CN112260998A - Answer protection method and device for network questions - Google Patents

Answer protection method and device for network questions Download PDF

Info

Publication number
CN112260998A
CN112260998A CN202011009893.8A CN202011009893A CN112260998A CN 112260998 A CN112260998 A CN 112260998A CN 202011009893 A CN202011009893 A CN 202011009893A CN 112260998 A CN112260998 A CN 112260998A
Authority
CN
China
Prior art keywords
answer
value
calculation
digit
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011009893.8A
Other languages
Chinese (zh)
Other versions
CN112260998B (en
Inventor
郑永锐
林建群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanguang Software Co Ltd
Original Assignee
Yuanguang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanguang Software Co Ltd filed Critical Yuanguang Software Co Ltd
Priority to CN202011009893.8A priority Critical patent/CN112260998B/en
Publication of CN112260998A publication Critical patent/CN112260998A/en
Application granted granted Critical
Publication of CN112260998B publication Critical patent/CN112260998B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Optimization (AREA)
  • Software Systems (AREA)
  • Mathematical Analysis (AREA)
  • Computational Mathematics (AREA)
  • Algebra (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method and a device for protecting answers of network questions, belongs to the technical field of network security, and solves the problem that answers of existing network questions are cracked due to the fact that secret keys are possibly leaked. The answer protection method for the network topic comprises the following steps: converting the network questions into a set of numerical values with a binary digit system through a server; calculating the numerical value of the group of digit system by a convention algorithm to obtain a first result value; confusing partial digits of the first result value with digit system numerical values corresponding to correct answers to obtain answer calculation values, wherein the digit systems of the network questions are consistent with the digit systems of the correct answers; and taking the answer calculation value as an answer and transmitting the answer and the network title to a client. By confusing the answers, a person who cracks the answers can mistakenly think that the correct answers are obtained, and the correct answers are confused, so that the data security of the correct answers is protected.

Description

Answer protection method and device for network questions
Technical Field
The invention relates to the technical field of network security, in particular to a method and a device for protecting answers of network questions.
Background
The online examination refers to an examination form in which the whole process of the examination is performed on the network by operating a computer, and the examination is performed without paper media or by network media. The on-line examination is a paperless examination system developed by a campus network, and comprises a computer-covered class examination, a college English examination, a student admission examination, a professional class examination, a financial class examination, an engineering class examination, a foreign trade class examination, a special book, a policeman examination and the like.
The data of questions and answers related to the existing online examination and the like needs to have high security. The ciphertext is a converted character, presents a garbled character, cannot be used for directly reading data to understand the meaning of the data, and can be decrypted to know the meaning of the data. The data is generally transmitted after being encrypted into a secret, but the key may be leaked, so that the answer is cracked.
Disclosure of Invention
In view of the foregoing analysis, embodiments of the present invention are directed to a method and an apparatus for protecting answers to network questions, so as to solve the problem that answers to existing network questions are cracked due to possible leakage of a secret key.
In one aspect, an embodiment of the present invention provides an answer protection method for a network topic, including: converting the network questions into a set of numerical values with a binary digit system through a server; calculating the numerical value of the group of digit system by a convention algorithm to obtain a first result value; confusing partial digits of the first result value with digit system numerical values corresponding to correct answers to obtain answer calculation values, wherein the digit systems of the network questions are consistent with the digit systems of the correct answers; and taking the answer calculation value as an answer and transmitting the answer and the network title to a client.
The beneficial effects of the above technical scheme are as follows: the answer is confused by the answer protection method for the network questions provided by the embodiment of the invention, so that a person who cracks the answer can mistakenly think that the correct answer is obtained and confuse the correct answer, thereby protecting the data security of the correct answer.
In a further development of the above method, the set of binary values comprises a set of four-bit values or a set of two-bit values.
Based on the further improvement of the method, the calculating the numerical value of the set of digit system by the convention algorithm further comprises: adding the numerical values of the group of four-digit systems by appointed addition; or exclusive-ORing partial bits of each value in a group of binary values by a conventional exclusive-OR algorithm.
Based on a further improvement of the above method, the obfuscating the partial digits of the first result value and the digit scale value corresponding to the correct answer includes: when the partial digit of the calculation result value is 0 and the correct answer is D, the confusion calculation is that the digit number value corresponding to the correct answer D is reduced by 1; when the partial digit of the calculation result value is 0 and the correct answer is A, the confusion calculation is that the digit number corresponding to the correct answer A is self-added by 1; and when the partial digits of the calculation result value are not 0, performing the aliasing calculation by subtracting the partial digits of the first result value from the digit scale numerical value corresponding to the correct answer and using the absolute value of the subtraction operation as the answer calculation value or performing exclusive-or calculation on the partial digits of the first result value and the corresponding partial digits of the digit scale numerical value corresponding to the correct answer.
Based on a further improvement of the above method, transmitting the answer calculation value to the client further comprises: encrypting the answer calculation value and transmitting the encrypted answer calculation value to the client; or transmitting the answer calculation value to the client in a plaintext mode.
Based on the further improvement of the method, when the client is a data interceptor, the data interceptor directly obtains the answer calculation value as an answer in a plaintext manner; or the data interception party decrypts the encrypted answer calculation value based on a secret key and obtains the answer calculation value as an answer.
Based on further improvement of the method, when the client is a target client, the client receives the answer calculation value and the network title from the server; converting the received network questions into a set of numerical values with a binary digit system; calculating the numerical value of the group of digit system by a convention algorithm to obtain a second result value; and performing anti-confusion processing on the received answer calculation value and the second result value to obtain a correct answer.
Based on the further improvement of the above method, before the target client receives the answer calculation value and the network topic, the method further includes: the target client stores the preset algorithm and an anti-confusion processing rule corresponding to the confusion processing in advance, when the target client receives the encrypted answer calculation value, the target client stores a private key in advance, and decrypts the encrypted answer calculation value through the private key to obtain the answer calculation value.
Based on a further improvement of the above method, the anti-obfuscating the received answer calculation value and the second result value further includes: antialiasing the received answer calculation value with the second result value further comprises: when the confusion calculation is that the digit numerical value corresponding to the correct answer D is subtracted from 1, the anti-confusion processing rule is that the received answer calculation value is added from 1; when the confusion calculation is that the digit numerical value corresponding to the correct answer A is self-added by 1, the anti-confusion processing rule is that the received answer calculation value is self-subtracted by 1; when the confusion calculation is the subtraction operation of a part of digits of the first result value and the digit scale numerical value corresponding to the correct answer, the anti-confusion processing rule is the addition calculation of the second result value and the received answer calculation value; or when the partial digits of the first result value and the corresponding partial digits of the binary numerical value corresponding to the correct answer are subjected to exclusive-or calculation, the partial digits of the second result value and the received answer calculation value are subjected to exclusive-or calculation.
On the other hand, an embodiment of the present invention provides an answer protection device for a network topic, including: the network topic conversion module is used for converting the network topic into a group of numerical values with a binary digit system through a server; the first result value acquisition module is used for calculating the numerical value of the group of digit system through a convention algorithm to obtain a first result value; the confusion processing module is used for performing confusion processing on part of digits of the first result value and digit system numerical values corresponding to correct answers to obtain answer calculation values, wherein the digit system of the network question is consistent with the digit system of the correct answers; and the sending module is used for taking the answer calculation value as an answer and transmitting the answer and the network title to a client.
Compared with the prior art, the invention can realize at least one of the following beneficial effects:
1. the answer data is obfuscated by the answer protection method of the network topic provided by the invention, and the answer for obfuscating is sent in a plaintext or ciphertext mode;
2. when the data interceptor cracks the answer of the confusion processing according to the stolen private key, the data interceptor mistakenly regards to obtain the correct answer and confuses the correct answer, thereby protecting the data security of the correct answer; and
3. the target client can obtain correct answers through simple processing according to a pre-stored preset algorithm, confusion processing and a private key, so that the normal use of the target client cannot be influenced.
In the invention, the technical schemes can be combined with each other to realize more preferable combination schemes. Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
Drawings
The drawings are only for purposes of illustrating particular embodiments and are not to be construed as limiting the invention, wherein like reference numerals are used to designate like parts throughout.
FIG. 1 is a flowchart of an answer protection method for network topics according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating an answer protection method for a network topic according to an embodiment of the invention; and
fig. 3 is a block diagram of an answer protection device for network topics according to an embodiment of the present invention.
Reference numerals:
302-network topic conversion module; 304-a first result value obtaining module; 306-an obfuscation processing module; and 308-a transmission module
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate preferred embodiments of the invention and, together with a description of the invention, serve to explain the principles of the invention and not to limit the scope of the invention.
The invention discloses an answer protection method for network topics. As shown in fig. 1, the answer protection method for a network topic includes: step S102, converting the network title into a group of numerical values of a digit system through a server; step S104, calculating a numerical value of a group of digit system through a convention algorithm to obtain a first result value; step S106, mixing up partial digits of the first result value and digit system numerical values corresponding to the correct answers to obtain answer calculation values, wherein the digit systems of the network questions are consistent with the digit systems of the correct answers; and step S108, the answer calculation value is used as an answer, and the answer and the network title are transmitted to the client.
Compared with the prior art, the answer protection method for the network questions provided by the embodiment is used for confusing answer data, so that a person who cracks the answers can mistakenly think that the correct answers are obtained, and the correct answers are confused, thereby protecting the data security of the correct answers.
Hereinafter, an answer protection method for a network topic will be described in detail with reference to fig. 1 and 2.
The answer protection method for the network topic comprises the following steps: step S102, the network title is converted into a group of numerical values of a digit system through the server. Specifically, the set of binary values includes a set of four-binary values or a set of two-binary values. Optionally, the set of numeric values in a decimal place may also include a set of numeric values in other decimal places according to the user's needs, for example, when the answer is 5 answers or 6 answers or the like other than four answers, the set of numeric values in a decimal place is a set of numeric values in a quinary place or a set of numeric values in a sextic place.
After converting the network topic into a set of numerical values in a digit system, the method proceeds to step S104, and the numerical values in the set of digit system are calculated by a convention algorithm to obtain a first result value. Specifically, calculating the value of a set of binary digits by a convention algorithm further comprises: adding a group of numerical values of a four-digit system by appointed addition; or exclusive-ORing partial bits of each value in a group of binary values by a conventional exclusive-OR algorithm.
After the numerical values of the set of digit systems are calculated by the convention algorithm, step S106 is performed, and a part of digits of the first result value and the numerical values of the digit systems corresponding to the correct answers are subjected to confusion processing to obtain answer calculation values, wherein the digit systems of the network questions are consistent with the digit systems of the correct answers. Specifically, the obfuscating a partial digit of the first result value and a digit scale value corresponding to the correct answer includes: when the part digit of the calculation result value is 0 and the correct answer is D, the confusion calculation is that the digit number value corresponding to the correct answer D is reduced by 1; when the part digit of the calculation result value is 0 and the correct answer is A, the confusion calculation is that the digit number value corresponding to the correct answer A is self-added by 1; and when the part digit of the calculation result value is not 0, performing confusion calculation by subtracting the part digit of the first result value and the digit scale numerical value corresponding to the correct answer and using the absolute value of the subtraction operation as an answer calculation value or performing exclusive-or calculation on the part digit of the first result value and the corresponding part digit number of the digit scale numerical value corresponding to the correct answer.
After obtaining the answer calculation value, step S108 is entered, and the answer calculation value is used as an answer and the network topic are transmitted to the client. Specifically, transmitting the answer calculation value to the client further includes: encrypting the answer calculation value and transmitting the encrypted answer calculation value to the client; or transmitting the answer calculation value to the client in a plaintext mode.
When the client is a data interceptor, that is, when the data interceptor intercepts data, after transmitting the answer calculated value to the client in a plaintext manner, the data interceptor directly obtains the answer calculated value as an answer in the plaintext manner, accordingly. In an alternative embodiment, after transmitting the encrypted answer calculation value to the client, the data interceptor decrypts the encrypted answer calculation value based on the key and obtains the answer calculation value as the answer. Therefore, even if the data interception party steals the private key through technologies such as network attack and the like, the answer calculation value obtained according to the stolen private key is a false correct answer, and therefore the data security of the correct answer can be protected.
Before the target client receives the answer calculation value and the network title, the target client may store a predetermined algorithm and an anti-confusion processing rule corresponding to the confusion processing in advance. In an optional embodiment, when the target client receives the encrypted answer calculation value, the target client stores a private key in advance, and decrypts the encrypted answer calculation value through the private key to obtain the answer calculation value.
When the client is a target client, namely when data is normally sent through the network, the client receives an answer calculation value and a network topic from the server; converting the received network questions into a group of numerical values of a digit system; calculating a numerical value of a group of digit system through a convention algorithm to obtain a second result value; and performing anti-confusion processing on the received answer calculation value and the second result value to obtain a correct answer. Specifically, the process of anti-confusing the received answer calculation value with the second result value further includes: when the confusion calculation is that the digit numerical value corresponding to the correct answer D is subtracted from 1, the anti-confusion processing rule is that the calculated value of the received answer is added from 1; when the confusion calculation is that the digit numerical value corresponding to the correct answer A is self-added with 1, the anti-confusion processing rule is that the calculation value of the received answer is self-subtracted with 1; when the confusion calculation is the subtraction operation of partial digits of the first result value and the digit scale numerical value corresponding to the correct answer, the anti-confusion processing rule is to add the second result value and the received answer calculation value; or when the partial digits of the first result value and the corresponding partial digits of the binary numerical value corresponding to the correct answer are subjected to exclusive-or calculation, the partial digits of the second result value and the received answer calculation value are subjected to exclusive-or calculation.
Hereinafter, with reference to fig. 2, an answer protection method for a network topic will be described. The method comprises the following specific steps:
1. before the server transmits the answer, the question is converted into a digit number;
2. calculating the converted numerical value through an agreed algorithm to obtain a result value (1);
3. calculating (for example, subtracting) the question calculation result value (1) and the correct answer value (2), wherein the answer calculation value is (1);
4. the answer calculation value (1) is used as an answer and is transmitted in plaintext data;
5. after the data interception party acquires the data, the data interception party mistakenly regards the difference value (1) as a correct answer;
6. after receiving the data, the client converts the questions into a digital number with a digital system;
7. calculating a final result value (1) of the converted numerical value through an agreed algorithm; and
8. the final result value (1) is calculated (e.g., added) to the received answer (1) to obtain the correct answer (2).
Hereinafter, an answer protection method for a network topic is described by way of specific examples.
Example 1
Title: one plus one equals to several
Answer choices A-B-C-three-D-four
Correct answer B
1. The title is converted into four-bit (for example, the scheme can be converted into various binary values) data 103200001102220010320000132310211032203211013200;
2. calculated by an algorithm (here, for example, a simple algorithm, the algorithm is more than one), all the values are added to 200221113, and the last 3 is taken as the result value of the calculation of the title;
3. answer B corresponds to 1 in the four-digit scale (0,1,2, 3);
4. the absolute value of the subtraction of 1 and 3 is 2;
5. 2, transmitting C to the client (the answer can be transmitted by using the traditional encryption or the plaintext) when the answer is C;
6. the client converts C into 2 in the corresponding four-digit system (0,1,2, 3);
7. the client side calculates a result value 3 of the topic in the same way as the steps 1 and 2;
8. adding 3 and 2 to obtain a four-digit value of 11; and
9. the last bit 1 is converted into answer B, and the client side obtains the correct answer B.
Therefore, when the cheater catches the packet in step 5 to obtain the wrong answer C, the wrong answer is mistaken for the correct answer, so that the purpose of protecting the answer of the network topic is achieved.
Example 2
Topic 5 × 2?
Answer choice A8B 52C 10D 12
Correct answer C
1. Converting the title into binary 001101011101011100110010001111011111111100011111;
2. carrying out binary XOR operation on the 2 bits of the data to obtain 10;
3. the answer C letter (i.e., Ascii code) has a corresponding binary 01000011 with 2 bits after 11;
4. performing exclusive-or operation on the last two binary digits obtained from 2 and 3 to obtain 01 and 2 bits after the option (A01000001B 01000010C 01000011D 01000100) to match to obtain an error answer A;
5. calculating an error answer A, and transmitting the error answer A to the client (the answer can be transmitted by using the traditional encryption or the plaintext);
6. the client calculates 10 as step 1 and step 2;
7. computing the result value 10 and the last two binary systems of the binary system 01000001 corresponding to the answer A obtained by the client to perform XOR to obtain a result, wherein two bits are 11; and
8. 11, into answer C (01000011), the client gets the correct answer C.
Therefore, when the cheater catches the packet in step 5 to obtain the wrong answer A, the wrong answer is mistaken for the correct answer, and the purpose of protecting the answer of the network topic is achieved.
Example 3
Topic 5-2?
Answer choices A0B 1C 2D 3
Correct answer D
1. Converting the title into binary 001101011101011100110010001111011111111100011111;
2. adding the data to obtain the last bit as 0;
3. the correct answer D is reduced by one bit to C if it is 0 (and A if it is 1);
4. calculating an error answer C, and transmitting the error answer C to the client (the answer can be transmitted by using the traditional encryption or the plaintext);
5. the client calculates 0 as in step 1 and step 2;
6. adding one bit to obtain D when the wrong answer C is 0 (subtracting one bit to obtain B when the answer C is 1); and
7. the client obtains the correct answer D.
When the cheater picks up the packet in step 4 to obtain the wrong answer C, the wrong answer is mistaken for the correct answer, and therefore the purpose of protecting the answer of the network topic is achieved.
In another embodiment of the present invention, an answer protection device for network questions is disclosed. Referring to fig. 3, the answer protection apparatus for network titles includes: a network topic conversion module 302, configured to convert a network topic into a set of numerical values in a digital system through a server; a first result value obtaining module 304, configured to calculate a numerical value of a set of binary digits by using a convention algorithm to obtain a first result value; a confusion processing module 306, configured to perform confusion processing on a part of digits of the first result value and a digit system value corresponding to the correct answer to obtain an answer calculation value, where the digit system of the network question is consistent with the digit system of the correct answer; and a sending module 308, configured to use the answer calculation value as an answer and transmit the answer and the network topic to the client.
The answer protection device for the network questions further comprises a plurality of other modules, and since the answer protection device for the network questions corresponds to the answer protection method for the network questions, detailed descriptions of the plurality of other modules are omitted herein to avoid redundancy.
Compared with the prior art, the invention can realize at least one of the following beneficial effects:
1. the answer data is obfuscated by the answer protection method of the network topic provided by the invention, and the answer for obfuscating is sent in a plaintext or ciphertext mode;
2. when the data interceptor cracks the answer of the confusion processing according to the stolen private key, the data interceptor mistakenly regards to obtain the correct answer and confuses the correct answer, thereby protecting the data security of the correct answer; and
3. the target client can obtain correct answers through simple processing according to a pre-stored preset algorithm, confusion processing and a private key, so that the normal use of the target client cannot be influenced.
Those skilled in the art will appreciate that all or part of the flow of the method implementing the above embodiments may be implemented by a computer program, which is stored in a computer readable storage medium, to instruct related hardware. The computer readable storage medium is a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (10)

1. An answer protection method for a network topic, comprising:
converting the network questions into a set of numerical values with a binary digit system through a server;
calculating the numerical value of the group of digit system by a convention algorithm to obtain a first result value;
confusing partial digits of the first result value with digit system numerical values corresponding to correct answers to obtain answer calculation values, wherein the digit systems of the network questions are consistent with the digit systems of the correct answers; and
and taking the answer calculation value as an answer and transmitting the answer and the network title to a client.
2. The answer protection method for network topics as claimed in claim 1, wherein the set of binary values comprises a set of binary values or a set of binary values.
3. The method for protecting answers to network topics as claimed in claim 2, wherein calculating values of said set of bittables by a convention algorithm further comprises:
adding the numerical values of the group of four-digit systems by appointed addition; or
And carrying out exclusive-or calculation on partial digits of each value in a group of binary values by using a conventional exclusive-or algorithm.
4. The answer protection method for network questions of claim 1, wherein obfuscating a partial digit of the first result value and a digit scale value corresponding to a correct answer comprises:
when the partial digit of the calculation result value is 0 and the correct answer is D, the confusion calculation is that the digit number value corresponding to the correct answer D is reduced by 1;
when the partial digit of the calculation result value is 0 and the correct answer is A, the confusion calculation is that the digit number corresponding to the correct answer A is self-added by 1; and
when the partial digits of the calculation result value are not 0, the aliasing calculation is to perform subtraction operation on the partial digits of the first result value and the digit scale numerical value corresponding to the correct answer and use the absolute value of the subtraction operation as the answer calculation value or perform exclusive-or calculation on the partial digits of the first result value and the corresponding partial digits of the digit scale numerical value corresponding to the correct answer.
5. The method for protecting answers to network questions recited in claim 1, wherein transmitting said calculated answer values to a client further comprises:
encrypting the answer calculation value and transmitting the encrypted answer calculation value to the client; or
And transmitting the answer calculation value to the client in a plaintext mode.
6. The answer protection method for network topics according to any one of claims 1 to 5, wherein when the client is a data interceptor,
the data interceptor directly obtains the answer calculation value as an answer in a plaintext manner; or
And the data interception party decrypts the encrypted answer calculation value based on a secret key and obtains the answer calculation value as an answer.
7. The answer protection method for network topics according to any one of claims 1 to 5, wherein when the client is a target client,
the client receives the answer calculation value and the network title from the server;
converting the received network questions into a set of numerical values with a binary digit system;
calculating the numerical value of the group of digit system by a convention algorithm to obtain a second result value; and
and performing anti-confusion processing on the received answer calculation value and the second result value to obtain a correct answer.
8. The method for protecting answers to network questions of claim 7, wherein before said target client receives said answer calculation value and said network question, further comprising: the target client pre-stores the predetermined algorithm and the anti-aliasing processing rule corresponding to the aliasing processing,
when the target client receives the encrypted answer calculation value, the target client stores a private key in advance, and decrypts the encrypted answer calculation value through the private key to obtain the answer calculation value.
9. The method for protecting answers to network questions of claim 7, wherein confusing the received calculated answer value with the second result value further comprises:
when the confusion calculation is that the digit numerical value corresponding to the correct answer D is subtracted from 1, the anti-confusion processing rule is that the received answer calculation value is added from 1;
when the confusion calculation is that the digit numerical value corresponding to the correct answer A is self-added by 1, the anti-confusion processing rule is that the received answer calculation value is self-subtracted by 1;
when the confusion calculation is the subtraction operation of a part of digits of the first result value and the digit scale numerical value corresponding to the correct answer, the anti-confusion processing rule is the addition calculation of the second result value and the received answer calculation value; or
And when the partial digits of the first result value and the corresponding partial digits of the binary numerical value corresponding to the correct answer are subjected to exclusive-OR calculation, the partial digits of the second result value and the received answer calculation value are subjected to exclusive-OR calculation.
10. An answer protection device for a network topic, comprising:
the network topic conversion module is used for converting the network topic into a group of numerical values with a binary digit system through a server;
the first result value acquisition module is used for calculating the numerical value of the group of digit system through a convention algorithm to obtain a first result value;
the confusion processing module is used for performing confusion processing on part of digits of the first result value and digit system numerical values corresponding to correct answers to obtain answer calculation values, wherein the digit system of the network question is consistent with the digit system of the correct answers; and
and the sending module is used for taking the answer calculation value as an answer and transmitting the answer and the network title to a client.
CN202011009893.8A 2020-09-23 2020-09-23 Method and device for protecting answers of network questions Active CN112260998B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011009893.8A CN112260998B (en) 2020-09-23 2020-09-23 Method and device for protecting answers of network questions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011009893.8A CN112260998B (en) 2020-09-23 2020-09-23 Method and device for protecting answers of network questions

Publications (2)

Publication Number Publication Date
CN112260998A true CN112260998A (en) 2021-01-22
CN112260998B CN112260998B (en) 2022-12-06

Family

ID=74231854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011009893.8A Active CN112260998B (en) 2020-09-23 2020-09-23 Method and device for protecting answers of network questions

Country Status (1)

Country Link
CN (1) CN112260998B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024980A (en) * 2021-10-26 2022-02-08 南京元贝信息技术有限公司 Data multi-terminal synchronous processing method, device and equipment based on network request

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN104135531A (en) * 2014-08-07 2014-11-05 武汉益模软件科技有限公司 Method and device of upgrading Web software
CN105791500A (en) * 2016-02-29 2016-07-20 努比亚技术有限公司 Mobile phone number safety protection method and mobile terminal
CN110868718A (en) * 2019-10-31 2020-03-06 上海商米科技集团股份有限公司 Method and device for dynamically acquiring network name and password of access point
CN111566646A (en) * 2018-01-05 2020-08-21 三星电子株式会社 Electronic device for obfuscating and decoding data and method for controlling the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN104135531A (en) * 2014-08-07 2014-11-05 武汉益模软件科技有限公司 Method and device of upgrading Web software
CN105791500A (en) * 2016-02-29 2016-07-20 努比亚技术有限公司 Mobile phone number safety protection method and mobile terminal
CN111566646A (en) * 2018-01-05 2020-08-21 三星电子株式会社 Electronic device for obfuscating and decoding data and method for controlling the same
CN110868718A (en) * 2019-10-31 2020-03-06 上海商米科技集团股份有限公司 Method and device for dynamically acquiring network name and password of access point

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024980A (en) * 2021-10-26 2022-02-08 南京元贝信息技术有限公司 Data multi-terminal synchronous processing method, device and equipment based on network request

Also Published As

Publication number Publication date
CN112260998B (en) 2022-12-06

Similar Documents

Publication Publication Date Title
Pachghare Cryptography and information security
US7864952B2 (en) Data processing systems with format-preserving encryption and decryption engines
Fu et al. A new chaos‐based color image encryption scheme with an efficient substitution keystream generation strategy
EP0002580B1 (en) A process for the verification of cryptographic operational keys used in data communication networks
CN101485137B (en) Method and apparatus for encrypting/decrypting data
CN107733656A (en) A kind of cipher authentication method and device
CN111510281B (en) Homomorphic encryption method and device
CN103427987B (en) Method, data verification method and the electronic installation of data encryption
Abdullah et al. New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm
EP0043027A1 (en) Electronic signature verification method and system
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
Pub Data encryption standard (des)
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
Philjon et al. Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption
Ni et al. Some Graph‐Based Encryption Schemes
CN100546239C (en) The application cryptogram diagram technology carries out method of encrypting to data
CN112260998B (en) Method and device for protecting answers of network questions
Choubey et al. Cryptographic techniques in information security
CN117714613A (en) Image encryption method and device, electronic equipment and storage medium
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
Sunday et al. An efficient data protection for cloud storage through encryption
Diffie et al. Privacy and Authentication: An Introduction to Cryptography
Kodwani et al. Secure and transparent file encryption system
JPH0537795A (en) Facsimile equipment
Pawar et al. Survey of cryptography techniques for data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant