CN116009854A - Data encryption and decryption processing method and encryption and decryption tool - Google Patents

Data encryption and decryption processing method and encryption and decryption tool Download PDF

Info

Publication number
CN116009854A
CN116009854A CN202310130541.5A CN202310130541A CN116009854A CN 116009854 A CN116009854 A CN 116009854A CN 202310130541 A CN202310130541 A CN 202310130541A CN 116009854 A CN116009854 A CN 116009854A
Authority
CN
China
Prior art keywords
encryption
decryption
data
processed
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310130541.5A
Other languages
Chinese (zh)
Inventor
陈国杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Boc Financial Technology Co ltd
Original Assignee
Boc Financial Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Boc Financial Technology Co ltd filed Critical Boc Financial Technology Co ltd
Priority to CN202310130541.5A priority Critical patent/CN116009854A/en
Publication of CN116009854A publication Critical patent/CN116009854A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a processing method for encrypting and decrypting data and an encrypting and decrypting tool, and relates to the technical field of data security, wherein the method comprises the following steps: at least one group of service parameters are configured for the encryption and decryption tool through the service parameter source, wherein the service parameters comprise: the method comprises the steps of reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption; acquiring data to be processed according to the name of the data to be processed and the type of the read data; carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result; therefore, the encryption and decryption efficiency between processing systems is improved, and the development cost is reduced.

Description

Data encryption and decryption processing method and encryption and decryption tool
Technical Field
The application relates to the technical field of data security, in particular to a data encryption and decryption processing method and an encryption and decryption tool.
Background
At present, in program development of many IT companies, as business scenes are more and more complex, interaction modes related between systems are more and more, wherein batch text interaction, online interface message interaction and the like exist; in addition, since the encryption and decryption manners in text or messages in the interaction process between different systems are consistent, and thus there is a higher risk of data security, the encryption or decryption of data between the system interactions is also more important.
At present, encryption and decryption of data between general processing systems are carried out between upstream and downstream, and batch text or online interface word data encryption and decryption are carried out, so that when encryption and decryption modes between two systems are inconsistent, a set of encryption or decryption tools are required to be developed respectively, and because of the conditions of more character coding types and difficult multiplexing, the multiplexing rate of a developed data encryption and decryption scheme is lower, and higher development cost is required.
Disclosure of Invention
Accordingly, the main objective of the present application is to provide a data encryption and decryption processing method and encryption and decryption tool, which implement flexible configuration of data encryption and decryption to reduce development cost.
The first aspect of the present application provides a data encryption and decryption processing method, where the method is executed by an encryption and decryption tool, and the method includes:
acquiring a service parameter source;
at least one group of service parameters are configured for the encryption and decryption tool through the service parameter source, wherein the service parameters comprise: the method comprises the steps of reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption;
obtaining data to be processed according to the encrypted and decrypted data name and the read data type;
and carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result.
In some implementations of the first aspect of the present application, the reading the data type includes an online message type, and the obtaining the data to be processed according to the name of the data to be processed and the reading the data type includes:
and acquiring a message corresponding to the name of the data to be processed through the online interface, and acquiring the data to be processed from the message.
In some implementations of the first aspect of the present application, the processing result includes a processing result packet, and the method further includes:
and returning a processing result message through the online interface.
In some implementations of the first aspect of the present application, the reading the data type includes a batch text type, and the obtaining the data to be processed according to the name of the data to be processed and the reading the data type includes:
and acquiring a batch text corresponding to the name of the data to be processed, and acquiring the data to be processed from the batch text.
In some implementations of the first aspect of the present application, the processing results include processing result text, the method including:
and returning the processing result text through a file transfer protocol.
In some implementations of the first aspect of the present application, performing encryption processing or decryption processing on data to be processed according to an encryption and decryption type, an encryption and decryption target, and an encryption and decryption range includes:
and when the encryption and decryption range is empty, carrying out full-range encryption or decryption on the data to be processed according to the encryption and decryption type and the encryption and decryption target.
In some implementations of the first aspect of the present application, the service parameter further includes a parameter sequence number, and the method further includes:
performing parameter verification on service parameters, wherein the parameter verification comprises the following steps: verifying whether the parameter sequence numbers are integers or not, and verifying whether the parameter sequence numbers of each group of service parameters are repeated or not when the service parameters are more than one group.
In some implementations of the first aspect of the present application, the service parameter source includes a configuration file or a database code table.
The second aspect of the present application provides an encryption and decryption tool, which includes:
the parameter configuration unit is configured to configure at least one group of service parameters for the encryption and decryption tool through the service parameter source, where the service parameters include: the method comprises the steps of reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption;
the data acquisition unit acquires the data to be processed according to the name of the data to be processed and the type of the read data;
and the encryption and decryption unit is used for carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result.
A third aspect of the present application provides a computer device, characterised in that the device comprises a memory and a processor for executing a program stored in the memory, running the method of any one of the preceding first aspects.
Compared with the prior art, the technical scheme provided by the application has the following beneficial effects:
the method comprises the steps of configuring at least one group of service parameters for an encryption and decryption tool, wherein the service parameters comprise a read data type, an encryption and decryption target, an encryption and decryption data name and an encryption and decryption range, acquiring data to be processed according to service configuration, encrypting or decrypting the data to be processed, and finally generating a processing result; compared with the scheme in the prior art that a set of independent encryption and decryption tools are required to be developed, the encryption and decryption processing can be performed by only configuring service parameters for the encryption and decryption tools without developing the systems, so that the encryption and decryption efficiency between processing systems is improved, and the development cost is reduced.
Drawings
Fig. 1 is a flow chart of a processing method for encrypting and decrypting data provided in an embodiment of the present application;
fig. 2 is a flow chart of another processing method for encrypting and decrypting data according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating another data encryption and decryption processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an encryption and decryption tool according to an embodiment of the present application;
fig. 5 is a schematic diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Noun interpretation:
encryption refers to changing original information data by a special algorithm, so that even if an unauthorized user obtains encrypted information, the content of the information cannot be known due to an unknown decryption method. Encryption may be used to ensure security, but other techniques are still necessary to ensure communication security, particularly with respect to data integrity and information verification;
decryption refers to the process of changing "ciphertext" to "plaintext". For the purpose of information confidentiality, in information transmission or storage, information to be confidential is processed by adopting a cryptographic technology, so that the processed information cannot be read or interpreted by an unauthorized person (including an illegal person), and the process is called encryption. In the encryption process, information to be kept secret is called "plaintext", and information after encryption is called "ciphertext". Encryption is the process of changing a plaintext into a ciphertext; similarly, the process of changing "ciphertext" to "plaintext" is referred to as decryption;
currently, the encryption or decryption methods generally include: AES, RSA, BASE64, DES, 3DES, etc.
AES is an advanced encryption standard, english is Advanced Encrypt i on Standard in whole course, and is a block encryption standard. The technique is a symmetric block encryption technique that uses 128 bits of block encrypted data.
RSA generally generates a pair of RSA keys, one of which is a secret key and the other of which is a public key. When information is transmitted, a mode of combining a traditional encryption method with a public key encryption method is often adopted, and an RSA key is used for encrypting a session key and an information abstract.
Base64 is a 64-character based coding algorithm, defined according to RFC 2045: "Base64 content delivery encoding is a descriptive form in any combination of 8-bit byte sequences that is not easily recognized directly by humans.
DES, collectively known as Data Encrypt i on Standard, the data encryption standard, is a block algorithm that uses a key to encrypt.
The 3DES, also known as Tr ip l e DES, is a generic term for triple data encryption algorithm (Tr i p l e Data Encrypt i on Al gor ithm, TDEA) block ciphers. It is equivalent to applying the DES encryption algorithm three times per data block.
MD5, collectively referred to as MD5 Message-D i gest A l gor ithm, is a widely used cryptographic hash function that can generate a 128-bit hash value to ensure complete consistency of information transmissions.
In the prior art, when encryption and decryption modes between two systems are inconsistent, a set of encryption or decryption tools are required to be developed, and the developed data encryption and decryption scheme has low multiplexing rate due to the fact that the character coding types are more and are difficult to multiplex, so that the problem of high development cost exists.
Referring to fig. 1, the embodiment of the present application provides a data encryption and decryption processing method, which is executed by an encryption and decryption tool and includes the following steps:
s101, configuring at least one group of service parameters for the encryption and decryption tool through the service parameter source.
Wherein the service parameters include: the method comprises the steps of reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption.
The service parameter source refers to a file for configuring different service parameters for the encryption and decryption tool, and in an embodiment of the present application, the service parameter source may include a configuration file and a database code table, where the configuration file refers to an extensible markup language (EXtens i b l e Markup Language, XML) file recorded with the service parameters, and the database code table refers to a code table stored in a database and recorded with the service parameters.
In this embodiment of the present application, the read data type refers to a read mode of data to be processed, the encryption and decryption type refers to a processing requirement of the data to be processed, the encryption and decryption type includes encryption or decryption, the encryption and decryption target refers to a target algorithm adopted for encrypting and decrypting the data to be processed, as an optional implementation manner, the encryption and decryption target may include AES, RSA, BASE, DES and 3DES, the encryption and decryption data name refers to a file name of a file in which the data to be processed is recorded, and the encryption and decryption range refers to a character encoding range in which the data to be processed needs to be processed.
In some implementations of the present application, when the service parameters are multiple groups, in order to better distinguish between the service parameters of each group and perform processing according to the order of execution of the service parameters of each group, the service parameters may further include a parameter sequence number.
For example, when the parameter configuration source XML file carrying the service parameters may be:
<?xm l vers i on="1.0"encod i ng="UTF-8"?>
<conf i g>
<f i l e i d="1"dataType="0"encDecType="0"encDecTarget="AES"
encDecDataName="srcData"encDecRange="50-80"/>
<f i l e i d="2"dataType="0"encDecType="1"encDecTarget="BASE64"encDecDataName="srcData"encDecRange="70-100"/>
<f i l e i d="3"dataType="1"encDecType="0"encDecTarget="DES"
encDecDataName="01001.txt"encDecRange="30-70"/>
<f i l e i d="4"dataType="1"encDecType="1"encDecTarget="3DES"
encDecDataName="01002.txt"encDecRange="0-110"/>
<f i l e i d="5"dataType="0"encDecType="0"encDecTarget="AES"
encDecDataName="srcData"encDecRange="0-0"/>
</conf i g>
wherein i d represents a parameter number, dataType represents a read data type, datatype=0 represents an online message type, and datatype=1 represents a batch text type; encDecType represents encryption and decryption type, encdectype=0 represents encryption, encdectype=1 represents decryption; encDecTarget represents an encryption and decryption target, encDecDataName represents a data name to be processed, and encDecRange represents an encryption and decryption range.
In some implementations of this embodiment of the present application, in order to avoid that a sequence number error causes a subsequent error to encrypt or decrypt the data to be processed, a step may be further added after this step:
and carrying out parameter verification on the service parameters.
Wherein, the parameter verification includes: verifying whether the parameter sequence numbers are integers or not, and verifying whether the parameter sequence numbers of each group of service parameters are repeated or not when the service parameters are more than one group.
In this embodiment of the present application, verifying whether the parameter number is an integer is to avoid that a program developed by using the method provided in the present application cannot correctly call each set of service parameters according to the sequence number, and remind an operator to perform parameter adjustment on the service parameter source, and verifying whether the parameter number is repeated is to avoid erroneously identifying each set of service parameters.
In some implementations of this embodiment of the present application, in order to avoid errors in the encryption and decryption type or the encryption and decryption target service parameter configured to the encryption and decryption tool, the validity of the encryption and decryption type and the encryption and decryption target may also be checked, for example, if the parameter values 0 and 1 are used to represent encryption and decryption, respectively, it is verified whether the field value of the encryption and decryption type is 0 or 1. For another example, it is verified whether the encryption/decryption target in each set of service parameters is one of AES, RSA, BASE, DES and 3 DES.
S102, acquiring the data to be processed according to the name of the data to be processed and the type of the read data.
The data to be processed refers to data composed of a string of a certain length, the name of the data to be processed is used as an identifier of a carrier of the data to be processed, the type of the read data is used as a way of obtaining the data to be processed, specifically, the type of the read data includes an online message type or a batch text type, in this embodiment of the present application, the online message may be understood as a string of regular strings, and the batch text may be understood as a set composed of a plurality of txt text files.
S103, carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result.
The processing result refers to processed data to be processed, and specifically, the process of processing the data to be processed may be that the character encoding range specified by the encryption and decryption range in the data to be processed adopts the encryption and decryption algorithm specified by the encryption and decryption target to perform encryption and decryption type specification. For example, encryption and decryption algorithm a is adopted to encrypt a name field of data to be processed, before encryption, the data to be processed is name=scbd, age=4, te l= 02137850457, and encryption is carried out on a name of the data to be processed, so as to obtain encrypted data of name=adbwewc@wrqequq, age=4, te l= 02137850457. In addition, the encryption and decryption range can be assigned with a plurality of sub-ranges, and the sub-ranges can be separated by other identifiers such as semicolons.
In some implementations of this embodiment of the present application, in order to avoid that an encryption and decryption range is empty, that is, when the encryption and decryption range is not specified, execution errors occur and encryption and decryption processing cannot be performed on data to be processed, when the encryption and decryption range is empty, full-range encryption processing or decryption processing is performed on the data to be processed according to an encryption and decryption type and an encryption and decryption target.
In the flow shown in fig. 1, firstly, service parameters are acquired by acquiring a service parameter source, and the service parameters record relevant configuration information for encryption and decryption processing, wherein the service parameters specifically comprise a read data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range; then, the acquired service parameters are configured into an encryption and decryption tool, so that flexible encryption and decryption configuration is realized; and then, the data to be processed is acquired by reading the data type and the data name to be processed, and finally, the acquired data to be processed is encrypted or decrypted according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and different encryption and decryption requirements can be flexibly processed through the configuration of the service parameters without developing encryption and decryption tools independently, so that the encryption and decryption efficiency among systems is improved, and the development cost is reduced.
Referring to fig. 2, fig. 2 is a schematic diagram of another processing method for encrypting and decrypting data provided in an embodiment of the present application, and based on the flow shown in fig. 1, the method provided in the embodiment of the present application supports encrypting and decrypting data in an online message, and specifically includes the following steps:
s201: at least one set of service parameters is configured for the encryption and decryption tool through the service parameter source.
The specific implementation of this step is the same as step S101, and this application will not be repeated in this respect.
S202: and obtaining a message corresponding to the file name to be processed through the online interface, and obtaining the data to be processed from the message.
It should be noted that, the online interface is used for receiving the message in this step, specifically, the corresponding message may be screened according to the to-be-processed data name in the message set obtained through the online interface, or the corresponding message may be obtained through the to-be-processed data name requesting the online interface, which does not affect the implementation of this embodiment of the present application.
S203: and carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result message.
The specific embodiment of this step is similar to step S103, except that the information carrier for which this step reveals the processing result is a message.
S204: and returning a processing result message through the online interface.
In this embodiment of the present application, the data to be processed is obtained through the online interface, and accordingly, the processing result message is returned through the online interface, so that the problem that the processing result cannot be read can be avoided.
In the flow shown in fig. 2, a message carrying data to be processed is obtained through an online interface according to the name of the data to be processed, after the data to be processed is encrypted or decrypted, a processing result message is generated, and the processing result message is returned through the online interface. The encryption and decryption of the data in the internet protocol messages are realized.
Referring to fig. 3, fig. 3 is a schematic diagram of another processing method for encrypting and decrypting data provided in an embodiment of the present application, and based on the flow shown in fig. 1, the method provided in the embodiment of the present application supports encrypting data in a batch text, and specifically includes the following steps:
s301: at least one set of service parameters is configured for the encryption and decryption tool through the service parameter source.
The specific implementation of this step is the same as step S101, and this application will not be repeated in this respect.
S302: and acquiring a batch text corresponding to the name of the data to be processed, and acquiring the data to be processed from the batch text.
In this step, the manner of reading the batch text may be that a line reads the data in the batch file, or other reading rules may be adopted, which does not affect the implementation of the embodiment of the present application.
S303: and carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result text.
The specific embodiment of this step is similar to step S103, except that the information carrier for which this step reveals the processing result is text.
S304: and returning the processing result text through a file transfer protocol.
In this step, the text is transmitted via a file transfer protocol (Fi l e Transfer Protoco l, FTP) with the text as the information carrier of the processing result.
In the flow shown in fig. 3, after the service parameters are configured, a batch file is obtained according to the names of the data to be processed, the data to be processed is obtained from the batch file, then the data to be processed is decrypted or encrypted, a processing result text is generated, and the processing result text is returned through a file transfer protocol, so that the encryption and decryption of the data in the batch text are realized.
Referring to fig. 4, fig. 4 is an encryption and decryption tool provided in an embodiment of the present application, where the encryption and decryption tool includes:
the parameter configuration unit 401 is configured to configure at least one set of service parameters for the encryption and decryption tool through the service parameter source, where the service parameters include: the method comprises the steps of reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption;
a data obtaining unit 402, configured to obtain data to be processed according to the encrypted and decrypted data name and the read data type;
the encryption and decryption unit 403 is configured to perform encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target, and the encryption and decryption range, and generate a processing result.
As an alternative embodiment, the service parameter source comprises a configuration file or database code table.
As an optional implementation manner, the service parameter further includes a serial number, and the encryption and decryption tool further includes:
and the alarm unit is used for carrying out error alarm on the encryption and decryption tool when the serial number contains other characters except the integer or when the serial number is repeated with other serial numbers.
As an optional implementation manner, the read data type includes an online message type, and the data acquisition unit is specifically configured to:
and acquiring a message corresponding to the name of the data to be processed through the online interface, and acquiring the data to be processed from the message.
As an alternative embodiment, the processing result includes a processing result packet, and the encryption and decryption tool may further perform the following operations:
and returning a processing result message through the online interface.
In some implementations of the first aspect of the present application, the read data type includes a batch text type, and the data acquisition unit is specifically configured to:
and acquiring a batch text corresponding to the name of the data to be processed, and acquiring the data to be processed from the batch text.
In some implementations of the first aspect of the present application, the processing result includes processing result text, and the encryption and decryption tool may further perform the following operations:
and returning the processing result text through a file transfer protocol.
As an alternative embodiment, the data processing unit is specifically configured to perform the following operations:
and when the encryption and decryption range is empty, carrying out full-range encryption or decryption on the data to be processed according to the encryption and decryption type and the encryption and decryption target, and when the encryption and decryption range is empty, carrying out full-range encryption or decryption on the data to be processed.
As an optional implementation manner, the service parameter further includes a parameter serial number, and the encryption and decryption tool is further configured to:
performing parameter verification on service parameters, wherein the parameter verification comprises the following steps: verifying whether the parameter sequence numbers are integers or not, and verifying whether the parameter sequence numbers of each group of service parameters are repeated or not when the service parameters are more than one group.
As an alternative embodiment, the service parameter source comprises a configuration file or database code table.
As shown in fig. 5, an embodiment of the present application further provides a computer device, including: memory 501, processor 502;
wherein the memory 501 is used for storing a program;
the processor 502 is configured to execute a program in the memory to implement a data encryption and decryption processing method as described in fig. 1 to 3.
Finally, it should also be noted that in the embodiments of the present application, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for processing encryption and decryption of data, the method being performed by an encryption and decryption tool, the method comprising:
at least one group of service parameters are configured for the encryption and decryption tool through a service parameter source, and the service parameters comprise: reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption;
acquiring data to be processed according to the data name to be processed and the read data type;
and carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range, and generating a processing result.
2. The method of claim 1, wherein the read data type comprises an online message type, and wherein the obtaining the data to be processed according to the name of the data to be processed and the read data type comprises:
and acquiring a message corresponding to the data name to be processed through an online interface, and acquiring the data to be processed from the message.
3. The method of claim 2, wherein the processing result comprises a processing result message, the method further comprising:
and returning the processing result message through the online interface.
4. The method of claim 1, wherein the read data type comprises a batch text type, and wherein the obtaining the data to be processed based on the name of the data to be processed and the read data type comprises:
and acquiring a batch text corresponding to the data name to be processed, and acquiring the data to be processed from the batch text.
5. The method of claim 4, wherein the processing results comprise processing result text, the method further comprising:
and returning the processing result text through a file transfer protocol.
6. The method according to claim 1, wherein the encrypting or decrypting the data to be processed according to the encryption/decryption type, the encryption/decryption target, and the encryption/decryption range comprises:
and when the encryption and decryption range is empty, carrying out full-range encryption or decryption on the data to be processed according to the encryption and decryption type and the encryption and decryption target.
7. The method of claim 1, wherein the service parameters further comprise parameter sequence numbers, the method further comprising:
performing parameter verification on the service parameters, wherein the parameter verification comprises the following steps: verifying whether the parameter sequence numbers are integers, and verifying whether the parameter sequence numbers of each group of the service parameters are repeated when the service parameters are more than one group.
8. The method of claim 1, wherein the service parameter source comprises a profile or database code table.
9. An encryption and decryption tool, characterized in that the encryption and decryption tool comprises:
the parameter configuration unit is configured to configure at least one set of service parameters for the encryption and decryption tool through a service parameter source, where the service parameters include: reading a data type, an encryption and decryption target, a data name to be processed and an encryption and decryption range, wherein the encryption and decryption type comprises encryption or decryption;
the data acquisition unit acquires the data to be processed according to the data name to be processed and the read data type;
and the encryption and decryption unit is used for carrying out encryption processing or decryption processing on the data to be processed according to the encryption and decryption type, the encryption and decryption target and the encryption and decryption range and generating a processing result.
10. A computer device, characterized in that the device comprises a memory and a processor for executing a program stored in the memory, running the method according to any of claims 1-8.
CN202310130541.5A 2023-02-17 2023-02-17 Data encryption and decryption processing method and encryption and decryption tool Pending CN116009854A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310130541.5A CN116009854A (en) 2023-02-17 2023-02-17 Data encryption and decryption processing method and encryption and decryption tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310130541.5A CN116009854A (en) 2023-02-17 2023-02-17 Data encryption and decryption processing method and encryption and decryption tool

Publications (1)

Publication Number Publication Date
CN116009854A true CN116009854A (en) 2023-04-25

Family

ID=86035686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310130541.5A Pending CN116009854A (en) 2023-02-17 2023-02-17 Data encryption and decryption processing method and encryption and decryption tool

Country Status (1)

Country Link
CN (1) CN116009854A (en)

Similar Documents

Publication Publication Date Title
US12058115B2 (en) Systems and methods for Smartkey information management
EP3356988B1 (en) Method and system for verifiable searchable symmetric encryption
KR100753932B1 (en) contents encryption method, system and method for providing contents through network using the encryption method
CN109583217B (en) Internet e-commerce platform user privacy data encryption and decryption method
US6732277B1 (en) Method and apparatus for dynamically accessing security credentials and related information
JP5395372B2 (en) Communication device, key server and data
CN112653556B (en) TOKEN-based micro-service security authentication method, device and storage medium
JP2004501532A (en) One-time pad encryption with central key provision and key enterable characters
KR20050037244A (en) Device authentication method using certificate and digital content processing device using the method
KR101648364B1 (en) Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption
CN109754226B (en) Data management method, device and storage medium
EP1785901B1 (en) Secure License Key Method and System
JP2009049731A (en) Encryption method, decryption method, and key management method
CN114443718A (en) Data query method and system
US20190305940A1 (en) Group shareable credentials
CN112528309A (en) Data storage encryption and decryption method and device
JP2019125956A (en) Key exchange method, key exchange system, key exchange server device, communication device, and program
JPH11143359A (en) Enciphering device, decoding device, information sharing device, enciphering method, decoding method, information processing method, and recording medium
CN116009854A (en) Data encryption and decryption processing method and encryption and decryption tool
Bojanova et al. Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
JP4629602B2 (en) Public key encryption communication system, public key encryption communication method, client terminal, and client program
CN114125830B (en) APP data encryption transmission method, device and medium
Riordan RIPEM User's Guide
CN118249989A (en) Key transmission method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination