CN111740958A - Data encryption method, data decryption method, encryption and decryption transmission method and system - Google Patents
Data encryption method, data decryption method, encryption and decryption transmission method and system Download PDFInfo
- Publication number
- CN111740958A CN111740958A CN202010439238.XA CN202010439238A CN111740958A CN 111740958 A CN111740958 A CN 111740958A CN 202010439238 A CN202010439238 A CN 202010439238A CN 111740958 A CN111740958 A CN 111740958A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- identity information
- encryption
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 230000005540 biological transmission Effects 0.000 title claims description 31
- 238000004891 communication Methods 0.000 claims abstract description 12
- 238000013507 mapping Methods 0.000 claims abstract description 11
- 230000002457 bidirectional effect Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000000875 corresponding effect Effects 0.000 description 29
- 238000012545 processing Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000002596 correlated effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data encryption method, which is used for a first terminal and is in communication connection with a second terminal, and is characterized by comprising the following steps: acquiring first identity information of a first terminal and second identity information of a second terminal; the first identity information and the second identity information are used for mapping corresponding first secret keys; sending the encrypted ciphertext to a second terminal; the encrypted ciphertext is obtained by encrypting the data plaintext according to the first secret key. The data plaintext is encrypted through the first secret key corresponding to the first identity information of the first terminal and the second identity information of the second terminal, and the security of data encryption can be improved through the encryption method aiming at different secret keys of different decryption methods.
Description
Technical Field
The invention relates to the field of data transmission safety, in particular to a data encryption method, a data decryption method, an encryption and decryption transmission method and an encryption and decryption transmission system.
Background
Currently, in internet communication, the secure transmission of personal private information is an urgent problem to be solved. In the related art, in order to ensure the secure transmission of data on the internet, data is usually encrypted by using an encryption key, and a terminal usually encrypts the data by using a group or a key, which is easily cracked by violence.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a data encryption method, a data decryption method and a data decryption system, which can separate an encryption party from an encryption key, perform service decoupling and improve the security of data encryption.
In a first aspect, an embodiment of the present invention provides a data encryption method, used in a first terminal, where the first terminal is in communication connection with a second terminal, where the method includes: acquiring first identity information of a first terminal and second identity information of a second terminal; the first identity information and the second identity information are used for mapping corresponding first secret keys; sending the encrypted ciphertext to a second terminal; the encrypted ciphertext is obtained by encrypting the data plaintext according to the first secret key.
The data encryption method of the embodiment of the invention at least has the following beneficial effects: the data plaintext is encrypted through the first secret key corresponding to the first identity information of the first terminal and the second identity information of the second terminal, and the security of data encryption can be improved through the encryption method aiming at different secret keys of different decryption methods.
According to another embodiment of the present invention, a method for encrypting data, which obtains first identity information of a first terminal and second identity information of a second terminal, includes: sending the data plaintext to be encrypted and the first identity information to an encryption server, so that the encryption server pre-allocates a corresponding secret key according to the first identity information to encrypt the data plaintext to be encrypted and generate a data ciphertext; and sending the data ciphertext to the second terminal.
According to another embodiment of the present invention, a method for encrypting data, which obtains first identity information of a first terminal and second identity information of a second terminal, includes: acquiring a software package containing a pre-allocated secret key corresponding to the first identity information according to the first identity information, and encrypting a data plaintext to be encrypted through a software package interface to generate a data ciphertext; and sending the data ciphertext to the second terminal.
According to another embodiment of the present invention, the key is: and replacing the encrypted plaintext by the pre-allocated short number corresponding to the second identity information.
According to another embodiment of the present invention, a data encryption method for transmitting a plaintext of data to be encrypted and first identity information to an encryption server, includes: and sending the data plaintext to be encrypted and the first identity information to the encryption server through the bidirectional SSL transmission message.
In a second aspect, an embodiment of the present invention provides a data decryption method, for a second terminal, where the second terminal is in communication connection with a first terminal, the method including: acquiring second identity information of a second terminal and first identity information of a first terminal; the second identity information and the first identity information are used for mapping a corresponding second secret key; receiving a data ciphertext from a first terminal; and decrypting the data ciphertext according to the second secret key to obtain a decrypted data plaintext.
The data decryption method of the embodiment of the invention at least has the following beneficial effects: the data ciphertext is decrypted through the first identity information of the first terminal and the second secret key corresponding to the second identity information of the second terminal, and the security of data encryption can be improved through the encryption method aiming at different secret keys of different decryption methods.
In a third aspect, an embodiment of the present invention provides a data encryption and decryption transmission method, including: an encryption and decryption server in communication with a first terminal and a second terminal, comprising: acquiring first identity information of a first terminal and second identity information of a second terminal; the first identity information and the second identity information are used for mapping corresponding first secret keys; sending the encrypted ciphertext to a second terminal; the encrypted ciphertext is obtained by encrypting the data plaintext according to the first secret key; the second terminal receives the data ciphertext from the first terminal; and decrypting the data ciphertext according to the first secret key to obtain a decrypted data plaintext.
The data encryption and decryption transmission method of the embodiment of the invention at least has the following beneficial effects: the information of the encryption terminal and the information of the decryption terminal correspond to different keys, so that the encryption key is separated from the encryption party and the decryption party, service decoupling is carried out, and the confidentiality of encrypted data is ensured.
According to another embodiment of the present invention, a data encryption and decryption transmission method for mapping a corresponding first key according to first identity information and second identity information includes: and obtaining a corresponding encryption key according to the first identity information and the data plaintext index.
In a fourth aspect, an embodiment of the present invention provides a data encryption and decryption transmission system, including: a first client and a second client;
the first client includes: a first memory, a first processor and a computer program stored on the first memory and executable on the first processor, the first processor implementing the data encryption method of any one of claims 1 to 5 when executing the program;
correspondingly, the second client comprises: a second memory, a second processor and a computer program stored on the second memory and executable on the second processor, the second processor implementing the data decryption method of claim 6 when executing the program.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions for:
performing the data encryption method of the first aspect;
or,
the data decryption method of the second aspect is performed.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
FIG. 1 is a flow chart of a data encryption method according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating a data decryption method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a data encryption/decryption transmission method according to an embodiment of the present invention.
Detailed Description
The concept and technical effects of the present invention will be clearly and completely described below in conjunction with the embodiments to fully understand the objects, features and effects of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and those skilled in the art can obtain other embodiments without inventive effort based on the embodiments of the present invention, and all embodiments are within the protection scope of the present invention.
In the description of the embodiments of the present invention, if "a number" is referred to, it means one or more, if "a plurality" is referred to, it means two or more, if "greater than", "less than" or "more than" is referred to, it is understood that the number is not included, and if "greater than", "lower" or "inner" is referred to, it is understood that the number is included. If reference is made to "first" or "second", this should be understood to distinguish between features and not to indicate or imply relative importance or to implicitly indicate the number of indicated features or to implicitly indicate the precedence of the indicated features.
In a first aspect, an embodiment of the present invention provides a data encryption method, where the data encryption method is used for a first terminal, and the first terminal is in communication connection with a second terminal.
Referring to fig. 1, a flowchart of a data encryption method in an embodiment of the present invention is shown. The method specifically comprises the following steps:
s101, acquiring first identity information of a first terminal and second identity information of a second terminal;
the first identity information and the second identity information are used for mapping the corresponding first key.
And S102, sending the encrypted ciphertext to the second terminal.
The encrypted ciphertext is obtained by encrypting the data plaintext according to the first secret key.
The embodiment of the invention mainly comprises two parts, wherein one part provides an online solution and dynamically generates the data rear-end ciphertext short number and the reverse rear-end short number through an online interface to obtain the data; and the other part is that under the condition that the network is not available or the performance requirement is high, the capacity of generating data rear-end ciphertext short numbers and reversely acquiring data is provided through the off-line SDK.
In some embodiments, obtaining the first identity information of the first terminal and the second identity information of the second terminal includes: sending the data plaintext to be encrypted and the first identity information to an encryption server, so that the encryption server pre-allocates a corresponding secret key according to the first identity information to encrypt the data plaintext to be encrypted and generate a data ciphertext; and sending the data ciphertext to the second terminal.
The online encryption method of the present invention is described below with a specific example, such as encrypting plaintext data at the end: 13412345678, encryption transmission is required, the encryption end and the decryption end perform association random distribution on the platform server to obtain keys keyA (000) and keyB (001), the encryption end transmits data 13412345678 and keyA (000) to the platform server, the service end selects a corresponding key according to the corresponding key to encrypt and obtain an encrypted ciphertext 57913, and the encrypted ciphertext is returned to the encryption end.
In some specific embodiments, the data encryption and decryption transmission method according to the embodiments of the present invention is applied as an online solution, and includes:
the method comprises the following steps that firstly, platform ids of an encryption user and a decryption user corresponding to the data encryption platform and the decryption platform are correlated, and the two correlated platforms use a group of unique keys to carry out encryption and decryption processing, so that data of the two platforms are guaranteed to be isolated from data of other platforms;
the configuration management platform of the server side is associated to generate platform keys corresponding to the two platforms;
in the calling process, starting from the encryption party, calling an encryption interface of the data encryption and decryption platform, transmitting a mobile phone number plaintext and a platform id, and generating a short number by the data encryption and decryption platform and returning the short number to the encryption party;
the encryption party obtains the mobile phone data ciphertext short number and transmits the mobile phone data ciphertext short number to the decryption party, the decryption party calls a data encryption and decryption platform decryption interface and transmits the mobile phone data ciphertext short number and the platform id, and the data encryption and decryption platform inquires out the mobile phone data plaintext and returns the mobile phone data plaintext to the decryption party;
and fifthly, after the decryption party obtains the plaintext of the mobile phone data, performing service logic processing, and returning the service logic processing to the encryption party to form a service closed loop.
In some specific embodiments, the encryption algorithm is separated from the encryption party and the decryption party in the online solution, and service decoupling is performed to ensure the confidentiality of data; by randomly generating the short number of the mobile phone, the disorder of the ciphertext is enhanced, so that the encryption is safer and is not easy to crack; and the short number ciphertext generated by the data encryption and decryption method of the embodiment of the invention does not need the characters of the url code, and is convenient to transmit in the url.
In some embodiments, obtaining the first identity information of the first terminal and the second identity information of the second terminal includes: acquiring a software package containing a pre-allocated secret key corresponding to the first identity information according to the first identity information, and encrypting a data plaintext to be encrypted through a software package interface to generate a data ciphertext; and sending the data ciphertext to the second terminal.
In some embodiments, an embodiment of the present invention further provides an offline encryption/decryption transmission solution, including:
the method comprises the steps that an offline sdk software development kit generated by two using platforms is used, when a transmission party encrypts mobile phone data, an encryption api is called to encrypt the mobile phone data to obtain a ciphertext, and the ciphertext is sent to a data receiving party; the data receiving party calls the decryption api to decrypt the mobile phone data to obtain a mobile phone data plaintext;
the mobile phone data short number is fixed to 6 bits, and data encryption and decryption are achieved by calling an api method of offline sdk in the application.
In some embodiments, the encryption and decryption algorithms in the offline scheme are as follows:
1. converting the input data into binary, such as: 13888888888 into:
1100111011110101111010000000111000
2. every 6 bits are used as a group, and the deficiency is filled with 0 at the beginning
001100|111011|110101|111010|000000|111000
3. Corresponding 6 bits are encoded in [0-9a-zA-Z- ] characters, and the encoded characters are scrambled and sequentially obfuscated according to an agreed key (the agreed key is uniformly and randomly generated by the platform and stored in sdk, and the keys used by each group of data transmission party and receiving party are different), for example: 001100 ═ a, 111011 ═ b, 110101 ═ c, 111010 ═ d, 000000 ═ e, 111000 ═ f, and the concrete data 13888888888 are converted into ciphertext short-cut with abcdef
4. The decryption mode is the reverse algorithm.
The off-line SDK encryption and decryption method improves the encryption and decryption operation efficiency through bit operation and bit operation, and a single server can encrypt and decrypt tens of thousands of mobile phone data per second.
In some embodiments the key is: and replacing the encrypted plaintext by the pre-allocated short number corresponding to the second identity information. In some embodiments, the plaintext data is randomly assigned with a corresponding short number, such as a 5-bit short number, i.e., the plaintext data is associated with 5-bit random short number data. When the 5-bit short number is used, a 6-bit or 7-bit short number may be used.
In some embodiments, sending the plaintext data to be encrypted and the first identity information to an encryption server comprises: and sending the data plaintext to be encrypted and the first identity information to the encryption server through the bidirectional SSL transmission message.
In some specific embodiments, the data encryption client communicates with the encryption server through an internal network and a bidirectional SSL transmission message, first, the data encryption client sends SSL client information to the encryption server, and the server returns SSL version information, a random number, and a server public key; the client checks whether the public key information sent by the server is legal or not, and sends the client certificate and the client public key to the server after the check is passed; the encryption server verifies whether the client certificate and the client public key are legal or not, and completes ssl bidirectional verification after the verification is passed; after the bidirectional verification is completed, the client of the encryption server exchanges the symmetric encryption algorithm and the key, and then the client encrypts the transmission information by using the exchanged symmetric key. The security of data transmission is ensured through SSL bidirectional authentication.
In a second aspect, an embodiment of the present invention provides a data decryption method, which is used for a second terminal, where the second terminal is in communication connection with a first terminal.
Referring to fig. 2, a flow chart of a data decryption method in the embodiment of the invention is shown. The method specifically comprises the following steps:
s201, acquiring second identity information of a second terminal and first identity information of a first terminal;
s202, receiving a data ciphertext from the first terminal;
s203, the data ciphertext is decrypted according to the second secret key to obtain a decrypted data plaintext.
In some embodiments, for example, the plaintext data at the encryption end: 13412345678, encryption transmission is required, so the thin encryption end and the decryption end perform association random distribution on the platform server to obtain keys keyA (000) and keyB (001), the encryption end transmits data 13412345678 and keyA (000) to the platform server, the service end selects a corresponding key according to the corresponding key to encrypt and obtain an encrypted ciphertext 57913, and the encrypted ciphertext is returned to the encryption end.
The encryption end transmits the data ciphertext 57913 to the decryption end, the decryption end sends the ciphertext 57913 and the keyB (001) to the server, and the server selects a corresponding decryption key according to the keyB (001) to decrypt the data ciphertext to obtain the data plaintext 13412345678 and returns the data plaintext to the decryption end.
In a third aspect, an embodiment of the present invention provides a data encryption and decryption transmission method, which is used for an encryption and decryption server, where the encryption and decryption server is in communication with a first terminal and a second terminal.
Referring to fig. 3, a flow chart of a data encryption and decryption transmission method in the embodiment of the present invention is shown. The method specifically comprises the following steps:
s301, acquiring first identity information of a first terminal and second identity information of a second terminal;
s302, sending the encrypted ciphertext to a second terminal;
s303, the second terminal receives a data ciphertext from the first terminal;
s304, the data ciphertext is decrypted according to the first secret key to obtain a decrypted data plaintext.
In some embodiments, obtaining the corresponding encryption key according to the first client information includes: and obtaining a corresponding encryption key according to the first client information and the data plaintext index. In some embodiments, the client id of the encryption party and the index of the corresponding data are stored in the server cache, and the data routing index (the client id + data of the encryption party) and the ciphertext routing index (the client id + ciphertext of the decryption party) are added according to the client id of the encryption party of the calling party, so that the high-speed forward and reverse query capability is provided, and the response efficiency of a query interface is improved.
In some embodiments, obtaining the corresponding decryption key according to the second client information includes: mapping a corresponding first key according to the first identity information and the second identity information, comprising: and obtaining a corresponding encryption key according to the first identity information and the data plaintext index.
In a fourth aspect, an embodiment of the present invention provides a data encryption and decryption transmission system. The method comprises the following steps: a first client and a second client;
the first client includes: a first memory, a first processor and a computer program stored on the first memory and executable on the first processor, the first processor implementing the data encryption method of the first aspect when executing the program;
correspondingly, the second client comprises: a second memory, a second processor and a computer program stored on the second memory and executable on the second processor, the second processor implementing the data decryption method according to the second aspect when executing the program.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions for:
performing the data encryption method of the first aspect;
or,
the data decryption method according to the second aspect is performed.
The above-described embodiments of the apparatus are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may also be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example," or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (10)
1. The data encryption method is used for a first terminal which is in communication connection with a second terminal, and is characterized by comprising the following steps:
acquiring first identity information of a first terminal and second identity information of a second terminal; the first identity information and the second identity information are used for mapping corresponding first secret keys;
sending the encrypted ciphertext to a second terminal; the encrypted ciphertext is obtained by encrypting a data plaintext according to the first secret key.
2. The data encryption method of claim 1, wherein the obtaining the first identity information of the first terminal and the second identity information of the second terminal comprises:
sending a data plaintext to be encrypted and first identity information to an encryption server, so that the encryption server encrypts the data plaintext to be encrypted according to a corresponding key pre-allocated to the first identity information and generates a data ciphertext;
and sending the data ciphertext to a second terminal.
3. The data encryption method of claim 1, wherein the obtaining the first identity information of the first terminal and the second identity information of the second terminal comprises:
acquiring a software package containing a pre-allocated secret key corresponding to the first identity information according to the first identity information, and encrypting a data plaintext to be encrypted through the software package interface to generate a data ciphertext;
and sending the data ciphertext to a second terminal.
4. The data encryption method according to claim 2, wherein the key is: and replacing the encrypted plaintext by a pre-allocated short number corresponding to the second identity information.
5. The data encryption method of claim 2, wherein the sending the plaintext data to be encrypted and the first identity information to the encryption server comprises:
and sending the data plaintext to be encrypted and the first identity information to the encryption server through the bidirectional SSL transmission message.
6. A data decryption method for a second terminal, the second terminal being in communication connection with a first terminal, the method comprising:
acquiring second identity information of a second terminal and first identity information of a first terminal; the second identity information and the first identity information are used for mapping corresponding second keys;
receiving a data ciphertext from a first terminal;
and decrypting the data ciphertext according to the second secret key to obtain a decrypted data plaintext.
7. The data encryption and decryption transmission method is used for an encryption and decryption server, the encryption and decryption server is communicated with a first terminal and a second terminal, and the data encryption and decryption transmission method is characterized by comprising the following steps:
acquiring first identity information of a first terminal and second identity information of a second terminal; the first identity information and the second identity information are used for mapping corresponding first secret keys;
sending the encrypted ciphertext to a second terminal; the encrypted ciphertext is obtained by encrypting a data plaintext according to a first secret key;
the second terminal receives the data ciphertext from the first terminal;
and decrypting the data ciphertext according to the first secret key to obtain a decrypted data plaintext.
8. The data encryption and decryption transmission method according to claim 7, wherein the mapping the corresponding first key according to the first identity information and the second identity information includes:
and obtaining a corresponding encryption key according to the first identity information and the data plaintext index.
9. Data encryption and decryption transmission system, characterized by comprising: a first client and a second client;
the first client includes: a first memory, a first processor and a computer program stored on the first memory and executable on the first processor, the first processor implementing the data encryption method of any one of claims 1 to 5 when executing the program;
correspondingly, the second client comprises: a second memory, a second processor and a computer program stored on the second memory and executable on the second processor, the second processor implementing the data decryption method of claim 6 when executing the program.
10. A computer-readable storage medium storing computer-executable instructions for:
performing the data encryption method of any one of claims 1 to 5;
or,
the data decryption method of claim 6 is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010439238.XA CN111740958A (en) | 2020-05-22 | 2020-05-22 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010439238.XA CN111740958A (en) | 2020-05-22 | 2020-05-22 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111740958A true CN111740958A (en) | 2020-10-02 |
Family
ID=72647567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010439238.XA Pending CN111740958A (en) | 2020-05-22 | 2020-05-22 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111740958A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112929169A (en) * | 2021-02-07 | 2021-06-08 | 成都薯片科技有限公司 | Key negotiation method and system |
CN114338113A (en) * | 2021-12-09 | 2022-04-12 | 安天科技集团股份有限公司 | Data encryption and decryption method and device, electronic equipment and storage medium |
CN115022000A (en) * | 2022-05-27 | 2022-09-06 | 北京交大微联科技有限公司 | Communication method and device of railway signal system and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030081785A1 (en) * | 2001-08-13 | 2003-05-01 | Dan Boneh | Systems and methods for identity-based encryption and related cryptographic techniques |
CN107085690A (en) * | 2017-04-27 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | Encryption method, decryption method and device |
CN107666541A (en) * | 2016-07-29 | 2018-02-06 | 汪风珍 | It is a kind of to realize number safety and the method for secret protection |
CN110188558A (en) * | 2019-05-29 | 2019-08-30 | 深圳市元征科技股份有限公司 | A kind of data processing method and relevant device |
CN110392029A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | Identity identifying method and system based on biological identification |
CN111147474A (en) * | 2019-12-23 | 2020-05-12 | 平安医疗健康管理股份有限公司 | Data encryption transmission method and device, computer equipment and storage medium |
-
2020
- 2020-05-22 CN CN202010439238.XA patent/CN111740958A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030081785A1 (en) * | 2001-08-13 | 2003-05-01 | Dan Boneh | Systems and methods for identity-based encryption and related cryptographic techniques |
CN107666541A (en) * | 2016-07-29 | 2018-02-06 | 汪风珍 | It is a kind of to realize number safety and the method for secret protection |
CN107085690A (en) * | 2017-04-27 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | Encryption method, decryption method and device |
CN110392029A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | Identity identifying method and system based on biological identification |
CN110188558A (en) * | 2019-05-29 | 2019-08-30 | 深圳市元征科技股份有限公司 | A kind of data processing method and relevant device |
CN111147474A (en) * | 2019-12-23 | 2020-05-12 | 平安医疗健康管理股份有限公司 | Data encryption transmission method and device, computer equipment and storage medium |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112929169A (en) * | 2021-02-07 | 2021-06-08 | 成都薯片科技有限公司 | Key negotiation method and system |
CN114338113A (en) * | 2021-12-09 | 2022-04-12 | 安天科技集团股份有限公司 | Data encryption and decryption method and device, electronic equipment and storage medium |
CN114338113B (en) * | 2021-12-09 | 2023-08-01 | 安天科技集团股份有限公司 | Data encryption and decryption methods and devices, electronic equipment and storage medium |
CN115022000A (en) * | 2022-05-27 | 2022-09-06 | 北京交大微联科技有限公司 | Communication method and device of railway signal system and electronic equipment |
CN115022000B (en) * | 2022-05-27 | 2023-12-01 | 北京交大微联科技有限公司 | Communication method and device of railway signal system and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
CN107086915B (en) | Data transmission method, data sending end and data receiving end | |
CN108632296B (en) | Dynamic encryption and decryption method for network communication | |
CN111740958A (en) | Data encryption method, data decryption method, encryption and decryption transmission method and system | |
CN105307165A (en) | Communication method based on mobile application, server and client | |
CN107483429B (en) | A kind of data ciphering method and device | |
CN115334497A (en) | Satellite terminal key distribution method, device and system | |
JP6468567B2 (en) | Key exchange method, key exchange system | |
Reshma et al. | Pairing-free CP-ABE based cryptography combined with steganography for multimedia applications | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN114697008A (en) | Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform | |
CN108718237A (en) | A kind of modified AKA identity authorization systems and method based on pool of symmetric keys | |
CN114760047B (en) | Quantum key management method, device and system | |
CN103188665A (en) | System, method and device of improving safety of cell phone receiving advertising | |
CN108809631B (en) | Quantum key service management system and method | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
CN113824713B (en) | Key generation method, system and storage medium | |
CN116886298A (en) | Method and equipment for enhancing FF3 format reserved encryption security | |
CN115834175A (en) | Quantum key-based group chat encryption method, message transmitting and receiving equipment and system | |
CN115589288A (en) | Method for realizing end-to-end VoIP encrypted communication based on quantum key pre-charging | |
CN110536030B (en) | Video color ring transmission method, system, electronic equipment and storage medium | |
CN114630290A (en) | Key agreement method, device, equipment and storage medium for voice encryption communication | |
AU2012311701B2 (en) | System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers | |
KR101293260B1 (en) | Mobile communication terminal and method | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201002 |