CN112055004A - Data processing method and system based on small program - Google Patents

Data processing method and system based on small program Download PDF

Info

Publication number
CN112055004A
CN112055004A CN202010873540.6A CN202010873540A CN112055004A CN 112055004 A CN112055004 A CN 112055004A CN 202010873540 A CN202010873540 A CN 202010873540A CN 112055004 A CN112055004 A CN 112055004A
Authority
CN
China
Prior art keywords
key
applet
symmetric key
request message
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010873540.6A
Other languages
Chinese (zh)
Inventor
孟繁贵
梁锐
邢磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202010873540.6A priority Critical patent/CN112055004A/en
Publication of CN112055004A publication Critical patent/CN112055004A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention discloses a data processing method and system based on an applet, and relates to the technical field of computers. The method comprises the following steps: receiving a public key in an asymmetric key pair sent by an applet server; randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key; the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of a request message; and sending the encrypted request message to an applet server. By the method, the data transmission safety and transmission efficiency of the applet can be improved, and the universality of the encryption and decryption algorithm can be improved.

Description

Data processing method and system based on small program
Technical Field
The invention relates to the technical field of computers, in particular to a data processing method and system based on an applet.
Background
The applet is a simple and efficient application development framework. The existing applet generally adopts a symmetric encryption algorithm or an asymmetric encryption algorithm for the encryption of information data.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art: firstly, keys in the encryption and decryption processes of the symmetric encryption algorithm are the same and are easy to leak, so that the data transmission security of the existing small program is poor; secondly, when the asymmetric encryption algorithm is used for encrypting the information data in the existing small program, the encryption and decryption time consumption is long, the speed of the encryption and decryption process is low, the small program is only suitable for encrypting a small amount of data, the small program is not suitable for encrypting files, and the universality is poor.
Disclosure of Invention
In view of this, the present invention provides a data processing method and system based on an applet, which can improve the data transmission security and transmission efficiency of the applet, and is suitable for different types of transmission data, and improve the universality of the encryption and decryption algorithm.
To achieve the above object, according to one aspect of the present invention, there is provided an applet-based data processing method applied to an applet client, including:
receiving a public key in an asymmetric key pair sent by an applet server;
randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key;
the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of a request message;
and sending the encrypted request message to an applet server.
Optionally, the randomly generating a symmetric key comprises:
and randomly selecting a plurality of characters from a preset character string to generate the symmetric key.
Optionally, the symmetric key is N characters, and is generated by M times of random selection; wherein M and N are positive integers, and M is more than or equal to 1 and less than or equal to N.
Optionally, the symmetrically encrypting the message content of the request message by using the symmetric key includes:
serializing the message content of the request message, and encrypting the message content of the request message after the serialization processing according to the symmetric key and the key offset.
Optionally, the method further comprises:
before encrypting the message content of the request message by using the symmetric key, introducing a symmetric encryption algorithm library file.
Optionally, the asymmetrically encrypting the symmetric key using the public key of the asymmetric key pair comprises:
and carrying out asymmetric encryption on the symmetric key according to the public key in the asymmetric key pair and an asymmetric encryption algorithm.
Optionally, the method further comprises:
before the public key in the asymmetric key pair is used for encrypting the symmetric key, a simplified asymmetric encryption algorithm library file is introduced.
Optionally, the simplified asymmetric encryption algorithm library file is a simplified RSA algorithm library file; and obtaining a simplified RSA algorithm library file according to the following mode:
and performing confusion and/or compression processing on the RSA algorithm library file to obtain the simplified RSA algorithm library file.
Optionally, the method further comprises:
and after receiving the encrypted response message sent by the applet service end, symmetrically decrypting the response message by using the symmetric key.
According to another aspect of the present invention, there is provided an applet-based data processing method, applied to an applet server, including:
generating an asymmetric key pair, and providing a public key in the asymmetric key pair to an applet client;
after receiving an encrypted request message sent by an applet client, asymmetrically decrypting a message header of the encrypted request message by using a private key of the asymmetric key pair to obtain a symmetric key;
and symmetrically decrypting the message content of the encrypted request message by using the symmetric key.
Optionally, the method further comprises:
after the message content of the encrypted request message is symmetrically decrypted by using the symmetric key, a response message is generated;
and symmetrically encrypting the message content of the response message by using the symmetric key, and sending the encrypted response message to the applet client.
Optionally, the key length of the public key and the key length of the private key in the asymmetric key pair are both 2084 bits, and the key format is PKCS #8 format.
Optionally, the asymmetrically decrypting the header of the encrypted request packet by using the private key in the asymmetric key pair to obtain a symmetric key includes:
and asymmetrically decrypting the message header of the encrypted request message according to the private key in the asymmetric key pair and an RSA algorithm to obtain a symmetric key.
Optionally, the symmetrically decrypting the message content of the encrypted request message by using the symmetric key includes:
and symmetrically decrypting the message content of the encrypted request message according to the symmetric key and the key offset.
According to yet another aspect of the present invention, there is provided an applet-based data processing system comprising:
the small program server is used for generating an asymmetric key pair and providing a public key in the asymmetric key pair to the small program client;
the small program client is used for randomly generating a symmetric key and symmetrically encrypting the message content of the request message by using the symmetric key so as to obtain the encrypted message content of the request message; the applet client uses the public key in the asymmetric key pair to perform asymmetric encryption on the symmetric key, and places the encrypted symmetric key into the message header of the request message; then, the applet client sends the encrypted request message to the applet server;
the applet server is further used for asymmetrically decrypting the message header of the encrypted request message by using a private key in the asymmetric key pair after receiving the encrypted request message so as to obtain the symmetric key; the applet server is further configured to symmetrically decrypt the encrypted message content of the request message by using the symmetric key to obtain the message content of the request message.
According to another aspect of the invention, there is provided an applet-based data processing electronic device comprising:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the data processing method provided by the present invention.
According to yet another aspect of the present invention, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, implements the data processing method provided by the present invention.
One embodiment of the above invention has the following advantages or benefits: by adopting the technical means of combining the symmetric encryption and the asymmetric encryption based on the applet and the like, the technical problems of easy leakage, poor data transmission safety and long time consumption and low speed of the asymmetric encryption algorithm of the conventional symmetric encryption algorithm are solved, so that the technical effects of improving the data transmission safety and the transmission efficiency of the applet, being suitable for different types of transmission data and improving the universality of the encryption and decryption algorithm are achieved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a applet-based data processing method according to a first embodiment of the present invention;
fig. 2 is a schematic diagram of a detailed flow of randomly generating a symmetric key in a method according to a first embodiment of the present invention;
fig. 3 is a schematic diagram of a detailed flow of encrypting the message content of the request message by using the symmetric key in the method according to the first embodiment of the present invention;
fig. 4 is a schematic diagram of a detailed flow of encrypting a symmetric key by using a public key in a method according to a first embodiment of the present invention;
FIG. 5 is a schematic diagram of a main flow of a applet-based data processing method according to a second embodiment of the present invention;
FIG. 6 is a diagram illustrating a detailed flow of decrypting a symmetric key using a private key in a method according to a second embodiment of the invention;
FIG. 7 is a diagram illustrating a detailed flow of a self-developed RSA encryption algorithm in a method according to a second embodiment of the present invention;
fig. 8 is a schematic diagram illustrating a detailed flow of decrypting the message content of the request message using the symmetric key in the method according to the second embodiment of the present invention;
FIG. 9 is a schematic diagram of a main flow of a applet-based data processing method according to a third embodiment of the present invention;
FIG. 10 is a schematic diagram of an applet-based data processing system in accordance with an embodiment of the present invention;
FIG. 11 is an exemplary system architecture diagram of a data processing system in which embodiments of the present invention may be applied;
FIG. 12 is a block diagram of a computer system suitable for use with the electronic device to implement an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Data encryption: the method is characterized in that a special algorithm is used for changing original information data, so that even if an unauthorized user obtains encrypted information, the content of the information cannot be obtained due to the unknown decryption method.
Data decryption: the method is a process of changing encrypted information into plaintext information through a special algorithm, so that an authorized user can acquire information data before encryption through data decryption according to the acquired encrypted information.
Symmetric encryption algorithm: the data encryption process and the data decryption process use the same key.
Asymmetric encryption algorithm: the data encryption process and the data decryption process use different keys, which typically include: the public and private keys are used in pairs. Encrypted using a public key, and only decrypted using a private key; encrypted using a private key and only decrypted using a public key.
3 DES: the Triple Data Encryption Algorithm (TDEA) block cipher is a generic name, belongs to a mode of DES Encryption Algorithm, belongs to symmetric Encryption Algorithm, and is equivalent to applying DES Encryption Algorithm for three times to each Data block. The DES is known as Data Encryption Standard, which is a Data Encryption Standard, and is a block algorithm that uses the same key for Encryption and decryption.
The RSA algorithm: the public key cryptosystem is a public key cryptosystem which is provided by three people of Ron Rivest, Adi Shamir and Leonard Adleman and uses different encryption keys and decryption keys, and belongs to an asymmetric encryption algorithm. A pair of keys is typically generated first, one of which is a secret key, held by the user; the other is a public key which can be disclosed to the outside.
PKCS < Public Key Cryptographics Standards >: the system is a set of public key cryptography standards, and a plurality of standards such as PKCS #1, PKCS #2, … …, PKCS #15 and the like are published according to different algorithms, application objects, protection degree requirements and the like.
The first embodiment is as follows:
fig. 1 is a schematic diagram of a main flow of a data processing method based on an applet according to a first embodiment of the present invention, and as shown in fig. 1, the data processing method based on an applet according to the first embodiment of the present invention is applied to an applet client, and includes:
and step S101, receiving a public key in the asymmetric key pair sent by the applet server.
In this step, the applet server provides the public key in the asymmetric key pair to the applet client, and the applet client receives the public key in the asymmetric key pair sent by the applet server.
Further, the asymmetric key pair is generated by the applet server and comprises a public key and a private key, namely a public key and a private key.
Further, the applet may be a WeChat applet, which has rich components and API (Application Programming Interface), and may help a developer to quickly develop a program with a native APP experience therein. Correspondingly, the applet server is a wechat applet server, and the applet client is a wechat applet client.
And S102, randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key.
In this step, the applet client randomly generates a symmetric key, and symmetrically encrypts the message content of the request message using the symmetric key to obtain the encrypted message content of the request message. The request message includes a message header and message content.
Further, the applet client generates a symmetric key through a random algorithm, wherein the symmetric key is a 24-bit key, and the random algorithm is to randomly and recursively select 24 characters from a predetermined character string to form the 24-bit symmetric key.
Further, the symmetric encryption algorithm for the applet client to symmetrically encrypt the message content of the request message may be a 3DES algorithm. The 3DES algorithm can be a double-length 3DES algorithm or a triple-length 3DES algorithm, wherein the key length of the double-length 3DES algorithm is 16 bits, and the key length of the triple-length 3DES algorithm is 24 bits.
Further, the 3DES algorithm in the embodiment of the present invention is a three-time long 3DES algorithm, and accordingly, the key length of the symmetric key is 24 bits.
Optionally, the 3DES algorithm in the embodiment of the present invention is a double-length 3DES algorithm, and the key length of the symmetric key is 16 bits, which may be used in a scenario with low requirement on data security. Accordingly, the random algorithm is to randomly and recursively select 16 characters from a predetermined string of characters to form a 16-bit symmetric key.
Optionally, the symmetric Encryption Algorithm for the applet client to symmetrically encrypt the message content of the request message may be AES (Advanced Encryption Standard, also called Rijndael Encryption Algorithm), Blowfish Algorithm (block Encryption Algorithm proposed by Bruce Schneider), RC4 (a packet Encryption Algorithm proposed by Ronald l.rivest), or IDEA (International Data Encryption Algorithm).
Step S103, the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of the request message.
In this step, according to the public key in the asymmetric key pair sent by the applet server received in step S101, the applet client uses the public key in the asymmetric key pair to perform asymmetric encryption on the symmetric key, and places the encrypted symmetric key in the header of the request message.
Further, the content of the header includes fields such as application type, version protocol, version number, header length, message content length, terminal information, processing requirements, encryption key, and the like. Correspondingly, the step of placing the encrypted symmetric key into the header of the request message includes: and putting the encrypted symmetric key into an encryption key field of a message header of the request message.
And step S104, sending the encrypted request message to the applet server.
In this step, the applet client performs asymmetric encryption on the symmetric key, and after the encrypted symmetric key is put into a message header of a request message, the applet client sends the encrypted request message to the applet server.
In the embodiment of the invention, the applet client receives a public key in an asymmetric key pair sent by the applet server; randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key; the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of a request message; and sending the encrypted request message to the applet server, and the like, so that the information data can be prevented from being leaked when the applet encrypts the information data, and the data transmission safety of the applet is improved.
Fig. 2 is a schematic diagram of a detailed flow of randomly generating a symmetric key in a method according to a first embodiment of the present invention, and as shown in fig. 2, the detailed flow of randomly generating a symmetric key in the method according to the first embodiment of the present invention includes:
step S201, randomly selecting a character from a predetermined character string and storing the selected character.
In this step, the applet client randomly selects and stores a character from a predetermined string of characters, which is composed of arabic numerals 0 to 9, lowercase english alphabets a to Z, and uppercase english alphabets a to Z, that is: 0123456789 abcdefghijklmnopqrstuvxyz.
Further, the predetermined character string may be defined as needed. For example, a plurality of same or different numbers and letters are selected by oneself to form a character string.
Step S202, judging whether the circulation times are less than or equal to the length of the symmetric key.
In this step, it is determined whether the number of cycles of randomly generating the symmetric key currently executed by the applet client is less than or equal to the length of the symmetric key, if so, step S203 is executed; if not, step S201 is executed.
Further, if the key length of the symmetric key is 24 bits, it is determined whether the number of cycles of randomly generating the symmetric key currently executed by the applet client is less than or equal to 24.
And step S203, splicing the circularly generated characters into a symmetric key.
In this step, the applet client splices the characters randomly selected and generated after the loop is completed to splice the symmetric key.
Further, the key length of the symmetric key is 24 bits, and the applet client randomly selects and generates 24 characters after the loop is completed, and splices the characters into the symmetric key.
In the embodiment of the invention, one character is randomly selected from a predetermined character string and is stored; judging whether the cycle number is less than or equal to the length of the symmetric key; and splicing the circularly generated characters into a symmetric key and the like, so that the security of the symmetric key is greatly improved, the key is prevented from being revealed, the risk of violently cracking the key by an illegal user is reduced, and the data transmission security of the small program can be improved.
Fig. 3 is a schematic diagram of a detailed flow of encrypting the message content of the request message by using the symmetric key in the method according to the first embodiment of the present invention, and as shown in fig. 3, the detailed flow of encrypting the message content of the request message by using the symmetric key in the method according to the first embodiment of the present invention includes:
the method for encrypting the message content of the request message by using the key at the small program client is a symmetric encryption algorithm, and the symmetric encryption algorithm is a 3DES encryption algorithm.
And step S301, introducing a 3DES encryption algorithm library file.
In this step, the applet client introduces a 3DES encryption algorithm library file.
Step S302, a symmetric key and a key offset are configured.
In this step, the applet client configures the symmetric key and key offset for the encryption process. The symmetric key is a symmetric key randomly generated in steps S201 to S203, and the key offset is a fixed value, and the key offset is consistent between the applet client and the applet server. The key offset is also called a key vector, and different encryption results, namely different ciphertexts after encryption, can be obtained for the same encrypted content by configuring the key offset to the encrypted content in the encryption process.
Further, the key offset may also be randomly generated.
Step S303, serializing the request message.
In this step, the applet client performs serialization processing on the message content of the request message according to the configured symmetric key and the key offset, that is: and serializing the message content of the request message.
And step S304, encrypting the message by using a 3DES encryption algorithm.
In this step, after the applet client serializes the message content of the request message, the applet client encrypts the message content of the request message using a 3DES encryption algorithm to obtain the encrypted message content of the request message.
In the embodiment of the invention, a 3DES encryption algorithm library file is introduced through the applet client; configuring a symmetric key and a key offset; serializing the request message; the method has the advantages that the strength of the encryption algorithm can be enhanced by using the steps of encrypting the message by using the 3DES encryption algorithm and the like, so that the security of the encryption algorithm is greatly improved, and the data transmission security of the applet can be improved.
Fig. 4 is a schematic diagram of a detailed flow of encrypting a symmetric key using a public key in a method according to a first embodiment of the present invention, and as shown in fig. 4, the detailed flow of encrypting the symmetric key using the public key in the method according to the first embodiment of the present invention includes:
the method for encrypting the symmetric key by using the public key by the applet client is an asymmetric encryption algorithm, and the asymmetric encryption algorithm is a self-developed RSA encryption algorithm.
In the process of implementing the invention, the inventor finds that: the file volume of the existing RSA encryption algorithm library exceeds the file volume threshold of a common applet and cannot be operated on a built-in browser of the cut applet, so that the existing RSA encryption algorithm cannot be applied to applet development and an applet execution error occurs. In view of this, the inventor of the present invention improves the existing RSA algorithm to obtain a self-developed RSA encryption algorithm.
And step S401, introducing a self-research RSA encryption algorithm library file.
In this step, the applet client introduces a self-developed RSA encryption algorithm library file, and the detailed self-developed RSA encryption algorithm process is shown in fig. 7 and its description.
And step S402, initializing an RSA encryption algorithm according to the public key.
In this step, the applet client initializes the RSA encryption algorithm according to the public key pair in the asymmetric key pair, including: setting the value of a variable as a public key character string; generating an RSA constructor; the RSA constructor is configured according to a variable.
And S403, encrypting the symmetric key by using the public key to obtain the encrypted symmetric key.
In this step, the applet client encrypts the symmetric key generated randomly in steps S201 to S203 using the public key of the asymmetric key pair to obtain an encrypted symmetric key.
And S404, configuring the encrypted symmetric key into a message header of the request message.
In this step, after the applet client obtains the encrypted symmetric key, the applet client puts the encrypted symmetric key into a header of a request message, and specifically, puts the encrypted symmetric key into an encryption key field of the header of the request message.
Further, the storage form of the encrypted symmetric key in the encryption key field of the header of the request message is < key, value >. For example, key is an encryption key field, and value is an encrypted symmetric key.
And step S405, sending the encrypted request message to an applet server.
In this step, after the applet client puts the encrypted symmetric key into the header of the request message, the applet client sends the encrypted request message to the applet server.
In the embodiment of the invention, a self-developed RSA encryption algorithm library file is introduced through the small program client; initializing an RSA encryption algorithm according to a public key; encrypting the symmetric key by using the public key to obtain an encrypted symmetric key; configuring the encrypted symmetric key into a message header of a request message; the encrypted request message is sent to the applet server, the strength of the encryption algorithm can be enhanced, the security of the encryption algorithm is greatly improved, the data transmission security and the transmission efficiency of the applet can be improved, and the method is suitable for different types of transmission data.
Example two:
fig. 5 is a schematic diagram of a main flow of a data processing method based on an applet according to a second embodiment of the present invention, and as shown in fig. 5, the data processing method based on an applet according to the second embodiment of the present invention is applied to an applet server, and includes:
step S501, an asymmetric key pair is generated, and a public key in the asymmetric key pair is provided for an applet client.
In this step, the applet server generates a pair of asymmetric key pairs according to an asymmetric encryption algorithm. And the applet server side stores the private key in the asymmetric key pair in the applet server side and provides the public key in the asymmetric key pair for the applet client side.
Further, the asymmetric encryption algorithm for the applet server to generate the asymmetric key pair may be an RSA algorithm. Typical key lengths typically include 512 bits (bit), 1024 bits, 2048 bits, 3072 bits, 4096 bits, … …. In the embodiment of the present invention, the key length is 2048 bits (also referred to as RSA2 algorithm), and the key format is PKCS #8(PKCS #1, PKCS #8, PKCS #12, PEM, etc. are key formats of common RSA algorithms, and the PKCS #8 format is suitable for JAVA language).
Further, the asymmetric encryption Algorithm for the applet server to generate the asymmetric key pair may be DSA (Digital Signature Algorithm), ECC (Elliptic encryption Algorithm), or DH (Diffie-Hellman: Whitfield Diffie and Martin Hellman commonly proposed) key exchange Algorithm.
Step S502, after receiving the encrypted request message sent by the small program client, using the private key in the asymmetric key pair to asymmetrically decrypt the message header of the encrypted request message to obtain a symmetric key.
In this step, after receiving the encrypted request message, the applet server uses the private key in the asymmetric key pair to asymmetrically decrypt the header of the request message, so as to obtain the symmetric key.
Further, the asymmetric decryption performed on the header of the request message by the applet service end includes: and the applet service end carries out asymmetric decryption on an encryption key field of a message header of the request message to obtain the symmetric key.
Step S503, using the symmetric key to symmetrically decrypt the message content of the encrypted request message.
In this step, the applet server performs symmetric decryption on the message content of the encrypted request message according to the symmetric key obtained by asymmetric decryption to obtain the message content of the request message.
In the embodiment of the invention, the applet server generates an asymmetric key pair and provides a public key in the asymmetric key pair to the applet client; after receiving an encrypted request message sent by an applet client, asymmetrically decrypting a message header of the encrypted request message by using a private key of the asymmetric key pair to obtain a symmetric key; and symmetrically decrypting the message content of the encrypted request message by using the symmetric key, so that the time consumption of a decryption process can be reduced and the speed of the decryption process can be increased when the small program decrypts the information data, the data transmission safety and the transmission efficiency of the small program are improved, and the method is suitable for different types of transmission data.
Fig. 6 is a schematic diagram of a detailed flow of decrypting a symmetric key by using a private key in a method according to a second embodiment of the present invention, and as shown in fig. 6, the detailed flow of decrypting the symmetric key by using the private key in the method according to the second embodiment of the present invention includes:
the method for decrypting the symmetric key by using the private key by the applet server is an asymmetric encryption algorithm, and the asymmetric encryption algorithm is a self-developed RSA encryption algorithm.
Step S601, introducing a self-research RSA encryption algorithm library file.
In this step, the applet server introduces a self-developed RSA encryption algorithm library file.
And step S602, configuring an RSA encryption algorithm according to the private key.
In this step, the applet server configures an RSA encryption algorithm according to a private key in the asymmetric key pair, including: setting the value of a variable as a private key character string; generating an RSA constructor; the RSA constructor is configured according to a variable.
Step S603, the encrypted symmetric key is decrypted using the private key.
In this step, the applet server decrypts the encrypted symmetric key using the private key in the asymmetric key pair, that is, the applet server decrypts the encrypted key field of the header of the request message.
And step S604, obtaining the decrypted symmetric key.
In this step, after the applet service end decrypts the encryption key field of the header of the request message, the obtained decryption result is the symmetric key.
In the embodiment of the invention, a self-developed RSA encryption algorithm library file is introduced through the applet server; configuring an RSA encryption algorithm according to a private key; decrypting the encrypted symmetric key using the private key; the steps of obtaining the decrypted symmetric key and the like can enhance the strength of the encryption algorithm, greatly improve the security of the encryption algorithm, improve the data transmission security and the transmission efficiency of the applet, and are suitable for different types of transmission data.
Fig. 7 is a schematic diagram illustrating a detailed flow of the self-research RSA encryption algorithm in the second method according to the second embodiment of the present invention, and as shown in fig. 7, the detailed flow of the self-research RSA encryption algorithm in the second method according to the second embodiment of the present invention includes:
in the embodiment of the invention, the open source RSA encryption algorithm library file jsEncrypt.js is modified to obtain the RSA encryption algorithm library file compatible with a common applet.
And step S701, adding a function in an algorithm library.
Since the window object of the general applet built-in browser has no crypto object (encrypted object), and a secure random value meeting the requirements of cryptography needs to be acquired in the implementation process of the js encryption.
And step S702, deleting the document object in the algorithm library.
Since the window object (window opened in the browser) of the view layer of the general applet built-in browser has no window.
And step S703, deleting the browser object in the algorithm library.
Because there is no method related to browser determination for the navigator object (related information of the browser) in the view layer of the general applet built-in browser, the navigator. appname (returning the browser Name) and the navigator. user agent (returning the value of the user header sent by the client to the server) of the application programming interface of the BOM (browser object model) related to browser determination cannot run in the built-in browser of the general applet, and the navigator. appna me and the navigator. user agent application programming interface do not affect the encryption and decryption process, therefore, in this step, the navigator. app Name and the navigator. user application programming interface in the js encrypt.
And step S704, performing obfuscation and compression processing on the algorithm library file.
The js encryption. js algorithm library file has a large volume and exceeds the file volume threshold of a common applet, so the js encryption. js algorithm library file cannot run in the common applet. In the step, file source code confusion and file compression processing are carried out on jsEncrypt.
In the embodiment of the invention, the current open source RSA encryption algorithm cannot run in a common applet, and functions are added in an algorithm library; deleting the document object in the algorithm library; deleting the browser object in the algorithm library; the RS A encryption algorithm library file is subjected to compatible processing through the steps of obfuscating and compressing the algorithm library file and the like, so that the encryption algorithm library file can run in a common applet, and the universality of an encryption and decryption algorithm can be improved.
Fig. 8 is a schematic diagram of a detailed flow of decrypting the message content of the request message using the symmetric key in the method according to the second embodiment of the present invention, and as shown in fig. 8, the detailed flow of decrypting the message content of the request message using the symmetric key in the method according to the second embodiment of the present invention includes:
the method for decrypting the message content of the request message by using the key at the applet service end is a symmetric encryption algorithm, and the symmetric encryption algorithm is a 3DES encryption algorithm.
And step S801, introducing a 3DES encryption algorithm library file.
In this step, the applet service side introduces a 3DES encryption algorithm library file.
Step S802, the encrypted message content of the request message is decrypted by using the decrypted symmetric key.
In this step, the applet server decrypts the message content of the encrypted request message by using the symmetric key decrypted in steps S601 to S604, that is, the applet server decrypts the message content of the request message by using the symmetric key decrypted in steps S601 to S604.
Step S803, the message content of the decrypted request message is obtained.
In this step, the applet server decrypts the message content of the request message by using the symmetric key obtained by decryption, and obtains the decrypted message content of the request message.
In the embodiment of the invention, a 3DES encryption algorithm library file is introduced through the applet service end; decrypting the message content of the encrypted request message by using the decrypted symmetric key; the steps of obtaining the message content of the decrypted request message and the like can enhance the strength of the encryption algorithm, greatly improve the security of the encryption algorithm and improve the data transmission security of the applet.
Example three:
fig. 9 is a schematic diagram of a main flow of a data processing method based on an applet according to a third embodiment of the present invention, and as shown in fig. 9, the data processing method based on an applet according to the third embodiment of the present invention is executed by an applet client and an applet server together, and includes:
step S901, the applet server generates an asymmetric key pair.
In this step, the applet server generates an asymmetric key pair, and stores a private key of the asymmetric key pair in the applet server, and provides a public key of the asymmetric key pair to the applet client.
Step S902, the small program client randomly generates a symmetric key, and symmetrically encrypts the message content of the request message by using the symmetric key; and the public key is used for carrying out asymmetric encryption on the symmetric key and putting the asymmetric key into a message header of the request message.
In this step, the applet client randomly generates a symmetric key, and symmetrically encrypts the message content of the request message by using the symmetric key to obtain the encrypted message content of the request message; the applet client uses the public key in the asymmetric key pair to perform asymmetric encryption on the symmetric key, and places the encrypted symmetric key into the message header of the request message; the applet client sends the encrypted request message to the applet server;
step S903, the applet server side uses a private key to asymmetrically decrypt the message header to obtain the symmetric key; and then, the encrypted message content is symmetrically decrypted by using the symmetric key to obtain the message content.
In this step, after receiving the encrypted request message, the applet server uses a private key in the asymmetric key pair to asymmetrically decrypt a message header of the request message to obtain the symmetric key; and the applet server side symmetrically decrypts the message content of the encrypted request message according to the symmetric key obtained by asymmetric decryption to obtain the message content of the request message.
And step S904, the applet service end performs service logic processing on the request.
In this step, after obtaining the message content of the request message, the applet service end processes the service logic in the message content according to the obtained message content of the request message, and responds to obtain a response message.
Further, the business logic may include: request forwarding, database query, and the like. The processing procedure of the applet server comprises the following steps: checking the request parameters, if the checking is successful, continuing, and if the checking is failed, returning that the request parameters are incorrect; analyzing the request parameters to obtain request contents; querying a database; and outputting a response message according to the query result in an agreed format.
Step S905, the small program server side encrypts the response message by using the symmetric key, and sends the encrypted response message to the small program client side.
In this step, according to a response message obtained after the applet server responds to the service logic in the message content of the request message, the applet server symmetrically encrypts the message content of the response message by using the symmetric key, and sends the encrypted response message to the applet client.
Further, the symmetric encryption algorithm for the applet server to symmetrically encrypt the message content of the response message by using the symmetric key may be a 3DES algorithm, an AES algorithm, a Blowfish algorithm, an RC4 algorithm, or an IDEA algorithm.
And step S906, the small program client side uses the symmetric key for decryption to obtain a response message.
In this step, the applet client performs symmetric decryption on the message content of the encrypted response message according to the symmetric key, so as to obtain the message content of the response message.
In the embodiment of the invention, an asymmetric key pair is generated by an applet server; randomly generating a symmetric key by the small program client, and symmetrically encrypting the message content of the request message by using the symmetric key; the public key is used for carrying out asymmetric encryption on the symmetric key and putting the message header of the request message; the applet server side uses a private key to asymmetrically decrypt the message header so as to obtain the symmetric key; then, the encrypted message content is symmetrically decrypted by using the symmetric key to obtain the message content; the small program service end carries out service logic processing on the request; the small program server side encrypts a response message by using the symmetric key and sends the encrypted response message to the small program client side; the small program client side decrypts by using the symmetric key to obtain the response message, and the like, so that the information data can be prevented from being leaked when the small program encrypts and decrypts the information data, the time consumption of the encryption and decryption process is reduced, the speed of the encryption and decryption process is increased, the data transmission safety and the transmission efficiency of the small program are improved, and the small program client side is suitable for different types of transmission data.
FIG. 10 is a schematic diagram of an applet-based data processing system in accordance with an embodiment of the present invention. As shown in fig. 10, a data processing system 1000 according to an embodiment of the present invention includes: an applet server 1001 and an applet client 1002.
The applet server 1001 is configured to generate an asymmetric key pair and provide a public key in the asymmetric key pair to the applet client.
Illustratively, the applet server generates an asymmetric key pair, saves a private key of the asymmetric key pair in the applet server, and provides a public key of the asymmetric key pair to the applet client.
The applet client 1002 is configured to randomly generate a symmetric key, and symmetrically encrypt the message content of the request message using the symmetric key to obtain an encrypted request message; the public key is used for carrying out asymmetric encryption on the symmetric key and putting the encrypted symmetric key into a message header of a request message; and the applet client sends the encrypted request message to the applet server.
Illustratively, the applet client randomly generates a symmetric key, and symmetrically encrypts the message content of the request message by using the symmetric key to obtain the encrypted message content of the request message; the small program client uses the public key to carry out asymmetric encryption on the symmetric key, and places the encrypted symmetric key into a message header of a request message; and the applet client sends the encrypted request message to the applet server.
The applet server 1001 is further configured to, after receiving the encrypted request packet, perform asymmetric decryption on a packet header of the request packet by using a private key in the asymmetric key pair to obtain the symmetric key; the applet server side uses the symmetric key to symmetrically decrypt the encrypted request message so as to obtain the message content of the request message
Exemplarily, after receiving the encrypted request message, the applet server uses a private key in the asymmetric key pair to asymmetrically decrypt a header of the request message to obtain the symmetric key; and the applet server side symmetrically decrypts the message content of the encrypted request message according to the symmetric key obtained by asymmetric decryption to obtain the message content of the request message.
In the embodiment of the invention, an asymmetric key pair is generated by an applet server; randomly generating a symmetric key by the small program client, and symmetrically encrypting the message content of the request message by using the symmetric key; the public key is used for carrying out asymmetric encryption on the symmetric key and putting the message header of the request message; the applet server side uses a private key to asymmetrically decrypt the message header so as to obtain the symmetric key; and then, the symmetric key is used for symmetrically decrypting the encrypted message content to obtain the message content, so that the information data can be prevented from being leaked when the small program encrypts and decrypts the information data, the time consumption of the encryption and decryption process is reduced, the speed of the encryption and decryption process is increased, the data transmission safety and the transmission efficiency of the small program are improved, and the method is suitable for different types of transmission data.
Fig. 11 illustrates an exemplary system architecture 1100 of an encryption and decryption system to which embodiments of the invention may be applied.
As shown in fig. 11, the system architecture 1100 may include terminal devices 1101, 1102, 1103, a network 1104, and a server 1105. The network 1104 is a medium to provide communication links between the terminal devices 1101, 1102, 1103 and the server 1105. Network 1104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 1101, 1102, 1103 to interact with a server 1105 over a network 1104 to receive or send messages or the like. Various communication client applications, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 1101, 1102, 1103.
The terminal devices 1101, 1102, 1103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 1105 may be a server that provides various services, such as a background management server that supports financial websites browsed by users using the terminal apparatuses 1101, 1102, 1103. The background management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (e.g., target push information and product information) to the terminal device.
It should be noted that the encryption and decryption method provided by the embodiment of the present invention is generally executed by the server 1105, and accordingly, the encryption and decryption system is generally disposed in the server 1105.
It should be understood that the number of terminal devices, networks, and servers in fig. 11 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 12, shown is a block diagram of a computer system 1200 suitable for use with the electronic device implementing an embodiment of the present invention. The electronic device shown in fig. 12 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 12, the computer system 1200 includes a Central Processing Unit (CPU)1201, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. In the RAM 1203, various programs and data necessary for the operation of the system 1200 are also stored. The CPU 1201, ROM 1202, and RAM 1203 are connected to each other by a bus 1204. An input/output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 1208 including a hard disk and the like; and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. A driver 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 1210 as necessary, so that a computer program read out therefrom is mounted into the storage section 1208 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and/or installed from the removable medium 1211. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 1201.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes an applet server module, an applet client module. Wherein the names of the modules do not in some cases constitute a limitation of the module itself.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: receiving a public key in an asymmetric key pair sent by an applet server; randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key; the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of a request message; and sending the encrypted request message to an applet server.
According to the technical scheme of the embodiment of the invention, the data transmission safety and transmission efficiency of the applet can be improved, the universality of the encryption and decryption algorithm is improved, and the method and the device are suitable for different types of transmission data.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (17)

1. An applet-based data processing method applied to an applet client, comprising:
receiving a public key in an asymmetric key pair sent by an applet server;
randomly generating a symmetric key, and symmetrically encrypting the message content of the request message by using the symmetric key;
the public key is used for carrying out asymmetric encryption on the symmetric key, and the encrypted symmetric key is put into a message header of a request message;
and sending the encrypted request message to an applet server.
2. The method of claim 1, wherein the randomly generating a symmetric key comprises:
and randomly selecting a plurality of characters from a preset character string to generate the symmetric key.
3. The method of claim 2, wherein the symmetric key is N characters, the symmetric key being generated by M random choices; wherein M and N are positive integers, and M is more than or equal to 1 and less than or equal to N.
4. The method of claim 1, wherein said symmetrically encrypting the message content of the request message using the symmetric key comprises:
serializing the message content of the request message, and encrypting the message content of the request message after the serialization processing according to the symmetric key and the key offset.
5. The method of claim 4, wherein the method further comprises:
before encrypting the message content of the request message by using the symmetric key, introducing a symmetric encryption algorithm library file.
6. The method of claim 1, wherein the asymmetrically encrypting the symmetric key using the public key of the asymmetric key pair comprises:
and carrying out asymmetric encryption on the symmetric key according to the public key in the asymmetric key pair and an asymmetric encryption algorithm.
7. The method of claim 6, wherein the method further comprises:
before the public key in the asymmetric key pair is used for encrypting the symmetric key, a simplified asymmetric encryption algorithm library file is introduced.
8. The method according to claim 7, wherein the reduced asymmetric cryptographic algorithm library file is a reduced RSA algorithm library file; and obtaining a simplified RSA algorithm library file according to the following mode:
and performing confusion and/or compression processing on the RSA algorithm library file to obtain the simplified RSA algorithm library file.
9. The method of claim 1, wherein the method further comprises:
and after receiving the encrypted response message sent by the applet service end, symmetrically decrypting the response message by using the symmetric key.
10. A data processing method based on an applet is characterized in that the method is applied to an applet server and comprises the following steps:
generating an asymmetric key pair, and providing a public key in the asymmetric key pair to an applet client;
after receiving an encrypted request message sent by an applet client, asymmetrically decrypting a message header of the encrypted request message by using a private key of the asymmetric key pair to obtain a symmetric key;
and symmetrically decrypting the message content of the encrypted request message by using the symmetric key.
11. The method of claim 10, wherein the method further comprises:
after the message content of the encrypted request message is symmetrically decrypted by using the symmetric key, a response message is generated;
and symmetrically encrypting the message content of the response message by using the symmetric key, and sending the encrypted response message to the applet client.
12. The method of claim 10, wherein the public key and the private key of the asymmetric key pair each have a key length of 2084 bits, and the key format is PKCS #8 format.
13. The method of claim 10, wherein the asymmetrically decrypting the header of the encrypted request message using the private key of the asymmetric key pair to obtain a symmetric key comprises:
and asymmetrically decrypting the message header of the encrypted request message according to the private key in the asymmetric key pair and an RSA algorithm to obtain a symmetric key.
14. The encryption and decryption method according to claim 10, wherein said symmetrically decrypting the message content of the encrypted request message using the symmetric key comprises:
and symmetrically decrypting the message content of the encrypted request message according to the symmetric key and the key offset.
15. An applet-based data processing system, the system comprising:
the small program server is used for generating an asymmetric key pair and providing a public key in the asymmetric key pair to the small program client;
the small program client is used for randomly generating a symmetric key and symmetrically encrypting the message content of the request message by using the symmetric key so as to obtain the encrypted message content of the request message; the applet client uses the public key in the asymmetric key pair to perform asymmetric encryption on the symmetric key, and places the encrypted symmetric key into the message header of the request message; then, the applet client sends the encrypted request message to the applet server;
the applet server is further used for asymmetrically decrypting the message header of the encrypted request message by using a private key in the asymmetric key pair after receiving the encrypted request message so as to obtain the symmetric key; the applet server is further configured to symmetrically decrypt the encrypted message content of the request message by using the symmetric key to obtain the message content of the request message.
16. An encryption/decryption electronic device based on an applet, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-14.
17. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-14.
CN202010873540.6A 2020-08-26 2020-08-26 Data processing method and system based on small program Pending CN112055004A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010873540.6A CN112055004A (en) 2020-08-26 2020-08-26 Data processing method and system based on small program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010873540.6A CN112055004A (en) 2020-08-26 2020-08-26 Data processing method and system based on small program

Publications (1)

Publication Number Publication Date
CN112055004A true CN112055004A (en) 2020-12-08

Family

ID=73600594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010873540.6A Pending CN112055004A (en) 2020-08-26 2020-08-26 Data processing method and system based on small program

Country Status (1)

Country Link
CN (1) CN112055004A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112671804A (en) * 2021-01-21 2021-04-16 国网新疆电力有限公司信息通信公司 Data security protection method and device based on symmetric and asymmetric technologies
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium
CN113315761A (en) * 2021-05-13 2021-08-27 中国经济信息社有限公司 Client and server data transmission method and device
CN113518078A (en) * 2021-06-01 2021-10-19 中国铁道科学研究院集团有限公司 Cross-network data sharing method, information demander, information provider and system
CN113992401A (en) * 2021-10-27 2022-01-28 同程网络科技股份有限公司 Data processing method and device
CN114172719A (en) * 2021-12-03 2022-03-11 杭州安恒信息技术股份有限公司 Encryption and decryption method, device, equipment and computer readable storage medium
CN114499837A (en) * 2021-12-29 2022-05-13 广州蚁比特区块链科技有限公司 Method, device, system and equipment for preventing leakage of message
WO2023178792A1 (en) * 2022-03-24 2023-09-28 平安科技(深圳)有限公司 Ciphertext data storage method and apparatus, and device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307165A (en) * 2015-10-10 2016-02-03 中国民生银行股份有限公司 Communication method based on mobile application, server and client
US20170099267A1 (en) * 2015-10-01 2017-04-06 Unisys Corporation Systems and methods for pkcs #8 private file key support
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170099267A1 (en) * 2015-10-01 2017-04-06 Unisys Corporation Systems and methods for pkcs #8 private file key support
CN105307165A (en) * 2015-10-10 2016-02-03 中国民生银行股份有限公司 Communication method based on mobile application, server and client
CN108347419A (en) * 2017-01-24 2018-07-31 腾讯科技(深圳)有限公司 Data transmission method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
RUDY: "在小程序使用jsEncrypt.js", 《HTTPS://DEVELOPERS.WEIXIN.QQ.COM/COMMUNITY/DEVELOP/DOC/000068B497CFC00619B7BCFDC51004》 *
猜不透我的想法: "mpvue小程序RSA加密(jsencrypt)", 《HTTPS://BLOG.CSDN.NET/FUNNY_GIRL/ARTICLE/DETAILS/105094579》 *
艾小逗: "小程序加密jsencrypt.js使用Uncaught TypeError: Cannot read property "appName" of undefined已解决", 《HTTPS://BLOG.CSDN.NET/QQ_32442967/ARTICLE/DETAILS/101759723》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653705A (en) * 2020-12-29 2021-04-13 中国农业银行股份有限公司 Data encryption transmission method, device and equipment
CN112671804A (en) * 2021-01-21 2021-04-16 国网新疆电力有限公司信息通信公司 Data security protection method and device based on symmetric and asymmetric technologies
CN113315761A (en) * 2021-05-13 2021-08-27 中国经济信息社有限公司 Client and server data transmission method and device
CN113315761B (en) * 2021-05-13 2023-01-31 中国经济信息社有限公司 Client and server data transmission method and device
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium
CN113518078A (en) * 2021-06-01 2021-10-19 中国铁道科学研究院集团有限公司 Cross-network data sharing method, information demander, information provider and system
CN113992401A (en) * 2021-10-27 2022-01-28 同程网络科技股份有限公司 Data processing method and device
CN114172719A (en) * 2021-12-03 2022-03-11 杭州安恒信息技术股份有限公司 Encryption and decryption method, device, equipment and computer readable storage medium
CN114499837A (en) * 2021-12-29 2022-05-13 广州蚁比特区块链科技有限公司 Method, device, system and equipment for preventing leakage of message
CN114499837B (en) * 2021-12-29 2023-09-26 广州蚁比特区块链科技有限公司 Message leakage prevention method, device, system and equipment
WO2023178792A1 (en) * 2022-03-24 2023-09-28 平安科技(深圳)有限公司 Ciphertext data storage method and apparatus, and device and storage medium

Similar Documents

Publication Publication Date Title
CN112055004A (en) Data processing method and system based on small program
US10187361B2 (en) Method for secure communication using asymmetric and symmetric encryption over insecure communications
US10785019B2 (en) Data transmission method and apparatus
US9703979B1 (en) Methods and computer program products for encryption key generation and management
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN110335043B (en) Transaction privacy protection method, device and system based on blockchain system
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
CN109800588B (en) Dynamic bar code encryption method and device and dynamic bar code decryption method and device
CN108199847B (en) Digital security processing method, computer device, and storage medium
KR102143525B1 (en) Method for function encryption supporting set intersection operation and apparatus using the same
JP7420779B2 (en) Key protection processing method, device, equipment and storage medium
CN110417544B (en) Root key generation method, device and medium
CN111555880A (en) Data collision method and device, storage medium and electronic equipment
CN116601914A (en) Hybrid key derivation to protect data
CN112637109B (en) Data transmission method, system, electronic device and computer readable medium
CN111416788A (en) Method and device for preventing transmitted data from being tampered
WO2024060630A1 (en) Data transmission management method, and data processing method and apparatus
CN108848094B (en) Data security verification method, device, system, computer equipment and storage medium
CN115883212A (en) Information processing method, device, electronic equipment and storage medium
KR102284877B1 (en) Efficient functional encryption for set intersection
KR102526114B1 (en) Apparatus and method for encryption and decryption
CN110166226B (en) Method and device for generating secret key
CN113761550A (en) Encryption method and device
CN112612499A (en) Application program upgrading method and device, electronic equipment and storage medium
KR20200131688A (en) Apparatus and method for generating secret key, apparatus and method for genrating evaluation key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220919

Address after: 12 / F, 15 / F, 99 Yincheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai, 200120

Applicant after: Jianxin Financial Science and Technology Co.,Ltd.

Address before: 25 Financial Street, Xicheng District, Beijing 100033

Applicant before: CHINA CONSTRUCTION BANK Corp.

Applicant before: Jianxin Financial Science and Technology Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20201208

RJ01 Rejection of invention patent application after publication