CN115277192A - Information encryption method and device and electronic equipment - Google Patents

Information encryption method and device and electronic equipment Download PDF

Info

Publication number
CN115277192A
CN115277192A CN202210890457.9A CN202210890457A CN115277192A CN 115277192 A CN115277192 A CN 115277192A CN 202210890457 A CN202210890457 A CN 202210890457A CN 115277192 A CN115277192 A CN 115277192A
Authority
CN
China
Prior art keywords
data
ultrasonic
information
electronic device
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210890457.9A
Other languages
Chinese (zh)
Other versions
CN115277192B (en
Inventor
徐文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210890457.9A priority Critical patent/CN115277192B/en
Publication of CN115277192A publication Critical patent/CN115277192A/en
Application granted granted Critical
Publication of CN115277192B publication Critical patent/CN115277192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an information encryption method, an information encryption device and electronic equipment, and belongs to the field of communication. The information encryption method comprises the following steps: acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value; performing data processing on the first text to obtain first data; and shifting and encrypting the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.

Description

Information encryption method and device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information encryption method and device and electronic equipment.
Background
At present, text information sent at a mobile terminal is usually sent to a receiver in a plaintext form, wherein many text information relates to personal privacy, and if the text information is sent in the plaintext form, the risk of interception or stealing exists. In the prior art, a hash algorithm such as MD5 or SHA1 is usually used to encrypt text information. However, the above encryption method has a problem of poor security, and although the text information is encrypted, the text information still has a risk of being intercepted or stolen due to the poor security of the encryption method.
Disclosure of Invention
The embodiment of the application aims to provide an information encryption method, an information encryption device and electronic equipment, and can solve the problem that the existing text encryption mode is poor in safety.
In a first aspect, an embodiment of the present application provides an information encryption method, including:
acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value;
performing data processing on the first text to obtain first data;
and shifting and encrypting the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
In a second aspect, an embodiment of the present application provides an information encryption apparatus, including:
the acquisition module is used for acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value;
the data processing module is used for carrying out data processing on the first text to obtain first data;
and the encryption module is used for carrying out displacement encryption on the first data by utilizing the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the information encryption method according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a readable storage medium, on which a program or instructions are stored, and when executed by a processor, the program or instructions implement the steps of the information encryption method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the information encryption method according to the first aspect.
In a sixth aspect, the present application provides a computer program product stored in a storage medium, the program product being executed by at least one processor to implement the information encryption method according to the first aspect.
In the embodiment of the application, by acquiring first ultrasonic information and a first text, the first ultrasonic information includes an ultrasonic amplitude value and an ultrasonic frequency value; then, carrying out data processing on the first text to obtain first data; and finally, the first data is subjected to displacement encryption by utilizing the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text, so that the text is encrypted based on the ultrasonic information, the security of text encryption can be improved, and the problem of risk of intercepting or stealing the text when a user transmits the text by using the electronic equipment is effectively solved.
Drawings
Fig. 1 is a schematic flowchart of an information encryption method provided in an embodiment of the present application;
FIG. 2 is a schematic flowchart of an information decryption method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of two devices pairing in an example of the present application;
FIG. 4 is a schematic flow chart of information interaction between two devices after successful ultrasonic pairing in an example of the present application;
FIG. 5 is a schematic flow chart of information interaction between two devices in another example of the present application after successful ultrasonic pairing;
FIG. 6 is a block diagram of an information encryption apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 8 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below clearly with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/", and generally means that the former and latter related objects are in an "or" relationship.
The information transmission method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Fig. 1 is a schematic flow chart of an information encryption method according to an embodiment of the present application. Wherein, the method can comprise the following steps:
step 101, acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value.
The method of the embodiment of the application can be executed by a first electronic device, and the first text is a communication text between a user a of the first electronic device and a user B of a second electronic device, such as a daily chat text, a business communication text, and the like.
Specifically, the first text may be text stored locally on the first electronic device or text edited by the user a of the first electronic device by using an input method program installed on the first electronic device.
102, performing data processing on the first text to obtain first data;
here, the first text is subjected to data processing for the purpose of converting the first text into data that can be recognized by a computer, i.e., first data.
And 103, performing displacement encryption on the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
Under the condition that the ultrasonic amplitude value is not equal to the ultrasonic frequency value, the first data can be encrypted by left shift by using the ultrasonic amplitude value, and the encrypted data after left shift is encrypted by right shift by using the ultrasonic frequency value; or right-shift encrypting the first data by using the ultrasonic amplitude value, and performing left-shift encrypting on the encrypted data by using the ultrasonic frequency value.
Here, the first data may also be left-shifted or right-shifted encrypted, and the number of bits left-shifted or right-shifted is the sum of the ultrasonic amplitude value and the ultrasonic frequency value.
It should be noted that the shift encryption of the first data includes, but is not limited to, the above case. The ultrasonic information is used as the key to shift and encrypt the data, so that the security of text encryption can be improved, and the problem of risk of intercepting or stealing the text when a user transmits the text by using the electronic equipment is effectively solved.
As an optional implementation manner, the step 102 may specifically include:
step 1021, performing binary conversion on the first text to obtain first data.
I.e. the first data is binary data, which can be recognized by the computer.
As an optional implementation manner, the step 103 may specifically include:
and step 1031, performing segmentation processing on the first data to obtain first segmented data and second segmented data.
Here, the segmenting process of the first data may be a segmenting process of the first data according to a preset rule, for example, a segmenting process of the first data according to a preset proportion according to a data length, for example, a bisection (1:1) segmenting process of the first data, or an unequal segmentation (for example, 1:2 or 2:3) of the first data.
And 1032, performing first displacement operation on the first segment data by using the amplitude value of the ultrasonic wave to obtain third segment data.
Optionally, the first shift operation is a left shift or a right shift operation.
And 1033, performing second displacement operation on the second segmented data by using the ultrasonic frequency value to obtain fourth segmented data.
Optionally, the second shift operation is a left shift or right shift operation.
Step 1034, obtaining an encrypted text according to the third subsection data and the fourth subsection data.
In an optional implementation manner, step 1034 may specifically include:
a) Aggregating the third subsection data and the fourth subsection data to obtain second data;
here, aggregating the third segment data and the fourth segment data may also be understood as stitching the third segment data and the fourth segment data.
b) And carrying out hexadecimal conversion on the second data to obtain an encrypted text.
The following describes the encryption process according to an embodiment of the present application by way of an example.
In one example, the binary ASCII code value for string "C" in a computer is 01000011, followed by front and back sections of 0100,0011. If the ultrasonic amplitude value is 3 and the ultrasonic frequency value is 5, shifting 0100 segment by 3 bits to the left to obtain a value of 0010; the "0011" segment is shifted to the right by 5 bits, resulting in a value of 1001. The resulting "0010" and "1001" were then polymerized to yield 0010,1001. Finally, the obtained 0010,1001 is converted into a corresponding hexadecimal number, so that a text value of '29' is obtained, and the text value of '29' is used as an encrypted text.
Optionally, the first ultrasonic information is ultrasonic information sent by an opposite-end electronic device successfully paired with the home-end electronic device.
The local electronic device is a first electronic device, and the opposite electronic device is a second electronic device. Specifically, the first electronic device and the second electronic device are successfully paired through ultrasonic waves, wherein the successful pairing of the first electronic device and the second electronic device through ultrasonic waves means that the first electronic device and the second electronic device respectively record ultrasonic information of the other party and confirm that the first electronic device and the second electronic device have received the ultrasonic information of the other party.
Based on this, specifically, after step 103, the method of the embodiment of the present application may further include:
and step 104a, sending the encrypted text to the opposite-end electronic equipment.
In the scene of text communication between local-end electronic equipment (first electronic equipment) and communication opposite-end electronic equipment (second electronic equipment), first ultrasonic information (namely ultrasonic information sent by the second electronic equipment) is used for encrypting a first text, so that the first text is prevented from being intercepted or stolen, the first text is prevented from being peeped and leaked when being displayed on a screen of the electronic equipment, and the opposite-end electronic equipment decrypts the encrypted text by using the first ultrasonic information sent by the opposite-end electronic equipment after the subsequent encrypted text is received by the opposite-end electronic equipment (second electronic equipment).
In an optional implementation manner, after step 103, the method of the embodiment of the present application may further include:
and step 104b, sending second ultrasonic information to the opposite-end electronic equipment, wherein the second ultrasonic information is the ultrasonic information sent by the local-end electronic equipment.
Here, the purpose of the second ultrasonic information transmission is to enable the opposite-end electronic device (second electronic device) to verify that the object of communication with the opposite-end electronic device is the home-end electronic device (first electronic device), so that it is possible to avoid the opposite-end electronic device (second electronic device) from decrypting an unrelated encrypted text, and thus unnecessary power consumption is avoided.
Under the condition that the first electronic device and the second electronic device are successfully matched through ultrasonic waves, encrypting the first text by using first ultrasonic information to obtain an encrypted text, wherein the first ultrasonic information is recorded by the first electronic device and sent by the second electronic device; the encrypted text and the second ultrasonic information are respectively sent to the second electronic equipment, the second ultrasonic information is the ultrasonic information sent by the first electronic equipment, and therefore the text is encrypted based on the ultrasonic information, the text encryption safety can be improved, the problem of the risk that the text is intercepted or stolen when the user transmits the text by using the electronic equipment is effectively solved, the risk that the privacy is peeped and leaked when the user transmits the text by using the electronic equipment can also be effectively solved, and the purpose of protecting the privacy of the user is achieved.
As an optional implementation manner, the method in the embodiment of the present application may further include:
and S1, sending second ultrasonic information to second electronic equipment.
The first electronic device sends second ultrasonic information to the second electronic device, and the purpose of the second ultrasonic information is to establish an ultrasonic pairing relationship with the second electronic device, so that after the subsequent pairing is successful, the second electronic device can verify whether the communication object is the first electronic device or not based on the second ultrasonic information.
And S2, if first ultrasonic information sent by second electronic equipment is received, sending first confirmation information to the second electronic equipment, and determining that the first electronic equipment and the second electronic equipment are successfully paired under the condition that second confirmation information sent by the second electronic equipment is received, wherein the first confirmation information is used for indicating that the first electronic equipment has received the first ultrasonic information, and the second confirmation information is used for indicating that the second electronic equipment has received the second ultrasonic information.
After receiving first ultrasonic information sent by second electronic equipment, first electronic equipment sends first confirmation information to the second electronic equipment, and the purpose of the first electronic equipment is to inform the second electronic equipment that first electronic equipment communicated with the second electronic equipment has received the first ultrasonic information; in addition, after receiving the second ultrasonic information sent by the first electronic device, the second electronic device also sends second confirmation information to the first electronic device, and the purpose of the second confirmation information is to inform the first electronic device that the second electronic device communicating with the first electronic device has received the second ultrasonic information. In this way, when both the first electronic device and the second electronic device record ultrasonic information of the other party and confirm that the ultrasonic information of the other party has been received, it is determined that the first electronic device and the second electronic device are successfully paired by the ultrasonic waves.
It should be noted that, when the first electronic device receives the ultrasonic information sent by the second electronic device, the other electronic devices may also send the ultrasonic information to the first electronic device, and in order to distinguish whether the first electronic device is the second electronic device to which the ultrasonic information is sent, in this embodiment of the application, when the other electronic devices (including the second electronic device) send the ultrasonic information to the first electronic device, it is further necessary to send device identification information for identifying the device, so as an optional implementation manner, the step S2 of receiving the first ultrasonic information sent by the second electronic device specifically includes the following steps:
and S21, receiving the target ultrasonic information and the equipment identification information sent by the target electronic equipment.
Here, the target electronic device may be one or a plurality of devices. When the target electronic device is plural, each electronic device transmits one ultrasonic wave information and one device identification information.
And S22, if the target electronic equipment is verified to be the opposite-end electronic equipment according to the equipment identification information, recording the target ultrasonic information as first ultrasonic information.
Through the implementation process of the above steps S21 to S22, it is determined that the local electronic device (first electronic device) receives the first ultrasonic information transmitted by the opposite electronic device (second electronic device).
It should be noted that, after the session is ended between the first electronic device and the second electronic device, the pairing relationship between the first electronic device and the second electronic device may be released, and therefore, as an optional implementation manner, the embodiment of the present application may further include:
s31, under the condition that the first event is triggered, stopping sending the second ultrasonic information, and deleting the locally recorded first ultrasonic information;
wherein the first event comprises one of:
sending a pairing release request to the second electronic equipment;
and receiving a pairing release request sent by the second electronic equipment.
That is, when either one of the first electronic device and the second electronic device transmits a pairing release request, the first electronic device releases the pairing with respect to the first electronic device, that is, stops transmitting the second ultrasonic information, and deletes the previously recorded first ultrasonic information transmitted by the second electronic device. For the second electronic device, the second electronic device also releases the pairing, namely stops transmitting the first ultrasonic information and deletes the second ultrasonic information transmitted by the first electronic device recorded before. Therefore, energy consumption caused by that the electronic equipment always sends ultrasonic information can be avoided, and the problem of saving energy consumption is achieved.
Fig. 2 is a schematic flow chart of an information decryption method according to an embodiment of the present application. The information decryption method is executed by a second electronic device, where the second electronic device is a peer electronic device described in the method shown in fig. 1, that is, a second electronic device communicating with a first electronic device, where the method may include:
step 201, receiving an encrypted text sent by first electronic equipment; the encrypted text is obtained by encrypting the first text by the first electronic device by using the ultrasonic amplitude value and the ultrasonic frequency value of the first ultrasonic information, and the first ultrasonic information is the ultrasonic information sent by the second electronic device successfully paired with the first electronic device.
And 202, performing reverse shift decryption on the encrypted text by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain first data.
The second electronic device locally stores the first ultrasonic information.
Step 203, converting the first data into a first text.
According to the information decryption method, the encrypted text sent by the first electronic equipment is received; the encrypted text is obtained by encrypting the first text by the first electronic device by using the ultrasonic amplitude value and the ultrasonic frequency value of the first ultrasonic information, and the first ultrasonic information is ultrasonic information sent by the second electronic device in the process of pairing with the first electronic device; then, carrying out reverse displacement decryption on the encrypted text by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain first data; and finally, converting the first data into a first text, so that the received encrypted text can avoid the privacy information in the text from being stolen, and then decrypting the encrypted text by using the ultrasonic information to obtain the first text, thereby achieving the purpose of decryption.
In an optional implementation manner, the step 202 may specifically include:
step 2021, perform binary conversion on the encrypted text to obtain second data.
Step 2022, the second data is segmented to obtain a third segmented data and a fourth segmented data.
Here, the second data is subjected to the segmentation processing in the same manner as the first data is subjected to the segmentation processing in the method shown in fig. 1 described above.
Step 2023, performing a reverse first displacement operation on the third segment data by using the ultrasonic amplitude value to obtain first segment data.
Optionally, the reverse first shift operation is a right shift or left shift operation. Specifically, the first shift operation in step 1032 is reversed. If the first displacement operation is a left displacement operation, reversing the first displacement operation to be a right displacement operation; if the first shift operation is a right shift operation, the reverse first shift operation is a left shift operation.
Step 2024, performing a reverse second displacement operation on the third segmented data by using the ultrasonic frequency value to obtain second segmented data.
Optionally, the reverse second shift operation is a right shift or left shift operation. Specifically, the second shift operation in step 1033 is reversed. If the second displacement operation is a left displacement operation, the reverse second displacement operation is a right displacement operation; if the second displacement operation is a right displacement operation, the reverse second displacement operation is a left displacement operation.
Step 2025, obtain the first data according to the first segment data and the second segment data.
In an optional implementation manner, step 2025 may specifically include:
a) And polymerizing the first section data and the second section data to obtain first data.
Here, aggregating the first segment data and the second segment data may also be understood as stitching the first segment data and the second segment data.
Through the decryption processing, the purpose of decrypting the encrypted text sent by the first electronic equipment which is communicated with the second electronic equipment can be achieved.
Specifically, the first electronic device and the second electronic device are successfully paired through ultrasonic waves. Here, the first electronic device and the second electronic device successfully pair with each other by the ultrasonic wave means that both the first electronic device and the second electronic device record ultrasonic information of the other party, respectively, and confirm that each other has received the ultrasonic information of the other party.
As an optional implementation manner, the method in the embodiment of the present application may further include:
i, receiving second ultrasonic information of the first electronic equipment;
here, the second electronic device can verify whether the object communicated with the second electronic device is the first electronic device by using the second ultrasonic information, so that the subsequent second electronic device can be prevented from decrypting irrelevant encrypted text, and unnecessary power consumption can be further avoided.
ii, if the second ultrasonic information is successfully detected, step 202 is executed, that is, the encrypted text is reversely shifted and decrypted by using the ultrasonic amplitude value and the ultrasonic frequency value, so as to obtain the first data.
The successful detection of the second ultrasonic information means that the second ultrasonic information is successfully matched with the previously recorded ultrasonic information transmitted by the first electronic device.
Since the first electronic device side encrypts the first text by using the first ultrasonic information (i.e., the ultrasonic information sent by the second electronic device), the first text can be obtained by decrypting the encrypted text by using the first ultrasonic information.
The information decryption method in the embodiment of the application can also be used for receiving the encrypted text and the second ultrasonic information which are respectively sent by the first electronic equipment under the condition that the first electronic equipment and the second electronic equipment are successfully paired through ultrasonic waves, so that the received encrypted text can prevent privacy information in the text from being stolen and peeped and leaked, and the purpose of protecting the privacy of a user is achieved; and finally, under the condition that the second ultrasonic information is successfully detected, the encrypted text is decrypted according to the first ultrasonic information to obtain the first text, so that the purpose of decrypting the encrypted text sent by the first electronic equipment communicating with the second electronic equipment is achieved.
As an optional implementation manner, the method in the embodiment of the present application may further include:
and S41, receiving the second ultrasonic information sent by the first electronic equipment, and recording the second ultrasonic information.
After the second electronic device receives the second ultrasonic information sent by the first electronic device, it can be determined that the first electronic device wants to establish an ultrasonic pairing relationship with the second electronic device, and then the second ultrasonic information is recorded, so that after the subsequent pairing is successful, the second electronic device can verify whether the communication object is the first electronic device based on the second ultrasonic information.
And S42, sending the first ultrasonic information and the equipment identification information of the second electronic equipment to the first electronic equipment.
In order to establish the ultrasonic pairing relationship between the first electronic device and the second electronic device, both devices need to transmit their respective ultrasonic information to each other, so the second electronic device executes step S42.
Here, the second electronic device sends the device identification information of the second electronic device (i.e. itself), and the purpose is to enable the first electronic device to distinguish that the sending object of the ultrasonic information is the second electronic device, thereby improving the device pairing efficiency and success rate.
S43, second confirmation information is sent to the first electronic device, and when first confirmation information sent by the first electronic device is received, the first electronic device and the second electronic device are successfully paired, wherein the first confirmation information is used for indicating that the first electronic device has received the first ultrasonic information, and the second confirmation information is used for indicating that the second electronic device has received the second ultrasonic information.
Here, the second electronic device transmits second confirmation information to the first electronic device, the purpose of which is to notify the first electronic device that the second electronic device with which it communicates has received the second ultrasonic information; in addition, the second electronic device receives the first confirmation information sent by the first electronic device, and the purpose of the second confirmation information is to know that the first electronic device communicated with the second electronic device has received the first ultrasonic information. In this way, when both the first electronic device and the second electronic device respectively record the ultrasonic information of the other party and confirm that the ultrasonic information of the other party has been received, it is determined that the first electronic device and the second electronic device are successfully paired by the ultrasonic wave.
As an optional implementation manner, the method in the embodiment of the present application may further include:
and S51, matching the locally recorded ultrasonic information sent by the first electronic equipment with the second ultrasonic information to obtain a matching result.
When the first electronic device and the second electronic device are successfully paired by using the ultrasonic wave, the second electronic device locally records the ultrasonic wave information transmitted by the first electronic device.
When the first electronic device sends the encrypted text, the second electronic device also sends second ultrasonic information of the first electronic device to the second electronic device, in order to avoid the second electronic device from decrypting irrelevant encrypted text and further avoid unnecessary power consumption, the second electronic device can match locally recorded ultrasonic information sent by the first electronic device with the second ultrasonic information, and further verify whether an object communicated with the second electronic device is the first electronic device, if the matching result shows that the matching is successful, the verification is passed, and then the subsequent decryption step can be executed; otherwise, no processing is performed.
And S52, if the matching result shows that the matching is successful, determining that the second ultrasonic information is successfully detected.
A procedure of pairing a first electronic device and a second electronic device by ultrasonic waves is explained by the following example one.
Example one
In this example one, the first electronic device is device a, and the second electronic device is device B. The specific pairing process is as follows:
s301, the device a transmits the ultrasonic information 1 to the device B to request pairing.
Here, when the device a transmits the ultrasonic information 1 to the device B to request pairing, a schematic diagram showing that the two devices are pairing is displayed on the screen of the device a, as shown on the left side of fig. 3.
S302, after the device B receives the ultrasonic information 1, recording the ultrasonic information 1; after that, the apparatus B transmits the ultrasonic information 2 and the apparatus identification of the apparatus B to the apparatus a.
After the device B receives the ultrasonic information 1, a schematic diagram showing that the two devices are paired is also displayed on the screen of the device B, as shown in the right side of fig. 3.
And S303, after the device A receives the device identification of the device B and the ultrasonic information 2, verifying that the object communicated with the device A is the device B based on the device identification of the device B, and recording the ultrasonic information 2.
S304, after the equipment A and the equipment B both receive the confirmation information sent to the equipment by the other party, the equipment A and the equipment B are confirmed to be successfully paired through ultrasonic waves, and if not, the ultrasonic information is continuously sent until the two parties are successfully paired.
Here, the ultrasonic information may include an ultrasonic amplitude value, a frequency value, a peak value, and the like.
It should be noted that, after both the device a and the device B receive the confirmation information sent to them by the other party, both the screens of the device a and the device B display the first prompt information that the pairing is successful for the user, and in addition, display the second prompt information that the second prompt information is used to indicate that the user can send information to the pairing party.
The information interaction process between the first electronic device and the second electronic device after the pairing by the ultrasonic wave is successful is explained by the following example two.
Example two
In this example two, the first electronic device is device a and the second electronic device is device B. And device a acts as the sender of the information and device B acts as the receiver of the information. Referring to fig. 4, the specific interaction process is as follows:
s401, the device A obtains a text m through editing by an input method.
S402, the device A encrypts the text m by using the ultrasonic information 2 to obtain an encrypted text m'.
Specifically, the apparatus a can encrypt the text m by shifting it left or right using the ultrasonic amplitude value and frequency value in the ultrasonic information 2.
The encryption algorithm can be designed as follows:
carrying out front and back halving segmentation on binary ASCII codes of each bit letter or number, carrying out left shift on the front-stage binary ASCII, carrying out right shift on the rear-stage binary ASCII codes by ultrasonic frequency values, and then converting the binary ASCII codes subjected to the displacement operation into 16 systems to be used as encrypted ciphertext texts so as to achieve the purpose of encryption.
S403, the device a transmits the encrypted text m' to the device B, and transmits the ultrasonic information 1.
S404, the device B receives the encrypted text m 'and the ultrasonic information 1, and displays the encrypted text m' on the screen of the device B.
S405, the device B matches the ultrasonic information 1 sent by the device A and recorded locally before with the currently received ultrasonic information 1, and a matching result is obtained.
And S406, if the matching result shows that the matching is successful, the device B decrypts the encrypted text m' by using the ultrasonic information 2 to obtain the text m and displays the text m on the screen of the device B.
Here, the text m may be displayed on the screen of the device B in the form of a separate box.
S407, if the matching result indicates that the matching fails, displaying a third prompt message for prompting that the matching fails on the screen of the device B, and continuing to display the encrypted text m'.
For example, referring to fig. 5, after the device a and the device B perform ultrasonic pairing, the device a sends a message "what you are doing today" to the device B, at this time, after the click sending, the device a encrypts the "what you are doing today" according to the ultrasonic information sent by the currently paired device B to obtain a ciphertext "897873TF8A", and meanwhile, the device a sends its own ultrasonic information; when the device B receives the ciphertext 897873TF8A sent by the device a, the ultrasonic information sent by the device a is verified at the same time, after the currently received ultrasonic information sent by the device a is confirmed to be matched with the previously paired ultrasonic information through verification, the ciphertext is decoded by using the paired ultrasonic information, and a decoding result is displayed to the user.
After the session between the first electronic device and the second electronic device is ended, the pairing relationship between the first electronic device and the second electronic device may be released, and therefore, as an optional implementation manner, the method in the embodiment of the present application further includes:
s71, under the condition of triggering a second event, stopping sending the first ultrasonic information and deleting locally recorded second ultrasonic information;
wherein the second event comprises one of:
receiving a pairing release request sent by first electronic equipment;
a pairing release request is sent to the first electronic device.
That is, when either one of the first electronic device and the second electronic device transmits a pairing release request, the first electronic device releases the pairing with respect to the first electronic device, that is, stops transmitting the second ultrasonic information, and deletes the previously recorded first ultrasonic information transmitted by the second electronic device. For the second electronic device, the second electronic device also releases the pairing, i.e., stops transmitting the first ultrasonic information, and deletes the previously recorded second ultrasonic information transmitted by the first electronic device. Therefore, energy consumption caused by the fact that the electronic equipment sends the ultrasonic information all the time can be avoided, and the problem of saving energy consumption is achieved.
According to the information encryption method provided by the embodiment of the application, the execution main body can be an information encryption transmission device. In the embodiment of the present application, an information encryption device executes an information encryption method as an example, and the information encryption device provided in the embodiment of the present application is described.
As shown in fig. 6, an embodiment of the present application further provides an information encryption apparatus, where the apparatus 600 may include:
an obtaining module 610, configured to obtain first ultrasonic information and a first text, where the first ultrasonic information includes an ultrasonic amplitude value and an ultrasonic frequency value;
the data processing module 620 is configured to perform data processing on the first text to obtain first data;
the encryption module 630 is configured to perform shift encryption on the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
Optionally, the data processing module 620 includes:
and the first data processing unit is used for carrying out binary conversion on the first text to obtain first data.
Optionally, the encryption module 630 includes:
the second data processing unit is used for carrying out segmentation processing on the first data to obtain first segmented data and second segmented data;
the first encryption unit is used for carrying out first displacement operation on the first segmented data by utilizing the amplitude value of the ultrasonic wave to obtain third segmented data;
the second encryption unit is used for carrying out second displacement operation on the second segmented data by utilizing the ultrasonic frequency value to obtain fourth segmented data;
and a third encryption unit for obtaining an encrypted text from the third segment data and the fourth segment data.
Optionally, the third encryption unit is specifically configured to:
aggregating the third subsection data and the fourth subsection data to obtain second data;
and carrying out hexadecimal conversion on the second data to obtain an encrypted text.
Optionally, the first ultrasonic information is ultrasonic information sent by an opposite-end electronic device successfully paired with the home-end electronic device.
Optionally, the information encryption apparatus 600 according to this embodiment further includes:
and the sending module is used for sending the encrypted text to the opposite-end electronic equipment.
Optionally, the information encryption apparatus 600 according to this embodiment further includes:
the receiving module is used for receiving target ultrasonic information and equipment identification information sent by target electronic equipment;
and the recording module is used for recording the target ultrasonic information as the first ultrasonic information under the condition that the target electronic equipment is verified to be opposite-end electronic equipment according to the equipment identification information.
According to the information encryption device, the first ultrasonic information and the first text are obtained, and the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value; then, carrying out data processing on the first text to obtain first data; and finally, the first data is subjected to displacement encryption by utilizing the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text, so that the text is encrypted based on the ultrasonic information, the security of text encryption can be improved, and the problem of risk of intercepting or stealing the text when a user transmits the text by using the electronic equipment is effectively solved.
The information encryption device in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Network Attached Storage, NAS), a personal computer (NAS), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The information encryption device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an IOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The information encryption device provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 1, and is not described here again to avoid repetition.
As shown in fig. 7, an electronic device 700 is further provided in this embodiment of the present application, and includes a processor 701 and a memory 702, where the memory 702 stores a program or an instruction that can be executed on the processor 701, and when the program or the instruction is executed by the processor 701, the steps of the above embodiment of the information encryption method are implemented, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 8 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, and a processor 810.
Those skilled in the art will appreciate that the electronic device 800 may further comprise a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 810 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system. The electronic device structure shown in fig. 8 does not constitute a limitation to the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The processor 810 is configured to obtain first ultrasonic information and a first text, where the first ultrasonic information includes an ultrasonic amplitude value and an ultrasonic frequency value; processing the first text to obtain first data; and shifting and encrypting the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
The text is encrypted based on the ultrasonic information, so that the security of text encryption can be improved, and the problem of risk of intercepting or stealing the text when a user transmits the text by using the electronic equipment is effectively solved.
Optionally, the processor 810 is further configured to:
and carrying out binary conversion on the first text to obtain the first data.
Optionally, the processor 810 is further configured to:
carrying out segmentation processing on the first data to obtain first segmented data and second segmented data;
performing first displacement operation on the first segment data by using the ultrasonic amplitude value to obtain third segment data;
performing second displacement operation on the second segmented data by using the ultrasonic frequency value to obtain fourth segmented data;
and obtaining the encrypted text according to the third subsection data and the fourth subsection data.
Optionally, the processor 810 is further configured to:
aggregating the third subsection data and the fourth subsection data to obtain second data;
and carrying out hexadecimal conversion on the second data to obtain the encrypted text.
Optionally, the first ultrasonic information is ultrasonic information sent by an opposite-end electronic device successfully paired with the home-end electronic device.
Optionally, the radio frequency unit 801 is configured to:
and sending the encrypted text to the opposite-end electronic equipment.
Optionally, the radio frequency unit 801 is further configured to:
receiving target ultrasonic information and equipment identification information sent by target electronic equipment;
processor 810 is further configured to:
and if the target electronic equipment is verified to be the opposite-end electronic equipment according to the equipment identification information, recording the target ultrasonic information as the first ultrasonic information.
It should be understood that, in the embodiment of the present application, the input Unit 804 may include a Graphics Processing Unit (GPU) 8041 and a microphone 8042, and the Graphics Processing Unit 8041 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 807 includes at least one of a touch panel 8071 and other input devices 8072. A touch panel 8071, also referred to as a touch screen. The touch panel 8071 may include two portions of a touch detection device and a touch controller. Other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 809 may be used to store software programs as well as various data. The memory 809 may mainly include a first storage area storing programs or instructions and a second storage area storing data, wherein the first storage area may store an operating system, application programs or instructions required for at least one function (such as a sound playing function, an image playing function, and the like), and the like. Further, the memory 809 can include volatile memory or nonvolatile memory, or the memory 809 can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct Memory bus RAM (DRRAM). The memory 809 in the present embodiment of the application includes, but is not limited to, these and any other suitable types of memory.
Processor 810 may include one or more processing units; optionally, the processor 810 integrates an application processor, which primarily handles operations related to the operating system, user interface, and applications, and a modem processor, which primarily handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 810.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information encryption method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above information encryption method embodiment, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the above-mentioned information encryption method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (16)

1. An information encryption method, comprising:
acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value;
performing data processing on the first text to obtain first data;
and shifting and encrypting the first data by using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
2. The method of claim 1, wherein the data processing the first text to obtain first data comprises:
and carrying out binary conversion on the first text to obtain the first data.
3. The method according to claim 1, wherein said shift encrypting the first data using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text comprises:
carrying out segmentation processing on the first data to obtain first segmented data and second segmented data;
performing first displacement operation on the first segmented data by using the ultrasonic amplitude value to obtain third segmented data;
performing second displacement operation on the second segmented data by using the ultrasonic frequency value to obtain fourth segmented data;
and obtaining the encrypted text according to the third subsection data and the fourth subsection data.
4. The method of claim 3, wherein the obtaining the encrypted text from the third segment of data and the fourth segment of data comprises:
aggregating the third subsection data and the fourth subsection data to obtain second data;
and carrying out hexadecimal conversion on the second data to obtain the encrypted text.
5. The method according to claim 1, wherein the first ultrasonic information is ultrasonic information sent by an opposite-end electronic device successfully paired with a home-end electronic device.
6. The method according to claim 5, wherein after shift encrypting the first data using the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text, the method further comprises:
and sending the encrypted text to the opposite-end electronic equipment.
7. The method of claim 5, further comprising:
receiving target ultrasonic information and equipment identification information sent by target electronic equipment;
and if the target electronic equipment is verified to be the opposite-end electronic equipment according to the equipment identification information, recording the target ultrasonic information as the first ultrasonic information.
8. An information encryption apparatus, comprising:
the acquisition module is used for acquiring first ultrasonic information and a first text, wherein the first ultrasonic information comprises an ultrasonic amplitude value and an ultrasonic frequency value;
the data processing module is used for carrying out data processing on the first text to obtain first data;
and the encryption module is used for carrying out displacement encryption on the first data by utilizing the ultrasonic amplitude value and the ultrasonic frequency value to obtain an encrypted text.
9. The apparatus of claim 8, wherein the data processing module comprises:
and the first data processing unit is used for carrying out binary conversion on the first text to obtain the first data.
10. The apparatus of claim 8, wherein the encryption module comprises:
the second data processing unit is used for carrying out segmentation processing on the first data to obtain first segmented data and second segmented data;
the first encryption unit is used for carrying out first displacement operation on the first segmented data by utilizing the ultrasonic amplitude value to obtain third segmented data;
the second encryption unit is used for carrying out second displacement operation on the second segmented data by utilizing the ultrasonic frequency value to obtain fourth segmented data;
a third encrypting unit, configured to obtain the encrypted text according to the third segment data and the fourth segment data.
11. The apparatus according to claim 10, wherein the third encryption unit is specifically configured to:
aggregating the third subsection data and the fourth subsection data to obtain second data;
and carrying out hexadecimal conversion on the second data to obtain the encrypted text.
12. The apparatus according to claim 8, wherein the first ultrasonic information is ultrasonic information transmitted by an opposite-end electronic device that is successfully paired with the home-end electronic device.
13. The apparatus of claim 12, further comprising:
and the sending module is used for sending the encrypted text to the opposite-end electronic equipment.
14. The apparatus of claim 12, further comprising:
the receiving module is used for receiving target ultrasonic information and equipment identification information sent by target electronic equipment;
and the recording module is used for recording the target ultrasonic information as the first ultrasonic information under the condition that the target electronic equipment is verified to be the opposite-end electronic equipment according to the equipment identification information.
15. An electronic device, being a first electronic device, comprising a processor and a memory, the memory storing a program or instructions executable on the processor, the program or instructions, when executed by the processor, implementing the steps of the information encryption method according to any one of claims 1 to 7.
16. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by a processor, implement the steps of the information encryption method according to any one of claims 1 to 7.
CN202210890457.9A 2022-07-27 2022-07-27 Information encryption method and device and electronic equipment Active CN115277192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210890457.9A CN115277192B (en) 2022-07-27 2022-07-27 Information encryption method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210890457.9A CN115277192B (en) 2022-07-27 2022-07-27 Information encryption method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN115277192A true CN115277192A (en) 2022-11-01
CN115277192B CN115277192B (en) 2024-01-30

Family

ID=83769460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210890457.9A Active CN115277192B (en) 2022-07-27 2022-07-27 Information encryption method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115277192B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1275846A (en) * 1999-05-26 2000-12-06 松下电器产业株式会社 Device and method for data encipher
JP2008309493A (en) * 2007-06-12 2008-12-25 Toshiba Corp Apparatus and method for calibrating ultrasonic vibration displacement gauge
CN106160878A (en) * 2015-04-01 2016-11-23 飞云卓越数据应用科技(平潭)有限公司 Active the ultrasonic infrasonic wave that involves is utilized to send and add the electronic installation of confidential information
CN107147449A (en) * 2017-07-17 2017-09-08 电子科技大学 A kind of ultrasonic communication method of secret protection
CN108327296A (en) * 2018-01-31 2018-07-27 大连交通大学 A kind of the ultrasonic precision sealing-in device and method of feature based wavelet
CN110071909A (en) * 2019-03-15 2019-07-30 平安科技(深圳)有限公司 Long data ciphering method, device, computer equipment and storage medium based on RSA
WO2019241691A1 (en) * 2018-06-14 2019-12-19 Paypal, Inc. Two-factor authentication through ultrasonic audio transmissions
CN113194083A (en) * 2021-04-26 2021-07-30 鸣飞伟业技术有限公司 Method for transmitting throwing after video segmentation encryption
CN113746622A (en) * 2021-09-06 2021-12-03 哈尔滨工业大学(威海) Lightweight grouped text encryption method based on double two-dimensional chaotic system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1275846A (en) * 1999-05-26 2000-12-06 松下电器产业株式会社 Device and method for data encipher
JP2008309493A (en) * 2007-06-12 2008-12-25 Toshiba Corp Apparatus and method for calibrating ultrasonic vibration displacement gauge
CN106160878A (en) * 2015-04-01 2016-11-23 飞云卓越数据应用科技(平潭)有限公司 Active the ultrasonic infrasonic wave that involves is utilized to send and add the electronic installation of confidential information
CN107147449A (en) * 2017-07-17 2017-09-08 电子科技大学 A kind of ultrasonic communication method of secret protection
CN108327296A (en) * 2018-01-31 2018-07-27 大连交通大学 A kind of the ultrasonic precision sealing-in device and method of feature based wavelet
WO2019241691A1 (en) * 2018-06-14 2019-12-19 Paypal, Inc. Two-factor authentication through ultrasonic audio transmissions
CN110071909A (en) * 2019-03-15 2019-07-30 平安科技(深圳)有限公司 Long data ciphering method, device, computer equipment and storage medium based on RSA
CN113194083A (en) * 2021-04-26 2021-07-30 鸣飞伟业技术有限公司 Method for transmitting throwing after video segmentation encryption
CN113746622A (en) * 2021-09-06 2021-12-03 哈尔滨工业大学(威海) Lightweight grouped text encryption method based on double two-dimensional chaotic system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SAHAR HADDAD;等: "Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 》 *
魏腾雄;孙桂杰;苏武浔;: "一种新型的文本信息加密与识别系统――陈-Mobius变换的一种新应用", 福州大学学报(自然科学版), no. 03 *

Also Published As

Publication number Publication date
CN115277192B (en) 2024-01-30

Similar Documents

Publication Publication Date Title
WO2020237868A1 (en) Data transmission method, electronic device, server and storage medium
US11706033B2 (en) Secure distributed information system
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
US7366916B2 (en) Method and apparatus for an encrypting keyboard
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
US8577022B2 (en) Data processing apparatus
CN106464488A (en) Information transmission method and mobile device
CN109951295B (en) Key processing and using method, device, equipment and medium
US20100313028A1 (en) Electronic Signature Method and Electronic Signature Tool
CN103905188B (en) Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US20100061550A1 (en) Data processing apparatus
CN109274644A (en) A kind of data processing method, terminal and watermark server
US20150071442A1 (en) Data-encrypting method and decrypting method for a mobile phone
CN101325774A (en) Encryption/decryption method and mobile terminal thereof
CN106685897B (en) Safe input method, device and system
CN105577361A (en) Information processing method and device thereof
CN104346586A (en) Self-destructive data protection storage device and self-destructive data protection method
CN105022965A (en) Data encryption method and apparatus
WO2006073201A1 (en) Communication system and communication method
KR101267875B1 (en) Apparatus for message encryption and decryption using virtual keyboard and recording medium storing program for executing method of the same in computer
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
CN115277192B (en) Information encryption method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant