CN110708273A - Data encryption and decryption method and data encryption and decryption system - Google Patents
Data encryption and decryption method and data encryption and decryption system Download PDFInfo
- Publication number
- CN110708273A CN110708273A CN201810751750.0A CN201810751750A CN110708273A CN 110708273 A CN110708273 A CN 110708273A CN 201810751750 A CN201810751750 A CN 201810751750A CN 110708273 A CN110708273 A CN 110708273A
- Authority
- CN
- China
- Prior art keywords
- data
- program
- preset
- hash value
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a data encryption method, a data decryption method and a data encryption and decryption system, wherein the data encryption method is applied to sender equipment and comprises the following steps: acquiring source data; encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data; generating a decryption program corresponding to a preset encryption algorithm according to the preset encryption algorithm; generating an execution program including encrypted data and a decryption program; and carrying out preset processing on the executive program to obtain target data, and sending the target data to the receiving party equipment. The receiving side device may process the target data after receiving the target data to obtain an execution program, and may obtain the source data by running the execution program. Therefore, the sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can complete data encryption transmission without performing complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
Description
Technical Field
The present invention relates to the field of data encryption processing technologies, and in particular, to a data encryption and decryption method and a data encryption and decryption system.
Background
In the data transmission process, because the security requirement of some data is high, encryption transmission is required during transmission. In order to realize encrypted transmission of data, the sender device may encrypt source data according to an agreed encryption mode, and send the encrypted data to the receiver device, and then, after receiving the encrypted data, the receiver device may decrypt the encrypted data according to a decryption mode corresponding to the agreed encryption mode, so as to obtain the source data.
When encrypting and transmitting source data, two encryption and decryption modes are generally included, which are a symmetric encryption mode and an asymmetric encryption mode respectively. The symmetric encryption method refers to a method in which, through a set of keys, the sender device and the receiver device can perform data encryption and decryption processing respectively according to the set of keys. The asymmetric encryption mode means that data encryption is carried out by the sender device according to a public key and data decryption is carried out by the receiver device according to a private key through two groups of keys, namely the public key and the private key.
No matter which data encryption and decryption mode is adopted, the key for encryption and decryption needs to be determined in advance by the sender equipment and the receiver equipment, the interaction process is complicated, the data encryption and transmission efficiency is low, and the method is particularly not suitable for a scene needing only one-time data encryption and transmission.
Disclosure of Invention
The embodiment of the invention aims to provide a data encryption method, a data decryption method and a data encryption and decryption system, so as to simplify an interaction process and improve data encryption transmission efficiency. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a data encryption method, which is applied to a sender device, where the method includes:
acquiring source data;
encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data;
generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm;
generating an execution program including the encrypted data and the decryption program;
and carrying out preset processing on the executive program to obtain target data, and sending the target data to receiver equipment.
Optionally, the step of generating an execution program including the encrypted data and the decryption program includes:
filling a data segment included in the encrypted data to a preset position in a code of the decryption program to obtain a filled code;
and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
Optionally, after the step of filling the data segment included in the encrypted data into the code of the decryption program, the method further includes:
and carrying out preset optimization processing on the filled codes to obtain the filled codes.
Optionally, the step of performing preset processing on the execution program to obtain target data includes:
and generating a two-dimensional code by the execution program according to a first preset mode to serve as target data.
Optionally, the method further includes:
calculating a hash value corresponding to the executive program;
and sending the hash value to the receiver equipment.
Optionally, the step of performing preset processing on the execution program to obtain target data includes:
performing shell adding processing on the execution program to obtain data after shell adding;
and generating a two-dimensional code by using the data after the shell is added according to a second preset mode, wherein the two-dimensional code is used as target data.
Optionally, the method further includes:
calculating a hash value corresponding to the shelled data;
and sending the hash value to the receiver equipment.
In a second aspect, an embodiment of the present invention provides a data decryption method, which is applied to a receiving device, and the method includes:
receiving target data sent by sender equipment, wherein the target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program, the encrypted data is obtained by performing encryption processing on source data by adopting a preset encryption algorithm, and the decryption program is a decryption program corresponding to the preset encryption algorithm;
performing preset inverse processing on the target data to obtain an executive program, wherein the preset inverse processing is an inverse process of the preset processing;
and operating the executive program to obtain the source data.
Optionally, the target data is a two-dimensional code;
the step of performing preset inverse processing on the target data to obtain an execution program includes:
and analyzing the two-dimensional code to obtain an executive program.
Optionally, before the step of executing the execution program, the method further includes:
receiving a hash value sent by the sender equipment;
calculating a hash value corresponding to the executive program;
judging whether the hash value obtained by calculation is the same as the received hash value;
if so, the executive program is run.
In a third aspect, an embodiment of the present invention provides a data encryption and decryption system, where the system includes a sender device and a receiver device, where:
the sender equipment is used for acquiring source data; encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data; generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm; generating an execution program including the encrypted data and the decryption program; presetting the executive program to obtain target data, and sending the target data to the receiver equipment;
the receiver device is configured to receive the target data sent by the sender device; performing preset inverse processing on the target data to obtain an executive program; and operating the executive program to obtain the source data, wherein the preset reverse processing is the reverse process of the preset processing.
Optionally, the sender device is specifically configured to fill a data segment included in the encrypted data to a preset position in a code of the decryption program, so as to obtain a filled code; and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
Optionally, the sender device is further configured to perform preset optimization processing on a filled code after filling a data segment included in the encrypted data into the code of the decryption program, so as to obtain the filled code.
Optionally, the sender device is specifically configured to generate a two-dimensional code as the target data by the execution program according to a first preset manner;
the receiving device is specifically configured to analyze the two-dimensional code to obtain an execution program.
Optionally, the sender device is further configured to calculate a hash value corresponding to the execution program; sending the hash value to the receiver device;
the receiver device is further configured to receive the hash value sent by the sender device; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
Optionally, the sender device specifically performs a shell adding process on the execution program to obtain the data after shell adding; generating a two-dimensional code according to the data subjected to the shell adding in a second preset mode, wherein the two-dimensional code is used as the target data;
the receiving device is specifically configured to analyze the two-dimensional code to obtain an execution program.
Optionally, the sender device is further configured to calculate a hash value corresponding to the shelled data; sending the hash value to the receiver device;
the receiver device is further configured to receive the hash value sent by the sender device; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
The embodiment of the invention also provides sender equipment, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory finish mutual communication through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing any one of the steps of the data encryption method when executing the program stored in the memory.
The embodiment of the invention also provides a receiver device, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing any one of the steps of the data decryption method when executing the program stored in the memory.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements any of the above data encryption method steps.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements any of the above data decryption method steps.
In the scheme provided by the embodiment of the invention, after the sender equipment acquires the source data, the source data is encrypted by adopting a preset encryption algorithm to obtain encrypted data, then a decryption program corresponding to the preset encryption algorithm is generated according to the preset encryption algorithm, an execution program comprising the encrypted data and the decryption program is regenerated, further, the execution program is preset to obtain target data, and the target data is sent to the receiver equipment. In this way, the receiving device may process the target data after receiving the target data to obtain the execution program, and may obtain the source data by running the execution program. Therefore, the sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can complete data encryption transmission without performing complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a data encryption method according to an embodiment of the present invention;
FIG. 2 is a detailed flowchart of step S105 in the embodiment shown in FIG. 1;
fig. 3 is a flowchart of a data decryption method according to an embodiment of the present invention;
FIG. 4 is a flow chart of the manner in which an executive runs based on the embodiment shown in FIG. 3;
fig. 5 is a schematic structural diagram of a data encryption and decryption system according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a sender device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to simplify the interaction process of data encryption transmission and improve the data encryption transmission efficiency, the embodiment of the invention provides a data encryption method, a data decryption method, a data encryption and decryption system, sender equipment, receiver equipment and a computer-readable storage medium.
First, a data encryption method provided in an embodiment of the present invention is described below.
The data encryption method provided by the embodiment of the invention can be applied to any electronic equipment which needs to carry out data encryption transmission, such as a computer, a mobile phone, a processor and the like, and for convenience of description, the data encryption method is referred to as sender equipment for short.
As shown in fig. 1, a data encryption method is applied to a sender device, and the method includes:
s101, acquiring source data;
s102, encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data;
s103, generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm;
s104, generating an executive program comprising the encrypted data and the decryption program;
and S105, performing preset processing on the executive program to obtain target data, and sending the target data to the receiver equipment.
As can be seen, in the scheme provided in the embodiment of the present invention, after obtaining source data, a sending party device encrypts the source data by using a preset encryption algorithm to obtain encrypted data, then generates a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm, and then generates an execution program including the encrypted data and the decryption program, and further performs preset processing on the execution program to obtain target data, and sends the target data to a receiving party device. In this way, the receiving device may process the target data after receiving the target data to obtain the execution program, and may obtain the source data by running the execution program. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
In the above step S101, the sender device may acquire the source data. The source data is data that needs to be encrypted for transmission. The type of the source data and the obtaining manner thereof are not specifically limited in the embodiments of the present invention. The source data may be any type of data that needs to be encrypted for transmission, and may be data stored in the sender device, or may be data acquired by the sender device from other electronic devices, which is reasonable. For example, in an application scenario where a one-time permission is opened for a visitor, the permission opening data is data that needs to be encrypted and transmitted, that is, source data acquired by a sender device.
After the sender device obtains the source data, in order to ensure the security of the source data in the transmission process, the step S102 may be executed, that is, the sender device may perform encryption processing on the source data by using a preset encryption algorithm, so as to obtain encrypted data. The preset encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm, and the embodiment of the present invention is not specifically limited herein as long as the source data can be encrypted. For example, it may be AES128 Encryption algorithm (Advanced Encryption Standard), elliptic curve Encryption algorithm, SHA1 Encryption algorithm, or the like.
In order for the receiving device to obtain the source data by running the execution program, after determining the preset encryption algorithm, the sending device may generate a corresponding decryption program according to the preset encryption algorithm, and execute step S103. As for the specific manner of generating the decryption program corresponding to the preset decryption algorithm according to the preset decryption algorithm, any relevant manner in the field of data encryption and decryption processing may be adopted as long as the decryption program corresponding to the preset encryption algorithm can be generated, and no specific limitation and description are made herein.
For example, if the preset encryption algorithm is the AES128 encryption algorithm, the sender device may generate a decryption program corresponding to the AES128 encryption algorithm; assuming that the predetermined encryption algorithm is the SHA1 encryption algorithm, the sender device may generate a decryption program corresponding to the SHA1 encryption algorithm.
It should be noted that, the execution sequence of the step S102 and the step S103 is not limited in sequence, and the step S102 may be executed first, and then the step S103 may be executed; step S103 may be executed first, and then step S102 may be executed; it is reasonable to execute step S102 and step S103 at the same time.
After obtaining the encrypted data and the decryption program, the sender device may execute step S104, that is, generate an execution program including the encrypted data and the decryption program. The sender device may generate an execution program including the encrypted data and the decryption program according to a certain rule. For clarity and layout, the following description will be given by way of example of a specific manner of generating an execution program including the encrypted data and the decryption program.
Furthermore, after obtaining the execution program, the sender device may perform preset processing on the execution program to obtain target data for transmission. The target data is then sent to the recipient device. The preset processing may be processing such as packaging and encapsulation, and is not specifically limited herein, as long as the execution program of the receiving device is not affected, and the source data is obtained.
Of course, the preset process may also be: no processing is performed on the execution program. That is, it is also reasonable that the sender apparatus transmits the obtained execution program to the receiver apparatus without performing any processing on the execution program.
As an implementation manner of the embodiment of the present invention, the step of generating the execution program including the encrypted data and the decryption program may include:
filling a data segment included in the encrypted data to a preset position in a code of the decryption program to obtain a filled code; and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
In this embodiment, the sender device may fill a data segment included in the encrypted data to a preset position in a code of the decryption program, and further obtain the filled code. The encrypted data obtained by encrypting the source data by using the preset encryption algorithm may include a plurality of data segments, and when the decryption program is generated, the sender device may fill the data segments to a preset position in a code of the decryption program.
Wherein, the preset position can be: in the decryption program, the execution of the generated execution program is not affected, and the location of the source data is made available by executing the execution program. For example, the location may be a static storage area, a local variable, a global variable, etc. in the decryption program. Assuming that the decryption program is a decryption program corresponding to the AES128 encryption algorithm, the predetermined position in the code of the decryption program may be within the decryption program
For example, assuming that the adopted encryption algorithm is the AES128 encryption algorithm, the corresponding decryption program and the corresponding AES128 decryption program are used, and the sender device may store the encrypted data obtained by encrypting the source data by the AES128 encryption algorithm in the global variable a of the decryption program. Therefore, when the receiving-side device runs the execution program including the decryption program, the encrypted data can be acquired from the global variable a, and then decryption processing is performed, so that the source data can be acquired.
After the filled code is obtained, the sender device may compile the filled code, and may obtain an execution program including encrypted data and a decryption program. The embodiment of the present invention is not specifically limited herein with respect to a specific compiling mode, and may be implemented by using a related technology in code compiling.
Therefore, in the embodiment of the present invention, the sending device may fill the data segment included in the encrypted data to the preset position in the code of the decryption program to obtain the filled code, and then compile the filled code to obtain the execution program including the encrypted data and the decryption program. In this way, the sender device can quickly generate the executive program and make the source data available by running the executive program. The efficiency of data encryption transmission is further improved.
In order to further improve data security, as an implementation manner of the embodiment of the present invention, after the step of filling the data segment included in the encrypted data into the code of the decryption program, the method may further include:
and carrying out preset optimization processing on the filled codes to obtain the filled codes.
In order to further improve data security, after the sender device fills the data segment included in the encrypted data into the code of the decryption program, the sender device may perform preset optimization processing on the filled code, so as to obtain the filled code. In this way, the sender device may compile the filled code after performing the preset optimization processing, thereby obtaining the execution program.
The preset optimization processing may be any optimization processing method capable of improving data security, for example, the preset optimization processing may be program interface hiding processing, hidden encrypted data processing, shell-adding and packaging processing on an obtained code, and the like, which is not limited specifically herein.
As can be seen, in this embodiment, after the sender device fills the data segment included in the encrypted data into the code of the decryption program, the sender device may perform preset optimization processing on the filled code to obtain the filled code. By the processing mode, the execution program can be optimized, and the safety of data transmission is improved.
As an implementation manner of the embodiment of the present invention, the step of performing preset processing on the execution program to obtain the target data may include:
and generating a two-dimensional code by the execution program according to a first preset mode to serve as target data.
In order to facilitate encrypted transmission of data, in an embodiment, the sending device may generate a two-dimensional code according to a first preset manner by using the execution program, and send the two-dimensional code as target data to the receiving device.
The two-dimensional code (2-dimensional bar code) is a black and white alternate pattern which is distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure and can record data symbol information. For example, QR code (QuickResponse), PDF417, Data Matrix, etc.
In this embodiment, the sender device may generate any two-dimensional code from the execution program, and is not limited specifically herein. It can be understood that the first preset mode is a two-dimensional code generation mode corresponding to the type of the two-dimensional code to be generated. For example, if the execution program generates a QR code, the first preset mode is a generation mode of the QR code; if the execution program generates the PDF417, the first preset mode is the generation mode of the PDF 417.
As can be seen, in this embodiment, the sender device may generate the two-dimensional code according to the first preset manner by using the execution program, and send the two-dimensional code to the receiver device as the target data. Therefore, the method is more beneficial to the transmission of the encrypted data, can conveniently and quickly send the target data to the equipment of the receiving party, and improves the data encryption transmission efficiency.
Since the data transmission process may be tampered, forged, and the like, in order to facilitate the receiving device to verify the authenticity of the received target data, as an implementation manner of the embodiment of the present invention, the method may further include:
calculating a hash value corresponding to the executive program; and sending the hash value to the receiver equipment.
Since the hash value can be used as a unique value of a fixed size representing a large amount of data, a small change in data may cause an unpredictable large change in the hash value, so that the sender device and the receiver device can use the hash value as a criterion for measuring the authenticity of the target data.
The sender device may calculate a hash value corresponding to the execution program, and send the calculated hash value to the receiver device, so that the receiver device may determine the authenticity of the received target data according to the hash value after receiving the target data and the hash value. If the target data is falsified or forged in the data encryption transmission process, the hash value of the target data is changed, and the receiving device can determine that the target data is falsified or forged and belongs to illegal data through the change of the hash value.
The method for calculating the hash value corresponding to the execution program may adopt a numerical analysis method, a square-cut method, a radix conversion method, a string-valued hash method, and the like, which is not limited specifically herein.
As can be seen, in this embodiment, the sender device may calculate a hash value corresponding to the execution program, and send the hash value to the receiver device. Therefore, after receiving the target data and the hash value sent by the sender device, the receiver device can determine the authenticity of the target data according to the hash value, and further perform corresponding processing on the tampered or forged data to ensure the data security.
In order to further improve the security of encrypted data transmission, as shown in fig. 2, the step of performing the preset processing on the execution program to obtain the target data may include:
s201, performing shell adding processing on the executive program to obtain data after shell adding;
in order to prevent the generated executive program from being cracked by a reverse processing mode such as disassembling and the like to obtain a decryption mode, the shelling processing is to further package the executive program, so that the difficulty of cracking the running process and the content of the executive program can be increased, therefore, the sender device can package the generated executive program by a shelling processing mode on the executive program, and further obtain the shelled data.
On the other hand, the computer program can be compressed by performing the shell adding processing on the computer program, and the compressed computer program can be directly run, so that the shell adding processing on the executive program does not influence the receiving device to process the target data to obtain the source data.
And S202, generating a two-dimensional code by the data after the shell is added according to a second preset mode, and using the two-dimensional code as target data.
Similarly, in order to facilitate encrypted transmission of data, after the data after being shelled is obtained, the sender device may generate a two-dimensional code according to a second preset mode on the data after being shelled, and the two-dimensional code is used as target data. The two-dimensional code may be a QR code (QuickResponse), PDF417, Data Matrix, or the like.
The second preset mode may be the same as or different from the first preset mode, and similarly, the second preset mode is a two-dimensional code generation mode corresponding to the type of the two-dimensional code to be generated. For example, if the execution program generates a QR code, the second preset mode is a generation mode of the QR code; if the Data Matrix is generated by the execution program, the second preset mode is the generation mode of the Data Matrix.
As can be seen, in this embodiment, the sender device may first perform shell adding processing on the execution program to obtain the data after shell adding, and then generate the two-dimensional code according to a second preset mode for the data after shell adding, and send the two-dimensional code as the target data to the receiver device. Therefore, the difficulty of cracking the running process and the content of the executive program can be increased, and the safety of encrypted data transmission is further improved.
For the case of performing the shell processing on the execution program, the method may further include:
calculating a hash value corresponding to the shelled data; and sending the hash value to the receiver equipment.
The characteristics of the hash value are already described in the above embodiment of calculating the hash value corresponding to the execution program, and are not described herein again. Due to the characteristics of the hash value, in order to facilitate the receiving device to verify the authenticity of the received target data, the sending device may calculate the hash value corresponding to the shelled data, and send the calculated hash value to the receiving device.
Therefore, after receiving the target data and the hash value, the receiving device can determine the authenticity of the received target data according to the hash value. If the target data is falsified or forged in the data encryption transmission process, the hash value of the target data is changed, and the receiving device can determine that the target data is falsified or forged and belongs to illegal data through the change of the hash value.
The method for calculating the hash value corresponding to the execution program may adopt a numerical analysis method, a square-cut method, a radix conversion method, a string-valued hash method, and the like, which is not limited specifically herein.
As can be seen, in this embodiment, the sender device may calculate a hash value corresponding to the shelled data, and send the hash value to the receiver device. Therefore, after receiving the target data and the hash value sent by the sender device, the receiver device can determine the authenticity of the target data according to the hash value, and further perform corresponding processing on the forged data to ensure the data security.
Corresponding to the data encryption method, the embodiment of the invention also provides a data decryption method.
A data decryption method provided in an embodiment of the present invention is described below.
The data decryption method provided by the embodiment of the invention can be applied to any electronic equipment needing data decryption, such as a computer, a mobile phone, a processor and the like, and for convenience of description, the data decryption method is simply called receiving and sending equipment in the text.
As shown in fig. 2, a data decryption method is applied to a receiving device, and the method includes:
s301, receiving target data sent by sender equipment;
the target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program, the encrypted data is obtained by performing encryption processing on source data by adopting a preset encryption algorithm, and the decryption program is a decryption program corresponding to the preset encryption algorithm.
S302, performing preset inverse processing on the target data to obtain an executive program;
wherein the preset inverse process is an inverse process of the preset process.
And S303, operating the executive program to obtain the source data.
Therefore, in the scheme provided by the embodiment of the present invention, after receiving the target data sent by the sender device, the receiver device may perform preset inverse processing on the target data to obtain an execution program, and then operate the execution program to obtain the source data. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
After the target data sent by the sender device is sent to the receiver device, in step S301, the receiver device may also receive the target data sent by the sender device. The target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program. The encrypted data is obtained by encrypting the source data by adopting a preset encryption algorithm; the decryption program is a decryption program corresponding to a preset encryption algorithm. That is, the target data may be the target data obtained by the sender device through the data encryption method.
Furthermore, in order to obtain the source data, the receiving device may perform preset inverse processing on the target data to obtain the execution program. Wherein the preset reverse processing is the reverse process of the preset processing. It can be understood that, since the target data is obtained by performing the preset processing on the execution program, in order to obtain the execution program, the receiving-side device needs to perform the inverse processing to the preset processing on the target data to obtain the execution program, and thus the preset inverse processing is the inverse process of the preset processing.
After obtaining the execution program, the receiving device may execute step S303, that is, execute the execution program to obtain the source data. Since the execution program includes the encrypted data and the decryption program, the execution of the execution program is equivalent to performing decryption processing on the encrypted data, and the source data can be obtained.
Since the shell processing does not affect the operation of the execution program, when the target data is the data obtained by performing the shell processing on the execution program including the encrypted data and the decrypted program, the receiving device is not affected to accurately obtain the source data.
As an implementation manner of the embodiment of the present invention, when the target data is a two-dimensional code, the step of performing a preset inverse process on the target data to obtain an execution program may include:
and analyzing the two-dimensional code to obtain an executive program.
If the sender device generates the two-dimensional code when performing the preset processing on the execution program and sends the two-dimensional code to the receiver device as the target data, the receiver device can analyze and process the two-dimensional code to obtain the execution program.
In this embodiment, the receiving side device may analyze the two-dimensional code by using an analysis method corresponding to the type of the two-dimensional code, which is not specifically limited and described herein. For example, if the two-dimensional code is a QR code, the analysis mode is the analysis mode of the QR code; if the two-dimensional code is PDF417, the analysis mode is the PDF417 analysis mode; if the two-dimensional code is DataMatrix, the analysis mode is that of the DataMatrix.
As can be seen, in this embodiment, when the target data sent by the sender device is a two-dimensional code, the receiver device may perform analysis processing on the two-dimensional code to obtain an execution program. In this way, the execution program can be quickly and accurately acquired for subsequent acquisition of source data.
As an implementation manner of the embodiment of the present invention, as shown in fig. 4, before the step of executing the execution program, the method may further include:
s401, receiving the hash value sent by the sender equipment;
in order to ensure the security of data, the sender device may calculate a hash value corresponding to the execution program or the shelled data, and send the hash value to the receiver device, and the receiver device may receive the hash value.
Because of a data packaging mode during the shell processing, the data content is not changed, so that the hash value corresponding to the calculation execution program of the sender is the same as the hash value corresponding to the data after the shell is calculated.
S402, calculating a hash value corresponding to the executive program;
in order to determine whether target data which is not falsified and is sent by the sender device is received, the receiver device may calculate a hash value corresponding to an execution program obtained by performing preset inverse processing on the target data.
The manner of calculating the hash value corresponding to the execution program obtained by performing the preset inverse processing on the target data may be the same as the manner of calculating the hash value corresponding to the execution program or the shelled data by the sender device, and is not specifically limited and described herein.
S403, judging whether the calculated hash value is the same as the received hash value, if so, executing the step S404; if not, executing corresponding processing.
Next, the receiving device may determine whether the calculated hash value is the same as the received hash value, and if the calculated hash value is the same as the received hash value, it indicates that the received target data is not falsified or forged and is authentic and legal data, the receiving device may continue to perform step S404 to obtain the source data.
If the calculated hash value is different from the received hash value, indicating that the received target data may have been falsified or forged, and is illegal data, the receiving-side device may perform corresponding processing to appropriately process the illegal data in order to prevent problems such as virus damage. For example, the treatment may be disposal, pulverization, destruction, or the like.
S404, operating the executive program.
If the calculated hash value is the same as the received hash value, indicating that the received target data is safe and legitimate data, the receiving device may run the execution program to obtain the source data.
As can be seen, in this embodiment, the receiver device may receive the hash value sent by the sender device, calculate a hash value corresponding to the execution program, then determine whether the calculated hash value is the same as the received hash value, and if so, run the execution program to obtain the source data. Therefore, the receiving side equipment can determine whether the received target data is legal data or not through the hash value, and when the received target data is determined to be legal data, the obtained executive program is operated, so that the safety of the data and the equipment is ensured.
Corresponding to the data encryption and decryption method, the embodiment of the invention also provides a data encryption and decryption system.
The following describes a data encryption and decryption system provided in an embodiment of the present invention.
As shown in fig. 5, a data decryption system, the system comprising a sender device 510 and a receiver device 520, wherein: :
the sender device 510, configured to obtain source data; encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data; generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm; generating an execution program including the encrypted data and the decryption program; presetting the execution program to obtain target data, and sending the target data to the receiver device 520;
the receiver device 520 is configured to receive the target data sent by the sender device 510; performing preset inverse processing on the target data to obtain an executive program; and operating the executive program to obtain the source data, wherein the preset reverse processing is the reverse process of the preset processing.
As can be seen, in the scheme provided in the embodiment of the present invention, after obtaining source data, a sending party device encrypts the source data by using a preset encryption algorithm to obtain encrypted data, then generates a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm, and then generates an execution program including the encrypted data and the decryption program, and further performs preset processing on the execution program to obtain target data, and sends the target data to a receiving party device. In this way, the receiving device may process the target data after receiving the target data to obtain the execution program, and may obtain the source data by running the execution program. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
As an implementation manner of the embodiment of the present invention, the sender device 510 may be specifically configured to fill a data segment included in the encrypted data to a preset position in a code of the decryption program, so as to obtain a filled code; and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
As an implementation manner of the embodiment of the present invention, the sender device 510 may be further configured to perform preset optimization processing on a filled code after filling a data segment included in the encrypted data into the code of the decryption program, so as to obtain the filled code.
As an implementation manner of the embodiment of the present invention, the sender device 510 may be specifically configured to generate, by the execution program, a two-dimensional code as the target data according to a first preset manner;
the receiving device 520 may be specifically configured to perform parsing on the two-dimensional code to obtain an execution program.
As an implementation manner of the embodiment of the present invention, the sender device 510 may be further configured to calculate a hash value corresponding to the execution program; sending the hash value to the recipient device 520;
the receiver device 520 may be further configured to receive the hash value sent by the sender device 510; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
As an implementation manner of the embodiment of the present invention, the sender device 510 may specifically perform shell adding processing on the execution program to obtain the data after shell adding; generating a two-dimensional code according to the data subjected to the shell adding in a second preset mode, wherein the two-dimensional code is used as the target data;
the receiving device 520 may be specifically configured to perform parsing on the two-dimensional code to obtain an execution program.
As an implementation manner of the embodiment of the present invention, the sender device 510 may be further configured to calculate a hash value corresponding to the shelled data; sending the hash value to the recipient device 520;
the receiver device 520 may be further configured to receive the hash value sent by the sender device 510; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
The embodiment of the present invention further provides a sender device, as shown in fig. 6, which includes a processor 601, a communication interface 602, a memory 603, and a communication bus 604, where the processor 601, the communication interface 602, and the memory 603 complete mutual communication through the communication bus 604,
a memory 603 for storing a computer program;
the processor 601 is configured to implement the following steps when executing the program stored in the memory 603:
acquiring source data;
encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data;
generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm;
generating an execution program including the encrypted data and the decryption program;
and carrying out preset processing on the executive program to obtain target data, and sending the target data to receiver equipment.
As can be seen, in the scheme provided in the embodiment of the present invention, after obtaining source data, a sending party device encrypts the source data by using a preset encryption algorithm to obtain encrypted data, then generates a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm, and then generates an execution program including the encrypted data and the decryption program, and further performs preset processing on the execution program to obtain target data, and sends the target data to a receiving party device. In this way, the receiving device may process the target data after receiving the target data to obtain the execution program, and may obtain the source data by running the execution program. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
The communication bus mentioned in the above-mentioned sender device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the sender device and other devices.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The step of generating an execution program including the encrypted data and the decryption program may include:
filling a data segment included in the encrypted data to a preset position in a code of the decryption program to obtain a filled code;
and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
After the step of filling the data segment included in the encrypted data into the code of the decryption program, the method may further include:
and carrying out preset optimization processing on the filled codes to obtain the filled codes.
The step of performing the preset processing on the execution program to obtain the target data may include:
and generating a two-dimensional code by the execution program according to a first preset mode to serve as target data.
Wherein, the method can also comprise:
calculating a hash value corresponding to the executive program;
and sending the hash value to the receiver equipment.
The step of performing the preset processing on the execution program to obtain the target data may include:
performing shell adding processing on the execution program to obtain data after shell adding;
and generating a two-dimensional code by using the data after the shell is added according to a second preset mode, wherein the two-dimensional code is used as target data.
Wherein, the method can also comprise:
calculating a hash value corresponding to the shelled data;
and sending the hash value to the receiver equipment.
The embodiment of the present invention further provides a receiver device, as shown in fig. 7, which includes a processor 701, a communication interface 702, a memory 703 and a communication bus 704, where the processor 701, the communication interface 702, and the memory 703 complete mutual communication through the communication bus 704,
a memory 703 for storing a computer program;
the processor 701 is configured to implement the following steps when executing the program stored in the memory 703:
receiving target data sent by sender equipment, wherein the target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program, the encrypted data is obtained by performing encryption processing on source data by adopting a preset encryption algorithm, and the decryption program is a decryption program corresponding to the preset encryption algorithm;
performing preset inverse processing on the target data to obtain an executive program, wherein the preset inverse processing is an inverse process of the preset processing;
and operating the executive program to obtain the source data.
Therefore, in the scheme provided by the embodiment of the present invention, after receiving the target data sent by the sender device, the receiver device may perform preset inverse processing on the target data to obtain an execution program, and then operate the execution program to obtain the source data. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
The communication bus mentioned in the above-mentioned receiving device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the receiving device and other devices.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The target data can be a two-dimensional code;
the step of performing preset inverse processing on the target data to obtain an execution program may include:
and analyzing the two-dimensional code to obtain an executive program.
Before the step of executing the execution program, the method may further include:
receiving a hash value sent by the sender equipment;
calculating a hash value corresponding to the executive program;
judging whether the hash value obtained by calculation is the same as the received hash value;
if so, the executive program is run.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and when executed by a processor, the computer program implements the following steps:
acquiring source data;
encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data;
generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm;
generating an execution program including the encrypted data and the decryption program;
and carrying out preset processing on the executive program to obtain target data, and sending the target data to receiver equipment.
It can be seen that in the solution provided in the embodiment of the present invention, when the computer program is executed by the processor, the computer program obtains the source data, encrypts the source data by using the preset encryption algorithm to obtain encrypted data, generates the decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm, and then generates the execution program including the encrypted data and the decryption program, and further performs the preset processing on the execution program to obtain the target data, and sends the target data to the receiving device. In this way, the receiving device may process the target data after receiving the target data to obtain the execution program, and may obtain the source data by running the execution program. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
The step of generating an execution program including the encrypted data and the decryption program may include:
filling a data segment included in the encrypted data to a preset position in a code of the decryption program to obtain a filled code;
and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
After the step of filling the data segment included in the encrypted data into the code of the decryption program, the method may further include:
and carrying out preset optimization processing on the filled codes to obtain the filled codes.
The step of performing the preset processing on the execution program to obtain the target data may include:
and generating a two-dimensional code by the execution program according to a first preset mode to serve as target data.
Wherein, the method can also comprise:
calculating a hash value corresponding to the executive program;
and sending the hash value to the receiver equipment.
The step of performing the preset processing on the execution program to obtain the target data may include:
performing shell adding processing on the execution program to obtain data after shell adding;
and generating a two-dimensional code by using the data after the shell is added according to a second preset mode, wherein the two-dimensional code is used as target data.
Wherein, the method can also comprise:
calculating a hash value corresponding to the shelled data;
and sending the hash value to the receiver equipment.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and when executed by a processor, the computer program implements the following steps:
receiving target data sent by sender equipment, wherein the target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program, the encrypted data is obtained by performing encryption processing on source data by adopting a preset encryption algorithm, and the decryption program is a decryption program corresponding to the preset encryption algorithm;
performing preset inverse processing on the target data to obtain an executive program, wherein the preset inverse processing is an inverse process of the preset processing;
and operating the executive program to obtain the source data.
As can be seen, in the solution provided in the embodiment of the present invention, after the computer program is executed by the processor to receive the target data sent by the sender device, the preset inverse processing may be performed on the target data to obtain an execution program, and the execution program is further executed to obtain the source data. The sender equipment and the receiver equipment do not need to determine the encryption and decryption keys in advance, and can finish data encryption transmission without complicated interaction, so that the efficiency of data encryption transmission is greatly improved.
It should be noted that, for the above system, sender device, receiver device and computer-readable storage medium embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for the relevant points, refer to the partial description of the method embodiments.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (21)
1. A data encryption method applied to a sender device, the method comprising:
acquiring source data;
encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data;
generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm;
generating an execution program including the encrypted data and the decryption program;
and carrying out preset processing on the executive program to obtain target data, and sending the target data to receiver equipment.
2. The method according to claim 1, wherein the step of generating an execution program including the encrypted data and the decryption program includes:
filling a data segment included in the encrypted data to a preset position in a code of the decryption program to obtain a filled code;
and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
3. The method of claim 2, wherein after the step of padding the data segment included in the encrypted data into the code of the decryption program, the method further comprises:
and carrying out preset optimization processing on the filled codes to obtain the filled codes.
4. The method according to any one of claims 1 to 3, wherein the step of performing the predetermined processing on the execution program to obtain the target data comprises:
and generating a two-dimensional code by the execution program according to a first preset mode to serve as target data.
5. The method of claim 4, wherein the method further comprises:
calculating a hash value corresponding to the executive program;
and sending the hash value to the receiver equipment.
6. The method according to any one of claims 1 to 3, wherein the step of performing the predetermined processing on the execution program to obtain the target data comprises:
performing shell adding processing on the execution program to obtain data after shell adding;
and generating a two-dimensional code by using the data after the shell is added according to a second preset mode, wherein the two-dimensional code is used as target data.
7. The method of claim 6, wherein the method further comprises:
calculating a hash value corresponding to the shelled data;
and sending the hash value to the receiver equipment.
8. A data decryption method, applied to a receiving device, the method comprising:
receiving target data sent by sender equipment, wherein the target data is obtained by performing preset processing on an execution program comprising encrypted data and a decryption program, the encrypted data is obtained by performing encryption processing on source data by adopting a preset encryption algorithm, and the decryption program is a decryption program corresponding to the preset encryption algorithm;
performing preset inverse processing on the target data to obtain an executive program, wherein the preset inverse processing is an inverse process of the preset processing;
and operating the executive program to obtain the source data.
9. The method of claim 8, wherein the target data is a two-dimensional code;
the step of performing preset inverse processing on the target data to obtain an execution program includes:
and analyzing the two-dimensional code to obtain an executive program.
10. The method of claim 8 or 9, wherein prior to the step of running the executive, the method further comprises:
receiving a hash value sent by the sender equipment;
calculating a hash value corresponding to the executive program;
judging whether the hash value obtained by calculation is the same as the received hash value;
if so, the executive program is run.
11. A data encryption and decryption system, the system comprising a sender device and a receiver device, wherein:
the sender equipment is used for acquiring source data; encrypting the source data by adopting a preset encryption algorithm to obtain encrypted data; generating a decryption program corresponding to the preset encryption algorithm according to the preset encryption algorithm; generating an execution program including the encrypted data and the decryption program; presetting the executive program to obtain target data, and sending the target data to the receiver equipment;
the receiver device is configured to receive the target data sent by the sender device; performing preset inverse processing on the target data to obtain an executive program; and operating the executive program to obtain the source data, wherein the preset reverse processing is the reverse process of the preset processing.
12. The system of claim 11,
the sender device is specifically configured to fill a data segment included in the encrypted data to a preset position in a code of the decryption program, so as to obtain a filled code; and compiling the filled code to obtain an executive program comprising the encrypted data and the decryption program.
13. The system of claim 12,
the sender device is further configured to perform preset optimization processing on the filled code after the data segment included in the encrypted data is filled in the code of the decryption program, so as to obtain the filled code.
14. The system of any one of claims 11-13,
the sender device is specifically configured to generate a two-dimensional code as the target data by the execution program according to a first preset manner;
the receiving device is specifically configured to analyze the two-dimensional code to obtain an execution program.
15. The system of claim 14,
the sender device is further configured to calculate a hash value corresponding to the execution program; sending the hash value to the receiver device;
the receiver device is further configured to receive the hash value sent by the sender device; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
16. The system of any one of claims 11-13,
the sender device specifically performs shell adding processing on the execution program to obtain the data after shell adding; generating a two-dimensional code according to the data subjected to the shell adding in a second preset mode, wherein the two-dimensional code is used as the target data;
the receiving device is specifically configured to analyze the two-dimensional code to obtain an execution program.
17. The system of claim 16,
the sender equipment is also used for calculating a hash value corresponding to the shelled data; sending the hash value to the receiver device;
the receiver device is further configured to receive the hash value sent by the sender device; calculating a hash value corresponding to the executive program; judging whether the hash value obtained by calculation is the same as the received hash value; if so, the executive program is run.
18. The sender equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1 to 7 when executing a program stored in the memory.
19. The receiving device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 8 to 10 when executing a program stored in the memory.
20. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 7.
21. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 8-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810751750.0A CN110708273B (en) | 2018-07-10 | 2018-07-10 | Data encryption and decryption method and data encryption and decryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810751750.0A CN110708273B (en) | 2018-07-10 | 2018-07-10 | Data encryption and decryption method and data encryption and decryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110708273A true CN110708273A (en) | 2020-01-17 |
CN110708273B CN110708273B (en) | 2022-03-04 |
Family
ID=69192184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810751750.0A Active CN110708273B (en) | 2018-07-10 | 2018-07-10 | Data encryption and decryption method and data encryption and decryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110708273B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339558A (en) * | 2020-02-21 | 2020-06-26 | 深圳壹账通智能科技有限公司 | Data encryption method, data decryption method, computer device and medium |
CN114401148A (en) * | 2022-01-28 | 2022-04-26 | 中企云链(北京)金融信息服务有限公司 | Communication data encryption and decryption optimization method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US20090171966A1 (en) * | 2002-07-16 | 2009-07-02 | Yangaroo, Inc. | Content distribution system and method |
US20120121236A1 (en) * | 2010-11-17 | 2012-05-17 | Electronics And Telecommunications Research Institute | Apparatus and method for generating digital cinema content and apparatus and method for playing digital cinema content |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN106295370A (en) * | 2016-08-19 | 2017-01-04 | 北京奇虎科技有限公司 | A kind of method and apparatus of the dynamic link library (DLL) file reinforcing installation kit |
CN107545189A (en) * | 2017-06-26 | 2018-01-05 | 新华三技术有限公司 | A kind of file preparation method and device |
CN107579962A (en) * | 2017-08-24 | 2018-01-12 | 中积有限公司 | A kind of method and device of source code encryption and decryption |
-
2018
- 2018-07-10 CN CN201810751750.0A patent/CN110708273B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090171966A1 (en) * | 2002-07-16 | 2009-07-02 | Yangaroo, Inc. | Content distribution system and method |
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US20120121236A1 (en) * | 2010-11-17 | 2012-05-17 | Electronics And Telecommunications Research Institute | Apparatus and method for generating digital cinema content and apparatus and method for playing digital cinema content |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN106295370A (en) * | 2016-08-19 | 2017-01-04 | 北京奇虎科技有限公司 | A kind of method and apparatus of the dynamic link library (DLL) file reinforcing installation kit |
CN107545189A (en) * | 2017-06-26 | 2018-01-05 | 新华三技术有限公司 | A kind of file preparation method and device |
CN107579962A (en) * | 2017-08-24 | 2018-01-12 | 中积有限公司 | A kind of method and device of source code encryption and decryption |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339558A (en) * | 2020-02-21 | 2020-06-26 | 深圳壹账通智能科技有限公司 | Data encryption method, data decryption method, computer device and medium |
WO2021164462A1 (en) * | 2020-02-21 | 2021-08-26 | 深圳壹账通智能科技有限公司 | Data encryption method, data decryption method, computer device, and medium |
CN114401148A (en) * | 2022-01-28 | 2022-04-26 | 中企云链(北京)金融信息服务有限公司 | Communication data encryption and decryption optimization method |
Also Published As
Publication number | Publication date |
---|---|
CN110708273B (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9584311B2 (en) | Decrypting data | |
CN102163268B (en) | The term of execution verifying software code the method and apparatus of integrality | |
US11824967B2 (en) | Electronic device using homomorphic encryption and encrypted data processing method thereof | |
CN112202754B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN110995720B (en) | Encryption method, device, host terminal and encryption chip | |
CN209803788U (en) | PCIE credible password card | |
WO2020233047A1 (en) | Page test method and apparatus | |
US8774407B2 (en) | System and method for executing encrypted binaries in a cryptographic processor | |
US20240048354A1 (en) | Electronic device using homomorphic encryption and encrypted data processing method thereof | |
CN110708273B (en) | Data encryption and decryption method and data encryption and decryption system | |
WO2017006118A1 (en) | Secure distributed encryption system and method | |
CN111479265B (en) | Information dissemination method and device, computer equipment and storage medium | |
CN110636067A (en) | Data encryption method, data decryption method and device | |
CN111181944B (en) | Communication system, information distribution method, device, medium, and apparatus | |
CN106254304B (en) | Method and system for facilitating secure communications | |
CN112910641B (en) | Verification method and device for cross-link transaction supervision, relay link node and medium | |
EP2286610B1 (en) | Techniques for peforming symmetric cryptography | |
CN115935388B (en) | Software package safe sending method, device, equipment and storage medium | |
CN114826729B (en) | Data processing method, page updating method and related hardware | |
CN112182617B (en) | Processing method, device and system for interface request | |
CN104376277A (en) | Computing device, method and system | |
CN114697037A (en) | Key matching method, device, equipment and storage medium | |
Liu et al. | A parallel encryption algorithm for dual-core processor based on chaotic map | |
CN110601841B (en) | SM2 collaborative signature and decryption method and device | |
CN117118586B (en) | Block chain-based data transmission method, system, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |