WO2014173288A1 - 一种加解密装置以及信息处理方法和系统 - Google Patents

一种加解密装置以及信息处理方法和系统 Download PDF

Info

Publication number
WO2014173288A1
WO2014173288A1 PCT/CN2014/075933 CN2014075933W WO2014173288A1 WO 2014173288 A1 WO2014173288 A1 WO 2014173288A1 CN 2014075933 W CN2014075933 W CN 2014075933W WO 2014173288 A1 WO2014173288 A1 WO 2014173288A1
Authority
WO
WIPO (PCT)
Prior art keywords
decryption
ciphertext
information
module
control information
Prior art date
Application number
PCT/CN2014/075933
Other languages
English (en)
French (fr)
Inventor
李东声
Original Assignee
天地融科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 天地融科技股份有限公司 filed Critical 天地融科技股份有限公司
Publication of WO2014173288A1 publication Critical patent/WO2014173288A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates to the field of electronic technologies, and in particular, to an encryption and decryption apparatus and an information processing method and system. Background technique
  • the sender sends out the full text of the communication information, and correspondingly, after receiving the encrypted communication information, the receiver passes the corresponding decryption algorithm.
  • the full text of the communication information is obtained to obtain the content of the communication information.
  • the encryption and decryption device is usually used to encrypt and decrypt the communication information.
  • the full-text encryption/decryption processing of the communication information takes a large amount of time and memory of the encryption and decryption device. Affecting the processing speed of the encryption and decryption device, reducing the output speed of the information. Summary of the invention
  • the present invention is directed to solving one of the above problems.
  • An information processing method comprising: the decryption device acquires an encoded data packet, where the encoded data packet includes control information of the communication body and the communication body, wherein the communication body includes a plaintext and at least one piece of ciphertext, wherein the control information includes ciphertext identification information of the ciphertext
  • the decryption device determines the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information; the decryption device acquires the decryption strategy corresponding to the ciphertext; the decryption device decrypts the obtained ciphertext by using the decryption strategy to obtain the character information;
  • the decryption device triggers an operation of outputting character information.
  • the step of the decryption device triggering the operation of outputting the character information comprises: the decryption device outputs the character information; or the decryption device transmits the character information to the terminal, and the terminal displays the character information.
  • the control information further includes time control information; the decryption device decrypts the obtained ciphertext by using the decryption strategy, and obtains the character information, the method includes: the decryption device acquires time control information; the decryption device reads the clock information of the decryption device; The device compares the clock information with the time control information; if the comparison passes, the decryption device decrypts the obtained ciphertext by using the decryption strategy to obtain character information.
  • the control information further includes time control information; the step of decrypting the ciphertext by the terminal using the decryption policy to obtain the character information, the method comprising: acquiring the time control information by the terminal; receiving the clock information read by the decryption device; and receiving the clock information by the terminal The time control information is compared; if the comparison is passed, the terminal decrypts the ciphertext by using the decryption strategy to obtain character information.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication text.
  • the decryption device or the terminal decrypts the obtained ciphertext by using the decryption policy, and the step of obtaining the character information further includes: the decryption device or the terminal The first signature data is checked; if the verification is passed, the step of decrypting the obtained ciphertext by using the decryption strategy to obtain the character information is triggered.
  • An information processing method comprising: a terminal acquiring an encoded data packet, where the encoded data packet includes a communication body and a control body of the communication body, wherein the communication body includes a plaintext and at least one piece of ciphertext, wherein the control information includes ciphertext identification information of the ciphertext;
  • the terminal displays the communication text; after receiving the decryption request, the terminal queries the decryption device for the decryption strategy corresponding to the ciphertext; the decryption device sends the decryption policy to the terminal; the terminal receives the decryption policy; the terminal acquires the ciphertext; and the terminal uses the decryption policy for the ciphertext Decryption processing is performed to obtain character information; and the terminal outputs character information.
  • the step of obtaining the ciphertext by the terminal includes: the terminal determining the ciphertext of the communication body according to the start location information and the end location information of the ciphertext in the control information; or the terminal receiving the decryption device according to the start location information of the ciphertext in the control information And the ciphertext of the communication body determined by the end location information.
  • the control information further includes time control information; the decryption device decrypts the obtained ciphertext by using the decryption strategy, and obtains the character information, the method includes: the decryption device acquires time control information; the decryption device reads the clock information of the decryption device; The device compares the clock information with the time control information; if the comparison passes, the decryption device decrypts the obtained ciphertext by using the decryption strategy to obtain character information.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication body.
  • the step of the terminal displaying the communication text further includes: the terminal transmitting the first signature data to the decryption device; and detecting the decryption device to the communication body After the first signature data check is passed, the communication body is displayed.
  • An information processing method comprising: a terminal acquiring an encoded data packet, where the encoded data packet includes a communication body and a communication body, wherein the communication body includes a plaintext and at least one piece of ciphertext, wherein the control information includes a ciphertext identifier of the ciphertext; Displaying the communication body; after receiving the decryption request, the terminal determines the ciphertext of the communication body according to the ciphertext identifier of the ciphertext in the control information; the terminal sends the ciphertext of the communication body to the decryption device; and the decryption device acquires the decryption strategy corresponding to the ciphertext The decryption device decrypts the obtained ciphertext by using a decryption strategy to obtain character information; and the decryption device triggers an operation of outputting the character information.
  • the step of the decryption device triggering the operation of outputting the character information comprises: the decryption device outputs the character information; or the decryption device transmits the character information to the terminal, and the terminal displays the character information.
  • the control information further includes time control information; the decryption device decrypts the obtained ciphertext by using the decryption strategy, and obtains the character information, the method includes: the decryption device acquires time control information; the decryption device reads the clock information of the decryption device; The device compares the clock information with the time control information; if the comparison passes, the decryption device decrypts the obtained ciphertext by using the decryption strategy to obtain character information.
  • the encoded data packet further includes first signature data obtained by performing a signature process on the communication text.
  • the decryption device decrypts the obtained ciphertext by using a decryption strategy, and the step of obtaining the character information further includes: the decryption device pairs the first signature The data is checked; if the check is passed, the step of decrypting the obtained ciphertext by using the decryption strategy to obtain the character information is triggered.
  • An information processing method comprising: an encryption device acquiring a communication body and an encryption request for partial encryption in the communication body; the encryption device determining the character information to be encrypted and the ciphertext identification information of the character information to be encrypted according to the encryption request, and according to the advance
  • the encryption policy is set, and the encrypted character information is encrypted to obtain at least one piece of ciphertext of the communication body; the encryption device generates ciphertext control information according to the ciphertext identification information; and the encryption device outputs at least one piece of ciphertext and control information.
  • the control information further includes time control information.
  • the method further includes: the encryption device signing the communication text, and generating first signature data for verifying the communication text; wherein the encoded data packet output by the encryption device further includes the first Signature data.
  • a decryption apparatus comprising: a first obtaining module, configured to acquire an encoded data packet, where the encoded data packet includes control information of a communication body and a communication body, wherein the communication body includes a plaintext and at least one piece of ciphertext, wherein the control information includes the ciphertext
  • the ciphertext identification information is connected to the first obtaining module, and is configured to determine the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information
  • the second obtaining module is connected to the first obtaining module, and is used for Obtaining a decryption strategy corresponding to the ciphertext
  • the decryption module is connected to the determining module and the second obtaining module, and is configured to decrypt the obtained ciphertext by using a decryption strategy to obtain character information
  • the triggering module is connected to the decrypting module, and is configured to trigger The operation of outputting character information.
  • the triggering module includes: an output unit, configured to output character information; or a sending unit, configured to send character information to the terminal, and display, by the terminal, character information.
  • the control information further includes time control information;
  • the decryption module includes: an acquisition unit, configured to acquire time control information; a reading unit, configured to read clock information of the decryption device; and a comparison unit, connected to the acquisition unit and the reading unit And the decryption unit is connected to the comparison unit, and is configured to perform decryption processing on the obtained ciphertext by using a decryption strategy to obtain character information when the comparison is passed.
  • the encoded data packet further includes first signature data obtained by performing a signature process on the communication text.
  • the decryption device further includes: a first verification module, connected to the decryption module, configured to perform verification on the first signature data, and After the verification is passed, the decryption module is triggered to perform decryption processing.
  • the control information further includes at least one segment of the encryption policy and/or the indication information of the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting the private key of the decryption device; and the decryption device obtains the ciphertext pair.
  • the decryption strategy includes: the decryption device decrypts the indication information by using the private key of the decryption device to obtain an encryption policy; and the decryption device acquires a decryption policy corresponding to the encryption policy.
  • the control information further includes second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed.
  • the method further includes: the decryption device pairs the second signature data The check is performed; if the check is passed, the decryption strategy corresponding to the ciphertext is obtained.
  • An information processing system comprising: a terminal and a decryption device, wherein: a first acquisition module in the terminal, configured to acquire an encoded data packet, where the encoded data packet includes control information of a communication body and a communication body, wherein the communication body includes a plaintext and at least one segment The cipher text, wherein the control information includes ciphertext identification information of the ciphertext; the display module in the terminal is connected to the first obtaining module, and is used for displaying the communication text; the query module in the terminal is connected to the display module, and is used for receiving the decryption After the request, the decryption device is queried to the decryption device for the decryption strategy; the second acquisition module in the decryption device is connected to the query module, and is used to obtain the decryption strategy corresponding to the ciphertext; the sending module in the decryption device, and the second acquisition module Connected, configured to send a decryption policy to the terminal; a receiving module in the
  • the third obtaining module includes:
  • a determining unit configured to determine a ciphertext of the communication body according to the start location information and the end location information of the ciphertext in the control information;
  • the receiving unit is configured to receive a ciphertext of the communication body determined by the decryption device according to the start position information and the end position information of the ciphertext in the control information.
  • the control information further includes time control information.
  • the decryption device further includes: a reading module, configured to read clock information of the decryption device; the sending module is further configured to be connected to the reading module, configured to send the clock information to the terminal;
  • the module includes: an obtaining unit, configured to acquire time control information; a receiving unit, configured to receive clock information of the decrypting device; and a comparing unit, connected to the acquiring unit and the receiving unit, configured to compare the clock information with the time control information;
  • the decryption unit is connected to the comparison unit, and is configured to decrypt the obtained ciphertext by using a decryption strategy to obtain character information when the comparison is passed.
  • the encoded data packet further includes first signature data obtained by performing a signature process on the communication body;
  • the display module includes: a sending unit, configured to send the first signature data to the decryption device; and a display unit, configured to detect the use of the decryption device After the first signature data passes the signature verification of the communication text, the communication body is displayed;
  • the decryption device further includes: a first verification module, connected to the sending unit, configured to perform verification of the signature of the communication text by using the first signature data, The result of the verification is obtained;
  • the third sending unit is connected to the first verification module and the display unit, and is configured to send the verification result.
  • An information processing system comprising: a terminal and a decryption device, wherein: a first acquisition module in the terminal, configured to acquire an encoded data packet, where the encoded data packet includes control information of a communication body and a communication body, wherein the communication body includes a plaintext and at least one segment The ciphertext, where the control information includes the ciphertext identification information of the ciphertext; the display module in the terminal is connected to the first obtaining module, and is configured to display the communication body;
  • the determining module in the terminal is connected to the display module, and configured to determine, according to the ciphertext identification information of the ciphertext in the control information, the ciphertext of the communication body after receiving the decryption request;
  • the sending module in the terminal is connected to the determining module and the first acquiring module, and is configured to send the ciphertext of the communication body to the decrypting device;
  • the second acquiring module in the decrypting device is connected to the sending module, and is configured to obtain the ciphertext corresponding a decryption module;
  • a decryption module in the decryption device connected to the sending module and the second obtaining module, configured to decrypt the obtained ciphertext by using a decryption strategy to obtain character information;
  • the triggering module in the decrypting device is connected to the decrypting module, Used to trigger the operation of outputting character information.
  • the triggering module includes: an output unit, configured to output character information; or a sending unit, configured to send character information to the terminal, and display, by the terminal, character information.
  • the control information further includes time control information;
  • the decryption module includes: an acquisition unit, configured to acquire time control information; a reading unit, configured to read clock information of the decryption device; and a comparison unit, connected to the acquisition unit and the reading unit And the decryption unit is connected to the comparison unit, and is configured to perform decryption processing on the obtained ciphertext by using a decryption strategy to obtain character information when the comparison is passed.
  • the encoded data packet further includes first signature data obtained by performing a signature process on the communication text.
  • the decryption device further includes: a first verification module, connected to the decryption module, configured to perform verification on the first signature data, and After the verification is passed, the decryption module is triggered to perform decryption processing.
  • the control information further includes at least one segment of the encryption policy and/or the indication information of the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting the private key of the decryption device;
  • the instruction information is decrypted by using the private key of the decryption device to obtain an encryption policy, and then the decryption strategy corresponding to the encryption policy is obtained.
  • the control information further includes a second signature data that is processed by the at least one segment of the encryption policy and/or the indication information of the encryption policy.
  • the decryption device further includes: a second verification module, configured to perform verification on the second signature data, And after the verification pass, trigger the operation of obtaining the decryption strategy corresponding to the ciphertext.
  • An encryption device comprising: an obtaining module, configured to acquire a communication body and an encryption request for partial encryption in the communication body; and a determining module, connected to the obtaining module, configured to determine character information to be encrypted according to the encryption request, and to be encrypted The start location information and the end location information of the character information in the communication body; the encryption module is connected to the acquisition module, and is configured to encrypt the character information to be encrypted according to a preset encryption policy, to obtain at least one ciphertext of the communication body a first generation module, connected to the determination module and the encryption module, for using the start position information and the knot The bundle information and the encryption policy used by the communication body generate control information of the ciphertext; the output module is connected to the encryption module and the first generation module, and is configured to output the encoded data packet, where the encoded data packet includes: the plaintext unencrypted in the communication body , at least one ciphertext and control information.
  • the control information further includes time control information.
  • the encryption device further includes: a signature module, configured to sign the communication packet; a second generation module, connected to the signature module and the output module, configured to perform signature processing on the communication packet to obtain the first signature data;
  • the encoded data packet output by the output module further includes first signature data.
  • the present invention provides an encryption and decryption device and information processing information and system, and obtains encryption of only high security information by acquiring the information to be encrypted in the communication text.
  • the partial encryption of the communication text is realized, thereby reducing the number of encrypted objects and reducing the processing pressure of the encryption operation; similarly, after obtaining the partially encrypted communication text, only part of the content of the communication body is decrypted, and the decryption is reduced.
  • the number of objects reduces the processing pressure of the decryption operation. For devices with limited processing capabilities, such as electronic signature tokens, etc. are particularly applicable.
  • FIG. 1 is a schematic flowchart of an embodiment of an information processing method according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of an embodiment of an information processing method according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic flowchart of an embodiment of an information processing method according to Embodiment 3 of the present invention.
  • Embodiment 4 is a schematic flowchart of an embodiment of an information processing method according to Embodiment 4 of the present invention.
  • FIG. 5 is a schematic structural diagram of an embodiment of a decryption apparatus according to the present invention.
  • FIG. 6 is a schematic structural diagram of an embodiment of an information processing system according to the present invention.
  • FIG. 7 is a schematic structural diagram of another embodiment of an information processing system according to the present invention.
  • FIG. 8 is a schematic structural diagram of an embodiment of an encryption apparatus according to the present invention. detailed description
  • connection In the description of the present invention, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be fixed or detachable, for example, unless otherwise explicitly defined and defined. Connected, or connected integrally; can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • Connected, or connected integrally can be mechanical or electrical; can be directly connected, or indirectly connected through an intermediate medium, can be the internal communication of the two components.
  • the specific meaning of the above terms in the present invention can be understood in a specific case by those skilled in the art.
  • FIG. 1 is a schematic flowchart diagram of an embodiment of an information processing method according to Embodiment 1 of the present invention.
  • the method embodiment shown in Figure 1 includes:
  • Step 101 The decryption device acquires an encoded data packet, where the encoded data packet includes control information of the communication body and the communication body, where the communication body includes a plaintext and at least one piece of ciphertext, where the control information includes ciphertext identification information of the ciphertext;
  • the text includes two parts, one of which is plaintext and another part of ciphertext, wherein the ciphertext can be obtained by encrypting a continuous character in the communication body, or by encrypting a plurality of consecutive characters in the communication body.
  • the ciphertext identifier information is used to determine the location of the information contained in the ciphertext in the communication body, and may be the start location information and the end location information, or may be a representation of some differences and plaintext, such as font tilt. Or the expression of font emphasis can also be expressed by adding wavy lines, double horizontal lines or dashed lines below the cipher text.
  • the encryption policy of the ciphertext can be negotiated in advance without notification.
  • control information further includes indication information for indicating an encryption policy and/or an encryption policy, which may be an encryption policy itself, or identifier information for determining an encryption policy, such as a number of an encryption policy. If the identification information is used to determine the encryption policy, the amount of information transmitted by the information is less than the encryption policy itself, and since the content of the transmission is identification information, after the criminal obtains the number, the encryption corresponding to the identification information cannot be obtained. The policy also fails to obtain the corresponding decryption strategy, so that the ciphertext cannot be cracked, and the security of information transmission is ensured.
  • the encryption policy may include an encryption algorithm and/or an encryption key, which is used to indicate information of the decryption mode.
  • the control information includes a plurality of control entries, each control entry corresponding to a continuous character, and the start position and the end position information of each control entry are used to identify the consecutive characters.
  • the encryption policy is used to mark the encryption policy of the continuous character in the communication body.
  • the encryption policies corresponding to all consecutive characters may be the same, or multiple encryption policies may be used for multiple consecutive characters. If there are at least two encryption strategies used for multiple consecutive characters. Compared with the former, the same encryption strategy is used, and the latter uses different encryption strategies, which reduces the possibility of cracking and improves the security of information.
  • Step 102 The decryption device determines the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information.
  • Step 103 The decryption device acquires a decryption policy corresponding to the ciphertext;
  • the decryption policy may be pre-negotiated with the sender of the communication body.
  • the encryption and decryption policy includes an algorithm and a key, and one of them is pre-negotiated. In each communication, the negotiation is carried out by carrying the unnegotiated part through the control information.
  • control information further includes indication information of the at least one segment of the encryption policy and/or the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device.
  • the decryption device acquires the decryption policy corresponding to the ciphertext, and the method includes: the decryption device decrypts the indication information by using a private key of the decryption device to obtain an encryption policy; and the decryption device acquires the encryption policy Decrypt the strategy to ensure the security of the encryption policy.
  • the control information further includes: second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed; the decryption device further includes, before acquiring the decryption policy corresponding to the ciphertext, The decryption device performs verification on the second signature data; if the verification pass passes, the decryption policy corresponding to the ciphertext is obtained.
  • step 102 and step 103 can be interchanged.
  • Step 104 The decryption device decrypts the obtained ciphertext by using a decryption strategy to obtain character information.
  • the control information further includes time control information.
  • the step includes:
  • Step A The decryption device acquires time control information
  • the time control information is March 12, 2013 at 9:00 12:00.
  • Step A2 The decryption device reads clock information of the decryption device
  • the clock information is 10:45 on March 12, 2013.
  • Step A3 The decryption device compares the clock information with the time control information
  • time control information is used to control the decryption time of the communication text, and the receiver controlling the communication body obtains the communication text within a specific time range, thereby effectively controlling the reading of the communication text.
  • the purpose of time is used to control the decryption time of the communication text, and the receiver controlling the communication body obtains the communication text within a specific time range, thereby effectively controlling the reading of the communication text. The purpose of time.
  • the clock information of the decryption device of the present invention may be configured in a ciphertext manner.
  • an external device attempts to read the clock information of the decryption device, if there is no corresponding key, even if the clock information can be read, It is easy to tamper with it, thereby preventing information leakage caused by falsification of the clock information of the decryption device, and ensuring communication security.
  • Step A4 If the comparison is passed, the decryption device decrypts the obtained ciphertext by using a decryption strategy to obtain character information.
  • Step 105 The decryption device triggers an operation of outputting character information.
  • the output mode may be playing or displaying, but is not limited thereto.
  • the output operation of the character information can be performed in the following two ways:
  • Method 1 The decryption device directly outputs character information
  • the decryption device sends the character information to the terminal, and the terminal displays the character information.
  • the security of the terminal is low, in order to prevent the character information obtained by decrypting the ciphertext from being stolen, it is preferable to display the mode 1 to ensure the security of the information.
  • the terminal may acquire the start position information and the end position information in the control information, and restore the character information to the communication body according to the start position information and the end position information,
  • the communication body of the plain text is obtained, and the content of the communication is the plain text.
  • the content of the communication text is account X
  • the verification code of 50 yuan is Y
  • X and ⁇ are both ciphertext information.
  • the character information of X obtained after decryption is 123456789, and ⁇ is 000, then the terminal updates the content of the communication body displayed as the account number 123456789, and the check code of 50 yuan is 000.
  • the encoded data packet further includes first signature data for verifying the signature obtained by performing signature processing on the communication text; wherein the signed object can communicate with at least one of a plaintext and a ciphertext in the text.
  • the decrypting device decrypts the obtained ciphertext by using the decryption strategy, and the step of obtaining the character information further includes: the decrypting device performing the verification of the first signature data;
  • the step of decrypting the obtained ciphertext by using the decryption strategy to obtain the character information is triggered.
  • the identity authentication of the recipient of the communication body is realized, and other decryption devices having the same decryption strategy are prevented from parsing the communication body, thereby improving the security of the information.
  • the obtaining, by the decryption device, the encoded data packet is obtained by using the terminal, and specifically includes:
  • Step B l the terminal acquires the encoded data packet
  • Step B2 The terminal displays the communication body
  • the terminal displays the communication body.
  • the content of the communication body is the account X
  • the verification code of the expenditure of 50 yuan is Y
  • X and ⁇ are both ciphertext information.
  • the terminal and the decryption device may be connected through a peripheral interface of the terminal, such as a USB interface, or may be connected through a wireless or wired manner, such as Bluetooth, NFC interface, infrared, and the like.
  • the decryption device is the encoded data packet acquired after the terminal displays the communication text, the verification of the first signature data by the decryption device is performed before the terminal displays the communication body.
  • Embodiment 1 of the present invention after obtaining the partially encrypted communication text, only part of the content of the communication body is decrypted, the number of decrypted objects is reduced, and the processing pressure of the decryption operation is reduced, and the device with limited processing capability is Especially suitable for electronic signature tokens, etc.
  • Example 2
  • FIG. 2 is a schematic flowchart diagram of an embodiment of an information processing method according to Embodiment 2 of the present invention.
  • the method embodiment shown in Figure 2 includes:
  • Step 201 The terminal acquires an encoded data packet, where the encoded data packet includes control information of the communication body and the communication body, where the communication body includes a plaintext and at least one piece of ciphertext, where the control information includes ciphertext identifier information of the ciphertext;
  • the communication body includes two parts, one of which is a plaintext and another part of the ciphertext, wherein the ciphertext may be obtained by encrypting a continuous character in the communication body, or may be encrypting a plurality of consecutive characters in the communication body. After getting it.
  • the ciphertext identifier information is used to determine the location of the information contained in the ciphertext in the communication body, and may be the start location information and the end location information, or may be a representation of some differences and plaintext, such as font tilt. Or the expression of font emphasis can also be expressed by adding wavy lines, double horizontal lines or dashed lines below the cipher text.
  • the encryption policy of the ciphertext can be negotiated in advance without notification.
  • control information further includes indication information for indicating an encryption policy and/or an encryption policy, which may be an encryption policy itself, or identifier information for determining an encryption policy, such as a number of an encryption policy. If the identification information is used to determine the encryption policy, the amount of information transmitted by the information is less than the encryption policy itself, and since the content of the transmission is identification information, after the criminal obtains the number, the encryption corresponding to the identification information cannot be obtained. The policy also fails to obtain the corresponding decryption strategy, so that the ciphertext cannot be cracked, and the security of information transmission is ensured.
  • the encryption policy may include an encryption algorithm and/or an encryption key, which is used to indicate information of the decryption mode.
  • the control information includes a plurality of control entries, and each control The entry corresponds to a continuous character, and the start position and end position information of each control entry are used to identify the start and end positions of the continuous character in the communication body, and the encryption policy is used to mark the encryption of the continuous character in the communication body.
  • the encryption policies corresponding to all consecutive characters may be the same, or multiple encryption policies may be used for multiple consecutive characters. If there are at least two encryption strategies used for multiple consecutive characters. Compared with the former, the same encryption strategy is used, and the latter uses different encryption strategies, which reduces the possibility of cracking and improves the security of information.
  • the content of the communication text is account X
  • the verification code for spending 50 yuan is Y
  • X and ⁇ are both ciphertext.
  • the encryption policies of ciphertext X and ⁇ can be the same or different.
  • Step 202 The terminal displays the communication body.
  • the terminal displays the communication body.
  • the content of the communication body is the account X
  • the verification code of the expenditure of 50 yuan is ⁇ , where X and ⁇ are both ciphertext information.
  • Step 203 After receiving the decryption request, the terminal queries the decryption device for the decryption policy of the ciphertext; wherein, the terminal and the decryption device may be connected through a peripheral interface of the terminal, such as a USB interface, or may be wireless or wired. Connected, such as Bluetooth, NFC interface, infrared, etc.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication body; and the step of displaying the communication body by the terminal further includes:
  • the terminal sends the first signature data to the decryption device
  • the communication body After detecting that the decryption device passes the signature verification of the communication body by using the first signature data, the communication body is displayed. By verifying the communication text before decryption, the identity authentication of the recipient of the communication body is realized, and other decryption devices having the same decryption strategy are prevented from parsing the communication body, thereby improving the security of the information.
  • Step 204 The decryption device sends the decryption policy to the terminal.
  • the decryption policy may be pre-negotiated with the sender of the communication body.
  • the encryption and decryption policy includes an algorithm and a key, and one of them is pre-negotiated. In each communication, the negotiation is carried out by carrying the unnegotiated part through the control information.
  • control information further includes indication information of the at least one segment of the encryption policy and/or the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device.
  • the decryption device acquires the decryption policy corresponding to the ciphertext, and the method includes: the decryption device decrypts the indication information by using a private key of the decryption device to obtain an encryption policy; and the decryption device acquires the encryption policy Decrypt the strategy to ensure the security of the encryption policy.
  • the control information further includes: second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed; the decryption device further includes, before acquiring the decryption policy corresponding to the ciphertext, : said The decryption device performs verification on the second signature data; if the verification pass passes, the decryption policy corresponding to the ciphertext is obtained. After the data is signed, the encryption policy is further protected, and the security of the signature data is further improved.
  • Step 205 The terminal receives a decryption policy.
  • Step 206 The terminal acquires the ciphertext
  • the steps for the terminal to obtain the ciphertext include:
  • the terminal determines the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information;
  • the terminal receives the ciphertext of the communication body determined by the decryption device according to the ciphertext identification information of the ciphertext in the control information.
  • Step 207 The terminal decrypts the ciphertext by using a decryption policy to obtain character information.
  • control information further includes time control information; the step includes:
  • Step Cl the terminal acquires time control information
  • the time control information is March 12, 2013 at 9:00 12:00.
  • Step C2 The terminal receives clock information read and sent by the decryption device.
  • the clock information is 10:45 on March 12, 2013.
  • Step C3 The terminal compares the clock information with the time control information
  • the comparison is passed, and the ciphertext is allowed to be decrypted; otherwise, the comparison fails, and the process ends.
  • Step C4 If the comparison is passed, the terminal decrypts the obtained ciphertext by using a decryption strategy, and the character can be freely seen, and the decryption time of the communication text is controlled by the time control information before the decryption operation is performed.
  • the clock information of the decryption device of the present invention may be configured in a ciphertext manner.
  • an external device attempts to read the clock information of the decryption device, if there is no corresponding key, even if the clock information can be read, It is easy to tamper with it, thereby preventing information leakage caused by falsification of the clock information of the decryption device, and ensuring communication security.
  • Step 208 The terminal outputs character information.
  • the clock information of the decryption apparatus of the present invention may be configured in a ciphertext manner.
  • an external device attempts to read the clock information of the decryption device, if there is no corresponding key, even if the clock information can be read, It is easy to tamper with it, thereby preventing information leakage caused by falsification of the clock information of the decryption device, and ensuring communication security.
  • Embodiment 2 of the present invention after obtaining the partially encrypted communication text, only the content of the middle part of the communication body is decrypted, the number of decrypted objects is reduced, and the processing pressure of the decryption operation is reduced.
  • FIG. 3 is a schematic flowchart diagram of an embodiment of an information processing method according to Embodiment 3 of the present invention.
  • the method embodiment shown in FIG. 3 includes:
  • Step 301 The terminal acquires an encoded data packet, where the encoded data packet includes control information of the communication body and the communication body, where the communication body includes the plaintext and the at least one ciphertext, where the control information includes the ciphertext identification information of the ciphertext;
  • the communication body includes two parts, one of which is a plaintext and another part of the ciphertext, wherein the ciphertext may be obtained by encrypting a continuous character in the communication body, or may be encrypting a plurality of consecutive characters in the communication body. After getting it.
  • the ciphertext identifier information is used to determine the location of the information contained in the ciphertext in the communication body, and may be the start location information and the end location information, or may be a representation of some differences and plaintext, such as font tilt. Or the expression of font emphasis can also be expressed by adding wavy lines, double horizontal lines or dashed lines below the cipher text.
  • the encryption policy of the ciphertext can be negotiated in advance without notification.
  • control information further includes indication information for indicating an encryption policy and/or an encryption policy, which may be an encryption policy itself, or identifier information for determining an encryption policy, such as a number of an encryption policy. If the identification information is used to determine the encryption policy, the amount of information transmitted by the information is less than the encryption policy itself, and since the content of the transmission is identification information, after the criminal obtains the number, the encryption corresponding to the identification information cannot be obtained. The policy also fails to obtain the corresponding decryption strategy, so that the ciphertext cannot be cracked, and the security of information transmission is ensured.
  • the encryption policy may include an encryption algorithm and/or an encryption key, which is used to indicate information of the decryption mode.
  • the control information includes a plurality of control entries, each control entry corresponding to a continuous character, and the start position and the end position information of each control entry are used to identify the consecutive characters.
  • the encryption policy is used to mark the encryption policy of the continuous character in the communication body.
  • the encryption policies corresponding to all consecutive characters may be the same, or multiple encryption policies may be used for multiple consecutive characters. If there are at least two encryption strategies used for multiple consecutive characters. Compared with the former, the same encryption strategy is used, and the latter uses different encryption strategies, which reduces the possibility of cracking and improves the security of information.
  • the content of the communication text is account X
  • the verification code for spending 50 yuan is Y
  • X and ⁇ are both ciphertext.
  • the encryption policies of ciphertext X and ⁇ can be the same or different.
  • Step 302 The terminal displays the communication body.
  • the terminal displays the communication body.
  • the content of the communication body is the account X
  • the verification code of the expenditure of 50 yuan is ⁇ , where X and ⁇ are both ciphertext information.
  • Step 303 After receiving the decryption request, the terminal determines, according to the ciphertext identifier information of the ciphertext in the control information, the ciphertext of the communication body.
  • the content of the communication text is account X
  • the verification code of 50 yuan is Y
  • X and ⁇ are both ciphertext.
  • the content of the ciphertext is determined to be X and ⁇ according to the start location information and the end location information in the control information.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication body; and the step of displaying the communication body by the terminal further includes:
  • the terminal sends the first signature data to the decryption device
  • the communication body After detecting that the decryption device passes the signature verification of the communication body by using the first signature data, the communication body is displayed. By verifying the communication text before decryption, the identity authentication of the recipient of the communication body is realized, and other decryption devices having the same decryption strategy are prevented from parsing the communication body, thereby improving the security of the information.
  • Step 304 The terminal sends the ciphertext of the communication body to the decryption device.
  • the terminal and the decryption device may be connected through a peripheral interface of the terminal, such as a USB interface, or may be connected through a wireless or wired manner, such as Bluetooth, NFC interface, infrared, and the like.
  • Step 305 The decryption device acquires a decryption policy corresponding to the ciphertext
  • the decryption policy may be pre-negotiated with the sender of the communication body.
  • the encryption and decryption policy includes an algorithm and a key, and one of them is pre-negotiated. In each communication, the negotiation is carried out by carrying the unnegotiated part through the control information.
  • control information further includes indication information of the at least one segment of the encryption policy and/or the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device.
  • the decryption device acquires the decryption policy corresponding to the ciphertext, and the method includes: the decryption device decrypts the indication information by using a private key of the decryption device to obtain an encryption policy; and the decryption device acquires the encryption policy Decrypt the strategy to ensure the security of the encryption policy.
  • the control information further includes: second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed; the decryption device further includes, before acquiring the decryption policy corresponding to the ciphertext, The decryption device performs verification on the second signature data; if the verification pass passes, the decryption policy corresponding to the ciphertext is obtained.
  • Step 306 The decryption device decrypts the ciphertext by using a decryption policy to obtain character information.
  • control information further includes time control information; the step includes:
  • Step Cl the decryption device acquires time control information
  • the time control information is March 13, 3013, 9:00 13:00.
  • Step C3 The decryption device reads clock information of the decryption device
  • the clock information is 10:45 on March 13, 3013.
  • Step C3 The decryption device compares the clock information with the time control information; Specifically, it is determined whether the time information is within the range of the time control information record, and if it is within the range, the comparison is passed, and the ciphertext is allowed to be decrypted; otherwise, the comparison fails, and the process ends.
  • Step C4 If the comparison is passed, the decryption device decrypts the obtained ciphertext by using a decryption strategy to obtain character information.
  • the time control information is used to control the decryption time of the communication text, and the receiver controlling the communication body obtains the communication text within a specific time range, thereby effectively controlling the reading of the communication text.
  • the purpose of time is used to control the decryption time of the communication text, and the receiver controlling the communication body obtains the communication text within a specific time range, thereby effectively controlling the reading of the communication text. The purpose of time.
  • the clock information of the decryption device of the present invention may be configured in a ciphertext manner.
  • an external device attempts to read the clock information of the decryption device, if there is no corresponding key, even if the clock information can be read, It is easy to tamper with it, thereby preventing information leakage caused by falsification of the clock information of the decryption device, and ensuring communication security.
  • Step 309 The decryption device triggers an operation of outputting character information.
  • the decryption device outputs the character information; or the decryption device transmits the character information to a terminal, and the terminal displays the character information.
  • the clock information of the decryption apparatus of the present invention may be configured in a ciphertext manner.
  • an external device attempts to read the clock information of the decryption device, if there is no corresponding key, even if the clock information can be read, It is easy to tamper with it, thereby preventing information leakage caused by falsification of the clock information of the decryption device, and ensuring communication security.
  • FIG. 4 is a schematic flowchart diagram of an embodiment of an information processing method according to Embodiment 4 of the present invention.
  • the method embodiment shown in Figure 4 includes:
  • Step 401 The terminal acquires a communication body and an encryption request for partial encryption in the communication body.
  • the communication body is "Account 124456789, and the payment code of 50 yuan is 000.”, where the encryption request is to encrypt "124456789” and "000".
  • Step 402 The terminal sends the communication body and the encryption request to the encryption device.
  • the terminal and the encryption device may be connected through a peripheral interface of the terminal, such as a USB interface, or may be connected through a wireless or wired manner, such as Bluetooth, NFC interface, infrared, and the like.
  • Step 403 After receiving the encryption request, the encryption device determines, according to the encryption request, character information to be encrypted, and start position information and end position information of the character information to be encrypted in the communication body.
  • the obtained character information is "124456789” and "000", and the above character information is in the communication body. Start location information and end location information.
  • Step 404 The encryption device performs encryption processing on the encrypted character information according to a preset encryption policy, to obtain at least one ciphertext of the communication body.
  • the character information is two paragraphs, respectively "124456789” and "000", where the encryption can be the same or different.
  • Multiple encryption strategies are used in a communication body to reduce the possibility of information being cracked and improve information security.
  • Step 405 The encryption device generates control information of the ciphertext according to the start location information and the end information and an encryption policy used by the communication body.
  • the control information includes a plurality of control entries, each control entry corresponding to a continuous character, and the start position and the end position information of each control entry are used to identify the consecutive characters.
  • the indication information used to indicate the encryption policy and/or the encryption policy may be the encryption policy itself, or may be identification information used to determine the encryption policy, such as the number of the encryption policy. If the identification information is used to determine the encryption policy, the amount of information transmitted by the information is less than the encryption policy itself, and since the content of the transmission is identification information, after the criminal obtains the number, the encryption corresponding to the identification information cannot be obtained. The policy also fails to obtain the corresponding decryption strategy, so that the ciphertext cannot be cracked, and the security of information transmission is ensured.
  • the encryption policy may include an encryption algorithm and/or an encryption key, which is used to indicate information of the decryption mode.
  • control information further includes time control information, configured to determine, according to the time control information, whether to allow the ciphertext to be decrypted.
  • Step 406 The encryption device sends the ciphertext and the control information to the terminal.
  • Step 407 The terminal sends the encoded data packet, where the encoded data packet includes: the plaintext, the at least one ciphertext, and the control information that are not encrypted in the communication body.
  • control information further includes indication information of the at least one segment of the encryption policy and/or the encryption policy, where the indication information of the encryption policy and/or the encryption policy is encrypted by the private key of the decryption device. owned;
  • the control information further includes second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed;
  • the method further includes:
  • the decrypting device performs verification on the second signature data
  • FIG. 5 is a schematic structural diagram of an embodiment of a decryption apparatus according to the present invention. The apparatus embodiment shown in FIG.
  • a first obtaining module 501 configured to acquire an encoded data packet, where the encoded data packet includes control information of a communication body and a communication body, where the communication body includes a plaintext and at least one piece of ciphertext, wherein the control The information includes ciphertext identification information of the ciphertext;
  • the determining module 502 is connected to the first obtaining module 501, and configured to determine the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information;
  • the second obtaining module 503 is connected to the first obtaining module, and is configured to obtain a decryption policy corresponding to the ciphertext;
  • the decrypting module 504 is connected to the determining module 502 and the second obtaining module 503, and is configured to use the decryption strategy to obtain the secret
  • the text is decrypted to obtain character information;
  • the trigger module 505 is connected to the decryption module 505 and is configured to trigger an operation of outputting character information.
  • the trigger module 505 includes:
  • An output unit for outputting character information for outputting character information
  • the sending unit is configured to send character information to the terminal, and the terminal displays the character information.
  • control information further includes time control information
  • the decryption module 505 includes:
  • An obtaining unit configured to acquire time control information
  • a reading unit configured to read clock information of the decryption device
  • the comparison unit is connected to the acquisition unit and the reading unit, and is configured to compare the clock information with the time control information;
  • the decryption unit is connected to the comparison unit, and is configured to use the decryption strategy to obtain the secret when the comparison is passed.
  • the text is decrypted to obtain character information.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication body;
  • the decrypting device further includes:
  • the first verification module is connected to the decryption module, and is configured to perform verification on the first signature data, and pass the verification check to trigger the decryption module to perform decryption processing.
  • the control information further includes the at least one segment of the encryption policy and/or the indication information of the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device;
  • the second obtaining module is configured to decrypt the indication information by using a private key of the decryption device, obtain an encryption policy, and obtain a decryption policy corresponding to the encryption policy.
  • the control information further includes second signature data after the identification information of the at least one segment of the encryption policy and/or the encryption policy is signed;
  • the decryption device further includes:
  • a second verification module configured to perform verification on the second signature data, and trigger the operation of acquiring the decryption policy corresponding to the ciphertext after the verification is passed.
  • FIG. 6 is a schematic structural diagram of an embodiment of an information processing system according to the present invention.
  • the system embodiment shown in Figure 6 includes a terminal and a decryption device, wherein:
  • the first obtaining module 601 in the terminal is configured to obtain an encoded data packet, where the encoded data packet includes control information of the communication text and the communication body, where the communication body includes the plaintext and the at least one ciphertext, where the control information includes the ciphertext identifier of the ciphertext.
  • the display module 602 in the terminal is connected to the first obtaining module 601 and configured to display the communication body.
  • the query module 603 is connected to the display module 602, and configured to query the decryption device for a decryption policy corresponding to the ciphertext after receiving the decryption request;
  • the second obtaining module 604 in the decrypting device is connected to the query module 603, and configured to obtain a decryption policy corresponding to the ciphertext;
  • the sending module 605 in the decrypting device is connected to the second obtaining module 604, and configured to send the decryption policy to the terminal.
  • the receiving module 606 in the terminal is connected to the sending module 606, and configured to receive the decryption policy.
  • a third obtaining module 607 in the terminal configured to acquire the ciphertext
  • the decryption module 608 in the terminal is connected to the receiving module 606 and the third obtaining module 607, and is configured to decrypt the ciphertext by using a decryption policy to obtain character information.
  • An output module 609 in the terminal is connected to the decryption module 608 for outputting character information.
  • the third obtaining module 607 includes:
  • a determining unit configured to determine a ciphertext of the communication body according to the start location information and the end location information of the ciphertext in the control information;
  • the receiving unit is configured to receive a ciphertext of the communication body determined by the decryption device according to the start position information and the end position information of the ciphertext in the control information.
  • control information further includes time control information
  • the decryption device can also include a read module (not shown) for reading clock information of the decryption device.
  • the sending module 605 is connected to the reading module and is configured to send clock information to the terminal.
  • the decryption module 608 includes:
  • An obtaining unit configured to acquire time control information
  • a receiving unit configured to receive clock information of the decryption device
  • the comparison unit is connected to the acquisition unit and the receiving unit, and is configured to compare the clock information with the time control information;
  • the decryption unit is connected to the comparison unit, and is configured to use the decryption strategy to obtain the obtained ciphertext when the comparison is passed Decryption processing is performed to obtain character information.
  • the encoded data packet further includes first signature data obtained by performing signature processing on the communication body.
  • the display module 602 includes:
  • a sending unit configured to send first signature data to the decryption device
  • a display unit configured to display a communication body after detecting that the decryption device passes the signature verification of the communication body by using the first signature data
  • the decryption device also includes:
  • the first verification module is connected to the sending unit, and is configured to perform verification of the signature of the communication body by using the first signature data, and obtain the verification result;
  • the third sending unit is connected to the first verification module and the display unit, and is configured to send the verification result.
  • the control information further includes the at least one segment of the encryption policy and/or the indication information of the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device;
  • the second obtaining module is configured to decrypt the indication information by using a private key of the decryption device, obtain an encryption policy, and obtain a decryption policy corresponding to the encryption policy.
  • the control information further includes second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed;
  • the decryption device further includes:
  • a second verification module configured to perform verification on the second signature data, and trigger the operation of acquiring the decryption policy corresponding to the ciphertext after the verification is passed.
  • FIG. 7 is a schematic structural diagram of an embodiment of an information processing system provided by the present invention.
  • the system embodiment shown in Figure 7 includes a terminal and a decryption device, wherein:
  • the first obtaining module 701 of the terminal is configured to acquire an encoded data packet, where the encoded data packet includes a communication body and control information of the communication body, where the communication body includes a plaintext and at least one piece of ciphertext, where The control information includes ciphertext identification information of the ciphertext;
  • the display module 702 in the terminal is connected to the first obtaining module 701, and is configured to display the communication text.
  • the determining module 703 in the terminal is connected to the display module 702, and is configured to receive the decryption. After the request, determining the ciphertext of the communication body according to the ciphertext identification information of the ciphertext in the control information;
  • the sending module 704 of the terminal is connected to the determining module 703 and the first obtaining module 701, and configured to send the ciphertext of the communication body to the decrypting device;
  • the second obtaining module 705 of the decrypting device is connected to the sending module 704, and configured to acquire a decryption policy corresponding to the ciphertext;
  • the decryption module 706 in the decryption device is connected to the sending module 704 and the second obtaining module 705, and is configured to decrypt the obtained ciphertext by using the decryption policy to obtain character information.
  • the triggering module 707 in the decryption device is connected to the decryption module and is configured to trigger an operation of outputting the character information.
  • the trigger module 707 includes:
  • An output unit configured to output the character information
  • a sending unit configured to send the character information to the terminal, where the character information is displayed by the terminal.
  • the control information further includes time control information
  • the decryption module 706 includes:
  • An obtaining unit configured to acquire the time control information
  • a reading unit configured to read clock information of the decryption device
  • a comparison unit configured to connect the clock information with the time control information
  • the decryption unit is connected to the comparison unit, and configured to decrypt the obtained ciphertext by using the decryption strategy to obtain character information when the comparison is passed.
  • the encoded data packet further includes first signature data obtained by performing a signature process on the communication text.
  • the decryption device further includes:
  • the first verification module is connected to the decryption module, configured to perform verification on the first signature data, and pass the verification verification to trigger the decryption module to perform decryption processing.
  • the control information further includes the at least one segment of the encryption policy and/or the indication information of the encryption policy, where the indication information of the encryption policy and/or the encryption policy is obtained by encrypting and processing the private key of the decryption device;
  • the second obtaining module is configured to decrypt the indication information by using a private key of the decryption device, obtain an encryption policy, and obtain a decryption policy corresponding to the encryption policy.
  • the control information further includes second signature data after the at least one segment of the encryption policy and/or the indication information of the encryption policy is processed;
  • the decryption device further includes:
  • a second verification module configured to perform verification on the second signature data, and trigger the operation of acquiring the decryption policy corresponding to the ciphertext after the verification is passed.
  • FIG. 8 is a schematic structural diagram of an embodiment of an encryption apparatus according to the present invention.
  • the embodiment shown in FIG. 8 includes: an obtaining module 801, configured to acquire a communication body and an encryption request for partial encryption in the communication body; and a determining module 802, connected to the obtaining module 801, configured to determine, according to the encryption request, character information to be encrypted, And ciphertext identification information of the character information to be encrypted in the communication body;
  • the encryption module 803 is connected to the obtaining module 801, and configured to perform encryption processing on the encrypted character information according to a preset encryption policy to obtain at least one ciphertext of the communication body;
  • the first generation module 804 is connected to the determining module 802 and the encryption module 803, and is configured to generate control information of the ciphertext according to the ciphertext identification information;
  • the output module 805 is connected to the encryption module 803 and the first generation module 804 for outputting at least one piece of ciphertext and control information.
  • the control information further includes time control information.
  • the encryption device further includes:
  • a signature module configured to sign a communication message
  • a second generation module connected to the signature module and the output module, configured to perform signature processing on the communication packet to obtain first signature data
  • the encoded data packet output by the output module further includes first signature data.
  • the encryption device of the embodiment of the present invention obtains encryption of information with high security by acquiring the information to be encrypted in the communication text, thereby realizing partial encryption of the communication text, thereby reducing the number of encrypted objects and reducing encryption.
  • the processing pressure of the operation is especially applicable to devices with limited processing capabilities, such as electronic signature tokens.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented with any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. Integrated modules can also be stored on a computer readable storage medium if they are implemented as software functional modules and sold or used as stand-alone products.
  • the above-mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the description of the terms “one embodiment”, “some embodiments”, “example”, “specific example”, or “some examples” and the like means a specific feature described in connection with the embodiment or example.
  • a structure, material or feature is included in at least one embodiment or example of the invention.
  • the schematic representation of the above terms does not necessarily mean the same embodiment or example.
  • the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种加解密装置以及信息处理方法和系统,所述信息处理方法,包括:解密装置获取编码数据包,所述编码数据包包括通信正文和所述通信正文的控制信息,其中所述通信正文包括明文和至少一段密文,其中所述控制信息包括所述密文的密文标识信息;所述解密装置根据所述控制信息中所述密文的密文标识信息,确定所述通信正文的密文;所述解密装置获取所述密文对应的解密策略;所述解密装置利用所述解密策略对得到的所述密文进行解密处理,得到字符信息;所述解密装置触发输出所述字符信息的操作。

Description

一种加解密装置以及信息处理方法和系统 技术领域
本发明涉及电子技术领域, 尤其涉及一种加解密装置以及信息处理方法和系统。 背景技术
为了保证邮件、 即时信息等通信信息的安全, 现有技术中发送方会对通信信息的全文 进行加密处理后发出, 相应的, 接收方在接收到加密后的通信信息后, 通过对应的解密算 法得到该通信信息的全文, 才能得到通信信息的内容。 在实际应用中, 通常采用加解密装置对通信信息进行加密和解密, 但是在通信信息的 信息量过大时, 对于通信信息的全文的加 /解密处理会花费加解密装置的大量时间和内存, 影响加解密装置的处理速度, 降低了信息的输出速度。 发明内容
本发明旨在解决上述问题 /之一。
本发明提供如下技术方案:
一种信息处理方法, 包括: 解密装置获取编码数据包, 编码数据包包括通信正文和通 信正文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密 文标识信息; 解密装置根据控制信息中密文的密文标识信息, 确定通信正文的密文; 解密 装置获取密文对应的解密策略; 解密装置利用解密策略对得到的密文进行解密处理, 得到 字符信息; 解密装置触发输出字符信息的操作。
其中, 解密装置触发输出字符信息的操作的步骤包括: 解密装置输出字符信息; 或者 解密装置将字符信息发送至终端, 终端显示字符信息。
其中, 控制信息还包括时间控制信息; 解密装置利用解密策略对得到的密文进行解密 处理, 得到字符信息的步骤, 包括: 解密装置获取时间控制信息; 解密装置读取解密装置 的时钟信息; 解密装置将时钟信息与时间控制信息进行比对; 如果比对通过, 则解密装置 利用解密策略对得到的密文进行解密处理, 得到字符信息。
其中, 控制信息还包括时间控制信息; 终端利用解密策略对密文进行解密处理, 得到 字符信息的步骤, 包括: 终端获取时间控制信息; 终端接收解密装置读取到的时钟信息; 终端将时钟信息与时间控制信息进行比对; 如果比对通过, 终端利用解密策略对密文进行 解密处理, 得到字符信息。 其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 解密装置 或终端利用解密策略对得到的密文进行解密处理, 得到字符信息的步骤之前还包括: 解密 装置或终端对第一签名数据进行验签; 如果验签通过, 则触发利用解密策略对得到的密文 进行解密处理, 得到字符信息的步骤。
一种信息处理方法, 包括: 终端获取编码数据包, 编码数据包包括通信正文和通信正 文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文标 识信息; 终端显示通信正文; 终端在接收到解密请求后, 向解密装置查询密文对应的解密 策略; 解密装置将解密策略发送至终端; 终端接收解密策略; 终端获取密文; 终端利用解 密策略对密文进行解密处理, 得到字符信息; 终端输出字符信息。
其中, 终端获取密文的步骤包括: 终端根据控制信息中密文的起始位置信息和结束位 置信息, 确定通信正文的密文; 或者终端接收解密装置根据控制信息中密文的起始位置信 息和结束位置信息确定的通信正文的密文。
其中, 控制信息还包括时间控制信息; 解密装置利用解密策略对得到的密文进行解密 处理, 得到字符信息的步骤, 包括: 解密装置获取时间控制信息; 解密装置读取解密装置 的时钟信息; 解密装置将时钟信息与时间控制信息进行比对; 如果比对通过, 则解密装置 利用解密策略对得到的密文进行解密处理, 得到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 终端显示 通信正文的步骤之前还包括: 终端向解密装置发送第一签名数据; 在检测到解密装置对通 信正文的第一签名数据验签通过后, 显示通信正文。
一种信息处理方法, 包括: 终端获取编码数据包, 编码数据包包括通信正文和通信正 文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文标 识; 终端显示通信正文; 终端在接收到解密请求后, 根据控制信息中密文的密文标识确定 通信正文的密文; 终端将通信正文的密文发送给解密装置; 解密装置获取密文对应的解密 策略; 解密装置利用解密策略对得到的密文进行解密处理, 得到字符信息; 解密装置触发 输出字符信息的操作。
其中, 解密装置触发输出字符信息的操作的步骤包括: 解密装置输出字符信息; 或者 解密装置将字符信息发送至终端, 终端显示字符信息。
其中, 控制信息还包括时间控制信息; 解密装置利用解密策略对得到的密文进行解密 处理, 得到字符信息的步骤, 包括: 解密装置获取时间控制信息; 解密装置读取解密装置 的时钟信息; 解密装置将时钟信息与时间控制信息进行比对; 如果比对通过, 则解密装置 利用解密策略对得到的密文进行解密处理, 得到字符信息。 其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 解密装置 利用解密策略对得到的密文进行解密处理, 得到字符信息的步骤之前还包括: 解密装置对 第一签名数据进行验签; 如果验签通过, 则触发利用解密策略对得到的密文进行解密处理, 得到字符信息的步骤。
一种信息处理方法, 包括: 加密装置获取通信正文以及对通信正文中部分加密的加密 请求; 加密装置根据加密请求确定待加密的字符信息以及待加密的字符信息的密文标识信 息, 并根据预先设置的加密策略, 对待加密的字符信息进行加密处理, 得到通信正文的至 少一段密文; 加密装置根据密文标识信息生成密文的控制信息; 加密装置至少输出至少一 段密文以及控制信息。
其中, 控制信息还包括时间控制信息。
其中, 加密装置输出编码数据包的步骤之前, 还包括: 加密装置对通信正文进行签名, 并生成用于验签通信正文的第一签名数据; 其中, 加密装置输出的编码数据包还包括第一 签名数据。
一种解密装置, 包括: 第一获取模块, 用于获取编码数据包, 编码数据包包括通信正 文和通信正文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密 文的密文标识信息; 确定模块, 与第一获取模块相连, 用于根据控制信息中密文的密文标 识信息, 确定通信正文的密文; 第二获取模块, 与第一获取模块相连, 用于获取密文对应 的解密策略; 解密模块, 与确定模块和第二获取模块相连, 用于利用解密策略对得到的密 文进行解密处理, 得到字符信息; 触发模块, 与解密模块相连, 用于触发输出字符信息的 操作。
其中, 触发模块包括: 输出单元, 用于输出字符信息; 或者发送单元, 用于字符信息 发送至终端, 由终端显示字符信息。
其中, 控制信息还包括时间控制信息; 解密模块包括: 获取单元, 用于获取时间控制 信息; 读取单元, 用于读取解密装置的时钟信息; 比对单元, 与获取单元和读取单元相连, 用于将时钟信息与时间控制信息进行比对; 解密单元, 与比对单元相连, 用于在比对通过 时, 利用解密策略对得到的密文进行解密处理, 得到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 解密装置 还包括: 第一验签模块, 与解密模块相连, 用于对第一签名数据进行验签, 并在验签通过, 触发解密模块进行解密处理。
其中, 控制信息还包括至少一段的加密策略和 /或加密策略的指示信息, 其中加密策略 和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 解密装置获取密文对 应的解密策略, 包括: 解密装置利用解密装置的私钥解密指示信息, 得到加密策略; 解密 装置获取加密策略对应的解密策略。
其中, 控制信息还包括对至少一段的加密策略和 /或加密策略的指示信息签名处理后的 第二签名数据; 解密装置获取密文对应的解密策略之前, 还包括: 解密装置对第二签名数 据进行验签; 如果验签通过, 则获取密文对应的解密策略。
一种信息处理系统, 包括终端和解密装置, 其中: 终端中的第一获取模块, 用于获取 编码数据包, 编码数据包包括通信正文和通信正文的控制信息, 其中通信正文包括明文和 至少一段密文, 其中控制信息包括密文的密文标识信息; 终端中的显示模块, 与第一获取 模块相连, 用于显示通信正文; 终端中的查询模块, 显示模块相连, 用于在接收到解密请 求后, 向解密装置查询密文对应的解密策略; 解密装置中的第二获取模块, 与查询模块相 连, 用于获取密文对应的解密策略; 解密装置中的发送模块, 与第二获取模块相连, 用于 将解密策略发送至终端; 终端中的接收模块, 与发送模块相连, 用于接收解密策略; 终端 中的第三获取模块, 用于获取密文; 终端中的解密模块, 与接收模块和第三获取模块相连, 用于利用解密策略对密文进行解密处理, 得到字符信息; 终端中的输出模块, 与解密模块 相连, 用于输出字符信息。
其中, 第三获取模块包括:
确定单元, 用于根据控制信息中密文的起始位置信息和结束位置信息, 确定通信正文 的密文; 或者
接收单元, 用于接收解密装置根据控制信息中密文的起始位置信息和结束位置信息确 定的通信正文的密文。
其中, 控制信息还包括时间控制信息; 解密装置还包括: 读取模块, 用于读取解密装 置的时钟信息; 发送模块还用于与读取模块相连, 用于将时钟信息发送至终端; 解密模块 包括: 获取单元, 用于获取时间控制信息; 接收单元, 用于接收解密装置的时钟信息; 比 对单元, 与获取单元和接收单元相连, 用于将时钟信息与时间控制信息进行比对; 解密单 元, 与比对单元相连, 用于在比对通过时, 利用解密策略对得到的密文进行解密处理, 得 到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 显示模块 包括: 发送单元, 用于向解密装置发送第一签名数据; 显示单元, 用于在检测到解密装置 利用第一签名数据对通信正文的签名验签通过后, 显示通信正文; 解密装置还包括: 第一 验签模块, 与发送单元相连, 用于利用第一签名数据对通信正文的签名进行验签, 得到验 签结果; 第三发送单元, 与第一验签模块和显示单元相连, 用于发送验签结果。 一种信息处理系统, 包括终端和解密装置, 其中: 终端中的第一获取模块, 用于获取 编码数据包, 编码数据包包括通信正文和通信正文的控制信息, 其中通信正文包括明文和 至少一段密文, 其中控制信息包括密文的密文标识信息; 终端中的显示模块, 与第一获取 模块相连, 用于显示通信正文;
终端中的确定模块, 与显示模块相连, 用于在接收到解密请求后, 根据控制信息中密 文的密文标识信息确定通信正文的密文;
终端中的发送模块, 与确定模块和第一获取模块相连, 用于将通信正文的密文发送给 解密装置; 解密装置中的第二获取模块, 与发送模块相连, 用于获取密文对应的解密策略; 解密装置中的解密模块, 与发送模块和第二获取模块相连, 用于利用解密策略对得到的密 文进行解密处理, 得到字符信息; 解密装置中的触发模块, 与解密模块相连, 用于触发输 出字符信息的操作。
其中, 触发模块包括: 输出单元, 用于输出字符信息; 或者发送单元, 用于字符信息 发送至终端, 由终端显示字符信息。
其中, 控制信息还包括时间控制信息; 解密模块包括: 获取单元, 用于获取时间控制 信息; 读取单元, 用于读取解密装置的时钟信息; 比对单元, 与获取单元和读取单元相连, 用于将时钟信息与时间控制信息进行比对; 解密单元, 与比对单元相连, 用于在比对通过 时, 利用解密策略对得到的密文进行解密处理, 得到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 解密装置 还包括: 第一验签模块, 与解密模块相连, 用于对第一签名数据进行验签, 并在验签通过, 触发解密模块进行解密处理。
其中, 控制信息还包括至少一段的加密策略和 /或加密策略的指示信息, 其中加密策略 和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 第二获取模块用于利 用解密装置的私钥解密指示信息, 得到加密策略, 再获取加密策略对应的解密策略。
其中, 控制信息还包括对至少一段的加密策略和 /或加密策略的指示信息签名处理后的 第二签名数据; 解密装置还包括: 第二验证模块, 用于对第二签名数据进行验签, 并在验 签通过, 触发获取密文对应的解密策略的操作。
一种加密装置, 包括: 获取模块, 用于获取通信正文以及对通信正文中部分加密的加 密请求; 确定模块, 与获取模块相连, 用于根据加密请求确定待加密的字符信息、 以及待 加密的字符信息在通信正文中的起始位置信息和结束位置信息; 加密模块, 与获取模块相 连, 用于根据预先设置的加密策略, 对待加密的字符信息进行加密处理, 得到通信正文的 至少一段密文; 第一生成模块, 与确定模块和加密模块相连, 用于根据起始位置信息和结 束信息以及通信正文所使用的加密策略生成密文的控制信息; 输出模块, 与加密模块和第 一生成模块相连, 用于输出编码数据包, 编码数据包包括: 通信正文中未加密处理的明文、 至少一段密文以及控制信息。
其中, 控制信息还包括时间控制信息。
其中, 加密装置还包括: 签名模块, 用于对通信报文进行签名; 第二生成模块, 与签 名模块和输出模块相连, 用于对通信报文进行签名处理, 得到第一签名数据; 其中, 输出 模块输出的编码数据包还包括第一签名数据。
由上述本发明提供的技术方案可以看出, 本发明提供了一种加解密装置以及信息处理 信息和系统, 通过获取对通信正文中待加密信息的选取, 实现仅对安全性高的信息的加密, 实现对通信正文的部分加密, 从而减少了加密对象的数量, 降低了加密操作的处理压力; 同理, 在获取部分加密的通信正文后, 仅对通信正文中部分内容进行解密, 减少了解密对 象的数量, 降低了解密操作的处理压力。 对于处理能力有限的设备, 如电子签名令牌等尤 其适用。 附图说明
为了更清楚地说明本发明实施例的技术方案, 下面将对实施例描述中所需要使用的附 图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领 域的普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他附 图。
图 1为本发明实施例 1提供的信息处理方法实施例的流程示意图;
图 2为本发明实施例 2提供的信息处理方法实施例的流程示意图;
图 3为本发明实施例 3提供的信息处理方法实施例的流程示意图;
图 4为本发明实施例 4提供的信息处理方法实施例的流程示意图;
图 5为本发明提供的一种解密装置实施例的结构示意图;
图 6为本发明提供的一种信息处理系统实施例的结构示意图;
图 7为本发明提供的另一种信息处理系统实施例的结构示意图; 图 8为本发明提供的一种加密装置实施例的结构示意图。 具体实施方式
下面结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描 述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发 明的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例, 都属于本发明的保护范围。
在本发明的描述中, 需要理解的是, 术语"中心"、 "纵向"、 "横向"、 "上"、 "下"、 "前"、 "后"、 "左"、 "右"、 "竖直"、 "水平"、 "顶"、 "底"、 "内"、 "外"等指示的方位或位置关系为 基于附图所示的方位或位置关系, 仅是为了便于描述本发明和简化描述, 而不是指示或暗 示所指的装置或元件必须具有特定的方位、 以特定的方位构造和操作, 因此不能理解为对 本发明的限制。 此外, 术语"第一"、 "第二 "仅用于描述目的, 而不能理解为指示或暗示相 对重要性或数量或位置。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语"安装"、"相连"、 "连接 "应做广义理解, 例如, 可以是固定连接, 也可以是可拆卸连接, 或一体地连接; 可 以是机械连接, 也可以是电连接; 可以是直接相连, 也可以通过中间媒介间接相连, 可以 是两个元件内部的连通。 对于本领域的普通技术人员而言, 可以具体情况理解上述术语在 本发明中的具体含义。
下面将结合附图对本发明实施例作进一步地详细描述。
实施例 1
图 1为本发明实施例 1提供的信息处理方法实施例的流程示意图。 图 1所示方法实施 例包括:
步骤 101、 解密装置获取编码数据包, 编码数据包包括通信正文和通信正文的控制信 息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文标识信息; 具体的, 通信正文包括两部分, 其中一部分为明文, 另外一部分密文, 其中该密文可 以是对通信正文中一段连续的字符加密后得到的, 也可以是对通信正文中多段连续的字符 加密后得到的。
其中, 所述密文标识信息是用于确定密文所包含的信息在通信正文的位置的, 可以是 起始位置信息和结束位置信息, 也可以是一些区别与明文的表现形式, 如字体倾斜或字体 加重的表示方式, 也可以是在密文下方增加波浪线、 双横线或虚线的方式来表示。
其中, 所述密文的加密策略可以预先协商好的, 无需进行通知。
可选的, 所述控制信息还包括用于指示加密策略和 /或加密策略的指示信息可以为加密 策略本身, 也可以为用于确定加密策略的标识信息, 如加密策略的编号等。 如果采用标识 信息来确定加密策略, 其传输的信息的数据量要少于加密策略本身, 且由于传输的内容为 标识信息, 在不法分子获取到该编号后, 由于无法获知该标识信息对应的加密策略, 也无 法获取对应的解密策略, 从而不能破解该密文, 保证了信息传输的安全。
其中, 加密策略可以包括加密算法和 /或加密密钥, 用来指示解密方式的信息。 其中, 如果密文是由多段连续字符组成的, 则控制信息包括多个控制条目, 每个控制 条目对应一段连续字符, 每个控制条目的起始位置和结束位置信息用以标识该段连续字符 在通信正文的起始位置和结束位置, 加密策略用以标记该段连续字符在通信正文的加密策 略。
其中, 所有的连续字符对应的加密策略可以相同, 也可以多段连续字符使用多种加密 策略, 其中, 如果多段连续字符所使用的加密策略有至少两种。 相对于前者使用相同的加 密策略, 后者使用的加密策略不同, 降低破解的可能性, 提高了信息的安全性。
步骤 102、 解密装置根据控制信息中密文的密文标识信息, 确定通信正文的密文; 步骤 103、 解密装置获取密文对应的解密策略;
其中该解密策略可以是与通信正文的发送方预先协商好的, 当然, 加解密策略包括算 法和密钥, 其中对其中一个进行预先协商。 在每次通信时, 在通过控制信息携带未协商好 的部分进行协商。
具体的, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其 中所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 所述 解密装置获取所述密文对应的解密策略, 包括: 所述解密装置利用所述解密装置的私钥解 密所述指示信息, 得到加密策略; 所述解密装置获取所述加密策略对应的解密策略, 从而 保证加密策略的安全。
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据; 所述解密装置获取所述密文对应的解密策略之前, 还包括: 所述 解密装置对所述第二签名数据进行验签; 如果验签通过, 则获取所述密文对应的解密策略。
通过签名数据后, 实现对加密策略的进一步保护, 进一步提高签名数据的安全性。 其中, 步骤 102和步骤 103的执行顺序可以互换。
步骤 104、 解密装置利用解密策略对得到的密文进行解密处理, 得到字符信息; 其中, 优选的, 控制信息还包括时间控制信息; 本步骤包括:
步骤 Al、 解密装置获取时间控制信息;
例如, 时间控制信息为 2013年 3月 12日 9:00 12:00。
步骤 A2、 解密装置读取解密装置的时钟信息;
例如, 时钟信息为 2013年 3月 12日 10:45。
步骤 A3、 解密装置将时钟信息与时间控制信息进行比对;
具体来说, 判断该时间信息是否在该时间控制信息记录的范围内, 如果在该范围内, 则表示比对通过, 允许对密文进行解密操作; 否则, 比对不通过, 流程结束。 由上可以看出, 在进行解密操作之前, 利用时间控制信息对通信正文的解密时间进行 控制, 达到控制通信正文的接收方在特定时间范围内获取到通信正文的目的, 有效控制通 信正文的阅读时间的目的。
其中, 本发明的解密装置的时钟信息可以采用密文的方式配置, 当有外部设备试图读 取解密装置的时钟信息时, 如果没有对应的密钥, 则即使能读取到时钟信息, 也不能轻易 对其进行篡改, 从而防止解密装置的时钟信息被篡改而导致的信息泄漏, 保证通信的安全。
步骤 A4、 如果比对通过, 则解密装置利用解密策略对得到的密文进行解密处理, 得到 字符信息。
步骤 105、 解密装置触发输出字符信息的操作。
其中输出方式可以是播放或显示, 但不限于此。
具体的, 字符信息的输出操作可以有如下两种方式:
方式一: 解密装置直接输出字符信息;
方式二: 解密装置将字符信息发送至终端, 终端显示字符信息。
其中, 在终端的安全性低的情况下, 为了避免从密文解密得到的字符信息被窃取, 优 选采用方式一进行显示, 保证信息的安全。
在方式二中, 为了能够清楚完整的输出字符信息, 终端可以获取控制信息中的起始位 置信息和结束位置信息, 并根据起始位置信息和结束位置信息, 将字符信息还原到通信正 文中, 得到内容均为明文的通信正文, 并输出内容均为明文的通信正文。
例如, 通信正文内容为账号 X, 支出 50元的验签码为 Y, 其中 X和 Υ均为密文信息。 经过解密后得到的 X的字符信息为 123456789, Υ为 000,则终端将显示的通信正文内容更 新为账号 123456789, 支出 50元的验签码为 000。
可选的, 编码数据包还包括对通信正文进行签名处理后得到的签名进行验签的第一签 名数据; 其中签名的对象可以通信正文中明文和密文中的至少一个。
解密装置利用解密策略对得到的密文进行解密处理,得到字符信息的步骤之前还包括: 解密装置对第一签名数据进行验签;
如果验签通过, 则触发利用解密策略对得到的密文进行解密处理, 得到字符信息的步 骤。
通过在解密前对通信正文进行验签, 实现对通信正文的接收方的身份认证, 避免具有 相同解密策略的其他解密装置解析出该通信正文, 提高信息的安全性。
可选的, 解密装置获取编码数据包是通过与终端后得到的, 具体包括:
步骤 B l、 终端获取编码数据包; 步骤 B2、 终端显示通信正文;
具体的, 终端显示通信正文, 例如, 通信正文内容为账号 X, 支出 50元的验签码为 Y, 其中 X和 Υ均为密文信息。
步骤 Β3、 终端在接收到解密请求后, 将编码数据包发送给解密装置;
其中, 终端与解密装置可以通过终端的外设接口相连, 如 USB接口等, 也可以通过无 线或有线方式相连, 如蓝牙、 NFC接口、 红外等。
需要说明的是, 如果解密装置是在终端显示通信正文后才获取到的编码数据包, 则解 密装置对第一签名数据进行验签是在终端显示通信正文之前执行的。
本发明实施例 1提供的技术方案, 在获取部分加密的通信正文后, 仅对通信正文中部 分内容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力, 对于处理能力有 限的设备, 如电子签名令牌等尤其适用。 实施例 2
图 2为本发明实施例 2提供的信息处理方法实施例的流程示意图。 图 2所示方法实施 例包括:
步骤 201、 终端获取编码数据包, 编码数据包包括通信正文和通信正文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文标识信息;
具体的, 通信正文包括两部分, 其中一部分为明文, 另外一部分密文, 其中该密文可 以是对通信正文中一段连续的字符加密后得到的, 也可以是对通信正文中多段连续的字符 加密后得到的。
其中, 所述密文标识信息是用于确定密文所包含的信息在通信正文的位置的, 可以是 起始位置信息和结束位置信息, 也可以是一些区别与明文的表现形式, 如字体倾斜或字体 加重的表示方式, 也可以是在密文下方增加波浪线、 双横线或虚线的方式来表示。
其中, 所述密文的加密策略可以预先协商好的, 无需进行通知。
可选的, 所述控制信息还包括用于指示加密策略和 /或加密策略的指示信息可以为加密 策略本身, 也可以为用于确定加密策略的标识信息, 如加密策略的编号等。 如果采用标识 信息来确定加密策略, 其传输的信息的数据量要少于加密策略本身, 且由于传输的内容为 标识信息, 在不法分子获取到该编号后, 由于无法获知该标识信息对应的加密策略, 也无 法获取对应的解密策略, 从而不能破解该密文, 保证了信息传输的安全。
其中, 加密策略可以包括加密算法和 /或加密密钥, 用来指示解密方式的信息。
其中, 如果密文是由多段连续字符组成的, 则控制信息包括多个控制条目, 每个控制 条目对应一段连续字符, 每个控制条目的起始位置和结束位置信息用以标识该段连续字符 在通信正文的起始位置和结束位置, 加密策略用以标记该段连续字符在通信正文的加密策 略。
其中, 所有的连续字符对应的加密策略可以相同, 也可以多段连续字符使用多种加密 策略, 其中, 如果多段连续字符所使用的加密策略有至少两种。 相对于前者使用相同的加 密策略, 后者使用的加密策略不同, 降低破解的可能性, 提高了信息的安全性。
例如, 通信正文内容为账号 X, 支出 50元的验签码为 Y, 其中 X和 Υ均为密文。 密 文 X和 Υ的加密策略可以相同, 也可以不同。
步骤 202、 终端显示通信正文;
具体的, 终端显示通信正文, 例如, 通信正文内容为账号 X, 支出 50元的验签码为 Υ, 其中 X和 Υ均为密文信息。
步骤 203、 终端在接收到解密请求后, 向解密装置查询所述密文的解密策略; 其中, 终端与解密装置可以通过终端的外设接口相连, 如 USB接口等, 也可以通过无 线或有线方式相连, 如蓝牙、 NFC接口、 红外等。
可选的, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 终端显示通信正文的步骤之前还包括:
终端向解密装置发送第一签名数据;
在检测到解密装置利用第一签名数据对通信正文的签名验签通过后, 显示通信正文。 通过在解密前对通信正文进行验签, 实现对通信正文的接收方的身份认证, 避免具有 相同解密策略的其他解密装置解析出该通信正文, 提高信息的安全性。
步骤 204、 解密装置将解密策略发送至终端;
其中该解密策略可以是与通信正文的发送方预先协商好的, 当然, 加解密策略包括算 法和密钥, 其中对其中一个进行预先协商。 在每次通信时, 在通过控制信息携带未协商好 的部分进行协商。
具体的, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其 中所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 所述 解密装置获取所述密文对应的解密策略, 包括: 所述解密装置利用所述解密装置的私钥解 密所述指示信息, 得到加密策略; 所述解密装置获取所述加密策略对应的解密策略, 从而 保证加密策略的安全。
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据; 所述解密装置获取所述密文对应的解密策略之前, 还包括: 所述 解密装置对所述第二签名数据进行验签; 如果验签通过, 则获取所述密文对应的解密策略。 通过签名数据后, 实现对加密策略的进一步保护, 进一步提高签名数据的安全性。 步骤 205、 终端接收解密策略;
步骤 206、 终端获取密文;
其中, 终端获取密文的步骤包括:
终端根据控制信息中密文的密文标识信息, 确定通信正文的密文; 或者
终端接收解密装置根据控制信息中密文的密文标识信息确定的通信正文的密文。
步骤 207、 终端利用解密策略对密文进行解密处理, 得到字符信息;
其中, 优选的, 控制信息还包括时间控制信息; 本步骤包括:
步骤 Cl、 终端获取时间控制信息;
例如, 时间控制信息为 2013年 3月 12日 9:00 12:00。
步骤 C2、 终端接收解密装置读取并发送的时钟信息;
例如, 时钟信息为 2013年 3月 12日 10:45。
步骤 C3、 终端将时钟信息与时间控制信息进行比对;
具体来说, 判断该时间信息是否在该时间控制信息记录的范围内, 如果在该范围内, 则表示比对通过, 允许对密文进行解密操作; 否则, 比对不通过, 流程结束。
步骤 C4、 如果比对通过, 则终端利用解密策略对得到的密文进行解密处理, 得到字符 自 由上可以看出, 在进行解密操作之前, 利用时间控制信息对通信正文的解密时间进行 控制, 达到控制通信正文的接收方在特定时间范围内获取到通信正文的目的, 有效控制通 信正文的阅读时间的目的。
其中, 本发明的解密装置的时钟信息可以采用密文的方式配置, 当有外部设备试图读 取解密装置的时钟信息时, 如果没有对应的密钥, 则即使能读取到时钟信息, 也不能轻易 对其进行篡改, 从而防止解密装置的时钟信息被篡改而导致的信息泄漏, 保证通信的安全。
步骤 208、 终端输出字符信息。
另外, 本发明的解密装置的时钟信息可以采用密文的方式配置, 当有外部设备试图读 取解密装置的时钟信息时, 如果没有对应的密钥, 则即使能读取到时钟信息, 也不能轻易 对其进行篡改, 从而防止解密装置的时钟信息被篡改而导致的信息泄漏, 保证通信的安全。
本发明实施例 2提供的技术方案, 在获取部分加密的通信正文后, 仅对通信正文中部 分内容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力。
实施例 3 图 3为本发明实施例 3提供的信息处理方法实施例的流程示意图。 图 3所示方法实施 例包括:
步骤 301、 终端获取编码数据包, 编码数据包包括通信正文和通信正文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文标识信息;
具体的, 通信正文包括两部分, 其中一部分为明文, 另外一部分密文, 其中该密文可 以是对通信正文中一段连续的字符加密后得到的, 也可以是对通信正文中多段连续的字符 加密后得到的。
其中, 所述密文标识信息是用于确定密文所包含的信息在通信正文的位置的, 可以是 起始位置信息和结束位置信息, 也可以是一些区别与明文的表现形式, 如字体倾斜或字体 加重的表示方式, 也可以是在密文下方增加波浪线、 双横线或虚线的方式来表示。
其中, 所述密文的加密策略可以预先协商好的, 无需进行通知。
可选的, 所述控制信息还包括用于指示加密策略和 /或加密策略的指示信息可以为加密 策略本身, 也可以为用于确定加密策略的标识信息, 如加密策略的编号等。 如果采用标识 信息来确定加密策略, 其传输的信息的数据量要少于加密策略本身, 且由于传输的内容为 标识信息, 在不法分子获取到该编号后, 由于无法获知该标识信息对应的加密策略, 也无 法获取对应的解密策略, 从而不能破解该密文, 保证了信息传输的安全。
其中, 加密策略可以包括加密算法和 /或加密密钥, 用来指示解密方式的信息。
其中, 如果密文是由多段连续字符组成的, 则控制信息包括多个控制条目, 每个控制 条目对应一段连续字符, 每个控制条目的起始位置和结束位置信息用以标识该段连续字符 在通信正文的起始位置和结束位置, 加密策略用以标记该段连续字符在通信正文的加密策 略。
其中, 所有的连续字符对应的加密策略可以相同, 也可以多段连续字符使用多种加密 策略, 其中, 如果多段连续字符所使用的加密策略有至少两种。 相对于前者使用相同的加 密策略, 后者使用的加密策略不同, 降低破解的可能性, 提高了信息的安全性。
例如, 通信正文内容为账号 X, 支出 50元的验签码为 Y, 其中 X和 Υ均为密文。 密 文 X和 Υ的加密策略可以相同, 也可以不同。
步骤 302、 终端显示通信正文;
具体的, 终端显示通信正文, 例如, 通信正文内容为账号 X, 支出 50元的验签码为 Υ, 其中 X和 Υ均为密文信息。
步骤 303、 终端在接收到解密请求后, 根据所述控制信息中所述密文的密文标识信息 确定所述通信正文的密文; 例如, 通信正文内容为账号 X, 支出 50元的验签码为 Y, 其中 X和 Υ均为密文。 根 据控制信息中的起始位置信息和结束位置信息, 确定密文的内容为 X和 Υ。
可选的, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 终端显示通信正文的步骤之前还包括:
终端向解密装置发送第一签名数据;
在检测到解密装置利用第一签名数据对通信正文的签名验签通过后, 显示通信正文。 通过在解密前对通信正文进行验签, 实现对通信正文的接收方的身份认证, 避免具有 相同解密策略的其他解密装置解析出该通信正文, 提高信息的安全性。
步骤 304、 终端将所述通信正文的密文发送给所述解密装置。
其中, 终端与解密装置可以通过终端的外设接口相连, 如 USB接口等, 也可以通过无 线或有线方式相连, 如蓝牙、 NFC接口、 红外等。
步骤 305、 解密装置获取密文对应的解密策略;
其中该解密策略可以是与通信正文的发送方预先协商好的, 当然, 加解密策略包括算 法和密钥, 其中对其中一个进行预先协商。 在每次通信时, 在通过控制信息携带未协商好 的部分进行协商。
具体的, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其 中所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 所述 解密装置获取所述密文对应的解密策略, 包括: 所述解密装置利用所述解密装置的私钥解 密所述指示信息, 得到加密策略; 所述解密装置获取所述加密策略对应的解密策略, 从而 保证加密策略的安全。
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据; 所述解密装置获取所述密文对应的解密策略之前, 还包括: 所述 解密装置对所述第二签名数据进行验签; 如果验签通过, 则获取所述密文对应的解密策略。
通过签名数据后, 实现对加密策略的进一步保护, 进一步提高签名数据的安全性。 步骤 306、 解密装置利用解密策略对密文进行解密处理, 得到字符信息;
其中, 优选的, 控制信息还包括时间控制信息; 本步骤包括:
步骤 Cl、 解密装置获取时间控制信息;
例如, 时间控制信息为 3013年 3月 13日 9:00 13:00。
步骤 C3、 解密装置读取解密装置的时钟信息;
例如, 时钟信息为 3013年 3月 13日 10:45。
步骤 C3、 解密装置将时钟信息与时间控制信息进行比对; 具体来说, 判断该时间信息是否在该时间控制信息记录的范围内, 如果在该范围内, 则表示比对通过, 允许对密文进行解密操作; 否则, 比对不通过, 流程结束。
步骤 C4、 如果比对通过, 则解密装置利用解密策略对得到的密文进行解密处理, 得到 字符信息。
由上可以看出, 在进行解密操作之前, 利用时间控制信息对通信正文的解密时间进行 控制, 达到控制通信正文的接收方在特定时间范围内获取到通信正文的目的, 有效控制通 信正文的阅读时间的目的。
其中, 本发明的解密装置的时钟信息可以采用密文的方式配置, 当有外部设备试图读 取解密装置的时钟信息时, 如果没有对应的密钥, 则即使能读取到时钟信息, 也不能轻易 对其进行篡改, 从而防止解密装置的时钟信息被篡改而导致的信息泄漏, 保证通信的安全。
步骤 309、 解密装置触发输出字符信息的操作。
其中, 所述解密装置输出所述字符信息; 或者所述解密装置将所述字符信息发送至终 端, 所述终端显示所述字符信息。
另外, 本发明的解密装置的时钟信息可以采用密文的方式配置, 当有外部设备试图读 取解密装置的时钟信息时, 如果没有对应的密钥, 则即使能读取到时钟信息, 也不能轻易 对其进行篡改, 从而防止解密装置的时钟信息被篡改而导致的信息泄漏, 保证通信的安全。
本发明实施例 3提供的技术方案, 在获取部分加密的通信正文后, 仅对通信正文中部 分内容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力。 实施例 4
图 4为本发明实施例 4提供的信息处理方法实施例的流程示意图。 图 4所示方法实施 例包括:
步骤 401、 终端获取通信正文以及对通信正文中部分加密的加密请求;
例如, 通信正文为 "账号 124456789, 支出 50元的验签码为 000。 ", 其中加密请求为 对 " 124456789"和 "000"进行加密。
步骤 402、 终端将通信正文和加密请求发送给加密装置;
其中, 终端与加密装置可以通过终端的外设接口相连, 如 USB接口等, 也可以通过无 线或有线方式相连, 如蓝牙、 NFC接口、 红外等。
步骤 403、 加密装置在接收到加密请求后, 根据加密请求确定待加密的字符信息、 以 及待加密的字符信息在通信正文中的起始位置信息和结束位置信息;
在本例中, 获取的字符信息为 " 124456789"和 "000", 以及上述字符信息在通信正文 的起始位置信息和结束位置信息。
步骤 404、 加密装置根据预先设置的加密策略, 对待加密的字符信息进行加密处理, 得到通信正文的至少一个密文;
在本例中, 字符信息为两段, 分别为 " 124456789 "和 "000", 其中加密的方式可以是 相同的, 也可以是不同的。 在一个通信正文中采用多个加密策略, 可以降低信息被破解的 可能, 提高信息的安全性。
步骤 405、 加密装置根据起始位置信息和结束信息以及通信正文所使用的加密策略生 成密文的控制信息;
需要说明的是, 如果字符信息为至少两段, 则控制信息包括多个控制条目, 每个控制 条目对应一段连续字符, 每个控制条目的起始位置和结束位置信息用以标识该段连续字符 在通信正文的起始位置和结束位置, 用于指示加密策略和 /或加密策略的指示信息可以为加 密策略本身, 也可以为用于确定加密策略的标识信息, 如加密策略的编号等。 如果采用标 识信息来确定加密策略, 其传输的信息的数据量要少于加密策略本身, 且由于传输的内容 为标识信息, 在不法分子获取到该编号后, 由于无法获知该标识信息对应的加密策略, 也 无法获取对应的解密策略, 从而不能破解该密文, 保证了信息传输的安全。
其中, 加密策略可以包括加密算法和 /或加密密钥, 用来指示解密方式的信息。
可选的, 控制信息还包括时间控制信息, 用以根据时间控制信息判断是否允许对密文 进行解密操作。
步骤 406、 加密装置将密文以及控制信息发送给终端;
步骤 407、 终端发送编码数据包, 编码数据包包括: 通信正文中未加密处理的明文、 至少一个密文以及控制信息。
其中可选的, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信 息, 其中所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到 的;
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据;
所述解密装置获取所述密文对应的解密策略之前, 还包括:
所述解密装置对所述第二签名数据进行验签;
如果验签通过, 则获取所述密文对应的解密策略。 本发明实施例 4提供的技术方案, 通过获取对通信正文中待加密信息的选取, 实现仅 对安全性高的信息的加密, 实现对通信正文的部分加密, 从而减少了加密对象的数量, 降 低了加密操作的处理压力, 对于处理能力有限的设备, 如电子签名令牌等尤其适用。 图 5为本发明提供的一种解密装置实施例的结构示意图。 图 5所示装置实施例包括: 第一获取模块 501, 用于获取编码数据包, 编码数据包包括通信正文和通信正文的控 制信息, 其中通信正文包括明文和至少一段密文, 其中所述控制信息包括所述密文的密文 标识信息;
确定模块 502, 与第一获取模块 501相连, 用于根据控制信息中密文的密文标识信息, 确定通信正文的密文;
第二获取模块 503, 与第一获取模块相连, 用于获取所述密文对应的解密策略; 解密模块 504, 与确定模块 502和第二获取模块 503相连, 用于利用解密策略对得到 的密文进行解密处理, 得到字符信息;
触发模块 505, 与解密模块 505相连, 用于触发输出字符信息的操作。
其中, 触发模块 505包括:
输出单元, 用于输出字符信息; 或者
发送单元, 用于字符信息发送至终端, 由终端显示字符信息。
其中, 控制信息还包括时间控制信息;
解密模块 505包括:
获取单元, 用于获取时间控制信息;
读取单元, 用于读取解密装置的时钟信息;
比对单元, 与获取单元和读取单元相连, 用于将时钟信息与时间控制信息进行比对; 解密单元, 与比对单元相连, 用于在比对通过时, 利用解密策略对得到的密文进行解 密处理, 得到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 解密装置还包括:
第一验签模块, 与解密模块相连, 用于对第一签名数据进行验签, 并在验签通过, 触 发解密模块进行解密处理。
其中, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中 所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的;
第二获取模块用于利用所述解密装置的私钥解密所述指示信息, 得到加密策略, 再获 取所述加密策略对应的解密策略。 其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据;
所述解密装置还包括:
第二验证模块, 用于对所述第二签名数据进行验签, 并在验签通过, 触发获取所述密 文对应的解密策略的操作。
本发明提供的装置技术方案, 在获取部分加密的通信正文后, 仅对通信正文中部分内 容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力, 对于处理能力有限的 设备, 如电子签名令牌等尤其适用。 图 6为本发明提供的一种信息处理系统实施例的结构示意图。 图 6所示系统实施例包 括终端和解密装置, 其中:
终端中的第一获取模块 601, 用于获取编码数据包, 编码数据包包括通信正文和通信 正文的控制信息, 其中通信正文包括明文和至少一段密文, 其中控制信息包括密文的密文 标识信息;
终端中的显示模块 602, 与第一获取模块 601相连, 用于显示通信正文;
终端中的查询模块 603, 与显示模块 602相连, 用于在接收到解密请求后, 向所述解 密装置查询所述密文对应的解密策略;
解密装置中的第二获取模块 604, 与查询模块 603相连, 用于获取密文对应的解密策 略;
解密装置中的发送模块 605, 与第二获取模块 604相连, 用于将解密策略发送至终端; 终端中的接收模块 606, 与发送模块 606相连, 用于接收解密策略;
终端中的第三获取模块 607, 用于获取密文;
终端中的解密模块 608, 与接收模块 606和第三获取模块 607相连, 用于利用解密策 略对密文进行解密处理, 得到字符信息;
终端中的输出模块 609, 与解密模块 608相连, 用于输出字符信息。
其中, 第三获取模块 607包括:
确定单元, 用于根据控制信息中密文的起始位置信息和结束位置信息, 确定通信正文 的密文; 或者
接收单元, 用于接收解密装置根据控制信息中密文的起始位置信息和结束位置信息确 定的通信正文的密文。
其中, 控制信息还包括时间控制信息; 解密装置还可包括读取模块 (未示出), 用于读取解密装置的时钟信息。
发送模块 605与读取模块相连, 用于将时钟信息发送至终端。
解密模块 608包括:
获取单元, 用于获取时间控制信息;
接收单元, 用于接收解密装置的时钟信息;
比对单元, 与获取单元和接收单元相连, 用于将时钟信息与时间控制信息进行比对; 解密单元, 与比对单元相连, 用于在比对通过时, 利用解密策略对得到的密文进行解 密处理, 得到字符信息。
其中, 编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 显示模块 602包括:
发送单元, 用于向解密装置发送第一签名数据;
显示单元, 用于在检测到解密装置利用第一签名数据对通信正文的签名验签通过后, 显示通信正文;
解密装置还包括:
第一验签模块, 与发送单元相连, 用于利用第一签名数据对通信正文的签名进行验签, 得到验签结果;
第三发送单元, 与第一验签模块和显示单元相连, 用于发送验签结果。
其中, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中 所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的;
第二获取模块用于利用所述解密装置的私钥解密所述指示信息, 得到加密策略, 再获 取所述加密策略对应的解密策略。
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据;
所述解密装置还包括:
第二验证模块, 用于对所述第二签名数据进行验签, 并在验签通过, 触发获取所述密 文对应的解密策略的操作。
本发明提供的信息处理系统, 在获取部分加密的通信正文后, 仅对通信正文中部分内 容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力。 图 7为本发明提供的信息处理系统实施例的结构示意图。 图 7所示系统实施例包括终 端和解密装置, 其中: 所述终端中的第一获取模块 701, 用于获取编码数据包, 所述编码数据包包括通信正 文和所述通信正文的控制信息, 其中所述通信正文包括明文和至少一段密文, 其中所述控 制信息包括所述密文的密文标识信息;
所述终端中的显示模块 702, 与所述第一获取模块 701相连, 用于显示所述通信正文; 所述终端中的确定模块 703, 与所述显示模块 702相连, 用于在接收到解密请求后, 根据所述控制信息中所述密文的密文标识信息确定所述通信正文的密文;
所述终端中的发送模块 704, 与所述确定模块 703和所述第一获取模块 701相连, 用 于将所述通信正文的密文发送给所述解密装置;
所述解密装置中的第二获取模块 705, 与所述发送模块 704相连, 用于获取所述密文 对应的解密策略;
所述解密装置中的解密模块 706, 与所述发送模块 704和所述第二获取模块 705相连, 用于利用所述解密策略对得到的所述密文进行解密处理, 得到字符信息;
所述解密装置中的触发模块 707, 与所述解密模块相连, 用于触发输出所述字符信息 的操作。
其中, 所述触发模块 707包括:
输出单元, 用于输出所述字符信息; 或者
发送单元, 用于所述字符信息发送至终端, 由所述终端显示所述字符信息。
其中, 所述控制信息还包括时间控制信息;
所述解密模块 706包括:
获取单元, 用于获取所述时间控制信息;
读取单元, 用于读取所述解密装置的时钟信息;
比对单元, 与所述获取单元和所述读取单元相连, 用于将所述时钟信息与所述时间控 制信息进行比对;
解密单元, 与所述比对单元相连, 用于在比对通过时, 利用所述解密策略对得到的所 述密文进行解密处理, 得到字符信息。
其中, 所述编码数据包还包括对通信正文进行签名处理后得到的第一签名数据; 所述解密装置还包括:
第一验签模块, 与所述解密模块相连, 用于对所述第一签名数据进行验签, 并在验签 通过, 触发解密模块进行解密处理。
其中, 所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中 所述加密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的; 第二获取模块用于利用所述解密装置的私钥解密所述指示信息, 得到加密策略, 再获 取所述加密策略对应的解密策略。
其中, 所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名 处理后的第二签名数据;
所述解密装置还包括:
第二验证模块, 用于对所述第二签名数据进行验签, 并在验签通过, 触发获取所述密 文对应的解密策略的操作。
本发明提供的信息处理系统, 在获取部分加密的通信正文后, 仅对通信正文中部分内 容进行解密, 减少了解密对象的数量, 降低了解密操作的处理压力。 图 8为本发明提供的一种加密装置实施例的结构示意图。 图 8所示实施例包括: 获取模块 801, 用于获取通信正文以及对通信正文中部分加密的加密请求; 确定模块 802, 与获取模块 801相连, 用于根据加密请求确定待加密的字符信息、 以 及待加密的字符信息在通信正文中的密文标识信息;
加密模块 803, 与获取模块 801相连, 用于根据预先设置的加密策略, 对待加密的字 符信息进行加密处理, 得到通信正文的至少一段密文;
第一生成模块 804, 与确定模块 802和加密模块 803相连, 用于根据密文标识信息生 成密文的控制信息;
输出模块 805, 与加密模块 803和第一生成模块 804相连, 用于至少输出至少一段密 文以及控制信息。
其中, 控制信息还包括时间控制信息。
其中, 加密装置还包括:
签名模块, 用于对通信报文进行签名;
第二生成模块, 与签名模块和输出模块相连, 用于对所述通信报文进行签名处理, 得 到第一签名数据;
其中, 输出模块输出的编码数据包还包括第一签名数据。
本发明实施例的加密装置, 通过获取对通信正文中待加密信息的选取, 实现仅对安全 性高的信息的加密, 实现对通信正文的部分加密, 从而减少了加密对象的数量, 降低了加 密操作的处理压力, 对于处理能力有限的设备, 如电子签名令牌等尤其适用。 流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为, 表示包括一个 或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、 片段或部分, 并且本发明的优选实施方式的范围包括另外的实现, 其中可以不按所示出或讨论的顺序, 包括根据所涉及的功能按基本同时的方式或按相反的顺序, 来执行功能, 这应被本发明的 实施例所属技术领域的技术人员所理解。
应当理解, 本发明的各部分可以用硬件、 软件、 固件或它们的组合来实现。 在上述实 施方式中, 多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或 固件来实现。 例如, 如果用硬件来实现, 和在另一实施方式中一样, 可用本领域公知的下 列技术中的任一项或他们的组合来实现: 具有用于对数据信号实现逻辑功能的逻辑门电路 的离散逻辑电路, 具有合适的组合逻辑门电路的专用集成电路, 可编程门阵列 (PGA), 现 场可编程门阵列 (FPGA) 等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可 以通过程序来指令相关的硬件完成, 的程序可以存储于一种计算机可读存储介质中, 该程 序在执行时, 包括方法实施例的步骤之一或其组合。
此外, 在本发明各个实施例中的各功能单元可以集成在一个处理模块中, 也可以是各 个单元单独物理存在, 也可以两个或两个以上单元集成在一个模块中。 上述集成的模块既 可以采用硬件的形式实现, 也可以采用软件功能模块的形式实现。 集成的模块如果以软件 功能模块的形式实现并作为独立的产品销售或使用时, 也可以存储在一个计算机可读取存 储介质中。
上述提到的存储介质可以是只读存储器, 磁盘或光盘等。
在本说明书的描述中, 参考术语"一个实施例"、 "一些实施例"、 "示例"、 "具体示例"、 或"一些示例"等的描述意指结合该实施例或示例描述的具体特征、 结构、 材料或者特点包 含于本发明的至少一个实施例或示例中。 在本说明书中, 对上述术语的示意性表述不一定 指的是相同的实施例或示例。 而且, 描述的具体特征、 结构、 材料或者特点可以在任何的 一个或多个实施例或示例中以合适的方式结合。
尽管上面已经示出和描述了本发明的实施例, 可以理解的是, 上述实施例是示例性的, 不能理解为对本发明的限制, 本领域的普通技术人员在不脱离本发明的原理和宗旨的情况 下在本发明的范围内可以对上述实施例进行变化、 修改、 替换和变型。 本发明的范围由所 附权利要求及其等同限定。

Claims

权利要求书
1、 一种信息处理方法, 其特征在于, 包括:
解密装置获取编码数据包,所述编码数据包包括通信正文和所述通信正文的控制信息, 其中所述通信正文包括明文和至少一段密文, 其中所述控制信息包括所述密文的密文标识 自 . 所述解密装置根据所述控制信息中所述密文的密文标识信息, 确定所述通信正文的密 文;
所述解密装置获取所述密文对应的解密策略;
所述解密装置利用所述解密策略对得到的所述密文进行解密处理, 得到字符信息; 所述解密装置触发输出所述字符信息的操作。
2、 一种信息处理方法, 其特征在于, 包括:
终端获取编码数据包, 所述编码数据包包括通信正文和所述通信正文的控制信息, 其 中所述通信正文包括明文和至少一段密文, 其中所述控制信息包括所述密文的密文标识信 息;
所述终端显示所述通信正文;
所述终端在接收到解密请求后, 向所述解密装置查询所述密文对应的解密策略; 所述解密装置获取所述密文对应的解密策略;
所述解密装置将所述解密策略发送至所述终端;
所述终端接收所述解密策略;
所述终端获取所述密文;
所述终端利用所述解密策略对所述密文进行解密处理, 得到字符信息;
所述终端输出所述字符信息。
3、 一种信息处理方法, 其特征在于, 包括:
终端获取编码数据包, 所述编码数据包包括通信正文和所述通信正文的控制信息, 其 中所述通信正文包括明文和至少一段密文, 其中所述控制信息包括所述密文的密文标识; 所述终端显示所述通信正文;
所述终端在接收到解密请求后, 根据所述控制信息中所述密文的密文标识确定所述通 信正文的密文;
所述终端将所述通信正文的密文发送给所述解密装置; 所述解密装置获取所述密文对应的解密策略;
所述解密装置利用所述解密策略对得到的所述密文进行解密处理, 得到字符信息; 所述解密装置触发输出所述字符信息的操作。
4、 根据权利要求 1或 3所述的方法, 其特征在于,
所述控制信息还包括时间控制信息;
所述解密装置利用所述解密策略对得到的所述密文进行解密处理, 得到字符信息的步 骤, 包括:
所述解密装置获取所述时间控制信息;
所述解密装置读取所述解密装置的时钟信息;
所述解密装置将所述时钟信息与所述时间控制信息进行比对;
如果比对通过, 则所述解密装置利用所述解密策略对得到的所述密文进行解密处理, 得到字符信息。
5、 根据权利要求 2所述的方法, 其特征在于,
所述控制信息还包括时间控制信息;
所述终端利用所述解密策略对所述密文进行解密处理, 得到字符信息的步骤包括: 所述终端获取所述时间控制信息;
所述终端接收所述解密装置读取到的时钟信息;
所述终端将所述时钟信息与所述时间控制信息进行比对;
如果比对通过, 则所述终端利用所述解密策略对所述密文进行解密处理, 得到字符信 息。
6、 根据权利要求 1至 5任一项所述的方法, 其特征在于,
所述编码数据包还包括对通信正文进行签名处理后得到的第一签名数据;
所述解密装置或所述终端利用所述解密策略对得到的所述密文进行解密处理, 得到字 符信息的步骤之前还包括:
所述解密装置或所述终端对所述第一签名数据进行验签;
如果验签通过, 则触发利用所述解密策略对得到的所述密文进行解密处理, 得到字符 信息的步骤。
7、 如权利要求 1至 6任一项所述的信息处理方法, 其特征在于,
所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中所述加 密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的;
所述解密装置获取所述密文对应的解密策略, 包括: 所述解密装置利用所述解密装置的私钥解密所述指示信息, 得到加密策略; 所述解密装置获取所述加密策略对应的解密策略。
8、 根据权利要求 7所述的方法, 其特征在于,
所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名处理 后的第二签名数据;
所述解密装置获取所述密文对应的解密策略之前, 还包括:
所述解密装置对所述第二签名数据进行验签;
如果验签通过, 则获取所述密文对应的解密策略。
9、 一种信息处理方法, 其特征在于, 包括:
加密装置获取通信正文以及对所述通信正文中部分加密的加密请求;
所述加密装置根据所述加密请求确定待加密的字符信息以及所述待加密的字符信息的 密文标识信息, 并根据预先设置的加密策略, 对所述待加密的字符信息进行加密处理, 得 到所述通信正文的至少一段密文;
所述加密装置根据所述密文标识信息生成所述密文的控制信息;
所述加密装置至少输出至少一段所述密文以及所述控制信息。
10、 根据权利要求 9所述的方法, 其特征在于,
所述控制信息还包括时间控制信息。
11、 根据权利要求 10所述的方法, 其特征在于, 所述加密装置输出编码数据包的步骤 之前, 还包括:
所述加密装置对所述通信正文进行签名, 并生成用于验签所述通信正文的第一签名数 据;
其中, 所述加密装置输出的编码数据包还包括所述第一签名数据。
12、 一种解密装置, 其特征在于, 包括:
第一获取模块, 用于获取编码数据包, 所述编码数据包包括通信正文和所述通信正文 的控制信息, 其中所述通信正文包括明文和至少一段密文, 其中所述控制信息包括所述密 文的密文标识信息;
确定模块, 与所述第一获取模块相连, 用于根据所述控制信息中所述密文的密文标识 信息, 确定所述通信正文的密文;
第二获取模块, 与所述第一获取模块相连, 用于获取所述密文对应的解密策略; 解密模块, 与所述确定模块和第二获取模块相连, 用于利用所述解密策略对得到的所 述密文进行解密处理, 得到字符信息; 触发模块, 与所述解密模块相连, 用于触发输出所述字符信息的操作。
13、 根据权利要求 12所述的装置, 其特征在于
所述控制信息还包括时间控制信息;
所述解密模块包括:
获取单元, 用于获取所述时间控制信息;
读取单元, 用于读取所述解密装置的时钟信息;
比对单元, 与所述获取单元和所述读取单元相连, 用于将所述时钟信息与所述时间控 制信息进行比对;
解密单元, 与所述比对单元相连, 用于在比对通过时, 利用所述解密策略对得到的所 述密文进行解密处理, 得到字符信息。
14、 根据权利要求 12或 13所述的装置, 其特征在于,
所述编码数据包还包括对通信正文进行签名处理后得到的第一签名数据;
所述解密装置还包括:
第一验签模块, 与所述解密模块相连, 用于对所述第一签名数据进行验签, 并在验签 通过, 触发解密模块进行解密处理。
15、 如权利要求 12至 14任一项所述的装置, 其特征在于,
所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中所述加 密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的;
第二获取模块用于利用所述解密装置的私钥解密所述指示信息, 得到加密策略, 再获 取所述加密策略对应的解密策略。
16、 根据权利要求 12至 15任一项所述的装置, 其特征在于,
所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名处理 后的第二签名数据;
所述解密装置还包括:
第二验证模块, 用于对所述第二签名数据进行验签, 并在验签通过, 触发获取所述密 文对应的解密策略的操作。
17、 一种信息处理系统, 其特征在于, 包括终端和解密装置, 其中:
所述终端中的第一获取模块, 用于获取编码数据包, 所述编码数据包包括通信正文和 所述通信正文的控制信息, 其中所述通信正文包括明文和至少一段密文, 其中所述控制信 息包括所述密文的密文标识信息;
所述终端中的显示模块, 与所述第一获取模块相连, 用于显示所述通信正文; 所述终端中的查询模块, 与所述显示模块相连, 用于在接收到解密请求后, 向所述解 密装置查询所述密文对应的解密策略;
所述解密装置中的第二获取模块, 与所述查询模块相连, 用于获取所述密文对应的解 密策略;
所述解密装置中的发送模块, 与所述第二获取模块相连, 用于将所述解密策略发送至 所述终端;
所述终端中的接收模块, 与所述发送模块相连, 用于接收所述解密策略;
所述终端中的第三获取模块, 用于获取所述密文;
所述终端中的解密模块, 与所述接收模块和第三获取模块相连, 用于利用所述解密策 略对所述密文进行解密处理, 得到字符信息;
所述终端中的输出模块, 与所述解密模块相连, 用于输出所述字符信息。
18、 一种信息处理系统, 其特征在于, 包括终端和解密装置, 其中:
所述终端中的第一获取模块, 用于获取编码数据包, 所述编码数据包包括通信正文和 所述通信正文的控制信息, 其中所述通信正文包括明文和至少一段密文, 其中所述控制信 息包括所述密文的密文标识信息;
所述终端中的显示模块, 与所述第一获取模块相连, 用于显示所述通信正文; 所述终端中的确定模块, 与所述显示模块相连, 用于在接收到解密请求后, 根据所述 控制信息中所述密文的密文标识信息确定所述通信正文的密文;
所述终端中的发送模块, 与所述确定模块和所述第一获取模块相连, 用于将所述通信 正文的密文发送给所述解密装置;
所述解密装置中的第二获取模块, 与所述发送模块相连, 用于获取所述密文对应的解 密策略;
所述解密装置中的解密模块, 与所述发送模块和所述第二获取模块相连, 用于利用所 述解密策略对得到的所述密文进行解密处理, 得到字符信息。
19、 根据权利要求 17所述的系统, 其特征在于,
所述控制信息还包括时间控制信息;
所述解密装置还包括: 读取模块, 用于读取所述解密装置的时钟信息;
所述解密装置中的发送模块还用于与所述读取模块相连, 用于将所述时钟信息发送至 所述终端;
所述终端中的解密模块包括:
获取单元, 用于获取所述时间控制信息; 接收单元, 用于接收所述解密装置读取到的时钟信息;
比对单元, 与所述获取单元和所述接收单元相连, 用于将所述时钟信息与所述时间控 制信息进行比对;
解密单元, 与所述比对单元相连, 用于在比对通过时, 利用所述解密策略对得到的所 述密文进行解密处理, 得到字符信息。
20、 根据权利要求 18所述的系统, 其特征在于
所述控制信息还包括时间控制信息;
所述解密模块包括:
获取单元, 用于获取所述时间控制信息;
读取单元, 用于读取所述解密装置的时钟信息;
比对单元, 与所述获取单元和所述读取单元相连, 用于将所述时钟信息与所述时间控 制信息进行比对;
解密单元, 与所述比对单元相连, 用于在比对通过时, 利用所述解密策略对得到的所 述密文进行解密处理, 得到字符信息。
21、 根据权利要求 17至 20任一项所述的系统, 其特征在于,
所述编码数据包还包括对通信正文进行签名处理后得到的第一签名数据;
所述解密装置还包括:
第一验签模块, 与所述解密模块相连, 用于对所述第一签名数据进行验签, 并在验签 通过, 触发解密模块进行解密处理。
22、 如权利要求 17至 21任一项所述的系统, 其特征在于,
所述控制信息还包括所述至少一段的加密策略和 /或加密策略的指示信息, 其中所述加 密策略和 /或加密策略的指示信息是通过解密装置的私钥加密处理后得到的;
第二获取模块用于利用所述解密装置的私钥解密所述指示信息, 得到加密策略, 再获 取所述加密策略对应的解密策略。
23、 根据权利要求 17至 22任一所述的系统, 其特征在于,
所述控制信息还包括对所述至少一段的加密策略和 /或加密策略的指示信息签名处理 后的第二签名数据;
所述解密装置还包括:
第二验证模块, 用于对所述第二签名数据进行验签, 并在验签通过, 触发获取所述密 文对应的解密策略的操作。
24、 一种加密装置, 其特征在于, 包括: 获取模块, 用于获取通信正文以及对所述通信正文中部分加密的加密请求; 确定模块, 与所述获取模块相连, 用于根据所述加密请求确定待加密的字符信息、 以 及所述待加密的字符信息的密文标识信息;
加密模块, 与所述获取模块相连, 用于根据预先设置的加密策略, 对所述待加密的字 符信息进行加密处理, 得到所述通信正文的至少一段密文;
第一生成模块, 与所述确定模块和所述加密模块相连, 用于根据所述密文标识信息生 成所述密文的控制信息;
输出模块, 与所述加密模块和所述第一生成模块相连, 用于至少输出至少一段所述密 文以及所述控制信息。
25、 根据权利要求 24所述的装置, 其特征在于,
所述控制信息还包括时间控制信息。
26、 根据权利要求 24或 25所述的装置, 其特征在于, 所述加密装置还包括: 签名模块, 用于对所述通信报文进行签名;
第二生成模块, 与所述签名模块和所述输出模块相连, 用于对所述通信报文进行签名 处理, 得到第一签名数据;
其中, 所述输出模块输出的编码数据包还包括所述第一签名数据。
PCT/CN2014/075933 2013-04-26 2014-04-22 一种加解密装置以及信息处理方法和系统 WO2014173288A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310150540.3 2013-04-26
CN201310150540.3A CN103281299B (zh) 2013-04-26 2013-04-26 一种加解密装置以及信息处理方法和系统

Publications (1)

Publication Number Publication Date
WO2014173288A1 true WO2014173288A1 (zh) 2014-10-30

Family

ID=49063746

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/075933 WO2014173288A1 (zh) 2013-04-26 2014-04-22 一种加解密装置以及信息处理方法和系统

Country Status (2)

Country Link
CN (1) CN103281299B (zh)
WO (1) WO2014173288A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3309993A4 (en) * 2016-02-27 2018-09-12 Huawei Technologies Co., Ltd. Method, device and system for processing vxlan packet
CN112888024A (zh) * 2019-11-29 2021-06-01 腾讯科技(深圳)有限公司 数据处理方法、装置、存储介质及电子设备

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281299B (zh) * 2013-04-26 2016-12-28 天地融科技股份有限公司 一种加解密装置以及信息处理方法和系统
CN106161762A (zh) * 2015-04-24 2016-11-23 神讯电脑(昆山)有限公司 显示数据的解密方法
CN107248951B (zh) * 2017-08-10 2018-12-04 北京明朝万达科技股份有限公司 一种邮件处理系统、方法及装置
CN108055127A (zh) * 2017-12-14 2018-05-18 吉旗(成都)科技有限公司 计算与数据分离支持热更新加密算法和密钥数据加密方法
CN110601814B (zh) * 2019-09-24 2021-08-27 深圳前海微众银行股份有限公司 联邦学习数据加密方法、装置、设备及可读存储介质
CN111212068B (zh) * 2019-12-31 2022-02-08 北京升鑫网络科技有限公司 一种输入法对文字加解密的方法
CN112153078B (zh) * 2020-10-26 2021-07-27 广州欧赛斯信息科技有限公司 一种基于时间释放的加密方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (zh) * 2004-10-28 2005-04-06 武汉大学 一种视频信息的加解密方法
GB2407740A (en) * 2003-11-01 2005-05-04 Hewlett Packard Development Co Identifier-based signcryption
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
CN101997880A (zh) * 2010-12-01 2011-03-30 湖南智源信息网络技术开发有限公司 一种用于网络页面或接口的安全验证方法及其装置
CN102254127A (zh) * 2011-08-11 2011-11-23 华为技术有限公司 文件的加密和解密方法、装置及系统
CN103281299A (zh) * 2013-04-26 2013-09-04 天地融科技股份有限公司 一种加解密装置以及信息处理方法和系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739406B (zh) * 2012-07-17 2014-12-10 飞天诚信科技股份有限公司 一种安全传输设备信息的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2407740A (en) * 2003-11-01 2005-05-04 Hewlett Packard Development Co Identifier-based signcryption
CN1604640A (zh) * 2004-10-28 2005-04-06 武汉大学 一种视频信息的加解密方法
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
CN101997880A (zh) * 2010-12-01 2011-03-30 湖南智源信息网络技术开发有限公司 一种用于网络页面或接口的安全验证方法及其装置
CN102254127A (zh) * 2011-08-11 2011-11-23 华为技术有限公司 文件的加密和解密方法、装置及系统
CN103281299A (zh) * 2013-04-26 2013-09-04 天地融科技股份有限公司 一种加解密装置以及信息处理方法和系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3309993A4 (en) * 2016-02-27 2018-09-12 Huawei Technologies Co., Ltd. Method, device and system for processing vxlan packet
CN112888024A (zh) * 2019-11-29 2021-06-01 腾讯科技(深圳)有限公司 数据处理方法、装置、存储介质及电子设备
CN112888024B (zh) * 2019-11-29 2023-03-21 腾讯科技(深圳)有限公司 数据处理方法、装置、存储介质及电子设备

Also Published As

Publication number Publication date
CN103281299A (zh) 2013-09-04
CN103281299B (zh) 2016-12-28

Similar Documents

Publication Publication Date Title
WO2014173288A1 (zh) 一种加解密装置以及信息处理方法和系统
US10021113B2 (en) System and method for an integrity focused authentication service
US11533297B2 (en) Secure communication channel with token renewal mechanism
KR101725847B1 (ko) 키 복원 공격들을 좌절시키기 위한 대책으로서 송신기-수신기 페어링을 위한 마스터 키 암호화 기능들
WO2018127081A1 (zh) 一种加密密钥获取方法及系统
CN103986583B (zh) 一种动态加密方法及其加密通信系统
WO2014161438A1 (zh) 动态口令牌、动态口令牌数据传输方法及系统
US9742565B2 (en) Method and system for backing up private key of electronic signature token
WO2015058596A1 (zh) 动态口令生成方法和系统、交易请求的处理方法和系统
KR20160035999A (ko) 데이터 통신 보안을 위한 방법, 장치 및 시스템
US9614827B2 (en) Secure user presence detection and authentication
US11399019B2 (en) Failure recovery mechanism to re-establish secured communications
US9712326B2 (en) Method and system for backing up private key of electronic signature token
CN101247605A (zh) 短信息加密、签名方法、移动终端及短信息加密系统
TWI526871B (zh) Server, user device, and user device and server interaction method
CN113811874A (zh) 加密数据验证方法
CN103108245B (zh) 一种智能电视支付密钥系统以及基于智能电视的支付方法
WO2014173199A1 (zh) 转换装置和显示系统
CN109618313B (zh) 一种车载蓝牙设备及其连接方法、系统
WO2014173233A1 (zh) 一种信息处理方法及解密装置
CN113115309A (zh) 车联网的数据处理方法、装置、存储介质和电子设备
WO2014187208A1 (zh) 一种备份电子签名令牌中私钥的方法和系统
WO2015000332A1 (zh) 一种发送签名数据的方法和电子签名令牌
WO2014187209A1 (zh) 一种备份电子签名令牌中信息的方法和系统
CN106022140B (zh) 身份证读取方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14787726

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14787726

Country of ref document: EP

Kind code of ref document: A1