CN116743461B - Commodity data encryption method and device based on time stamp - Google Patents

Commodity data encryption method and device based on time stamp Download PDF

Info

Publication number
CN116743461B
CN116743461B CN202310712826.XA CN202310712826A CN116743461B CN 116743461 B CN116743461 B CN 116743461B CN 202310712826 A CN202310712826 A CN 202310712826A CN 116743461 B CN116743461 B CN 116743461B
Authority
CN
China
Prior art keywords
data
encryption
splicing
preset file
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310712826.XA
Other languages
Chinese (zh)
Other versions
CN116743461A (en
Inventor
吴凯
徐天南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Yinmancang Digital Technology Co ltd
Original Assignee
Hainan Yinmancang Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Yinmancang Digital Technology Co ltd filed Critical Hainan Yinmancang Digital Technology Co ltd
Priority to CN202310712826.XA priority Critical patent/CN116743461B/en
Publication of CN116743461A publication Critical patent/CN116743461A/en
Application granted granted Critical
Publication of CN116743461B publication Critical patent/CN116743461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention discloses a commodity data encryption method and device based on a time stamp, which are applied to a data transmitting end, wherein the method comprises the following steps: sending a request to a server, wherein the request comprises an encryption level; receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp; receiving a preset file sent by a data receiving end, wherein the preset file has a corresponding relation with an encryption mark; processing commodity data to be transmitted and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data; and sending the encrypted commodity data to a data receiving end. In the encryption method provided by the invention, the server sets a trusted execution environment, different encryption methods are carried out based on the encryption mark of the server, the server has a decision function on the encryption process, but the server does not directly contact the original data and does not know the real secret key, and the encryption mark is randomly sent and does not have regularity.

Description

Commodity data encryption method and device based on time stamp
Technical Field
The application relates to the technical field of data processing, in particular to a commodity data encryption method and device based on a time stamp.
Background
With the rapid development of information technology, data security in the transmission process is very important, and if necessary encryption measures are not taken, the data in the transmission process is easily intercepted or tampered by adopting a plaintext transmission mode. The conventional method is to encrypt the plaintext directly by using the existing encryption and decryption algorithm, store and transmit the ciphertext according to the established storage and transmission protocol, and ensure the safety of data transmission to a certain extent.
Disclosure of Invention
The invention aims to provide a commodity data encryption method based on a time stamp, which solves the problem of low encryption strength in the prior art.
In order to solve the above problems, a first aspect of the present invention provides a commodity data encryption method based on a timestamp, applied to a data transmitting end, including:
sending a request to a server, wherein the request contains encryption level, so that the server sends corresponding encryption information according to the request;
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp;
Receiving a preset file sent by a data receiving end, wherein the preset file has a corresponding relation with an encryption mark;
processing commodity data to be transmitted and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data;
and sending the encrypted commodity data to a data receiving end.
Optionally, the processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp includes:
splitting the commodity data to be sent into a plurality of parts according to the splicing rules;
providing dummy data similar to the data of at least one of the plurality of portions;
ordering the dummy data with the plurality of portions;
generating a plurality of keys according to the time stamp, and splicing and encrypting the plurality of parts of the ordered commodity data to be sent and the pseudo data by adopting the plurality of keys;
splicing the encrypted data with the preset file according to the splicing rule;
and encoding the spliced file by adopting Base64 to obtain encrypted commodity data.
Optionally, splicing the encrypted data and the preset file according to the splicing rule includes:
Carrying out hash operation on the encrypted data according to the splicing rule to obtain a hash value, and encrypting the hash value by adopting a time stamp as a key to obtain a message authentication code;
splitting the encrypted data into a plurality of parts according to the splicing rules, and inserting the parts and the message authentication code into the appointed position of the preset file.
The invention also provides a commodity data stamp encryption method based on time, which is applied to a data receiving end and comprises the following steps:
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp;
transmitting a preset file corresponding to the encryption mark to a data transmitting end according to the encryption mark;
receiving encrypted commodity data sent by a data sending end;
and decrypting the encrypted commodity data according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data.
Optionally, the sending, by the encryption flag, the preset file corresponding to the encryption flag to the data sending end includes:
acquiring a preset file database, wherein the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file;
and acquiring a preset file from the preset file database according to the encryption mark.
Optionally, the decrypting the ciphertext according to the timestamp, the encryption flag, and the preset file includes:
performing Base64 decoding on the ciphertext;
acquiring a splicing rule corresponding to the encryption mark;
splitting the decoded file according to the splicing rule to obtain a message authentication code and data of a plurality of parts;
splicing the data of the plurality of parts;
verifying the integrity of the spliced data based on the message authentication code;
if the spliced data are complete data, generating a plurality of keys according to the timestamp by the same method of the data transmitting end, and decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted;
and splicing the multiple parts of the commodity to be sent to obtain commodity data to be sent.
The invention also provides a commodity data encryption method based on the time stamp, which is applied to the server and comprises the following steps:
receiving a request sent by a data sending end;
analyzing the request to obtain encryption levels, wherein each encryption level corresponds to an encryption mark database;
according to the encryption level, an encryption mark and a current timestamp are randomly acquired from a corresponding encryption mark database and are used as encryption information to be sent to a data sending end, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
And sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
The invention also provides a commodity data encryption device based on the time stamp, which is applied to a data transmitting end and comprises the following components:
the request sending module is used for sending a request to the server, wherein the request comprises an encryption level so that the server can send corresponding encryption information according to the request;
the encryption information receiving module is used for receiving encryption information sent by the server side, wherein the data encryption information comprises an encryption mark and a time stamp;
the preset file receiving module is used for receiving a preset file sent by the data receiving end, wherein the preset file has a corresponding relation with the encryption mark;
the processing module is used for processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data;
and the sending module is used for sending the encrypted commodity data to a data receiving end.
The invention also provides a commodity data encryption device based on the time stamp, which is applied to a data receiving end and comprises the following components:
The encryption information receiving module is used for receiving encryption information sent by the server side, and the data comprises an encryption mark and a time stamp;
the preset file sending module is used for sending a preset file corresponding to the encryption mark to the data sending end according to the encryption mark;
the encrypted commodity data receiving module is used for receiving the encrypted commodity data sent by the data sending end;
and the decryption module decrypts the ciphertext according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data.
The invention also provides a commodity data encryption device based on the time stamp, which is applied to a server and comprises:
the request receiving module receives a request sent by a data receiving end;
the analysis module analyzes the request to obtain encryption levels, and each encryption level corresponds to one encryption mark database;
the sending module is used for randomly acquiring an encryption mark and a current timestamp from the encryption mark database and sending the encryption mark and the current timestamp to the data sending end as encryption information, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
and sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
The technical scheme of the invention has the following beneficial technical effects:
in the encryption method provided by the invention, the server sets a trusted execution environment, different encryption methods are carried out based on the encryption mark of the server, the server has a decision function on the encryption process, but the server does not directly contact the original data and does not know the real secret key, meanwhile, the encryption mark is randomly sent and has no regularity, so that the cracking difficulty can be further increased, and the encryption mark can be updated periodically, therefore, the method can effectively improve the security of data transmission.
Drawings
Fig. 1 is a flowchart of a time stamp based commodity data encryption method according to a first embodiment of the present invention;
FIG. 2 is an interaction schematic diagram of a server, a data receiving end and a data transmitting end according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The objects, technical solutions and advantages of the present invention will become more apparent by the following detailed description of the present invention with reference to the accompanying drawings. It should be understood that the description is only illustrative and is not intended to limit the scope of the invention. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the present invention.
With the rapid development of information technology, data security in the transmission process is very important, and if necessary encryption measures are not taken, the data in the transmission process is easily intercepted or tampered by adopting a plaintext transmission mode. The conventional method is to encrypt the plaintext directly by using the existing encryption and decryption algorithm, store and transmit the ciphertext according to the established storage and transmission protocol, and ensure the safety of data transmission to a certain extent.
In the commodity data, the data amount is large, and the importance degree of each part is different, for example, each piece of data is a name, a price, a commodity stock amount and the like, wherein the importance degree of the data of each part is different.
Fig. 1 is a flowchart of a time stamp based encryption method according to a first embodiment of the present invention;
fig. 2 is an interaction schematic diagram of a server, a data receiving end and a data transmitting end according to an embodiment of the present invention.
Referring to fig. 1 and 2, in one embodiment of the present invention, there is provided a commodity data encryption method based on a time stamp, applied to a data transmitting end, including:
Sending a request to a server, wherein the request contains encryption level, so that the server sends corresponding encryption information according to the request; the encryption level is determined by the commodity data to be transmitted, and the step of acquiring the encryption level comprises the following steps:
dividing commodity data to be transmitted into a plurality of parts according to information types; for example, commodity data to be transmitted is divided into three parts of name, unit price, and number.
Determining an encryption level based on the number of the plurality of portions; for example, considering other steps in the encryption process and the three parts, the encryption level can be 4 levels, and the encryption level is obtained by adding 1 to the number;
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp; the server side can set a trusted execution environment, and the server side respectively presets an encryption mark database according to different encryption levels, wherein each encryption level corresponds to one encryption mark database; each encryption mark database comprises a plurality of encryption marks, and a server side can randomly acquire one encryption mark in the corresponding encryption mark database according to the encryption level each time;
receiving a preset file sent by a data receiving end, wherein the preset file has a corresponding relation with an encryption mark; the data receiving end sends a preset file to the data sending end according to the encryption mark, a preset file database is preset at the data receiving end, the preset file database comprises at least one preset file and the encryption mark corresponding to the preset file, the corresponding preset file is obtained from the preset file database according to the received encryption mark of the service end, and the preset file is sent to the data sending end;
Processing commodity data to be sent and the preset file according to a splicing rule and a time stamp corresponding to the encryption mark to obtain encrypted commodity data; the data transmitting end presets a plurality of splicing rules, and the splicing rules correspond to the preset files and the encryption marks, so that the preset files and the original data are spliced by selecting the corresponding splicing rules after the encryption marks are acquired, and are encrypted according to the time stamps in the splicing process;
and sending the encrypted commodity data to a data receiving end.
In the encryption method provided by the invention, the server sets a trusted execution environment, different encryption methods are carried out based on the encryption mark of the server, the server has a decision function on the encryption process, but the server does not directly contact the original data and does not know the real secret key, meanwhile, the encryption mark is randomly sent and has no regularity, so that the cracking difficulty can be further increased, and the encryption mark can be updated periodically, therefore, the method can effectively improve the security of data transmission.
For example, the data transmitting end presets a plurality of splicing rules, the splicing rules correspond to the preset file and the encryption mark, for example, the splicing rule A splits the original data into three parts according to the splitting rule, and the splicing rule B splits the original data into four parts; taking splice rule A as an example;
The processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp comprises the following steps:
splitting the commodity data to be sent into a plurality of parts according to the splicing rules; for example, splitting the original data into three parts, namely a first part, a second part and a third part, according to the splicing rule A;
the commodity data to be sent comprises a plurality of pieces of data, and one piece of data is composed of commodity names, unit price and quantity. Because the confidentiality degree of each part of commodity data is different, the fake data can be adopted to play a confusing role, and the decoding difficulty is increased. Meanwhile, each part is overlapped and encrypted, even if the cracking of data of one part is meaningless to a hacker, the keys of the cracking of data of each part are different, and therefore, the risk of information leakage can be effectively reduced.
Providing dummy data similar to the data of at least one of the plurality of portions; for example, the first part is randomly replaced to obtain dummy data, and the format and the size of the dummy data are the same as those of the first part (the dummy data can also be two parts, and the format and the size of the dummy data are the same as those of the first part and the second part respectively);
Ordering the dummy data with the plurality of portions; the position relation between each part of the split original data and the pseudo data can be obtained by adopting a digital random ordering mode; for example, the first part corresponds to the number 1, the second part corresponds to the number 2, the third part corresponds to the number 3, and the dummy data corresponds to the number 4; the numbers 1, 2, 3, and 4 are randomly ordered, for example, 2314 is the result of the ordering, and the corresponding ordering is the second part, the third part, the first part, and the dummy data. While the ordering result 2314 is spliced with the respective parts, for example, may be set at the forefront of all data. For example, the end result is 2314 (ordering result), the second part, the third part, the first part, the dummy data.
The method for acquiring the key and the encryption method adopted by the invention are that the data transmitting end and the data receiving end agree in advance, and the formats of commodity data to be encrypted which are required to be transmitted each time are the same. The method of updating the acquisition key and the method of encryption may be performed periodically for security.
Generating a plurality of keys according to the time stamp, and performing splicing encryption on the plurality of parts of the ordered commodity data to be sent and the dummy data by adopting the plurality of keys comprises the following steps:
Determining the number of keys required according to the encryption flag, wherein the encryption flag corresponds to the encryption level, and the number of keys corresponds to the encryption level;
generating a plurality of keys with the same number as the keys according to a key generation rule corresponding to the encryption mark;
for example, if the sum of the numbers is 4, 4 keys are generated, a hash algorithm (such as MD5, SHA-1, SHA-2, etc.) is used to calculate the timestamp to obtain a first key, and a hash algorithm is used to calculate the first key to obtain a second key; carrying out operation on the second key by adopting a hash algorithm to obtain a third key; carrying out operation on the third key by adopting a hash algorithm to obtain a fourth key; wherein the first key, the second key, the third key and the fourth key may be derived respectively using different hash algorithms. The hash algorithm adopted for obtaining the 4 keys can be the same or different, and can be preset according to the encryption mark.
And splicing the position relation, each part of the split original data and the pseudo data in sequence according to the position relation, and encrypting by using different keys in the splicing process. For example, 2314 (ordering result) is stitched together according to the ordering result, the second portion is then encrypted using the first key, and the encryption algorithm may use AES, DES, or the like;
Splicing the encrypted data with the third part, encrypting by adopting a second key, and adopting AES, DES and the like for an encryption algorithm;
splicing the encrypted data with the first part, encrypting by adopting a third key, wherein an encryption algorithm can use AES, DES and the like;
and splicing the encrypted data with the pseudo data, encrypting by adopting a fourth key, and adopting AES, DES and the like as an encryption algorithm.
Splicing the encrypted data and the preset file according to the splicing rule comprises the following steps: firstly, carrying out hash operation on data encrypted by a fourth key to obtain a hash value, encrypting the hash value based on a time stamp as a key to obtain a message authentication code, wherein an encryption algorithm can use AES, DES and the like;
splitting the encrypted data into a plurality of parts according to the format of the preset file, and inserting the parts and the message authentication code into the designated position of the preset file. The chain can be split into A, B, C parts by way of example.
Further, the preset file is provided in a format by which it is possible to know which part is the message authentication code and which part is the encrypted data. For example, the spliced file is a start flag, a message authentication code, A, B, C, and an end flag.
In this embodiment, the timestamp provided by the server to the data sending end and the data receiving end is not a real key, and the data sending end and the data receiving end perform operation based on a agreed algorithm to obtain the real key, so that the security can be further increased.
And (3) encoding the spliced file by using Base64 to obtain encrypted commodity data, and performing Base64 encoding on the spliced file to obtain final encrypted commodity data.
In the embodiment, the splitting is exemplified by three parts, in practical cases, the splitting can be carried out at will according to the requirements, even 100 parts can be split, and the time required for cracking can be effectively increased; on the other hand, pseudo data is provided for the split partial data, so that the security is further improved; based on the two points, the data transmission of the method has very high safety. In one embodiment, providing at least one dummy data similar to a portion of the original data comprises:
randomly acquiring at least one part of original data;
and replacing a preset position (such as the first third content) in the part of original data, namely, the dummy data comprises two parts of confusing data and real data, so as to obtain the dummy data (namely, the dummy data is coincident with the corresponding part of data).
The invention also provides a commodity data encryption method based on the time stamp, which is applied to a data receiving end and comprises the following steps:
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp;
transmitting a preset file corresponding to the encryption mark to a data transmitting end according to the encryption mark; a preset file database is preset at the data receiving end, the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file, the corresponding preset file is obtained from the preset file database according to the received encryption mark of the service end, and the corresponding preset file is sent to the data sending end;
receiving encrypted commodity data sent by a data sending end;
decrypting the encrypted commodity data according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data; the data receiving end presets a plurality of splicing rules, and the splicing rules correspond to the preset file and the encryption mark, so after the encryption mark and the time stamp are acquired, the preset file and the original data can be split based on the corresponding splicing rules selected after the encryption mark, and decryption is performed according to the time stamp in the splitting process. Before splitting, verifying whether the received ciphertext format is consistent with the format of the preset file or not, and avoiding confusion with other data.
In the encryption method provided by the invention, the server sets a trusted execution environment, different encryption methods are carried out based on the encryption mark of the server, the server has a decision function on the encryption process, but the server does not directly contact the original data and does not know the real secret key, meanwhile, the encryption mark is randomly sent and has no regularity, so that the cracking difficulty can be further increased, and the encryption mark and the corresponding splicing rule can be updated regularly, therefore, the method can effectively improve the security of data transmission.
In an embodiment, the sending, by the encryption flag, the preset file corresponding to the encryption flag to the data sending end includes:
acquiring a preset file database, wherein the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file;
and acquiring a preset file from the preset file database according to the encryption mark.
In an embodiment, said decrypting ciphertext according to the timestamp, the encrypted flag, and the preset file includes:
performing Base64 decoding on the ciphertext;
acquiring a splicing rule corresponding to the encryption mark; for example, the splicing rule a splits the original data into three parts, and the splicing rule B splits the original data into four parts;
Splitting the decoded file according to the splicing rule to obtain a message authentication code and data of a plurality of parts;
splicing the data of the plurality of parts;
verifying the integrity of the spliced data based on the message authentication code; for example, the spliced data can be operated by adopting a hash algorithm which is the same as that of the data transmitting end to obtain a hash value;
meanwhile, decrypting the message authentication code by taking the timestamp as a key to obtain a hash value, comparing whether the two hash values are identical, and if so, obtaining complete data;
if the spliced data is complete data, then
Generating a plurality of keys according to the timestamp by the same method of the data transmitting end, decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted, and simultaneously obtaining a sequencing result; it can be known that the data transmitting end and the data receiving end are identical in the process of hashing the time stamp according to the encryption flag to obtain the key. For example, a hash algorithm (such as MD5, SHA-1, SHA-2, etc.) is used to calculate the timestamp to obtain a first key, and a hash algorithm is used to calculate the first key to obtain a second key; carrying out operation on the second key by adopting a hash algorithm to obtain a third key; carrying out operation on the third key by adopting a hash algorithm to obtain a fourth key; wherein the first key, the second key, the third key and the fourth key may be derived respectively using different hash algorithms.
Gradually decrypting the spliced data based on the first key, the second key, the third key and the fourth key to finally obtain: 2314 (ordering result), second part, third part, first part, dummy data;
and splicing the plurality of parts of the commodity data to be sent to obtain the commodity data to be sent, specifically, splicing the parts according to the sequencing result to obtain the original data, for example, splicing the first part, the second part and the third part to obtain the commodity data to be sent.
The invention also provides a commodity data encryption method based on the time stamp, which is applied to the server and comprises the following steps:
receiving a request sent by a data sending end;
analyzing the request to obtain encryption levels, wherein each encryption level corresponds to an encryption mark database;
according to the encryption level, an encryption mark and a current timestamp are randomly acquired from a corresponding encryption mark database and are used as encryption information to be sent to a data sending end, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
and sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
In the encryption method provided by the invention, the server sets a trusted execution environment, different encryption methods are carried out based on the encryption mark of the server, the server has a decision function on the encryption process, but the server does not directly contact the original data and does not know the real secret key, meanwhile, the encryption mark is randomly sent and has no regularity, so that the cracking difficulty can be further increased, and the encryption mark can be updated periodically, therefore, the method can effectively improve the security of data transmission.
Another embodiment of the present invention further provides a commodity data encryption device based on a timestamp, which is applied to a data transmitting end, and includes:
the request sending module is used for sending a request to the server, wherein the request comprises an encryption level so that the server can send corresponding encryption information according to the request;
the encryption information receiving module is used for receiving encryption information sent by the server side, wherein the data encryption information comprises an encryption mark and a time stamp;
the preset file receiving module is used for receiving a preset file sent by the data receiving end, wherein the preset file has a corresponding relation with the encryption mark;
the processing module is used for processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data;
And the sending module is used for sending the encrypted commodity data to a data receiving end.
Another embodiment of the present invention further provides a commodity data encryption device based on a timestamp, which is applied to a data receiving end, and includes:
the encryption information receiving module is used for receiving encryption information sent by the server side, and the data comprises an encryption mark and a time stamp;
the preset file sending module is used for sending a preset file corresponding to the encryption mark to the data sending end according to the encryption mark;
the encrypted commodity data receiving module is used for receiving the encrypted commodity data sent by the data sending end;
and the decryption module decrypts the ciphertext according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data.
Another embodiment of the present invention further provides a commodity data encryption device based on a timestamp, which is applied to a server, and includes:
the request receiving module receives a request sent by a data receiving end;
the analysis module analyzes the request to obtain encryption levels, and each encryption level corresponds to one encryption mark database;
the sending module is used for randomly acquiring an encryption mark and a current timestamp from the encryption mark database and sending the encryption mark and the current timestamp to the data sending end as encryption information, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
And sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
The above description of the method also applies to the description of the device.
The application also provides an electronic device comprising a memory, a processor and a computer program stored in the memory and capable of running on the processor, the processor implementing the time stamp based encryption method as described above when executing the computer program.
The present application also provides a computer readable storage medium storing a computer program which, when executed by a processor, enables the time stamp-based commodity data encryption method as described above.
Fig. 3 is an exemplary block diagram of an electronic device capable of implementing the timestamp-based commodity data encryption method provided in accordance with one embodiment of the present application.
As shown in fig. 3, the electronic device includes an input device 501, an input interface 502, a central processor 503, a memory 504, an output interface 505, and an output device 506. The input interface 502, the central processing unit 503, the memory 504, and the output interface 505 are connected to each other through a bus 507, and the input device 501 and the output device 506 are connected to the bus 507 through the input interface 502 and the output interface 505, respectively, and further connected to other components of the electronic device. Specifically, the input device 501 receives input information from the outside, and transmits the input information to the central processor 503 through the input interface 502; the central processor 503 processes the input information based on computer executable instructions stored in the memory 504 to generate output information, temporarily or permanently stores the output information in the memory 504, and then transmits the output information to the output device 506 through the output interface 505; the output device 506 outputs the output information to the outside of the electronic device for use by the user.
That is, the electronic device shown in fig. 3 may also be implemented to include: a memory storing computer-executable instructions; and one or more processors that, when executing the computer-executable instructions, implement the timestamp-based commodity data encryption method described in connection with fig. 1.
In one embodiment, the electronic device shown in FIG. 3 may be implemented to include: a memory 504 configured to store executable program code; the one or more processors 503 are configured to execute the executable program code stored in the memory 504 to perform the timestamp-based commodity data encryption method in the above-described embodiments.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and the media may be implemented in any method or technology for storage of information. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps. A plurality of units, modules or means recited in the apparatus claims can also be implemented by means of software or hardware by means of one unit or total means. The terms first, second, etc. are used to identify names, and not any particular order.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The processor referred to in this embodiment may be a central processing unit (Central Processing Unit, CPU), or other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may be used to store computer programs and/or modules, and the processor may perform various functions of the apparatus/terminal device by executing or executing the computer programs and/or modules stored in the memory, and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
In this embodiment, the modules/units of the apparatus/terminal device integration may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as a separate product. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by hardware related to the instructions of a computer program, where the computer program may be stored in a computer readable storage medium, and when executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth.
It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the legislation and the practice of the patent in the jurisdiction. While the preferred embodiments have been described, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention, and it is intended that the scope of the invention shall be limited only by the claims appended hereto.
While the invention has been described in detail in the foregoing general description and with reference to specific embodiments thereof, it will be apparent to one skilled in the art that modifications and improvements can be made thereto. Accordingly, such modifications or improvements may be made without departing from the spirit of the invention and are intended to be within the scope of the invention as claimed.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs. The modules in the device of the embodiment of the invention can be combined, divided and deleted according to actual needs.

Claims (10)

1. The commodity data encryption method based on the time stamp is characterized by being applied to a data transmitting end and comprising the following steps:
sending a request to a server, wherein the request comprises an encryption level, so that the server sends corresponding encryption information according to the request, the encryption level is determined by commodity data to be sent, and the step of acquiring the encryption level comprises the following steps: dividing commodity data to be transmitted into a plurality of parts according to information types, and determining the encryption level according to the number of the parts;
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp;
Receiving a preset file sent by a data receiving end, wherein the preset file has a corresponding relation with an encryption mark, and the preset file confirms the format of the encrypted and spliced data;
processing commodity data to be transmitted and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data; processing commodity data to be sent and the preset file according to a splicing rule and a time stamp corresponding to the encryption mark to obtain encrypted commodity data; the data transmitting end presets a plurality of splicing rules, the splicing rules correspond to the preset files and the encryption marks, the corresponding splicing rules are selected to splice the preset files and the original data after the encryption marks are acquired, and encryption is carried out according to the time stamps in the splicing process; generating a plurality of keys according to the time stamp, and splicing and encrypting the sequenced plurality of parts of the commodity data to be sent and the dummy data by adopting the plurality of keys comprises the following steps: determining the number of keys required according to the encryption flag, wherein the encryption flag corresponds to the encryption level, and the number of keys corresponds to the encryption level; generating a plurality of keys with the same number as the keys according to a key generation rule corresponding to the encryption mark; sequentially splicing the position relation, each part of the split original data and the pseudo data according to the position relation, and encrypting by using different keys in the splicing process; splicing the encrypted data and the preset file according to the splicing rule comprises the following steps: firstly carrying out hash operation on the data encrypted by the fourth key to obtain a hash value, taking a timestamp as a key for the hash value, and encrypting the hash value to obtain a message authentication code; splitting the encrypted data into a plurality of parts according to the format of a preset file, and inserting the parts and the message authentication code into the appointed position of the preset file; the spliced file is subjected to Base64 coding to obtain encrypted commodity data, and Base64 coding is performed on the spliced file to obtain final encrypted commodity data;
And sending the encrypted commodity data to a data receiving end.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp comprises the following steps:
splitting the commodity data to be sent into a plurality of parts according to the splicing rules;
providing dummy data similar to the data of at least one of the plurality of portions;
ordering the dummy data with the plurality of portions;
generating a plurality of keys according to the time stamp, and splicing and encrypting the plurality of parts of the ordered commodity data to be sent and the pseudo data by adopting the plurality of keys;
splicing the encrypted data with the preset file according to the splicing rule;
the spliced file is encoded by Base64 to obtain encrypted commodity data;
determining the number of keys required according to the encryption flag, wherein the encryption flag corresponds to the encryption level, and the number of keys corresponds to the encryption level;
and generating a plurality of keys with the same number as the keys according to the key generation rule corresponding to the encryption mark.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
Splicing the encrypted data and the preset file according to the splicing rule comprises the following steps:
carrying out hash operation on the encrypted data according to the splicing rule to obtain a hash value, and encrypting the hash value by adopting a time stamp as a key to obtain a message authentication code;
splitting the encrypted data into a plurality of parts according to the splicing rules, and inserting the parts and the message authentication code into the appointed position of the preset file.
4. The commodity data encryption method based on the time stamp is characterized by being applied to a data receiving end and comprising the following steps:
receiving encryption information sent by a server, wherein the encryption information comprises an encryption mark and a time stamp;
transmitting a preset file corresponding to the encryption mark to a data transmitting end according to the encryption mark; decrypting the encrypted commodity data according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data; the data receiving end presets a plurality of splicing rules, the splicing rules correspond to the preset files and the encryption marks, so after the encryption marks and the time stamps are acquired, the preset files and the original data can be split based on the corresponding splicing rules selected after the encryption marks, and decryption is carried out according to the time stamps in the splitting process; acquiring a preset file database, wherein the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file; acquiring a preset file from the preset file database according to the encryption mark; decrypting the ciphertext according to the timestamp, the encryption flag and the preset file includes: performing Base64 decoding on the ciphertext; acquiring a splicing rule corresponding to the encryption mark; splitting the decoded file according to the splicing rule to obtain a message authentication code and data of a plurality of parts; splicing the data of the plurality of parts; verifying the integrity of the spliced data based on the message authentication code; meanwhile, decrypting the message authentication code by taking the timestamp as a key to obtain a hash value, comparing whether the two hash values are identical, and if so, obtaining complete data; if the spliced data are complete data, generating a plurality of keys according to the timestamp by the same method of the data transmitting end, decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted, and simultaneously obtaining a sequencing result; splicing a plurality of parts of commodity data to be sent to obtain the commodity data to be sent;
Receiving encrypted commodity data sent by a data sending end;
and decrypting the encrypted commodity data according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
the sending of the preset file corresponding to the encryption mark to the data sending end by the encryption mark comprises the following steps:
acquiring a preset file database, wherein the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file;
and acquiring a preset file from the preset file database according to the encryption mark.
6. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
the decrypting the ciphertext according to the timestamp, the encryption flag and the preset file includes:
performing Base64 decoding on the ciphertext;
acquiring a splicing rule corresponding to the encryption mark;
splitting the decoded file according to the splicing rule to obtain a message authentication code and data of a plurality of parts;
splicing the data of the plurality of parts;
verifying the integrity of the spliced data based on the message authentication code;
if the spliced data are complete data, generating a plurality of keys according to the timestamp by the same method of the data transmitting end, and decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted; generating a plurality of keys according to the timestamp by the same method of the data transmitting end, decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted, and simultaneously obtaining a sequencing result;
And splicing the multiple parts of the commodity to be sent to obtain commodity data to be sent.
7. The commodity data encryption method based on the time stamp is characterized by being applied to a server and comprising the following steps:
receiving a request sent by a data sending end;
analyzing the request to obtain encryption levels, wherein each encryption level corresponds to an encryption mark database; the encryption level is determined by commodity data to be sent, and the step of obtaining the encryption level comprises the following steps: dividing commodity data to be transmitted into a plurality of parts according to information types, and determining the encryption level according to the number of the parts;
according to the encryption level, an encryption mark and a current timestamp are randomly acquired from a corresponding encryption mark database and are used as encryption information to be sent to a data sending end, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
and sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
8. A commodity data encryption device based on a time stamp, which is applied to a data transmitting end, comprising:
The request sending module is used for sending a request to the server, wherein the request comprises an encryption level so that the server can send corresponding encryption information according to the request; the encryption level is determined by commodity data to be sent, and the step of obtaining the encryption level comprises the following steps: dividing commodity data to be transmitted into a plurality of parts according to information types, and determining the encryption level according to the number of the parts;
the encryption information receiving module is used for receiving encryption information sent by the server side, wherein the encryption information comprises an encryption mark and a time stamp;
the preset file receiving module is used for receiving a preset file sent by the data receiving end, wherein the preset file has a corresponding relation with the encryption mark; the preset file confirms the format of the encrypted and spliced data;
the processing module is used for processing the commodity data to be sent and the preset file according to the splicing rule corresponding to the encryption mark and the timestamp to obtain encrypted commodity data; processing commodity data to be sent and the preset file according to a splicing rule and a time stamp corresponding to the encryption mark to obtain encrypted commodity data; the data transmitting end presets a plurality of splicing rules, the splicing rules correspond to the preset files and the encryption marks, the corresponding splicing rules are selected to splice the preset files and the original data after the encryption marks are acquired, and encryption is carried out according to the time stamps in the splicing process; generating a plurality of keys according to the time stamp, and splicing and encrypting the sequenced plurality of parts of the commodity data to be sent and the dummy data by adopting the plurality of keys comprises the following steps: determining the number of keys required according to the encryption flag, wherein the encryption flag corresponds to the encryption level, and the number of keys corresponds to the encryption level; generating a plurality of keys with the same number as the keys according to a key generation rule corresponding to the encryption mark; sequentially splicing the position relation, each part of the split original data and the pseudo data according to the position relation, and encrypting by using different keys in the splicing process; splicing the encrypted data and the preset file according to the splicing rule comprises the following steps: firstly carrying out hash operation on the data encrypted by the fourth key to obtain a hash value, taking a timestamp as a key for the hash value, and encrypting the hash value to obtain a message authentication code; splitting the encrypted data into a plurality of parts according to the format of a preset file, and inserting the parts and the message authentication code into the appointed position of the preset file; the spliced file is subjected to Base64 coding to obtain encrypted commodity data, and Base64 coding is performed on the spliced file to obtain final encrypted commodity data;
And the sending module is used for sending the encrypted commodity data to a data receiving end.
9. A commodity data encryption device based on a time stamp, which is applied to a data receiving end, comprising:
the encryption information receiving module is used for receiving encryption information sent by the server side, wherein the encryption information comprises an encryption mark and a time stamp;
the preset file sending module is used for sending a preset file corresponding to the encryption mark to the data sending end according to the encryption mark; decrypting the encrypted commodity data according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data; the data receiving end presets a plurality of splicing rules, the splicing rules correspond to the preset files and the encryption marks, so after the encryption marks and the time stamps are acquired, the preset files and the original data can be split based on the corresponding splicing rules selected after the encryption marks, and decryption is carried out according to the time stamps in the splitting process; acquiring a preset file database, wherein the preset file database comprises at least one preset file and an encryption mark corresponding to the preset file; acquiring a preset file from the preset file database according to the encryption mark; decrypting the ciphertext according to the timestamp, the encryption flag and the preset file includes: performing Base64 decoding on the ciphertext; acquiring a splicing rule corresponding to the encryption mark; splitting the decoded file according to the splicing rule to obtain a message authentication code and data of a plurality of parts; splicing the data of the plurality of parts; verifying the integrity of the spliced data based on the message authentication code; meanwhile, decrypting the message authentication code by taking the timestamp as a key to obtain a hash value, comparing whether the two hash values are identical, and if so, obtaining complete data; if the spliced data are complete data, generating a plurality of keys according to the timestamp by the same method of the data transmitting end, decrypting the spliced data based on the keys to obtain a plurality of parts of commodity data to be transmitted, and simultaneously obtaining a sequencing result; splicing a plurality of parts of commodity data to be sent to obtain the commodity data to be sent;
The encrypted commodity data receiving module is used for receiving the encrypted commodity data sent by the data sending end;
and the decryption module decrypts the ciphertext according to the timestamp, the encryption mark and the preset file to obtain decrypted commodity data.
10. The commodity data encryption device based on the timestamp is characterized by being applied to a server and comprising:
the request receiving module receives a request sent by a data receiving end;
the analysis module analyzes the request to obtain encryption levels, and each encryption level corresponds to one encryption mark database; the encryption level is determined by commodity data to be sent, and the step of obtaining the encryption level comprises the following steps: dividing commodity data to be transmitted into a plurality of parts according to information types, and determining the encryption level according to the number of the parts;
the sending module is used for randomly acquiring an encryption mark and a current timestamp from the encryption mark database and sending the encryption mark and the current timestamp to the data sending end as encryption information, so that the data sending end encrypts commodity data to be sent by adopting the encryption information to obtain encrypted commodity data;
and sending the encryption information to the data receiving end so that the data receiving end adopts the encryption information to decrypt the encrypted commodity data to obtain commodity data to be sent.
CN202310712826.XA 2023-06-15 2023-06-15 Commodity data encryption method and device based on time stamp Active CN116743461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310712826.XA CN116743461B (en) 2023-06-15 2023-06-15 Commodity data encryption method and device based on time stamp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310712826.XA CN116743461B (en) 2023-06-15 2023-06-15 Commodity data encryption method and device based on time stamp

Publications (2)

Publication Number Publication Date
CN116743461A CN116743461A (en) 2023-09-12
CN116743461B true CN116743461B (en) 2023-12-22

Family

ID=87907691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310712826.XA Active CN116743461B (en) 2023-06-15 2023-06-15 Commodity data encryption method and device based on time stamp

Country Status (1)

Country Link
CN (1) CN116743461B (en)

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851007A (en) * 2015-06-10 2015-08-19 深圳市瑞盟包装有限公司 Commodity information management system and method based on two-dimensional code and self-dissolving system
CN105471833A (en) * 2015-05-14 2016-04-06 瑞数信息技术(上海)有限公司 Safe communication method and device
CN106209767A (en) * 2016-06-20 2016-12-07 Tcl海外电子(惠州)有限公司 Data transmission method and system
CN106657021A (en) * 2016-11-24 2017-05-10 北京洋浦伟业科技发展有限公司 Vehicle message authentication method and device in Internet of Vehicles
CN108418679A (en) * 2017-02-10 2018-08-17 阿里巴巴集团控股有限公司 The method, apparatus and electronic equipment of key are handled under a kind of multiple data centers
CN110011958A (en) * 2018-12-13 2019-07-12 平安科技(深圳)有限公司 Information ciphering method, device, computer equipment and storage medium
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp
CN111107073A (en) * 2019-12-11 2020-05-05 数字广东网络建设有限公司 Application automatic login method and device, computer equipment and storage medium
WO2021109756A1 (en) * 2019-12-03 2021-06-10 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
CN113259132A (en) * 2021-06-30 2021-08-13 平安普惠企业管理有限公司 Data transmission encryption and decryption method and device, computer equipment and storage medium
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption
CN114124502A (en) * 2021-11-15 2022-03-01 兰州乐智教育科技有限责任公司 Message transmission method, device, equipment and medium
CN114422123A (en) * 2021-12-23 2022-04-29 中国电信股份有限公司 Communication method, communication device, electronic equipment and computer readable medium
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN114553430A (en) * 2022-01-21 2022-05-27 华北电力大学 SDP-based novel power service terminal safe access system
CN114785556A (en) * 2022-03-28 2022-07-22 中国建设银行股份有限公司 Encrypted communication method, device, computer equipment and storage medium
CN114978542A (en) * 2022-05-20 2022-08-30 深圳大学 Full-life-cycle-oriented Internet of things equipment identity authentication method, system and storage medium
CN115065472A (en) * 2022-08-18 2022-09-16 广州万协通信息技术有限公司 Multi-key encryption and decryption-based security chip encryption and decryption method and device
CN115314313A (en) * 2022-08-15 2022-11-08 平安壹钱包电子商务有限公司 Information encryption method and device, storage medium and computer equipment
CN116015807A (en) * 2022-12-15 2023-04-25 广东电网有限责任公司 Lightweight terminal security access authentication method based on edge calculation
CN116150780A (en) * 2022-11-29 2023-05-23 瑞数信息技术(上海)有限公司 Method and device for dynamically generating token, electronic equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050271207A1 (en) * 2004-06-05 2005-12-08 Helmut Frey Method and system for chaotic digital signature, encryption, and authentication
CN101729536B (en) * 2009-06-29 2012-07-18 中兴通讯股份有限公司 Method and system for transmitting delayed media information of IP multimedia subsystem
EP4218212A1 (en) * 2020-09-23 2023-08-02 ExtraHop Networks, Inc. Monitoring encrypted network traffic

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471833A (en) * 2015-05-14 2016-04-06 瑞数信息技术(上海)有限公司 Safe communication method and device
CN104851007A (en) * 2015-06-10 2015-08-19 深圳市瑞盟包装有限公司 Commodity information management system and method based on two-dimensional code and self-dissolving system
CN106209767A (en) * 2016-06-20 2016-12-07 Tcl海外电子(惠州)有限公司 Data transmission method and system
CN106657021A (en) * 2016-11-24 2017-05-10 北京洋浦伟业科技发展有限公司 Vehicle message authentication method and device in Internet of Vehicles
CN108418679A (en) * 2017-02-10 2018-08-17 阿里巴巴集团控股有限公司 The method, apparatus and electronic equipment of key are handled under a kind of multiple data centers
CN110011958A (en) * 2018-12-13 2019-07-12 平安科技(深圳)有限公司 Information ciphering method, device, computer equipment and storage medium
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp
WO2021109756A1 (en) * 2019-12-03 2021-06-10 重庆交通大学 Proxy anonymous communication method based on homomorphic encryption scheme
CN111107073A (en) * 2019-12-11 2020-05-05 数字广东网络建设有限公司 Application automatic login method and device, computer equipment and storage medium
CN113259132A (en) * 2021-06-30 2021-08-13 平安普惠企业管理有限公司 Data transmission encryption and decryption method and device, computer equipment and storage medium
CN113824728A (en) * 2021-09-27 2021-12-21 南京华远时代科技有限公司 Network communication method and system based on data encryption
CN114124502A (en) * 2021-11-15 2022-03-01 兰州乐智教育科技有限责任公司 Message transmission method, device, equipment and medium
CN114422123A (en) * 2021-12-23 2022-04-29 中国电信股份有限公司 Communication method, communication device, electronic equipment and computer readable medium
CN114553430A (en) * 2022-01-21 2022-05-27 华北电力大学 SDP-based novel power service terminal safe access system
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN114785556A (en) * 2022-03-28 2022-07-22 中国建设银行股份有限公司 Encrypted communication method, device, computer equipment and storage medium
CN114978542A (en) * 2022-05-20 2022-08-30 深圳大学 Full-life-cycle-oriented Internet of things equipment identity authentication method, system and storage medium
CN115314313A (en) * 2022-08-15 2022-11-08 平安壹钱包电子商务有限公司 Information encryption method and device, storage medium and computer equipment
CN115065472A (en) * 2022-08-18 2022-09-16 广州万协通信息技术有限公司 Multi-key encryption and decryption-based security chip encryption and decryption method and device
CN116150780A (en) * 2022-11-29 2023-05-23 瑞数信息技术(上海)有限公司 Method and device for dynamically generating token, electronic equipment and storage medium
CN116015807A (en) * 2022-12-15 2023-04-25 广东电网有限责任公司 Lightweight terminal security access authentication method based on edge calculation

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"基于物流行业信息安全无纸化应用软件开发的研究";曹君;《中国硕士学位论文全文数据库》;全文 *
N.Suresh Kumar等."A Complete Mobile Security Architecture using Client and Server Driven Protocols (WMN) ".《2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)》.2012,全文. *
Secure DHCPv6 Mechanism for DHCPv6 Security and Privacy Protection;Lishan Li;Gang Ren;Ying Liu;Jianping Wu;;Tsinghua Science and Technology(第01期);全文 *
基于"垂直认证"的区块链安全解决方案;徐冠宁;赵桂芬;;网络安全技术与应用(第07期);全文 *
基于比特承诺的计算安全量子密码协议;吕欣;冯登国;;计算机研究与发展(第11期);全文 *

Also Published As

Publication number Publication date
CN116743461A (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US20220006624A1 (en) User Terminal, Permission Information Management Method, and Permission Information Management Program
CN110391900B (en) Private key processing method based on SM2 algorithm, terminal and key center
JP4788212B2 (en) Digital signature program and digital signature system
CN109067814B (en) Media data encryption method, system, device and storage medium
US20100005318A1 (en) Process for securing data in a storage unit
CN112202754B (en) Data encryption method and device, electronic equipment and storage medium
CA2702280C (en) Signature generating apparatus, signature verifying apparatus and methods therefor
CN111800257A (en) 3D model encryption transmission method and decryption method
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN109754226B (en) Data management method, device and storage medium
US20230325516A1 (en) Method for file encryption, terminal, electronic device and computer-readable storage medium
US8631235B2 (en) System and method for storing data using a virtual worm file system
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN114218548B (en) Identity verification certificate generation method, authentication method, device, equipment and medium
EP2286610B1 (en) Techniques for peforming symmetric cryptography
CN112528309A (en) Data storage encryption and decryption method and device
CN116743461B (en) Commodity data encryption method and device based on time stamp
CN114143098B (en) Data storage method and data storage device
CN112954388B (en) Data file acquisition method and device, terminal equipment and storage medium
CN115361198A (en) Decryption method, encryption method, device, computer equipment and storage medium
CN117077172A (en) Bid file encryption and decryption method and system based on block chain technology
CN116132159B (en) Data encryption method, device, electronic equipment and storage medium
CN113545025A (en) Method and system for information transmission
CN116318672A (en) Electronic seal key encryption method, electronic seal key decryption method and device
CN117118694A (en) SBOM encryption transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant