CN112235258A - Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission - Google Patents
Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission Download PDFInfo
- Publication number
- CN112235258A CN112235258A CN202011017012.7A CN202011017012A CN112235258A CN 112235258 A CN112235258 A CN 112235258A CN 202011017012 A CN202011017012 A CN 202011017012A CN 112235258 A CN112235258 A CN 112235258A
- Authority
- CN
- China
- Prior art keywords
- encryption
- decryption
- module
- submodule
- encrypted ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000005540 biological transmission Effects 0.000 title claims abstract description 19
- 239000000126 substance Substances 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption and decryption method for information transmission, which comprises an encryption step or/and a decryption step, wherein: an encryption step: binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encrypted record; and (3) decryption: and loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, if so, decrypting, and if not, alarming and reminding. The invention also discloses an encryption and decryption system and an encryption and decryption device provided with the encryption and decryption system. The method has the advantages of improving the safety of information storage by carrying out secondary encryption on the original information, improving the diversity and the randomness of the account password and avoiding repeated use of the same password. The encrypted information is stored in the cloud, and the algorithm and the secret key are on an off-line product, so that the method is safer.
Description
Technical Field
The present invention relates to the field of information security, and in particular, to an encryption/decryption method, an encryption/decryption system, and an encryption/decryption apparatus for information transmission.
Background
The existing confidentiality mode is basically realized by adopting a fixed user password and a cloud database, and the user password can only adopt specific expression forms, so that the usable range is limited, the user password can be directly cracked by using decryption modes such as trial and error software and the like, and the confidentiality is not strong; the private information of the user is stored by a third party, and other encryption processing is not carried out, so that the user information is difficult to ensure not to be 'guarded and stolen' by an information keeper; the private information of the user is stored through the specific password and the database, and once the information required to be stored by the user is too much, the situation that the password required to be memorized by the user is too complicated and difficult to memorize can occur, and the situation is unfavorable for storing and managing the private information.
Disclosure of Invention
In view of the above problems, the present invention provides an encryption and decryption method, an encryption and decryption system, and an encryption and decryption device for information transmission, which have the advantages of improving security of an account password and information storage, increasing diversity and randomness of the account password, separately managing stored information and encryption and decryption modes, and combining virtuality and reality by performing secondary encryption on an original password.
The technical scheme of the invention is as follows:
an encryption and decryption method for information transmission, comprising an encryption step or/and a decryption step, wherein:
an encryption step: binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encrypted record;
and (3) decryption: and loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, if so, decrypting, and if not, alarming and reminding.
The purpose is through carrying out the secondary encryption with original password, improves account password and information storage's security, increases account password's variety and randomness, separately manages the information of storage and encryption and decryption mode, and virtuality and reality combines, and it is convenient to decrypt simultaneously.
In a further technical scheme, the encryption steps are specifically as follows:
s01, presetting a unique serial number of a product, a cloud key and a retrieval key;
s02, binding the number and the cloud key to the client or the cloud;
s03, inputting plaintext information;
s04, generating an encrypted ciphertext;
s05, sending or displaying the encrypted ciphertext;
and S06, clearing the encrypted record.
The working principle of the technical scheme is as follows:
the user firstly binds the unique serial number of the product and the cloud key at the client or the cloud, the retrieved key is stored by self, the encryption algorithm in the product can be found after the product is lost after the binding, and the user can obtain the corresponding encryption and decryption algorithm in the lost product only by inputting the retrieved key of the product after logging in the client or the cloud after the product is lost. The encryption algorithm in every product all has certain difference, the user is when encrypting, inputs former password, the ciphertext that corresponds through encryption system's formation, the user can store the password according to self demand, can directly send to customer end or high in the clouds and store, can also send for the third party, if postbox, believe in a small amount etc. keep, still can classify according to the kind of password when keeping, for example bank card password, believe in a small amount password, pay precious password, photo video etc. this time of encryption record is clear away automatically after finishing storing.
The problem of password leakage caused by directly storing plaintext information to a cloud or a memorandum in the prior art is solved.
