamic protection method provided by the invention and device, client is being received to logical After the update request of news record data, based on the control for requesting to generate address book data is updated, it ensure that the generation of control does not exist Client carries out;Then each address book data is encrypted respectively, avoids disposably cracking for Virus;Due to The control of each address book data is generated on server, only after client receives final encryption data, client is It can be decrypted according to final encryption data and be based on each control number creation control, the number received on the client in this way According to that will save in an encrypted form always, only just creation control is shown when display, due to every communication The all corresponding control of data is recorded, can also be shown using corresponding multiple and different control when carrying out address book data display Show, avoid Virus while getting all address book datas.Further, since the generation of control is in server It carries out, is not to be locally composed to keep in client, just need to be generated by server again after carrying out version updating Control simultaneously issues, and ensure that dynamic, and address book data can also be obtained after version iteration by avoiding Virus.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
If the method function in the present invention is realized in the form of software function module and as independent product pin It sells or in use, can store in a computer readable storage medium.Based on this understanding, technical side of the invention Substantially the part of the part that contributes to existing technology or the technical solution can be with the shape of software product in other words for case Formula embodies, which is stored in a storage medium, including some instructions are used so that a calculating Machine equipment (can be personal computer, server or the network equipment etc.) executes each embodiment the method for the present invention All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.It should be noted that, in this document, relational terms such as first and second and the like are used merely to one A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of social client address list dynamic protection method characterized by comprising
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with Encryption key;
Based on control number, the encryption information and the encryption key, respectively corresponds and generate each address list number According to control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data When, the final encryption data is decrypted and is based on each control number creation control.
2. the method according to claim 1, wherein the User ID for updating request and carrying the client With operational order, it is described obtained in preset database issue the client the address book data it Before, further includes:
Address book data corresponding with the User ID is searched in preset database;
Based on the operational order, the corresponding address book data of the User ID is operated;
Wherein, the operational order includes following any one or more:
Designated communication record data are deleted;
It modifies to designated communication record data;
Add a new address book data.
3. the method according to claim 1, wherein the version for updating request and carrying the client Number, it is described to generate unique control number for each address book data, comprising:
According to the total quantity of the version number of the client and the address book data, the control for generating each control is compiled Number.
4. the method according to claim 1, wherein it is described respectively to corresponding each address book data into Row encryption, obtains the encryption information and encryption key of each address book data, comprising:
Each address book data is encrypted using random algorithm, after obtaining each address book data encryption respectively Encryption information and encryption key;
Wherein, it is described carry out encryption include any of the following mode or various ways: the address book data is displaced Operation carries out XOR operation to the address book data, carries out add operation to the address book data and to the communication It records data and carries out subtraction.
5. the method according to claim 1, wherein the User ID for updating request and carrying the client And the device id of the client, it is described that corresponding each address book data is encrypted respectively, obtain each institute State the encryption information and encryption key of address book data, comprising:
It is numbered according to the control of each address book data, determines that each control is numbered corresponding control and sat respectively Mark;
Based on each control coordinate, the coordinate key of each control coordinate is obtained;
According to the User ID and the device id, the user information key of the client is obtained;
According to the total number of the address book data, the user information key and each coordinate key obtain respectively The encryption key of each address book data;
Based on the encryption key of each address book data, using TEA Encryption Algorithm respectively to each address book data It is encrypted, obtains the encryption information of each address book data.
6. according to the method described in claim 5, it is characterized in that, the total number according to the address book data, described User information key and each coordinate key, obtain the encryption key of each address book data respectively, comprising:
Respectively to the key of presently described control coordinate and the user information encryption key distribution weight, the first weight is obtained respectively With the second weight;Wherein, first weight is the corresponding weight of key of presently described control coordinate, and second weight is The corresponding weight of the user information key, first weight are less than second weight;
Based on first weight, first key character string is taken out in the coordinate key of presently described control coordinate;
Based on second weight, the second key string is taken out in the user information key;
The first key character string and second key string are spliced, the encryption of presently described address book data is obtained Key.
7. the method according to claim 1, wherein it is described based on the control number, the encryption information with The encryption key respectively corresponds the control for generating each address book data, and obtains final encryption data, comprising:
Control is generated according to preset control type;Wherein, the control includes attribute section and decryption portion;
The corresponding control number of each address book data is matched respectively to multiple controls, wherein each control is corresponding One control number;
Each control is numbered into the corresponding encryption information and the encryption key, is saved respectively to each control Attribute section;
The total quantity of the control and all controls are encrypted, the final encryption data is obtained.
8. a kind of social client address list dynamic protection device characterized by comprising
Receiving module requests the update of address book data for receiving client;
Control number generation module is obtained in preset database for being requested based on the update and is issued institute The address book data of client is stated, and generates unique control number for each address book data;
Encrypting module obtains each address list number for encrypting respectively to corresponding each address book data According to encryption information and encryption key;
Control generation module, for respectively corresponding generation based on control number, the encryption information and the encryption key The control of each address book data, and obtain final encryption data;
Sending module, for the final encryption data to be sent to the client, so that the client is needing to carry out When address book data is shown, the final encryption data is decrypted and is based on each control number creation control Part.
9. a kind of social client address list dynamic protection device, which is characterized in that include memory and one or one A above program, perhaps more than one program is stored in memory and is configured to by one or one for one of them It includes the instruction for performing the following operation that the above processor, which executes the one or more programs:
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with Encryption key;
It is respectively corresponded based on control number, the encryption information and the encryption key and generates each address book data Control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data When, the final encryption data is decrypted and is based on each control number creation control.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that computer program is located Reason device performs the steps of when executing
Client is received to request the update of address book data;
It is requested based on the update, the address list number for issue the client is obtained in preset database According to, and unique control number is generated for each address book data;
Corresponding each address book data is encrypted respectively, obtain the encryption information of each address book data with Encryption key;
It is respectively corresponded based on control number, the encryption information and the encryption key and generates each address book data Control, and obtain final encryption data;
The final encryption data is sent to the client, so that the client is shown needing to carry out address book data When, the final encryption data is decrypted and is based on each control number creation control.
CN201910584985.XA 2019-07-01 2019-07-01 Social client address book dynamic protection method and device Active CN110166493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910584985.XA CN110166493B (en) 2019-07-01 2019-07-01 Social client address book dynamic protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910584985.XA CN110166493B (en) 2019-07-01 2019-07-01 Social client address book dynamic protection method and device

