CN110750799A - Information encryption method and device, electronic equipment and computer readable storage medium - Google Patents

Information encryption method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN110750799A
CN110750799A CN201910940565.0A CN201910940565A CN110750799A CN 110750799 A CN110750799 A CN 110750799A CN 201910940565 A CN201910940565 A CN 201910940565A CN 110750799 A CN110750799 A CN 110750799A
Authority
CN
China
Prior art keywords
encryption
class file
information
encryption algorithm
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910940565.0A
Other languages
Chinese (zh)
Inventor
王麒俨
王恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ELEX Technology Co Ltd
Original Assignee
Beijing ELEX Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ELEX Technology Co Ltd filed Critical Beijing ELEX Technology Co Ltd
Priority to CN201910940565.0A priority Critical patent/CN110750799A/en
Publication of CN110750799A publication Critical patent/CN110750799A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information encryption method and device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring a calling instruction of encrypted information, wherein the encrypted information comprises an encryption algorithm and a key of the encryption algorithm; according to the calling instruction, calling a class file generator to convert the encryption algorithm into an encryption class file; and loading the encrypted class file into a first ciphertext through a class loader. According to the technical scheme, the source code of the encryption algorithm is encrypted on the basis of key protection, so that the secondary encryption increases the complexity and the cracking difficulty of the encryption algorithm, reduces the risk of cracking the algorithm and effectively protects the information safety.

Description

Information encryption method and device, electronic equipment and computer readable storage medium
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of computer technologies, and in particular, to an information encryption method and apparatus, an electronic device, and a computer-readable storage medium.
[ background of the invention ]
With the continuous development of information technology, more private information is stored in a network, and the information is protected from being acquired by people with bad purposes, namely, the safety of the information is guaranteed, which is a crucial matter in the design of systems at present.
In the related art, the key and the algorithm can be stored separately through a mature encryption algorithm, and the key of the realization is to protect the key from being stolen. However, in this solution, the algorithm can still be easily obtained by others, with great risk of leakage.
Therefore, how to enhance the complexity of algorithm cracking becomes a technical problem to be solved urgently at present.
[ summary of the invention ]
The embodiment of the invention provides an information encryption method and device, electronic equipment and a computer readable storage medium, aiming at solving the technical problem that an encryption algorithm in encryption information in the related technology has a high risk of leakage, and increasing the encryption steps of the encryption algorithm, thereby enhancing the complexity of algorithm cracking and reducing the risk of algorithm cracking.
In a first aspect, an embodiment of the present invention provides an information encryption method, including: acquiring a calling instruction of encrypted information, wherein the encrypted information comprises an encryption algorithm and a key of the encryption algorithm; according to the calling instruction, calling a class file generator to convert the encryption algorithm into an encryption class file; and loading the encrypted class file into a first ciphertext through a class loader.
In the above embodiment of the present invention, optionally, before the step of calling the class file generator to convert the encryption algorithm into the encrypted class file according to the calling instruction, the method further includes: and acquiring the encryption algorithm from a first storage position according to the calling instruction.
In the above embodiment of the present invention, optionally, the method further includes: acquiring the key from a second storage position according to the calling instruction; and sending the first ciphertext and the key to an issuer of the call instruction.
In the above embodiment of the present invention, optionally, the method further includes: acquiring the key from a second storage position according to the calling instruction; encrypting the secret key through a preset encryption rule to obtain a second ciphertext; and sending the first ciphertext and the second ciphertext to an issuer of the call instruction.
In the above embodiment of the present invention, optionally, before the step of converting the encryption algorithm into the encrypted class file by the call class file generator, the method further includes: the class file generator is defined according to a predetermined encryption rule.
In the above embodiment of the present invention, optionally, before the step of converting the encryption algorithm into the encrypted class file by the call class file generator, the method further includes: and selecting the required class file generator from a preset class file generator set according to the sender information corresponding to the calling instruction and/or the type of the encryption information requested to be called by the calling instruction.
In a second aspect, an embodiment of the present invention provides an information encryption apparatus, including: the device comprises a calling instruction acquisition unit, a processing unit and a processing unit, wherein the calling instruction acquisition unit is used for acquiring a calling instruction of encrypted information, and the encrypted information comprises an encryption algorithm and a key of the encryption algorithm; the class file generating unit is used for calling the class file generator to convert the encryption algorithm into an encryption class file according to the calling instruction; and the ciphertext generating unit is used for loading the encrypted class file into a first ciphertext through the class loader.
In the above embodiment of the present invention, optionally, the method further includes: and the encryption algorithm obtaining unit is used for obtaining the encryption algorithm from a first storage position according to the calling instruction before the class file generating unit converts the encryption algorithm into the encrypted class file.
In the above embodiment of the present invention, optionally, the method further includes: the key obtaining unit is used for obtaining the key from a second storage position according to the calling instruction; and the encrypted information sending unit is used for sending the first ciphertext and the key to the sender of the calling instruction.
In the above embodiment of the present invention, optionally, the method further includes: the key obtaining unit is used for obtaining the key from a second storage position according to the calling instruction; the key encryption unit is used for encrypting the key through a preset encryption rule to obtain a second ciphertext; and the encrypted information sending unit is used for sending the first ciphertext and the second ciphertext to the sender of the calling instruction.
In the above embodiment of the present invention, optionally, the method further includes: and the class file generator defining unit is used for defining the class file generator according to a preset encryption rule before the class file generating unit converts the encryption algorithm into an encrypted class file.
In the above embodiment of the present invention, optionally, the method further includes: and the class file generator selecting unit is used for selecting the required class file generator in a preset class file generator set according to the sender information corresponding to the calling instruction and/or the type of the encryption information requested to be called by the calling instruction before the class file generating unit converts the encryption algorithm into an encrypted class file.
In a third aspect, an embodiment of the present invention provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the first aspects above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions for performing the method flow described in any one of the first aspect.
The technical scheme aims at the technical problem that the encryption algorithm for encrypting information in the related technology has high leakage risk, and the encryption steps of the encryption algorithm are increased.
Specifically, the back end of the account authentication system often receives a call instruction of an issuer to encryption information, where the encryption information includes an encryption algorithm and a key of the encryption algorithm, and by using the key in the encryption algorithm, the original information plaintext of the encryption information can be obtained. And then, the source code of the encryption algorithm can be encrypted through the class file generator to obtain an encrypted class file, and because the encrypted class file is a result of encrypting the source code of the encryption algorithm, if the sender of the calling instruction is an illegal user, only the encrypted class file can be obtained, but effective source codes cannot be obtained, so that the encryption algorithm can be protected from being cracked by the illegal user. Of course, if the sender of the call instruction is a valid user, the valid user can obtain an effective source code because the valid user has a key for decrypting the encrypted file into the source code of the encryption algorithm.
And then, the encrypted class file can be loaded into a first ciphertext through a class loader, wherein each Java class must be loaded into the memory by a certain class loader, and therefore, the class loader is used for storing the encrypted class file in the memory in the form of the first ciphertext for an issuer of the call instruction to obtain in the memory.
Through the technical scheme, the source code of the encryption algorithm is encrypted on the basis of key protection, so that the secondary encryption increases the complexity and the cracking difficulty of the encryption algorithm, reduces the risk of cracking the algorithm and effectively protects the information safety.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 shows a flow diagram of an information encryption method according to one embodiment of the invention;
FIG. 2 shows a flow diagram of an information encryption method according to another embodiment of the invention;
FIG. 3 shows a flow diagram of an information encryption method according to yet another embodiment of the invention;
FIG. 4 shows a flow diagram of an information encryption method according to yet another embodiment of the invention;
fig. 5 shows a block diagram of an information encrypting apparatus according to an embodiment of the present invention;
FIG. 6 shows a block diagram of an electronic device according to an embodiment of the invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Fig. 1 shows a flow chart of an information encryption method according to an embodiment of the present invention.
As shown in fig. 1, a flow of an information encryption method according to an embodiment of the present invention includes:
step 102, obtaining a call instruction for encrypted information, wherein the encrypted information comprises an encryption algorithm and a key of the encryption algorithm.
The back end of the account authentication system usually receives a calling instruction of an issuer to the encryption information, wherein the encryption information comprises an encryption algorithm and a key of the encryption algorithm, and the original information plaintext of the encryption information can be obtained by using the key in the encryption algorithm.
And 104, calling a class file generator to convert the encryption algorithm into an encryption class file according to the calling instruction.
The source codes of the encryption algorithm are encrypted through the class file generator to obtain the encrypted class file, and the encrypted class file is a result of encrypting the source codes of the encryption algorithm, so that if the calling instruction sender is an illegal user, only the encrypted class file can be obtained, but effective source codes cannot be obtained, and the encryption algorithm can be protected from being cracked by the illegal user. Of course, if the sender of the call instruction is a valid user, the valid user can obtain an effective source code because the valid user has a key for decrypting the encrypted file into the source code of the encryption algorithm.
And 106, loading the encrypted class file into a first ciphertext through a class loader.
Finally, the encrypted class file can be loaded into a first ciphertext through a class loader, wherein each Java class must be loaded into the memory by a certain class loader, and therefore, the class loader is used for storing the encrypted class file in the memory in the form of the first ciphertext for being acquired by an issuer of the call instruction.
The technical scheme aims at the technical problem that the encryption algorithm for encrypting information in the related technology has high leakage risk, and the encryption steps of the encryption algorithm are increased. In other words, the source code of the encryption algorithm can be encrypted on the basis of the protection of the secret key, so that the secondary encryption increases the complexity and the cracking difficulty of the encryption algorithm, reduces the risk of cracking the algorithm and effectively protects the information safety.
Fig. 2 shows a flow chart of an information encryption method according to another embodiment of the present invention.
As shown in fig. 2, a flow of an information encryption method according to another embodiment of the present invention includes:
step 202, obtaining a call instruction for encrypted information, where the encrypted information includes an encryption algorithm and a key of the encryption algorithm.
The back end of the account authentication system usually receives a calling instruction of an issuer to the encryption information, wherein the encryption information comprises an encryption algorithm and a key of the encryption algorithm, and the original information plaintext of the encryption information can be obtained by using the key in the encryption algorithm.
And step 204, acquiring the encryption algorithm from the first storage position according to the calling instruction.
In order to prevent the secret key and the encryption algorithm from being obtained by an illegal user, the secret key and the encryption algorithm can be stored to different positions, for example, the encryption algorithm is stored to a first storage position, and the secret key is stored to a second storage position, so that the difficulty of obtaining the secret key and the encryption algorithm at the same time is increased, and the information safety is further protected.
Step 206, calling a class file generator to convert the encryption algorithm into an encrypted class file.
And encrypting the source code of the encryption algorithm through a class file generator to obtain an encrypted class file.
And step 208, loading the encrypted class file into a first ciphertext through the class loader.
And loading the encrypted class file into a first ciphertext through a class loader, wherein each Java class must be loaded into the memory by a certain class loader, and therefore, the class loader is used for storing the encrypted class file in the memory in the form of the first ciphertext for an issuer of the call instruction to obtain in the memory.
Step 210, obtaining the key from a second storage location according to the call instruction.
The encryption algorithm is stored in the first storage position, and the secret key is stored in the second storage position, so that the difficulty of simultaneously obtaining the secret key and the encryption algorithm is increased, and the information safety is further protected.
Step 212, sending the first ciphertext and the key to the sender of the call instruction.
Finally, the first ciphertext and the secret key are sent to the sender of the calling instruction together, and because the encrypted file is a result of encrypting the source code of the encryption algorithm, if the sender of the calling instruction is an illegal user, only the encrypted file can be obtained, but effective source code cannot be obtained, so that the decryption of the encryption information cannot be realized on the basis that the first ciphertext cannot be decrypted no matter the encrypted file is obtained, or the secret key and the first ciphertext are obtained, so that the encryption algorithm can be protected from being decrypted by the illegal user, and the overall safety performance of the encryption information is improved.
Fig. 3 shows a flow chart of an information encryption method according to still another embodiment of the present invention.
As shown in fig. 3, the flow of the information encryption method according to still another embodiment of the present invention includes:
step 302, obtaining a call instruction for encrypted information, where the encrypted information includes an encryption algorithm and a key of the encryption algorithm.
The back end of the account authentication system usually receives a calling instruction of an issuer to the encryption information, wherein the encryption information comprises an encryption algorithm and a key of the encryption algorithm, and the original information plaintext of the encryption information can be obtained by using the key in the encryption algorithm.
Step 304, obtaining the encryption algorithm from the first storage location according to the call instruction.
In order to prevent the secret key and the encryption algorithm from being obtained by an illegal user, the secret key and the encryption algorithm can be stored to different positions, for example, the encryption algorithm is stored to a first storage position, and the secret key is stored to a second storage position, so that the difficulty of obtaining the secret key and the encryption algorithm at the same time is increased, and the information safety is further protected.
Step 306, calling a class file generator to convert the encryption algorithm into an encrypted class file.
And encrypting the source code of the encryption algorithm through a class file generator to obtain an encrypted class file.
And 308, loading the encrypted class file into a first ciphertext through the class loader.
And loading the encrypted class file into a first ciphertext through a class loader, wherein each Java class must be loaded into the memory by a certain class loader, and therefore, the class loader is used for storing the encrypted class file in the memory in the form of the first ciphertext for an issuer of the call instruction to obtain in the memory.
Step 310, obtaining the key from the second storage location according to the call instruction.
The encryption algorithm is stored in the first storage position, and the secret key is stored in the second storage position, so that the difficulty of simultaneously obtaining the secret key and the encryption algorithm is increased, and the information safety is further protected.
Step 312, encrypt the key according to a predetermined encryption rule to obtain a second ciphertext.
The predetermined encryption rule may be any encryption rule that is preset, including, but not limited to, converting the entire key content in a specified manner, converting a portion of the key content in a specified manner, and converting the content at different specified locations of the key in a specified manner, respectively, and the like. The secret key is encrypted for the second time through the preset encryption rule, so that the cracking difficulty of the secret key can be further improved, and the overall safety performance of the encrypted information is improved.
And step 314, sending the first ciphertext and the second ciphertext to the sender of the call instruction.
Finally, the first ciphertext and the second ciphertext are sent to the sender of the calling instruction together, and because the encrypted file is a result of encrypting the source code of the encryption algorithm, if the sender of the calling instruction is an illegal user, only the encrypted file can be obtained, but effective source code cannot be obtained, so that the decryption of the encryption information cannot be realized on the basis that the first ciphertext cannot be decrypted, no matter the encrypted file is obtained, or the second ciphertext and the first ciphertext are obtained, so that the encryption algorithm can be protected from being decrypted by the illegal user, and the overall safety performance of the encryption information is improved.
Fig. 4 shows a flow chart of an information encryption method according to yet another embodiment of the present invention.
As shown in fig. 4, a flow of an information encryption method according to still another embodiment of the present invention includes:
step 404, obtaining a call instruction for encrypted information, where the encrypted information includes an encryption algorithm and a key of the encryption algorithm.
Step 406, selecting a required class file generator from a predetermined class file generator set according to the issuer information corresponding to the call instruction and/or the type of the encryption information requested to be called by the call instruction.
The class file generator is definable, in other words, the encryption method for the encryption algorithm is definable, not limited to the method prescribed by a certain class file generator. Therefore, a variety of file generators can be provided to accommodate encryption requirements for different encryption information and coping requirements for different senders. The issuer information includes, but is not limited to, issuer identity information, issuer weight or level information, for example, the higher the issuer weight or level information is, the higher the security is, the higher the credibility is, so that a class file generator with simple corresponding encryption performance can be set to improve the decryption efficiency of the issuer. For another example, the lower the weight or level information of the sender, the lower the security and the lower the reliability, so that a class file generator with complicated corresponding encryption performance can be provided to ensure the security of the encrypted information on the sender. Similarly, the class file generator with simple encryption performance or the class file generator with complex encryption performance is selected, and the type of the encryption information or the type of the encryption information and the sender information can be used as the selection condition.
Through the technical scheme, the method and the device can adapt to different types of encryption information and/or different credibility senders to adjust the complexity of encrypting the encryption algorithm, and increase the practicability of secondary encryption.
Step 408, the class file generator is called to convert the encryption algorithm into an encrypted class file.
And step 410, loading the encrypted class file into a first ciphertext through a class loader.
And encrypting the source code of the encryption algorithm by a class file generator to obtain an encrypted class file, and loading the encrypted class file into a first ciphertext by a class loader, wherein each Java class must be loaded into a memory by a class loader, so that the class loader is used for storing the encrypted class file in the memory in the form of the first ciphertext for a calling instruction sender to obtain in the memory.
According to the technical scheme, the source code of the encryption algorithm can be encrypted on the basis of key protection, so that the secondary encryption increases the complexity and the cracking difficulty of the encryption algorithm, the risk of cracking the algorithm is reduced, and the information safety is effectively protected.
In addition, on the basis of the embodiments of fig. 1 to 4, the class file generator may be further defined according to a predetermined encryption rule. That is, the encryption mode of the class file generator can be adjusted according to the actual requirement to adapt to the actual security protection requirement.
Fig. 5 shows a block diagram of an information encrypting apparatus according to an embodiment of the present invention.
As shown in fig. 5, an information encrypting apparatus 500 according to an embodiment of the present invention includes: a call instruction obtaining unit 502 configured to obtain a call instruction for encrypted information, where the encrypted information includes an encryption algorithm and a key of the encryption algorithm; a class file generating unit 504, configured to invoke a class file generator to convert the encryption algorithm into an encrypted class file according to the invoking instruction; and a ciphertext generating unit 506, configured to load the encrypted class file into the first ciphertext through the class loader.
In the above embodiment of the present invention, optionally, the method further includes: an encryption algorithm obtaining unit, configured to obtain the encryption algorithm from a first storage location according to the call instruction before the class file generating unit 504 converts the encryption algorithm into the encrypted class file.
In the above embodiment of the present invention, optionally, the method further includes: the key obtaining unit is used for obtaining the key from a second storage position according to the calling instruction; and the encrypted information sending unit is used for sending the first ciphertext and the key to the sender of the calling instruction.
In the above embodiment of the present invention, optionally, the method further includes: the key obtaining unit is used for obtaining the key from a second storage position according to the calling instruction; the key encryption unit is used for encrypting the key through a preset encryption rule to obtain a second ciphertext; and the encrypted information sending unit is used for sending the first ciphertext and the second ciphertext to the sender of the calling instruction.
In the above embodiment of the present invention, optionally, the method further includes: a class file generator defining unit, configured to define the class file generator according to a predetermined encryption rule before the class file generating unit 504 converts the encryption algorithm into an encrypted class file.
In the above embodiment of the present invention, optionally, the method further includes: a class file generator selecting unit, configured to select a required class file generator from a predetermined class file generator set according to issuer information corresponding to the call instruction and/or a type of the encryption information requested to be called by the call instruction before the class file generating unit 504 converts the encryption algorithm into an encrypted class file.
The information encryption apparatus 500 uses the scheme described in any one of the embodiments shown in fig. 1 to fig. 4, and therefore, all the technical effects described above are achieved, and are not described again here.
FIG. 6 shows a block diagram of an electronic device according to an embodiment of the invention.
As shown in FIG. 6, an electronic device 600 of one embodiment of the invention includes at least one memory 602; and a processor 604 communicatively coupled to the at least one memory 602; wherein the memory stores instructions executable by the at least one processor 604 and configured to perform the aspects of any of the embodiments of fig. 1-4 described above. Therefore, the electronic device 600 has the same technical effect as any one of the embodiments of fig. 1 to 4, and is not described herein again.
The electronic device of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
In addition, an embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions for performing the method flow described in any one of the above embodiments of fig. 1 to 4.
The technical scheme of the invention is explained in detail by combining the attached drawings, and the source code of the encryption algorithm is encrypted on the basis of the protection of the secret key through the technical scheme of the invention, so that the secondary encryption increases the complexity and the cracking difficulty of the encryption algorithm, reduces the risk of cracking the algorithm and effectively protects the information security.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, etc. may be used to describe the ciphertexts in the embodiments of the present invention, the ciphertexts should not be limited to these terms. These terms are used only to distinguish ciphertext from one another. For example, the first ciphertext may also be referred to as the second ciphertext, and similarly, the second ciphertext may also be referred to as the first ciphertext without departing from the scope of embodiments of the present invention.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. An information encryption method, comprising:
acquiring a calling instruction of encrypted information, wherein the encrypted information comprises an encryption algorithm and a key of the encryption algorithm;
according to the calling instruction, calling a class file generator to convert the encryption algorithm into an encryption class file;
and loading the encrypted class file into a first ciphertext through a class loader.
2. The information encryption method according to claim 1, further comprising, before the step of calling a class file generator to convert the encryption algorithm into an encrypted class file according to the call instruction:
and acquiring the encryption algorithm from a first storage position according to the calling instruction.
3. The information encryption method according to claim 2, further comprising:
acquiring the key from a second storage position according to the calling instruction; and
and sending the first ciphertext and the key to an issuer of the call instruction.
4. The information encryption method according to claim 2, further comprising:
acquiring the key from a second storage position according to the calling instruction;
encrypting the secret key through a preset encryption rule to obtain a second ciphertext; and
and sending the first ciphertext and the second ciphertext to an issuer of the call instruction.
5. The information encryption method according to any one of claims 1 to 4, further comprising, before the step of the call class file generator converting the encryption algorithm into an encryption class file:
the class file generator is defined according to a predetermined encryption rule.
6. The information encryption method according to any one of claims 1 to 4, further comprising, before the step of the call class file generator converting the encryption algorithm into an encryption class file:
and selecting the required class file generator from a preset class file generator set according to the sender information corresponding to the calling instruction and/or the type of the encryption information requested to be called by the calling instruction.
7. An information encryption apparatus, comprising:
the device comprises a calling instruction acquisition unit, a processing unit and a processing unit, wherein the calling instruction acquisition unit is used for acquiring a calling instruction of encrypted information, and the encrypted information comprises an encryption algorithm and a key of the encryption algorithm;
the class file generating unit is used for calling the class file generator to convert the encryption algorithm into an encryption class file according to the calling instruction;
and the ciphertext generating unit is used for loading the encrypted class file into a first ciphertext through the class loader.
8. The information encryption apparatus according to claim 7, further comprising:
and the encryption algorithm obtaining unit is used for obtaining the encryption algorithm from a first storage position according to the calling instruction before the class file generating unit converts the encryption algorithm into the encrypted class file.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the preceding claims 1 to 6.
10. A computer-readable storage medium having stored thereon computer-executable instructions for performing the method flow of any of claims 1-6.
CN201910940565.0A 2019-09-30 2019-09-30 Information encryption method and device, electronic equipment and computer readable storage medium Pending CN110750799A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910940565.0A CN110750799A (en) 2019-09-30 2019-09-30 Information encryption method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910940565.0A CN110750799A (en) 2019-09-30 2019-09-30 Information encryption method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110750799A true CN110750799A (en) 2020-02-04

Family

ID=69277587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910940565.0A Pending CN110750799A (en) 2019-09-30 2019-09-30 Information encryption method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110750799A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116662941A (en) * 2023-07-31 2023-08-29 腾讯科技(深圳)有限公司 Information encryption method, device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505029A (en) * 2002-11-29 2004-06-16 ��ʽ���綫֥ Content management method, recording and/or reproducing apparatus, and recording medium
US20060259782A1 (en) * 2005-05-16 2006-11-16 Lan Wang Computer security system and method
CN103853943A (en) * 2014-02-18 2014-06-11 优视科技有限公司 Program protection method and device
CN104219044A (en) * 2014-09-22 2014-12-17 杭州华澜微科技有限公司 Key secret method for encrypting storing device
CN106549927A (en) * 2015-09-23 2017-03-29 阿里巴巴集团控股有限公司 Key preservation, acquisition methods and device
CN108038383A (en) * 2017-11-24 2018-05-15 北京顶象技术有限公司 File encrypting method, file decryption method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505029A (en) * 2002-11-29 2004-06-16 ��ʽ���綫֥ Content management method, recording and/or reproducing apparatus, and recording medium
US20060259782A1 (en) * 2005-05-16 2006-11-16 Lan Wang Computer security system and method
CN103853943A (en) * 2014-02-18 2014-06-11 优视科技有限公司 Program protection method and device
CN104219044A (en) * 2014-09-22 2014-12-17 杭州华澜微科技有限公司 Key secret method for encrypting storing device
CN106549927A (en) * 2015-09-23 2017-03-29 阿里巴巴集团控股有限公司 Key preservation, acquisition methods and device
CN108038383A (en) * 2017-11-24 2018-05-15 北京顶象技术有限公司 File encrypting method, file decryption method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
原始人工作室: "《煮酒论Android》", 30 August 2014 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116662941A (en) * 2023-07-31 2023-08-29 腾讯科技(深圳)有限公司 Information encryption method, device, computer equipment and storage medium
CN116662941B (en) * 2023-07-31 2023-12-26 腾讯科技(深圳)有限公司 Information encryption method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US9838198B2 (en) Splitting S-boxes in a white-box implementation to resist attacks
US20120054498A1 (en) System and method for managing secure information within a hybrid portable computing device
US8904195B1 (en) Methods and systems for secure communications between client applications and secure elements in mobile devices
TW200301857A (en) Methods and systems for cryptographically protecting secure content
EP3457619B1 (en) Nonce to message binding in digital signature generation
US20110047378A1 (en) System and method for identifying account and peripheral device thereof
CN111178884A (en) Information processing method, device, equipment and readable storage medium
KR20210046357A (en) Method and apparatus for key storing and recovery for blockchain based system
US20190132116A1 (en) Using white-box in a leakage-resilient primitive
CN106411520B (en) Method, device and system for processing virtual resource data
CN107835172A (en) Billing information verification method and system, server and computer-readable recording medium
CN117220865A (en) Longitude and latitude encryption method, longitude and latitude verification device and readable storage medium
CN105162592B (en) A kind of method and system of certification wearable device
CN110750799A (en) Information encryption method and device, electronic equipment and computer readable storage medium
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN109005187A (en) A kind of communication information guard method and device
US9646153B2 (en) Securing content from malicious instructions
CN108632295B (en) Method for preventing terminal from repeatedly attacking server
KR101838008B1 (en) Method for Authenticating Biometric Information Which Protects Biometric Information
CN109743338A (en) A kind of verification method logged in automatically, system, server and readable storage medium storing program for executing
US8433064B2 (en) Secret encryption with public or delegated comparison
CN114553573A (en) Identity authentication method and device
JPWO2018043466A1 (en) Data extraction system, data extraction method, registration device and program
KR20180129302A (en) Method for executing of security keyboard, apparatus and system for executing the method
US7512232B2 (en) Generation and validation of short digital signatures with implicit message embedding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200204