In a further technical solution, the decryption step specifically includes:
s07, loading the encrypted ciphertext;
s08, judging whether the loaded encrypted ciphertext and the encrypted ciphertext generated in the S04 are correct, if so, entering S09, and if not, alarming and reminding;
and S09, calculating the original password information corresponding to the ciphertext and displaying the plaintext information.
The corresponding ciphertext is loaded or input, the product decrypts according to the corresponding ciphertext, whether the encrypted text is correct or not needs to be judged in the decryption process, and the plaintext information can be obtained only if the encrypted text is completely correct.
An encryption and decryption system comprising an encryption module and a decryption module, wherein:
the encryption module is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct or not, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
In a further technical scheme, the encryption module comprises a preset sub-module, a binding sub-module, an encryption input sub-module, an encryption generation sub-module, a sending display sub-module and a clearing sub-module; wherein the content of the first and second substances,
the preset submodule is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule is used for binding the serial number and the cloud key to the client or the cloud;
the encryption input submodule is used for inputting plaintext information;
the encryption generation submodule is used for generating an encryption ciphertext;
the sending display sub-module is used for sending or displaying the encrypted ciphertext;
and the clearing submodule is used for clearing the encrypted record.
In a further technical scheme, the decryption module comprises a loading submodule, a judging submodule and a decryption submodule; wherein the content of the first and second substances,
the loading submodule is used for loading the encrypted ciphertext;
the judgment submodule is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
The utility model provides an install as above encryption and decryption device of encryption and decryption system, includes casing, keyboard and display screen, be equipped with encryption and decryption system in the casing, one side of casing is equipped with the USB interface, one side relative with the USB interface of casing is equipped with the cell-phone interface, the keyboard with the display screen is located the top surface of casing.
The USB interface is arranged on the device, so that the external device can be conveniently connected, data can be conveniently transmitted to the cloud after encryption, and the device can be pulled out during use. The device is always in a no-network state, which reduces the possibility of key leakage.
In a further technical solution, the encryption and decryption system includes an encryption module and a decryption module, wherein:
the encryption module is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct or not, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
In a further technical scheme, the encryption module comprises a preset sub-module, a binding sub-module, an encryption generation sub-module, a sending display sub-module and a clearing sub-module; wherein the content of the first and second substances,
the preset submodule is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule is used for binding the serial number and the cloud key to the client or the cloud;
the encryption input submodule is used for inputting plaintext information;
the encryption generation submodule is used for generating an encryption ciphertext;
the sending display sub-module is used for sending or displaying the encrypted ciphertext;
and the clearing submodule is used for clearing the encrypted record.
In a further technical scheme, the decryption module comprises a loading submodule, a judging submodule and a decryption submodule; wherein the content of the first and second substances,
the loading submodule is used for loading the encrypted ciphertext;
the judgment submodule is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
The invention has the beneficial effects that:
1. the security performance of encryption is improved by adopting secondary encryption;
2. the encryption and decryption are convenient, the password which is not used for a long time is prevented from being forgotten, and the storage and management can be carried out in a classified manner;
3. the use is convenient, and the device can be directly connected with a mobile phone or a computer for use.
4. The diversity and the randomness of the passwords are increased, and the repeated use of the same passwords is avoided.
5. The encrypted information is stored in the cloud, and the algorithm and the secret key are on an off-line product, so that the method is safer.
Drawings
Fig. 1 is a schematic flow chart of an encryption method of an encryption and decryption method for information transmission according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a decryption method of an encryption and decryption method for information transmission according to an embodiment of the present invention;
fig. 3 is a schematic diagram of the overall structure of an encryption and decryption system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an encryption system in the encryption and decryption system according to the embodiment of the present invention;
fig. 5 is a schematic structural diagram of a decryption system in the encryption and decryption system according to the embodiment of the present invention;
fig. 6 is a schematic overall structure diagram of an encryption and decryption apparatus according to an embodiment of the present invention;
fig. 7 is a schematic signal flow structure diagram of an encryption and decryption apparatus according to an embodiment of the present invention.
Description of reference numerals:
10. an encryption module; 101. presetting a submodule; 102. binding the sub-modules; 103. an encryption input sub-module; 104. an encryption generation submodule; 105. a transmission display submodule; 106. clearing the submodule; 20. a decryption module; 201. loading a submodule; 202. a judgment submodule; 203. an encryption submodule; 30. a housing; 40. a keyboard; 50. a display screen; 60. a USB interface; 70. and (6) a mobile phone interface.
Detailed Description
The embodiments of the present invention will be further described with reference to the accompanying drawings.
Example 1:
an encryption and decryption method for information transmission comprises an encryption step, and specifically comprises the following steps: binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encrypted record;
example 2:
an encryption and decryption method for information transmission comprises the following steps: and loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, if so, decrypting, and if not, alarming and reminding.
Example 3:
an encryption/decryption method for information transmission, comprising an encryption step and a decryption step, wherein:
an encryption step: binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encrypted record;
and (3) decryption: and loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, if so, decrypting, and if not, alarming and reminding.
The three embodiments aim to improve the security of the account password and information storage, increase the diversity and randomness of the account password, separately manage the stored information and the encryption and decryption modes, combine virtuality and reality and facilitate decryption by carrying out secondary encryption on the original password.
In the above embodiments 1 and 3, as shown in fig. 1, the encryption steps are specifically as follows:
s01, presetting a unique serial number of a product, a cloud key and a retrieval key;
s02, binding the number and the cloud key to the client or the cloud;
s03, inputting plaintext information;
s04, generating an encrypted ciphertext;
s05, sending or displaying the encrypted ciphertext;
and S06, clearing the encrypted record.
The working principle of the technical scheme is as follows:
the user firstly binds the unique number of the product and the cloud key at the client or the cloud, the retrieved key is stored automatically, after the product is lost after the binding, the user can find the encryption algorithm in the product, and after the product is lost, the user only needs to log in the client or the cloud and then inputs the retrieved key of the product, so that the corresponding encryption and decryption algorithm in the lost product can be obtained. The encryption algorithm in every product all has certain difference, the user is when encrypting, through encryption system after the input former password, generate corresponding ciphertext, the user can store the password according to self demand, can directly send to customer end or high in the clouds and store, can also send for the third party, if postbox, believe in a little etc. keep, still can classify according to the kind of password when keeping, for example bank card password, believe in a little password, pay precious password, picture etc. this time of encryption record is clear away automatically after finishing storing.
The problem of password leakage caused by directly storing plaintext information to a cloud or a memorandum in the prior art is solved.
As shown in fig. 2, in the above embodiments 2 and 3, the decryption steps are specifically as follows:
s07, loading the encrypted ciphertext;
s08, judging whether the loaded encrypted ciphertext and the encrypted ciphertext generated in the S04 are correct, if so, entering S09, and if not, alarming and reminding;
and S09, calculating the original password information corresponding to the ciphertext and displaying the plaintext information.
The corresponding ciphertext is loaded or input, the product decrypts according to the corresponding ciphertext, whether the encrypted text is correct or not needs to be judged in the decryption process, and the plaintext information can be obtained only after the encrypted text is correct through calculation.
If the ciphertext is stored in the cloud or the client, a corresponding decryption instruction is sent to the cloud or the client during decryption, the ciphertext corresponding to the instruction is sent to a specified product after the instruction is received by the cloud or the client, the product decrypts the ciphertext after receiving the ciphertext in the cloud, the decrypted ciphertext is displayed on a display screen 50 of the product, or the decryption failure is used for alarming and reminding.
If the ciphertext is stored in other modes, the user manually inputs the ciphertext, the product decrypts the ciphertext after receiving the ciphertext, the decrypted result is displayed on the display screen 50 of the product, and if the decryption fails, an alarm is given to remind
Example 4:
as shown in fig. 3, an encryption and decryption system includes an encryption module 10 and a decryption module 20, wherein:
the encryption module 10 is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module 20 is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
In another embodiment, as shown in fig. 4, the encryption module 10 includes a presetting submodule 101, a binding submodule 102, an encryption input submodule 103, an encryption generation submodule 104, a sending display submodule 105, and a clearing submodule 106; wherein the content of the first and second substances,
the presetting submodule 101 is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule 102 is used for binding the serial number and the cloud key to the client or the cloud;
an encryption input sub-module 103 for inputting plaintext information;
an encryption generation sub-module 104 for generating an encrypted ciphertext;
a transmission display sub-module 105 for transmitting or displaying the encrypted ciphertext;
a clear submodule 106 for clearing the encrypted record.
In another embodiment, as shown in fig. 5, the decryption module 20 includes a loading sub-module 201, a judging sub-module 202 and a decryption sub-module; wherein the content of the first and second substances,
a loading submodule 201, configured to load an encrypted ciphertext;
the judgment sub-module 202 is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
Example 5:
as shown in fig. 5, an encryption and decryption apparatus equipped with the encryption and decryption system described above includes a casing 30, a keyboard 40, and a display screen 50, the encryption and decryption system is provided in the casing 30, a USB interface 60 is provided on one side of the casing 30, a mobile phone interface 70 is provided on the side of the casing 30 opposite to the USB interface 60, and the keyboard 40 and the display screen 50 are located on the top surface of the casing 30.
The unique code of the product is arranged on one side of the device, the code is used when the product is bound with a client or a cloud, the USB interface 60 is arranged on the device to facilitate connection with external equipment, and meanwhile, the mobile phone interface 70 is arranged to avoid decryption through a mobile phone when the device goes out and does not have a computer, so that the use convenience of the device is improved, data can be conveniently transmitted to the cloud after encryption, the device is pulled out during use, and is in a network-free state, so that the possibility of secret key leakage is reduced; while both the encrypted and decrypted plaintext is displayed via the display screen 50.
The specific operation flow is as follows: a user inputs a plaintext to be encrypted through the keyboard 40, the plaintext is encrypted through an encryption system arranged in the shell 30 after being input, and a ciphertext is sent to a designated position to be stored after being encrypted; when decryption is needed, decryption is carried out through the decryption system, and alarming is carried out when ciphertext errors occur in the decryption process
In another embodiment, as shown in fig. 6, the encryption and decryption system includes an encryption module 10 and a decryption module 20, wherein:
the encryption module 10 is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module 20 is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
In another embodiment, as shown in fig. 6, the encryption module 10 includes a presetting submodule 101, a binding submodule 102, an encryption generation submodule 104, a sending display submodule 105 and a clearing submodule 106;
wherein the content of the first and second substances,
the presetting submodule 101 is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule 102 is used for binding the serial number and the cloud key to the client or the cloud;
an encryption input sub-module 103 for inputting plaintext information;
an encryption generation sub-module 104 for generating an encrypted ciphertext;
a transmission display sub-module 105 for transmitting or displaying the encrypted ciphertext;
a clear submodule 106 for clearing the encrypted record.
In another embodiment, as shown in fig. 6, the decryption module 20 includes a loading sub-module 201, a judging sub-module 202 and a decryption sub-module; wherein the content of the first and second substances,
a loading submodule 201, configured to load an encrypted ciphertext;
the judgment sub-module 202 is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
The above-mentioned embodiments only express the specific embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention.
Claims (10)
1. An encryption and decryption method for information transmission, comprising an encryption step or/and a decryption step, wherein:
an encryption step: binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encrypted record;
and (3) decryption: and loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct, if so, decrypting, and if not, alarming and reminding.
2. The encryption and decryption method for information transmission according to claim 1, wherein the encryption step specifically comprises:
s01, presetting a unique serial number of a product, a cloud key and a retrieval key;
s02, binding the number and the cloud key to the client or the cloud;
s03, inputting plaintext information;
s04, generating an encrypted ciphertext;
s05, sending or displaying the encrypted ciphertext;
and S06, clearing the encrypted record.
3. The encryption and decryption method for information transmission according to claim 1 or 2, wherein the decryption step specifically comprises:
s07, loading the encrypted ciphertext;
s08, judging whether the loaded encrypted ciphertext and the encrypted ciphertext generated in the S04 are correct, if so, entering S09, and if not, alarming and reminding;
and S09, calculating the original password information corresponding to the ciphertext and displaying the plaintext information.
4. An encryption and decryption system comprising an encryption module and a decryption module, wherein:
the encryption module is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct or not, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
5. The encryption and decryption system of claim 4, wherein the encryption module comprises an encryption preset sub-module, a binding sub-module, an encryption input sub-module, an encryption generation sub-module, a transmission display sub-module and a clearing sub-module; wherein:
the preset submodule is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule is used for binding the serial number and the cloud key to the client or the cloud;
the encryption input submodule is used for inputting plaintext information;
the encryption generation submodule is used for generating an encryption ciphertext;
the sending display sub-module is used for sending or displaying the encrypted ciphertext;
and the clearing submodule is used for clearing the encrypted record.
6. The encryption and decryption system of claim 4 or 5, wherein the decryption module comprises a loading sub-module, a judging sub-module and a decryption sub-module; wherein:
the loading submodule is used for loading the encrypted ciphertext;
the judgment submodule is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
7. An encryption and decryption device provided with the encryption and decryption system as claimed in claim 4, characterized by comprising a housing, a keyboard and a display screen, wherein the encryption and decryption system is arranged in the housing, one side of the housing is provided with a USB interface, the side of the housing opposite to the USB interface is provided with a mobile phone interface, and the keyboard and the display screen are positioned on the top surface of the housing.
8. The encryption and decryption apparatus according to claim 7, wherein the encryption and decryption system comprises an encryption module and a decryption module, wherein:
the encryption module is used for binding through a product number, inputting plaintext information for encryption, sending or displaying an encrypted ciphertext through the product, and clearing an encryption record;
and the decryption module is used for loading the encrypted ciphertext, judging whether the encrypted ciphertext is correct or not, decrypting if the encrypted ciphertext is correct, and alarming and reminding if the encrypted ciphertext is wrong.
9. The encryption and decryption apparatus according to claim 8, wherein the encryption module includes an encryption preset sub-module, a binding sub-module, an encryption generation sub-module, a transmission display sub-module, and a clearing sub-module; wherein:
the preset submodule is used for presetting a unique serial number, a cloud secret key and a retrieval secret key of a product;
the binding submodule is used for binding the serial number and the cloud key to the client or the cloud;
the encryption input submodule is used for inputting plaintext information;
the encryption generation submodule is used for generating an encryption ciphertext;
the sending display sub-module is used for sending or displaying the encrypted ciphertext;
and the clearing submodule is used for clearing the encrypted record.
10. The encryption and decryption apparatus according to claim 8 or 9, wherein the decryption module includes a loading sub-module, a judging sub-module and a decryption sub-module; wherein:
the loading submodule is used for loading the encrypted ciphertext;
the judgment submodule is used for judging whether the loaded encrypted ciphertext is correct or not, if so, decrypting, and if not, alarming and reminding;
and the decryption submodule is used for calculating the original password information corresponding to the ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011017012.7A CN112235258A (en) | 2020-09-24 | 2020-09-24 | Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011017012.7A CN112235258A (en) | 2020-09-24 | 2020-09-24 | Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112235258A true CN112235258A (en) | 2021-01-15 |
Family
ID=74107705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011017012.7A Pending CN112235258A (en) | 2020-09-24 | 2020-09-24 | Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112235258A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001101055A (en) * | 1999-09-30 | 2001-04-13 | Casio Comput Co Ltd | Data base managing device, data base system, enciphering device and ercording medium |
CN102638471A (en) * | 2012-04-25 | 2012-08-15 | 杭州晟元芯片技术有限公司 | Password protection and management method |
CN102938045A (en) * | 2012-07-23 | 2013-02-20 | 吴俊杰 | Encryption method and authorization method after encryption for electronic product |
CN106296177A (en) * | 2016-08-30 | 2017-01-04 | 中国民生银行股份有限公司 | Data processing method based on bank's Mobile solution and equipment |
CN106330897A (en) * | 2016-08-22 | 2017-01-11 | 北京握奇智能科技有限公司 | Information storage method and system |
CN106452770A (en) * | 2015-08-12 | 2017-02-22 | 深圳市腾讯计算机系统有限公司 | Data encryption method and apparatus, data decryption method and apparatus, and system |
CN107682577A (en) * | 2017-10-09 | 2018-02-09 | 平安科技(深圳)有限公司 | Softphone encipher-decipher method, device and computer-readable recording medium |
CN108924596A (en) * | 2018-08-28 | 2018-11-30 | 苏州科达科技股份有限公司 | media data transmission method, device and storage medium |
CN110049040A (en) * | 2019-04-16 | 2019-07-23 | 深思数盾(天津)科技有限公司 | To the methods, devices and systems of the control authority authorization of smart machine |
US20200145203A1 (en) * | 2017-07-06 | 2020-05-07 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for data transmission |
-
2020
- 2020-09-24 CN CN202011017012.7A patent/CN112235258A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001101055A (en) * | 1999-09-30 | 2001-04-13 | Casio Comput Co Ltd | Data base managing device, data base system, enciphering device and ercording medium |
CN102638471A (en) * | 2012-04-25 | 2012-08-15 | 杭州晟元芯片技术有限公司 | Password protection and management method |
CN102938045A (en) * | 2012-07-23 | 2013-02-20 | 吴俊杰 | Encryption method and authorization method after encryption for electronic product |
CN106452770A (en) * | 2015-08-12 | 2017-02-22 | 深圳市腾讯计算机系统有限公司 | Data encryption method and apparatus, data decryption method and apparatus, and system |
CN106330897A (en) * | 2016-08-22 | 2017-01-11 | 北京握奇智能科技有限公司 | Information storage method and system |
CN106296177A (en) * | 2016-08-30 | 2017-01-04 | 中国民生银行股份有限公司 | Data processing method based on bank's Mobile solution and equipment |
US20200145203A1 (en) * | 2017-07-06 | 2020-05-07 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for data transmission |
CN107682577A (en) * | 2017-10-09 | 2018-02-09 | 平安科技(深圳)有限公司 | Softphone encipher-decipher method, device and computer-readable recording medium |
CN108924596A (en) * | 2018-08-28 | 2018-11-30 | 苏州科达科技股份有限公司 | media data transmission method, device and storage medium |
CN110049040A (en) * | 2019-04-16 | 2019-07-23 | 深思数盾(天津)科技有限公司 | To the methods, devices and systems of the control authority authorization of smart machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103458382B (en) | Hardware encryption transmission and storage method and system for mobile phone private short message | |
US9537839B2 (en) | Secure short message service (SMS) communications | |
CN103279411B (en) | Enter the method and system of application program based on fingerprint recognition | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
EP1059761B1 (en) | Cryptographic key, or other secret material, recovery | |
CN101236591B (en) | Method, terminal and safe chip for guaranteeing critical data safety | |
CN100464549C (en) | Method for realizing data safety storing business | |
US7353393B2 (en) | Authentication receipt | |
US8769307B2 (en) | Secure operation indicator | |
CN109951295B (en) | Key processing and using method, device, equipment and medium | |
CN103942896A (en) | System for money withdrawing without card on ATM | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN102737441A (en) | Self-service terminal password input device | |
JP2022542095A (en) | Hardened secure encryption and decryption system | |
US20060294395A1 (en) | Executable software security system | |
CN103634789A (en) | Mobile terminal and method | |
CN201130381Y (en) | Electric signature tool with cryptogram management function | |
TWI428752B (en) | Electronic file delivering system, portable communication apparatus with decryption functionality, and related computer program product | |
CN111818466A (en) | Information sending and receiving method and device, electronic equipment and readable storage medium | |
CN115776413A (en) | Data transmission method and system based on iris encryption | |
CN112235258A (en) | Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission | |
FR2769446A1 (en) | Identification and authentication system for users of data network | |
CN110830252B (en) | Data encryption method, device, equipment and storage medium | |
CN113946862A (en) | Data processing method, device and equipment and readable storage medium | |
CN106330897A (en) | Information storage method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210115 |
|
RJ01 | Rejection of invention patent application after publication |