Publications (2)

Publication Number Publication Date
CN110166493A true CN110166493A (en) 2019-08-23
CN110166493B CN110166493B (en) 2021-10-15

Family

ID=67637357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910584985.XA Active CN110166493B (en) 2019-07-01 2019-07-01 Social client address book dynamic protection method and device

Country Status (1)

Country Link
CN (1) CN110166493B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114226A (en) * 2007-08-28 2008-01-30 北京中企开源信息技术有限公司 Code automatically generating device based on model component, system and method
CN106357866A (en) * 2016-09-27 2017-01-25 维沃移动通信有限公司 Contact list management method and mobile intelligent terminal
US20170345105A1 (en) * 2014-03-31 2017-11-30 Monticello Enterprises, Llc System and method for providing multiple payment method options to users in connection with a browser payment request api
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors
US20180268407A1 (en) * 2017-03-19 2018-09-20 TokenID, Inc. Apparatus and method for payment authorization and authentication based tokenization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114226A (en) * 2007-08-28 2008-01-30 北京中企开源信息技术有限公司 Code automatically generating device based on model component, system and method
US20170345105A1 (en) * 2014-03-31 2017-11-30 Monticello Enterprises, Llc System and method for providing multiple payment method options to users in connection with a browser payment request api
CN106357866A (en) * 2016-09-27 2017-01-25 维沃移动通信有限公司 Contact list management method and mobile intelligent terminal
US20180268407A1 (en) * 2017-03-19 2018-09-20 TokenID, Inc. Apparatus and method for payment authorization and authentication based tokenization
CN108133139A (en) * 2017-11-28 2018-06-08 西安交通大学 A kind of Android malicious application detecting system compared based on more running environment behaviors

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
卢成均: "《动态创建ASP.NET服务器控件解析》", 《计算机与现代化》 *

Also Published As

Publication number Publication date
CN110166493B (en) 2021-10-15

Similar Documents

Publication Publication Date Title
US10614244B1 (en) Sensitive data aliasing
US11652608B2 (en) System and method to protect sensitive information via distributed trust
US20150371058A1 (en) Meta-complete data storage
US10007803B2 (en) Searching over encrypted keywords in a database
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
EP3844934B1 (en) A computer system and method of operating same for handling anonymous data
US20110276490A1 (en) Security service level agreements with publicly verifiable proofs of compliance
JP7235668B2 (en) REGISTRATION METHOD, COMPUTER AND PROGRAM
JPH11143780A (en) Method and device for managing secret information in database
CN109271798A (en) Sensitive data processing method and system
CN111314069A (en) Block chain-based shaking system and method, electronic device and storage medium
CN108768938B (en) A kind of web data encryption and decryption method and device
CN111091381A (en) Hardware wallet and management method thereof
CA3179201A1 (en) Systems and methods for use in segregating data blocks to distributed storage
CN110166493A (en) A kind of social client address list dynamic protection method and device
JPWO2011058629A1 (en) Information management system
KR20100112298A (en) System for searching index according to a pattern encrypted database and method therefor
CN103795547A (en) User data encryption method and device
CN113011945A (en) Order number generation method and device, terminal equipment and storage medium
KR101635005B1 (en) Method for managing metadata in a digital data safe system based on cloud
CN113434535B (en) Data processing method, communication system, device, product and storage medium
Puttaswamy et al. Silverline: Toward data confidentiality in third-party clouds
JP4697451B2 (en) Data input / output device, data input / output method, data input / output program
Coles et al. Expert SQL server 2008 encryption
CN117931154A (en) Method and device for generating and using components in OPM modeling tool and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant