CN110290119A - A kind of JSON message encryption method, decryption method and device - Google Patents

A kind of JSON message encryption method, decryption method and device Download PDF

Info

Publication number
CN110290119A
CN110290119A CN201910498047.8A CN201910498047A CN110290119A CN 110290119 A CN110290119 A CN 110290119A CN 201910498047 A CN201910498047 A CN 201910498047A CN 110290119 A CN110290119 A CN 110290119A
Authority
CN
China
Prior art keywords
json
encryption
message
encrypted
json message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910498047.8A
Other languages
Chinese (zh)
Other versions
CN110290119B (en
Inventor
陈程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xin'an Century Polytron Technologies Inc
Original Assignee
Beijing Xin'an Century Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xin'an Century Polytron Technologies Inc filed Critical Beijing Xin'an Century Polytron Technologies Inc
Priority to CN201910498047.8A priority Critical patent/CN110290119B/en
Publication of CN110290119A publication Critical patent/CN110290119A/en
Application granted granted Critical
Publication of CN110290119B publication Critical patent/CN110290119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of JSON message encryption method, decryption method and devices, specifically: in encryption, determine JSON member to be encrypted in JSON message, it encrypts JSON member and obtains encryption JSON member, JSON member is replaced with into encryption JSON member, obtain replacement JSON message, associated storage relationship based on JSON member, localization and expression formula is configured for encryption JSON member, localization and expression formula is organized into replacement JSON message, obtains encryption JSON message;In decryption, encryption JSON message is parsed, localization and expression formula is obtained, is based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, decryption encryption JSON member obtains JSON member, to obtain JSON message.Localization and expression formula is configured in encryption, so that the automation positioning of encryption JSON member can be realized according to localization and expression formula in decryption.

Description

A kind of JSON message encryption method, decryption method and device
Technical field
The present invention relates to technical field of data processing more particularly to a kind of JSON message encryption methods, decryption method and dress It sets.
Background technique
Literal translation formula scripting language object numbered musical notation (Java Script Object Notation, JSON) is a kind of lightweight Data interchange format, data are stored and indicated using the text formatting for being totally independent of programming language, be easy to read and compile It writes, while being also easy to parse and generate, it is succinct to make ideal data interchange language with clearly hierarchical structure, effectively Ground improves the data transmission efficiency in data exchange process.
In order to improve the safety of data exchange, the prior art proposes some JSON message encipher-decipher methods, although this A little JSON message encipher-decipher methods can ensure the data safety in data exchange process, still, it be decrypted in receiving end Before, it is also necessary to by information configurations such as Data Identifications to be decrypted to receiving end, so that receiving end can be according to the information of configuration come really Fixed data to be decrypted.
Obviously, in these JSON message encipher-decipher methods that the prior art proposes, decrypting process is also in semi-automatic shape State cannot achieve the automation positioning for treating ciphertext data.
Summary of the invention
The embodiment of the invention provides a kind of JSON message encryption method, decryption method and devices, to solve existing skill The JSON message encipher-decipher method that art proposes cannot achieve the problem of automation positioning for treating ciphertext data.Specifically, this hair The technical solution that bright embodiment provides is as follows:
On the one hand, the embodiment of the invention provides a kind of JSON message encryption methods, comprising:
It determines the JSON member to be encrypted in JSON message, and JSON member to be encrypted is encrypted, obtain to be encrypted The corresponding encryption JSON member of JSON member;
JSON member to be encrypted in JSON message is replaced with into the corresponding encryption JSON member of JSON member to be encrypted, is obtained To the corresponding replacement JSON message of JSON message;
Associated storage relationship based on JSON member to be encrypted in JSON message configures positioning table for encryption JSON member Up to formula, wherein localization and expression formula is used to position encryption JSON member;
The corresponding localization and expression formula of encryption JSON member is organized into replacement JSON message, it is corresponding to obtain JSON message Encrypt JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, further includes:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form JSON member regenerates JSON message.
In a kind of possible embodiment, the JSON member to be encrypted in JSON message is determined, comprising:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, the JSON member to be encrypted in JSON message is determined, comprising:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
In a kind of possible embodiment, JSON member to be encrypted is encrypted, obtains JSON member couple to be encrypted The encryption JSON member answered, comprising:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, associated storage relationship based on JSON member to be encrypted in JSON message, Localization and expression formula is configured for encryption JSON member, comprising:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated Up to formula.
In a kind of possible embodiment, the corresponding localization and expression formula of encryption JSON member is organized into replacement JSON report Wen Zhong obtains the corresponding encryption JSON message of JSON message, comprising:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, further includes:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption In data object.
On the one hand, the embodiment of the invention provides a kind of JSON message decryption methods, comprising:
From encryption JSON message, localization and expression formula is obtained;
Based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, and encryption JSON member is carried out Decryption obtains the corresponding JSON member of encryption JSON member;
Based on the corresponding JSON member of encryption JSON member, the corresponding JSON message of encryption JSON message is obtained.
In a kind of possible embodiment, from encryption JSON message, localization and expression formula is obtained, comprising:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array, And from encryption member's array, obtain localization and expression formula.
In a kind of possible embodiment, encryption JSON member is decrypted, it is corresponding to obtain encryption JSON member JSON member, comprising:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtains decryption and encrypts the first decipherment algorithm used when JSON member, comprising:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtains decryption and encrypts the symmetric key used when JSON member, comprising:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON report is obtained The corresponding JSON message of text, comprising:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
On the one hand, the embodiment of the invention provides a kind of JSON message encryption devices, comprising:
Member's determination unit, for determining the JSON member to be encrypted in JSON message;
Cryptographic processing unit, for being encrypted to JSON member to be encrypted, obtain JSON member to be encrypted it is corresponding plus Close JSON member;
Data replacement unit, it is corresponding for the JSON member to be encrypted in JSON message to be replaced with JSON member to be encrypted Encryption JSON member, obtain the corresponding replacement JSON message of JSON message;
Bond-allocating unit, for the associated storage relationship based on JSON member to be encrypted in JSON message, for encryption JSON member configures localization and expression formula, wherein localization and expression formula is used to position encryption JSON member;
Message generation unit is organized into replacement JSON message for that will encrypt the corresponding localization and expression formula of JSON member, Obtain the corresponding encryption JSON message of JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, member determines single Member is also used to:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form JSON member regenerates JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single Member is used for:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single Member is used for:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
It in a kind of possible embodiment, is encrypted to JSON member to be encrypted, obtains JSON member to be encrypted When corresponding encryption JSON member, cryptographic processing unit is used for:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, closed based on associated storage of the JSON member to be encrypted in JSON message System, when configuring localization and expression formula for encryption JSON member, bond-allocating unit is used for:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated Up to formula.
In a kind of possible embodiment, replacement JSON is organized into the corresponding localization and expression formula of JSON member will be encrypted In message, when obtaining the corresponding encryption JSON message of JSON message, message generation unit is used for:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, message is generated Unit is also used to:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption In data object.
On the one hand, the embodiment of the invention provides a kind of JSON messages to decrypt device, comprising:
Packet parsing unit, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit obtains encryption JSON member from encryption JSON message for being based on localization and expression formula;
Decryption processing unit, for encryption JSON member to be decrypted, obtain the corresponding JSON of encryption JSON member at Member;
Receive message unit, for it is corresponding to obtain encryption JSON message based on the corresponding JSON member of encryption JSON member JSON message.
In a kind of possible embodiment, from encryption JSON message in, obtain localization and expression formula when, packet parsing list Member is used for:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array, And from encryption member's array, obtain localization and expression formula.
It in a kind of possible embodiment, is decrypted to encryption JSON member, it is corresponding to obtain encryption JSON member JSON member when, decryption processing unit is used for:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use the first decipherment algorithm when, Decryption processing unit is used for:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use symmetric key when, decryption Processing unit is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON is obtained When the corresponding JSON message of message, Receive message unit is used for:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
On the one hand, the embodiment of the invention provides a kind of JSON message processors, comprising: memory, processor and deposits The computer program that can be run on a memory and on a processor is stored up, processor realizes that the present invention is real when executing computer program The JSON message encryption method of example offer is provided;And/or realize JSON message decryption method provided in an embodiment of the present invention.
On the one hand, the embodiment of the invention also provides a kind of computer readable storage medium, computer readable storage mediums It is stored with computer instruction, the message encryption side JSON provided in an embodiment of the present invention is realized when computer instruction is executed by processor Method;And/or realize JSON message decryption method provided in an embodiment of the present invention.
The embodiment of the present invention has the beneficial effect that:
In the embodiment of the present invention, by configuring localization and expression formula in encryption for encryption JSON member, so that in decryption Encryption JSON member can be oriented according to localization and expression formula, without configuring the information such as Data Identification to be decrypted, to realize Automation decryption, improves decryption efficiency.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of JSON message encryption method in the embodiment of the present invention;
Fig. 2 is the specific of JSON message encryption method when being encrypted as concrete application scene in the embodiment of the present invention with segment Flow diagram;
Fig. 3 is in the embodiment of the present invention to be encrypted as the specific of JSON message encryption method when concrete application scene in full Flow diagram;
Fig. 4 is the flow diagram of JSON message decryption method in the embodiment of the present invention;
Fig. 5 is the idiographic flow schematic diagram of JSON message decryption method in the embodiment of the present invention;
Fig. 6 is the illustrative view of functional configuration of JSON message encryption device in the embodiment of the present invention;
Fig. 7 is the illustrative view of functional configuration that JSON message decrypts device in the embodiment of the present invention;
Fig. 8 is the hardware structural diagram of JSON message processor in the embodiment of the present invention.
Specific embodiment
In order to which the purpose of the present invention, technical solution and beneficial effect is more clearly understood, below with reference to of the invention real The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation Example is only a part of the embodiment of the present invention, is not whole embodiments.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
In order to solve the JSON message encipher-decipher method of prior art proposition can not treat ciphertext data automate it is fixed The problem of position, in the embodiment of the present invention, when being encrypted to JSON message, first determine JSON to be encrypted in JSON message at Member, encrypts the JSON member, after obtaining the corresponding encryption JSON member of the JSON member, by being somebody's turn to do in JSON message JSON member replaces with encryption JSON member, obtains replacement JSON message, and based on the JSON member in JSON message Associated storage relationship configures localization and expression formula for encryption JSON member, finally, by the corresponding positioning table of encryption JSON member It is organized into replacement JSON message up to formula, obtains the corresponding encryption JSON message of JSON message;To encryption JSON message into When row decryption, first from encryption JSON message, localization and expression formula is obtained, is based on the localization and expression formula, from encryption JSON message, Encryption JSON member is obtained, encryption JSON member is decrypted, after obtaining the corresponding JSON member of encryption JSON member, Based on the corresponding JSON member of encryption JSON member, the corresponding JSON message of encryption JSON message is obtained.In this way, by adding Localization and expression formula is configured for encryption JSON member when close, so that encryption JSON can be oriented according to localization and expression formula in decryption Member, to realize automation decryption, improves decryption efficiency without configuring the information such as Data Identification to be decrypted.
JSON message encipher-decipher method provided in an embodiment of the present invention is described in detail with reference to the accompanying drawing, certainly, The present invention is not limited to following embodiments.
As shown in fig.1, the process of the JSON message encryption method of exemplary embodiment of the invention is as follows:
Step 101: determining the JSON member to be encrypted in JSON message.
In practical application, the cipher mode of JSON message includes but is not limited to: adding to the entire text of JSON message Close full text cipher mode, and to the segment encryption side that at least one JSON member in JSON message is encrypted respectively Formula.
In the specific implementation, according to cipher mode it is different, when determining the JSON member to be encrypted in JSON message Used method of determination is also different, in practical application, it is understood that there may be but it is not limited to following two situation:
The first situation: JSON message is encrypted using full text cipher mode.
In such cases, JSON message can be first converted into the JSON member of key-value pair form, and be based on the key-value pair The JSON member of form regenerates JSON message, so that the JSON member of the key-value pair form is determined as in JSON message JSON member to be encrypted.Wherein, the number of JSON member to be encrypted in such cases is one.
Specifically, can first be configured when JSON message to be converted into the JSON member of key-value pair form for JSON message It, will based on the title and the value for the title of associated storage, and after JSON message is determined as the value for being used for associated storage JSON message is converted into the JSON member of key-value pair form.
Second situation: JSON message is encrypted using segment cipher mode.
In such cases, available encryption configuration information, and from all JSON members that JSON message includes, screening Each JSON member corresponding with the encryption configuration information out, and each JSON member filtered out is identified as JSON member to be encrypted in JSON message.Wherein, the number of JSON member to be encrypted in such cases is at least one.
Step 102: JSON member to be encrypted is encrypted, obtain the corresponding encryption JSON of JSON member to be encrypted at Member.
In practical application, if the number of JSON member to be encrypted is one, which can be carried out Encryption, to obtain the corresponding encryption JSON member of this JSON member to be encrypted;If the number of JSON member to be encrypted is At least one at least one JSON member to be encrypted can then encrypt this respectively, to obtain this, at least one is to be added The close corresponding encryption JSON member of JSON member.
In the specific implementation, when being encrypted to JSON member to be encrypted, value that can first to JSON member to be encrypted It is encrypted, corresponding secret value is obtained, then the value of JSON member to be encrypted is replaced with into the secret value, to obtain to be encrypted The corresponding encryption JSON member of JSON member.
Step 103: the JSON member to be encrypted in JSON message is replaced with into the corresponding encryption of JSON member to be encrypted JSON member obtains the corresponding replacement JSON message of JSON message.
It, can be to be encrypted by this in JSON message if the number of JSON member to be encrypted is one in practical application JSON member replaces with the corresponding encryption JSON member of the JSON member to be encrypted, to obtain the corresponding replacement of JSON message JSON message;It, can at least one be to be added by this in JSON message if the number of JSON member to be encrypted is at least one Close JSON member replaces with corresponding encryption JSON member respectively, to obtain the corresponding replacement JSON message of JSON message.
Step 104: based on associated storage relationship of the JSON member to be encrypted in JSON message, matching for encryption JSON member Set localization and expression formula, wherein localization and expression formula is used to position encryption JSON member.
In practical application, if the number of JSON member to be encrypted is one, it can be existed based on the JSON member to be encrypted Associated storage relationship in JSON message configures localization and expression formula for the corresponding encryption JSON member of the JSON member to be encrypted, To obtain the corresponding localization and expression formula for encrypting JSON member of this JSON member to be encrypted;If JSON member's to be encrypted Number is at least one, then can be based at least one JSON member to be encrypted corresponding association in JSON message and deposit Storage relationship, for the corresponding encryption JSON member configuration localization and expression formula of corresponding JSON member to be encrypted, thus obtain this at least one The localization and expression formula of a corresponding encryption JSON member of JSON member to be encrypted.
In the specific implementation, in the associated storage relationship based on JSON member to be encrypted in JSON message, for encryption When JSON member configures localization and expression formula, it can use but be not limited to following manner:
Firstly, it is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted is corresponding to go through Through member set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON The ordered set of member.
Then, it is corresponding to generate encryption JSON member for the title based on each JSON member for including after member set Localization and expression formula.
Step 105: the corresponding localization and expression formula of encryption JSON member being organized into replacement JSON message, JSON report is obtained The corresponding encryption JSON message of text.
In the specific implementation, when executing step 105, it can use but be not limited to following manner:
Firstly, generating encryption member's array based on the corresponding localization and expression formula of encryption JSON member.
In practical application, if the number of JSON member to be encrypted be one, can based on a JSON to be encrypted at The localization and expression formula of the corresponding encryption JSON member of member, generates encryption member's array;If the number of JSON member to be encrypted is extremely Few one, then can based on this at least one corresponding encryption JSON member of JSON member to be encrypted localization and expression formula, Generate encryption member's array.
Then, the first Encryption Algorithm title used based on encryption member's array and when encrypting JSON member to be encrypted, it is raw At encryption member object, and based on encryption member object, encrypted data objects are generated.
In practical application, if determining pair for needing will to use when encrypting JSON member to be encrypted according to concrete application scene Claim key to be sent to receiving end, then receiving end can also determined when generating encrypted data objects based on encryption member object After corresponding public key, using the public key, the symmetric key used when to encryption JSON member is encrypted, and it is close to obtain cryptographic symmetrical Key, and the second encryption that based on the encrypted symmetric key, the corresponding private key information of the public key and encrypted symmetric key when uses is calculated Legitimate name generates the corresponding cryptographic key containers object of the public key, and is based on cryptographic key containers object, generates cryptographic key containers object set It closes, and cryptographic key containers object set is organized into encrypted data objects.
It is tellable to be, it, can be corresponding close based on a public key if the corresponding public key number in receiving end is one Key container object generates cryptographic key containers object set, at this point, including a cryptographic key containers pair in the cryptographic key containers object set As;If the corresponding public key number in receiving end be it is multiple, the corresponding cryptographic key containers object of multiple public key can be based on, it is raw At cryptographic key containers object set, at this point, including multiple cryptographic key containers objects in the cryptographic key containers object set.
Secondly, being configured to the title of associated storage based on default unique identification for encrypted data objects, and number will be encrypted It is determined as the value for associated storage according to object.
Finally, encrypted data objects are converted into JSON member, and the JSON member is worked out based on the title and the value Into the root node of replacement JSON message, encryption JSON message is obtained.
Concrete application scene is encrypted as with segment below, to JSON message encryption method provided in an embodiment of the present invention make into One step is described in detail.As shown in fig.2, the detailed process of the JSON message encryption method of exemplary embodiment of the invention is such as Under:
Step 201: being instructed according to encryption configuration, determine JSON message and the corresponding encryption of JSON message to be encrypted Configuration information.
Step 202: according to the encryption scheme information in the encryption configuration information, determining that carrying out segment to the JSON message adds When close, from all JSON members that the JSON message includes, filter out and N number of member identities' phase in the encryption configuration information Corresponding N number of JSON member is as the JSON member to be encrypted in the JSON message.Wherein, N is no less than 1 positive integer.
Step 203: determining the first Encryption Algorithm used when encrypting JSON member to be encrypted, and it is to be encrypted to generate encryption The symmetric key used when JSON member.
Step 204: from N number of JSON member to be encrypted, it is to be encrypted as i-th to choose a JSON member to be encrypted JSON member.
Step 205: it is based on the first Encryption Algorithm and symmetric key, the value of i-th of JSON member to be encrypted is encrypted, Secret value is obtained, and the value of i-th of JSON member to be encrypted is replaced with into secret value, obtains i-th of JS ON member couple to be encrypted The encryption JSON member answered.
Step 206: i-th of JSON member to be encrypted in the JSON message is replaced with into i-th of JSON member to be encrypted Corresponding encryption JSON member.
Step 207: based on going through among the nodes for root node and the i-th JSON member to be encrypted in the JSON message It is corresponding after member set to generate i-th of JSON member to be encrypted by JSON member on all nodes of warp.
Step 208: based on the corresponding each JSON member for including after member set of i-th of JSON member to be encrypted Title is that i-th of encryption JSON member configures localization and expression formula.
Step 209: judging whether i+1 is more than or equal to N, if so, thening follow the steps 210;If it is not, then return step 204.
Step 210: determining and obtain replacement JSON message and N number of corresponding localization and expression formula of encryption JSON member, base In N number of corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array and the One Encryption Algorithm title generates encryption member object.
Step 211: according to the cipher key configuration information in encryption configuration information, judging whether that N number of JSON to be encrypted will be encrypted The symmetric key used when member is organized into replacement JSON message, if so, thening follow the steps 213;If it is not, thening follow the steps 212。
Step 212: based on encryption member object, generating encrypted data objects, and continue to execute step 219.
Step 213: determining the corresponding M public key in receiving end.Wherein, M is no less than 1 positive integer.
Step 214: from M public key, choosing a public key as j-th of public key, and based on j-th of public key and encryption pair Claim the second Encryption Algorithm used when key, symmetric key is encrypted, encrypted symmetric key is obtained.
Step 215: being used when based on encrypted symmetric key, the corresponding private key information of j-th of public key and encrypted symmetric key The second Encryption Algorithm title, generate cryptographic key containers object.
Step 216: judging whether j+1 is more than or equal to M, if so, thening follow the steps 217;If it is not, then return step 214.
Step 217: determining and obtain M cryptographic key containers object, and be based on M cryptographic key containers object, generate cryptographic key containers pair As set.
Step 218: based on encryption member object and cryptographic key containers object set, generating encrypted data objects, and continue to hold Row step 219.
Step 219: based on default unique identification, the title of associated storage is configured to for encrypted data objects, and will be added Ciphertext data object is determined as the value for associated storage, based on the title and the value, by encrypted data objects be converted into JSON at Member.
Step 220: the JSON member being organized into the root node of replacement JSON message, obtain encryption JSON message.
Below to be encrypted as concrete application scene in full, to JSON message encryption method provided in an embodiment of the present invention make into One step is described in detail.As shown in fig.3, the detailed process of the JSON message encryption method of exemplary embodiment of the invention is such as Under:
Step 301: being instructed according to encryption configuration, determine JSON message and the corresponding encryption of JSON message to be encrypted Configuration information.
Step 302: according to the encryption scheme information in the encryption configuration information, determining that carrying out full text to the JSON message adds When close, the title of associated storage is configured to for the JSON message.
Step 303: the JSON message being determined as to be used for the value of associated storage, and based on the title and the value, by JSON Message is converted into the JSON member of key-value pair form.
Step 304: the JSON member based on the key-value pair form regenerates JSON message, and by the key-value pair form JSON member be determined as the JSON member to be encrypted in the JSON message.
Step 305: determining the first Encryption Algorithm for using when encrypting the JSON member to be encrypted, and generate encryption this is to be added The symmetric key used when close JSON member.
Step 306: being based on the first Encryption Algorithm and symmetric key, the value of the JSON member to be encrypted is encrypted, is obtained Secret value is replaced with to secret value, and by the value of the JSON member to be encrypted, obtains the corresponding encryption of the JS ON member to be encrypted JSON member.
Step 307: it is corresponding that the JSON member to be encrypted in the JSON message being replaced with into the JSON member to be encrypted JSON member is encrypted, replacement JSON message is obtained.
Step 308: the title based on the JSON member to be encrypted, for the corresponding encryption JSON of the JSON member to be encrypted at Member's configuration localization and expression formula.
Step 309: being based on the corresponding localization and expression formula of encryption JSON member, generate encryption member's array, and being based on should Member's array and the first Encryption Algorithm title are encrypted, encryption member object is generated.
Step 310: according to the cipher key configuration information in encryption configuration information, judge whether will to encrypt the JSON to be encrypted at The symmetric key used when member is organized into replacement JSON message, if so, thening follow the steps 312;If it is not, thening follow the steps 311.
Step 311: based on encryption member object, generating encrypted data objects, and continue to execute step 318.
Step 312: determining the corresponding M public key in receiving end.Wherein, M is no less than 1 positive integer.
Step 313: from M public key, choosing a public key as j-th of public key, and based on j-th of public key and encryption pair Claim the second Encryption Algorithm used when key, symmetric key is encrypted, encrypted symmetric key is obtained.
Step 314: being used when based on encrypted symmetric key, the corresponding private key information of j-th of public key and encrypted symmetric key The second Encryption Algorithm title, generate cryptographic key containers object.
Step 315: judging whether j+1 is more than or equal to M, if so, thening follow the steps 316;If it is not, then return step 313.
Step 316: determining and obtain M cryptographic key containers object, and be based on M cryptographic key containers object, generate cryptographic key containers pair As set.
Step 317: based on encryption member object and cryptographic key containers object set, generating encrypted data objects, and continue to hold Row step 318.
Step 318: based on default unique identification, the title of associated storage is configured to for encrypted data objects, and will be added Ciphertext data object is determined as the value for associated storage, and based on the title and the value, encrypted data objects are converted into JSON member.
Step 319: the JSON member being organized into the root node of replacement JSON message, obtain encryption JSON message.
Based on the above embodiment, the embodiment of the invention also provides a kind of JSON message decryption methods, as shown in fig.4, The process of the JSON message decryption method of exemplary embodiment of the invention is as follows:
Step 401: from encryption JSON message, obtaining localization and expression formula.
Specifically, can use when executing step 401 but be not limited to following manner:
Firstly, the JSON member of corresponding entitled default unique identification is obtained from the root node of encryption JSON message, And the value of the JSON member is determined as encrypted data objects.
Then, from the encrypted data objects, encryption member object is obtained.
Finally, obtaining encryption member's array from encryption member object, and from encryption member's array, obtain localization and expression Formula.
In practical application, however, it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then, can from encryption member's array To obtain a localization and expression formula;If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then from encryption member's array, At least one localization and expression formula can be obtained.
Step 402: being based on localization and expression formula, encryption JSON member is obtained from encryption JSON message, and to encryption JSON Member is decrypted, and obtains the corresponding JSON member of encryption JSON member.
In practical application, if obtaining a localization and expression formula, it can be based on the localization and expression formula, from encryption JSON message In, obtain an encryption JSON member;If obtaining multiple localization and expression formulas, it can be based on multiple localization and expression formula, from adding In close JSON message, multiple encryption JSON members are obtained.Specifically, being decrypted to each encryption JSON member of acquisition When, it can use but be not limited to following manner:
The first decipherment algorithm and symmetric key used when firstly, obtaining decryption encryption JSON member.
Wherein, when obtaining the first decipherment algorithm, the first Encryption Algorithm title can be obtained from encryption member object, And the associated decipherment algorithm of the first Encryption Algorithm corresponding with the first Encryption Algorithm title is determined as the first decipherment algorithm.
Wherein, when obtaining symmetric key, it is understood that there may be but it is not limited to following two situation:
The first situation: cryptographic key containers object set is not included in encrypted data objects.It in such cases, can be according to pre- About key schedule generates symmetric key.
Second situation: including cryptographic key containers object set in encrypted data objects.In such cases, can hold from key In device object set, cryptographic key containers object is obtained, and parse to cryptographic key containers object, obtains encrypted symmetric key, private key After information and the second Encryption Algorithm title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine second Decipherment algorithm, and it is based on private key and the second decipherment algorithm, encrypted symmetric key is decrypted, symmetric key is obtained.
Then, it is based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained Corresponding value.
Finally, the secret value of encryption JSON member is replaced with the value, JSON member is obtained.
Step 403: based on the corresponding JSON member of encryption JSON member, obtaining the corresponding JSON report of encryption JSON message Text.
In practical application, however, it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then will can directly encrypt JSON The value of the corresponding JSON member of member is determined as encrypting the corresponding JSON message of JSON message;If it is determined that the encryption that transmitting terminal uses Mode is segment encryption, then the encryption JSON member encrypted in JSON message can be replaced with JSON member, to be added The corresponding JSON message of close JSON message.
The JSON message decryption method of exemplary embodiment of the invention is described in further detail below.Refering to Fig. 5 Shown, the detailed process of the JSON message decryption method of exemplary embodiment of the invention is as follows:
Step 501: from the root node of encryption JSON message, obtain the JSON of corresponding entitled default unique identification at Member, and the value of the JSON member is determined as encrypted data objects.
Step 502: judging whether comprising cryptographic key containers object set in the encrypted data objects, if so, thening follow the steps 504;If it is not, thening follow the steps 503.
Step 503: according to reservation key schedule, generating symmetric key, and continue to execute step 510.
Step 504: from cryptographic key containers object set, obtaining M cryptographic key containers object.Wherein, M is being no less than 1 just Integer.
Step 505: from M cryptographic key containers object, choosing a cryptographic key containers object as j-th of cryptographic key containers pair As, and j-th of cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm title.
Step 506: judging whether obtain private key from private key information, if so, thening follow the steps 509;If it is not, then executing step Rapid 507.
Step 507: judging whether j+1 is more than or equal to M, if so, thening follow the steps 508;If it is not, then return step 505.
Step 508: determining that the decryption to encryption JSON message fails, and terminate to encrypt the decrypting process of JSON message.
Step 509: the associated decipherment algorithm of the second Encryption Algorithm corresponding with the second Encryption Algorithm title is determined as Second decipherment algorithm, and it is based on the second decipherment algorithm and private key, encrypted symmetric key is decrypted, symmetric key is obtained, and Continue to execute step 510.
Step 510: from encrypted data objects, obtaining encryption member object, and obtain encryption from encryption member object Member's array and the first Encryption Algorithm title.
Step 511: the associated decipherment algorithm of the first Encryption Algorithm corresponding with the first Encryption Algorithm title is determined as First decipherment algorithm, and from encryption member's array, obtain P localization and expression formula.Wherein, P is no less than 1 positive integer.
Step 512: from P localization and expression formula, choosing a localization and expression formula as k-th of localization and expression formula, and base K-th of encryption JSON member is obtained from encryption JSON message in k-th of localization and expression formula.
Step 513: being based on the first decipherment algorithm and symmetric key, the secret value for encrypting JSON member to k-th solves It is close, it is worth accordingly, and the secret value that k-th encrypts JSON member is replaced with into the value, obtains k-th of encryption JSON member Corresponding JSON member.
Step 514: judging whether k+1 is more than or equal to P, if so, thening follow the steps 515;If it is not, then return step 512.
Step 515: determine and obtain the P corresponding JSON member of encryption JSON member, and be based on P encryption JSON at The corresponding JSON member of member obtains the corresponding JSON message of encryption JSON message.
Based on the above embodiment, the embodiment of the invention provides a kind of JSON message encryption devices, as shown in fig.6, this The JSON message encryption device 600 of invention illustrative embodiments includes at least:
Member's determination unit 601, for determining the JSON member to be encrypted in JSON message;
It is corresponding to obtain JSON member to be encrypted for encrypting to JSON member to be encrypted for cryptographic processing unit 602 Encrypt JSON member;
Data replacement unit 603, for the JSON member to be encrypted in JSON message to be replaced with JSON member to be encrypted Corresponding encryption JSON member obtains the corresponding replacement JSON message of JSON message;
Bond-allocating unit 604, for the associated storage relationship based on JSON member to be encrypted in JSON message, to add Close JSON member configures localization and expression formula, wherein localization and expression formula is used to position encryption JSON member;
Message generation unit 605 is organized into replacement JSON message for that will encrypt the corresponding localization and expression formula of JSON member In, obtain the corresponding encryption JSON message of JSON message.
In a kind of possible embodiment, before determining the JSON member to be encrypted in JSON message, member determines single Member 601 is also used to:
If it is determined that encrypting using full text cipher mode to JSON message, then associated storage is configured to for JSON message Title, and JSON message is determined as to be used for the value of associated storage;
Based on title and value, JSON message is converted into the JSON member of key-value pair form, and based on key-value pair form JSON member regenerates JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single Member 601 is used for:
The JSON member to be encrypted JSON member of key-value pair form being determined as in JSON message.
In a kind of possible embodiment, when determining the JSON member to be encrypted in JSON message, member determines single Member 601 is used for:
JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration letter of JSON message Breath;
From all JSON members that JSON message includes, filter out each JSON corresponding with encryption configuration information at Member, and each JSON member filtered out is identified as to the JSON member to be encrypted in JSON message.
It in a kind of possible embodiment, is encrypted to JSON member to be encrypted, obtains JSON member to be encrypted When corresponding encryption JSON member, cryptographic processing unit 602 is used for:
The value of JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the value of JSON member to be encrypted Secret value is replaced with, encryption JSON member is obtained.
In a kind of possible embodiment, closed based on associated storage of the JSON member to be encrypted in JSON message System, when configuring localization and expression formula for encryption JSON member, bond-allocating unit 604 is used for:
It is corresponding after member set to obtain JSON member to be encrypted, wherein JSON member to be encrypted it is corresponding after at Member's set be node where from the root node of JSON message to JSON member to be encrypted after each node on JSON member Ordered set;
Based on the title for each JSON member for including after member set, the corresponding positioning table of encryption JSON member is generated Up to formula.
In a kind of possible embodiment, replacement JSON is organized into the corresponding localization and expression formula of JSON member will be encrypted In message, when obtaining the corresponding encryption JSON message of JSON message, message generation unit 605 is used for:
Based on the corresponding localization and expression formula of encryption JSON member, encryption member's array is generated, and based on encryption member's array With the first Encryption Algorithm title used when encrypting JSON member to be encrypted, encryption member object is generated, and based on encryption member Object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for encrypted data objects, and by encryption data pair As being determined as the value for associated storage;
Based on title and value, encrypted data objects are converted into JSON member, and JSON member is organized into replacement JSON In the root node of message, encryption JSON message is obtained.
In a kind of possible embodiment, based on encryption member object, when generating encrypted data objects, message is generated Unit 605 is also used to:
It determines the corresponding public key in receiving end, and utilizes public key, the symmetric key used when to encryption JSON member adds It is close, obtain encrypted symmetric key;
The second Encryption Algorithm used when based on encrypted symmetric key, the corresponding private key information of public key and encrypted symmetric key Title generates cryptographic key containers object;
Based on cryptographic key containers object, cryptographic key containers object set is generated, and cryptographic key containers object set is organized into encryption In data object.
In addition, the embodiment of the invention also provides a kind of JSON messages to decrypt device, as shown in fig.7, example of the present invention Property embodiment JSON message decryption device 700 include at least:
Packet parsing unit 701, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit 702 obtains encryption JSON member from encryption JSON message for being based on localization and expression formula;
Decryption processing unit 703 obtains the corresponding JSON of encryption JSON member for encryption JSON member to be decrypted Member;
Receive message unit 704, for obtaining encryption JSON message pair based on the corresponding JSON member of encryption JSON member The JSON message answered.
In a kind of possible embodiment, from encryption JSON message in, obtain localization and expression formula when, packet parsing list Member 701 is used for:
From the root node of encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will The value of JSON member is determined as encrypted data objects;
Encryption member object is obtained from encrypted data objects, and from encryption member object, obtains encryption member's array, And from encryption member's array, obtain localization and expression formula.
It in a kind of possible embodiment, is decrypted to encryption JSON member, it is corresponding to obtain encryption JSON member JSON member when, decryption processing unit 703 is used for:
The first decipherment algorithm and symmetric key used when obtaining decryption encryption JSON member;
Based on the first decipherment algorithm and symmetric key, the secret value of encryption JSON member is decrypted, is obtained corresponding Value, and the secret value for encrypting JSON member is replaced with into value, obtain JSON member.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use the first decipherment algorithm when, Decryption processing unit 703 is used for:
From encryption member object, the first Encryption Algorithm title is obtained, and will corresponding with the first Encryption Algorithm title the The associated decipherment algorithm of one Encryption Algorithm is determined as the first decipherment algorithm.
In a kind of possible embodiment, obtain decrypt encryption JSON member when use symmetric key when, decryption Processing unit 703 is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in encrypted data objects Raw symmetric key;
If it is determined that including cryptographic key containers object set in encrypted data objects, then from cryptographic key containers object set, obtain Cryptographic key containers object, and cryptographic key containers object is parsed, obtain encrypted symmetric key, private key information and the second Encryption Algorithm After title, private key is obtained from private key information, and be based on the second Encryption Algorithm title, determine the second decipherment algorithm, and be based on Private key and the second decipherment algorithm, are decrypted encrypted symmetric key, obtain symmetric key.
In a kind of possible embodiment, based on the corresponding JSON member of encryption JSON member, encryption JSON is obtained When the corresponding JSON message of message, Receive message unit 704 is used for:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then it will encrypt the corresponding JSON member's of JSON member Value is determined as encrypting the corresponding JSON message of JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then the encryption JSON member in JSON message will be encrypted JSON member is replaced with, the corresponding JSON message of encryption JSON message is obtained.
It should be noted that since JSON message encryption device 600 provided in an embodiment of the present invention and JSON message are decrypted The principle that device 700 solves technical problem is similar to JSON message encryption method provided in an embodiment of the present invention and decryption method, Therefore, the implementation of JSON encryption device 600 and JSON message decryption device 700 provided in an embodiment of the present invention may refer to this hair The implementation of JSON message encryption method and decryption method that bright embodiment provides, overlaps will not be repeated.
JSON message encryption method, decryption method and the relevant apparatus for describing exemplary embodiment of the invention it Afterwards, next, simply being introduced JSON message processor provided in an embodiment of the present invention.
As shown in fig.8, JSON message processor 800 provided in an embodiment of the present invention includes at least: processor 81 is deposited Reservoir 82 and it is stored in the computer program that can be run on memory 82 and on processor 81, wherein processor 81 executes meter JSON message encryption method provided in an embodiment of the present invention is realized when calculation machine program;And/or it realizes provided in an embodiment of the present invention JSON message decryption method.
It should be noted that JSON message processor 800 shown in Fig. 8 is only an example, it should not be to the present invention The function and use scope of embodiment bring any restrictions.
JSON message processor 800 provided in an embodiment of the present invention can also include connecting (including the processing of different components Device 81 and memory 82) bus 83.Wherein, bus 83 indicates one of a few class bus structures or a variety of, including memory Bus, peripheral bus, local bus etc..
Memory 82 may include the readable medium of form of volatile memory, such as random access memory (Random Access Memory, RAM) 821 and/or cache memory 822, it can further include read-only memory (Read Only Memory, ROM) 823.
Memory 82 can also include the program means 824 with one group of (at least one) program module 824, program module 824 include but is not limited to: operational subsystems, one or more application program, other program modules and program data, these It may include the realization of network environment in each of example or certain combination.
JSON message processor 800 can also be logical with one or more external equipments 84 (such as keyboard, remote controler etc.) Letter can also enable a user to equipment interact with JSON message processor 800 with one or more and communicate (such as hand Mechanical, electrical brain etc.), and/or, and make JSON message processor 800 and one or more of the other JSON message processor 800 Any equipment (such as the router, modem etc.) communication communicated.This communication can pass through input/output (Input/Output, I/O) interface 85 carries out.Also, JSON message processor 800 can also by network adapter 86 with One or more network (such as local area network (Local Area Network, LAN), wide area network (Wide Area Network, WAN) and/or public network, for example, internet) communication.As shown in figure 8, network adapter 86 passes through bus 83 and JSON message Other modules of processing equipment 800 communicate.It will be appreciated that though being not shown in Fig. 8, JSON message processor can be combined 800 use other hardware and/or software module, including but not limited to: microcode, device driver, redundant processor, external magnetic Dish driving array, disk array (Redundant Arrays of Independent Disks, RAID) subsystem, tape drive Dynamic device and data backup storage subsystem etc..
Computer readable storage medium provided in an embodiment of the present invention is introduced below.The embodiment of the invention provides A kind of computer readable storage medium, the computer-readable recording medium storage have computer instruction, and computer instruction is processed Device realizes JSON message encryption method provided in an embodiment of the present invention when executing;And/or it realizes provided in an embodiment of the present invention The decryption method of JSON message.Specifically, which can be built in JSON message processor 800, in this way, JSON message processor 800 can realize that JSON provided in an embodiment of the present invention is reported by executing built-in executable program Literary encryption method;And/or realize the decryption method of JSON message provided in an embodiment of the present invention.
In addition, JSON message encipher-decipher method provided in an embodiment of the present invention is also implemented as a kind of program product, it should Program product includes program code, when the program product can be run on JSON message processor 800, the program code For making JSON message processor 800 execute JSON message encryption method provided in an embodiment of the present invention;And/or realize this The decryption method for the JSON message that inventive embodiments provide.
Program product provided in an embodiment of the present invention can be using any combination of one or more readable mediums, wherein Readable medium can be readable signal medium or readable storage medium storing program for executing, and readable storage medium storing program for executing can be but it is electric to be not limited to, Magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination is specifically, readable to deposit The more specific example (non exhaustive list) of storage media includes: electrical connection with one or more conducting wires, portable disc, hard Disk, RAM, ROM, erasable programmable read only memory (Erasable Programmable Read Only Memory, EPROM), optical fiber, portable compact disc read only memory (Compact Disc Read-Only Memory, CD-ROM), light are deposited Memory device, magnetic memory device or above-mentioned any appropriate combination.
Program product provided in an embodiment of the present invention can also be set using CD-ROM and including program code in calculating Standby upper operation.However, program product provided in an embodiment of the present invention is without being limited thereto, and in embodiments of the present invention, readable storage medium Matter can be any tangible medium for including or store program, which, which can be commanded execution system, device or device, makes With or it is in connection.
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke It point is only exemplary not enforceable.In fact, embodiment according to the present invention, it is above-described two or more The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can It is to be embodied by multiple units with further division.
In addition, although describing the operation of the method for the present invention in the accompanying drawings with particular order, this do not require that or Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one Step is decomposed into execution of multiple steps.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (30)

1. a kind of literal translation formula scripting language object numbered musical notation JSON message encryption method characterized by comprising
Determine the JSON member to be encrypted in JSON message, and the JSON member to be encrypted encrypted, obtain it is described to Encrypt the corresponding encryption JSON member of JSON member;
The JSON member to be encrypted in the JSON message is replaced with into the corresponding encryption of the JSON member to be encrypted JSON member obtains the corresponding replacement JSON message of the JSON message;
Associated storage relationship based on the JSON member to be encrypted in the JSON message is matched for the encryption JSON member Set localization and expression formula, wherein the localization and expression formula is for positioning the encryption JSON member;
The corresponding localization and expression formula of the encryption JSON member is organized into the replacement JSON message, the JSON report is obtained The corresponding encryption JSON message of text.
2. JSON message encryption method as described in claim 1, which is characterized in that determine the JSON to be encrypted in JSON message Before member, further includes:
If it is determined that encrypting the JSON message using full text cipher mode, then it is configured to be associated with for the JSON message The title of storage, and be determined as the JSON message to be used for the value of associated storage;
Based on the title and described value, the JSON message is converted into the JSON member of key-value pair form, and based on described The JSON member of key-value pair form regenerates JSON message.
3. JSON message encryption method as claimed in claim 2, which is characterized in that determine the JSON to be encrypted in JSON message Member, comprising:
The JSON member to be encrypted JSON member of the key-value pair form being determined as in the JSON message.
4. JSON message encryption method as described in claim 1, which is characterized in that determine the JSON to be encrypted in JSON message Member, comprising:
The JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration of the JSON message Information;
From all JSON members that the JSON message includes, filter out corresponding with the encryption configuration information each JSON member, and each JSON member filtered out is identified as the JSON member to be encrypted in the JSON message.
5. JSON message encryption method as described in claim 1, which is characterized in that add to the JSON member to be encrypted It is close, obtain the corresponding encryption JSON member of the JSON member to be encrypted, comprising:
The value of the JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the JSON member to be encrypted Value replace with the secret value, obtain the encryption JSON member.
6. JSON message encryption method as described in claim 1, which is characterized in that based on the JSON member to be encrypted in institute The associated storage relationship in JSON message is stated, configures localization and expression formula for the encryption JSON member, comprising:
It is corresponding after member set to obtain the JSON member to be encrypted, wherein the JSON member to be encrypted is corresponding to go through Through member set be node where from the root node of the JSON message to the JSON member to be encrypted after each node On JSON member ordered set;
Based on the title of each JSON member for including after member set, it is corresponding fixed to generate the encryption JSON member Position expression formula.
7. JSON message encryption method as described in any one in claim 1-5, which is characterized in that by the encryption JSON member Corresponding localization and expression formula is organized into the replacement JSON message, obtains the corresponding encryption JSON message of the JSON message, Include:
Based on the corresponding localization and expression formula of the encryption JSON member, encryption member's array is generated, and is based on the encryption member Array generates encryption member object with the first Encryption Algorithm title used when encrypting the JSON member to be encrypted, and is based on The encryption member object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for the encrypted data objects, and by the encryption number It is determined as the value for associated storage according to object;
Based on the title and described value, the encrypted data objects are converted into JSON member, and the JSON member is compiled In the root node for making the replacement JSON message, the encryption JSON message is obtained.
8. JSON message encryption method as claimed in claim 7, which is characterized in that be based on the encryption member object, generate When encrypted data objects, further includes:
Determine the corresponding public key in receiving end, and utilize the public key, to the symmetric key used when encrypting the JSON member into Row encryption, obtains encrypted symmetric key;
Second used based on the encrypted symmetric key, the corresponding private key information of the public key and when encrypting the symmetric key Encryption Algorithm title generates cryptographic key containers object;
Based on the cryptographic key containers object, cryptographic key containers object set is generated, and the cryptographic key containers object set is organized into In the encrypted data objects.
9. a kind of literal translation formula scripting language object numbered musical notation JSON message decryption method characterized by comprising
From encryption JSON message, localization and expression formula is obtained;
Based on the localization and expression formula, encryption JSON member is obtained from the encryption JSON message, and to the encryption JSON Member is decrypted, and obtains the corresponding JSON member of the encryption JSON member;
Based on the corresponding JSON member of the encryption JSON member, the corresponding JSON message of the encryption JSON message is obtained.
10. JSON message decryption method as claimed in claim 9, which is characterized in that from encryption JSON message, obtain positioning Expression formula, comprising:
From the root node of the encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will The value of the JSON member is determined as encrypted data objects;
From the encrypted data objects, encryption member object is obtained, and from the encryption member object, obtains encryption member Array, and from encryption member's array, obtain the localization and expression formula.
11. JSON message decryption method as claimed in claim 10, which is characterized in that solved to the encryption JSON member It is close, obtain the corresponding JSON member of the encryption JSON member, comprising:
Obtain the first decipherment algorithm and symmetric key used when decryption is described to encrypt JSON member;
Based on first decipherment algorithm and the symmetric key, the secret value of the encryption JSON member is decrypted, is obtained Described value is replaced with to corresponding value, and by the secret value of the encryption JSON member, obtains the JSON member.
12. JSON message decryption method as claimed in claim 11, which is characterized in that obtain and decrypt the encryption JSON member When the first decipherment algorithm for using, comprising:
From the encryption member object, the first Encryption Algorithm title is obtained, and will be corresponding with the first Encryption Algorithm title The associated decipherment algorithm of the first Encryption Algorithm be determined as first decipherment algorithm.
13. JSON message decryption method as claimed in claim 11, which is characterized in that obtain and decrypt the encryption JSON member When the symmetric key that uses, comprising:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in the encrypted data objects The raw symmetric key;
If it is determined that include cryptographic key containers object set in the encrypted data objects, then from the cryptographic key containers object set, Cryptographic key containers object is obtained, and the cryptographic key containers object is parsed, obtains encrypted symmetric key, private key information and second After Encryption Algorithm title, private key is obtained from the private key information, and be based on the second Encryption Algorithm title, determine the second solution Close algorithm, and it is based on the private key and second decipherment algorithm, the encrypted symmetric key is decrypted, is obtained described Symmetric key.
14. such as the described in any item JSON message decryption methods of claim 9-13, which is characterized in that be based on the encryption JSON The corresponding JSON member of member obtains the corresponding JSON message of the encryption JSON message, comprising:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then by the corresponding JSON member's of the encryption JSON member Value is determined as the corresponding JSON message of the encryption JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then by the encryption JSON in the encryption JSON message Member replaces with the JSON member, obtains the corresponding JSON message of the encryption JSON message.
15. a kind of literal translation formula scripting language object numbered musical notation JSON message encryption device characterized by comprising
Member's determination unit, for determining the JSON member to be encrypted in JSON message;
It is corresponding to obtain the JSON member to be encrypted for encrypting to the JSON member to be encrypted for cryptographic processing unit Encryption JSON member;
Data replacement unit, for the JSON member to be encrypted in the JSON message to be replaced with the JSON to be encrypted The corresponding encryption JSON member of member obtains the corresponding replacement JSON message of the JSON message;
Bond-allocating unit is for the associated storage relationship based on the JSON member to be encrypted in the JSON message The encryption JSON member configures localization and expression formula, wherein the localization and expression formula is used to carry out the encryption JSON member Positioning;
Message generation unit, for the corresponding localization and expression formula of the encryption JSON member to be organized into the replacement JSON message In, obtain the corresponding encryption JSON message of the JSON message.
16. JSON message encryption device as claimed in claim 15, which is characterized in that determine to be encrypted in JSON message Before JSON member, member's determination unit is also used to:
If it is determined that encrypting the JSON message using full text cipher mode, then it is configured to be associated with for the JSON message The title of storage, and be determined as the JSON message to be used for the value of associated storage;
Based on the title and described value, the JSON message is converted into the JSON member of key-value pair form, and based on described The JSON member of key-value pair form regenerates JSON message.
17. JSON message encryption device as claimed in claim 16, which is characterized in that be encrypted in JSON message determining When JSON member, member's determination unit is used for:
The JSON member to be encrypted JSON member of the key-value pair form being determined as in the JSON message.
18. JSON message encryption device as claimed in claim 15, which is characterized in that be encrypted in JSON message determining When JSON member, member's determination unit is used for:
The JSON message is encrypted according to segment cipher mode, then obtains the corresponding encryption configuration of the JSON message Information;
From all JSON members that the JSON message includes, filter out corresponding with the encryption configuration information each JSON member, and by each JSON member filtered out be identified as the JSON to be encrypted in the JSON message at Member.
19. JSON message encryption device as claimed in claim 15, which is characterized in that the JSON member to be encrypted into Row encryption, when obtaining the corresponding encryption JSON member of the JSON member to be encrypted, the cryptographic processing unit is used for:
The value of the JSON member to be encrypted is encrypted, obtains corresponding secret value, and by the JSON member to be encrypted Value replace with the secret value, obtain the encryption JSON member.
20. JSON message encryption device as claimed in claim 15, which is characterized in that be based on the JSON member to be encrypted Associated storage relationship in the JSON message, when configuring localization and expression formula for the encryption JSON member, the positioning is matched Unit is set to be used for:
It is corresponding after member set to obtain the JSON member to be encrypted, wherein the JSON member to be encrypted is corresponding to go through Through member set be node where from the root node of the JSON message to the JSON member to be encrypted after each node On JSON member ordered set;
Based on the title of each JSON member for including after member set, it is corresponding fixed to generate the encryption JSON member Position expression formula.
21. such as the described in any item JSON message encryption devices of claim 15-20, which is characterized in that by the encryption The corresponding localization and expression formula of JSON member is organized into the replacement JSON message, obtains the corresponding encryption of the JSON message When JSON message, the message generation unit is used for:
Based on the corresponding localization and expression formula of the encryption JSON member, encryption member's array is generated, and is based on the encryption member Array generates encryption member object with the first Encryption Algorithm title used when encrypting the JSON member to be encrypted, and is based on The encryption member object generates encrypted data objects;
Based on default unique identification, it is configured to the title of associated storage for the encrypted data objects, and by the encryption number It is determined as the value for associated storage according to object;
Based on the title and described value, the encrypted data objects are converted into JSON member, and the JSON member is compiled In the root node for making the replacement JSON message, the encryption JSON message is obtained.
22. JSON message encryption device as claimed in claim 21, which is characterized in that it is being based on the encryption member object, When generating encrypted data objects, the message generation unit is also used to:
Determine the corresponding public key in receiving end, and utilize the public key, to the symmetric key used when encrypting the JSON member into Row encryption, obtains encrypted symmetric key;
Second used based on the encrypted symmetric key, the corresponding private key information of the public key and when encrypting the symmetric key Encryption Algorithm title generates cryptographic key containers object;
Based on the cryptographic key containers object, cryptographic key containers object set is generated, and the cryptographic key containers object set is organized into In the encrypted data objects.
23. a kind of literal translation formula scripting language object numbered musical notation JSON message decrypts device characterized by comprising
Packet parsing unit, for obtaining localization and expression formula from encryption JSON message;
Member's positioning unit obtains encryption JSON member for being based on the localization and expression formula from the encryption JSON message;
It is corresponding to obtain the encryption JSON member for the encryption JSON member to be decrypted for decryption processing unit JSON member;
Receive message unit obtains the encryption JSON message for being based on the corresponding JSON member of the encryption JSON member Corresponding JSON message.
24. JSON message as claimed in claim 23 decrypts device, which is characterized in that from encryption JSON message, obtain When localization and expression formula, the packet parsing unit is used for:
From the root node of the encryption JSON message, the JSON member of corresponding entitled default unique identification is obtained, and will The value of the JSON member is determined as encrypted data objects;
Encryption member object is obtained from the encrypted data objects, and from the encryption member object, obtains encryption member Array, and from encryption member's array, obtain the localization and expression formula.
25. JSON message as claimed in claim 24 decrypts device, which is characterized in that carried out to the encryption JSON member Decryption, when obtaining the corresponding JSON member of the encryption JSON member, the decryption processing unit is used for:
Obtain the first decipherment algorithm and symmetric key used when decryption is described to encrypt JSON member;
Based on first decipherment algorithm and the symmetric key, the secret value of the encryption JSON member is decrypted, is obtained Described value is replaced with to corresponding value, and by the secret value of the encryption JSON member, obtains the JSON member.
26. JSON message as claimed in claim 25 decrypts device, which is characterized in that obtain decrypt the encryption JSON at When the first decipherment algorithm used when member, the decryption processing unit is used for:
From the encryption member object, the first Encryption Algorithm title is obtained, and will be corresponding with the first Encryption Algorithm title The associated decipherment algorithm of the first Encryption Algorithm be determined as first decipherment algorithm.
27. JSON message as claimed in claim 25 decrypts device, which is characterized in that obtain decrypt the encryption JSON at When the symmetric key used when member, the decryption processing unit is used for:
If it is determined that, then according to reservation key schedule, being produced comprising not cryptographic key containers object set in the encrypted data objects The raw symmetric key;
If it is determined that include cryptographic key containers object set in the encrypted data objects, then from the cryptographic key containers object set, Cryptographic key containers object is obtained, and the cryptographic key containers object is parsed, obtains encrypted symmetric key, private key information and second After Encryption Algorithm title, private key is obtained from the private key information, and be based on the second Encryption Algorithm title, determine the second solution Close algorithm, and it is based on the private key and second decipherment algorithm, the encrypted symmetric key is decrypted, is obtained described Symmetric key.
28. as the described in any item JSON messages of claim 23-27 decrypt device, which is characterized in that be based on the encryption The corresponding JSON member of JSON member, when obtaining the corresponding JSON message of the encryption JSON message, the Receive message unit For:
If it is determined that the cipher mode that transmitting terminal uses is that full text encrypts, then by the corresponding JSON member's of the encryption JSON member Value is determined as the corresponding JSON message of the encryption JSON message;
If it is determined that the cipher mode that transmitting terminal uses is segment encryption, then by the encryption JSON in the encryption JSON message Member replaces with the JSON member, obtains the corresponding JSON message of the encryption JSON message.
29. a kind of literal translation formula scripting language object numbered musical notation JSON message processor characterized by comprising memory, processing Device and it is stored in the computer program that can be run on the memory and on the processor, which is characterized in that the processing Device realizes such as the described in any item JSON message encryption methods of claim 1-8 when executing the computer program;And/or it is real Now such as the described in any item JSON message decryption methods of claim 9-14.
30. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, such as claim 1-8 described in any item JSON message encryption methods is realized when the computer instruction is executed by processor; And/or realize such as the described in any item JSON message decryption methods of claim 9-14.
CN201910498047.8A 2019-06-10 2019-06-10 JSON message encryption method, decryption method and device Active CN110290119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910498047.8A CN110290119B (en) 2019-06-10 2019-06-10 JSON message encryption method, decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910498047.8A CN110290119B (en) 2019-06-10 2019-06-10 JSON message encryption method, decryption method and device

Publications (2)

Publication Number Publication Date
CN110290119A true CN110290119A (en) 2019-09-27
CN110290119B CN110290119B (en) 2021-11-09

Family

ID=68003654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910498047.8A Active CN110290119B (en) 2019-06-10 2019-06-10 JSON message encryption method, decryption method and device

Country Status (1)

Country Link
CN (1) CN110290119B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114065304A (en) * 2021-12-02 2022-02-18 四三九九网络股份有限公司 JSON data encryption and decryption method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9461817B2 (en) * 2009-01-20 2016-10-04 International Business Machines Corporation Method and system for encrypting JavaScript object notation (JSON) messages
CN106027553A (en) * 2016-07-02 2016-10-12 刘兴丹 Encryption/decryption method based on dynamic password
CN107451296A (en) * 2017-08-21 2017-12-08 南京焦点领动云计算技术有限公司 A kind of Website Module rendering intent based on component
CN107995160A (en) * 2017-10-26 2018-05-04 常熟市第人民医院 A kind of JSON data packet encrypting and decrypting methods based on high in the clouds management and control
CN108881172A (en) * 2018-05-22 2018-11-23 阿里巴巴集团控股有限公司 The analysis method and device of message
CN109255611A (en) * 2018-07-23 2019-01-22 北京京东尚科信息技术有限公司 Data processing method, device, system, service terminal device and client terminal device
CN109347862A (en) * 2018-11-21 2019-02-15 安徽云融信息技术有限公司 A kind of personal information data encryption processing system and method
CN109560934A (en) * 2018-10-25 2019-04-02 金蝶软件(中国)有限公司 Data tamper resistant method, device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9461817B2 (en) * 2009-01-20 2016-10-04 International Business Machines Corporation Method and system for encrypting JavaScript object notation (JSON) messages
CN106027553A (en) * 2016-07-02 2016-10-12 刘兴丹 Encryption/decryption method based on dynamic password
CN107451296A (en) * 2017-08-21 2017-12-08 南京焦点领动云计算技术有限公司 A kind of Website Module rendering intent based on component
CN107995160A (en) * 2017-10-26 2018-05-04 常熟市第人民医院 A kind of JSON data packet encrypting and decrypting methods based on high in the clouds management and control
CN108881172A (en) * 2018-05-22 2018-11-23 阿里巴巴集团控股有限公司 The analysis method and device of message
CN109255611A (en) * 2018-07-23 2019-01-22 北京京东尚科信息技术有限公司 Data processing method, device, system, service terminal device and client terminal device
CN109560934A (en) * 2018-10-25 2019-04-02 金蝶软件(中国)有限公司 Data tamper resistant method, device, computer equipment and storage medium
CN109347862A (en) * 2018-11-21 2019-02-15 安徽云融信息技术有限公司 A kind of personal information data encryption processing system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114065304A (en) * 2021-12-02 2022-02-18 四三九九网络股份有限公司 JSON data encryption and decryption method
CN114065304B (en) * 2021-12-02 2024-05-28 四三九九网络股份有限公司 JSON data encryption and decryption method

Also Published As

Publication number Publication date
CN110290119B (en) 2021-11-09

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
US20220083374A1 (en) Method for processing data, task processing system and electronic equipment
US20240013212A1 (en) Transferring cryptocurrency from a remote limited access wallet
CN104579646B (en) Method, device and circuit that the limited monotonic transformation of clobber book and encryption and decryption thereof are applied
CN111027087B (en) Enterprise information management system and method for encrypting mnemonics by applying block chain
US20120134495A1 (en) Cloud Storage Data Access Method, Apparatus and System Based on OTP
CN102055770B (en) Automatic secure protocol code implementation system based on extensive markup language (XML) description
CN102831352B (en) Equipment authorization use method and equipment for method
CN105071927B (en) Method is locally stored in a kind of mobile device data
CN1763684A (en) Method and system for backup and restore of a context encryption key
CN112487103B (en) Deep learning data set trusted sharing system based on blockchain intelligent contract
CN105553934B (en) Based on SAAS layers of omnipotent decoding methods of EAB of cloud platform
CN103618705A (en) Personal code managing tool and method under open cloud platform
CN106059762A (en) Data security processing method and apparatus
CN110312054B (en) Image encryption and decryption method, related device and storage medium
CN110084599A (en) Cipher key processing method, device, equipment and storage medium
JP5843261B2 (en) A system that authenticates whether a string is accepted by an automaton
CN112016104B (en) Encryption method, device and system for financial sensitive data
CN102693597A (en) Local printing method based on remote bill information and apparatus thereof
Wolfe et al. Secret sharing MPC on FPGAs in the datacenter
Huang et al. More efficient secure matrix multiplication for unbalanced recommender systems
CN115174261A (en) Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution
CN110290119A (en) A kind of JSON message encryption method, decryption method and device
CN110266484A (en) A kind of data ciphering method, device, equipment and medium
CN109474418A (en) File enciphering method, document decryption method, device, medium and calculating equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant