CN114710279A - Method and device for encrypting, storing and decrypting and recovering user information - Google Patents

Method and device for encrypting, storing and decrypting and recovering user information Download PDF

Info

Publication number
CN114710279A
CN114710279A CN202210409994.7A CN202210409994A CN114710279A CN 114710279 A CN114710279 A CN 114710279A CN 202210409994 A CN202210409994 A CN 202210409994A CN 114710279 A CN114710279 A CN 114710279A
Authority
CN
China
Prior art keywords
ciphertext
client
dimensional code
ciphertexts
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210409994.7A
Other languages
Chinese (zh)
Inventor
刘博�
林强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210409994.7A priority Critical patent/CN114710279A/en
Publication of CN114710279A publication Critical patent/CN114710279A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention discloses a method and a device for encrypting, storing, decrypting and recovering user information, and relates to the technical field of artificial intelligence, wherein the method comprises the steps that a client encrypts the user information to obtain a ciphertext; the user information comprises user identity information and user password information; the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts; the client side respectively generates two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code picture client sides, stores the two-dimensional code pictures in a disorder order, and stores the splicing order of the segmented ciphertexts. Therefore, the user information can be stored at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.

Description

Method and device for encrypting, storing and decrypting and recovering user information
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a method and a device for encrypting, storing, decrypting and recovering user information.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
When a user uses some software with sensitive user information (such as an APP (application) of a bank and the like), the software can remotely store the user information with extremely high security, such as user identity information, password information and the like, in a server. However, for an interactive process with a high delay requirement, the user experience is seriously affected and even serious loss is caused due to the fact that the interactive process cannot respond in time due to network congestion and a series of time-consuming operations of acquiring user information from a remote place and then encrypting and decrypting the user information are performed. However, if the user information is stored locally in the client in the form of text, the stored text information is at risk of leakage because the stored area is mostly a public or shared area, and once the stored text information is leaked, the text information can be decrypted, so that the risk is high, and the security is low.
Disclosure of Invention
The embodiment of the invention provides a user information encryption storage method, which is used for storing user information at a client, ensuring the response timeliness when reading the user information, reducing the leakage risk of the user information and improving the storage safety, and comprises the following steps:
the client encrypts the user information to obtain a ciphertext; the user information comprises user identity information and user password information;
the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts;
the client side respectively generates two-dimensional code pictures from each segment of the divided ciphertext to obtain a plurality of two-dimensional code pictures;
the client stores a plurality of two-dimensional code pictures in a disordered order and stores the splicing order of the segmented multiple sections of ciphertexts.
The embodiment of the invention also provides a user information decryption recovery method, which is used for reading the user information at the client, ensuring the response timeliness when the user information is read, reducing the leakage risk of the user information and improving the storage safety, and comprises the following steps:
the client analyzes the multiple two-dimensional code pictures to obtain multiple sections of ciphertext; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
the client splices the multiple sections of ciphertext according to the splicing sequence of the stored multiple sections of ciphertext;
the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
The embodiment of the present invention further provides a user information encryption storage device, which is applied to a client, and is used for storing user information at the client, so as to ensure response timeliness when reading the user information, reduce user information leakage risk, and improve storage security, and the device includes:
the ciphertext obtaining module is used for encrypting the user information to obtain a ciphertext; the user information comprises user identity information and user password information;
the ciphertext segmentation module is used for segmenting the ciphertext to obtain a plurality of segments of the ciphertext after segmentation;
the picture generation module is used for respectively generating two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code pictures;
and the storage module is used for storing a plurality of two-dimensional code pictures in a disordered order and storing the splicing order of the segmented multiple sections of ciphertexts.
The embodiment of the present invention further provides a device for decrypting and recovering user information, which is applied to a client, and is used for reading user information at the client, ensuring response timeliness when reading the user information, reducing user information leakage risk, and improving storage security, and the device includes:
the ciphertext restoration module is used for analyzing the plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
the ciphertext splicing module is used for splicing the multiple sections of ciphertexts according to the stored splicing sequence of the multiple sections of ciphertexts;
the user information acquisition module is used for decrypting the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the method for encrypting, storing or decrypting and recovering the user information.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for encrypting, storing, or decrypting and recovering user information is implemented.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the method for encrypting, storing, or decrypting and recovering the user information is implemented.
In the embodiment of the invention, a client encrypts user information to obtain a ciphertext; the user information comprises user identity information and user password information; the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts; the client side respectively generates two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code picture client sides, stores the two-dimensional code pictures in a disorder mode, and stores the splicing sequence of the segmented ciphertexts. Therefore, the user information can be stored at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
In the embodiment of the invention, a client analyzes a plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates a two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way; the client splices the multiple sections of ciphertext according to the splicing sequence of the stored multiple sections of ciphertext; the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information. Therefore, the user information can be read at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a schematic flow chart of a user information encryption storage method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a user information decryption recovery method according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a user information encryption storage device applied to a client according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a user information decryption recovery apparatus applied to a client according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a computer device provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
As described above, the inventor has found that when a user uses some software with sensitive user information (such as APP of a bank), the software remotely stores the user information with extremely high security, such as user identity information, passwords, information, and the like, in a server. However, for an interactive process with a high delay requirement, the user experience is seriously affected and even serious loss is caused due to the fact that the interactive process cannot respond in time due to network congestion and a series of time-consuming operations of acquiring user information from a remote place and then encrypting and decrypting the user information are performed. However, if the user information is stored locally in the client in the form of text, the stored text information is at risk of leakage because the stored area is mostly a public or shared area, and once the stored text information is leaked, the text information can be decrypted, so that the risk is high, and the security is low. In order to solve the problem, the inventor proposes a user information encryption storage and decryption recovery method in the embodiment of the invention. Fig. 1 is a schematic flow diagram of a user information encryption storage method in an embodiment of the present invention, and as shown in fig. 1, the user information encryption storage method may include:
step 101, a client encrypts user information to obtain a ciphertext; the user information comprises user identity information and user password information;
102, the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts;
103, the client side respectively generates two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code pictures;
and step 104, the client stores a plurality of two-dimensional code pictures in a disordered order and stores the splicing order of the segmented multiple sections of ciphertexts.
As can be known from the flow shown in fig. 1, in the embodiment of the present invention, the client encrypts the user information to obtain the ciphertext; the user information comprises user identity information and user password information; the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts; the client side respectively generates two-dimensional code pictures from each segment of the divided ciphertext to obtain a plurality of two-dimensional code pictures; the client stores a plurality of two-dimensional code pictures in a disordered order and stores the splicing order of the segmented ciphertext, so that the user information can be stored at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
In specific implementation, the user information including the user identity information and the user password information can be obtained after the user is authorized. And encrypting the user information by the client to obtain a ciphertext. It is to be understood that the user information should not be limited to the examples given herein, and may be specifically selected according to the actual implementation, for example, the user information may further include: password protection issues, user login names, etc.
And after the ciphertext is obtained, the client divides the ciphertext to obtain a plurality of sections of divided ciphertexts. In one embodiment, the client may segment the ciphertext by a specified length to obtain multiple segments of the ciphertext after the segmentation. In another embodiment, the client may segment the ciphertext according to a specified text segmentation algorithm to obtain multiple segments of the ciphertext after segmentation. It is to be understood that the ciphertext splitting is not limited to the examples given herein, and the specific splitting manner may be selected according to the actual implementation.
After the segmented multiple sections of ciphertext are obtained, the client side respectively generates a two-dimensional code picture from each segmented ciphertext to obtain multiple two-dimensional code pictures.
After the plurality of two-dimensional code pictures are obtained, the client stores the plurality of two-dimensional code pictures in a disordered manner.
The client also stores the splicing sequence of the segmented multiple sections of ciphertext so as to subsequently splice the multiple sections of ciphertext, and the user information is decrypted by the spliced ciphertext. In one embodiment, the client stores the concatenation order of the segmented multiple ciphertexts, for example, the client stores the concatenation order of the segmented multiple ciphertexts in a private database. The private database may be, for example, the so database of the Android client.
In an embodiment, the client stores the splicing sequence of the segmented multiple ciphertexts, where the client names each two-dimensional code picture to describe the splicing sequence of the segmented multiple ciphertexts corresponding to each two-dimensional code picture by naming, and the client stores the name of each two-dimensional code picture. For example: and naming the two-dimensional code picture corresponding to the first section of ciphertext as a picture 1, naming the two-dimensional code picture corresponding to the second section of ciphertext as a picture 2, and so on until the two-dimensional code pictures corresponding to the sections of ciphertext are named completely, and storing the name of each two-dimensional code picture. And subsequently, determining the splicing sequence of the corresponding multiple sections of ciphertexts according to the naming sequence of the picture.
In another embodiment, the client stores the concatenation sequence of the segmented multiple segments of ciphertexts, which may also be: the client stores a two-dimension code recovery sequence, and the two-dimension code recovery sequence is used for describing the splicing sequence of the segmented multiple sections of ciphertexts. For example: the two-dimensional code recovery sequence is 3421, and represents that the 1 st two-dimensional code picture corresponds to the 3 rd segment of ciphertext, the 2 nd two-dimensional code picture corresponds to the 4 th segment of ciphertext, the 3 rd two-dimensional code picture corresponds to the 2 nd segment of ciphertext, the 4 th two-dimensional code picture corresponds to the 1 st segment of ciphertext, then the concatenation order of each segment of ciphertext recovered by the 1 st, 2 nd, 3 th, 4 th two-dimensional code picture is: 3. 4, 2 and 1. It is understood that the way in which the splicing sequence is stored is not limited to the examples given herein, and may be specifically selected according to the actual implementation.
Fig. 2 is a schematic flow diagram of a user information decryption recovery method in an embodiment of the present invention, and as shown in fig. 2, the user information decryption recovery method includes:
step 201, a client analyzes a plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates a two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
step 202, the client splices the multiple sections of ciphertext according to the stored splicing sequence of the multiple sections of ciphertext;
step 203, the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
As can be known from the process shown in fig. 2, in the embodiment of the present invention, a client analyzes a plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way; the client splices the multiple sections of ciphertext according to the splicing sequence of the stored multiple sections of ciphertext; the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information. Therefore, the user information can be read at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
In a specific implementation, as described above, the client encrypts the user information to obtain a ciphertext, divides the ciphertext into multiple sections, and generates one two-dimensional code picture for each section of the ciphertext, and stores the two-dimensional code pictures in a disorder order. In an embodiment, the client may package, compress and store the multiple two-dimensional code pictures in an out-of-order manner, and before the client analyzes the multiple two-dimensional code pictures, the method may further include: and the client decompresses the two-dimensional code pictures which are packed and compressed and stored in an out-of-order mode. After decompression, the client analyzes the multiple two-dimensional code pictures to obtain multiple sections of ciphertexts.
After the multiple sections of ciphertexts are obtained, the client side splices the multiple sections of ciphertexts according to the stored splicing sequence of the multiple sections of ciphertexts. In the embodiment, the client can store the splicing sequence of the segmented multiple sections of ciphertexts in the private database, so that when the multiple sections of ciphertexts need to be spliced, the client needs to acquire the splicing sequence of the stored multiple sections of ciphertexts from the private database, and the multiple sections of ciphertexts are spliced conveniently according to the splicing sequence of the stored multiple sections of ciphertexts. In one embodiment, the private database may be the so database of the Android client.
As described above, in an embodiment, the concatenation order of multiple sections of ciphertext is described by naming the two-dimensional code picture corresponding to each section of ciphertext. For example: and naming the two-dimensional code picture corresponding to the first section of ciphertext as a picture 1, naming the two-dimensional code picture corresponding to the second section of ciphertext as a picture 2, and so on until the two-dimensional code pictures corresponding to the sections of ciphertext are named completely, and storing the name of each two-dimensional code picture. The client can splice the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the names of the two-dimensional code pictures corresponding to the stored each section of ciphertexts.
As mentioned above, in another embodiment, the concatenation order of multiple segments of ciphertext is described in a recovery sequence of a two-dimensional code. For example: the two-dimensional code recovery sequence is 3421, and represents that the 1 st two-dimensional code picture corresponds to the 3 rd segment of ciphertext, the 2 nd two-dimensional code picture corresponds to the 4 th segment of ciphertext, the 3 rd two-dimensional code picture corresponds to the 2 nd segment of ciphertext, the 4 th two-dimensional code picture corresponds to the 1 st segment of ciphertext, then the concatenation order of each segment of ciphertext recovered by the 1 st, 2 nd, 3 th, 4 th two-dimensional code picture is: 3. 4, 2 and 1. The client can splice multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the two-dimensional code recovery sequence. It is to be understood that the concatenation order of the multiple segments of ciphertext should not be limited to the examples given herein, and may be specifically selected according to actual implementation.
After splicing the multiple sections of ciphertext, the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information. It is understood that the user information should not be limited to the examples given herein, and may be specifically selected according to the actual implementation, for example: password protection issues, user login names, etc.
The embodiment of the invention also provides a user information encryption storage device and a user information decryption recovery device, which are applied to the client, as described in the following embodiments. Because the principles of these devices for solving the problems are respectively similar to the user information encryption storage method and the user information decryption recovery method, the implementation of these devices can refer to the implementation of the corresponding methods, and the repeated parts are not described again.
Fig. 3 is a schematic structural diagram of a user information encryption storage device applied to a client in an embodiment of the present invention, as shown in fig. 3, the user information encryption storage device includes:
a ciphertext obtaining module 301, configured to encrypt the user information to obtain a ciphertext; the user information comprises user identity information and user password information;
the ciphertext splitting module 302 may be configured to split a ciphertext to obtain multiple segments of the ciphertext after splitting;
the picture generation module 303 is configured to generate a two-dimensional code picture from each segmented ciphertext to obtain multiple two-dimensional code pictures;
the storage module 304 may be configured to store a plurality of two-dimensional code pictures in a random order, and store a splicing order of the segmented multiple segments of ciphertexts.
In an embodiment, the ciphertext splitting module 302 may be specifically configured to:
dividing the ciphertext according to the specified length to obtain a plurality of sections of divided ciphertexts;
or, the ciphertext is segmented according to a specified text segmentation algorithm to obtain a plurality of segmented ciphertexts.
In one embodiment, the storage module 304 is specifically configured to:
and packaging and compressing a plurality of two-dimensional code pictures in an out-of-order manner.
In an embodiment, the storage module 304 is specifically configured to:
and storing the splicing sequence of the segmented multiple sections of ciphertexts in a private database.
In one embodiment, the private database may be the so database of the Android client.
In one embodiment, the storage module 304 is specifically configured to:
naming each two-dimensional code picture to describe the splicing sequence of the multiple sections of ciphertexts which are correspondingly segmented by each two-dimensional code picture in a naming mode;
and storing the name of each two-dimension code picture.
In one embodiment, the storage module 304 is specifically configured to:
and storing a two-dimensional code recovery sequence, and describing the splicing sequence of the segmented multiple sections of ciphertexts by using the two-dimensional code recovery sequence.
Fig. 4 is a schematic structural diagram of a user information decryption and recovery apparatus applied to a client in an embodiment of the present invention, as shown in fig. 4, the user information decryption and recovery apparatus includes:
the ciphertext restoration module 401 may be configured to parse a plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
the ciphertext splicing module 402 may be configured to splice multiple pieces of ciphertext according to a splicing order of the stored multiple pieces of ciphertext;
the user information obtaining module 403 may be configured to decrypt the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
In one embodiment, the apparatus shown in fig. 4 may further include:
and the picture decompression module is configured to decompress the multiple two-dimensional code pictures that are packed and compressed in an out-of-order manner before the ciphertext restoration module 401 parses the multiple two-dimensional code pictures.
In one embodiment, the apparatus shown in fig. 4 may further include:
and a concatenation sequence obtaining module, configured to obtain a stored concatenation sequence of the multiple segments of ciphertexts from the private database before the cipher text concatenation module 402 concatenates the multiple segments of ciphertexts.
In one embodiment, the private database may be the so database of the Android client.
In one embodiment, the splicing sequence of the multiple sections of ciphertexts can be described by naming the two-dimensional code picture corresponding to each section of the ciphertexts;
the ciphertext concatenation module 402 may be specifically configured to:
the multiple sections of ciphertexts can be spliced according to the splicing sequence of the multiple sections of ciphertexts described by the names of the two-dimensional code pictures corresponding to the stored sections of ciphertexts.
In one embodiment, the concatenation order of the multiple sections of ciphertext can be described as a two-dimensional code recovery sequence;
the ciphertext concatenation module 402 may be specifically configured to:
the multiple sections of ciphertexts can be spliced according to the splicing sequence of the multiple sections of ciphertexts described by the two-dimensional code recovery sequence.
Based on the above inventive concept, as shown in fig. 5, the present invention further provides a computer device 500, which includes a memory 510, a processor 520, and a computer program 530 stored in the memory 510 and executable on the processor 520, wherein the processor 520 executes the computer program 530 to implement the above user information encryption storage and decryption recovery method.
The embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and when the computer program is executed by a processor, the user information encryption storage and decryption recovery method is realized.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the above-mentioned user information encryption storage and decryption recovery method.
In summary, in the embodiment of the present invention, the client encrypts the user information to obtain the ciphertext; the user information comprises user identity information and user password information; the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts; the client side respectively generates two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code picture client sides, stores the two-dimensional code pictures in a disorder mode, and stores the splicing sequence of the segmented ciphertexts. Therefore, the user information can be stored at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
In the embodiment of the invention, a client analyzes a plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates a two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way; the client splices the multiple sections of ciphertext according to the splicing sequence of the stored multiple sections of ciphertext; the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information. Therefore, the user information can be read at the client, the response timeliness when the user information is read is ensured, the leakage risk of the user information is reduced, and the storage safety is improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (29)

1. A user information encryption storage method is characterized by comprising the following steps:
the client encrypts the user information to obtain a ciphertext; the user information comprises user identity information and user password information;
the client side divides the ciphertext to obtain a plurality of sections of divided ciphertexts;
the client side respectively generates two-dimensional code pictures from each segment of the divided ciphertext to obtain a plurality of two-dimensional code pictures;
the client stores a plurality of two-dimensional code pictures in a disordered order and stores the splicing order of the segmented multiple sections of ciphertexts.
2. The method of claim 1, wherein the client splits the ciphertext to obtain multiple split ciphertext fragments, comprising:
the client divides the ciphertext according to the specified length to obtain a plurality of divided ciphertext;
or the client divides the ciphertext according to a specified text division algorithm to obtain a plurality of sections of divided ciphertexts.
3. The method of claim 1, wherein the client stores the plurality of two-dimensional code pictures in an out-of-order manner, comprising:
and the client packs and compresses a plurality of two-dimensional code pictures in an out-of-order manner.
4. The method of claim 1, wherein the client stores the concatenation order of the segmented multiple segments of ciphertext, comprising:
and the client stores the splicing sequence of the segmented multiple sections of ciphertexts in a private database.
5. The method of claim 4, wherein the private database is a so database of an Android client.
6. The method of claim 1, wherein the client stores the concatenation order of the segmented multiple segments of ciphertext, comprising:
the client names each two-dimensional code picture to describe the splicing sequence of the multiple sections of ciphertexts which are correspondingly segmented by each two-dimensional code picture in a naming mode;
and the client stores the name of each two-dimensional code picture.
7. The method of claim 1, wherein the client stores the concatenation order of the segmented multiple segments of ciphertext, comprising:
the client stores a two-dimension code recovery sequence, and the two-dimension code recovery sequence is used for describing the splicing sequence of the segmented multiple sections of ciphertexts.
8. A method for decrypting and recovering user information is characterized by comprising the following steps:
the client analyzes the multiple two-dimensional code pictures to obtain multiple sections of ciphertext; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
the client splices the multiple sections of ciphertext according to the splicing sequence of the stored multiple sections of ciphertext;
the client decrypts the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
9. The method of claim 8, wherein before the client parses the plurality of two-dimensional code pictures, the method further comprises:
and the client decompresses the two-dimensional code pictures which are packed and compressed and stored in an out-of-order mode.
10. The method of claim 8, wherein before the client concatenates the plurality of segments of ciphertext according to the stored concatenation order of the plurality of segments of ciphertext, the method further comprises:
and the client acquires the splicing sequence of the stored multiple sections of ciphertexts from the private database.
11. The method of claim 10, wherein the private database is a so database of an Android client.
12. The method according to claim 8, wherein the concatenation order of the multiple sections of ciphertext is described by the name of the two-dimensional code picture corresponding to each section of ciphertext;
the client splices the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of stored ciphertexts, and the method comprises the following steps:
and the client splices the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the names of the two-dimensional code pictures corresponding to the stored sections of ciphertexts.
13. The method of claim 8, wherein the concatenation order of the plurality of segments of ciphertext is described in a two-dimensional code recovery sequence;
the client splices the multiple sections of ciphertexts according to the splicing sequence of the stored multiple sections of ciphertexts, and the method comprises the following steps of:
and the client splices the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the two-dimensional code recovery sequence.
14. A user information encryption storage apparatus, wherein the apparatus is applied to a client, the apparatus comprising:
the ciphertext obtaining module is used for encrypting the user information to obtain a ciphertext; the user information comprises user identity information and user password information;
the ciphertext segmentation module is used for segmenting the ciphertext to obtain a plurality of segments of the ciphertext after segmentation;
the picture generation module is used for respectively generating two-dimensional code pictures from each segmented ciphertext to obtain a plurality of two-dimensional code pictures;
and the storage module is used for storing a plurality of two-dimensional code pictures in a disordered order and storing the splicing order of the segmented multiple sections of ciphertexts.
15. The apparatus of claim 14, wherein the ciphertext splitting module is specifically configured to:
dividing the ciphertext according to the specified length to obtain a plurality of sections of divided ciphertexts;
or, the ciphertext is segmented according to a specified text segmentation algorithm to obtain a plurality of segmented ciphertexts.
16. The apparatus of claim 14, wherein the storage module is specifically configured to:
and packaging and compressing a plurality of two-dimensional code pictures in an out-of-order manner.
17. The apparatus of claim 14, wherein the storage module is specifically configured to:
and storing the splicing sequence of the segmented multiple sections of ciphertexts in a private database.
18. The apparatus of claim 17, wherein the private database is a so database of an Android client.
19. The apparatus of claim 14, wherein the storage module is specifically configured to:
naming each two-dimensional code picture to describe the splicing sequence of the multiple sections of ciphertexts which are correspondingly segmented by each two-dimensional code picture in a naming mode;
and storing the name of each two-dimension code picture.
20. The apparatus of claim 14, wherein the storage module is specifically configured to:
and storing a two-dimensional code recovery sequence, and describing the splicing sequence of the segmented multiple sections of ciphertexts by using the two-dimensional code recovery sequence.
21. A user information decryption recovery apparatus, wherein the apparatus is applied to a client, the apparatus comprises:
the ciphertext restoration module is used for analyzing the plurality of two-dimensional code pictures to obtain a plurality of sections of ciphertexts; the client encrypts user information to obtain a ciphertext, divides the ciphertext into a plurality of sections, and respectively generates one two-dimensional code picture from each section of the ciphertext and stores the two-dimensional code pictures in a disordered way;
the ciphertext splicing module is used for splicing the multiple sections of ciphertexts according to the stored splicing sequence of the multiple sections of ciphertexts;
the user information acquisition module is used for decrypting the spliced ciphertext to obtain user information; the user information comprises user identity information and user password information.
22. The apparatus of claim 21, further comprising:
and the picture decompression module is used for decompressing the two-dimensional code pictures which are packed and compressed and stored in an out-of-order mode before the ciphertext restoration module analyzes the two-dimensional code pictures.
23. The apparatus of claim 21, further comprising:
and the splicing sequence acquisition module is used for acquiring the stored splicing sequence of the multiple sections of ciphertexts from the private database before the multi-section ciphertexts are spliced by the cipher text splicing module.
24. The apparatus of claim 23, wherein the private database is a so database of an Android client.
25. The apparatus according to claim 21, wherein the concatenation order of the plurality of sections of ciphertext is described by naming a two-dimensional code picture corresponding to each section of ciphertext;
the ciphertext splicing module is specifically configured to:
and splicing the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the names of the two-dimensional code pictures corresponding to the stored each section of ciphertexts.
26. The apparatus of claim 21, wherein the concatenation order of the plurality of segments of ciphertext is described in a two-dimensional code recovery sequence;
the ciphertext splicing module is specifically configured to:
and splicing the multiple sections of ciphertexts according to the splicing sequence of the multiple sections of ciphertexts described by the two-dimensional code recovery sequence.
27. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 13 when executing the computer program.
28. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 13.
29. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 13.
CN202210409994.7A 2022-04-19 2022-04-19 Method and device for encrypting, storing and decrypting and recovering user information Pending CN114710279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210409994.7A CN114710279A (en) 2022-04-19 2022-04-19 Method and device for encrypting, storing and decrypting and recovering user information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210409994.7A CN114710279A (en) 2022-04-19 2022-04-19 Method and device for encrypting, storing and decrypting and recovering user information

Publications (1)

Publication Number Publication Date
CN114710279A true CN114710279A (en) 2022-07-05

Family

ID=82175468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210409994.7A Pending CN114710279A (en) 2022-04-19 2022-04-19 Method and device for encrypting, storing and decrypting and recovering user information

Country Status (1)

Country Link
CN (1) CN114710279A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN112788046A (en) * 2021-01-22 2021-05-11 中信银行股份有限公司 Method and system for encrypting transmission information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN112788046A (en) * 2021-01-22 2021-05-11 中信银行股份有限公司 Method and system for encrypting transmission information

Similar Documents

Publication Publication Date Title
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN106203128B (en) Webpage data encryption and decryption method, device and system
KR101698403B1 (en) File packing and unpacking method, and device thereof
CN107579962B (en) A kind of method and device of source code encryption and decryption
US20180124023A1 (en) Method, system and apparatus for storing website private key plaintext
CN110768787A (en) Data encryption and decryption method and device
CN107800716B (en) Data processing method and device
CN111698576B (en) Information encryption method, decryption method, server, client, and medium
CN112272314B (en) Method, device, equipment and medium for safely transmitting video in video network
CN104463012A (en) Virtual machine image file exporting and importing method and device
CN104601681A (en) File fragmentation processing method and device
CN112734361A (en) Distributed cooperative office data processing method and system
CN114745373A (en) File transmission method, device, equipment and storage medium
KR102418090B1 (en) Computer program for dividing original file into multiple pieces, encrypting divided files and restoring original file by decrypting encrypted files, and method thereof
CN108737353A (en) A kind of data ciphering method and device based on data analysis system
CN114710279A (en) Method and device for encrypting, storing and decrypting and recovering user information
CN110971581B (en) Encrypted data processing method and device
CN113661491A (en) Method for encrypting and updating virtual disk
CN116132041A (en) Key processing method and device, storage medium and electronic equipment
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN113794706A (en) Data processing method and device, electronic equipment and readable storage medium
CN110516468A (en) A kind of method and apparatus of virutal machine memory snapshot encryption
CN111105777A (en) Voice data acquisition and playing method and device, key packet updating method and device and storage medium
CN103490900A (en) Encryption and authentication method and equipment
CN111130788A (en) Data processing method and system, data reading method and iSCSI server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination