CN113821820B - Method, device, medium and equipment for encrypting and decrypting resources in splitting mode - Google Patents
Method, device, medium and equipment for encrypting and decrypting resources in splitting mode Download PDFInfo
- Publication number
- CN113821820B CN113821820B CN202111387181.4A CN202111387181A CN113821820B CN 113821820 B CN113821820 B CN 113821820B CN 202111387181 A CN202111387181 A CN 202111387181A CN 113821820 B CN113821820 B CN 113821820B
- Authority
- CN
- China
- Prior art keywords
- resource
- content
- content blocks
- pseudo
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012545 processing Methods 0.000 claims abstract description 41
- 230000008569 process Effects 0.000 claims abstract description 27
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 20
- 238000003860 storage Methods 0.000 claims abstract description 8
- 230000000903 blocking effect Effects 0.000 claims description 5
- 230000011218 segmentation Effects 0.000 abstract description 8
- 238000005336 cracking Methods 0.000 abstract description 5
- 238000004590 computer program Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method for encrypting and decrypting resources in a segmentation mode, which comprises the following steps: encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm; generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file; generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process; the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks; and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process. The invention unifies the resource encryption mode, enhances the difficulty of resource cracking and can transmit and process the user-defined content. The invention also relates to a device, a storage medium and equipment for encrypting and decrypting the resources in a segmentation mode.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, a storage medium and equipment for encrypting and decrypting resources in a segmentation mode.
Background
At present, the process of encrypting and decrypting resources is generally carried out on the contents of the resources in a certain key mode for confusion processing, the security guarantee is mainly on the used algorithm and key information, and if the two points are cracked, the security of the resources cannot be guaranteed.
For this reason, there is a strong need in the art for a method that can improve resource security.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, an apparatus, a storage medium, and a device for encrypting and decrypting resources in a split manner, aiming at the defects of the prior art.
The technical scheme for solving the technical problems is as follows:
a method for encrypting and decrypting resources in a slicing mode comprises the following steps:
encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process.
Preferably, the encrypting the resource file acquired in the form of the directory structure information list by using an encryption algorithm includes:
acquiring a resource file needing to be encrypted;
setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
Preferably, the generating the content block and the pseudo content block by the content splitting processing method according to the encrypted resource file size includes:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
and acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate the pseudo content blocks in the quantity range.
Preferably, the generating the content block and the pseudo content block by the content splitting processing method according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content block after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
Preferably, the offset data is 4-byte offset data, and the identification value is a 4-byte identification value.
Preferably, the generating a resource correspondence list of the resource file, the content block, and the pseudo content block, and updating a directory structure information list corresponding to the resource correspondence list for resource reading, and the completing the resource encryption processing process includes:
providing an original address of a resource file and content block list data;
updating a directory structure information list according to the original address to generate a resource corresponding list;
encrypting the resource corresponding list;
and completing the resource encryption processing.
Preferably, the acquiring, by the resource request end, all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks includes:
a resource request terminal requests to acquire a resource loading path;
the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
Preferably, the resource decryption is performed after all the content blocks are loaded, and the process of completing the resource decryption includes:
after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
searching identification data from the beginning offset data of each content block, wherein the content blocks with the identification data smaller than zero are pseudo content blocks, and the content blocks with the identification data larger than or equal to zero are real content blocks;
removing the offset data at the beginning and the final identification data and then acquiring the resource content in the real content block;
data sorting processing is carried out according to the identification data of the real content block, and encrypted data information is restored;
and completing the resource decryption processing process.
The method for encrypting and decrypting the resources in the splitting mode unifies the resource encryption mode, enhances the difficulty of resource cracking, and can transmit and process the user-defined content.
The invention also solves another technical scheme of the technical problems as follows:
an apparatus for encrypting and decrypting resources in a slicing manner, the apparatus comprising:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
and the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process.
Furthermore, the present invention provides a computer-readable storage medium, which stores one or more programs that can be executed by one or more processors to implement the steps in the method for encrypting and decrypting resources in a slicing manner according to any one of the above technical solutions.
The invention also provides a device for encrypting and decrypting resources in a segmentation mode, which comprises: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; when the processor executes the computer readable program, the steps in the method for encrypting and decrypting the resources in the splitting mode according to any one of the above technical solutions are realized.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention or in the description of the prior art will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for encrypting and decrypting a resource in a split manner according to an embodiment of the present invention;
fig. 2 is a schematic block diagram of an apparatus for encrypting and decrypting resources in a split manner according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, shall fall within the scope of protection of the present invention.
As shown in fig. 1, a method for encrypting and decrypting resources in a split manner includes the following steps:
110. encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
120. generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
130. generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
140. the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
150. and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process.
The resource files can be various data resources, such as pictures, models, scripts and the like, so that the use of non-standard encryption schemes for various resource files can be avoided, and the code function maintenance cost is reduced.
The resource file is acquired in the form of a directory structure information list, so that when the resource is read, the corresponding relation between the content and the file needs to be found from the directory structure information list, and the correct data decryption reading can be carried out.
The invention can generate various pseudo content blocks to increase the cracking difficulty, and can also verify the authority of the user, thereby preventing the user without authority from using corresponding resources which are not authorized yet.
The method for encrypting and decrypting the resources in the splitting mode unifies the resource encryption mode, enhances the difficulty of resource cracking, and can transmit and process the user-defined content.
The method for encrypting and decrypting the resources in a segmentation mode removes the process of encrypting the file by the resource production end, the resource file is uniformly encrypted only when being issued, and the content blocking function can also transmit customized business behaviors, so that the resources can obtain further safety guarantee.
According to the invention, through carrying out resource segmentation encryption and resource dynamic combination, content blocks and pseudo content blocks are generated simultaneously, and the pseudo content blocks are pseudo content blocks formed by user-defined data contents, so that the encrypted resource file has good safety guarantee.
Based on the foregoing embodiment, further, step 110 specifically includes:
111. acquiring a resource file needing to be encrypted;
112. setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
It should be noted that the encryption algorithm here is a general encryption algorithm in the industry, that is, the acquired resource file is encrypted for the first time according to the general encryption algorithm, then is subjected to segmentation processing, and is encrypted for the second time by taking the start timestamp as a random seed.
Based on the foregoing embodiment, further, step 120 specifically includes:
121. setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
122. storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
123. and acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate the pseudo content blocks in the quantity range.
The content blocks in step 122 may be encrypted twice by using the start time stamp, and the content blocks generated by encryption satisfy the number range set in step 121.
In step 123, the user-defined pseudo content data includes user right verification, user-defined content, pseudo content data and other pseudo content data different from the real data content.
The invention can improve the security of resources, unify the resource encryption scheme and embed self-defined service data.
Based on the above embodiment, further, step 120 specifically includes:
124. for the split pseudo content blocks, randomly writing 4-byte offset data at the beginning, and randomly writing a 4-byte identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
125. for the content block after the splitting processing, randomly writing 4-byte offset data at the beginning, and randomly writing a 4-byte identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block. And excluding the offset data of the first 4 bytes and the identification value of the 4 bytes, and taking other contents as the data contents of the resource file.
Based on the foregoing embodiment, further, step 130 specifically includes:
131. providing an original address of a resource file and content block list data;
132. updating a directory structure information list according to the original address to generate a resource corresponding list;
133. encrypting the resource corresponding list, which is essentially to simply encrypt the directory structure information list so as to enhance the security;
134. and completing the resource encryption processing.
Based on the above embodiment, further, step 140 specifically includes:
141. a resource request terminal requests to acquire a resource loading path;
142. the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
143. and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
Based on the above embodiment, further, step 150 specifically includes:
151. after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
152. searching past data from the first 4 bytes of offset data of each content block, finding byte identification data of the data block, if the identification data is less than zero, considering the data block as a pseudo data block, and if the identification data is more than or equal to zero, expressing the data block as the identification data of a real data block;
153. removing offset data at the beginning of the real data block and the final identification data and then acquiring resource content in the real content block;
154. data sorting processing is carried out according to the identification data of the real data block, and encrypted data information is restored;
155. and completing the resource decryption processing process.
The invention also solves another technical scheme of the technical problems as follows:
as shown in fig. 2, an apparatus for encrypting and decrypting a resource in a split manner includes:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
and the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process.
In the invention, the resource file is encrypted, and the content is segmented, and the rule of content combination is hidden, so that the cracking difficulty can be increased again on the integrity of the content, and the safety of the resource is improved. And the content fragments generated by splitting the content fragment can be processed, and dummy data can be inserted to improve the difficulty of acquiring real content blocks.
Furthermore, the present invention provides a computer-readable storage medium, which stores one or more programs that can be executed by one or more processors to implement the steps in the method for encrypting and decrypting resources in a slicing manner according to any one of the above technical solutions.
The invention also provides a device for encrypting and decrypting resources in a segmentation mode, which comprises: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; when the processor executes the computer readable program, the steps in the method for encrypting and decrypting the resources in the splitting mode according to any one of the above technical solutions are realized.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (8)
1. A method for encrypting and decrypting resources in a splitting mode is characterized by comprising the following steps:
encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
after all the content blocks are loaded, carrying out resource decryption to complete a resource decryption processing process;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the size of the encrypted resource file comprises the following steps:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate pseudo content blocks within the quantity range;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content blocks after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
2. The method for encrypting and decrypting the resources in the slicing manner according to claim 1, wherein the encrypting the resource file acquired in the directory structure information list form by an encryption algorithm comprises:
acquiring a resource file needing to be encrypted;
setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
3. The method according to claim 1, wherein the generating resource correspondence lists of resource files, content blocks, and pseudo content blocks, and updating directory structure information lists corresponding to the resource correspondence lists for resource reading, and the completing the resource encryption process includes:
providing an original address of a resource file and content block list data;
updating a directory structure information list according to the original address to generate a resource corresponding list;
encrypting the resource corresponding list;
and completing the resource encryption processing.
4. The method for encrypting and decrypting resource in a split manner according to claim 1, wherein the resource request side acquires all encrypted content blocks according to loading paths of the content blocks and the pseudo content blocks comprises:
a resource request terminal requests to acquire a resource loading path;
the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
5. The method for encrypting and decrypting the resources in the split mode according to claim 4, wherein the resource decryption is performed after all the content blocks are loaded, and the process of completing the resource decryption process comprises:
after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
searching identification data from the beginning offset data of each content block, wherein the content blocks with the identification data smaller than zero are pseudo content blocks, and the content blocks with the identification data larger than or equal to zero are real content blocks;
removing the offset data at the beginning and the final identification data and then acquiring the resource content in the real content block;
data sorting processing is carried out according to the identification data of the real content block, and encrypted data information is restored;
and completing the resource decryption processing process.
6. An apparatus for encrypting and decrypting resources in a split manner, the apparatus comprising:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process;
the resource encryption module is specifically configured to:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate pseudo content blocks within the quantity range;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content blocks after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
7. A computer readable storage medium, storing one or more programs, which are executable by one or more processors to implement the steps in the method for encrypting and decrypting resources in a split manner according to any one of claims 1 to 5.
8. An apparatus for encrypting and decrypting resources in a split manner, comprising: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; the processor, when executing the computer readable program, implements the steps in the method for encrypting and decrypting the resources in a slicing manner according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111387181.4A CN113821820B (en) | 2021-11-22 | 2021-11-22 | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111387181.4A CN113821820B (en) | 2021-11-22 | 2021-11-22 | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113821820A CN113821820A (en) | 2021-12-21 |
CN113821820B true CN113821820B (en) | 2022-02-22 |
Family
ID=78919610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111387181.4A Active CN113821820B (en) | 2021-11-22 | 2021-11-22 | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113821820B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116484407B (en) * | 2023-04-23 | 2024-03-22 | 深圳市天下房仓科技有限公司 | Data security protection method and device, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204986A (en) * | 2017-06-27 | 2017-09-26 | 四川捷云信通信息技术有限公司 | High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device |
CN112214784A (en) * | 2020-11-30 | 2021-01-12 | 北京蜜莱坞网络科技有限公司 | Resource processing method, device, electronic equipment and medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101379861B1 (en) * | 2006-10-20 | 2014-04-17 | 삼성전자주식회사 | Apparatus, system and method for providing DRM |
US9356782B2 (en) * | 2013-03-15 | 2016-05-31 | Unsene, Inc. | Block encryption |
CN104780048B (en) * | 2015-04-13 | 2018-04-10 | 中国电子科技集团公司第二十八研究所 | The image file encryption system and method for a kind of lightweight |
CN110968554A (en) * | 2018-09-30 | 2020-04-07 | 苏州中宇云网数字科技有限公司 | Block chain storage method, storage system and storage medium based on file chain blocks |
CN111259432B (en) * | 2020-02-18 | 2023-09-12 | 瑞芯微电子股份有限公司 | Model data protection method and readable computer storage medium |
CN112764677B (en) * | 2021-01-14 | 2022-12-23 | 杭州电子科技大学 | Method for enhancing data migration security in cloud storage |
-
2021
- 2021-11-22 CN CN202111387181.4A patent/CN113821820B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204986A (en) * | 2017-06-27 | 2017-09-26 | 四川捷云信通信息技术有限公司 | High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device |
CN112214784A (en) * | 2020-11-30 | 2021-01-12 | 北京蜜莱坞网络科技有限公司 | Resource processing method, device, electronic equipment and medium |
Non-Patent Citations (1)
Title |
---|
基于HTML5、AJAX的文件分割上传与加密存储研究;叶文全;《三明学院学报》;20180820(第04期);第7-8页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113821820A (en) | 2021-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108734028B (en) | Data management method based on block chain, block chain link point and storage medium | |
CN111143869A (en) | Application package processing method and device, electronic equipment and storage medium | |
CN110995446B (en) | Evidence verification method, device, server and storage medium | |
CN111404692B (en) | Block chain identity information confirmation system and confirmation method based on big data | |
CN115952552B (en) | Remote data destruction method, system and equipment | |
CN115238286A (en) | Data protection method and device, computer equipment and storage medium | |
US20180365389A1 (en) | A method and system for securing a client's access to a drm agent's services for a video player | |
CN113553629A (en) | Hardware authorization method and system | |
CN113821820B (en) | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode | |
CN111324902A (en) | Data access method, device and system based on block chain | |
CN114745373A (en) | File transmission method, device, equipment and storage medium | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN110381114B (en) | Interface request parameter processing method and device, terminal equipment and medium | |
CN116418505A (en) | Data processing method, system, computer device and storage medium | |
CN116644485A (en) | Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium | |
CN115935388A (en) | Software package safety sending method, device, equipment and storage medium | |
CN112561449B (en) | Method and system for synchronizing inventory information | |
CN114124469B (en) | Data processing method, device and equipment | |
CN109189450A (en) | A kind of method and device of server firmware upgrading | |
CN114329567A (en) | Bid file generation method, verification method, electronic device and medium | |
CN114444027A (en) | Software signature implanting method, software signature verifying device, electronic equipment and medium | |
CN112926047A (en) | Authorization control method and device for localized deployment product, electronic equipment and medium | |
CN112214771A (en) | Information analysis method and device based on big data and computer readable storage medium | |
CN111523128A (en) | Information protection method, system, electronic device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Room 105, first floor, building 82, No. 10, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: Beijing Youhao Technology Co.,Ltd. Country or region after: China Address before: Room 105, first floor, building 82, No. 10, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee before: BEIJING YOUNUO TECHNOLOGY Co.,Ltd. Country or region before: China |