CN106130720A - A kind of method that internet information required parameter is encrypted safely and deciphered - Google Patents

A kind of method that internet information required parameter is encrypted safely and deciphered Download PDF

Info

Publication number
CN106130720A
CN106130720A CN201610657691.1A CN201610657691A CN106130720A CN 106130720 A CN106130720 A CN 106130720A CN 201610657691 A CN201610657691 A CN 201610657691A CN 106130720 A CN106130720 A CN 106130720A
Authority
CN
China
Prior art keywords
encryption
required parameter
request
parameter
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610657691.1A
Other languages
Chinese (zh)
Inventor
沈文策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Cnfol Information Technology Co Ltd
Original Assignee
Fujian Cnfol Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Cnfol Information Technology Co Ltd filed Critical Fujian Cnfol Information Technology Co Ltd
Priority to CN201610657691.1A priority Critical patent/CN106130720A/en
Publication of CN106130720A publication Critical patent/CN106130720A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method that internet information required parameter is encrypted safely and deciphered, described method includes setting a random string, obtain the required parameter information in internet information, by cipher mode, random string and required parameter are encrypted, with the result request server after encryption, server obtains the result request after encryption, it is decrypted, obtain the parameter after deciphering and carry out temporal judgement, if current time deducts encryption times more than a setting time value, then required parameter is illegal request, request is not by accessing server, otherwise, request is by conducting interviews;Described current time is to obtain the required parameter in internet information to acquisition deciphering during this period of time, and described encryption times is the time being encrypted random string and required parameter.The present invention prevents leaking data to required parameter encryption, improves the safety of computer information processing.

Description

A kind of method that internet information required parameter is encrypted safely and deciphered
Technical field
The present invention relates to technical field of the computer network, particularly relate to a kind of internet information required parameter encrypt safely and The method of deciphering.
Background technology
In recent years, along with the development of computer network, informationization is the strangest, and the network information is the most not , no matter political realms, economic field or culture field are all by informationalized impact.And computer information is to people The while that life, work bringing convenient, also bring information security issue so that information processing is destroyed in a network and lets out Dew.To this end, the Security Construction strengthening computer information processing is significant.
Along with the quickening of internet development process, network direct broadcasting interface requests parameter is encrypted, deciphers, prevents important The link that information leakage has become length in the problem of information security, and existing internet information can run into required parameter is made for a long time With, so may result in the generation of safety problem.Present patent application is that present in analytical calculation machine information processes, safety is asked Inscribe, and emphasis achieves the technology that information security processes.
Summary of the invention
The technical problem to be solved in the present invention, is to provide a kind of internet information required parameter to encrypt safely and decipher Method, prevents leaking data to required parameter encryption, does not meets the splicing address malicious access interface of rule, to access interface Parameter and access interface play a protective role.
The present invention is achieved in that a kind of method that internet information required parameter is encrypted safely and deciphered, described side Method includes setting a random string, obtains the required parameter information in internet information, by cipher mode to random character String and required parameter are encrypted, and with the result request server after encryption, server obtains the result request after encryption, carries out Deciphering, it is thus achieved that the parameter after deciphering carries out temporal judgement, if current time deducts encryption times more than the setting time Value, then required parameter is illegal request, and request is not by accessing server, and otherwise, request is by conducting interviews;Described work as The front time is to obtain the required parameter in internet information to acquisition deciphering during this period of time, and described encryption times is to random words The time that symbol string and required parameter are encrypted.
Further, described cipher mode includes AES data encryption, RSA data encryption or MD5 data encryption.
Further, the described time value that sets was as 5 minutes.
Further, when described cipher mode is AES data encryption, described encryption and manner of decryption are particularly as follows: app applies During the encryption of PROGRAMMED REQUESTS parameter, define a variable checkcode, set a random string, be assigned to random string become Amount checkcode, obtains the required parameter information in internet information, by AES data encryption mode to random string and Required parameter is encrypted, encrypted result=AES. encryption method (checkcode, required parameter), please by the result after encryption Seeking server, server obtains the result request after encryption, is decrypted, decrypted result=AES. decryption method (checkcode, required parameter).
Present invention have the advantage that the present invention arranges time expired function to a request;By to required parameter It is encrypted and prevents leaking data, and after request server, then be decrypted, and during by judging that current time deducts encryption Between whether more than a setting time value, be that then required parameter is illegal request, request is not by accessing server, otherwise, Request is by conducting interviews;Thus the parameter and access interface to access interface plays a protective role.Improve computerized information The safety processed.
Accompanying drawing explanation
Fig. 1 is the inventive method schematic flow sheet.
Detailed description of the invention
Refer to shown in Fig. 1, the method that a kind of internet information required parameter of the present invention is encrypted safely and deciphered, described Method includes arranging a request time expired function;Set a random string, obtain the request in internet information Parameter information, is encrypted random string and required parameter by cipher mode, with encryption after result request server, Server obtains the result request after encryption, is decrypted, it is thus achieved that the parameter after deciphering carries out temporal judgement, if currently Time deducts encryption times and sets time value more than one, and described setting time value is preferably 5 minutes, according to tool in actual application Body is it may is that other times;Then required parameter is illegal request, and request is not by accessing server, otherwise, and request By conducting interviews;Described current time is to obtain the required parameter in internet information to acquisition deciphering during this period of time, institute Stating encryption times is the time being encrypted random string and required parameter.
In the present invention, described cipher mode includes AES data encryption, RSA data encryption or MD5 data encryption.Described When cipher mode is AES data encryption, when described encryption and manner of decryption are particularly as follows: app application requests parameter is encrypted, fixed Justice one variable checkcode, sets a random string, and random string is assigned to variable checkcode, obtains the Internet Required parameter information in information, is encrypted random string and required parameter by AES data encryption mode, encryption knot Really=AES. encryption method (checkcode, required parameter), with the result request server after encryption, server obtains encryption After result request, be decrypted, decrypted result=AES. decryption method (checkcode, required parameter).
In a word, network direct broadcasting interface requests parameter is encrypted, deciphers by the present invention, prevents important information from revealing;Pass through Required parameter is encrypted and prevents leaking data, and after request server, then be decrypted, and by judging current time Deducting whether encryption times sets time value more than one, be that then required parameter is illegal request, request is not by accessing clothes Business device, otherwise, request is by conducting interviews;Thus the parameter and access interface to access interface plays a protective role.Improve The safety of computer information processing.
The foregoing is only presently preferred embodiments of the present invention, all impartial changes done according to scope of the present invention patent with Modify, all should belong to the covering scope of the present invention.

Claims (4)

1. the method that an internet information required parameter is encrypted safely and deciphered, it is characterised in that: described method includes setting One random string, obtains the required parameter information in internet information, by cipher mode to random string and request ginseng Number is encrypted, and with the result request server after encryption, server obtains the result request after encryption, is decrypted, it is thus achieved that Parameter after deciphering carries out temporal judgement, if current time deducts encryption times and sets time value more than one, then asks Parameter is illegal request, and request is not by accessing server, and otherwise, request is by conducting interviews;Described current time is Obtaining the required parameter in internet information to acquisition deciphering during this period of time, described encryption times is to random string and to ask Ask the time that parameter is encrypted.
The method that a kind of internet information required parameter the most according to claim 1 is encrypted safely and deciphered, its feature exists In: described cipher mode includes AES data encryption, RSA data encryption or MD5 data encryption.
The method that a kind of internet information required parameter the most according to claim 1 is encrypted safely and deciphered, its feature exists In: the described time value that sets was as 5 minutes.
The method that a kind of internet information required parameter the most according to claim 1 is encrypted safely and deciphered, its feature exists In: when described cipher mode is AES data encryption, described encryption and manner of decryption are particularly as follows: app application requests parameter adds Time close, define a variable checkcode, set a random string, random string is assigned to variable checkcode, obtains Take the required parameter information in internet information, by AES data encryption mode, random string and required parameter are added Close, encrypted result=AES. encryption method (checkcode, required parameter), with the result request server after encryption, server Obtain the result request after encryption, be decrypted, decrypted result=AES. decryption method (checkcode, required parameter).
CN201610657691.1A 2016-08-12 2016-08-12 A kind of method that internet information required parameter is encrypted safely and deciphered Pending CN106130720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610657691.1A CN106130720A (en) 2016-08-12 2016-08-12 A kind of method that internet information required parameter is encrypted safely and deciphered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610657691.1A CN106130720A (en) 2016-08-12 2016-08-12 A kind of method that internet information required parameter is encrypted safely and deciphered

Publications (1)

Publication Number Publication Date
CN106130720A true CN106130720A (en) 2016-11-16

Family

ID=57257893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610657691.1A Pending CN106130720A (en) 2016-08-12 2016-08-12 A kind of method that internet information required parameter is encrypted safely and deciphered

Country Status (1)

Country Link
CN (1) CN106130720A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172461A (en) * 2017-06-19 2017-09-15 武汉斗鱼网络科技有限公司 A kind of video flowing method for authenticating and device
CN110381114A (en) * 2019-06-14 2019-10-25 平安科技(深圳)有限公司 Processing method, device, terminal device and the medium of interface requests parameter
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005034A1 (en) * 2006-06-09 2008-01-03 General Instrument Corporation Method and Apparatus for Efficient Use of Trusted Third Parties for Additional Content-Sharing Security
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
CN102724207A (en) * 2012-06-28 2012-10-10 上海西本网络科技有限公司 Method and device for transmitting/processing service request, client end and service end
CN104363266A (en) * 2014-10-23 2015-02-18 北京远特科技有限公司 Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005034A1 (en) * 2006-06-09 2008-01-03 General Instrument Corporation Method and Apparatus for Efficient Use of Trusted Third Parties for Additional Content-Sharing Security
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
CN102724207A (en) * 2012-06-28 2012-10-10 上海西本网络科技有限公司 Method and device for transmitting/processing service request, client end and service end
CN104363266A (en) * 2014-10-23 2015-02-18 北京远特科技有限公司 Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172461A (en) * 2017-06-19 2017-09-15 武汉斗鱼网络科技有限公司 A kind of video flowing method for authenticating and device
CN107172461B (en) * 2017-06-19 2019-12-03 武汉斗鱼网络科技有限公司 A kind of video flowing method for authenticating and device
CN110381114A (en) * 2019-06-14 2019-10-25 平安科技(深圳)有限公司 Processing method, device, terminal device and the medium of interface requests parameter
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device

Similar Documents

Publication Publication Date Title
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
CN106506159A (en) Encryption method and equipment for key safety
CN103595698B (en) Management method for digital rights
KR20050058296A (en) Method and system for monitoring user interaction with a computer
US20080288776A1 (en) Security method using virtual keyboard
CN107563176A (en) Login authentication method and system based on USB flash disk, readable storage medium and computer
CN109284585A (en) A kind of script encryption method, script decryption operation method and relevant apparatus
CN108075888B (en) Dynamic URL generation method and device, storage medium and electronic equipment
CN107483199A (en) Information Authentication method and device
CN107679397A (en) The weak passwurd detecting system and method for a kind of Linux system
CN106130720A (en) A kind of method that internet information required parameter is encrypted safely and deciphered
CN107689957A (en) A kind of digital certificate management method, electronic equipment, storage medium
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
CN113395406A (en) Encryption authentication method and system based on power equipment fingerprints
CN106656955A (en) Communication method and system and user terminal
CN103093137A (en) File safe distribution method based on universal series bus (USB) flash disk
CN100543762C (en) Computer-aided design data encryption protecting method based on hardware environment
CN103457721B (en) A kind of method and device of Mass production password
CN106557682A (en) The authority checking method and device of softdog
CN102855419A (en) Copyright protection method for data files of intelligent terminals
CN107135074A (en) A kind of advanced security method and apparatus
CN112910883B (en) Data transmission method and device and electronic equipment
CN105426701A (en) Methods and apparatuses for encrypting and offline reading of electronic book and electronic book copyright protection system
CN105554539B (en) Device for processing digital video, digital program system and its matching process
CN106408298A (en) Method for clearing attack alarm for terminal through authorization and system thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116