CN110855423A - Method, device and storage medium for encrypting and decrypting ordered numerical value string - Google Patents

Method, device and storage medium for encrypting and decrypting ordered numerical value string Download PDF

Info

Publication number
CN110855423A
CN110855423A CN201910900626.0A CN201910900626A CN110855423A CN 110855423 A CN110855423 A CN 110855423A CN 201910900626 A CN201910900626 A CN 201910900626A CN 110855423 A CN110855423 A CN 110855423A
Authority
CN
China
Prior art keywords
string
numerical
ordered
salt value
numerical string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910900626.0A
Other languages
Chinese (zh)
Inventor
陈润林
努力曼·阿布拉
张伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhixun Interactive Sports Technology Co Ltd
Original Assignee
Shenzhen Zhixun Interactive Sports Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhixun Interactive Sports Technology Co Ltd filed Critical Shenzhen Zhixun Interactive Sports Technology Co Ltd
Priority to CN201910900626.0A priority Critical patent/CN110855423A/en
Publication of CN110855423A publication Critical patent/CN110855423A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Abstract

The invention discloses a method, a device and a storage medium for encrypting and decrypting an ordered numerical string, wherein the method comprises the following steps: step S10, setting a salt value array, wherein the salt value array is a salt value set; step S20, calculating the received ordered numerical string through the salt value array to take out salt values, and generating an encrypted numerical string by using the salt values and the ordered numerical string to perform bitwise XOR operation; and step S30, calculating the same salt value of the received encrypted numerical string to obtain a salt value, and performing XOR operation on the obtained salt value and the encrypted numerical string to restore the ordered numerical string according to the bit. By the technical scheme provided by the invention, the problems of commercial information leakage and insecurity caused by the ordered numerical string on the Internet platform are solved.

Description

Method, device and storage medium for encrypting and decrypting ordered numerical value string
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device and a storage medium for encrypting and decrypting an ordered numerical string.
Background
There are more and more places where internet platforms use ordered strings of values, such as business serial numbers, order numbers, redemption codes, etc., which are meaningful in that valuable business information, such as production dates, production addresses, order quantities, transaction quantities, customer quantities, etc., can be known, and valuable data or information can be obtained by competitors or other business espionage, etc., for example, the user makes an order in the evening to guess the order quantity of the other party on the day, the transaction quantities, the customer quantities of the industry market, etc., are relatively sensitive information. Therefore, the problem that the commercial secrets and the coupon redemption codes are unsafe due to the fact that the ordered order numbers disclose operation conditions and the like needs a set of method for hiding the numerical rule of the ordered numerical value strings.
Disclosure of Invention
The invention mainly aims to provide a method, a device and a storage medium for encrypting and decrypting an ordered numerical string, and aims to solve the problems of commercial information leakage and insecurity caused by the ordered numerical string on an internet platform.
In order to achieve the above object, the present invention provides a method for encrypting and decrypting an ordered numerical string, the method comprising:
step S10: setting a salt value array, wherein the salt value array is a salt value set;
step S20: calculating the received ordered numerical string through the salt value array to obtain a salt value, and performing bitwise XOR operation on the salt value and the ordered numerical string to generate an encrypted numerical string;
step S30: and calculating the received encrypted numerical string to obtain a salt value through the same salt value, and performing XOR operation on the obtained salt value and the encrypted numerical string to restore the ordered numerical string according to bits.
Further, the step S20 includes:
step S110: dividing the received original ordered numerical string A into a numerical string binddex and a numerical string a according to numerical positions;
step S120: performing a first operation on the numerical string bindex to generate a salt value b;
step S130: performing a second operation on the numerical string a and the salt value b to obtain an encrypted string x;
step S140: and combining the encryption string x and the numerical string bindex to obtain a numerical string B.
Further, the step S30 includes:
step S210: dividing the received numerical string B into a numerical string binddex and an encryption string x according to the numerical string position during combination;
step S220: performing a first operation on the numerical string bindex to generate a salt value b;
step S230: performing a third operation on the encrypted string x and the salt value b to obtain a numerical string a;
step S240: and combining the numerical string a and the numerical string bindex according to the numerical position during encryption to obtain an original ordered numerical string A.
Furthermore, the first operation is to calculate a salt value in the salt value array range by using the numerical string bindex, and take out the salt value b.
Further, the second operation is to perform a bitwise xor operation on the numerical string a and the salt value b to obtain the encrypted string x.
Further, the third operation is to analyze the original character string from the encrypted string x according to the theorem of bitwise xor operation, and perform xor operation again on the basis of the encrypted string to obtain the numerical string a.
In order to achieve the above object, the present invention further provides an encryption and decryption ordered numerical string device, which is characterized in that the encryption and decryption ordered numerical string device includes a memory and a processor, the memory stores an encryption and decryption ordered numerical string program that can be executed on the processor, and the encryption and decryption ordered numerical string program implements the steps of the encryption and decryption ordered numerical string method when executed by the processor.
In addition, to achieve the above object, the present invention further provides a storage medium, which is characterized in that the storage medium is a computer-readable storage medium, and the storage medium stores an encryption and decryption ordered numerical string program, and the encryption and decryption ordered numerical string program can be executed by one or more processors to implement the steps of the encryption and decryption ordered numerical string method.
Compared with the prior art, the method, the device and the storage medium for encrypting and decrypting the ordered numerical string realize that the ordered numerical string is encrypted and hidden to be changed into the encrypted non-ordered numerical string, thereby effectively preventing the commercial information from being leaked and improving the safety.
Drawings
Fig. 1 is a schematic flow chart of a method for encrypting and decrypting an ordered numerical string according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of step S20 in FIG. 1;
FIG. 3 is a schematic diagram of an encryption process according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart of step S30 in FIG. 1;
FIG. 5 is a schematic diagram of a decryption process according to an embodiment of the present invention;
FIG. 6 is a block diagram of a system framework for encrypting and decrypting an ordered numeric string according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an internal structure of an apparatus for encrypting and decrypting an ordered numerical value string according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for encrypting and decrypting an ordered numerical string according to an embodiment of the present invention, where the method is implemented and implemented by software and/or hardware on a server/terminal, and the method includes:
step S10: setting a salt value array, wherein the salt value array is a salt value set; the salt value array includes 1024 or 2048 or n × 1024 salt values (n is a natural number), and in this embodiment, a salt value array of 1024 salt values is used.
Step S20: calculating the received ordered numerical string through the salt value array to obtain a salt value, and performing bitwise XOR operation on the salt value and the ordered numerical string to generate an encrypted numerical string, wherein the step specifically comprises the following steps of:
referring to fig. 2 and fig. 3 in combination, fig. 2 is a schematic flowchart of step S20 in fig. 1, and fig. 3 is a schematic diagram of an encryption process according to an embodiment of the present invention, where an ordered numerical string a is given in this embodiment: 0724000001, is composed of month, day and serial number.
Step S110: dividing the received original ordered numerical string A into a numerical string binddex and a numerical string a according to numerical positions; dividing the received original ordered numerical string a into two parts according to the numerical positions, wherein the numerical positions are in a fixed dividing mode, in this embodiment, the numerical positions 1, 2, 3, 5, 6 and 7 are first parts, 4, 8, 9 and 10 are second parts, that is, the numerical string of the first part is 072000 and is the numerical string a, and the numerical string of the second part is 4001 and is the numerical string bindex.
Step S120: and carrying out a first operation on the numerical value string bindex to generate a salt value b.
And the first operation is to calculate the salt value in the range of the salt value array Model by using bindex and take out the salt value b. And performing AND operation on the salt value array Model in a binary system by using a numerical string bindex and a numerical value obtained by subtracting 1 from the length of the salt value array Model to obtain a numerical value corresponding to the salt value array Model, wherein the numerical value corresponds to a certain salt value in the salt value array Model, and taking the salt value as a salt value b. This operation can be expressed using the following formula:
b=Mobel[(int)bindex&(Model.size-1)]。
step S130: performing a second operation on the numerical string a and the salt value b to obtain an encrypted string x; and the second operation is to perform bitwise exclusive-or operation on the numerical string a and the salt value b to obtain the encryption string x, which is expressed as x ═ a ^ b. In this embodiment, the obtained encrypted numerical string x is 771555.
Step S140: and combining the encryption string x and the numerical string bindex to obtain a numerical string B, wherein the obtained numerical string B is 7715554001 in the embodiment.
Referring to fig. 4 and fig. 5 in combination, fig. 4 is a flowchart illustrating step S30 in fig. 1, and fig. 5 is a schematic diagram illustrating a decryption process according to an embodiment of the present invention.
Step S30 calculates the same salt value of the received encrypted numerical string to obtain a salt value, and performs an exclusive or operation using the salt value and the encrypted numerical string to restore the ordered numerical string in bits. The method specifically comprises the following steps:
step S210: and dividing the received numerical string B into a numerical string bindex and an encryption string x according to the numerical string position during combination.
In this embodiment, the numeric string B is 7715554001, and is decomposed by bit according to the determined numeric position, in this embodiment, the first 6 digits are the encrypted string x, i.e., 771555, and the last 4 digits are the numeric string bindex, i.e., 4001.
Step S220: and performing a first operation on the numerical string bindex to generate a salt value b, wherein the operation is the same as the first operation in the encryption process and is not repeated.
Step S230: performing a third operation on the encrypted string x and the salt value b to obtain a numerical string a; the third operation is to analyze the original character string from the encryption string x according to the bit exclusive-or operation theorem, and perform exclusive-or operation again on the basis of the encryption string to obtain the numerical string a, which is expressed as a ═ x ^ b. In this example, a numerical string 072000 is obtained.
Step S240: combining the numerical value string a and the numerical value string bindex according to the numerical value positions during encryption to obtain an original ordered numerical value string a, wherein according to the position relationship in the encryption process, the numerical value positions 1, 2, 3, 5, 6 and 7 are first parts, and the numerical value positions 4, 8, 9 and 10 are second parts, namely the first part of the numerical value string is 072000 and is the numerical value string a, the second part of the numerical value string is 4001 and is the numerical value string bindex, and the original numerical value string 0724000001 is obtained after bitwise combination.
By the method for encrypting and decrypting the ordered numerical string, the ordered numerical string is encrypted and hidden to be changed into the encrypted unordered numerical string, the commercial information is effectively prevented from being leaked, and the safety is improved.
The invention also provides a device for encrypting and decrypting the ordered numerical value string. Fig. 6 is a schematic diagram of an internal structure of an apparatus for encrypting and decrypting an ordered numerical value string according to an embodiment of the present invention.
In this embodiment, the device for encrypting and decrypting the ordered numerical value string may be a PC (Personal Computer), or may be a terminal device such as a smart phone, a tablet Computer, or a portable Computer. The encryption and decryption ordered series of values device comprises at least a memory 11, a processor 12, a communication bus 13, and a network interface 14.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the encryption and decryption ordered series of values device, for example a hard disk of the encryption and decryption ordered series of values device. The memory 11 may also be an external storage device of the encryption and decryption ordered value string device in other embodiments, such as a plug-in hard disk provided on the encryption and decryption ordered value string device, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 11 may also include both an internal storage unit of the encryption and decryption ordered series of values means and an external storage device. The memory 11 can be used not only for storing application software installed in the device for encrypting and decrypting the ordered numerical string and various types of data, such as codes of programs for encrypting and decrypting the ordered numerical string, but also for temporarily storing data that has been output or is to be output.
The processor 12 may be, in some embodiments, a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip, and is used for executing program codes stored in the memory 11 or Processing data, such as executing a program for encrypting and decrypting an ordered string of values.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the encryption and decryption ordered series of values and other electronic devices.
Optionally, the device for encrypting and decrypting the ordered numerical string may further include a user interface, the user interface may include a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further include a standard wired interface and a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the encryption/decryption ordered value string device and for displaying a visual user interface.
While fig. 6 shows only the encryption and decryption ordered series of values device with components 11-14 and the encryption and decryption ordered series of values program, those skilled in the art will appreciate that the structure shown in fig. 6 does not constitute a limitation of the encryption and decryption ordered series of values device, and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
In the embodiment of the encryption and decryption ordered value string device shown in fig. 6, the memory 11 stores an encryption and decryption ordered value string program; the processor 12 executes the encryption and decryption ordered numerical string program stored in the memory 11 to realize the following steps:
the step of encrypting the ordered numerical string comprises:
step S10: setting a salt value array, wherein the salt value array is a salt value set;
step S20: calculating the received ordered numerical string through the salt value array to obtain a salt value, and performing bitwise XOR operation on the salt value and the ordered numerical string to generate an encrypted numerical string;
step S30: and calculating the received encrypted numerical string to obtain a salt value through the same salt value, and performing XOR operation on the obtained salt value and the encrypted numerical string to restore the ordered numerical string according to bits.
Referring to fig. 7, a schematic diagram of program modules of an encrypted and decrypted ordered numerical string program in an embodiment of the apparatus for encrypting and decrypting an ordered numerical string according to the present invention is shown, in this embodiment, the encrypted and decrypted ordered numerical string program may be divided into a receiving and sending module 10, a first operation module 20, a second operation module 30, a third operation module 40, and a setting module 50, which exemplarily:
a receiving and sending module 10, configured to receive a numerical string and send a processed numerical string task;
a first operation module 20, in which the CPU performs a first operation;
a second operation module 30, configured to execute the encryption task through a CPU according to the first operation result to perform a second operation;
a third operation module 40, configured to execute the decryption task through a CPU according to the first operation result, so as to perform a third operation;
and the setting module 50 is used for setting the salt value array and the numerical position division definition.
The functions or operation steps implemented when the program modules such as the receiving and sending module 10, the first operation module 20, the second operation module 30, the third operation module 40, and the setting module 50 are executed are substantially the same as those of the above embodiments, and are not described herein again.
In addition, an embodiment of the present invention further provides a storage medium, where the storage medium is a computer-readable storage medium, and the storage medium stores an encryption and decryption ordered numerical string program, where the encryption and decryption ordered numerical string program is executable by one or more processors to implement the following operations:
step S10: setting a salt value array, wherein the salt value array is a salt value set;
step S20: calculating the received ordered numerical string through the salt value array to obtain a salt value, and performing bitwise XOR operation on the salt value and the ordered numerical string to generate an encrypted numerical string;
step S30: and calculating the received encrypted numerical string to obtain a salt value through the same salt value, and performing XOR operation on the obtained salt value and the encrypted numerical string to restore the ordered numerical string according to bits.
The storage medium of the present invention is implemented substantially the same as the above embodiments of the method and apparatus for encrypting and decrypting an ordered numerical string, and will not be described herein again.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method for encrypting and decrypting an ordered numerical string, the method for encrypting and decrypting the ordered numerical string comprising:
step S10: setting a salt value array, wherein the salt value array is a salt value set;
step S20: calculating the received ordered numerical string through the salt value array to obtain a salt value, and performing bitwise XOR operation on the salt value and the ordered numerical string to generate an encrypted numerical string;
step S30: and calculating the received encrypted numerical string to obtain a salt value through the same salt value, and performing XOR operation on the obtained salt value and the encrypted numerical string to restore the ordered numerical string according to bits.
2. The method for encrypting and decrypting an ordered string of values according to claim 1, wherein said step S20 includes:
step S110: dividing the received original ordered numerical string A into a numerical string binddex and a numerical string a according to numerical positions;
step S120: and carrying out a first operation on the numerical value string bindex to generate a salt value b.
3. The method for encrypting and decrypting an ordered string of values according to claim 2, wherein after said step S120, said step S20 further comprises:
step S130: performing a second operation on the numerical string a and the salt value b to obtain an encrypted string x;
step S140: and combining the encryption string x and the numerical string bindex to obtain a numerical string B.
4. The method for encrypting and decrypting an ordered string of values according to claim 1, wherein said step S30 includes:
step S210: dividing the received numerical string B into a numerical string binddex and an encryption string x according to the numerical string position during combination;
step S220: and carrying out a first operation on the numerical value string bindex to generate a salt value b.
5. The method for encrypting and decrypting an ordered string of values according to claim 4, wherein after said step S220, said step S30 further comprises:
step S230: performing a third operation on the encrypted string x and the salt value b to obtain a numerical string a;
step S240: and combining the numerical string a and the numerical string bindex according to the numerical position during encryption to obtain an original ordered numerical string A.
6. The method of claim 2 or 4, wherein said first operation is to use said value string bindex to calculate a salt value in said range of salt values array, and to extract a salt value b.
7. The method of claim 3, wherein the second operation is a bitwise XOR operation of the string of values a and the salt value b to obtain the encrypted string x.
8. The method of claim 5, wherein the third operation is to parse an original character string from the encrypted string x according to the theorem of bit exclusive-or operation, and perform exclusive-or operation again on the basis of the encrypted string to obtain the value string a.
9. An apparatus for encrypting and decrypting an ordered string of values, the apparatus comprising a memory and a processor, the memory having stored thereon an encryption and decryption ordered string of values program executable on the processor, the encryption and decryption ordered string of values program, when executed by the processor, implementing the steps of the method for encrypting and decrypting an ordered string of values according to any one of claims 1 to 8.
10. A storage medium, which is a computer-readable storage medium, on which the computer program is stored, and which, when run on the apparatus, causes the apparatus to perform the method of encrypting and decrypting an ordered string of values according to any one of claims 1 to 8.
CN201910900626.0A 2019-09-23 2019-09-23 Method, device and storage medium for encrypting and decrypting ordered numerical value string Pending CN110855423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910900626.0A CN110855423A (en) 2019-09-23 2019-09-23 Method, device and storage medium for encrypting and decrypting ordered numerical value string

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910900626.0A CN110855423A (en) 2019-09-23 2019-09-23 Method, device and storage medium for encrypting and decrypting ordered numerical value string

Publications (1)

Publication Number Publication Date
CN110855423A true CN110855423A (en) 2020-02-28

Family

ID=69595937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910900626.0A Pending CN110855423A (en) 2019-09-23 2019-09-23 Method, device and storage medium for encrypting and decrypting ordered numerical value string

Country Status (1)

Country Link
CN (1) CN110855423A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US20080137841A1 (en) * 2006-12-06 2008-06-12 Sushil Jajodia Protecting Sensitive Data Associations
KR20100009301A (en) * 2008-07-18 2010-01-27 고려대학교 산학협력단 Method and apparatus of managing unity data on mobile device and recording medium using this
KR20110031822A (en) * 2009-09-21 2011-03-29 한국과학기술원 Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
CN103532706A (en) * 2012-07-03 2014-01-22 展讯通信(上海)有限公司 Data encryption and decryption method and device, and mobile terminal
CN104303453A (en) * 2012-04-02 2015-01-21 克里普特欧贝西克株式会社 Encryption device, decryption device, encryption method, decryption method, and program
CN107038383A (en) * 2016-02-03 2017-08-11 华为技术有限公司 A kind of method and apparatus of data processing
CN107977581A (en) * 2017-11-06 2018-05-01 北京明华联盟科技有限公司 Data processing method, device and computer-readable recording medium
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium
CN108696351A (en) * 2018-05-04 2018-10-23 济南浪潮高新科技投资发展有限公司 A kind of encryption device based on quantum true random number
CN109194467A (en) * 2018-06-29 2019-01-11 北京东方英卡数字信息技术有限公司 A kind of safe transmission method and system of encryption data
US20190238329A1 (en) * 2017-07-12 2019-08-01 Dell Products L.P. Method and system of secure random seed generation for a cryptographically secure pseudo-random number generator

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US20080137841A1 (en) * 2006-12-06 2008-06-12 Sushil Jajodia Protecting Sensitive Data Associations
KR20100009301A (en) * 2008-07-18 2010-01-27 고려대학교 산학협력단 Method and apparatus of managing unity data on mobile device and recording medium using this
KR20110031822A (en) * 2009-09-21 2011-03-29 한국과학기술원 Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
CN104303453A (en) * 2012-04-02 2015-01-21 克里普特欧贝西克株式会社 Encryption device, decryption device, encryption method, decryption method, and program
CN103532706A (en) * 2012-07-03 2014-01-22 展讯通信(上海)有限公司 Data encryption and decryption method and device, and mobile terminal
CN107038383A (en) * 2016-02-03 2017-08-11 华为技术有限公司 A kind of method and apparatus of data processing
US20190238329A1 (en) * 2017-07-12 2019-08-01 Dell Products L.P. Method and system of secure random seed generation for a cryptographically secure pseudo-random number generator
CN107977581A (en) * 2017-11-06 2018-05-01 北京明华联盟科技有限公司 Data processing method, device and computer-readable recording medium
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium
CN108696351A (en) * 2018-05-04 2018-10-23 济南浪潮高新科技投资发展有限公司 A kind of encryption device based on quantum true random number
CN109194467A (en) * 2018-06-29 2019-01-11 北京东方英卡数字信息技术有限公司 A kind of safe transmission method and system of encryption data

Similar Documents

Publication Publication Date Title
CN105205359B (en) A kind of JavaScript code guard method and device
CN108400868B (en) Seed key storage method and device and mobile terminal
CN108269062B (en) Electronic contract making method, device, equipment and medium based on H5
CN112883361B (en) Function jump method and device of application program, computer equipment and storage medium
CN110210211A (en) A kind of method of data protection and calculate equipment
CN108762767A (en) Using dissemination method, device and computer readable storage medium
CN110058867A (en) The packing of application program mirror image, installation method and computer installation, storage medium
CN107277019A (en) Data clear text acquisition methods, device, electric terminal and readable storage medium storing program for executing
CN112650993A (en) Screen watermark display method and device, electronic equipment and storage medium
CN112966227A (en) Code encryption and decryption method and device and storage medium
CN107977581A (en) Data processing method, device and computer-readable recording medium
CN104618390A (en) Website data feedback method, display method and system and processing system
CN110990846B (en) Information storage method, device and computer readable storage medium
CN112307503A (en) Signature management method and device and electronic equipment
CN115442164B (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN111783119A (en) Form data security control method and device, electronic equipment and storage medium
CN110855423A (en) Method, device and storage medium for encrypting and decrypting ordered numerical value string
CN111368322A (en) File decryption method and device, electronic equipment and storage medium
Gold Android insecurity
CN110990848A (en) Sensitive word encryption method and device based on hive data warehouse and storage medium
CN113449291B (en) File import method and device, computing equipment and storage medium
CN111343265B (en) Information pushing method, device, equipment and readable storage medium
CN113434122A (en) Multi-role page creation method and device, server and readable storage medium
CN107423586B (en) Method for protecting software and software protecting equipment
CN108345461B (en) Application updating method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination