CN113536348A - Link encryption processing method, link decryption processing method, device and computer equipment - Google Patents

Link encryption processing method, link decryption processing method, device and computer equipment Download PDF

Info

Publication number
CN113536348A
CN113536348A CN202110830627.XA CN202110830627A CN113536348A CN 113536348 A CN113536348 A CN 113536348A CN 202110830627 A CN202110830627 A CN 202110830627A CN 113536348 A CN113536348 A CN 113536348A
Authority
CN
China
Prior art keywords
link
base62
encryption
processing method
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110830627.XA
Other languages
Chinese (zh)
Inventor
尹红光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qibao Xinan Technology Co ltd
Original Assignee
Beijing Qibao Xinan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qibao Xinan Technology Co ltd filed Critical Beijing Qibao Xinan Technology Co ltd
Priority to CN202110830627.XA priority Critical patent/CN113536348A/en
Publication of CN113536348A publication Critical patent/CN113536348A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a link encryption processing method, a link decryption processing method, a link encryption processing device, a link decryption processing device and computer equipment. The link encryption processing method comprises the following steps: original links pointing to a destination address are configured in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to an registration page or a verification page of a resource guarantee input product APP; lengthening the tail part of each generated link serial number to obtain a link digital string; and acquiring a preset Base62 secret key, and carrying out encryption calculation on the link digit string to obtain an encrypted link password. According to the invention, by generating the link serial numbers and adding the eight-bit random number to the tail part of each link serial number, the short character string can be avoided, the randomness of the encryption result can be improved, false registration behaviors or leakage of privacy information and the like can be prevented, the security of link processing can be effectively improved, and the link encryption and decryption method can be optimized.

Description

Link encryption processing method, link decryption processing method, device and computer equipment
Technical Field
The invention relates to the technical field of internet security, in particular to a link encryption processing method, a link decryption processing method, a link encryption processing device, a link decryption processing device and computer equipment.
Background
Linking refers to the process of passing parameters and control commands between modules of an electronic computer program and assembling them into an executable whole. The link is also called a hyperlink, and refers to a connection relationship from one web page to a target, and the target may be another web page, or different positions on the same web page, or a picture, an email address, a file, or even an application program. In addition, the link can also be used for guidance of various functions, marketing promotion, information prompt, real-name authentication, and the like.
With the rapid development of information technology, the sharing and publishing of network information becomes an important component of internet social contact. In some common network page sharing manners, for example, a user who issues sharing information issues a link address of a page to be shared to an information sharing platform (such as a social tool like a microblog, a WeChat friend circle, and the like), and a user who receives the sharing information accesses the shared page through the shared link address. For another example, the user accesses a registration page or a verification page of the APP through a link of the promotion page or the guidance page.
In internet-based application technology, there is often a need to exchange resources between different parties. Resources, as referred to herein, refer to any available material, information, money, time, etc. Information resources include computing resources and various types of data resources. The data resources include various private data in various domains. For the resource raising platform, in the resource raising process, the existence of bad behaviors such as wool pulling behavior, false registration behavior, fraud behavior and the like in participators such as project organizers or resource raising people can cause great adverse effects on the resource raising platform. Therefore, many business scenarios related to the resource raising platform also require the user to perform authentication, and related pages of different business scenarios have different links. The existing link is encrypted by adopting a standard Base62 mode, for example, and the risk of easy cracking exists. In addition, there is still much room for improvement in the optimization of the link encryption and decryption methods.
Therefore, it is necessary to provide a more efficient link encryption processing method.
Disclosure of Invention
In view of the problem that the existing encryption method is easy to crack, and in order to further optimize the link encryption method, a first aspect of the present invention provides a link encryption processing method for encrypting a link related to resource guarantee investment, including: original links pointing to a destination address are configured in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to an registration page or a verification page of a resource guarantee input product APP; lengthening the tail part of each generated link serial number to obtain a link digital string; and acquiring a preset Base62 secret key, and carrying out encryption calculation on the link digit string to obtain an encrypted link password.
Preferably, the configuring of the original link pointing to the destination address comprises: the initial link number is set as a specific start value, and the link numbers of the respective original links are arranged in such a manner that 1 is sequentially incremented from the specific start value to form a link number.
Preferably, the lengthening the tail of each generated link sequence number includes: an eight-bit random number is added to the end of each generated link number.
Preferably, the method further comprises the following steps: the standard Base62 key is adjusted in a self-defining sequence to obtain a preset Base62 key, wherein the Base62 key comprises A-Z, a-Z and 0-9.
Preferably, the method further comprises the following steps: the method comprises the steps of carrying out self-defined sequence adjustment on a standard Base62 secret key, and carrying out binary, decimal or hexadecimal conversion calculation to obtain a preset Base62 secret key, wherein the Base62 secret key comprises A-Z, a-Z and 0-9.
Preferably, the performing encryption calculation on the concatenated digit string includes: and performing conversion calculation on the linked digit string according to the preset Base62 key to obtain the link represented by the preset Base62 key.
In addition, the second aspect of the present invention further provides a link decryption processing method for decrypting a link password encrypted by the link encryption processing method of the first aspect of the present invention, including the steps of: acquiring a preset Base62 secret key, and carrying out Base62 decryption on the link password to obtain a decoded digital string; cutting the tail part of the decoding digit string to obtain a link serial number; and searching a configuration table according to the link sequence number to obtain the original link.
Preferably, before the encryption processing, a tail of each link sequence number generated by the original link is subjected to lengthening processing, where the lengthening processing includes: adding eight-bit random numbers to the tail of each generated link serial number; the cutting the tail part of the decoding digital string to obtain the link sequence number comprises the following steps: and cutting eight-bit random numbers at the tail part of the decoding digital string.
In addition, a third aspect of the present invention provides a link processing apparatus for performing encryption or decryption processing on a link related to resource guarantee investment, including: the system comprises a configuration module, a processing module and a processing module, wherein the configuration module is used for configuring original links pointing to a destination address in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to an registration page or a verification page of a resource guarantee input product APP; the lengthening processing module is used for lengthening the tail part of each generated link serial number to obtain a link digital string; and the encryption module is used for acquiring a preset Base62 secret key and carrying out encryption calculation on the link digital string to obtain an encrypted link password.
Furthermore, a fourth aspect of the invention is a computer device comprising a processor and a memory for storing a computer executable program, which when executed by the processor performs the method of the first or second aspect of the invention.
Furthermore, the fifth aspect of the present invention also provides a computer program product, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any one of the first and second aspects of the present invention.
Advantageous effects
Compared with the prior art, the invention can avoid the short character string and improve the randomness of the encryption result by generating the link serial numbers and adding eight-bit random numbers to the tail part of each link serial number; the setting of the Base62 secret key can improve the randomness of an encryption result, prevent false registration behaviors or leakage of private information and the like, effectively improve the security of link processing, and optimize a link encryption and decryption method.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects obtained more clear, the following will describe in detail the embodiments of the present invention with reference to the accompanying drawings. It should be noted, however, that the drawings described below are only illustrations of exemplary embodiments of the invention, from which other embodiments can be derived by those skilled in the art without inventive faculty.
Fig. 1 is a flowchart of an example of a link encryption processing method of embodiment 1 of the present invention.
Fig. 2 is a schematic diagram of another example of the link encryption processing method of embodiment 1 of the present invention.
Fig. 3 is a flowchart of an example of a link decryption processing method according to embodiment 2 of the present invention.
Fig. 4 is a schematic diagram of another example of the link decryption processing method of embodiment 2 of the present invention.
Fig. 5 is a schematic diagram of an example of a link encryption processing apparatus of embodiment 3 of the present invention.
Fig. 6 is a schematic diagram of another example of a link encryption processing apparatus of embodiment 3 of the present invention.
Fig. 7 is a block diagram of an exemplary embodiment of a computer device according to the present invention.
Fig. 8 is a block diagram of an exemplary embodiment of a computer program product according to the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components, or sections, these terms should not be construed as limiting. These phrases are used to distinguish one from another. For example, a first device may also be referred to as a second device without departing from the spirit of the present invention.
The term "and/or" and/or "includes any and all combinations of one or more of the associated listed items.
In view of the above problems, the present invention provides a link encryption processing method, which can effectively improve the security of the link, effectively avoid false registration behavior, and optimize the link encryption and decryption method.
It should be noted that, in the present invention, the resource raising platform is a platform based on a network architecture, and is a system with data storage and processing, and the resource raising platform initiates raising resources for resource raising projects of big diseases or serious diseases, and the like, wherein the resources refer to any available materials, information, time, and the information resources include computing resources and various types of data resources. The data resources include various private data in various domains.
In order that the objects, technical solutions and advantages of the present invention will become more apparent, the present invention will be further described in detail with reference to the accompanying drawings in conjunction with the following specific embodiments.
Example 1
Next, an embodiment of a link encryption processing method of the present invention will be described with reference to fig. 1 and 2.
Fig. 1 is a flowchart of a link encryption processing method according to the present invention. As shown in fig. 1, the method includes the following steps.
Step S101, original links pointing to destination addresses are configured in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to registration pages or verification pages of APP of the resource guarantee input products.
And step S102, lengthening the tail part of each generated link serial number to obtain a link numeric string.
Step S103, obtaining a preset Base62 key, and performing encryption calculation on the link number string to obtain an encrypted link password.
In the invention, the link encryption processing method is used for encrypting the link related to the resource guarantee investment. For example, the link is used to user authenticate or verify participating users in a resource planning project initiated based on a resource planning platform, where the resource planning project is a project initiated by a project organizer that plans a resource to a resource holder, such as a resource planning project for a major or serious disease, to assist a patient in need of treatment in obtaining medical research. However, the above description is only given as an optional example, and in other examples, the resource raising item may be other items for other help or mutual aid, and the resource raising item further includes a guided purchase of a resource security product, and the like. The process of the present invention will be described in more detail below.
First, in step S101, original links pointing to a destination address are configured in a configuration table, and each original link corresponds to a link number, where the original link includes a link pointing to a registration page or a verification page of the resource guarantee investment product APP.
In the present example, the service personnel configure in the configuration table the original links corresponding to different service scenarios, for example, the original links in a scenario of user registration, authentication or verification of a participating user in a resource planning project initiated based on the resource planning platform, the original links include links pointing to a registration page of the resource provisioning investment product APP, and the original links are set with a link number, in other words, each original link corresponds to a link number.
It should be noted that the above is only described as an optional example, and is not to be construed as limiting the present invention, and in other examples, the application scenario of the link includes a verification scenario of a resource raising person in a resource raising project, a verification scenario of a resource pushing person (or resource raising project organizer), a purchase verification scenario of a resource securing product, a guidance or promotion scenario, a registration scenario, and the like.
Specifically, an initial link number is set as a specific start value, and the link numbers of the respective original links are arranged in such a manner as to be sequentially incremented by 1 from the specific start value to form a link number.
For example, the starting sequence number of the link map to be encrypted is set to a specific starting value, such as 1000000, and the subsequent sequence numbers are sequentially incremented by 1, such as 1000001, 1000002, and so on, according to actual requirements.
It should be noted that the above description is only given as an alternative example, and the invention is not to be construed as being limited thereto.
Next, in step S102, the tail of each generated link number is extended to obtain a link number string.
Specifically, by adding an eight-bit random number to the end of each link number generated in step S101, it is possible to avoid an excessively short character string and improve the randomness of the encryption result.
Further, the eight-bit random number can be a number from 0 to 9, a letter from a to z, or other symbols.
For example, if the generated link number is 1000002, an eight-bit random number is appended to the end of 1000002, and the eight-bit random number is 912266ab, for example.
It should be noted that the above description is only given as an alternative example, and the invention is not to be construed as being limited thereto.
Next, in step S103, a preset Base62 key is obtained, and the linked number string is subjected to encryption calculation to obtain an encrypted linked password.
As shown in fig. 2, the method further includes a step S201 of setting a Base62 key.
In step S201, a Base62 key is set for improving the randomness of the encryption result.
Specifically, the standard Base62 key is adjusted in a self-defined sequence to obtain a preset Base62 key, wherein the Base62 key includes a-Z, and 0-9.
Further, the standard Base62 secret key is subjected to self-defined sequence adjustment, and binary, decimal, hexadecimal, nineteen-decimal or thirty-six-decimal conversion calculation is carried out to obtain a preset Base62 secret key, wherein the Base62 secret key comprises A-Z, a-Z and 0-9.
It should be noted that, in other examples, conversion calculation may be performed by using two or more than three binary, decimal, hexadecimal, nineteen binary, and thirty-six binary algorithms to obtain the preset Base62 key.
Specifically, the base numbers of 0, 1, 0-9 digits and letters are used as the base numbers of the system, and the base numbers and specific symbols are used to organize the system counting method of hexadecimal, nineteen-system, thirty-six-system and the like.
In this example, the binary system consists of 0, 1, the decimal system consists of 0 ~ 9, the hexadecimal system consists of 0 ~ 9, A, D, G, J, M, P, the nineteen system consists of 0 ~ 9, A ~ I, and the thirty-six system consists of 0 ~ 9, A ~ Z.
Optionally, by reorganizing the Base number, reforming the Base number of the Base62, and scrambling the order of the Base number, that is, scrambling the Base number of the Base62, a preset Base62 key can be obtained, so that false registration behaviors or leakage of privacy information can be prevented, and the security of the link processing can be effectively improved.
It should be noted that the above is only an alternative example for illustration, and the invention is not to be construed as being limited thereto, and in other examples, the choice of the hexadecimal or nineteen binary base may be in other manners. For example, hexadecimal notation can also consist of 0-9, B, D, F, H, J, L, in other words, the other six letters except the number can use any six letters (upper case and/or lower case) in 26 letters, and can also select six letters at equal intervals or unequal intervals, and the like.
Further, the linked digit string is subjected to encryption calculation, wherein the linked digit string is subjected to conversion calculation according to the preset Base62 secret key so as to obtain the link represented by the preset Base62 secret key.
Optionally, the performing conversion calculation includes performing conversion calculation by using a binary algorithm, a decimal algorithm, a hexadecimal algorithm, or a trihexa-hexadecimal algorithm, so as to perform encryption calculation on the original link, and obtain the link represented by the preset Base62 key.
Further, for different service application scenarios, different encryption calculation modes are determined for each link.
For example, for the link for user registration, conversion calculation is performed using two or more of binary, decimal, hexadecimal, and thirty-six.
For another example, for the link for user authentication, the conversion calculation is performed using two or more of decimal, hexadecimal, and thirty-six.
And obtaining the encrypted link password after the encryption calculation. Therefore, the link security can be further improved, false registration behavior can be effectively avoided, and a link encryption and decryption method can be optimized.
It should be noted that the above description is only given as an alternative example, and the invention is not to be construed as being limited thereto.
Those skilled in the art will appreciate that all or part of the steps to implement the above-described embodiments are implemented as programs (computer programs) executed by a computer data processing apparatus. When the computer program is executed, the method provided by the invention can be realized. Furthermore, the computer program may be stored in a computer readable storage medium, which may be a readable storage medium such as a magnetic disk, an optical disk, a ROM, a RAM, or a storage array composed of a plurality of storage media, such as a magnetic disk or a magnetic tape storage array. The storage medium is not limited to centralized storage, but may be distributed storage, such as cloud storage based on cloud computing.
Compared with the prior art, the invention can avoid the short character string and improve the randomness of the encryption result by generating the link serial numbers and adding eight-bit random numbers to the tail part of each link serial number; the setting of the Base62 secret key can improve the randomness of an encryption result, prevent false registration behaviors or leakage of private information and the like, effectively improve the security of link processing, and optimize a link encryption and decryption method.
Example 2
Referring to fig. 3 and 4, the present invention further provides a link decryption processing method for decrypting a link password encrypted by the link encryption processing method according to embodiment 1, including the following steps:
step S301, acquiring a preset Base62 secret key, and carrying out Base62 decryption on the link password to obtain a decoded digital string.
Step S302, cutting the tail part of the decoding digit string to obtain a link serial number.
Step S303, look up a configuration table according to the link sequence number to obtain an original link.
In this embodiment, the link decryption processing method is particularly suitable for performing decryption processing on the link password obtained in embodiment 1.
As shown in fig. 4, the link decryption processing method includes a step S401 of acquiring a link password to be decrypted.
In step S401, the link password to be decrypted is acquired to perform decryption processing.
Preferably, the link password is obtained by encrypting the original link by the link encryption processing method of embodiment 1.
Specifically, before the encryption processing, a tail of each link sequence number generated by the original link is lengthened, where the lengthening processing includes: an eight-bit random number is added to the end of each generated link number.
Next, in step S301, a preset Base62 key is obtained, and the link password is decrypted by Base62, so as to obtain a decoded digital string.
Specifically, the link password obtained in step S401 is decrypted according to the acquired preset Base62 key.
Further, before decryption processing, the tail part of the decoding digital string is cut to obtain a link serial number.
Further, eight-bit random numbers are clipped from the tail of the decoded digit string to obtain the corresponding link sequence number.
Next, in step S303, the configuration table is looked up according to the link sequence number to obtain the original link.
Specifically, according to the acquired preset Base62 key and the link serial number obtained in step S302, the original link is obtained by looking up from the configuration table. Thereby, the link decryption process is realized.
In embodiment 2, the same portions as those in embodiment 1 are not described.
Compared with the prior art, the invention can improve the randomness of the encryption result, prevent false registration behaviors or leakage of privacy information and the like, effectively improve the security of the link processing, and optimize the link encryption and decryption method by generating the link serial numbers, adding eight-bit random numbers to the tail parts of the link serial numbers during encryption and cutting the added eight-bit random numbers during decryption.
Example 3
Embodiments of the apparatus of the present invention are described below, which may be used to perform method embodiments of the present invention. The details described in the device embodiments of the invention should be regarded as complementary to the above-described method embodiments; reference is made to the above-described method embodiments for details not disclosed in the apparatus embodiments of the invention.
Referring to fig. 5 and 6, the present invention also provides a link processing apparatus 500 for performing encryption or decryption processing on a link related to resource guarantee investment, the link processing apparatus 500 including: a configuration module 501, configured to configure original links pointing to a destination address in a configuration table, so that each original link corresponds to a link serial number, where the original links include links pointing to an registration page or a verification page of an APP product that is a resource guarantee input product; a lengthening processing module 502, configured to lengthen a tail of each generated link sequence number to obtain a link number string; the encryption module 503 is configured to obtain a preset Base62 key, and perform encryption calculation on the link number string to obtain an encrypted link password.
Alternatively, the initial link number is set as a specific start value, and the link numbers of the respective original links are arranged in such a manner that 1 is sequentially incremented from the specific start value to form the link number.
Specifically, the lengthening the tail of each generated link sequence number includes: an eight-bit random number is added to the end of each generated link number.
Further, still include: the standard Base62 key is adjusted in a self-defining sequence to obtain a preset Base62 key, wherein the Base62 key comprises A-Z, a-Z and 0-9.
Specifically, the method further comprises the following steps: the method comprises the steps of carrying out self-defined sequence adjustment on a standard Base62 secret key, and carrying out binary, decimal or hexadecimal conversion calculation to obtain a preset Base62 secret key, wherein the Base62 secret key comprises A-Z, a-Z and 0-9.
Further, the performing encryption calculation on the concatenated digit string includes: and performing conversion calculation on the linked digit string according to the preset Base62 key to obtain the link represented by the preset Base62 key.
As shown in fig. 6, the link processing apparatus 500 further includes a decryption module 601, where the decryption module 601 is configured to perform Base62 decryption on the link password to obtain a decoded number string, perform clipping processing on the tail of the decoded number string to obtain a link sequence number, and look up a configuration table according to the link sequence number to obtain an original link.
In example 3, the same portions as those in examples 1 and 2 are not described.
Those skilled in the art will appreciate that the modules in the above-described embodiments of the apparatus may be distributed as described in the apparatus, and may be correspondingly modified and distributed in one or more apparatuses other than the above-described embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Compared with the prior art, the invention can improve the randomness of the encryption result, prevent false registration behaviors or leakage of privacy information and the like, effectively improve the security of the link processing, and optimize the link encryption and decryption method by generating the link serial numbers, adding eight-bit random numbers to the tail parts of the link serial numbers during encryption and cutting the added eight-bit random numbers during decryption.
Example 4
In the following, embodiments of the computer apparatus of the present invention are described, which may be seen as specific physical embodiments for the above-described embodiments of the method and apparatus of the present invention. The details described in the computer device embodiment of the invention should be considered as additions to the method or apparatus embodiment described above; for details which are not disclosed in the embodiments of the computer device of the invention, reference may be made to the above-described embodiments of the method or apparatus.
Fig. 7 is a block diagram of an exemplary embodiment of a computer device according to the present invention. A computer apparatus 200 according to this embodiment of the present invention is described below with reference to fig. 7. The computer device 200 shown in fig. 7 is only an example and should not bring any limitation to the function and the scope of use of the embodiments of the present invention.
As shown in FIG. 7, computer device 200 is in the form of a general purpose computing device. The components of computer device 200 may include, but are not limited to: at least one processing unit 210, at least one storage unit 220, a bus 230 connecting different device components (including the storage unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code executable by the processing unit 210 to cause the processing unit 210 to perform steps according to various exemplary embodiments of the present invention described in the processing method section of the above-mentioned computer apparatus of the present specification. For example, the processing unit 210 may perform the steps as shown in fig. 1.
The memory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or a cache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 230 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The computer device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the computer device 200, and/or with any devices (e.g., router, modem, etc.) that enable the computer device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, computer device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) through network adapter 260. Network adapter 260 may communicate with other modules of computer device 200 via bus 230. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computer device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. Which when executed by a data processing device, enables the computer program product to carry out the above-mentioned method of the invention.
As shown in fig. 8, the computer program may be stored on one or more computer program products. The computer program product may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer program product include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer program product may comprise a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer program product may be transmitted, propagated, or transported for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on the computer program product may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such a program implementing the invention may be stored on a computer program product or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing detailed description has described the objects, aspects and advantages of the present invention in further detail, it should be appreciated that the present invention is not inherently related to any particular computer, virtual machine, or computer apparatus, as various general purpose devices may implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.

Claims (10)

1. A link encryption processing method for encrypting a link relating to resource guarantee investment, comprising:
original links pointing to a destination address are configured in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to an registration page or a verification page of a resource guarantee input product APP;
lengthening the tail part of each generated link serial number to obtain a link digital string;
and acquiring a preset Base62 secret key, and carrying out encryption calculation on the link digit string to obtain an encrypted link password.
2. The link encryption processing method according to claim 1, wherein the configuring of the original link pointing to the destination address includes:
the initial link number is set as a specific start value, and the link numbers of the respective original links are arranged in such a manner that 1 is sequentially incremented from the specific start value to form a link number.
3. The link encryption processing method according to claim 1 or 2, wherein the lengthening the tail of each generated link sequence number includes:
an eight-bit random number is added to the end of each generated link number.
4. The link encryption processing method according to claim 1, further comprising:
the standard Base62 key is adjusted in a self-defining sequence to obtain a preset Base62 key, wherein the Base62 key comprises A-Z, a-Z and 0-9.
5. The link encryption processing method according to claim 1, further comprising:
the method comprises the steps of carrying out self-defined sequence adjustment on a standard Base62 secret key, and carrying out binary, decimal or hexadecimal conversion calculation to obtain a preset Base62 secret key, wherein the Base62 secret key comprises A-Z, a-Z and 0-9.
6. The link encryption processing method according to claim 4 or 5, wherein said performing encryption calculation on the link number string includes:
and performing conversion calculation on the linked digit string according to the preset Base62 key to obtain the link represented by the preset Base62 key.
7. A link decryption processing method for decrypting a link password encrypted by the link encryption processing method according to claim 1, comprising the steps of:
acquiring a preset Base62 secret key, and carrying out Base62 decryption on the link password to obtain a decoded digital string;
cutting the tail part of the decoding digit string to obtain a link serial number;
and searching a configuration table according to the link sequence number to obtain the original link.
8. The link decryption processing method of claim 7,
before the encryption processing, performing lengthening processing on the tail of each link sequence number generated by the original link, wherein the lengthening processing comprises: adding eight-bit random numbers to the tail of each generated link serial number;
the cutting the tail part of the decoding digital string to obtain the link sequence number comprises the following steps: and cutting eight-bit random numbers at the tail part of the decoding digital string.
9. A link processing apparatus for performing encryption or decryption processing on a link relating to resource guarantee investment, comprising:
the system comprises a configuration module, a processing module and a processing module, wherein the configuration module is used for configuring original links pointing to a destination address in a configuration table, each original link corresponds to a link serial number, and the original links comprise links pointing to an registration page or a verification page of a resource guarantee input product APP;
the lengthening processing module is used for lengthening the tail part of each generated link serial number to obtain a link digital string;
and the encryption module is used for acquiring a preset Base62 secret key and carrying out encryption calculation on the link digital string to obtain an encrypted link password.
10. A computer device comprising a processor and a memory, the memory for storing a computer executable program, characterized in that:
when the computer program is executed by the processor, the processor performs the method of any one of claims 1 and 7.
CN202110830627.XA 2021-07-22 2021-07-22 Link encryption processing method, link decryption processing method, device and computer equipment Withdrawn CN113536348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110830627.XA CN113536348A (en) 2021-07-22 2021-07-22 Link encryption processing method, link decryption processing method, device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110830627.XA CN113536348A (en) 2021-07-22 2021-07-22 Link encryption processing method, link decryption processing method, device and computer equipment

Publications (1)

Publication Number Publication Date
CN113536348A true CN113536348A (en) 2021-10-22

Family

ID=78120483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110830627.XA Withdrawn CN113536348A (en) 2021-07-22 2021-07-22 Link encryption processing method, link decryption processing method, device and computer equipment

Country Status (1)

Country Link
CN (1) CN113536348A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115544781A (en) * 2022-10-18 2022-12-30 南方电网科学研究院有限责任公司 Construction method and device of large power grid test system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115544781A (en) * 2022-10-18 2022-12-30 南方电网科学研究院有限责任公司 Construction method and device of large power grid test system

Similar Documents

Publication Publication Date Title
US9843578B2 (en) Mobile security fob
CN105794145A (en) Server-aided private set intersection (PSI) with data transfer
WO2016063254A1 (en) Encrypted collaboration system and method
US20080192937A1 (en) System and Method for Generalized Authentication
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
TW201638798A (en) Database server and client for query processing on encrypted data
Carter et al. Blockchain-based interoperable electronic health record sharing framework
CN110084599B (en) Key processing method, device, equipment and storage medium
Marshall et al. Use of a secure Internet Web site for collaborative medical research
CN111047314A (en) Financial data processing method and system based on block chain
CN114884675B (en) Multi-party privacy intersection method, device, equipment and medium based on bit transmission
JP7486530B2 (en) Method, system, and program for accessing shared confidential information in a controlled container environment
CN112307513B (en) Uplink document security management method and device based on time domain consensus and electronic equipment
CN112989391A (en) Hybrid encryption method, hybrid decryption method, system, device and storage medium
MX2007013310A (en) Method, system, and program product for connecting a client to a network.
Seok et al. Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
Sharma et al. A two-tier security solution for storing data across public cloud
CN113536348A (en) Link encryption processing method, link decryption processing method, device and computer equipment
Englert et al. ALIIAS: Anonymization/Pseudonymization with LimeSurvey integration and II-factor Authentication for Scientific research
CN113904832A (en) Data encryption method, device, equipment and storage medium
US20230328062A1 (en) Management of shared authentication credentials
Abdulkader RETRACTED: Cloud data security mechanism using the lightweight cryptography
Dwivedi et al. Blockchain‐Based Electronic Medical Records System with Smart Contract and Consensus Algorithm in Cloud Environment
US11507693B2 (en) Systems and methods for providing a blind de-identification of privacy data
Daman et al. Encryption tools for secured health data in public cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20211022

WW01 Invention patent application withdrawn after publication