CN106817358B - Encryption and decryption method and device for user resources - Google Patents

Encryption and decryption method and device for user resources Download PDF

Info

Publication number
CN106817358B
CN106817358B CN201510870959.5A CN201510870959A CN106817358B CN 106817358 B CN106817358 B CN 106817358B CN 201510870959 A CN201510870959 A CN 201510870959A CN 106817358 B CN106817358 B CN 106817358B
Authority
CN
China
Prior art keywords
key
encryption
user
decryption
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510870959.5A
Other languages
Chinese (zh)
Other versions
CN106817358A (en
Inventor
沈声发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510870959.5A priority Critical patent/CN106817358B/en
Publication of CN106817358A publication Critical patent/CN106817358A/en
Application granted granted Critical
Publication of CN106817358B publication Critical patent/CN106817358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method and a device for encrypting and decrypting user resources, which comprise the following steps: acquiring user resources to be processed, and determining a key index corresponding to a key for encrypting the user resources; determining an encryption key for encrypting the user resource according to the key index; and encrypting the user resource by using the encryption key to obtain an encryption result. By determining the key index for the user resource and determining the encryption key for encrypting the user resource according to the key corresponding to the key index, different probabilities of the encryption key determined by the system for different user resources are increased, so that the problem that the risk of user information leakage in an application platform is increased due to the fact that the encryption mode adopted for transmitting the user information between the application platforms establishing the cooperation relationship in the prior art is relatively fixed can be effectively solved, the safety of the user resource is effectively improved, and the risk of user resource leakage is reduced.

Description

Encryption and decryption method and device for user resources
Technical Field
The present application relates to the field of network information security, and in particular, to a method and an apparatus for encrypting and decrypting user resources.
Background
With the rapid development of internet technology, various application platforms have emerged. In order to better provide network service for users, cooperation relationships can be established among different application platforms, and based on the cooperation relationships, part of information in user information stored in one application platform can be used by other application platforms, so that the quality of the network service provided by the application platforms for users is effectively improved.
For example: assuming that a cooperation relationship is established between the application platform A and the application platform B, and the application platform A and the application platform B are allowed to share user address information, a user logs in the application platform B and initiates a purchase service on the application platform B, when the application platform B needs the user to provide the user address information, the application platform B can obtain the user address information of the user from the application platform A at the moment, and the user address information does not need to be input again by the user, so that great convenience is brought to the use of the user.
However, there is more than one other application platform establishing a cooperative relationship with the application platform a, that is, different other application platforms can respectively obtain the required user information from the application platform a through the cooperative relationship. In the prior art, a fixed encryption mode is adopted for transmitting user information between an application platform a and other application platforms (e.g., an application platform B, an application platform C, etc.) establishing a cooperative relationship, that is, an encryption mode adopted by user information 1 shared by the application platform a to the application platform B is the same as an encryption mode adopted by user information 2 shared by the application platform a to the application platform C, wherein the user information 1 and the user information 2 belong to different types of information of the same user, for example: the user information 1 is address information of a user, and the user information 2 is number information of the user.
However, it has been found that the currently used method causes a great safety hazard to the application platform a: once the encryption mode is cracked, any one application platform which establishes a cooperative relationship with the application platform a can easily acquire other user information of the user from other application platforms which establish the cooperative relationship with the application platform a, so that the risk of leakage of the user information in the application platforms is increased.
Disclosure of Invention
In view of this, embodiments of the present application provide a method and an apparatus for encrypting and decrypting user resources, so as to solve the problem that in the prior art, a risk that user information is leaked in an application platform is increased due to a fixed encryption manner used for transmitting user information between application platforms that establish a cooperative relationship.
The application provides an encryption method of user resources, which comprises the following steps:
acquiring user resources to be processed, and determining a key index corresponding to a key for encrypting the user resources;
determining an encryption key for encrypting the user resource according to the key index;
and encrypting the user resource by using the encryption key to obtain an encryption result.
The application provides a decryption method of user resources, which comprises the following steps:
acquiring encrypted information containing user resources, and determining a key index corresponding to a key for decrypting the encrypted information;
determining a decryption key for decrypting the encrypted information according to the key index;
and decrypting the encrypted information by using the decryption key to obtain the decrypted user resource.
The application provides an encryption device of user resources, comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring user resources to be processed and determining a key index corresponding to a key for encrypting the user resources;
a determining unit, configured to determine, according to the key index, an encryption key used for encrypting the user resource;
and the encryption unit is used for encrypting the user resource by using the encryption key to obtain an encryption result.
The application provides a decryption device of user resources, comprising:
an obtaining unit, configured to obtain encrypted information including user resources, and determine a key index corresponding to a key used to decrypt the encrypted information;
a determining unit configured to determine a decryption key for decrypting the encrypted information according to the key index;
and the decryption unit is used for decrypting the encrypted information by using the decryption key to obtain the decrypted user resource.
The beneficial effect of this application is as follows:
according to the scheme provided by the application, user resources to be processed are obtained, and a key index corresponding to a key for encrypting the user resources is determined; determining an encryption key for encrypting the user resource according to the key index; and encrypting the user resource by using the encryption key to obtain an encryption result. By determining the key index for the user resource and determining the encryption key for encrypting the user resource according to the key corresponding to the key index, different probabilities of the encryption key determined by the system for different user resources are increased, so that the problem that the risk of user information leakage in an application platform is increased due to the fact that the encryption mode adopted for transmitting the user information between the application platforms establishing the cooperation relationship in the prior art is relatively fixed can be effectively solved, the safety of the user resource is effectively improved, and the risk of user resource leakage is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flowchart of an encryption method for a user resource according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a decryption method for a user resource according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an encryption device for user resources according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a decryption device for a user resource according to an embodiment of the present application.
Detailed Description
In order to achieve the purpose of the present application, an embodiment of the present application provides an encryption method and device for a user resource, which obtains a user resource to be processed, and determines a key index corresponding to a key used for encrypting the user resource; determining an encryption key for encrypting the user resource according to the key index; and encrypting the user resource by using the encryption key to obtain an encryption result. By determining the key index for the user resource and determining the encryption key for encrypting the user resource according to the key corresponding to the key index, different probabilities of the encryption key determined by the system for different user resources are increased, so that the problem that the risk of user information leakage in an application platform is increased due to the fact that the encryption mode adopted for transmitting the user information between the application platforms establishing the cooperation relationship in the prior art is relatively fixed can be effectively solved, the safety of the user resource is effectively improved, and the risk of user resource leakage is reduced.
It should be noted that, in the embodiment of the present application, a user resource to be processed may be encrypted based on an Advanced Encryption Standard (AES), where the AES is a symmetric encryption method, also called Rijndael encryption method, and the AES is characterized in that: the encryption key and the decryption key are the same, and after the user resource to be processed is encrypted, the number of character bits occupied by the encryption result is the same as the number of character bits occupied by the user resource to be processed, and the user resource to be processed can also be encrypted based on other encryption modes, which is not specifically limited herein.
Various embodiments of the present application will be described in further detail with reference to the drawings attached hereto, and it should be understood that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, in the embodiment provided in the present application, a first application platform may establish a cooperative relationship with multiple application platforms, and allow the multiple application platforms to share a user resource of a user on the first application platform, and the encryption/decryption method for a user resource described in the embodiment of the present application may be applied when the user resource is shared between different application platforms, and may also be applied when the user resource needs to be acquired between different application platforms, which is not limited herein. The following description will take an example of establishing a cooperation relationship between the first application platform and the second application platform.
Fig. 1 is a schematic flowchart of an encryption method for a user resource according to an embodiment of the present application, where the method is described as follows.
Step 101: the method comprises the steps of obtaining user resources to be processed, and determining a key index corresponding to a key for encrypting the user resources.
Step 102: and determining an encryption key for encrypting the user resource according to the key index.
Step 103: and encrypting the user resource by using the encryption key to obtain an encryption result.
The implementation of each of the above steps is described in detail below.
In step 101, a cooperative relationship is established between the first application platform and the second application platform, and the second application platform is allowed to share user resources of the user on the first application platform, where the user resources may be a user identifier of the user on the first application platform, or user information of the user on the first application platform, and the user information described in this embodiment of the present application may include receiving address information of the user, mobile phone number information of the user, and other user information registered by the user on the first application platform, which is not specifically limited herein.
Taking the user information as the receiving address information of the user as an example for explanation, when a service request is initiated on the second application platform and the receiving address information of the user needs to be acquired to complete the service operation, since the second application platform has established a cooperative relationship with the first application platform, the second application platform can acquire the shipping address information of the user from the first application platform, and at this time, the second application platform initiates a resource sharing request to the first application platform to request to acquire the receiving address information of the user on the first application platform, wherein, the resource sharing request comprises the user identification of the resource to be shared and the identification of the second application platform, the first application platform searches the receiving address information corresponding to the user identification according to the user identification of the resource to be shared contained in the resource sharing request, and sending the searched receiving address information to a second application platform according to the identifier of the second application platform.
However, the application platform that establishes a cooperative relationship with the first application platform is not limited to the second application platform, and in order to ensure the security of the shipping address information of the user that is sent from the first application platform to the second application platform, the first application platform needs to encrypt the shipping address information of the user that is sent to the second application platform.
In the embodiment provided by the present application, one of the users on the first application platform is taken as a research object, and the example of encrypting the user resource of the user on the first application platform is described.
Before performing the encryption operation, the user resource to be processed needs to be determined.
It should be noted that, in the embodiments provided in the present application, the manners of determining the user resource to be processed include, but are not limited to, the following two manners:
the first mode is as follows: when the second application platform initiates a resource sharing request to the first application platform, determining user resources to be processed through the resource sharing request.
The second mode is as follows: when the first application platform and the second application platform establish a cooperative relationship, user resources which are allowed to be obtained by the second application platform are determined in advance, and the user resources are used as user resources to be processed.
After the user resource to be processed is acquired, encryption operation needs to be performed on the user resource.
It should be noted that, in order to ensure the security of the user resource, in the embodiment provided in the present application, different keys are used to encrypt different user resources, and therefore, after the user resource to be processed is obtained, a key index corresponding to the key used to encrypt the user resource needs to be determined. The key index and the key satisfy a one-to-one correspondence relationship so as to determine an encryption key for encrypting the user resource according to the key index.
Specifically, the key index corresponding to the key used for encrypting the user resource may be determined in the following ways:
the first mode is as follows: based on the acquired user resource to be processed, a key index is randomly searched from a key database, and the searched key index is used as a key index corresponding to a key for encrypting the user resource.
The key database described in the embodiments of the present application may be preset, and a correspondence relationship between key indexes and keys is established in the key database, and each key corresponds to one key index. In the embodiment of the present application, the key index may be randomly determined for the user resource to be processed, and may also be determined according to the user identifier corresponding to the user resource and/or the resource type corresponding to the user resource, which is not specifically limited herein.
For example: assuming that the number of keys stored in the key database is 10000, when corresponding key indexes are determined for the 10000 keys, it is assumed that the key index determined for the first key is 0000, the key index determined for the second key is 0001, … …, and the key index determined for the 10000 th key is 9999, and other methods may also be used to determine corresponding key indexes for different keys.
After a key index is determined for each key in the key database, the correspondence between the key and the key index is stored in the key database.
The second mode is as follows: analyzing the user resources according to a set algorithm based on the acquired user resources to be processed, and searching a key index corresponding to a key for encrypting the user resources from a key database according to an analysis result.
Specifically, the user resource is analyzed according to a set algorithm, a part of information is selected from the user resource as a condition for searching the key index, and the key index matched with the selected part of information is searched from the key database as the key index corresponding to the key for encrypting the user resource.
For example: and determining the number of the character bits occupied by the user resources, and selecting any n-bit character information as a part of selected information, wherein the value range of n is more than 1 and less than or equal to the number of the character bits occupied by the user resources.
It should be noted that, a key index corresponding to a key used for encrypting the user resource may also be determined according to other manners, and embodiments provided in the present application are not particularly limited, as long as it is ensured that the key index is different for different user resources.
The third mode is as follows: according to a set decoding algorithm, decoding operation is carried out on the user resources, the number of character bits occupied by the decoded user resources is smaller than the number of character bits occupied by the user resources to be processed, a difference value is obtained by subtracting the number of the character bits occupied by the user resources to be processed from the number of the character bits occupied by the user resources to be decoded, a key index group with the same number of the character bits occupied by the user resources as the difference value is searched from a key database, and a key index is randomly selected from the key index group to serve as a key index corresponding to a key used for encrypting the user resources.
After determining a key index corresponding to a key for encrypting the user resource, in step 102, an encryption key for encrypting the user resource is determined according to the determined key index, and specific implementation manners include, but are not limited to, the following:
the first method comprises the following steps:
and searching a key corresponding to the determined key index from a key database according to the corresponding relation between the key index and the key, and taking the searched key as an encryption key for encrypting the user resource.
It should be noted that, in the method described in step 101, the key database already stores the correspondence between the key index and the key in advance, so that the key corresponding to the key index can be found in the key database according to the key index.
The second method comprises the following steps:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database; and obtaining an encryption key for encrypting the user resource by using the key index and the key identifier.
The key identifier here refers to identification information of a key, and does not represent a real key, and a key for encrypting the user resource can be obtained according to the key identifier and the key index.
It should be noted that, the corresponding relationship between the key index and the key identifier, and the corresponding relationship between the key index, the key identifier, and the key may be stored in advance in the key database, so that the key identifier corresponding to the key index may be found in the key database according to the key index in the following.
Specifically, after the key identifier is queried, a key may be obtained by searching or calculating according to the key index and the key identifier, and the obtained key is used as an encryption key for encrypting the user resource.
The third method comprises the following steps:
and determining an encryption key for encrypting the user resource according to the key index and the identifier of the application platform.
It should be noted that the application platform identifier described in this embodiment of the present application refers to a second application platform identifier, after the first application platform receives the resource sharing request sent by the second application platform, the identifier of the second application platform may be determined according to the resource sharing request, or the identifier of the second application platform may be determined when the user resource to be processed is obtained, or when the first application platform and the second application platform establish a cooperative relationship, the first application platform sets the identifier of the application platform for the second application platform in advance, and when the resource sharing request is received or the user resource to be processed is obtained, the application platform identifier set for the second application platform in advance is obtained, where a specific implementation manner is not limited here.
Thus, according to the key index and the identifier of the application platform, an encryption key for encrypting the user resource is determined, so as to ensure that the same user resource has different encryption keys on different application platforms.
Specifically, the manner of determining the encryption key for encrypting the user resource according to the key index and the identifier of the application platform includes, but is not limited to, the following two cases:
the first case: according to the corresponding relation between the key index and the key, searching the key corresponding to the determined key index from a key database, and taking the searched key as an initial key for encrypting the user resource; and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
Specifically, a key corresponding to the key index is searched in the key database according to the key index, and at this time, the searched key is only used as an initial key, that is, the searched key is not used as an encryption key for encrypting the user resource.
And after the searched key is obtained, obtaining an encryption key for encrypting the user resource according to the searched key and the determined identifier of the application platform. The manner of obtaining the encryption key is not specifically limited, and the identifier of the application platform may be directly added behind the searched key to obtain the encryption key, or the identifier of the application platform may be directly added in front of the searched key to obtain the encryption key.
The second case: according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database; obtaining an initial key for encrypting the user resource by using the key index and the key identifier; and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
After obtaining the encryption key for encrypting the user resource, in step 103, the user resource is encrypted by using the encryption key determined in step 102 to obtain an encryption result.
In step 103, the encryption key used may be obtained by selecting any one of the methods for determining an encryption key described in step 102, and the obtained encryption key is used to encrypt the user resource, where the method for obtaining an encryption result includes, but is not limited to, the following methods:
the first mode is as follows: and directly encrypting the user resources by using the encryption key to obtain an encryption result.
The second mode is as follows: according to a set decoding algorithm, decoding operation is carried out on the user resource to obtain the decoded user resource, and the encrypted user resource is encrypted by using the encryption key to obtain an encrypted ciphertext corresponding to the decoded user resource; and combining the encrypted ciphertext and the key index to obtain an encrypted result.
And the number of the character bits occupied by the encryption result is the same as the number of the character bits occupied by the user resource to be processed.
The existing encryption algorithm has the characteristics of encrypting user resources: after the user resources are encrypted, the number of the character bits occupied by the encryption result is larger than that of the character bits occupied by the user resources, so that the server of the first application platform is very inconvenient to store the encryption result with the larger number of the character bits, and the problem of resource waste exists. In order to overcome this problem, in the embodiment provided in the present application, when performing an encryption operation, the number of the character bits occupied by the encryption result may be limited to be the same as the number of the character bits occupied by the user resource to be processed, that is, assuming that the number of the character bits occupied by the user resource to be processed is 16 bits, and after encrypting the user resource to be processed, the number of the character bits occupied by the encryption result is also 16 bits.
In order to ensure that the number of the character bits occupied by the encryption result is the same as the number of the character bits occupied by the user resource to be processed, in the embodiment of the application, the encryption result is divided into two parts: one part is an encrypted ciphertext obtained by encrypting the user resource, and the other part is the key index determined in step 101.
In the embodiment of the present application, the number of the character bits occupied by the encrypted ciphertext is determined according to the number of the character bits occupied by the key index, the number of the character bits occupied by the key index is determined according to the number of the character bits occupied by the encrypted ciphertext obtained by the decoding algorithm, and the number of the character bits occupied by the encrypted ciphertext and/or the number of the character bits occupied by the key index are predetermined, which is not particularly limited.
The following description will take the example of determining the number of character bits occupied by the encrypted ciphertext according to the number of character bits occupied by the key index.
In step 101, a key index used for encrypting the user resource is determined, at this time, the number of character bits occupied by the key index can be determined, then, the number of character bits occupied by an encrypted ciphertext is obtained according to the number of character bits occupied by the user resource to be processed, and then, the number of character bits occupied by the user resource to be processed after performing a decoding operation is determined.
Specifically, after the user resource to be processed is obtained, the user resource is decoded to reduce the number of character bits occupied by the user resource.
The decoding algorithm for decoding the user resource may be a method for reducing the number of character bits occupied by the user resource to be processed, for example: a base64 algorithm, a bit reduction algorithm, etc., or other algorithms, which are not limited in particular.
After the user resource is decoded, the sum of the number of the character bits occupied by the decoded user resource and the number of the character bits occupied by the key index is the same as the number of the character bits occupied by the user resource to be processed, so that the problems that a server of a first application platform is very inconvenient to store an encryption result with a large number of character bits and resources are wasted can be solved.
For example, the number of the character bits occupied by the user resource to be processed is 16 bits, the number of the character bits occupied by the key index is 4 bits, and the number of the character bits occupied by the decoded user resource is 12 bits.
Specifically, the decoded user resource is obtained after the user resource is decoded, and the encryption key determined in step 102 is used to encrypt the obtained decoded user resource to obtain an encrypted ciphertext.
After the encrypted ciphertext is obtained, the encrypted ciphertext and the key index are combined to obtain an encryption result, and a method for combining the encrypted ciphertext and the key index is not particularly limited.
Optionally, in the embodiment of the present application, the user resource to be processed is encrypted by using an AES algorithm, where the encryption characteristic of the AES method is that an encryption key and a decryption key are the same, so that, after the user resource to be processed is encrypted, the encryption key used for encrypting the user resource to be processed and the correspondence between the user resource to be processed can be stored, so as to decrypt the encrypted user resource by using the encryption key.
According to the scheme provided by the embodiment of the application, the user resource to be processed is obtained, and the key index corresponding to the key for encrypting the user resource is determined; determining an encryption key for encrypting the user resource according to the key index; and encrypting the user resource by using the encryption key to obtain an encryption result. By determining the key index for the user resource and determining the encryption key for encrypting the user resource according to the key corresponding to the key index, different probabilities of the encryption key determined by the system for different user resources are increased, so that the problem that the risk of user information leakage in an application platform is increased due to the fact that the encryption mode adopted for transmitting the user information between the application platforms establishing the cooperation relationship in the prior art is relatively fixed can be effectively solved, the safety of the user resource is effectively improved, and the risk of user resource leakage is reduced.
It should be noted that, the first application platform establishes a cooperative relationship with the second application platform, and after the first application platform encrypts the different types of user resources of the user on the first application platform by the above-mentioned recording method, the encryption result is sent to the second application platform, when the second application platform needs to acquire the user resource of the first application platform to complete the service operation, the second application platform initiates a resource sharing request to the first application platform, wherein, the resource sharing request comprises the encryption information of the user resource, the first application platform receives the resource sharing request sent by the second application platform, and obtaining the encrypted information of the user resource contained therein, at this time, the first application platform needs to decrypt the encrypted information of the user resource, and the decrypted user resource is obtained, so that the first application platform can send the decrypted user resource to the second application platform.
Fig. 2 is a schematic flowchart of a decryption method for a user resource according to an embodiment of the present application, where the method is described as follows.
Step 201: the method comprises the steps of obtaining encryption information containing user resources, and determining a key index corresponding to a key for decrypting the encryption information.
Step 202: and determining a decryption key for decrypting the encrypted information according to the key index.
Step 203: and decrypting the encrypted information by using the decryption key to obtain the decrypted user resource.
The implementation of each of the above steps is described in detail below.
In step 201, after receiving a resource sharing request sent by a second application platform, a first application platform obtains encrypted information containing user resources according to the resource sharing request, and determines a key index corresponding to a key for decrypting the encrypted information according to the obtained encrypted information.
In the embodiment of the application, the user resource involved in the decryption process can be a user identifier for the first application platform; it may be user information for the second application platform.
It should be noted that, assuming that the encrypted information is obtained by directly encrypting the user resource by using the encryption key determined by the key index, after the encryption operation is performed, the corresponding relationship between the encrypted information and the key index is stored, so that when the encrypted information is obtained, the key index corresponding to the key used for decrypting the encrypted information can be determined.
In a first embodiment provided by the present application, if the encryption result of the to-be-processed user resource includes the key index, after the obtained encryption information, the key index may be determined according to the encryption information.
Specifically, the encrypted information is analyzed, and an encrypted ciphertext contained in the encrypted information and a key index corresponding to a key for decrypting the encrypted information are determined, wherein the sum of the number of character bits occupied by the encrypted ciphertext and the number of character bits occupied by the key index is the same as the number of character bits occupied by the encrypted information.
Then, a decryption key for decrypting the encrypted information is determined according to the determined key index, and specific implementation manners include, but are not limited to, the following:
the first method comprises the following steps:
and searching a key corresponding to the key index from a key database according to the corresponding relation between the key index and the key, and using the searched key as a decryption key for decrypting the encrypted information.
It should be noted that, in the first embodiment provided in the present application, the correspondence between the key index and the key is stored in the key database in advance, and the description is not repeated here.
The second method comprises the following steps:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database; and determining a decryption key for decrypting the encrypted information by using the key index and the key identification.
It should be noted that, the correspondence between the key index and the key identifier is stored in the key database in advance, and is specifically described in the first embodiment provided in the present application, and the description is not repeated here.
Specifically, after the key identifier is queried, a key may be obtained by searching or calculating according to the key index and the key identifier, and the obtained key is used as a decryption key for decrypting the encrypted information.
The third method comprises the following steps:
and determining a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform.
Specifically, the first case: according to the corresponding relation between the key index and the key, searching the key corresponding to the determined key index from a key database, and taking the searched key as an initial key for decrypting the encrypted information; and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
The second case: according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database; determining an initial key for decrypting the encrypted information by using the key index and the key identifier; and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
After deriving the decryption key, the first case: and directly decrypting the encrypted information to obtain the decrypted user resources.
The second case: for the situation that the encrypted information contains the encrypted ciphertext and the key index, firstly, the encrypted ciphertext contained in the encrypted information needs to be decrypted by using a decryption key to obtain a decryption result; and secondly, obtaining the decrypted user resource according to the decryption result.
Specifically, according to a set encoding algorithm, encoding operation is performed on the decryption result to obtain encoded user resources, wherein the number of character bits occupied by the encoded user resources is the same as the number of character bits occupied by original user resources.
The encoding operation and the decoding operation described in the first embodiment provided by the present application are inverse operations, that is, the decoding operation can reduce the number of character bits occupied by the decoded object, the encoding operation can increase the number of character bits occupied by the encoded object, the encoding algorithm selected here can be determined according to the decoding algorithm selected when encrypting the user resource to be processed, and may be a base64 algorithm, or other algorithms, which is not limited specifically.
And after the encoding operation is carried out on the user resource to be processed, the obtained decrypted user resource is the decoded user resource, wherein the number of character bits occupied by the decrypted user resource is the same as that occupied by the original user resource.
In this embodiment of the present application, if the used encryption algorithm is an AES method, when decrypting the encrypted information, based on the characteristics of the AES method, the encryption key may be the same as the decryption key, when obtaining the encrypted information, the encryption key used when generating the encrypted information is determined, and the encrypted information is decrypted by using the encryption key, so that the required user resource may be obtained.
It should be noted that, in the embodiment provided in the present application, the process of decrypting the encrypted information containing the user resource and the process of encrypting the to-be-processed user resource may be operated in reverse to each other.
Fig. 3 is a schematic structural diagram of a user resource encryption device according to an embodiment of the present application. The apparatus comprises: an acquisition unit 31, a determination unit 32, an encryption unit 33, and a platform identification acquisition unit 34, wherein:
an obtaining unit 31, configured to obtain a user resource to be processed, and determine a key index corresponding to a key used for encrypting the user resource;
a determining unit 32, configured to determine, according to the key index, an encryption key used for encrypting the user resource;
and an encrypting unit 33, configured to encrypt the user resource with the encryption key to obtain an encryption result.
Optionally, when acquiring the user resource to be processed, the acquiring unit 31 further includes:
according to a set decoding algorithm, decoding operation is carried out on the user resources, so that the sum of the number of character bits occupied by the decoded user resources and the number of character bits occupied by the key index is the same as the number of character bits occupied by the user resources to be processed;
the encrypting unit 33 encrypts the user resource by using the encryption key to obtain an encryption result, including:
and encrypting the decoded user resource by using the encryption key to obtain an encryption result.
The determining unit 32 determines an encryption key for encrypting the user resource according to the key index, including:
and searching a key corresponding to the key index from a key database according to the corresponding relation between the key index and the key, and taking the searched key as an encryption key for encrypting the user resource.
Optionally, the encryption device further includes a platform identification obtaining unit 34, wherein:
the platform identifier obtaining unit 34 is configured to determine an identifier of an application platform that needs to share the user resource;
the determining unit 32 determines an encryption key for encrypting the user resource according to the key index, including:
and determining an encryption key for encrypting the user resource according to the key index and the identifier of the application platform.
The determining unit 32 determines an encryption key for encrypting the user resource according to the key index and the identifier of the application platform, including:
according to the corresponding relation between the key index and the key, searching the key corresponding to the key index from a key database, and taking the searched key as an initial key for encrypting the user resource;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
Optionally, the determining unit 32 determines an encryption key for encrypting the user resource according to the key index and the identifier of the application platform, and further includes:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database;
determining an initial key for encrypting the user resource by using the key index and the key identifier;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
The encrypting unit 33 encrypts the decoded user resource by using the encryption key to obtain an encryption result, including:
encrypting the decoded user resource by using the encryption key to obtain an encrypted ciphertext corresponding to the decoded user resource;
and merging the encrypted ciphertext and the key index to obtain an encrypted result, wherein the number of character bits occupied by the encrypted result is the same as the number of character bits occupied by the user resource to be processed.
It should be noted that the encryption device for user resources provided in the embodiment of the present application may be implemented in a hardware manner, or may be implemented in a software manner, which is not limited herein.
Fig. 4 is a schematic structural diagram of a decryption device for a user resource according to an embodiment of the present application, where the decryption device includes: an obtaining unit 41, a determining unit 42, a decrypting unit 43, and a platform identification determining unit 44, wherein:
an obtaining unit 41, configured to obtain encrypted information including user resources, and determine a key index corresponding to a key used for decrypting the encrypted information;
a determining unit 42, further configured to determine, according to the key index, a decryption key for decrypting the encrypted information;
and a decryption unit 43, configured to decrypt the encrypted information with the decryption key to obtain a decrypted user resource.
Optionally, the obtaining unit 41 determines a key index corresponding to a key for decrypting the encrypted information by the user, and includes:
analyzing the encrypted information, and determining an encrypted ciphertext contained in the encrypted information and a key index corresponding to a key for decrypting the encrypted information, wherein the sum of the number of character bits occupied by the encrypted ciphertext and the number of character bits occupied by the key index is the same as the number of character bits occupied by the encrypted information;
the decryption unit 43 decrypts the encrypted information using the decryption key, and includes:
decrypting the encrypted ciphertext by using the decryption key to obtain a decryption result;
and obtaining the decrypted user resource according to the decryption result.
The determining unit 42 determines a decryption key for decrypting the encrypted information based on the key index, including:
and searching a key corresponding to the determined key index from a key database according to the corresponding relation between the key index and the key, and using the searched key as a decryption key for decrypting the encrypted information.
Optionally, the decryption device further comprises a platform identification determination unit 44, wherein:
the platform identification determination unit 44 is configured to determine an identification of an application platform that sends the encrypted information;
the determining unit 42 determines a decryption key for decrypting the encrypted information based on the key index, including:
and determining a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform.
The determining unit 43 determines a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform, including:
according to the corresponding relation between the key index and the key, searching the key corresponding to the determined key index from a key database, and taking the searched key as an initial key for decrypting the encrypted information;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
The determining unit 43 determines a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform, and further includes:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database;
determining an initial key for decrypting the encrypted information by using the key index and the key identifier;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
Optionally, the decrypting unit 43 obtains the decrypted user resource according to the decryption result, and includes:
and according to a set coding algorithm, carrying out coding operation on the result to be decrypted to obtain coded user resources, wherein the number of character bits occupied by the coded user resources is the same as that occupied by the original user resources.
It should be noted that the decryption device for the user resource provided in the embodiment of the present application may be implemented in a hardware manner, or may be implemented in a software manner, which is not limited herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus (device), or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (25)

1. A method for encrypting a user resource, comprising:
acquiring user resources to be processed, and determining a key index corresponding to a key for encrypting the user resources; wherein the user resources include: the key index corresponds to the user resource;
according to a set decoding algorithm, decoding operation is carried out on the user resources, so that the sum of the number of character bits occupied by the decoded user resources and the number of character bits occupied by the key index is the same as the number of character bits occupied by the user resources to be processed;
determining an encryption key for encrypting the user resource according to the key index; wherein the encryption key corresponds to an application platform requesting to share a resource;
and encrypting the decoded user resource by using the encryption key to obtain an encryption result.
2. The encryption method of claim 1, wherein determining an encryption key for encrypting the user resource based on the key index comprises:
and searching a key corresponding to the key index from a key database according to the corresponding relation between the key index and the key, and taking the searched key as an encryption key for encrypting the user resource.
3. The encryption method of claim 1, wherein the encryption method further comprises:
determining the identification of the application platform needing to share the user resource;
determining an encryption key for encrypting the user resource according to the key index, comprising:
and determining an encryption key for encrypting the user resource according to the key index and the identifier of the application platform.
4. The encryption method of claim 3, wherein determining an encryption key for encrypting the user resource based on the key index and the identification of the application platform comprises:
according to the corresponding relation between the key index and the key, searching the key corresponding to the key index from a key database, and taking the searched key as an initial key for encrypting the user resource;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
5. The encryption method of claim 3, wherein determining an encryption key for encrypting the user resource based on the key index and the identification of the application platform comprises:
searching a key identifier corresponding to the key index from a key database according to the corresponding relation between the key index and the key identifier;
determining an initial key for encrypting the user resource by using the key index and the key identifier;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
6. The encryption method of claim 1, wherein encrypting the decoded user resource using the encryption key to obtain an encryption result comprises:
encrypting the decoded user resource by using the encryption key to obtain an encrypted ciphertext corresponding to the decoded user resource;
and merging the encrypted ciphertext and the key index to obtain an encrypted result, wherein the number of character bits occupied by the encrypted result is the same as the number of character bits occupied by the user resource to be processed.
7. A method for decrypting a user resource, comprising:
acquiring encrypted information containing user resources, and determining a key index corresponding to a key for decrypting the encrypted information; wherein the user resources include: the key index corresponds to the user resource;
determining a decryption key for decrypting the encrypted information according to the key index; wherein the decryption key corresponds to the application platform requesting the shared resource;
decrypting the encrypted information by using the decryption key to obtain a decryption result;
and according to a set coding algorithm, carrying out coding operation on the decryption result to obtain coded user resources, wherein the number of character bits occupied by the coded user resources is the same as that occupied by the original user resources.
8. The decryption method of claim 7, wherein determining a key index corresponding to a key used to decrypt the encrypted information comprises:
analyzing the encrypted information, and determining an encrypted ciphertext contained in the encrypted information and a key index corresponding to a key for decrypting the encrypted information, wherein the sum of the number of character bits occupied by the encrypted ciphertext and the number of character bits occupied by the key index is the same as the number of character bits occupied by the encrypted information;
decrypting the encrypted information by using the decryption key to obtain a decryption result, comprising:
and decrypting the encrypted ciphertext by using the decryption key to obtain a decryption result.
9. The decryption method of claim 7, wherein determining a decryption key for decrypting the encrypted information based on the key index comprises:
and searching a key corresponding to the determined key index from a key database according to the corresponding relation between the key index and the key, and using the searched key as a decryption key for decrypting the encrypted information.
10. The decryption method of claim 7, wherein the decryption method further comprises:
determining an identifier of an application platform which sends the encrypted information;
determining a decryption key for decrypting the encrypted information according to the key index, comprising:
and determining a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform.
11. The decryption method of claim 10, wherein determining a decryption key for decrypting the encrypted information based on the key index and the identification of the application platform comprises:
according to the corresponding relation between the key index and the key, searching the key corresponding to the determined key index from a key database, and taking the searched key as an initial key for decrypting the encrypted information;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
12. The decryption method of claim 10, wherein determining a decryption key for decrypting the encrypted information based on the key index and the identification of the application platform comprises:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database;
determining an initial key for decrypting the encrypted information by using the key index and the key identifier;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
13. An encryption device for a user resource, comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring user resources to be processed and determining a key index corresponding to a key for encrypting the user resources; wherein the user resources include: the key index corresponds to the user resource; and the number of the first and second groups,
according to a set decoding algorithm, decoding operation is carried out on the user resources, so that the sum of the number of character bits occupied by the decoded user resources and the number of character bits occupied by the key index is the same as the number of character bits occupied by the user resources to be processed;
a determining unit, configured to determine, according to the key index, an encryption key used for encrypting the user resource; wherein the encryption key corresponds to an application platform requesting to share a resource;
and the encryption unit is used for encrypting the decoded user resource by using the encryption key to obtain an encryption result.
14. The encryption device according to claim 13, wherein the determining unit determines an encryption key used for the user resource to encrypt, based on the key index, includes:
and searching a key corresponding to the key index from a key database according to the corresponding relation between the key index and the key, and taking the searched key as an encryption key for encrypting the user resource.
15. The encryption device of claim 13, wherein the encryption device further comprises: a platform identification acquisition unit, wherein:
the platform identification obtaining unit is used for determining the identification of the application platform needing to share the user resource;
the determining unit determines an encryption key for encrypting the user resource according to the key index, including:
and determining an encryption key for encrypting the user resource according to the key index and the identifier of the application platform.
16. The encryption device of claim 15, wherein the determining unit determines an encryption key for encrypting the user resource based on the key index and the identification of the application platform, comprising:
according to the corresponding relation between the key index and the key, searching the key corresponding to the key index from a key database, and taking the searched key as an initial key for encrypting the user resource;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
17. The encryption device of claim 15, wherein the determining unit determines an encryption key for encrypting the user resource based on the key index and the identification of the application platform, comprising:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database;
determining an initial key for encrypting the user resource by using the key index and the key identifier;
and generating an encryption key for encrypting the user resource according to the identifier of the application platform and the initial key.
18. The encryption device according to claim 13, wherein the encryption unit encrypts the decoded user resource using the encryption key to obtain an encryption result, comprising:
encrypting the decoded user resource by using the encryption key to obtain an encrypted ciphertext corresponding to the decoded user resource;
and merging the encrypted ciphertext and the key index to obtain an encrypted result, wherein the number of character bits occupied by the encrypted result is the same as the number of character bits occupied by the user resource to be processed.
19. A decryption apparatus for a user resource, comprising:
an obtaining unit, configured to obtain encrypted information including user resources, and determine a key index corresponding to a key used to decrypt the encrypted information; wherein the user resources include: the key index corresponds to the user resource;
a determining unit configured to determine a decryption key for decrypting the encrypted information according to the key index; wherein the decryption key corresponds to the application platform requesting the shared resource;
the decryption unit is used for decrypting the encrypted information by using the decryption key to obtain a decryption result; and according to a set coding algorithm, carrying out coding operation on the decryption result to obtain coded user resources, wherein the number of character bits occupied by the coded user resources is the same as that occupied by the original user resources.
20. The decryption device according to claim 19, wherein the obtaining unit determines a key index corresponding to a key for decrypting the encrypted information, including:
analyzing the encrypted information, and determining an encrypted ciphertext contained in the encrypted information and a key index corresponding to a key for decrypting the encrypted information, wherein the sum of the number of character bits occupied by the encrypted ciphertext and the number of character bits occupied by the key index is the same as the number of character bits occupied by the encrypted information;
the decryption unit decrypts the encrypted information by using the decryption key to obtain a decryption result, and includes:
and decrypting the encrypted ciphertext by using the decryption key to obtain a decryption result.
21. The decryption device according to claim 19, wherein the determination unit determines a decryption key for decrypting the encrypted information based on the key index, including:
and searching a key corresponding to the determined key index from a key database according to the corresponding relation between the key index and the key, and using the searched key as a decryption key for decrypting the encrypted information.
22. The decryption device of claim 19, wherein the decryption device further comprises: a platform identification determination unit, wherein:
the platform identification determining unit is used for determining the identification of the application platform which sends the encrypted information;
the determining unit determines a decryption key for decrypting the encrypted information based on the key index, including:
and determining a decryption key for decrypting the encrypted information according to the key index and the identifier of the application platform.
23. The decryption device according to claim 22, wherein the determining unit determines a decryption key for decrypting the encrypted information based on the key index and the identification of the application platform, includes:
according to the corresponding relation between the key index and the key, searching the key corresponding to the determined key index from a key database, and taking the searched key as an initial key for decrypting the encrypted information;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
24. The decryption device according to claim 22, wherein the determining unit determines a decryption key for decrypting the encrypted information based on the key index and the identification of the application platform, includes:
according to the corresponding relation between the key index and the key identification, searching the key identification corresponding to the determined key index from a key database;
determining an initial key for decrypting the encrypted information by using the key index and the key identifier;
and generating a decryption key for decrypting the encrypted information according to the identifier of the application platform and the initial key.
25. The decryption device according to claim 20, wherein the decryption unit obtains the decrypted user resource based on the decryption result, including:
and according to a set coding algorithm, carrying out coding operation on the decryption result to obtain coded user resources, wherein the number of character bits occupied by the coded user resources is the same as that occupied by the original user resources.
CN201510870959.5A 2015-12-02 2015-12-02 Encryption and decryption method and device for user resources Active CN106817358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510870959.5A CN106817358B (en) 2015-12-02 2015-12-02 Encryption and decryption method and device for user resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510870959.5A CN106817358B (en) 2015-12-02 2015-12-02 Encryption and decryption method and device for user resources

Publications (2)

Publication Number Publication Date
CN106817358A CN106817358A (en) 2017-06-09
CN106817358B true CN106817358B (en) 2020-07-17

Family

ID=59108489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510870959.5A Active CN106817358B (en) 2015-12-02 2015-12-02 Encryption and decryption method and device for user resources

Country Status (1)

Country Link
CN (1) CN106817358B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277028B (en) * 2017-06-30 2020-05-19 阿里巴巴集团控股有限公司 Method, device, equipment and storage medium for transmitting chat emoticons among applications
CN107707528B (en) * 2017-09-04 2020-06-30 北京京东尚科信息技术有限公司 Method and device for isolating user information
CN107948178A (en) * 2017-12-04 2018-04-20 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN108123800B (en) * 2017-12-19 2021-06-15 腾讯科技(深圳)有限公司 Key management method, key management device, computer equipment and storage medium
CN109450852B (en) * 2018-10-09 2020-09-29 中国科学院信息工程研究所 Network communication encryption and decryption method and electronic equipment
CN113065841A (en) * 2021-03-10 2021-07-02 广西东信易联科技有限公司 Life cycle management method and system of Internet of things embedded equipment
CN116893903B (en) * 2023-09-11 2023-12-08 北京格尔国信科技有限公司 Encryption resource allocation method, system, equipment and storage medium
CN117155711A (en) * 2023-10-30 2023-12-01 北京安盟信息技术股份有限公司 Data security transmission method, system, medium and equipment based on serial port

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据***有限公司 Encryption and decryption method and device of digital media file
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN104580180A (en) * 2014-12-26 2015-04-29 北京佳月隶平软件有限公司 Data encryption method, data decryption method and devices
CN104767767A (en) * 2014-01-02 2015-07-08 ***通信集团公司 Method, device and system for sharing Internet access data and network equipment
CN104869175A (en) * 2015-06-16 2015-08-26 腾讯科技(北京)有限公司 Cross-platform account resource sharing implementation method, device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10007767B1 (en) * 2007-12-21 2018-06-26 EMC IP Holding Company LLC System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted application service

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据***有限公司 Encryption and decryption method and device of digital media file
CN101771532A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Method, device and system for realizing resource sharing
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN104767767A (en) * 2014-01-02 2015-07-08 ***通信集团公司 Method, device and system for sharing Internet access data and network equipment
CN104580180A (en) * 2014-12-26 2015-04-29 北京佳月隶平软件有限公司 Data encryption method, data decryption method and devices
CN104869175A (en) * 2015-06-16 2015-08-26 腾讯科技(北京)有限公司 Cross-platform account resource sharing implementation method, device and system

Also Published As

Publication number Publication date
CN106817358A (en) 2017-06-09

Similar Documents

Publication Publication Date Title
CN106817358B (en) Encryption and decryption method and device for user resources
CN110768787B (en) Data encryption and decryption method and device
US9118645B2 (en) Distributed authentication using persistent stateless credentials
CN112182644A (en) Data processing method and device and electronic equipment
CN108259171B (en) Shader file protection method and device
WO2013178019A1 (en) Method, device and system for implementing media data processing
CN107196840B (en) Data processing method, device and equipment
CN110312054B (en) Image encryption and decryption method, related device and storage medium
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
CN105099653A (en) Distributed data processing method, device and system
KR101697868B1 (en) Method for encrypting data for sharing or searching the data and apparatus for performing the method
CN108549824A (en) A kind of data desensitization method and device
CN111555880A (en) Data collision method and device, storage medium and electronic equipment
CN111193741B (en) Information sending method, information obtaining method, device and equipment
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN113326518B (en) Data processing method and device
CN108256343B (en) Encryption method and device and decryption method and device of Shader file
EP2784973A1 (en) Method, system, and device for digital content transmission
CN117155615A (en) Data encryption transmission method, system, electronic equipment and storage medium
CN111212058A (en) Method, device and system for logging in mobile phone verification code
CN107707611B (en) Electric power data cloud processing method, device and system
KR101339666B1 (en) Method and apparatus for encryption for modbus communication
KR20200091112A (en) Method for sharing information using blockchain technology
CN108985109A (en) A kind of date storage method and device
CN115102686A (en) Semi-homomorphic encryption method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1237553

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right