CN110290119A - A kind of JSON message encryption method, decryption method and device - Google Patents
A kind of JSON message encryption method, decryption method and device Download PDFInfo
- Publication number
- CN110290119A CN110290119A CN201910498047.8A CN201910498047A CN110290119A CN 110290119 A CN110290119 A CN 110290119A CN 201910498047 A CN201910498047 A CN 201910498047A CN 110290119 A CN110290119 A CN 110290119A
- Authority
- CN
- China
- Prior art keywords
- json
- encryption
- message
- encrypted
- json message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of JSON message encryption method, decryption method and devices, specifically: in encryption, determine JSON member to be encrypted in JSON message, it encrypts JSON member and obtains encryption JSON member, JSON member is replaced with into encryption JSON member, obtain replacement JSON message, associated storage relationship based on JSON member, localization and expression formula is configured for encryption JSON member, localization and expression formula is organized into replacement JSON message, obtains encryption JSON message;In decryption, encryption JSON message is parsed, localization and expression formula is obtained, is based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, decryption encryption JSON member obtains JSON member, to obtain JSON message.Localization and expression formula is configured in encryption, so that the automation positioning of encryption JSON member can be realized according to localization and expression formula in decryption.
Description
Technical field
The present invention relates to technical field of data processing more particularly to a kind of JSON message encryption methods, decryption method and dress
It sets.
Background technique
Literal translation formula scripting language object numbered musical notation (Java Script Object Notation, JSON) is a kind of lightweight
Data interchange format, data are stored and indicated using the text formatting for being totally independent of programming language, be easy to read and compile
It writes, while being also easy to parse and generate, it is succinct to make ideal data interchange language with clearly hierarchical structure, effectively
Ground improves the data transmission efficiency in data exchange process.
In order to improve the safety of data exchange, the prior art proposes some JSON message encipher-decipher methods, although this
A little JSON message encipher-decipher methods can ensure the data safety in data exchange process, still, it be decrypted in receiving end
Before, it is also necessary to by information configurations such as Data Identifications to be decrypted to receiving end, so that receiving end can be according to the information of configuration come really
Fixed data to be decrypted.
Obviously, in these JSON message encipher-decipher methods that the prior art proposes, decrypting process is also in semi-automatic shape
State cannot achieve the automation positioning for treating ciphertext data.
Summary of the invention
The embodiment of the invention provides a kind of JSON message encryption method, decryption method and devices, to solve existing skill
The JSON message encipher-decipher method that art proposes cannot achieve the problem of automation positioning for treating ciphertext data.Specifically, this hair
The technical solution that bright embodiment provides is as follows:
On the one hand, the embodiment of the invention provides a kind of JSON message encryption methods, comprising:
It determines the JSON member to be encrypted in JSON message, and JSON member to be encrypted is encrypted, obtain to be encrypted
The corresponding encryption JSON member of JSON member;
JSON member to be encrypted in JSON message is replaced with into the corresponding encryption JSON member of JSON member to be encrypted, is obtained
To the corresponding replacement JSON message of JSON message;
Associated storage relationship based on JSON member to be encrypted in JSON message configures positioning table for encryption JSON member
Up to formula, wherein localization and expression formula is used to position encryption JSON member;
The corresponding localization and expression formula of encryption JSON member is organized into replacement JSON message, it is corresponding to obtain JSON message
Encrypt JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, further includes:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message
Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form
JSON member regenerates JSON message.
In a kind of possible embodiment, the JSON member to be encrypted in JSON message is determined, comprising:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, the JSON member to be encrypted in JSON message is determined, comprising:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message
Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at
Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
In a kind of possible embodiment, JSON member to be encrypted is encrypted, obtains JSON member couple to be encrypted
The encryption JSON member answered, comprising:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted
Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, associated storage relationship based on JSON member to be encrypted in JSON message,
Localization and expression formula is configured for encryption JSON member, comprising:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at
Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member
Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated
Up to formula.
In a kind of possible embodiment, the corresponding localization and expression formula of encryption JSON member is organized into replacement JSON report
Wen Zhong obtains the corresponding encryption JSON message of JSON message, comprising:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array
With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member
Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair
As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON
In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, further includes:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds
It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key
Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption
In data object.
On the one hand, the embodiment of the invention provides a kind of JSON message decryption methods, comprising:
From encryption JSON message, localization and expression formula is obtained;
Based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, and encryption JSON member is carried out
Decryption obtains the corresponding JSON member of encryption JSON member;
Based on the corresponding JSON member of encryption JSON member, the corresponding JSON message of encryption JSON message is obtained.
In a kind of possible embodiment, from encryption JSON message, localization and expression formula is obtained, comprising:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will
The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array,
And from encryption member's array, obtain localization and expression formula.
In a kind of possible embodiment, encryption JSON member is decrypted, it is corresponding to obtain encryption JSON member
JSON member, comprising:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding
Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtains decryption and encrypts the first decipherment algorithm used when JSON member, comprising:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the
The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtains decryption and encrypts the symmetric key used when JSON member, comprising:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects
Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain
Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm
After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on
Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON report is obtained
The corresponding JSON message of text, comprising:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member
Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted
JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
On the one hand, the embodiment of the invention provides a kind of JSON message encryption devices, comprising:
Member's determination unit, for determining the JSON member to be encrypted in JSON message;
Cryptographic processing unit, for being encrypted to JSON member to be encrypted, obtain JSON member to be encrypted it is corresponding plus
Close JSON member;
Data replacement unit, it is corresponding for the JSON member to be encrypted in JSON message to be replaced with JSON member to be encrypted
Encryption JSON member, obtain the corresponding replacement JSON message of JSON message;
Bond-allocating unit, for the associated storage relationship based on JSON member to be encrypted in JSON message, for encryption
JSON member configures localization and expression formula, wherein localization and expression formula is used to position encryption JSON member;
Message generation unit is organized into replacement JSON message for that will encrypt the corresponding localization and expression formula of JSON member,
Obtain the corresponding encryption JSON message of JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, member determines single
Member is also used to:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message
Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form
JSON member regenerates JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single
Member is used for:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single
Member is used for:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message
Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at
Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
It in a kind of possible embodiment, is encrypted to JSON member to be encrypted, obtains JSON member to be encrypted
When corresponding encryption JSON member, cryptographic processing unit is used for:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted
Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, closed based on associated storage of the JSON member to be encrypted in JSON message
System, when configuring localization and expression formula for encryption JSON member, bond-allocating unit is used for:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at
Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member
Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated
Up to formula.
In a kind of possible embodiment, replacement JSON is organized into the corresponding localization and expression formula of JSON member will be encrypted
In message, when obtaining the corresponding encryption JSON message of JSON message, message generation unit is used for:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array
With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member
Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair
As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON
In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, message is generated
Unit is also used to:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds
It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key
Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption
In data object.
On the one hand, the embodiment of the invention provides a kind of JSON messages to decrypt device, comprising:
Packet parsing unit, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit obtains encryption JSON member from encryption JSON message for being based on localization and expression formula;
Decryption processing unit, for encryption JSON member to be decrypted, obtain the corresponding JSON of encryption JSON member at
Member;
Receive message unit, for it is corresponding to obtain encryption JSON message based on the corresponding JSON member of encryption JSON member
JSON message.
In a kind of possible embodiment, from encryption JSON message in, obtain localization and expression formula when, packet parsing list
Member is used for:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will
The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array,
And from encryption member's array, obtain localization and expression formula.
It in a kind of possible embodiment, is decrypted to encryption JSON member, it is corresponding to obtain encryption JSON member
JSON member when, decryption processing unit is used for:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding
Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use the first decipherment algorithm when,
Decryption processing unit is used for:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the
The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use symmetric key when, decryption
Processing unit is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects
Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain
Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm
After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on
Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON is obtained
When the corresponding JSON message of message, Receive message unit is used for:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member
Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted
JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
On the one hand, the embodiment of the invention provides a kind of JSON message processors, comprising: memory, processor and deposits
The computer program that can be run on a memory and on a processor is stored up, processor realizes that the present invention is real when executing computer program
The JSON message encryption method of example offer is provided;And/or realize JSON message decryption method provided in an embodiment of the present invention.
On the one hand, the embodiment of the invention also provides a kind of computer readable storage medium, computer readable storage mediums
It is stored with computer instruction, the message encryption side JSON provided in an embodiment of the present invention is realized when computer instruction is executed by processor
Method;And/or realize JSON message decryption method provided in an embodiment of the present invention.
The embodiment of the present invention has the beneficial effect that:
In the embodiment of the present invention, by configuring localization and expression formula in encryption for encryption JSON member, so that in decryption
Encryption JSON member can be oriented according to localization and expression formula, without configuring the information such as Data Identification to be decrypted, to realize
Automation decryption, improves decryption efficiency.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation
Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of JSON message encryption method in the embodiment of the present invention;
Fig. 2 is the specific of JSON message encryption method when being encrypted as concrete application scene in the embodiment of the present invention with segment
Flow diagram;
Fig. 3 is in the embodiment of the present invention to be encrypted as the specific of JSON message encryption method when concrete application scene in full
Flow diagram;
Fig. 4 is the flow diagram of JSON message decryption method in the embodiment of the present invention;
Fig. 5 is the idiographic flow schematic diagram of JSON message decryption method in the embodiment of the present invention;
Fig. 6 is the illustrative view of functional configuration of JSON message encryption device in the embodiment of the present invention;
Fig. 7 is the illustrative view of functional configuration that JSON message decrypts device in the embodiment of the present invention;
Fig. 8 is the hardware structural diagram of JSON message processor in the embodiment of the present invention.
Specific embodiment
In order to which the purpose of the present invention, technical solution and beneficial effect is more clearly understood, below with reference to of the invention real
The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation
Example is only a part of the embodiment of the present invention, is not whole embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work belongs to the model that the present invention protects
It encloses.
In order to solve the JSON message encipher-decipher method of prior art proposition can not treat ciphertext data automate it is fixed
The problem of position, in the embodiment of the present invention, when being encrypted to JSON message, first determine JSON to be encrypted in JSON message at
Member, encrypts the JSON member, after obtaining the corresponding encryption JSON member of the JSON member, by being somebody's turn to do in JSON message
JSON member replaces with encryption JSON member, obtains replacement JSON message, and based on the JSON member in JSON message
Associated storage relationship configures localization and expression formula for encryption JSON member, finally, by the corresponding positioning table of encryption JSON member
It is organized into replacement JSON message up to formula, obtains the corresponding encryption JSON message of JSON message;To encryption JSON message into
When row decryption, first from encryption JSON message, localization and expression formula is obtained, is based on the localization and expression formula, from encryption JSON message,
Encryption JSON member is obtained, encryption JSON member is decrypted, after obtaining the corresponding JSON member of encryption JSON member,
Based on the corresponding JSON member of encryption JSON member, the corresponding JSON message of encryption JSON message is obtained.In this way, by adding
Localization and expression formula is configured for encryption JSON member when close, so that encryption JSON can be oriented according to localization and expression formula in decryption
Member, to realize automation decryption, improves decryption efficiency without configuring the information such as Data Identification to be decrypted.
JSON message encipher-decipher method provided in an embodiment of the present invention is described in detail with reference to the accompanying drawing, certainly,
The present invention is not limited to following embodiments.
As shown in fig.1, the process of the JSON message encryption method of exemplary embodiment of the invention is as follows:
Step 101: determining the JSON member to be encrypted in JSON message.
In practical application, the cipher mode of JSON message includes but is not limited to: adding to the entire text of JSON message
Close full text cipher mode, and to the segment encryption side that at least one JSON member in JSON message is encrypted respectively
Formula.
In the specific implementation, according to cipher mode it is different, when determining the JSON member to be encrypted in JSON message
Used method of determination is also different, in practical application, it is understood that there may be but it is not limited to following two situation:
The first situation: JSON message is encrypted using full text cipher mode.
In such cases, JSON message can be first converted into the JSON member of key-value pair form, and be based on the key-value pair
The JSON member of form regenerates JSON message, so that the JSON member of the key-value pair form is determined as in JSON message
JSON member to be encrypted.Wherein, the number of JSON member to be encrypted in such cases is one.
Specifically, can first be configured when JSON message to be converted into the JSON member of key-value pair form for JSON message
It, will based on the title and the value for the title of associated storage, and after JSON message is determined as the value for being used for associated storage
JSON message is converted into the JSON member of key-value pair form.
Second situation: JSON message is encrypted using segment cipher mode.
In such cases, available encryption configuration information, and from all JSON members that JSON message includes, screening
Each JSON member corresponding with the encryption configuration information out, and each JSON member filtered out is identified as
JSON member to be encrypted in JSON message.Wherein, the number of JSON member to be encrypted in such cases is at least one.
Step 102: JSON member to be encrypted is encrypted, obtain the corresponding encryption JSON of JSON member to be encrypted at
Member.
In practical application, if the number of JSON member to be encrypted is one, which can be carried out
Encryption, to obtain the corresponding encryption JSON member of this JSON member to be encrypted;If the number of JSON member to be encrypted is
At least one at least one JSON member to be encrypted can then encrypt this respectively, to obtain this, at least one is to be added
The close corresponding encryption JSON member of JSON member.
In the specific implementation, when being encrypted to JSON member to be encrypted, value that can first to JSON member to be encrypted
It is encrypted, corresponding secret value is obtained, then the value of JSON member to be encrypted is replaced with into the secret value, to obtain to be encrypted
The corresponding encryption JSON member of JSON member.
Step 103: the JSON member to be encrypted in JSON message is replaced with into the corresponding encryption of JSON member to be encrypted
JSON member obtains the corresponding replacement JSON message of JSON message.
It, can be to be encrypted by this in JSON message if the number of JSON member to be encrypted is one in practical application
JSON member replaces with the corresponding encryption JSON member of the JSON member to be encrypted, to obtain the corresponding replacement of JSON message
JSON message;It, can at least one be to be added by this in JSON message if the number of JSON member to be encrypted is at least one
Close JSON member replaces with corresponding encryption JSON member respectively, to obtain the corresponding replacement JSON message of JSON message.
Step 104: based on associated storage relationship of the JSON member to be encrypted in JSON message, matching for encryption JSON member
Set localization and expression formula, wherein localization and expression formula is used to position encryption JSON member.
In practical application, if the number of JSON member to be encrypted is one, it can be existed based on the JSON member to be encrypted
Associated storage relationship in JSON message configures localization and expression formula for the corresponding encryption JSON member of the JSON member to be encrypted,
To obtain the corresponding localization and expression formula for encrypting JSON member of this JSON member to be encrypted;If JSON member's to be encrypted
Number is at least one, then can be based at least one JSON member to be encrypted corresponding association in JSON message and deposit
Storage relationship, for the corresponding encryption JSON member configuration localization and expression formula of corresponding JSON member to be encrypted, thus obtain this at least one
The localization and expression formula of a corresponding encryption JSON member of JSON member to be encrypted.
In the specific implementation, in the associated storage relationship based on JSON member to be encrypted in JSON message, for encryption
When JSON member configures localization and expression formula, it can use but be not limited to following manner:
Firstly, it is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted is corresponding to go through
Through member set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON
The ordered set of member.
Then, it is corresponding to generate encryption JSON member for the title based on each JSON member for including after member set
Localization and expression formula.
Step 105: the corresponding localization and expression formula of encryption JSON member being organized into replacement JSON message, JSON report is obtained
The corresponding encryption JSON message of text.
In the specific implementation, when executing step 105, it can use but be not limited to following manner:
Firstly, generating encryption member's array based on the corresponding localization and expression formula of encryption JSON member.
In practical application, if the number of JSON member to be encrypted be one, can based on a JSON to be encrypted at
The localization and expression formula of the corresponding encryption JSON member of member, generates encryption member's array;If the number of JSON member to be encrypted is extremely
Few one, then can based on this at least one corresponding encryption JSON member of JSON member to be encrypted localization and expression formula,
Generate encryption member's array.
Then, the first Encryption Algorithm title used based on encryption member's array and when encrypting JSON member to be encrypted, it is raw
At encryption member object, and based on encryption member object, encrypted data objects are generated.
In practical application, if determining pair for needing will to use when encrypting JSON member to be encrypted according to concrete application scene
Claim key to be sent to receiving end, then receiving end can also determined when generating encrypted data objects based on encryption member object
After corresponding public key, using the public key, the symmetric key used when to encryption JSON member is encrypted, and it is close to obtain cryptographic symmetrical
Key, and the second encryption that based on the encrypted symmetric key, the corresponding private key information of the public key and encrypted symmetric key when uses is calculated
Legitimate name generates the corresponding cryptographic key containers object of the public key, and is based on cryptographic key containers object, generates cryptographic key containers object set
It closes, and cryptographic key containers object set is organized into encrypted data objects.
It is tellable to be, it, can be corresponding close based on a public key if the corresponding public key number in receiving end is one
Key container object generates cryptographic key containers object set, at this point, including a cryptographic key containers pair in the cryptographic key containers object set
As;If the corresponding public key number in receiving end be it is multiple, the corresponding cryptographic key containers object of multiple public key can be based on, it is raw
At cryptographic key containers object set, at this point, including multiple cryptographic key containers objects in the cryptographic key containers object set.
Secondly, being configured to the title of associated storage based on default unique identification for encrypted data objects, and number will be encrypted
It is determined as the value for associated storage according to object.
Finally, encrypted data objects are converted into JSON member, and the JSON member is worked out based on the title and the value
Into the root node of replacement JSON message, encryption JSON message is obtained.
Concrete application scene is encrypted as with segment below, to JSON message encryption method provided in an embodiment of the present invention make into
One step is described in detail.As shown in fig.2, the detailed process of the JSON message encryption method of exemplary embodiment of the invention is such as
Under:
Step 201: being instructed according to encryption configuration, determine JSON message and the corresponding encryption of JSON message to be encrypted
Configuration information.
Step 202: according to the encryption scheme information in the encryption configuration information, determining that carrying out segment to the JSON message adds
When close, from all JSON members that the JSON message includes, filter out and N number of member identities' phase in the encryption configuration information
Corresponding N number of JSON member is as the JSON member to be encrypted in the JSON message.Wherein, N is no less than 1 positive integer.
Step 203: determining the first Encryption Algorithm used when encrypting JSON member to be encrypted, and it is to be encrypted to generate encryption
The symmetric key used when JSON member.
Step 204: from N number of JSON member to be encrypted, it is to be encrypted as i-th to choose a JSON member to be encrypted
JSON member.
Step 205: it is based on the first Encryption Algorithm and symmetric key, the value of i-th of JSON member to be encrypted is encrypted,
Secret value is obtained, and the value of i-th of JSON member to be encrypted is replaced with into secret value, obtains i-th of JS ON member couple to be encrypted
The encryption JSON member answered.
Step 206: i-th of JSON member to be encrypted in the JSON message is replaced with into i-th of JSON member to be encrypted
Corresponding encryption JSON member.
Step 207: based on going through among the nodes for root node and the i-th JSON member to be encrypted in the JSON message
It is corresponding after member set to generate i-th of JSON member to be encrypted by JSON member on all nodes of warp.
Step 208: based on the corresponding each JSON member for including after member set of i-th of JSON member to be encrypted
Title is that i-th of encryption JSON member configures localization and expression formula.
Step 209: judging whether i+1 is more than or equal to N, if so, thening follow the steps 210;If it is not, then return step 204.
Step 210: determining and obtain replacement JSON message and N number of corresponding localization and expression formula of encryption JSON member, base
In N number of corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array and the
One Encryption Algorithm title generates encryption member object.
Step 211: according to the cipher key configuration information in encryption configuration information, judging whether that N number of JSON to be encrypted will be encrypted
The symmetric key used when member is organized into replacement JSON message, if so, thening follow the steps 213;If it is not, thening follow the steps
212。
Step 212: based on encryption member object, generating encrypted data objects, and continue to execute step 219.
Step 213: determining the corresponding M public key in receiving end.Wherein, M is no less than 1 positive integer.
Step 214: from M public key, choosing a public key as j-th of public key, and based on j-th of public key and encryption pair
Claim the second Encryption Algorithm used when key, symmetric key is encrypted, encrypted symmetric key is obtained.
Step 215: being used when based on encrypted symmetric key, the corresponding private key information of j-th of public key and encrypted symmetric key
The second Encryption Algorithm title, generate cryptographic key containers object.
Step 216: judging whether j+1 is more than or equal to M, if so, thening follow the steps 217;If it is not, then return step 214.
Step 217: determining and obtain M cryptographic key containers object, and be based on M cryptographic key containers object, generate cryptographic key containers pair
As set.
Step 218: based on encryption member object and cryptographic key containers object set, generating encrypted data objects, and continue to hold
Row step 219.
Step 219: based on default unique identification, the title of associated storage is configured to for encrypted data objects, and will be added
Ciphertext data object is determined as the value for associated storage, based on the title and the value, by encrypted data objects be converted into JSON at
Member.
Step 220: the JSON member being organized into the root node of replacement JSON message, obtain encryption JSON message.
Below to be encrypted as concrete application scene in full, to JSON message encryption method provided in an embodiment of the present invention make into
One step is described in detail.As shown in fig.3, the detailed process of the JSON message encryption method of exemplary embodiment of the invention is such as
Under:
Step 301: being instructed according to encryption configuration, determine JSON message and the corresponding encryption of JSON message to be encrypted
Configuration information.
Step 302: according to the encryption scheme information in the encryption configuration information, determining that carrying out full text to the JSON message adds
When close, the title of associated storage is configured to for the JSON message.
Step 303: the JSON message being determined as to be used for the value of associated storage, and based on the title and the value, by JSON
Message is converted into the JSON member of key-value pair form.
Step 304: the JSON member based on the key-value pair form regenerates JSON message, and by the key-value pair form
JSON member be determined as the JSON member to be encrypted in the JSON message.
Step 305: determining the first Encryption Algorithm for using when encrypting the JSON member to be encrypted, and generate encryption this is to be added
The symmetric key used when close JSON member.
Step 306: being based on the first Encryption Algorithm and symmetric key, the value of the JSON member to be encrypted is encrypted, is obtained
Secret value is replaced with to secret value, and by the value of the JSON member to be encrypted, obtains the corresponding encryption of the JS ON member to be encrypted
JSON member.
Step 307: it is corresponding that the JSON member to be encrypted in the JSON message being replaced with into the JSON member to be encrypted
JSON member is encrypted, replacement JSON message is obtained.
Step 308: the title based on the JSON member to be encrypted, for the corresponding encryption JSON of the JSON member to be encrypted at
Member's configuration localization and expression formula.
Step 309: being based on the corresponding localization and expression formula of encryption JSON member, generate encryption member's array, and being based on should
Member's array and the first Encryption Algorithm title are encrypted, encryption member object is generated.
Step 310: according to the cipher key configuration information in encryption configuration information, judge whether will to encrypt the JSON to be encrypted at
The symmetric key used when member is organized into replacement JSON message, if so, thening follow the steps 312;If it is not, thening follow the steps 311.
Step 311: based on encryption member object, generating encrypted data objects, and continue to execute step 318.
Step 312: determining the corresponding M public key in receiving end.Wherein, M is no less than 1 positive integer.
Step 313: from M public key, choosing a public key as j-th of public key, and based on j-th of public key and encryption pair
Claim the second Encryption Algorithm used when key, symmetric key is encrypted, encrypted symmetric key is obtained.
Step 314: being used when based on encrypted symmetric key, the corresponding private key information of j-th of public key and encrypted symmetric key
The second Encryption Algorithm title, generate cryptographic key containers object.
Step 315: judging whether j+1 is more than or equal to M, if so, thening follow the steps 316;If it is not, then return step 313.
Step 316: determining and obtain M cryptographic key containers object, and be based on M cryptographic key containers object, generate cryptographic key containers pair
As set.
Step 317: based on encryption member object and cryptographic key containers object set, generating encrypted data objects, and continue to hold
Row step 318.
Step 318: based on default unique identification, the title of associated storage is configured to for encrypted data objects, and will be added
Ciphertext data object is determined as the value for associated storage, and based on the title and the value, encrypted data objects are converted into
JSON member.
Step 319: the JSON member being organized into the root node of replacement JSON message, obtain encryption JSON message.
Based on the above embodiment, the embodiment of the invention also provides a kind of JSON message decryption methods, as shown in fig.4,
The process of the JSON message decryption method of exemplary embodiment of the invention is as follows:
Step 401: from encryption JSON message, obtaining localization and expression formula.
Specifically, can use when executing step 401 but be not limited to following manner:
Firstly, the JSON member of corresponding entitled default unique identification is obtained from the root node of encryption JSON message,
And the value of the JSON member is determined as encrypted data objects.
Then, from the encrypted data objects, encryption member object is obtained.
Finally, obtaining encryption member's array from encryption member object, and from encryption member's array, obtain localization and expression
Formula.
In practical application, however, it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then, can from encryption member's array
To obtain a localization and expression formula;If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then from encryption member's array,
At least one localization and expression formula can be obtained.
Step 402: being based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, and to encryption JSON
Member is decrypted, and obtains the corresponding JSON member of encryption JSON member.
In practical application, if obtaining a localization and expression formula, it can be based on the localization and expression formula, from encryption JSON message
In, obtain an encryption JSON member;If obtaining multiple localization and expression formulas, it can be based on multiple localization and expression formula, from adding
In close JSON message, multiple encryption JSON members are obtained.Specifically, being decrypted to each encryption JSON member of acquisition
When, it can use but be not limited to following manner:
The first decipherment algorithm and symmetric key used when firstly, obtaining decryption encryption JSON member.
Wherein, when obtaining the first decipherment algorithm, the first Encryption Algorithm title can be obtained from encryption member object,
And the associated decipherment algorithm of the first Encryption Algorithm corresponding with the first Encryption Algorithm title is determined as the first decipherment algorithm.
Wherein, when obtaining symmetric key, it is understood that there may be but it is not limited to following two situation:
The first situation: cryptographic key containers object set is not included in encrypted data objects.It in such cases, can be according to pre-
About key schedule generates symmetric key.
Second situation: including cryptographic key containers object set in encrypted data objects.In such cases, can hold from key
In device object set, cryptographic key containers object is obtained, and parse to cryptographic key containers object, obtains encrypted symmetric key, private key
After information and the second Encryption Algorithm title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine second
Decipherment algorithm, and it is based on private key and the second decipherment algorithm, encrypted symmetric key is decrypted, symmetric key is obtained.
Then, it is based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained
Corresponding value.
Finally, the secret value of encryption JSON member is replaced with the value, JSON member is obtained.
Step 403: based on the corresponding JSON member of encryption JSON member, obtaining the corresponding JSON report of encryption JSON message
Text.
In practical application, however, it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then will can directly encrypt JSON
The value of the corresponding JSON member of member is determined as encrypting the corresponding JSON message of JSON message;If it is determined that the encryption that transmitting terminal uses
Mode is segment encryption, then the encryption JSON member encrypted in JSON message can be replaced with JSON member, to be added
The corresponding JSON message of close JSON message.
The JSON message decryption method of exemplary embodiment of the invention is described in further detail below.Refering to Fig. 5
Shown, the detailed process of the JSON message decryption method of exemplary embodiment of the invention is as follows:
Step 501: from the root node of encryption JSON message, obtain the JSON of corresponding entitled default unique identification at
Member, and the value of the JSON member is determined as encrypted data objects.
Step 502: judging whether comprising cryptographic key containers object set in the encrypted data objects, if so, thening follow the steps
504;If it is not, thening follow the steps 503.
Step 503: according to reservation key schedule, generating symmetric key, and continue to execute step 510.
Step 504: from cryptographic key containers object set, obtaining M cryptographic key containers object.Wherein, M is being no less than 1 just
Integer.
Step 505: from M cryptographic key containers object, choosing a cryptographic key containers object as j-th of cryptographic key containers pair
As, and j-th of cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm title.
Step 506: judging whether obtain private key from private key information, if so, thening follow the steps 509;If it is not, then executing step
Rapid 507.
Step 507: judging whether j+1 is more than or equal to M, if so, thening follow the steps 508;If it is not, then return step 505.
Step 508: determining that the decryption to encryption JSON message fails, and terminate to encrypt the decrypting process of JSON message.
Step 509: the associated decipherment algorithm of the second Encryption Algorithm corresponding with the second Encryption Algorithm title is determined as
Second decipherment algorithm, and it is based on the second decipherment algorithm and private key, encrypted symmetric key is decrypted, symmetric key is obtained, and
Continue to execute step 510.
Step 510: from encrypted data objects, obtaining encryption member object, and obtain encryption from encryption member object
Member's array and the first Encryption Algorithm title.
Step 511: the associated decipherment algorithm of the first Encryption Algorithm corresponding with the first Encryption Algorithm title is determined as
First decipherment algorithm, and from encryption member's array, obtain P localization and expression formula.Wherein, P is no less than 1 positive integer.
Step 512: from P localization and expression formula, choosing a localization and expression formula as k-th of localization and expression formula, and base
K-th of encryption JSON member is obtained from encryption JSON message in k-th of localization and expression formula.
Step 513: being based on the first decipherment algorithm and symmetric key, the secret value for encrypting JSON member to k-th solves
It is close, it is worth accordingly, and the secret value that k-th encrypts JSON member is replaced with into the value, obtains k-th of encryption JSON member
Corresponding JSON member.
Step 514: judging whether k+1 is more than or equal to P, if so, thening follow the steps 515;If it is not, then return step 512.
Step 515: determine and obtain the P corresponding JSON member of encryption JSON member, and be based on P encryption JSON at
The corresponding JSON member of member obtains the corresponding JSON message of encryption JSON message.
Based on the above embodiment, the embodiment of the invention provides a kind of JSON message encryption devices, as shown in fig.6, this
The JSON message encryption device 600 of invention illustrative embodiments includes at least:
Member's determination unit 601, for determining the JSON member to be encrypted in JSON message;
It is corresponding to obtain JSON member to be encrypted for encrypting to JSON member to be encrypted for cryptographic processing unit 602
Encrypt JSON member;
Data replacement unit 603, for the JSON member to be encrypted in JSON message to be replaced with JSON member to be encrypted
Corresponding encryption JSON member obtains the corresponding replacement JSON message of JSON message;
Bond-allocating unit 604, for the associated storage relationship based on JSON member to be encrypted in JSON message, to add
Close JSON member configures localization and expression formula, wherein localization and expression formula is used to position encryption JSON member;
Message generation unit 605 is organized into replacement JSON message for that will encrypt the corresponding localization and expression formula of JSON member
In, obtain the corresponding encryption JSON message of JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, member determines single
Member 601 is also used to:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message
Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form
JSON member regenerates JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single
Member 601 is used for:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single
Member 601 is used for:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message
Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at
Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
It in a kind of possible embodiment, is encrypted to JSON member to be encrypted, obtains JSON member to be encrypted
When corresponding encryption JSON member, cryptographic processing unit 602 is used for:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted
Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, closed based on associated storage of the JSON member to be encrypted in JSON message
System, when configuring localization and expression formula for encryption JSON member, bond-allocating unit 604 is used for:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at
Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member
Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated
Up to formula.
In a kind of possible embodiment, replacement JSON is organized into the corresponding localization and expression formula of JSON member will be encrypted
In message, when obtaining the corresponding encryption JSON message of JSON message, message generation unit 605 is used for:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array
With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member
Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair
As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON
In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, message is generated
Unit 605 is also used to:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds
It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key
Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption
In data object.
In addition, the embodiment of the invention also provides a kind of JSON messages to decrypt device, as shown in fig.7, example of the present invention
Property embodiment JSON message decryption device 700 include at least:
Packet parsing unit 701, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit 702 obtains encryption JSON member from encryption JSON message for being based on localization and expression formula;
Decryption processing unit 703 obtains the corresponding JSON of encryption JSON member for encryption JSON member to be decrypted
Member;
Receive message unit 704, for obtaining encryption JSON message pair based on the corresponding JSON member of encryption JSON member
The JSON message answered.
In a kind of possible embodiment, from encryption JSON message in, obtain localization and expression formula when, packet parsing list
Member 701 is used for:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will
The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array,
And from encryption member's array, obtain localization and expression formula.
It in a kind of possible embodiment, is decrypted to encryption JSON member, it is corresponding to obtain encryption JSON member
JSON member when, decryption processing unit 703 is used for:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding
Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use the first decipherment algorithm when,
Decryption processing unit 703 is used for:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the
The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use symmetric key when, decryption
Processing unit 703 is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects
Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain
Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm
After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on
Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON is obtained
When the corresponding JSON message of message, Receive message unit 704 is used for:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member
Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted
JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
It should be noted that since JSON message encryption device 600 provided in an embodiment of the present invention and JSON message are decrypted
The principle that device 700 solves technical problem is similar to JSON message encryption method provided in an embodiment of the present invention and decryption method,
Therefore, the implementation of JSON encryption device 600 and JSON message decryption device 700 provided in an embodiment of the present invention may refer to this hair
The implementation of JSON message encryption method and decryption method that bright embodiment provides, overlaps will not be repeated.
JSON message encryption method, decryption method and the relevant apparatus for describing exemplary embodiment of the invention it
Afterwards, next, simply being introduced JSON message processor provided in an embodiment of the present invention.
As shown in fig.8, JSON message processor 800 provided in an embodiment of the present invention includes at least: processor 81 is deposited
Reservoir 82 and it is stored in the computer program that can be run on memory 82 and on processor 81, wherein processor 81 executes meter
JSON message encryption method provided in an embodiment of the present invention is realized when calculation machine program;And/or it realizes provided in an embodiment of the present invention
JSON message decryption method.
It should be noted that JSON message processor 800 shown in Fig. 8 is only an example, it should not be to the present invention
The function and use scope of embodiment bring any restrictions.
JSON message processor 800 provided in an embodiment of the present invention can also include connecting (including the processing of different components
Device 81 and memory 82) bus 83.Wherein, bus 83 indicates one of a few class bus structures or a variety of, including memory
Bus, peripheral bus, local bus etc..
Memory 82 may include the readable medium of form of volatile memory, such as random access memory (Random
Access Memory, RAM) 821 and/or cache memory 822, it can further include read-only memory (Read
Only Memory, ROM) 823.
Memory 82 can also include the program means 824 with one group of (at least one) program module 824, program module
824 include but is not limited to: operational subsystems, one or more application program, other program modules and program data, these
It may include the realization of network environment in each of example or certain combination.
JSON message processor 800 can also be logical with one or more external equipments 84 (such as keyboard, remote controler etc.)
Letter can also enable a user to equipment interact with JSON message processor 800 with one or more and communicate (such as hand
Mechanical, electrical brain etc.), and/or, and make JSON message processor 800 and one or more of the other JSON message processor 800
Any equipment (such as the router, modem etc.) communication communicated.This communication can pass through input/output
(Input/Output, I/O) interface 85 carries out.Also, JSON message processor 800 can also by network adapter 86 with
One or more network (such as local area network (Local Area Network, LAN), wide area network (Wide Area Network,
WAN) and/or public network, for example, internet) communication.As shown in figure 8, network adapter 86 passes through bus 83 and JSON message
Other modules of processing equipment 800 communicate.It will be appreciated that though being not shown in Fig. 8, JSON message processor can be combined
800 use other hardware and/or software module, including but not limited to: microcode, device driver, redundant processor, external magnetic
Dish driving array, disk array (Redundant Arrays of Independent Disks, RAID) subsystem, tape drive
Dynamic device and data backup storage subsystem etc..
Computer readable storage medium provided in an embodiment of the present invention is introduced below.The embodiment of the invention provides
A kind of computer readable storage medium, the computer-readable recording medium storage have computer instruction, and computer instruction is processed
Device realizes JSON message encryption method provided in an embodiment of the present invention when executing;And/or it realizes provided in an embodiment of the present invention
The decryption method of JSON message.Specifically, which can be built in JSON message processor 800, in this way,
JSON message processor 800 can realize that JSON provided in an embodiment of the present invention is reported by executing built-in executable program
Literary encryption method;And/or realize the decryption method of JSON message provided in an embodiment of the present invention.
In addition, JSON message encipher-decipher method provided in an embodiment of the present invention is also implemented as a kind of program product, it should
Program product includes program code, when the program product can be run on JSON message processor 800, the program code
For making JSON message processor 800 execute JSON message encryption method provided in an embodiment of the present invention;And/or realize this
The decryption method for the JSON message that inventive embodiments provide.
Program product provided in an embodiment of the present invention can be using any combination of one or more readable mediums, wherein
Readable medium can be readable signal medium or readable storage medium storing program for executing, and readable storage medium storing program for executing can be but it is electric to be not limited to,
Magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination is specifically, readable to deposit
The more specific example (non exhaustive list) of storage media includes: electrical connection with one or more conducting wires, portable disc, hard
Disk, RAM, ROM, erasable programmable read only memory (Erasable Programmable Read Only Memory,
EPROM), optical fiber, portable compact disc read only memory (Compact Disc Read-Only Memory, CD-ROM), light are deposited
Memory device, magnetic memory device or above-mentioned any appropriate combination.
Program product provided in an embodiment of the present invention can also be set using CD-ROM and including program code in calculating
Standby upper operation.However, program product provided in an embodiment of the present invention is without being limited thereto, and in embodiments of the present invention, readable storage medium
Matter can be any tangible medium for including or store program, which, which can be commanded execution system, device or device, makes
With or it is in connection.
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke
It point is only exemplary not enforceable.In fact, embodiment according to the present invention, it is above-described two or more
The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can
It is to be embodied by multiple units with further division.
In addition, although describing the operation of the method for the present invention in the accompanying drawings with particular order, this do not require that or
Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired
As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one
Step is decomposed into execution of multiple steps.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (30)
1. a kind of literal translation formula scripting language object numbered musical notation JSON message encryption method characterized by comprising
Determine the JSON member to be encrypted in JSON message, and the JSON member to be encrypted encrypted, obtain it is described to
Encrypt the corresponding encryption JSON member of JSON member;
The JSON member to be encrypted in the JSON message is replaced with into the corresponding encryption of the JSON member to be encrypted
JSON member obtains the corresponding replacement JSON message of the JSON message;
Associated storage relationship based on the JSON member to be encrypted in the JSON message is matched for the encryption JSON member
Set localization and expression formula, wherein the localization and expression formula is for positioning the encryption JSON member;
The corresponding localization and expression formula of the encryption JSON member is organized into the replacement JSON message, the JSON report is obtained
The corresponding encryption JSON message of text.
2. JSON message encryption method as described in claim 1, which is characterized in that determine the JSON to be encrypted in JSON message
Before member, further includes:
If it is determined that encrypting the JSON message using full text cipher mode, then it is configured to be associated with for the JSON message
The title of storage, and be determined as the JSON message to be used for the value of associated storage;
Based on the title and described value, the JSON message is converted into the JSON member of key-value pair form, and based on described
The JSON member of key-value pair form regenerates JSON message.
3. JSON message encryption method as claimed in claim 2, which is characterized in that determine the JSON to be encrypted in JSON message
Member, comprising:
The JSON member to be encrypted JSON member of the key-value pair form being determined as in the JSON message.
4. JSON message encryption method as described in claim 1, which is characterized in that determine the JSON to be encrypted in JSON message
Member, comprising:
The JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration of the JSON message
Information;
From all JSON members that the JSON message includes, filter out corresponding with the encryption configuration information each
JSON member, and each JSON member filtered out is identified as the JSON member to be encrypted in the JSON message.
5. JSON message encryption method as described in claim 1, which is characterized in that add to the JSON member to be encrypted
It is close, obtain the corresponding encryption JSON member of the JSON member to be encrypted, comprising:
The value of the JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the JSON member to be encrypted
Value replace with the secret value, obtain the encryption JSON member.
6. JSON message encryption method as described in claim 1, which is characterized in that based on the JSON member to be encrypted in institute
The associated storage relationship in JSON message is stated, configures localization and expression formula for the encryption JSON member, comprising:
It is corresponding after member set to obtain the JSON member to be encrypted, wherein the JSON member to be encrypted is corresponding to go through
Through member set be node where from the root node of the JSON message to the JSON member to be encrypted after each node
On JSON member ordered set;
Based on the title of each JSON member for including after member set, it is corresponding fixed to generate the encryption JSON member
Position expression formula.
7. JSON message encryption method as described in any one in claim 1-5, which is characterized in that by the encryption JSON member
Corresponding localization and expression formula is organized into the replacement JSON message, obtains the corresponding encryption JSON message of the JSON message,
Include:
Based on the corresponding localization and expression formula of the encryption JSON member, encryption member's array is generated, and is based on the encryption member
Array generates encryption member object with the first Encryption Algorithm title used when encrypting the JSON member to be encrypted, and is based on
The encryption member object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for the encrypted data objects, and by the encryption number
It is determined as the value for associated storage according to object;
Based on the title and described value, the encrypted data objects are converted into JSON member, and the JSON member is compiled
In the root node for making the replacement JSON message, the encryption JSON message is obtained.
8. JSON message encryption method as claimed in claim 7, which is characterized in that be based on the encryption member object, generate
When encrypted data objects, further includes:
Determine the corresponding public key in receiving end, and utilize the public key, to the symmetric key used when encrypting the JSON member into
Row encryption, obtains encrypted symmetric key;
Second used based on the encrypted symmetric key, the corresponding private key information of the public key and when encrypting the symmetric key
Encryption Algorithm title generates cryptographic key containers object;
Based on the cryptographic key containers object, cryptographic key containers object set is generated, and the cryptographic key containers object set is organized into
In the encrypted data objects.
9. a kind of literal translation formula scripting language object numbered musical notation JSON message decryption method characterized by comprising
From encryption JSON message, localization and expression formula is obtained;
Based on the localization and expression formula, encryption JSON member is obtained from the encryption JSON message, and to the encryption JSON
Member is decrypted, and obtains the corresponding JSON member of the encryption JSON member;
Based on the corresponding JSON member of the encryption JSON member, the corresponding JSON message of the encryption JSON message is obtained.
10. JSON message decryption method as claimed in claim 9, which is characterized in that from encryption JSON message, obtain positioning
Expression formula, comprising:
From the root node of the encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will
The value of the JSON member is determined as encrypted data objects;
From the encrypted data objects, encryption member object is obtained, and from the encryption member object, obtains encryption member
Array, and from encryption member's array, obtain the localization and expression formula.
11. JSON message decryption method as claimed in claim 10, which is characterized in that solved to the encryption JSON member
It is close, obtain the corresponding JSON member of the encryption JSON member, comprising:
Obtain the first decipherment algorithm and symmetric key used when decryption is described to encrypt JSON member;
Based on first decipherment algorithm and the symmetric key, the secret value of the encryption JSON member is decrypted, is obtained
Described value is replaced with to corresponding value, and by the secret value of the encryption JSON member, obtains the JSON member.
12. JSON message decryption method as claimed in claim 11, which is characterized in that obtain and decrypt the encryption JSON member
When the first decipherment algorithm for using, comprising:
From the encryption member object, the first Encryption Algorithm title is obtained, and will be corresponding with the first Encryption Algorithm title
The associated decipherment algorithm of the first Encryption Algorithm be determined as first decipherment algorithm.
13. JSON message decryption method as claimed in claim 11, which is characterized in that obtain and decrypt the encryption JSON member
When the symmetric key that uses, comprising:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in the encrypted data objects
The raw symmetric key;
If it is determined that include cryptographic key containers object set in the encrypted data objects, then from the cryptographic key containers object set,
Cryptographic key containers object is obtained, and the cryptographic key containers object is parsed, obtains encrypted symmetric key, private key information and second
After Encryption Algorithm title, private key is obtained from the private key information, and be based on the second Encryption Algorithm title, determine the second solution
Close algorithm, and it is based on the private key and second decipherment algorithm, the encrypted symmetric key is decrypted, is obtained described
Symmetric key.
14. such as the described in any item JSON message decryption methods of claim 9-13, which is characterized in that be based on the encryption JSON
The corresponding JSON member of member obtains the corresponding JSON message of the encryption JSON message, comprising:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then by the corresponding JSON member's of the encryption JSON member
Value is determined as the corresponding JSON message of the encryption JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then by the encryption JSON in the encryption JSON message
Member replaces with the JSON member, obtains the corresponding JSON message of the encryption JSON message.
15. a kind of literal translation formula scripting language object numbered musical notation JSON message encryption device characterized by comprising
Member's determination unit, for determining the JSON member to be encrypted in JSON message;
It is corresponding to obtain the JSON member to be encrypted for encrypting to the JSON member to be encrypted for cryptographic processing unit
Encryption JSON member;
Data replacement unit, for the JSON member to be encrypted in the JSON message to be replaced with the JSON to be encrypted
The corresponding encryption JSON member of member obtains the corresponding replacement JSON message of the JSON message;
Bond-allocating unit is for the associated storage relationship based on the JSON member to be encrypted in the JSON message
The encryption JSON member configures localization and expression formula, wherein the localization and expression formula is used to carry out the encryption JSON member
Positioning;
Message generation unit, for the corresponding localization and expression formula of the encryption JSON member to be organized into the replacement JSON message
In, obtain the corresponding encryption JSON message of the JSON message.
16. JSON message encryption device as claimed in claim 15, which is characterized in that determine to be encrypted in JSON message
Before JSON member, member's determination unit is also used to:
If it is determined that encrypting the JSON message using full text cipher mode, then it is configured to be associated with for the JSON message
The title of storage, and be determined as the JSON message to be used for the value of associated storage;
Based on the title and described value, the JSON message is converted into the JSON member of key-value pair form, and based on described
The JSON member of key-value pair form regenerates JSON message.
17. JSON message encryption device as claimed in claim 16, which is characterized in that be encrypted in JSON message determining
When JSON member, member's determination unit is used for:
The JSON member to be encrypted JSON member of the key-value pair form being determined as in the JSON message.
18. JSON message encryption device as claimed in claim 15, which is characterized in that be encrypted in JSON message determining
When JSON member, member's determination unit is used for:
The JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration of the JSON message
Information;
From all JSON members that the JSON message includes, filter out corresponding with the encryption configuration information each
JSON member, and by each JSON member filtered out be identified as the JSON to be encrypted in the JSON message at
Member.
19. JSON message encryption device as claimed in claim 15, which is characterized in that the JSON member to be encrypted into
Row encryption, when obtaining the corresponding encryption JSON member of the JSON member to be encrypted, the cryptographic processing unit is used for:
The value of the JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the JSON member to be encrypted
Value replace with the secret value, obtain the encryption JSON member.
20. JSON message encryption device as claimed in claim 15, which is characterized in that be based on the JSON member to be encrypted
Associated storage relationship in the JSON message, when configuring localization and expression formula for the encryption JSON member, the positioning is matched
Unit is set to be used for:
It is corresponding after member set to obtain the JSON member to be encrypted, wherein the JSON member to be encrypted is corresponding to go through
Through member set be node where from the root node of the JSON message to the JSON member to be encrypted after each node
On JSON member ordered set;
Based on the title of each JSON member for including after member set, it is corresponding fixed to generate the encryption JSON member
Position expression formula.
21. such as the described in any item JSON message encryption devices of claim 15-20, which is characterized in that by the encryption
The corresponding localization and expression formula of JSON member is organized into the replacement JSON message, obtains the corresponding encryption of the JSON message
When JSON message, the message generation unit is used for:
Based on the corresponding localization and expression formula of the encryption JSON member, encryption member's array is generated, and is based on the encryption member
Array generates encryption member object with the first Encryption Algorithm title used when encrypting the JSON member to be encrypted, and is based on
The encryption member object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for the encrypted data objects, and by the encryption number
It is determined as the value for associated storage according to object;
Based on the title and described value, the encrypted data objects are converted into JSON member, and the JSON member is compiled
In the root node for making the replacement JSON message, the encryption JSON message is obtained.
22. JSON message encryption device as claimed in claim 21, which is characterized in that it is being based on the encryption member object,
When generating encrypted data objects, the message generation unit is also used to:
Determine the corresponding public key in receiving end, and utilize the public key, to the symmetric key used when encrypting the JSON member into
Row encryption, obtains encrypted symmetric key;
Second used based on the encrypted symmetric key, the corresponding private key information of the public key and when encrypting the symmetric key
Encryption Algorithm title generates cryptographic key containers object;
Based on the cryptographic key containers object, cryptographic key containers object set is generated, and the cryptographic key containers object set is organized into
In the encrypted data objects.
23. a kind of literal translation formula scripting language object numbered musical notation JSON message decrypts device characterized by comprising
Packet parsing unit, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit obtains encryption JSON member for being based on the localization and expression formula from the encryption JSON message;
It is corresponding to obtain the encryption JSON member for the encryption JSON member to be decrypted for decryption processing unit
JSON member;
Receive message unit obtains the encryption JSON message for being based on the corresponding JSON member of the encryption JSON member
Corresponding JSON message.
24. JSON message as claimed in claim 23 decrypts device, which is characterized in that from encryption JSON message, obtain
When localization and expression formula, the packet parsing unit is used for:
From the root node of the encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will
The value of the JSON member is determined as encrypted data objects;
Encryption member object is obtained from the encrypted data objects, and from the encryption member object, obtains encryption member
Array, and from encryption member's array, obtain the localization and expression formula.
25. JSON message as claimed in claim 24 decrypts device, which is characterized in that carried out to the encryption JSON member
Decryption, when obtaining the corresponding JSON member of the encryption JSON member, the decryption processing unit is used for:
Obtain the first decipherment algorithm and symmetric key used when decryption is described to encrypt JSON member;
Based on first decipherment algorithm and the symmetric key, the secret value of the encryption JSON member is decrypted, is obtained
Described value is replaced with to corresponding value, and by the secret value of the encryption JSON member, obtains the JSON member.
26. JSON message as claimed in claim 25 decrypts device, which is characterized in that obtain decrypt the encryption JSON at
When the first decipherment algorithm used when member, the decryption processing unit is used for:
From the encryption member object, the first Encryption Algorithm title is obtained, and will be corresponding with the first Encryption Algorithm title
The associated decipherment algorithm of the first Encryption Algorithm be determined as first decipherment algorithm.
27. JSON message as claimed in claim 25 decrypts device, which is characterized in that obtain decrypt the encryption JSON at
When the symmetric key used when member, the decryption processing unit is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in the encrypted data objects
The raw symmetric key;
If it is determined that include cryptographic key containers object set in the encrypted data objects, then from the cryptographic key containers object set,
Cryptographic key containers object is obtained, and the cryptographic key containers object is parsed, obtains encrypted symmetric key, private key information and second
After Encryption Algorithm title, private key is obtained from the private key information, and be based on the second Encryption Algorithm title, determine the second solution
Close algorithm, and it is based on the private key and second decipherment algorithm, the encrypted symmetric key is decrypted, is obtained described
Symmetric key.
28. as the described in any item JSON messages of claim 23-27 decrypt device, which is characterized in that be based on the encryption
The corresponding JSON member of JSON member, when obtaining the corresponding JSON message of the encryption JSON message, the Receive message unit
For:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then by the corresponding JSON member's of the encryption JSON member
Value is determined as the corresponding JSON message of the encryption JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then by the encryption JSON in the encryption JSON message
Member replaces with the JSON member, obtains the corresponding JSON message of the encryption JSON message.
29. a kind of literal translation formula scripting language object numbered musical notation JSON message processor characterized by comprising memory, processing
Device and it is stored in the computer program that can be run on the memory and on the processor, which is characterized in that the processing
Device realizes such as the described in any item JSON message encryption methods of claim 1-8 when executing the computer program;And/or it is real
Now such as the described in any item JSON message decryption methods of claim 9-14.
30. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to
It enables, such as claim 1-8 described in any item JSON message encryption methods is realized when the computer instruction is executed by processor;
And/or realize such as the described in any item JSON message decryption methods of claim 9-14.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910498047.8A CN110290119B (en) | 2019-06-10 | 2019-06-10 | JSON message encryption method, decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910498047.8A CN110290119B (en) | 2019-06-10 | 2019-06-10 | JSON message encryption method, decryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110290119A true CN110290119A (en) | 2019-09-27 |
CN110290119B CN110290119B (en) | 2021-11-09 |
Family
ID=68003654
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910498047.8A Active CN110290119B (en) | 2019-06-10 | 2019-06-10 | JSON message encryption method, decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110290119B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114065304A (en) * | 2021-12-02 | 2022-02-18 | 四三九九网络股份有限公司 | JSON data encryption and decryption method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9461817B2 (en) * | 2009-01-20 | 2016-10-04 | International Business Machines Corporation | Method and system for encrypting JavaScript object notation (JSON) messages |
CN106027553A (en) * | 2016-07-02 | 2016-10-12 | 刘兴丹 | Encryption/decryption method based on dynamic password |
CN107451296A (en) * | 2017-08-21 | 2017-12-08 | 南京焦点领动云计算技术有限公司 | A kind of Website Module rendering intent based on component |
CN107995160A (en) * | 2017-10-26 | 2018-05-04 | 常熟市第人民医院 | A kind of JSON data packet encrypting and decrypting methods based on high in the clouds management and control |
CN108881172A (en) * | 2018-05-22 | 2018-11-23 | 阿里巴巴集团控股有限公司 | The analysis method and device of message |
CN109255611A (en) * | 2018-07-23 | 2019-01-22 | 北京京东尚科信息技术有限公司 | Data processing method, device, system, service terminal device and client terminal device |
CN109347862A (en) * | 2018-11-21 | 2019-02-15 | 安徽云融信息技术有限公司 | A kind of personal information data encryption processing system and method |
CN109560934A (en) * | 2018-10-25 | 2019-04-02 | 金蝶软件(中国)有限公司 | Data tamper resistant method, device, computer equipment and storage medium |
-
2019
- 2019-06-10 CN CN201910498047.8A patent/CN110290119B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9461817B2 (en) * | 2009-01-20 | 2016-10-04 | International Business Machines Corporation | Method and system for encrypting JavaScript object notation (JSON) messages |
CN106027553A (en) * | 2016-07-02 | 2016-10-12 | 刘兴丹 | Encryption/decryption method based on dynamic password |
CN107451296A (en) * | 2017-08-21 | 2017-12-08 | 南京焦点领动云计算技术有限公司 | A kind of Website Module rendering intent based on component |
CN107995160A (en) * | 2017-10-26 | 2018-05-04 | 常熟市第人民医院 | A kind of JSON data packet encrypting and decrypting methods based on high in the clouds management and control |
CN108881172A (en) * | 2018-05-22 | 2018-11-23 | 阿里巴巴集团控股有限公司 | The analysis method and device of message |
CN109255611A (en) * | 2018-07-23 | 2019-01-22 | 北京京东尚科信息技术有限公司 | Data processing method, device, system, service terminal device and client terminal device |
CN109560934A (en) * | 2018-10-25 | 2019-04-02 | 金蝶软件(中国)有限公司 | Data tamper resistant method, device, computer equipment and storage medium |
CN109347862A (en) * | 2018-11-21 | 2019-02-15 | 安徽云融信息技术有限公司 | A kind of personal information data encryption processing system and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114065304A (en) * | 2021-12-02 | 2022-02-18 | 四三九九网络股份有限公司 | JSON data encryption and decryption method |
CN114065304B (en) * | 2021-12-02 | 2024-05-28 | 四三九九网络股份有限公司 | JSON data encryption and decryption method |
Also Published As
Publication number | Publication date |
---|---|
CN110290119B (en) | 2021-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040090B (en) | A kind of data ciphering method and device | |
US20220083374A1 (en) | Method for processing data, task processing system and electronic equipment | |
US20240013212A1 (en) | Transferring cryptocurrency from a remote limited access wallet | |
CN104579646B (en) | Method, device and circuit that the limited monotonic transformation of clobber book and encryption and decryption thereof are applied | |
CN111027087B (en) | Enterprise information management system and method for encrypting mnemonics by applying block chain | |
US20120134495A1 (en) | Cloud Storage Data Access Method, Apparatus and System Based on OTP | |
CN102055770B (en) | Automatic secure protocol code implementation system based on extensive markup language (XML) description | |
CN102831352B (en) | Equipment authorization use method and equipment for method | |
CN105071927B (en) | Method is locally stored in a kind of mobile device data | |
CN1763684A (en) | Method and system for backup and restore of a context encryption key | |
CN112487103B (en) | Deep learning data set trusted sharing system based on blockchain intelligent contract | |
CN105553934B (en) | Based on SAAS layers of omnipotent decoding methods of EAB of cloud platform | |
CN103618705A (en) | Personal code managing tool and method under open cloud platform | |
CN106059762A (en) | Data security processing method and apparatus | |
CN110312054B (en) | Image encryption and decryption method, related device and storage medium | |
CN110084599A (en) | Cipher key processing method, device, equipment and storage medium | |
JP5843261B2 (en) | A system that authenticates whether a string is accepted by an automaton | |
CN112016104B (en) | Encryption method, device and system for financial sensitive data | |
CN102693597A (en) | Local printing method based on remote bill information and apparatus thereof | |
Wolfe et al. | Secret sharing MPC on FPGAs in the datacenter | |
Huang et al. | More efficient secure matrix multiplication for unbalanced recommender systems | |
CN115174261A (en) | Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution | |
CN110290119A (en) | A kind of JSON message encryption method, decryption method and device | |
CN110266484A (en) | A kind of data ciphering method, device, equipment and medium | |
CN109474418A (en) | File enciphering method, document decryption method, device, medium and calculating equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |