CN111193741B - Information sending method, information obtaining method, device and equipment - Google Patents

Information sending method, information obtaining method, device and equipment Download PDF

Info

Publication number
CN111193741B
CN111193741B CN201911409158.3A CN201911409158A CN111193741B CN 111193741 B CN111193741 B CN 111193741B CN 201911409158 A CN201911409158 A CN 201911409158A CN 111193741 B CN111193741 B CN 111193741B
Authority
CN
China
Prior art keywords
key
information
encryption
factor
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911409158.3A
Other languages
Chinese (zh)
Other versions
CN111193741A (en
Inventor
张祯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN201911409158.3A priority Critical patent/CN111193741B/en
Publication of CN111193741A publication Critical patent/CN111193741A/en
Application granted granted Critical
Publication of CN111193741B publication Critical patent/CN111193741B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Abstract

The embodiment of the specification provides an information sending method, an information obtaining device and information sending equipment. The information sending method comprises the following steps: encrypting information to be sent by using an encryption key to obtain encrypted information; generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key; and sending the encryption information and the key factor. The information acquisition method comprises the following steps: receiving encryption information and a key factor; calculating a decryption key using the key factor; and decrypting the encrypted information by using the decryption key to obtain decrypted information. By the method, when the encrypted information is transmitted, the key capable of decrypting the encrypted information is not directly transmitted, but the key factor which is generated according to the encrypted key and can calculate the decrypted key is transmitted, so that the information is safely and conveniently encrypted and transmitted.

Description

Information sending method, information obtaining method, device and equipment
Technical Field
The embodiment of the specification relates to the technical field of computers, in particular to an information sending method, an information obtaining device and information obtaining equipment.
Background
With the development of science and technology and network technology, the convenience degree of daily life of people is greatly improved by the internet. Due to the immediacy of the internet in delivering messages, people are increasingly transmitting information in the internet. Because the front end and the back end of the information transmission process are separated, the information which needs to be transmitted by the user needs to be transmitted in the network. But this way, there is a possibility that information transmitted in the network may be stolen. Therefore, in order to secure the security of information transmission in the network, the information needs to be encrypted.
In the prior art, the encryption method for the transmitted information mainly includes symmetric encryption and asymmetric encryption. Symmetric encryption is that after an information sender encrypts a message by using a key, an information receiver decrypts the encrypted message by using the same key. The asymmetric encryption is that after an information sender encrypts a message by using a public key, an information receiver decrypts the encrypted message by using a corresponding private key. However, in the above encryption technology, symmetric encryption directly transmits a key in a network during information transmission, so that the key is easily stolen, thereby causing leakage of encrypted information; the asymmetric encryption needs to be performed by different methods for encryption and decryption, so that the operation is complicated, and particularly when the transmitted information is more, the encryption and decryption processes need to consume more time, and the use process is inconvenient. Therefore, a convenient and secure method for transmitting information is needed.
Disclosure of Invention
An object of the embodiments of the present specification is to provide an information sending method, an information obtaining method, an apparatus, and a device, so as to solve a problem how to encrypt and send information conveniently and safely.
In order to solve the above problem, an information sending method, an information obtaining method, an apparatus and a device proposed in the embodiments of the present specification are implemented as follows:
an information sending method includes:
encrypting information to be sent by using an encryption key to obtain encrypted information;
generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key;
and sending the encryption information and the key factor.
An information transmission apparatus comprising:
the information encryption module is used for encrypting the information to be sent by using the encryption key to obtain encrypted information;
the factor generation module is used for generating a key factor according to the encryption key, and the key factor is used for calculating a decryption key;
and the information sending module is used for sending the encryption information and the key factor.
An information transmitting apparatus includes a memory and a processor;
the memory to store computer program instructions;
the processor, configured to execute the computer program instructions to implement the following steps: encrypting information to be sent by using an encryption key to obtain encrypted information; generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key; and sending the encryption information and the key factor.
An information acquisition method, comprising:
receiving encryption information and a key factor;
calculating a decryption key using the key factor;
and decrypting the encrypted information by using the decryption key to obtain decrypted information.
An information acquisition apparatus comprising:
the information receiving module is used for receiving the decryption information and the key factor;
the key calculation module is used for calculating a decryption key by using the key factor;
and the decryption module is used for decrypting the encrypted information by using the decryption key to obtain decrypted information.
An information acquisition apparatus includes a memory and a processor;
the memory for storing computer program instructions;
the processor, configured to execute the computer program instructions to implement the following steps: receiving encryption information and a key factor; calculating a decryption key using the key factor; and decrypting the encrypted information by using the decryption key to obtain decrypted information.
As can be seen from the technical solutions provided by the embodiments of the present specification, in the embodiments of the present specification, after information to be transmitted is encrypted by using an encryption key, a key factor is calculated according to the encryption key, so that only a key factor used for calculating a decryption key is transmitted in addition to the encrypted information, and after receiving the key factor, an information receiving end can calculate a corresponding decryption key according to a preset operation rule and the key factor, thereby avoiding directly transmitting the encryption key, ensuring the security of information transmission, and avoiding cumbersome encryption and decryption processes.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the specification, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a block diagram of an information transmission system according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an information transmission method according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a method for sending information according to an embodiment of the present disclosure;
FIG. 4 is a flow chart of an information acquisition method according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an information transmitting apparatus according to an embodiment of the present disclosure;
FIG. 6 is a block diagram of an information acquisition apparatus according to an embodiment of the present disclosure;
fig. 7 is a structural diagram of an information sending apparatus or an information obtaining apparatus according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort shall fall within the protection scope of the present specification.
For a better understanding of the inventive concepts of the embodiments of the present specification, an information transmission system 100 of the present specification is described below with reference to fig. 1. The information transmission system 100 includes an information transmitting end 110 and an information receiving end 120.
The information sending terminal 110 includes a server, a PC, a smart phone, an all-in-one machine, and the like. The information sender 110 may encrypt the information. The information sending terminal 110 may send the information to the server or send the information directly to the information receiving terminal 120. The information sender 110 may also store a key. The information sender 110 may also generate a key factor.
The information receiving end 120 includes a server, a PC, a smart phone, an all-in-one machine, and the like. The information receiver 120 may be used to receive messages. The information receiving end 120 may also calculate a decryption key based on the received key factor. The information receiving end 120 may also decrypt the encrypted information using a decryption key.
In the actual application process, the specific device correspondence between the information sending end and the information receiving end is not limited, for example, the server may send the encrypted information to the client, and the client decrypts the information to obtain the message; or the client sends the encrypted information to the server, and the server decrypts the encrypted information to obtain the corresponding information; or the server may send the encrypted message to another server, and the server receiving the message decrypts the message to obtain the corresponding decrypted message. In a specific application process, a scene of information transmission is not limited, and is not described herein any further.
In the information transmission system, information can be directly transmitted between the information sending end 110 and the information receiving end 120, for example, information can be directly transmitted through bluetooth or data lines; the information transmitting end 110 and the information receiving end 120 may also transmit information through other devices such as a server, for example, after the information transmitting end 110 transmits information to the server, the server transmits information to the information receiving end 120. In practical applications, a method for transmitting information between the information sending end 110 and the information receiving end 120 is not limited, and will not be described herein again.
With reference to fig. 2, an information transmission method in the present specification is described, where the information transmission method uses the information transmission system as an execution main body, and the method specifically includes:
s210: the information sending end encrypts the information to be sent by using the encryption key to obtain encrypted information.
The information to be sent is the information which needs to be sent to the information receiving end by the information sending end. The information to be transmitted may be data in a format such as a character string or a data table. The information to be sent is information which is not subjected to encryption processing, and the content of the information can be directly obtained from the information to be sent under the condition that the information to be sent is not processed. In order to ensure the safety of information transmission and ensure that even if the information to be sent is intercepted by a lawbreaker, the lawbreaker cannot acquire the specific content of the information to be sent, the information to be sent needs to be encrypted.
The encryption key is a key used to encrypt information. The encryption key may be a specific parameter. When information is encrypted by using the encryption key, the encryption key and the information to be encrypted may be used to perform an operation, and the result after the operation may be used as the encrypted information. When the information is decrypted, the encrypted information is decrypted by using the corresponding decryption key based on the previous operation rule, so that the decrypted plaintext information can be obtained.
The encrypted information is information encrypted by the encryption key. And according to the fact that the actual content of the transmission cannot be directly obtained by the encrypted information, the encrypted information needs to be decrypted to obtain the actually transmitted information content.
Specifically, the encrypting the information to be sent may be by using an encryption algorithm. The encryption algorithm may be, for example, scrambling and rearranging the content in the information to be transmitted based on the encryption key, and the encrypted information cannot be decrypted when the information acquirer does not know the scrambling order of the information; the encryption algorithm may, for example, perform a mathematical operation directly using the encryption key and part or all of the contents of the information to be transmitted, and reconstruct the result of the operation into encrypted information, and the information receiver cannot acquire the actual contents of the encrypted information even without knowing the operation target and the operation rule. The way of encrypting information by using the key in practical application is not limited to the above example, and is not described herein again.
In the embodiment of the present specification, in order to ensure the security of information and a key and avoid the situation that the information is cracked and leaked due to the interception of the key by a lawbreaker, an encryption key for encrypting the information may be determined before the information is encrypted.
In one embodiment, generating the encryption key may be selecting a set of associated keys from a preset set of keys. The preset key set comprises at least one group of associated keys. Each set of associated keys contains at least two keys. And the associated keys meet preset operation rules, namely other keys can be obtained by calculation according to the preset operation rules and partial keys in the associated keys.
After a group of association keys is selected, one of the selected association keys may be randomly selected as an encryption key. Correspondingly, in the subsequent step, the key factor can be calculated according to the unselected associated key.
S220: and the information sending end generates a key factor according to the encryption key.
The key factor is a key different from an encryption key, and when transmitting the encrypted information, the information transmitting end does not directly transmit the encryption key for encrypting the encrypted information, but transmits the key factor corresponding to the encrypted information. The key factor can not directly decrypt the encrypted information, so that even if lawless persons intercept the key factor and the encrypted information, the lawless persons can not directly utilize the key factor to correctly decrypt the encrypted information, thereby ensuring the safety of information transmission.
The key factor and the encryption key can meet preset operation rules. The preset operation rule is a certain preset functional relationship. For example, the preset operation rule may be an operation rule implemented based on the pythagorean theorem, and then the pythagorean theorem is satisfied between the encryption key and the key factor. Under the condition that the information receiving end determines the preset operation rule, an encryption key can be obtained through calculation based on the preset operation rule and the key factor, and therefore decryption of encrypted information can be achieved.
For example, a specific example is described, assuming that the preset operation rule is an operation rule implemented by using the pythagorean theorem, and the selected encryption key is 4, the key factor may be 3 and 5. A key factor and the encryption key satisfy 3 2 +4 2 =5 2 The relationship (2) of (c). When the information receiving end receives the key factors, namely 3 and 5, the encryption key 4 can be obtained by calculation according to the Pythagorean theorem and the key factors 3 and 5, so that the encryption key is obtained by calculation to decrypt the encrypted information.
The above example is only an introduction to the preset operation rule, and the preset operation rule is not limited to the pythagorean theorem, and in practical applications, the encryption key and the key factor may satisfy other operation rules, for example, a linear function relationship or taylor theorem, and details are not described herein.
Based on the embodiment in step S210, in the case that a key set is preset, after a group of associated keys is selected from the key set and an encryption key is selected from the associated keys, a key factor may be determined according to another key of the associated keys except the encryption key. Other keys except the encryption key in the associated key can be directly spliced to obtain the key factor, or the other keys can be operated according to a preset operation rule to obtain the key factor, and the information receiving end can recalculate the encryption key according to corresponding operation when receiving the key factor. By the method for determining the key factor, the difficulty of cracking the encrypted information by lawbreakers is further improved, and the safety of the information is better ensured.
In one embodiment, since the preset operation rule may include three or more parameters, in this case, the corresponding position of the key factor in the preset operation rule may not be determined, for example, in the case that the preset operation rule is the pythagorean theorem, it may not be directly determined whether two parameters obtained according to the key factor are lengths corresponding to two short sides or a length corresponding to one short side and one long side in the pythagorean theorem. Therefore, when the key factor is sent, the association information representing the key factor and the preset operation rule can also be sent, and the position of the key factor in the preset operation rule can be determined according to the association information. For example, the key factor may be identified as Pythagorean theorem a 2 +b 2 =c 2 A and b in (3), the corresponding encryption key can be accurately calculated based on the identifier, and the accuracy of the decryption process of the information is ensured.
S230: and the information sending end sends the encrypted information and the key factor to the information receiving end.
After the encrypted information and the key factor are obtained, the information sending end can send the encrypted information and the key factor to the information receiving end based on the information transmission mode.
S240: and the information receiving end root calculates a decryption key by using the key factor.
The decryption key is a key that can decrypt the encrypted information to obtain decrypted information. Generally, the decryption key is the same as the encryption key, and after the decryption key is obtained, the decryption key can be directly used for encrypting to decrypt the encrypted information by using the decryption key, so that the information can be conveniently and safely transmitted.
After receiving the key factor, the information receiving end may calculate to obtain a corresponding decryption key based on the key factor and a preset operation rule. Using a specific example to explain, when the preset operation rule is the pythagorean theorem, parameters 3 and 5 can be determined according to the received key factor, so that the decryption key calculated by using the parameters 3 and 5 is 4, and the encrypted information is decrypted by using the decryption key.
Based on the implementation in step S220, the information receiving end may further receive association information between the key factor and a preset operation rule. Under the condition that the associated information is not received, after the information receiving end receives the parameters 3 and 5, two results 4 and 4 can be determined based on the Pythagorean theorem
Figure BDA0002349494090000061
If the encrypted information is decrypted separately, the correct information can be obtained, but much time is wasted. If the information receiving end also receives the incidence relation between the key factor and the Pythagorean theoremThen, if it can be determined that 3 and 5 are lengths corresponding to the short side and the long side, respectively, the decryption key can be determined to be 4 without any doubt, so that it is not necessary to waste time in decrypting information with an incorrect decryption key, which contributes to improving the efficiency of information transmission.
S250: and the information receiving end decrypts the encrypted information by using the decryption key to obtain decrypted information.
After the information receiving end calculates the decryption key, the decryption key can be used for decrypting the encrypted information so as to obtain corresponding decryption information. In the case where the decryption key is the same as the encryption key, the encrypted information may be decrypted to obtain decrypted information in a manner that information is encrypted with the encryption key before.
To illustrate with a specific example, when encrypting information to be transmitted with an encryption key, for example, directly adding the encryption key to a part of contents in the information to be transmitted, respectively; the decryption key may be subtracted from the encrypted content in the encrypted information when decrypting the encrypted information, so that the correct decryption key can be obtained. In practical applications, the method for decrypting the encrypted information may refer to a specific method for encrypting the information to be transmitted, which is not described herein again.
The above information transmission method is described below using a scenario example. The user needs to input an account and a password of the user and send the account and the password to the server for verification when logging in, and the client needs to encrypt the account and the password in order to ensure that the account and the password are not leaked. A set of hash numbers is selected from a predetermined set of keys. The group of stock colluding numbers comprises three numbers, and the three numbers meet the principle of stock colluding. One of the three colluding numbers is selected as an encryption key, and the information to be sent is encrypted by combining a corresponding encryption algorithm. And separating and combining the other two colluding numbers into a character string by using a designated symbol, adding a trigonometric function identifier representing the corresponding relation of the two numbers at the tail part of the character string after carrying out base64 processing on the character string, and sending the processed character string serving as a key factor together with the encrypted information to the server.
After receiving the message, the server firstly obtains the key factor, after obtaining the trigonometric function identifier from the tail part of the key factor, performs base64 decryption on the rest key factor, obtains two colluding stock numbers by splitting according to the designated symbol, determines the relationship between the two colluding stock numbers based on the trigonometric function identifier obtained before, calculates the colluding stock number used for encryption according to the information, and uses the colluding stock number as a decryption key to decrypt the encrypted information to obtain a plaintext so as to use the plaintext as account password information of the user.
It can be seen from the above description of the method embodiment and the scenario example that, when information is transmitted, after the information to be transmitted is encrypted, the method does not directly transmit the encryption key for encrypting the information, but transmits the key factor having the preset operation rule with the encryption key, so that the encryption key is not directly exposed in the transmitted content, and even if the transmitted information is intercepted by a lawless person, the information cannot be decrypted. In addition, as the key is regenerated in each transmission, and the correlation information between the key factor and the preset operation rule is not always the same in each transmission, the cracking difficulty of the encryption key and the preset operation rule is further improved. Therefore, the method avoids the complicated steps of encryption and decryption in the asymmetric encryption process and also improves the safety of the information transmission process.
An information sending method according to an embodiment of the present disclosure is described below with reference to fig. 3. The execution main body of the method is an information sending end. The information sending method comprises the following steps:
s310: and encrypting the information to be sent by using the encryption key to obtain encrypted information.
The detailed description of this step is given in step S210, and is not repeated here.
S320: and generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key.
The detailed description of this step is given in step S220, and will not be repeated here.
S330: and sending the encryption information and the key factor.
Step S230 is not described herein again in detail between the detailed descriptions of this step.
An information acquisition method according to an embodiment of the present disclosure is described below with reference to fig. 4. The execution main body of the method is an information receiving end. The information acquisition method comprises the following steps:
s410: encryption information and a key factor are received.
The detailed description of this step is given in step S230, and will not be repeated here.
S420: a decryption key is calculated using the key factor.
The detailed description of this step is given in step S240, and will not be repeated here.
S430: and decrypting the encrypted information by using the decryption key to obtain decrypted information.
The detailed description of this step is given in step S250, and will not be repeated here.
An information transmitting apparatus in the present specification will be described below with reference to fig. 5, where the information transmitting apparatus is provided at an information transmitting end, and the information transmitting apparatus includes:
an information encryption module 510, configured to encrypt information to be sent with an encryption key to obtain encrypted information;
a factor generating module 520, configured to generate a key factor according to the encryption key, where the key factor is used to calculate a decryption key;
an information sending module 530, configured to send the encryption information and the key factor.
An information acquisition apparatus according to the present specification is described below with reference to fig. 6, where the information acquisition apparatus is provided at an information acquisition end, and the information acquisition apparatus includes:
an information receiving module 610, configured to receive decryption information and a key factor;
a key calculation module 620, configured to calculate a decryption key using the key factor;
the decryption module 630 is configured to decrypt the encrypted information with the decryption key to obtain decrypted information.
An information transmitting apparatus according to an embodiment of the present disclosure is described below with reference to fig. 7. The information transmitting apparatus includes a memory and a processor.
In this embodiment, the memory may be implemented in any suitable manner. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state disk, a U disk, or the like. The memory may be used to store computer instructions.
In this embodiment, the processor may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, an embedded microcontroller, and so forth. The processor may execute the computer instructions to perform the steps of: encrypting information to be sent by using an encryption key to obtain encrypted information; generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key; and sending the encryption information and the key factor.
An information acquisition apparatus according to an embodiment of the present disclosure is described below with reference to fig. 7. The information acquisition device includes a memory and a processor.
In this embodiment, the memory may be implemented in any suitable manner. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state disk, a U disk, or the like. The memory may be used to store computer instructions.
In this embodiment, the processor may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller and embedded microcontroller, and so forth. The processor may execute the computer instructions to perform the steps of: receiving encryption information and a key factor; calculating a decryption key using the key factor; and decrypting the encrypted information by using the decryption key to obtain decrypted information.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardbyscript Description Language (vhr Description Language), and the like, which are currently used by Hardware compiler-software (Hardware Description Language-software). It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present specification can be implemented by software plus a necessary general hardware platform. Based on such understanding, the technical solutions of the present specification may be essentially or partially implemented in the form of software products, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The description is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
While the specification has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the specification that do not depart from the spirit of the specification, and it is intended that the appended claims include such variations and modifications that do not depart from the spirit of the specification.

Claims (10)

1. An information transmission method, comprising:
encrypting information to be sent by using an encryption key to obtain encrypted information;
generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key; the key factor and the encryption key meet a preset operation rule; the decryption key and the encryption key are the same;
and sending the encrypted information and the key factor so that an information receiving end calculates a decryption key by using the key factor and decrypts the encrypted information by using the decryption key.
2. The method of claim 1, wherein before encrypting the information to be transmitted using the encryption key to obtain the encrypted information, further comprising:
selecting a group of associated keys from a preset key set; preset operation rules are met among the associated keys;
selecting an encryption key from the associated keys;
correspondingly, the generating a key factor according to the encryption key includes:
a key factor is generated from an associated key other than the encryption key.
3. The method of claim 2, wherein the association key satisfies a Pythagorean theorem expression.
4. An information transmission apparatus, comprising:
the information encryption module is used for encrypting the information to be sent by using the encryption key to obtain encrypted information;
the factor generating module is used for generating a key factor according to the encryption key, and the key factor is used for calculating a decryption key; the key factor and the encryption key meet a preset operation rule; the decryption key and the encryption key are the same;
and the information sending module is used for sending the encrypted information and the key factor so that an information receiving end calculates a decryption key by using the key factor and decrypts the encrypted information by using the decryption key.
5. An information transmitting apparatus includes a memory and a processor;
the memory to store computer program instructions;
the processor, configured to execute the computer program instructions to implement the following steps: encrypting information to be sent by using an encryption key to obtain encrypted information; generating a key factor according to the encryption key, wherein the key factor is used for calculating a decryption key; the key factor and the encryption key meet a preset operation rule; the decryption key and the encryption key are the same; and sending the encrypted information and the key factor so that an information receiving end calculates a decryption key by using the key factor and decrypts the encrypted information by using the decryption key.
6. An information acquisition method, comprising:
receiving encryption information and a key factor; the encryption information comprises information encrypted by using an encryption key; the key factor and the encryption key meet a preset operation rule; the key factor is generated based on the encryption key;
calculating a decryption key using the key factor; the decryption key and the encryption key are the same;
and decrypting the encrypted information by using the decryption key to obtain decrypted information.
7. The method of claim 6, wherein said calculating a decryption key using said key factor comprises:
calculating a decryption key by using the key factor according to a preset operation rule; the preset operation rule comprises an operation rule determined based on the pythagorean theorem.
8. The method of claim 7, wherein after receiving the encryption information and the key factor, further comprising:
receiving the association information of the key factor and a preset operation rule;
correspondingly, the calculating a decryption key by using the key factor includes:
and calculating a decryption key by using the key factor according to the associated information.
9. An information acquisition apparatus characterized by comprising:
the information receiving module is used for receiving the encryption information and the key factor; the encryption information comprises information encrypted by using an encryption key; the key factor and the encryption key meet a preset operation rule; the key factor is generated based on the encryption key;
the key calculation module is used for calculating a decryption key by using the key factor; the decryption key and the encryption key are the same; and the decryption module is used for decrypting the encrypted information by using the decryption key to obtain decrypted information.
10. An information acquisition apparatus includes a memory and a processor;
the memory to store computer program instructions;
the processor, configured to execute the computer program instructions to implement the following steps: receiving encryption information and a key factor; the encryption information comprises information encrypted by using an encryption key; the key factor is generated based on the encryption key; the key factor and the encryption key meet a preset operation rule; calculating a decryption key using the key factor; the decryption key and the encryption key are the same; and decrypting the encrypted information by using the decryption key to obtain decrypted information.
CN201911409158.3A 2019-12-31 2019-12-31 Information sending method, information obtaining method, device and equipment Active CN111193741B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911409158.3A CN111193741B (en) 2019-12-31 2019-12-31 Information sending method, information obtaining method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911409158.3A CN111193741B (en) 2019-12-31 2019-12-31 Information sending method, information obtaining method, device and equipment

Publications (2)

Publication Number Publication Date
CN111193741A CN111193741A (en) 2020-05-22
CN111193741B true CN111193741B (en) 2022-09-13

Family

ID=70709724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911409158.3A Active CN111193741B (en) 2019-12-31 2019-12-31 Information sending method, information obtaining method, device and equipment

Country Status (1)

Country Link
CN (1) CN111193741B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865561B (en) * 2020-06-28 2023-10-13 深圳市七星电气与智能化工程科技有限公司 Data encryption and decryption method and device and electronic equipment
CN114338710A (en) * 2021-12-21 2022-04-12 杭州逗酷软件科技有限公司 Data synchronization method and device, computer storage medium and related equipment
CN114884716B (en) * 2022-04-28 2024-02-27 世融能量科技有限公司 Encryption and decryption method, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742229A (en) * 2008-11-25 2010-06-16 北京中星微电子有限公司 Method, system and device for improving safety of monitoring data
CN105245505A (en) * 2015-09-14 2016-01-13 深圳市优友互联有限公司 Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN107086915A (en) * 2017-05-25 2017-08-22 山东浪潮商用系统有限公司 A kind of data transmission method, data sending terminal and data receiver
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742229A (en) * 2008-11-25 2010-06-16 北京中星微电子有限公司 Method, system and device for improving safety of monitoring data
CN105245505A (en) * 2015-09-14 2016-01-13 深圳市优友互联有限公司 Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN107086915A (en) * 2017-05-25 2017-08-22 山东浪潮商用系统有限公司 A kind of data transmission method, data sending terminal and data receiver
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric

Also Published As

Publication number Publication date
CN111193741A (en) 2020-05-22

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN111193741B (en) Information sending method, information obtaining method, device and equipment
WO2021017420A1 (en) Data processing method and apparatus, and electronic device
CN110650010B (en) Method, device and equipment for generating and using private key in asymmetric key
CN110162551B (en) Data processing method and device and electronic equipment
US10320758B2 (en) Cryptography using multi-factor key system and finite state machine
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
CN109818741B (en) Decryption calculation method and device based on elliptic curve
WO2016053729A1 (en) Method and system for secure management of computer applications
US10885203B2 (en) Encrypted data exchange
JP2015517685A (en) Method, apparatus and system for implementing media data processing
USRE47324E1 (en) Data encryption systems and methods
CN106817358B (en) Encryption and decryption method and device for user resources
CN113343305A (en) Intersection calculation method, device and equipment of private data and storage medium
CN110661618B (en) Data transmission method and device and electronic equipment
CN115580396B (en) Tight trace query system and method
Gupta et al. A new way to design and implementation of hybrid crypto system for security of the information in public network
US10063655B2 (en) Information processing method, trusted server, and cloud server
CN104038336A (en) Data encryption method based on 3DES
JP2012080152A (en) Encryption system, encryption apparatus, decryption apparatus, encryption system program and encryption method
CN106411520B (en) Method, device and system for processing virtual resource data
CN114726512B (en) Data processing method and device
CN110730167B (en) Data sending method, data query method, device, electronic equipment and system
CN110650119A (en) Data transmission method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant