WO2021139172A1 - 一种文件存储为音频实现加密的方法、装置和设备 - Google Patents
一种文件存储为音频实现加密的方法、装置和设备 Download PDFInfo
- Publication number
- WO2021139172A1 WO2021139172A1 PCT/CN2020/111367 CN2020111367W WO2021139172A1 WO 2021139172 A1 WO2021139172 A1 WO 2021139172A1 CN 2020111367 W CN2020111367 W CN 2020111367W WO 2021139172 A1 WO2021139172 A1 WO 2021139172A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- audio
- file
- encryption
- character
- encoding value
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Definitions
- the present invention relates to the field of computers, and more specifically, to a method, device and equipment for implementing encryption of file storage as audio.
- Data encryption is still the most reliable way for computer systems to protect information. It uses cryptographic technology to encrypt information and realize information concealment, thereby protecting the security of information.
- the purpose of the embodiments of the present invention is to propose a method and device for encrypting files stored as audio, converting ordinary non-encrypted files or files that have been encrypted by other means into audio information, completing the storage of file information and effectively Realize the encryption function.
- an aspect of the embodiments of the present invention provides a method for storing files as audio to achieve encryption, which includes the following steps:
- the reading the file to be encrypted to obtain the uniform character standard encoding value of each character of the file includes:
- the standard encoding value of the Unicode is hexadecimal, wherein the encoding value is 4 digits, and the encoding value of less than 4 digits is prefixed with 0.
- the applying the same function to calculate the Unicode encoding value to achieve obfuscated encryption includes:
- a specific value is inserted in the coded value string in a regular manner to disturb the regular format of the file.
- the creating an audio oscillator and filling the obfuscated and encrypted characters as an audio signal source into an array through the audio oscillator includes:
- One or more audio oscillators are created again to generate a noise signal, and the noise signal is combined with the audio signal source to achieve multi-audio mixing.
- the audio source of the noise signal adopts a sine wave, a triangle wave, a cosine wave, a sawtooth wave, or a custom waveform and frequency.
- the method is implemented through an audio API based on a JavaScript script of the browser.
- Another aspect of the embodiments of the present invention provides a method for decrypting a generated audio file to restore the file, which includes the following steps:
- the unified character standard encoding value is restored to the original character to obtain the original file information.
- Another aspect of the embodiments of the present invention provides an apparatus for storing files as audio to realize encryption, including:
- the file obtaining module is configured to read the file to be encrypted to obtain the uniform character standard encoding value of each character of the file;
- the obfuscated encryption module is configured to use the same function to calculate the Unicode encoding value to achieve obfuscated encryption;
- the first code conversion module is configured to create an audio oscillator, and use the audio oscillator to fill the obfuscated and encrypted characters as an audio signal source into an array;
- the second code conversion module is configured to create a volume node, associate the audio oscillator with the volume node, and associate the volume node with a destination output node, so as to output the array as an audio file through the destination output node .
- the first code conversion module is further configured to:
- One or more audio oscillators are created again to generate a noise signal, and the noise signal is combined with the audio signal source to achieve multi-audio mixing.
- Another aspect of the embodiments of the present invention provides a device for implementing file encryption and decryption, including:
- At least one processor At least one processor
- a memory stores a program code that can be run by a processor, and the program code implements any of the above-mentioned methods when being run by the processor.
- the present invention has the following beneficial technical effects: a method, device, and equipment for storing files as audio to realize encryption provided by the embodiments of the present invention is a method for converting ordinary non-encrypted files or files that have been encrypted by other means into audio information , Complete the storage of file information and effectively realize the encryption function, and the encryption and decryption process does not require specific software, which is simple, efficient and convenient.
- Fig. 1 is a flowchart of a method for storing files as audio to realize encryption according to the present invention
- Figure 2 is a schematic diagram of an example of a "strict" Unicode code value according to the present invention.
- Fig. 3 is a schematic diagram of the process of obfuscating audio source information according to the present invention.
- Fig. 4 is a schematic diagram of re-interpolating to confuse audio source strings according to the present invention.
- Figure 5 is a schematic diagram of a process of audio generation
- Fig. 6 is a schematic diagram of an audio source information array according to the present invention.
- Fig. 7 is a schematic diagram of combining noise and audio source signals according to the present invention.
- Fig. 8 is a schematic diagram of synthesizing an audio file according to the present invention according to the process shown in Fig. 5;
- FIG. 9 is a flowchart of a method for decrypting a generated audio file to restore the file according to the present invention.
- Fig. 10 is a schematic diagram of the hardware structure of a device for implementing file encryption and decryption according to the present invention.
- the embodiments of the present invention provide a method for storing files as audio to achieve encryption. As shown in FIG. 1, the method includes the following steps:
- Step S101 Read the file to be encrypted to obtain the unified character standard encoding value of each character of the file;
- Step S102 Use the same function to calculate the unified character standard encoding value to realize obfuscated encryption
- Step S103 creating an audio oscillator, and filling the obfuscated and encrypted characters as an audio signal source into an array through the audio oscillator;
- Step S104 Create a volume node, associate the audio oscillator with the volume node, and associate the volume node with a destination output node, so as to output the array as an audio file through the destination output node.
- the method is implemented through an audio API based on a JavaScript script of the browser.
- AudioContext Audio API
- HTML5 AudioContext interface of the browser script JavaScript After reading the file, the charCodeAt() method is used to obtain the Unicode encoding information of each character in the file.
- the file can be read by instantiating the object through the FileReader constructor of the browser. This command can call up the file selector to allow the user to select the file that needs to be encrypted.
- the reading the file to be encrypted to obtain the Unicode standard encoding value of each character of the file includes: the Unicode standard encoding value is hexadecimal, and the encoding value is 4 The number of digits, the coded value of less than 4 digits should be filled with 0.
- the JavaScript string manipulation method charCodeAt() to obtain the Unicode code value of each character; the value is hexadecimal, with a maximum of 4 digits, and a value less than 4 digits.
- 0 is made up of 4 digits to get the Unicode string of all source characters. Taking the "strict" character as an example, the result is shown in Figure 2.
- obfuscated encryption of the source information is performed, that is, the obtained Unicode character string of the source character string is calculated by a certain function to achieve a specific conversion. Therefore, the obfuscated source string is completed, and the purpose of encrypting the source array SourceOrigin is achieved. An obfuscated array is obtained, and the obtained obfuscated characters are sequentially placed into the audio source array.
- the implementation principle is shown in Figure 3.
- the applying the same function to calculate the Unicode encoding value to achieve obfuscated encryption includes: inserting a specific value in the encoded value string in a regular manner to disturb the law of the file format.
- a specific value is inserted again in a regular manner to make the file confused again, disturb the regular format of the file, and prevent malicious cracking of the file.
- the implementation principle is shown in Figure 4. .
- the audio node interface is an audio processing module, including an audio source, an audio output, and an intermediate processing module.
- Audio node modularization allows any connection between two audio nodes, each intermediate node (Gain) has input and output; the source node (Oscillator, oscillator) has no input, only one output; the destination node (Destination) has only one The input source has no output.
- the intermediate node can be set between the source node and the destination node.
- the audio source can be output directly, and all audio routing is performed in an audio context (AudioContext), as shown in Figure 5.
- an input source is created by the Oscillator audio oscillator, and the transcoded information of the file obtained in the previous step is filled as the audio signal source.
- Create an audio oscillator Oscillator fill the transcoded information of the file into an array as the audio signal source SourceOrigin, as shown in Figure 6.
- the signal source can be used as a sound signal source, including but not limited to data such as frequency, waveform, and amplitude.
- a single audio oscillator is generated through the above process.
- multiple audio oscillators need to be added to achieve the effect of multi-audio mixing.
- the creating an audio oscillator, and filling the obfuscated and encrypted characters as an audio signal source into an array through the audio oscillator includes: creating one or more audio oscillators again to generate a noise signal , Combining the noise signal with the audio signal source to achieve multi-audio mixing.
- the audio source of the noise signal uses a sine wave, a triangle wave, a cosine wave, a sawtooth wave, or a custom waveform or frequency.
- Fig. 7 uses the waveform as an example to illustrate the synthesis of the source signal and the noise signal.
- the final source information obtained by merging multiple audio oscillators obtained in the above steps is converted into an audio array, and then by creating a volume node GainNode, associating the oscillator with the volume node, and the volume node associating the destination output node to obtain the final audio file.
- the audio file obtained is the encrypted audio information, and the text file obtained in the first step has been stored in the form of audio.
- the embodiment of the present invention provides a method for storing files as audio to achieve encryption.
- the file information is completed by converting ordinary unencrypted files or files that have been encrypted by other means into audio information.
- the storage and effective realization of the encryption function, and the encryption and decryption process does not require specific software, concise, efficient, convenient, and improve the security of the data, can be adapted to different applications.
- Another aspect of the embodiments of the present invention proposes a method for decrypting a generated audio file to restore the file, which is characterized in that it includes the following steps:
- Step S901 Obtain the generated audio file, sequentially remove the audio noise in the multiple audio oscillators that are confused and remove the value inserted by the confusion;
- Step S902 Calculate the remaining characters after removing the confusion through the key function to restore the unified character standard encoding value of each character;
- Step S903 Restore the Unicode encoding value to the original character to obtain original file information.
- the same method used in the encryption process is used to load the audio file encrypted by the above steps, and then the reverse method is used to sequentially remove the noise in the multiple audio oscillators that are confused and the value of the confusion insertion. Then use the key to restore the source Unicode code, where the key is a function or means opposite to the function or means used in the encryption process, which can realize the restoration of information. Finally, the unicode code is restored to the original character through the String.fromCharCode method, and the original information is obtained to complete the decryption of the audio file.
- the method of decrypting the generated audio file to restore the file provided by the embodiment of the present invention is as simple, efficient and convenient as the encryption method, but it further increases the difficulty of ciphertext cracking. Improved data security and can be adapted to different applications.
- an apparatus for storing files as audio to realize encryption including:
- the file obtaining module is configured to read the file to be encrypted to obtain the uniform character standard encoding value of each character of the file;
- the obfuscated encryption module is configured to use the same function to calculate the Unicode encoding value to achieve obfuscated encryption;
- the first code conversion module is configured to create an audio oscillator, and use the audio oscillator to fill the obfuscated and encrypted characters as an audio signal source into an array;
- the second code conversion module is configured to create a volume node, associate the audio oscillator with the volume node, and associate the volume node with a destination output node, so as to output the array as an audio file through the destination output node .
- the first code conversion module is further configured to create one or more audio oscillators again to generate a noise signal, and combine the noise signal with the audio signal source to achieve multi-audio mixing.
- Another aspect of the embodiments of the present invention proposes an embodiment of a device that implements file encryption and decryption.
- the device for implementing file encryption and decryption includes a memory and at least one processor.
- the memory stores a computer program that can run on the processor, and the processor executes any of the above methods when the program is executed.
- FIG. 10 it is a schematic diagram of the hardware structure of an embodiment of the device for implementing file encryption and decryption provided by the present invention.
- the computer device includes a processor 1001 and a memory 1002, and may also include an input device 1003 and an output device 1004.
- the processor 1001, the memory 1002, the input device 1003, and the output device 1004 may be connected through a bus or other methods.
- the connection through a bus is taken as an example.
- the memory 1002 as a non-volatile computer-readable storage medium, can be used to store non-volatile software programs, non-volatile computer-executable programs and modules, and implement file encryption and decryption as described in the embodiments of the present application.
- the method corresponds to the program instruction/module.
- the processor 1001 executes various functional applications and data processing of the server by running non-volatile software programs, instructions, and modules stored in the memory 1002, that is, implements the method of implementing file encryption and decryption in the foregoing method embodiment.
- the memory 1002 may include a program storage area and a data storage area.
- the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to methods for implementing file encryption and decryption.
- the memory 1002 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage devices.
- the memory 1002 may optionally include memories remotely provided with respect to the processor 1001, and these remote memories may be connected to a local module through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, corporate intranets, local area networks, mobile communication networks, and combinations thereof.
- the input device 1003 can receive inputted digital or character information, and generate key signal input related to user settings and function control of the computer device that implements the method of file encryption and decryption.
- the output device 1004 may include a display device such as a display screen.
- the program instructions/modules corresponding to the one or more methods for implementing file encryption and decryption are stored in the memory 1002, and when executed by the processor 1001, the implementation of file encryption and decryption in any of the foregoing method embodiments is executed. Methods.
- Any embodiment of the computer device that executes the method for implementing file encryption and decryption can achieve the same or similar effect as any corresponding method embodiment described above.
- the storage medium can be a magnetic disk, an optical disc, a read-only memory (ROM), or a random access memory (RAM).
- the devices, devices, etc. disclosed in the embodiments of the present invention may be various electronic terminal devices, such as mobile phones, personal digital assistants (PDA), tablet computers (PAD), smart TVs, etc., or large-scale terminals.
- Equipment such as a server, etc., therefore, the protection scope disclosed in the embodiments of the present invention should not be limited to a specific type of equipment or equipment.
- the client disclosed in the embodiment of the present invention may be applied to any of the above-mentioned electronic terminal devices in the form of electronic hardware, computer software, or a combination of both.
- the method disclosed according to the embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium.
- the computer program executes the above-mentioned functions defined in the method disclosed in the embodiment of the present invention.
- the above method steps and system units can also be implemented by a controller and a computer-readable storage medium for storing a computer program that enables the controller to implement the above steps or unit functions.
- non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory Memory.
- Volatile memory can include random access memory (RAM), which can act as external cache memory.
- RAM can be obtained in many forms, such as synchronous RAM (DRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchronous link DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- DRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchronous link DRAM
- DRRAM direct Rambus RAM
- the storage devices of the disclosed aspects are intended to include, but are not limited to, these and other suitable types of memory.
- DSP digital signal processors
- ASIC dedicated Integrated circuit
- FPGA field programmable gate array
- a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- the processor may also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in combination with a DSP, and/or any other such configuration.
- the steps of the method or algorithm described in combination with the disclosure herein may be directly included in hardware, a software module executed by a processor, or a combination of the two.
- the software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art.
- An exemplary storage medium is coupled to the processor such that the processor can read information from or write information to the storage medium.
- the storage medium may be integrated with the processor.
- the processor and the storage medium may reside in the ASIC.
- the ASIC can reside in the user terminal.
- the processor and the storage medium may reside as discrete components in the user terminal.
- the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions can be stored as one or more instructions or codes on a computer-readable medium or transmitted through the computer-readable medium.
- Computer-readable media include computer storage media and communication media, including any media that facilitates the transfer of a computer program from one location to another location.
- a storage medium may be any available medium that can be accessed by a general-purpose or special-purpose computer.
- the computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage devices, magnetic disk storage devices or other magnetic storage devices, or may be used to carry or store instructions in the form of Or any other medium that can be accessed by a general-purpose or special-purpose computer or general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium.
- coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave to send software from a website, server, or other remote source
- coaxial cable Cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are all included in the definition of media.
- magnetic disks and optical disks include compact disks (CDs), laser disks, optical disks, digital versatile disks (DVD), floppy disks, and Blu-ray disks. Disks usually reproduce data magnetically, while optical disks use lasers to optically reproduce data. . Combinations of the above content should also be included in the scope of computer-readable media.
- the program can be stored in a computer-readable storage medium.
- the storage medium mentioned can be a read-only memory, a magnetic disk or an optical disk, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
一种文件存储为音频实现加密的方法、装置和设备,方法包括以下步骤:读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值(S101);将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密(S102);创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组(S103);创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件(S104)。该方法将文件转换为音频进行加密保存,简洁、高效、方便,提高了数据的安全性。
Description
本申请要求于2020年01月10日提交中国国家知识产权局,申请号为202010027106.6,发明名称为“一种文件存储为音频实现加密的方法、装置和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及计算机领域,并且更具体地,涉及一种文件存储为音频实现加密的方法、装置和设备。
数据加密目前仍是计算机系统对信息进行保护的一种最可靠的办法。它利用密码技术对信息进行加密,实现信息隐蔽,从而起到保护信息的安全的作用。
在传统的文件加密算法中,往往采用对称加密、非对称加密的算法对文件进行加密,算法复杂。在一些保密性要求不高的情况下,进行一次加密、解密往往很费时。
发明内容
鉴于此,本发明实施例的目的在于提出一种文件存储为音频实现加密的方法、装置,将普通的非加密文件或者已经过其他手段加密的文件转换 为音频信息,完成文件信息的存储并有效实现加密功能。
基于上述目的,本发明实施例的一方面提供了一种文件存储为音频实现加密的方法,包括以下步骤:
读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;
将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;
创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;
创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
在一些实施方式中,所述读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值包括:
所述统一字符标准编码值为16进制,其中所述编码值为4位数,不足4位的编码值前面补齐0。
在一些实施方式中,所述将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密包括:
在所述编码值字符串中以规律的方式插入特定的值,以扰乱文件的规律格式。
在一些实施方式中,所述创建音频振荡器,并通过所述音频振荡器将 所述混淆加密后的字符作为音频信号源填充为数组包括:
再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
在一些实施方式中,所述噪音信号的音频源采用正弦波、三角波、余弦波、锯齿波或者自定义的波形、频率。
在一些实施方式中,所述方法基于浏览器的JavaScript脚本通过音频API实现。
本发明实施例的另一方面提供了一种对生成的音频文件进行解密以还原文件的方法,包括以下步骤:
获取生成的音频文件,依次去掉混淆的多个音频振荡器中的音频噪音并去掉混淆插入的值;
将去掉混淆后剩余的字符通过密钥函数计算以还原每一个字符的统一字符标准编码值;
将所述统一字符标准编码值还原为原始的字符,以获得原始文件信息。
本发明实施例的又一方面提供了一种文件存储为音频实现加密的装置,包括:
文件获取模块,配置为读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;
混淆加密模块,配置为将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;
第一编码转换模块,配置为创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;
第二编码转换模块,配置为创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
在一些实施方式中,所述第一编码转换模块还配置为:
再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
本发明实施例的又一方面提供了一种实现文件加密和解密的设备,包括:
至少一个处理器;和
存储器,所述存储器存储有处理器可运行的程序代码,所述程序代码在被处理器运行时实施上述任一项所述的方法。
本发明具有以下有益技术效果:本发明实施例提供的一种文件存储为音频实现加密的方法、装置和设备,通过将普通的非加密文件或者已经过其他手段加密的文件转换为音频信息的方法,完成文件信息的存储并有效实现加密功能,并且加解密过程不需要特定的软件,简洁、高效、方便。
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员 来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的实施例。
图1是根据本发明的一种文件存储为音频实现加密的方法的流程图;
图2是根据本发明的“严格”的Unicode编码值实例示意图;
图3是根据本发明的将音频源信息进行混淆的过程示意图;
图4是根据本发明的再次插值以混淆音频源字符串的示意图;
图5是一种音频产生的过程的示意图;
图6是根据本发明的音频源信息数组示意图;
图7是根据本发明的将噪音和音频源信号合并的示意图;
图8是根据图5所示的过程合成根据本发明的音频文件的示意图;
图9是根据本发明的一种对生成的音频文件进行解密以还原文件的方法的流程图;
图10是根据本发明的一种实现文件加密和解密的设备的硬件结构示意图。
以下描述了本发明的实施例。然而,应该理解,所公开的实施例仅仅是示例,并且其他实施例可以采取各种替代形式。附图不一定按比例绘制;某些功能可能被夸大或最小化以显示特定部件的细节。因此,本文公开的具体结构和功能细节不应被解释为限制性的,而仅仅是作为用于教导本领域技术人员以各种方式使用本发明的代表性基础。如本领域普通技术人员 将理解的,参考任何一个附图所示出和描述的各种特征可以与一个或多个其他附图中所示的特征组合以产生没有明确示出或描述的实施例。所示特征的组合为典型应用提供了代表性实施例。然而,与本发明的教导相一致的特征的各种组合和修改对于某些特定应用或实施方式可能是期望的。
为使本发明的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本发明实施例进一步详细说明。
基于上述目的,本发明的实施例一方面提出了一种文件存储为音频实现加密的方法,如图1所示,包括以下步骤:
步骤S101:读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;
步骤S102:将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;
步骤S103:创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;
步骤S104:创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
在一些实施例中,所述方法基于浏览器的JavaScript脚本通过音频API实现。例如,基于浏览器的JavaScript脚本通过AudioContext(音频API)操作HTML5音频的功能实现解析文件文本信息。整个转换系统依赖于web浏览器实现,其中,文件的读取通过浏览器脚本JavaScript的HTML5 的AudioContext接口实现;读取文件后利用charCodeAt()方法获取文件每一个字符的Unicode编码信息。
在一些实施例中,通过浏览器的FileReader构造函数通过实例化对象实现读取文件,该命令可以调出文件选择器,让用户选择需要进行加密操作的文件。
在一些实施例中,所述读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值包括:所述统一字符标准编码值为16进制,其中所述编码值为4位数,不足4位的编码值前面补齐0。例如,上一步骤获取文件后,通过JavaScript的字符串操作方法charCodeAt()获取每一个字符的Unicode编码值;该值为16进制,最多为4位数,不足4位的数值,前面补齐0凑成4位数字,从而得到所有源字符的Unicode编码字符串。以“严格”字符为例,得到结果如图2所示。
在一些实施例中,对于上述获得的统一字符标准编码值(信息源数组SourceOrigin),进行源信息的混淆加密,即,将得到的源字符串的Unicode字符串经过一定的函数计算以实现特定转义,从而完成混淆源字符串,达到加密源数组SourceOrigin的目的,得到一个经过混淆过的数组,将得到的混淆后的字符依次放入音频源数组中,实现原理如图3所示。
在一些实施例中,所述将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密包括:在所述编码值字符串中以规律的方式插入特定的值,以扰乱文件的规律格式。为了加强秘密性,在如图3所示得到的字符串中,再次以规律的方式插入特定的值,使得文件再次混淆,扰乱文件的规律格式,防止恶意破解文件,实现原理如图4所示。
在一些实施例中,音频节点接口是一个个音频处理模块,包括音频源、音频输出以及中间处理模块。音频节点模块化允许在两个音频节点之间进行任意连接,每个中间节点(Gain)有输入和输出;源节点(Oscillator,振荡器)没有输入,只有一个输出;目的节点(Destination)只有一个输入源没有输出。中间节点能够设置在源节点和目的节点之间。在最简单的示例中,音频源可以直接输出,所有的音频路由在一个音频上下文(AudioContext)中进行,如图5所示。
在本发明实施例中,没有输入音频源,而是通过Oscillator音频振荡器创建了一个输入源,将上一步中获取到的文件转码后的信息作为音频信号源进行填充。创建音频振荡器Oscillator,将文件转码后的信息填充为一个数组以作为音频信号源SourceOrigin,如图6所示。该信号源可以作为声音信号源,包括但不限于频率、波形、振幅等数据。
通过上述过程生成的是一个单一的音频振荡器,为了达到更好的加密效果,需要加入多个音频振荡器,达到多音频混合的效果。
在一些实施例中,所述创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组包括:再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
在一些实施例中,所述噪音信号的音频源采用正弦波、三角波、余弦波、锯齿波或者自定义的波形、频率。
例如,再次创建音频振荡器B、C等等,振荡器产生重复的波形,具有频率和振幅。振荡器最重要的特征,除了频率和振幅外,是其波形的形 状。因此,其音频源可以采用正弦波、三角波、余弦波、锯齿波或者自定义的波形、频率等。附图7以波形为例,说明了源信号和噪音信号的合成。
将上面步骤总得到的多个音频振荡器合并得到的最终的源信息转成音频数组,然后通过创建音量节点GainNode,关联振荡器和音量节点,音量节点关联目的输出节点,得到最终的音频文件,如图8所示。得到的音频文件即为加密后的音频信息,第一步获取的文本文件已经以音频的形式得到了存储。
在技术上可行的情况下,以上针对不同实施例所列举的技术特征可以相互组合,或者改变、添加以及省略等等,从而形成本发明范围内的另外实施例。
从上述实施例可以看出,本发明实施例提供的一种文件存储为音频实现加密的方法,通过将普通的非加密文件或者已经过其他手段加密的文件转换为音频信息的方法,完成文件信息的存储并有效实现加密功能,并且该加解密过程不需要特定的软件,简洁、高效、方便,并且提高了数据的安全性,可以适应于不同的应用场合。
基于上述目的,本发明实施例的另一个方面,提出了一种对生成的音频文件进行解密以还原文件的方法,其特征在于,包括以下步骤:
步骤S901:获取生成的音频文件,依次去掉混淆的多个音频振荡器中的音频噪音并去掉混淆插入的值;
步骤S902:将去掉混淆后剩余的字符通过密钥函数计算以还原每一个字符的统一字符标准编码值;
步骤S903:将所述统一字符标准编码值还原为原始的字符,以获得原始文件信息。
在一些实施例中,以加密过程中使用的同样的方法去加载经上述步骤加密得到的音频文件,然后以相反的方法,依次去掉混淆的多个音频振荡器中的噪音、混淆插入的值,然后用密钥还原源Unicode编码,其中该密钥为与加密过程所使用的函数或手段相反的函数或手段,能够实现信息的还原。最后通过String.fromCharCode方法将unicode编码还原为原始的字符,得到原始信息,完成音频文件的解密。
从上述实施例可以看出,本发明实施例提供的一种对生成的音频文件进行解密以还原文件的方法与加密方法一样简洁、高效、方便,但又进一步加大了密文破解的难度,提高了数据的安全性,可以适应于不同的应用场合。
基于上述目的,本发明实施例的又一个方面,提出了一种文件存储为音频实现加密的装置,包括:
文件获取模块,配置为读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;
混淆加密模块,配置为将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;
第一编码转换模块,配置为创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;
第二编码转换模块,配置为创建音量节点,关联所述音频振荡器和所 述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
在一些实施例中,所述第一编码转换模块还配置为:再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
基于上述目的,本发明实施例的又一个方面,提出了实现文件加密和解密的设备的一个实施例。
所述实现文件加密和解密的设备包括存储器、和至少一个处理器,存储器存储有可在处理器上运行的计算机程序,处理器执行程序时执行上述任意一种方法。
如图10所示,为本发明提供的实现文件加密和解密的设备的一个实施例的硬件结构示意图。
以如图10所示的计算机设备为例,在该计算机设备中包括处理器1001以及存储器1002,并还可以包括:输入装置1003和输出装置1004。
处理器1001、存储器1002、输入装置1003和输出装置1004可以通过总线或者其他方式连接,图10中以通过总线连接为例。
存储器1002作为一种非易失性计算机可读存储介质,可用于存储非易失性软件程序、非易失性计算机可执行程序以及模块,如本申请实施例中的所述实现文件加密和解密的方法对应的程序指令/模块。处理器1001通过运行存储在存储器1002中的非易失性软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例的实 现文件加密和解密的方法。
存储器1002可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据实现文件加密和解密的方法所创建的数据等。此外,存储器1002可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实施例中,存储器1002可选包括相对于处理器1001远程设置的存储器,这些远程存储器可以通过网络连接至本地模块。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置1003可接收输入的数字或字符信息,以及产生与实现文件加密和解密的方法的计算机设备的用户设置以及功能控制有关的键信号输入。输出装置1004可包括显示屏等显示设备。
所述一个或者多个实现文件加密和解密的方法对应的程序指令/模块存储在所述存储器1002中,当被所述处理器1001执行时,执行上述任意方法实施例中的实现文件加密和解密的方法。
所述执行所述实现文件加密和解密的方法的计算机设备的任何一个实施例,可以达到与之对应的前述任意方法实施例相同或者相类似的效果。
最后需要说明的是,本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,可以通过计算机程序来指令相关硬件来完成,所述的程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只 读存储记忆体(ROM)或随机存储记忆体(RAM)等。
此外,典型地,本发明实施例公开所述的装置、设备等可为各种电子终端设备,例如手机、个人数字助理(PDA)、平板电脑(PAD)、智能电视等,也可以是大型终端设备,如服务器等,因此本发明实施例公开的保护范围不应限定为某种特定类型的装置、设备。本发明实施例公开所述的客户端可以是以电子硬件、计算机软件或两者的组合形式应用于上述任意一种电子终端设备中。
此外,根据本发明实施例公开的方法还可以被实现为由CPU执行的计算机程序,该计算机程序可以存储在计算机可读存储介质中。在该计算机程序被CPU执行时,执行本发明实施例公开的方法中限定的上述功能。
此外,上述方法步骤以及系统单元也可以利用控制器以及用于存储使得控制器实现上述步骤或单元功能的计算机程序的计算机可读存储介质实现。
此外,应该明白的是,本文所述的计算机可读存储介质(例如,存储器)可以是易失性存储器或非易失性存储器,或者可以包括易失性存储器和非易失性存储器两者。作为例子而非限制性的,非易失性存储器可以包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦写可编程ROM(EEPROM)或快闪存储器。易失性存储器可以包括随机存取存储器(RAM),该RAM可以充当外部高速缓存存储器。作为例子而非限制性的,RAM可以以多种形式获得,比如同步RAM(DRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据速率SDRAM(DDR SDRAM)、增强SDRAM(ESDRAM)、同步链路DRAM (SLDRAM)、以及直接Rambus RAM(DRRAM)。所公开的方面的存储设备意在包括但不限于这些和其它合适类型的存储器。
本领域技术人员还将明白的是,结合这里的公开所描述的各种示例性逻辑块、模块、电路和算法步骤可以被实现为电子硬件、计算机软件或两者的组合。为了清楚地说明硬件和软件的这种可互换性,已经就各种示意性组件、方块、模块、电路和步骤的功能对其进行了一般性的描述。这种功能是被实现为软件还是被实现为硬件取决于具体应用以及施加给整个系统的设计约束。本领域技术人员可以针对每种具体应用以各种方式来实现所述的功能,但是这种实现决定不应被解释为导致脱离本发明实施例公开的范围。
结合这里的公开所描述的各种示例性逻辑块、模块和电路可以利用被设计成用于执行这里所述功能的下列部件来实现或执行:通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或其它可编程逻辑器件、分立门或晶体管逻辑、分立的硬件组件或者这些部件的任何组合。通用处理器可以是微处理器,但是可替换地,处理器可以是任何传统处理器、控制器、微控制器或状态机。处理器也可以被实现为计算设备的组合,例如,DSP和微处理器的组合、多个微处理器、一个或多个微处理器结合DSP和/或任何其它这种配置。
结合这里的公开所描述的方法或算法的步骤可以直接包含在硬件中、由处理器执行的软件模块中或这两者的组合中。软件模块可以驻留在RAM存储器、快闪存储器、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、可移动盘、CD-ROM、或本领域已知的任何其它形 式的存储介质中。示例性的存储介质被耦合到处理器,使得处理器能够从该存储介质中读取信息或向该存储介质写入信息。在一个替换方案中,所述存储介质可以与处理器集成在一起。处理器和存储介质可以驻留在ASIC中。ASIC可以驻留在用户终端中。在一个替换方案中,处理器和存储介质可以作为分立组件驻留在用户终端中。
在一个或多个示例性设计中,所述功能可以在硬件、软件、固件或其任意组合中实现。如果在软件中实现,则可以将所述功能作为一个或多个指令或代码存储在计算机可读介质上或通过计算机可读介质来传送。计算机可读介质包括计算机存储介质和通信介质,该通信介质包括有助于将计算机程序从一个位置传送到另一个位置的任何介质。存储介质可以是能够被通用或专用计算机访问的任何可用介质。作为例子而非限制性的,该计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其它光盘存储设备、磁盘存储设备或其它磁性存储设备,或者是可以用于携带或存储形式为指令或数据结构的所需程序代码并且能够被通用或专用计算机或者通用或专用处理器访问的任何其它介质。此外,任何连接都可以适当地称为计算机可读介质。例如,如果使用同轴线缆、光纤线缆、双绞线、数字用户线路(DSL)或诸如红外线、无线电和微波的无线技术来从网站、服务器或其它远程源发送软件,则上述同轴线缆、光纤线缆、双绞线、DSL或诸如红外线、无线电和微波的无线技术均包括在介质的定义。如这里所使用的,磁盘和光盘包括压缩盘(CD)、激光盘、光盘、数字多功能盘(DVD)、软盘、蓝光盘,其中磁盘通常磁性地再现数据,而光盘利用激光光学地再现数据。上述内容的组合也应当包括在计算机可读介质的范围 内。
应当理解的是,在本文中使用的,除非上下文清楚地支持例外情况,单数形式“一个”旨在也包括复数形式。还应当理解的是,在本文中使用的“和/或”是指包括一个或者一个以上相关联地列出的项目的任意和所有可能组合。
上述本发明实施例公开实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器、磁盘或光盘等。
上述实施例是实施方式的可能示例,并且仅仅为了清楚理解本发明的原理而提出。所属领域的普通技术人员应当理解:以上任何实施例的讨论仅为示例性的,并非旨在暗示本发明实施例公开的范围(包括权利要求)被限于这些例子;在本发明实施例的思路下,以上实施例或者不同实施例中的技术特征之间也可以进行组合,并存在如上所述的本发明实施例的不同方面的许多其它变化,为了简明它们没有在细节中提供。因此,凡在本发明实施例的精神和原则之内,所做的任何省略、修改、等同替换、改进等,均应包含在本发明实施例的保护范围之内。
Claims (10)
- 一种文件存储为音频实现加密的方法,其特征在于,包括以下步骤:读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
- 根据权利要求1所述的方法,其特征在于,所述读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值包括:所述统一字符标准编码值为16进制,其中所述编码值为4位数,不足4位的编码值前面补齐0。
- 根据权利要求1所述的方法,其特征在于,所述将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密包括:在所述编码值字符串中以规律的方式插入特定的值,以扰乱文件的规律格式。
- 根据权利要求1所述的方法,其特征在于,所述创建音频振荡器, 并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组包括:再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
- 根据权利要求4所述的方法,其特征在于,所述噪音信号的音频源采用正弦波、三角波、余弦波、锯齿波或者自定义的波形、频率。
- 根据权利要求1所述的方法,其特征在于,所述方法基于浏览器的JavaScript脚本通过音频API实现。
- 一种对生成的音频文件进行解密以还原文件的方法,其特征在于,包括以下步骤:获取生成的音频文件,依次去掉混淆的多个音频振荡器中的音频噪音并去掉混淆插入的值;将去掉混淆后剩余的字符通过密钥函数计算以还原每一个字符的统一字符标准编码值;将所述统一字符标准编码值还原为原始的字符,以获得原始文件信息。
- 一种文件存储为音频实现加密的装置,其特征在于,包括:文件获取模块,配置为读取待加密文件,以获取所述文件的每一个字符的统一字符标准编码值;混淆加密模块,配置为将所述统一字符标准编码值运用相同的函数进行计算以实现混淆加密;第一编码转换模块,配置为创建音频振荡器,并通过所述音频振荡器将所述混淆加密后的字符作为音频信号源填充为数组;第二编码转换模块,配置为创建音量节点,关联所述音频振荡器和所述音量节点,并将所述音量节点关联目的输出节点,以通过所述目的输出节点将所述数组输出为音频文件。
- 根据权利要求8所述的装置,其特征在于,所述第一编码转换模块还配置为:再次创建一个或多个音频振荡器以生成噪音信号,将所述噪音信号与所述音频信号源合并以实现多音频混合。
- 一种实现文件加密和解密的设备,其特征在于,包括:至少一个处理器;和存储器,所述存储器存储有处理器可运行的程序代码,所述程序代码在被处理器运行时实施如权利要求1-7中任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010027106.6A CN111259414A (zh) | 2020-01-10 | 2020-01-10 | 一种文件存储为音频实现加密的方法、装置和设备 |
CN202010027106.6 | 2020-01-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021139172A1 true WO2021139172A1 (zh) | 2021-07-15 |
Family
ID=70952833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/111367 WO2021139172A1 (zh) | 2020-01-10 | 2020-08-26 | 一种文件存储为音频实现加密的方法、装置和设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111259414A (zh) |
WO (1) | WO2021139172A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114091439A (zh) * | 2021-11-01 | 2022-02-25 | 北京百分点科技集团股份有限公司 | 汉字混淆集生成方法及装置和计算机可读存储介质 |
CN114501140A (zh) * | 2021-12-28 | 2022-05-13 | 安徽清新物联科技有限公司 | 一种视频字符叠加的处理方法、系统及存储介质 |
CN117422071A (zh) * | 2023-12-19 | 2024-01-19 | 中南大学 | 一种文本词项多重分割标注转换方法及装置 |
CN117931248A (zh) * | 2024-03-25 | 2024-04-26 | 杭州菲助科技有限公司 | 一种提高巨石应用部署效率的方法及装置 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259414A (zh) * | 2020-01-10 | 2020-06-09 | 苏州浪潮智能科技有限公司 | 一种文件存储为音频实现加密的方法、装置和设备 |
CN112069065B (zh) * | 2020-09-03 | 2023-11-24 | 北京声智科技有限公司 | 算法调试方法、电子设备及计算机可读存储介质 |
CN114978356B (zh) * | 2022-04-29 | 2023-08-29 | 歌尔股份有限公司 | 基于音频进行多频道数据传输方法、设备及存储介质 |
CN116015655A (zh) * | 2023-01-10 | 2023-04-25 | 中兴通讯股份有限公司 | 音频处理方法、终端、计算机可读介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203896411U (zh) * | 2014-05-22 | 2014-10-22 | 爱维特信息技术有限公司 | 手机名片交换系统 |
CN105846911A (zh) * | 2016-05-23 | 2016-08-10 | 罗迎晓 | 基于声波的数据传输方法、装置和系统 |
CN106452607A (zh) * | 2016-11-03 | 2017-02-22 | 武汉斗鱼网络科技有限公司 | 一种传输、解析信息的方法及装置 |
CN107092815A (zh) * | 2017-03-31 | 2017-08-25 | 武汉斗鱼网络科技有限公司 | 一种保护模块文件的方法及服务器 |
CN107733896A (zh) * | 2017-10-20 | 2018-02-23 | 哈尔滨工程大学 | 一种基于声波的数据安全传输方法 |
US20180255111A1 (en) * | 2017-03-01 | 2018-09-06 | Microsoft Technology Licensing, Llc | Audio Data Transmission Using Frequency Hopping |
CN111259414A (zh) * | 2020-01-10 | 2020-06-09 | 苏州浪潮智能科技有限公司 | 一种文件存储为音频实现加密的方法、装置和设备 |
-
2020
- 2020-01-10 CN CN202010027106.6A patent/CN111259414A/zh not_active Withdrawn
- 2020-08-26 WO PCT/CN2020/111367 patent/WO2021139172A1/zh active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203896411U (zh) * | 2014-05-22 | 2014-10-22 | 爱维特信息技术有限公司 | 手机名片交换系统 |
CN105846911A (zh) * | 2016-05-23 | 2016-08-10 | 罗迎晓 | 基于声波的数据传输方法、装置和系统 |
CN106452607A (zh) * | 2016-11-03 | 2017-02-22 | 武汉斗鱼网络科技有限公司 | 一种传输、解析信息的方法及装置 |
US20180255111A1 (en) * | 2017-03-01 | 2018-09-06 | Microsoft Technology Licensing, Llc | Audio Data Transmission Using Frequency Hopping |
CN107092815A (zh) * | 2017-03-31 | 2017-08-25 | 武汉斗鱼网络科技有限公司 | 一种保护模块文件的方法及服务器 |
CN107733896A (zh) * | 2017-10-20 | 2018-02-23 | 哈尔滨工程大学 | 一种基于声波的数据安全传输方法 |
CN111259414A (zh) * | 2020-01-10 | 2020-06-09 | 苏州浪潮智能科技有限公司 | 一种文件存储为音频实现加密的方法、装置和设备 |
Non-Patent Citations (1)
Title |
---|
JEFF1804: "Web Audio API of H5", 20 August 2018 (2018-08-20), pages 1 - 4, XP009529001, Retrieved from the Internet <URL:https://blog.csdn.net/u014399368/article/details/81873261> * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114091439A (zh) * | 2021-11-01 | 2022-02-25 | 北京百分点科技集团股份有限公司 | 汉字混淆集生成方法及装置和计算机可读存储介质 |
CN114501140A (zh) * | 2021-12-28 | 2022-05-13 | 安徽清新物联科技有限公司 | 一种视频字符叠加的处理方法、系统及存储介质 |
CN117422071A (zh) * | 2023-12-19 | 2024-01-19 | 中南大学 | 一种文本词项多重分割标注转换方法及装置 |
CN117422071B (zh) * | 2023-12-19 | 2024-03-15 | 中南大学 | 一种文本词项多重分割标注转换方法及装置 |
CN117931248A (zh) * | 2024-03-25 | 2024-04-26 | 杭州菲助科技有限公司 | 一种提高巨石应用部署效率的方法及装置 |
CN117931248B (zh) * | 2024-03-25 | 2024-06-07 | 杭州菲助科技有限公司 | 一种提高巨石应用部署效率的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN111259414A (zh) | 2020-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021139172A1 (zh) | 一种文件存储为音频实现加密的方法、装置和设备 | |
US8036379B2 (en) | Cryptographic processing | |
CN107609418A (zh) | 文本数据的脱敏方法、装置、存储设备以及计算机设备 | |
JP2016523391A (ja) | 平文データを暗号化するための方法および装置 | |
CN110084599B (zh) | 密钥处理方法、装置、设备和存储介质 | |
CN109714368B (zh) | 报文加解密方法、装置、电子设备及计算机可读存储介质 | |
WO2020192366A1 (zh) | 一种基于动态白盒的数据处理方法、装置及设备 | |
JP2017187724A (ja) | 暗号化装置、暗号化方法、復号化装置、及び復号化方法 | |
US20200084200A1 (en) | Systems and methods for variable-length encoding and decoding for enhancing computer systems | |
KR20190060804A (ko) | 컴퓨터 보안, 가변 단어-길이 인코딩 및 가변 길이 디코딩을 향상시키기 위한 기술들 | |
CN105721134B (zh) | 使用带有多个外部编码的单个白盒实现 | |
JP2015528681A (ja) | メッセージデータを保護するための装置および方法 | |
Lalitha et al. | An efficient data encryption through image via prime order symmetric key and bit shuffle technique | |
Vengala et al. | Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment | |
CN108390942A (zh) | 一种硬件加密的分布式云存储方法与装置 | |
JP2012039180A (ja) | ストリーム暗号の暗号器、ストリーム暗号の復号器、ストリーム暗号の暗号方法、ストリーム暗号の復号方法およびプログラム | |
US20130283363A1 (en) | Secure data transfer over an arbitrary public or private transport | |
Kumar et al. | A novel approach for securing data in IoTcloud using DNA cryptography and Huffman coding algorithm | |
CN110784313A (zh) | 一种密钥的保护方法、设备以及存储介质 | |
Vennela et al. | Performance analysis of cryptographic algorithms for cloud security | |
US12028333B2 (en) | Systems and methods for variable-length encoding and decoding for enhancing computer systems | |
WO2021129676A1 (zh) | 一种uri构造方法、装置、介质及设备 | |
US20180287783A1 (en) | Network Communication Encoder Using Key Pattern Encryption | |
JP7481076B2 (ja) | キー圧縮可能な暗号化 | |
CN111651788B (zh) | 一种基于格密码的终端访问控制系统及方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20911485 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20911485 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20911485 Country of ref document: EP Kind code of ref document: A1 |