CN112052469A - Encryption method, decryption method, storage medium and terminal equipment - Google Patents
Encryption method, decryption method, storage medium and terminal equipment Download PDFInfo
- Publication number
- CN112052469A CN112052469A CN202010947904.0A CN202010947904A CN112052469A CN 112052469 A CN112052469 A CN 112052469A CN 202010947904 A CN202010947904 A CN 202010947904A CN 112052469 A CN112052469 A CN 112052469A
- Authority
- CN
- China
- Prior art keywords
- data
- decryption
- encryption
- encrypted
- decrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses an encryption method, a decryption method, a storage medium and a terminal device, wherein the encryption method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.
Description
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to an encryption method, a decryption method, a storage medium, and a terminal device.
Background
In recent years, people have more and more strong awareness of personal information security protection, and relevant important files of individuals may be stored in an encrypted manner. Besides directly setting password protection for files (including file compression encryption), encryption and decryption (public key encryption, private key decryption and private key protection can also be set for the private key) can be performed through encryption software, however, in any mode, the management problem of the password or the secret key exists, and if the password is forgotten or the decryption private key is lost, the problem that the files cannot be decrypted occurs.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an encryption method, a decryption method, a storage medium and a terminal device, aiming at the defects of the prior art, so as to avoid the problem that a file (data) cannot be decrypted when a user forgets a password or loses a decryption private key.
The technical scheme adopted by the invention is as follows:
in a first aspect, an embodiment of the present invention provides an encryption method, where the encryption method includes:
acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted;
determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set;
and encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
As a further improved technical solution, the encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data specifically includes:
generating an encryption key based on the set of encrypted answers;
and encrypting the data to be encrypted according to the encryption key to generate encrypted data.
As a further improved technical solution, the generating an encryption key based on the encrypted answer set specifically includes:
splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
and carrying out Hash operation on the spliced encryption answers to obtain an encryption key.
As a further improved technical solution, the encrypting the data to be encrypted according to the encryption key to generate encrypted data specifically includes:
and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
In a second aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes:
acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted;
determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set;
and decrypting the data to be decrypted according to the decryption answer set to generate decrypted data.
As a further improved technical solution, the decrypting the data to be decrypted according to the decryption answer set to generate decrypted data specifically includes:
generating a decryption key based on the set of decryption answers;
and decrypting the data to be decrypted according to the decryption key to generate decrypted data.
As a further improved technical solution, the generating a decryption key based on the decryption answer set specifically includes:
splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
and carrying out hash operation on the spliced decryption answer to obtain a decryption key.
As a further improved technical solution, the decrypting the data to be decrypted according to the decryption key to generate decrypted data specifically includes:
and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the encryption method described in any one of the above items or to implement the steps in the decryption method described in any one of the above items.
In a fourth aspect, an embodiment of the present invention provides a terminal device, which includes: a processor and memory and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the encryption method as described in any one of the above, or implements the steps in the decryption method as described in any one of the above.
Has the advantages that: compared with the prior art, the invention discloses an encryption method, a decryption method, a storage medium and a terminal device, wherein the encryption method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.
Drawings
Fig. 1 is a flowchart of an embodiment of an encryption method provided in the present invention.
Fig. 2 is a flowchart of an embodiment of a decryption method provided by the present invention.
Fig. 3 is a schematic diagram of a terminal device structure provided by the present invention.
Detailed Description
The present invention provides an encryption method, a decryption method, a storage medium and a terminal device, and in order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention will be further explained by the description of the embodiments with reference to the drawings.
The present embodiment provides an encryption method, as shown in fig. 1, the method includes:
s100, acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted.
In the embodiment, aiming at the problems that password encryption is set for data to be encrypted, passwords are forgotten and the like, the data encryption is carried out in a mode that a user sets the problems and answers by himself, correspondingly, in the embodiment, the data to be encrypted is obtained, meanwhile, an encryption problem set corresponding to the data to be encrypted is also obtained, the encryption problem set can correspond to one, two or more encryption problems, in addition, the encryption problems are set when the user encrypts the data to be encrypted, the problems can be dynamically set according to the actual conditions and requirements of the user, and therefore the user can set different difficult and easy problems according to the confidentiality of the data. In this embodiment, the confidentiality of the file to be encrypted is related to the guessability of the question itself, that is, for an encrypted question that is harder to answer by a non-user, the data is more confidential, and in practical application, the user can set 1 to N questions, that is, the greater the number of questions, the greater the difficulty in guessing answers to all the questions, the stronger the file confidentiality is. It should be noted that the setting of the encryption problem can be applied to many scenarios, the problem setting itself has no limitation, except that the description content length can require limitation, and one encryption problem content is too long and has little meaning to be described clearly.
S200, determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set.
Specifically, the encryption problem set includes a plurality of encryption problems, and if a password for a plurality of persons is required to be set to encrypt data, the data needs to be decrypted by the plurality of persons inputting the password set by the plurality of persons at the same time. Such a scenario may set the encryption problem as follows: the method has the advantages that when data to be decrypted is decrypted, the display of decryption problems has prompt effects (the password of Zusanli, the password of Lisiu and the password of Wangpen), so that the method is more beneficial to scenes needing to specify the password sequence, compared with the simple multiple compression encryption of files (data) to achieve the effect of multiple or multiple encryption, and when a user does not need to prompt the scene of the password sequence, the problem is set to be the problem of no prompt content like the password one, the password two and the password three.
On the other hand, the problem of setting is practically unlimited, but the more unknowable the problem of user setting is, the more the confidentiality of data is. For example, in a company, to encrypt its own file data, the following problem may be set: the name of old jiu, the fat true name of old classmates, child's ID card number and the like can't know the problem generally, it is more to relate to the scene to file data security, can combine several problems to set up, will be stronger to the protectiveness of file. It can be understood that the setting of the encryption question is actually the setting of a question that can be answered by oneself, but not by oneself. The encryption and decryption mode of setting the question and the answer not only solves the problem that the password is easy to forget, but also can meet the requirement of the user on the protection of the file data. On the other hand, the method solves the problem that the conventional encryption and decryption have limitations, for example, when multiple encryption is needed, the order of the passwords needs to be prompted.
S300, encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
In this embodiment, the obtaining of the encrypted data according to a pre-generated encryption key, and correspondingly encrypting the data to be encrypted according to the encrypted answer set to generate the encrypted data specifically includes:
s301, generating an encryption key based on the encryption answer set.
In this embodiment, generating an encryption key based on the encrypted answer set specifically includes:
s3011, splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
s3012, performing hash operation on the spliced encrypted answers to obtain an encryption key.
In this embodiment, each encrypted answer is spliced according to the position sequence of each encrypted answer in the encrypted answer set, so that a spliced encrypted answer can be obtained, and then hash operation is performed on the spliced encrypted answer to obtain an encryption key. In practical application, the hash operation of the encrypted answer is only one application in technology, and is substantially to generate the most critical key of the data to be encrypted according to the encrypted answer. For example: when encryption is performed, two questions are set, the name of old jiu, the true name of old classmate are also input as answers, the corresponding standard answers (zhang san and lie quan) are also input simultaneously, and then the answer one (zhang) and the answer two (lie quan) are spliced into zhang trillin quan', the character string is subjected to Hash (such as MD5) to obtain the value of 7b421930127f4bb35626d9da1aa0a73b, so that the encryption key can be obtained, wherein the encryption key is 7b421930127f4bb35626d9da1aa0a73 b. In practical application, when a user inputs answers to questions, the answers can be displayed and protected, and whether the answers are password answers or other question answers can be displayed in a star mode, so that the data security is improved.
S302, encrypting the data to be encrypted according to the encryption key to generate encrypted data.
In this embodiment, after obtaining the encryption key, the to-be-encrypted data may be further encrypted according to the encryption key, for example, the encryption key is 7b421930127f4bb35626d9da1aa0a73b, and then the to-be-encrypted data is encrypted according to the encryption key, and accordingly, in practical application, encrypting the to-be-encrypted data according to the encryption key to generate the encrypted data specifically includes: and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
Based on the above encryption method, this embodiment further provides a decryption method, as shown in fig. 2, where the decryption method is used to decrypt the encrypted data obtained by the encryption method according to the above embodiment, and the decryption method includes:
h100, acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted.
Specifically, the data to be decrypted is the encrypted data obtained by the encryption method in the above embodiment, and it can be understood that the decryption problem sets correspond to the encryption problem sets one to one, and in practical application, the data to be decrypted carries the decryption problem sets, so that the playback of the decryption problem during decryption is facilitated. Conveniently for obtaining the decryption answer from the decryption question.
And H200, determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set.
Specifically, the decryption question set includes a plurality of decryption questions, the plurality of decryption questions may be displayed on the software interface according to respective position sequences in the set, and the user needs to input a decryption answer corresponding to each decryption question, so that a decryption answer set may be obtained, and thus, the data to be decrypted is decrypted according to the decryption answer set.
And H300, decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data.
In this embodiment, decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data specifically includes:
and H301, generating a decryption key based on the decryption answer set.
In this embodiment, generating a decryption key based on the decryption answer set specifically includes:
h3011, splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
h3012, carrying out hash operation on the spliced decryption answers to obtain a decryption key.
In this embodiment, each decryption answer is spliced according to the position sequence of each decryption answer in the decryption answer set, so that a spliced decryption answer can be obtained, and then hash operation is performed on the spliced decryption answer to obtain a decryption key. In practical application, the hash operation of the decryption answer is only one application in the technology, and is substantially to generate the most critical key of the data to be encrypted according to the decryption answer. It should be noted that the hash operation used in step H3012 uses the same algorithm as the hash operation used in the above encryption method, and if the answer returned by the user during decryption is correct and is equal to the key of the data to be encrypted and decrypted, the encryption and decryption can be successful.
And H302, decrypting the data to be decrypted according to the decryption key to generate decrypted data.
In this embodiment, after obtaining the decryption key, the to-be-decrypted data may be further decrypted according to the decryption key, for example, the decryption key is 7b421930127f4bb35626d9da1aa0a73b, and then the to-be-decrypted data is decrypted according to the decryption key, and accordingly, in practical application, the decrypting the to-be-decrypted data according to the decryption key to generate the decrypted data specifically includes: and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
In summary, compared with the prior art, the embodiment of the invention has the following advantages:
the invention discloses an encryption method and a decryption method, wherein the method comprises the following steps: acquiring data to be encrypted and an encryption question set corresponding to the data to be encrypted, acquiring an encryption answer set according to the encryption question set, and encrypting the data to be encrypted by adopting the encryption answer set; and when decrypting, the method comprises the following steps: and acquiring data to be decrypted and a decryption question set corresponding to the data to be decrypted, acquiring a decryption answer set according to the decryption question set, and decrypting the data to be decrypted by adopting the decryption answer set. Therefore, the problems of forgetting the password and the like can occur when the password encryption is set for the encrypted data, the data is encrypted by setting the problems and the answers by the user, the problems of forgetting the password and the like can occur when the password decryption is set for the decrypted data, and the data is decrypted by setting the problems and the answers by the user, so that the usability of file encryption and the safety of the data are improved.
Based on the encryption method and the decryption method, the present invention also provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the steps in the encryption method according to the above embodiment or to implement the steps in the decryption method according to the above embodiment.
Based on the above encryption method and decryption method, the present invention also provides a terminal device, as shown in fig. 3, which includes at least one processor (processor) 20; a display screen 21; and a memory (memory)22, and may further include a communication Interface (Communications Interface)23 and a bus 24. The processor 20, the display 21, the memory 22 and the communication interface 23 can communicate with each other through the bus 24. The display screen 21 is configured to display a user guidance interface preset in the initial setting mode. The communication interface 23 may transmit information. The processor 20 may call logic instructions in the memory 22 to perform the methods in the embodiments described above.
Furthermore, the logic instructions in the memory 22 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product.
The memory 22, which is a computer-readable storage medium, may be configured to store a software program, a computer-executable program, such as program instructions or modules corresponding to the methods in the embodiments of the present disclosure. The processor 20 executes the functional application and data processing, i.e. implements the method in the above-described embodiments, by executing the software program, instructions or modules stored in the memory 22.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 22 may include a high speed random access memory and may also include a non-volatile memory. For example, a variety of media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, may also be transient storage media.
In addition, the specific processes loaded and executed by the storage medium and the instruction processors in the terminal device are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. An encryption method, characterized in that the encryption method comprises:
acquiring data to be encrypted and an encryption problem set corresponding to the data to be encrypted;
determining an encryption answer corresponding to each encryption question in the encryption question set to obtain an encryption answer set;
and encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data.
2. The encryption method according to claim 1, wherein the encrypting the data to be encrypted according to the encrypted answer set to generate encrypted data specifically includes:
generating an encryption key based on the set of encrypted answers;
and encrypting the data to be encrypted according to the encryption key to generate encrypted data.
3. The encryption method according to claim 2, wherein the generating an encryption key based on the encrypted answer set specifically includes:
splicing each encrypted answer according to the position sequence of each encrypted answer in the encrypted answer set;
and carrying out Hash operation on the spliced encryption answers to obtain an encryption key.
4. The encryption method according to claim 2, wherein the encrypting the data to be encrypted according to the encryption key to generate encrypted data specifically includes:
and encrypting the data to be encrypted by adopting a symmetric algorithm according to the encryption key to generate encrypted data.
5. A decryption method, characterized in that the decryption method comprises:
acquiring data to be decrypted and a decryption problem set corresponding to the data to be decrypted;
determining a decryption answer corresponding to each decryption question in the decryption question set to obtain a decryption answer set;
and decrypting the data to be decrypted according to the decryption answer set to generate decrypted data.
6. The decryption method according to claim 5, wherein the decrypting the data to be decrypted according to the decrypted answer set to generate decrypted data specifically includes:
generating a decryption key based on the set of decryption answers;
and decrypting the data to be decrypted according to the decryption key to generate decrypted data.
7. The decryption method according to claim 6, wherein the generating a decryption key based on the decrypted answer set specifically includes:
splicing each decryption answer according to the position sequence of each decryption answer in the decryption answer set;
and carrying out hash operation on the spliced decryption answer to obtain a decryption key.
8. The decryption method according to claim 6, wherein the decrypting the data to be decrypted according to the decryption key to generate decrypted data specifically includes:
and decrypting the data to be decrypted by adopting a symmetric algorithm according to the decryption key to generate decrypted data.
9. A computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to perform the steps in the encryption method according to any one of claims 1 to 4 or to perform the steps in the decryption method according to any one of claims 5 to 8.
10. A terminal device, comprising: a processor and memory and a communication bus; the memory has stored thereon a computer readable program executable by the processor;
the communication bus realizes connection communication between the processor and the memory;
the processor, when executing the computer readable program, implements the steps in the encryption method of any one of claims 1 to 4 or implements the steps in the decryption method of any one of claims 5 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010947904.0A CN112052469A (en) | 2020-09-10 | 2020-09-10 | Encryption method, decryption method, storage medium and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010947904.0A CN112052469A (en) | 2020-09-10 | 2020-09-10 | Encryption method, decryption method, storage medium and terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112052469A true CN112052469A (en) | 2020-12-08 |
Family
ID=73611426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010947904.0A Pending CN112052469A (en) | 2020-09-10 | 2020-09-10 | Encryption method, decryption method, storage medium and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112052469A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014183671A1 (en) * | 2013-05-17 | 2014-11-20 | 天津书生投资有限公司 | Safety control method for cloud storage |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
US20200389302A1 (en) * | 2017-12-15 | 2020-12-10 | Orange | Technique for protecting a cryptographic key by means of a user password |
-
2020
- 2020-09-10 CN CN202010947904.0A patent/CN112052469A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014183671A1 (en) * | 2013-05-17 | 2014-11-20 | 天津书生投资有限公司 | Safety control method for cloud storage |
US20200389302A1 (en) * | 2017-12-15 | 2020-12-10 | Orange | Technique for protecting a cryptographic key by means of a user password |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
TWI578749B (en) | Methods and apparatus for migrating keys | |
CN112165490B (en) | Encryption method, decryption method, storage medium and terminal equipment | |
CN108712412B (en) | Database encryption and decryption methods and devices, storage medium and terminal | |
CA2701061C (en) | Method and system for recovering a security credential | |
US9313185B1 (en) | Systems and methods for authenticating devices | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
WO2016045464A1 (en) | Decryption method and mobile terminal | |
WO2017050152A1 (en) | Password security system adopted by mobile apparatus and secure password entering method thereof | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
US20180225467A1 (en) | Method and system for data protection | |
KR100954841B1 (en) | Method and Apparatus of managing unity data on mobile device and Recording medium using this | |
EP3866039A1 (en) | Method and system for protecting authentication credentials | |
CN106845264A (en) | Using encryption method, device and application access method, device | |
CN113726515B (en) | UKEY-based key processing method, storage medium and electronic device | |
CN107135074A (en) | A kind of advanced security method and apparatus | |
CN112052469A (en) | Encryption method, decryption method, storage medium and terminal equipment | |
CN112637140A (en) | Password transmission method, terminal, server and readable storage medium | |
CN111859423A (en) | Information security encryption method and device | |
JP2007150780A (en) | Enciphering method, apparatus and program | |
US20230388115A1 (en) | Non-Custodial Backup and Recovery | |
CN114297715B (en) | File encryption method, file processing method, file encryption device, file processing device and electronic equipment | |
US20220278974A1 (en) | System, device and methods for secure exchange of text messages | |
CN114329510A (en) | Digital authorization method, device, terminal equipment and storage medium | |
EP3982592A1 (en) | Identity verification program, identity verification method, user terminal, and user authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220601 Address after: 570100 Room 102, 1st floor, building B28, zone B, Hainan Ecological Software Park, high tech industry demonstration zone, Laocheng Town, Chengmai County, Haikou City, Hainan Province Applicant after: Hainan fenghuangmu Technology Co.,Ltd. Address before: 518040 4th floor, Sunshine Golf building, 7008 Shennan Avenue, Futian District, Shenzhen City, Guangdong Province Applicant before: PENGYUAN CREDIT SERVICE CO.,LTD. |