CN107171797A - A kind of data ciphering method and device - Google Patents

A kind of data ciphering method and device Download PDF

Info

Publication number
CN107171797A
CN107171797A CN201710586116.1A CN201710586116A CN107171797A CN 107171797 A CN107171797 A CN 107171797A CN 201710586116 A CN201710586116 A CN 201710586116A CN 107171797 A CN107171797 A CN 107171797A
Authority
CN
China
Prior art keywords
encryption
data
parameter
key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710586116.1A
Other languages
Chinese (zh)
Inventor
李华念
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710586116.1A priority Critical patent/CN107171797A/en
Publication of CN107171797A publication Critical patent/CN107171797A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data ciphering method and device, this method includes:Acquisition at least includes the key parameter of effective parameter, by the way that key parameter is combined into generation encryption key;Initial data is received, initial data is encrypted by encryption key, to obtain encryption data;Wherein, when encryption data is decrypted, if current time exceeds the scope of timeliness parameter, decryption failure.As can be seen here, this method shortens the time that cracker can be cracked to encryption data by setting timeliness parameter, and then adds the difficulty that cracks to data, and then improves the safety and reliability of encrypted data.In addition, data encryption device provided by the present invention, beneficial effect is as described above.

Description

A kind of data ciphering method and device
Technical field
The present invention relates to field of data encryption, more particularly to a kind of data ciphering method and device.
Background technology
Along with information-intensive society develop rapidly and the big data epoch arrival, the safety of data is increasingly by people's weight Depending on, and also undergo many security threats.
The data that user is transmitted and stored in routine use are all often the forms of plaintext, and this this may result in protecting There are the data on disk or network and the data transmitted by modes such as mails are after being stolen, criminal can be direct The consequence of clear content is got, therefore the security threat for data by the way of plaintext is transmitted data is too high. As can be seen here, it is the effective ways for improving data safety data to be encrypted, but is due to the method for existing data encryption Not in the encryption enterprising row constraint of timeliness, this just given criminal it is sufficient crack the time, this relative reduction encryption data Security.
There is no the shortcoming of constraint of timeliness to improve encrypted data there is provided a kind of data ciphering method as can be seen here, carry Security of the high data in storage and transmission, is those skilled in the art's urgent problem to be solved.
The content of the invention
It is an object of the invention to provide a kind of data ciphering method and device, improve the security of encrypted data with can By property.
In order to solve the above technical problems, the present invention provides a kind of data ciphering method, including:
Acquisition at least includes the key parameter of effective parameter, by the way that key parameter is combined into generation encryption key;
Initial data is received, initial data is encrypted by encryption key, to obtain encryption data;
Wherein, when encryption data is decrypted, if current time exceeds the scope of timeliness parameter, decryption is lost Lose.
It is preferred that, initial data is encrypted by encryption key and specifically included:
The position of the character in initial data is determined, and position is numbered;
Each character in initial data is encrypted respectively as encryption parameter, and by encryption key for numbering.
It is preferred that, key parameter also includes:
User account and the magic number of user.
It is preferred that, key parameter is combined into generation encryption key is specially:
User account and the magic number of user are combined generation secured account numbers;
The magic number of secured account numbers, timeliness parameter and user is subjected to hybrid operation generation encryption key.
It is preferred that, after encryption data is obtained, this method further comprises:
Encryption data is compiled as binary sequence.
It is preferred that, after encryption data is compiled as into binary sequence, this method further comprises:
Timeliness parameter is compiled as binary sequence, and is used as the stem of encryption data.
It is preferred that, binary sequence is specially two sequences processed of 32.
In addition, the present invention also provides a kind of data encryption device, including:
Key production module, at least includes the key parameter of effective parameter, by the way that key parameter is mutually tied for obtaining Symphysis is into encryption key;
Data encryption module, for receiving initial data, initial data is encrypted by encryption key, to be added Ciphertext data;
Wherein, when encryption data is decrypted, if current time exceeds the scope of timeliness parameter, decryption is lost Lose.
It is preferred that, data encryption module is specifically included:
Numbering submodule, the position for determining the character in initial data, and position is numbered;
Submodule is encrypted, for that will number as encryption parameter, and by encryption key respectively to each in initial data Character is encrypted.
It is preferred that, key parameter also includes:
User account and the magic number of user.
Data ciphering method provided by the present invention, timeliness parameter is encrypted as one of key parameter the life of key Into, and initial data is encrypted by encryption key obtains encryption data.Due to having timeliness parameter, institute in encryption key The constraint in timeliness is also provided with the encryption data after being encrypted by encryption key.When by encryption key to encryption number During according to being decrypted, first determine whether current time whether in the range of timeliness parameter, if current time beyond when Parameter area is imitated, even if encryption key is correct, encryption data can not be also decrypted.Therefore, this method shortens cracker The time that encryption data can be cracked, and then the difficulty that cracks to data is added, and then improve encrypted data Safety and reliability.In addition, the present invention also provides a kind of data encryption device, beneficial effect is as described above.
Brief description of the drawings
In order to illustrate the embodiments of the present invention more clearly, the required accompanying drawing used in embodiment will be done simply below Introduce, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill people For member, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of data ciphering method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another data ciphering method provided in an embodiment of the present invention;
Fig. 3 is a kind of data encryption device structure chart provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are not under the premise of creative work is made, and what is obtained is every other Embodiment, belongs to the scope of the present invention.
The core of the present invention is to provide a kind of data ciphering method, shortens what cracker can be cracked to encryption data Time, and then improve the safety and reliability of encrypted data.
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.
Embodiment one
Fig. 1 is a kind of flow chart of data ciphering method provided in an embodiment of the present invention.It refer to Fig. 1, data encryption side The specific steps of method include:
Step S10:Acquisition at least includes the key parameter of effective parameter, by the way that key parameter is combined into generation encryption Key.
It is understood that the data due to method provided by the present invention for encryption have certain pact in timeliness Beam, therefore should be with timeliness parameter in the key parameter for constituting encryption key, and then encryption key is used to data Just can be associated with the effective time decrypted by data when being encrypted.It should be noted that so-called timeliness parameter, is to use Come depending on representing the parameter for the prescribed time-limit scope that encryption data can be decrypted, demand of the timeliness parameter according to encipherer, This is not limited, but should be able to embody that the effective time of encryption data is interval or term of validity cut-off time, can for system it is current when Numerical value obtained by being added with encryption duration at quarter etc..
Step S11:Initial data is received, initial data is encrypted by encryption key, to obtain encryption data.
Wherein, when encryption data is decrypted, if current time exceeds the scope of timeliness parameter, decryption is lost Lose.For example, the timeliness parameter set when data are encrypted is on January 1st, 2000, then then illustrate timeliness parameter Scope is before 1 day January in 2000, if solved at the time of encryption data is decrypted after 1 day January in 2000 Close failure.Due to having timeliness parameter, therefore the initial data being encrypted by encryption key in encryption key, when being respectively provided with Effect property.
The data ciphering method that the present embodiment is provided, timeliness parameter is encrypted as one of key parameter the life of key Into, and initial data is encrypted by encryption key obtains encryption data.Due to having timeliness parameter, institute in encryption key The constraint in timeliness is also provided with the encryption data after being encrypted by encryption key.When by encryption key to encryption number During according to being decrypted, first determine whether current time whether in the range of timeliness parameter, if current time beyond when Parameter area is imitated, even if encryption key is correct, encryption data can not be also decrypted.Therefore, this method shortens cracker The time that encryption data can be cracked, and then the difficulty that cracks to data is added, and then improve encrypted data Safety and reliability.
Embodiment two
Fig. 2 is the flow chart of another data ciphering method provided in an embodiment of the present invention.Step S10 and Fig. 1 phases in Fig. 2 Together, it will not be repeated here.
As shown in Fig. 2 on the basis of above-described embodiment, as a preferred embodiment, step S11 is specifically wrapped Include:
Step S20:Initial data is received, the position of the character in initial data is determined, and position is numbered.
The purpose that the position of initial data character is numbered is, when subsequently character is encrypted respectively, often Individual character each uses the numbering of itself as the parameter of encryption, therefore, even if identical character is used as ginseng by different numberings After several encryptions, as a result also differ.
Step S21:It will number as encryption parameter, and each character in initial data carried out respectively by encryption key Encryption, to obtain encryption data.
It is understood that each character in initial data is individually encrypted this step, and will be every Position Number of one character in initial data as encryption parameter, so two character phases in initial data Together, but be due to that position of two characters in initial data is different, cause it is different for the Position Number parameter of encryption, therefore Result after encryption is also different.Therefore, it is to avoid after because some character is cracked in initial data, it is other with the character phase Occur with the situation that character is similarly cracked, add the difficulty for cracking data, and then improve the safety of encrypted data Property and reliability.
In specific implementation, can be to the mode that each character is encrypted:
N=C-key+ (i*iMagicNum).Wherein N is the character after encryption;C is the character before encryption;I is encrypted Position Number of the character in data;IMagicNum is the magic number of user.It can be seen that the i of each character is different, even if therefore Character C before encryption is identical, and the character N after encryption is also different.It is understood that the above-mentioned mode that each character is encrypted Simply one kind in numerous modes, numerous to list herein.
In addition, as a preferred embodiment, key parameter also includes:
User account and the magic number of user.
It is due to the acquisition of user account convenience as key parameter using user account and the body of encryption people can be signified Part information, and it is due to that it is generated by encrypting people's setting or system completely to use the magic number of user, is difficult to be learnt by other people, user The acquisition modes of magic number can be the password using user, or be generated according to user cipher.Due to passing through user account, user Magic number and timeliness parameter these three dimensions constitute key, therefore needs encryption data are decrypted while having these three Parameter, and then improve the security of encryption data.It should be noted that key parameter can also include other components, Do not limit herein.
For the ease of the understanding to above-mentioned embodiment, one group of specific key parameter is provided below to further illustrate. User's evil spirit number is that 8341, user account is that guest, timeliness parameter are to encrypt 30 seconds after the moment in key parameter.To encryption When data are decrypted, if the magic number of user in key parameter is not 8341, even same user account guest and when Effect parameter is similarly 30 seconds after the encryption moment, also can not correctly be decrypted;Similarly, 30 seconds if more than after the encryption moment Timeliness parameter request, i.e., using the magic number 8341 of same user account guest and user, also can not correctly decrypt;Similarly, , also can not be correct even if meeting timeliness parameter request and the magic number 8341 of user if user account is root rather than guest Decryption.
In addition, as a preferred embodiment, by key parameter be combined generation encryption key be specially:
User account and the magic number of user are combined generation secured account numbers;
The magic number of secured account numbers, timeliness parameter and user is subjected to hybrid operation generation encryption key.
The secured account numbers that the magic number of user account and user is combined into generation are higher for the confidentiality of user account, institute Also it is more difficult to be obtained by criminal using the key that is generated as key parameter by secured account numbers.
In specific implementation, key parameter hybrid operation generation key mode can be:Key=iTS-(iMagicNum* 16)+iSecID.Wherein, key is key;ITS is timeliness parameter;IMagicNum is the magic number of user;ISecID is user account The secured account numbers of generation are combined with the magic number of user.It should be noted that the generating mode of above-mentioned key is numerous modes In one kind, it is numerous to list herein.
As shown in Fig. 2 as a preferred embodiment, after encryption data is obtained, this method further comprises:
Step S22:Encryption data is compiled as binary sequence.
Because binary digit is the language that computer can be directly read, therefore computer is transmitting and handled binary system sequence It is not error-prone during row, with higher reliability.
As shown in Fig. 2 as a preferred embodiment, after encryption data is compiled as into binary sequence, the party Method further comprises:
Step S23:Timeliness parameter is compiled as binary sequence, and is used as the stem of encryption data.
It is understood that being in order in use secret key decryption data using the purpose of timeliness parameter as encryption data stem It is preceding first to judge whether within effective time, the step of timeliness parameter in key carries out ageing judgement can be eliminated the need for.Phase It is corresponding, when encryption data is decrypted, it is necessary to first read the timeliness parameter of encryption data stem, and judge the encryption Whether data are in the range of decryption limitation.If exceeding the scope of decryption limitation, an invalid key can be generated, It is mess code to cause the data after decryption;Otherwise according to being decrypted character by character.
On the basis of above-mentioned embodiment, as a preferred embodiment, binary sequence is specially 32 Two sequences processed.
Because 32 digital scopes that can be represented are bigger, the total amount of disposable encryption data can be improved, therefore can be with Make the more efficient of data encryption.
Embodiment three
Hereinbefore it is described in detail for a kind of embodiment of data ciphering method, the present invention also provides a kind of Data encryption device, because the embodiment of device part and the embodiment of method part are mutually corresponding, therefore the reality of device part The description that example refers to the embodiment of method part is applied, wouldn't be repeated here.
Fig. 3 is a kind of data encryption device structure chart provided in an embodiment of the present invention.As shown in figure 3, the embodiment of the present invention The data encryption device of offer, including:
Key production module 10, at least includes the key parameter of effective parameter for obtaining, by by key parameter phase With reference to generation encryption key.
Data encryption module 11, for receiving initial data, initial data is encrypted by encryption key, to obtain Encryption data.
Wherein, when encryption data is decrypted, if current time exceeds the scope of timeliness parameter, decryption is lost Lose.
Data encryption device provided by the present invention, timeliness parameter is encrypted as one of key parameter the life of key Into, and initial data is encrypted by encryption key obtains encryption data.Due to having timeliness parameter, institute in encryption key The constraint in timeliness is also provided with the encryption data after being encrypted by encryption key.When by encryption key to encryption number During according to being decrypted, first determine whether current time whether in the range of timeliness parameter, if current time beyond when Parameter area is imitated, even if encryption key is correct, encryption data can not be also decrypted.Therefore, the present apparatus shortens cracker The time that encryption data can be cracked, and then the difficulty that cracks to data is added, and then improve encrypted data Safety and reliability.
On the basis of embodiment three, as a preferred embodiment, data encryption module is specifically included:
Numbering submodule, the position for determining the character in initial data, and position is numbered;
Submodule is encrypted, for that will number as encryption parameter, and by encryption key respectively to each in initial data Character is encrypted.
On the basis of embodiment three, as a preferred embodiment, key parameter also includes:
User account and the magic number of user.
A kind of data ciphering method and device provided by the present invention are described in detail above.Each in specification Embodiment is described by the way of progressive, and what each embodiment was stressed is the difference with other embodiment, each Between embodiment identical similar portion mutually referring to.For device disclosed in embodiment, because it is public with embodiment The method opened is corresponding, so description is fairly simple, related part is referring to method part illustration.It should be pointed out that for For those skilled in the art, under the premise without departing from the principles of the invention, if can also be to present invention progress Dry to improve and modify, these are improved and modification is also fallen into the protection domain of the claims in the present invention.
It should also be noted that, in this manual, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except also there is other identical element in the process including the key element, method, article or equipment.

Claims (10)

1. a kind of data ciphering method, it is characterised in that including:
Acquisition at least includes the key parameter of effective parameter, by the way that the key parameter is combined into generation encryption key;
Initial data is received, the initial data is encrypted by the encryption key, to obtain encryption data;
Wherein, when the encryption data is decrypted, if current time exceeds the scope of the timeliness parameter, decrypt Failure.
2. according to the method described in claim 1, it is characterised in that described that the initial data is entered by the encryption key Row encryption is specifically included:
The position of the character in the initial data is determined, and the position is numbered;
Using the numbering as encryption parameter, and by the encryption key respectively to each character in the initial data It is encrypted.
3. method according to claim 1 or 2, it is characterised in that the key parameter also includes:
User account and the magic number of user.
4. method according to claim 3, it is characterised in that described that the key parameter is combined generation encryption key Specially:
The user account and the magic number of the user are combined generation secured account numbers;
The magic number of the secured account numbers, the timeliness parameter and the user is subjected to hybrid operation generation encryption key.
5. method according to claim 1 or 2, it is characterised in that it is described obtain encryption data after, this method is further Including:
The encryption data is compiled as binary sequence.
6. method according to claim 5, it is characterised in that the encryption data is compiled as into binary sequence described Afterwards, this method further comprises:
The timeliness parameter is compiled as binary sequence, and is used as the stem of the encryption data.
7. method according to claim 6, it is characterised in that the binary sequence is specially two sequences processed of 32.
8. a kind of data encryption device, it is characterised in that including:
Key production module, at least includes the key parameter of effective parameter, by the way that the key parameter is mutually tied for obtaining Symphysis is into encryption key;
Data encryption module, for receiving initial data, the initial data is encrypted by the encryption key, with To encryption data;
Wherein, when the encryption data is decrypted, if current time exceeds the scope of the timeliness parameter, decrypt Failure.
9. device according to claim 8, it is characterised in that the data encryption module is specifically included:
Numbering submodule, the position for determining the character in the initial data, and the position is numbered;
Submodule is encrypted, for being numbered described as encryption parameter, and by the encryption key respectively to the original number It is encrypted according to interior each character.
10. device according to claim 8, it is characterised in that the key parameter also includes:
User account and the magic number of user.
CN201710586116.1A 2017-07-18 2017-07-18 A kind of data ciphering method and device Pending CN107171797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710586116.1A CN107171797A (en) 2017-07-18 2017-07-18 A kind of data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710586116.1A CN107171797A (en) 2017-07-18 2017-07-18 A kind of data ciphering method and device

Publications (1)

Publication Number Publication Date
CN107171797A true CN107171797A (en) 2017-09-15

Family

ID=59817089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710586116.1A Pending CN107171797A (en) 2017-07-18 2017-07-18 A kind of data ciphering method and device

Country Status (1)

Country Link
CN (1) CN107171797A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462475A (en) * 2018-11-15 2019-03-12 泰康保险集团股份有限公司 Data ciphering method, decryption method and relevant apparatus
CN109670323A (en) * 2018-12-10 2019-04-23 金瓜子科技发展(北京)有限公司 A kind of file encrypting method, decryption method and device
CN111970109A (en) * 2020-08-13 2020-11-20 山东英信计算机技术有限公司 Data transmission method and system
WO2022082667A1 (en) * 2020-10-22 2022-04-28 华为技术有限公司 Method and apparatus for secure transmission of data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103065080A (en) * 2012-12-21 2013-04-24 广东欧珀移动通信有限公司 Application program login method and device
CN104022872A (en) * 2014-04-09 2014-09-03 广州赛意信息科技有限公司 Data encryption method
US20150063568A1 (en) * 2005-07-14 2015-03-05 Tara Chand Singhal Apparatus and method for generating a sequence of encryption keys for communication security in mobile wireless devices
CN105406965A (en) * 2015-11-21 2016-03-16 徐江锋 Clear-text password encryption method
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN105827591A (en) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 Identity authentication method, client side, server and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150063568A1 (en) * 2005-07-14 2015-03-05 Tara Chand Singhal Apparatus and method for generating a sequence of encryption keys for communication security in mobile wireless devices
CN103065080A (en) * 2012-12-21 2013-04-24 广东欧珀移动通信有限公司 Application program login method and device
CN104022872A (en) * 2014-04-09 2014-09-03 广州赛意信息科技有限公司 Data encryption method
CN105406965A (en) * 2015-11-21 2016-03-16 徐江锋 Clear-text password encryption method
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN105827591A (en) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 Identity authentication method, client side, server and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TOLIC: "字符串的简单加密与解密", 《HTTP://BLOG.CSDN.NET/CHENG_FANGANG/ARTICLE/DETAILS/43984533》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462475A (en) * 2018-11-15 2019-03-12 泰康保险集团股份有限公司 Data ciphering method, decryption method and relevant apparatus
CN109462475B (en) * 2018-11-15 2021-08-13 泰康保险集团股份有限公司 Data encryption method, data decryption method and related devices
CN109670323A (en) * 2018-12-10 2019-04-23 金瓜子科技发展(北京)有限公司 A kind of file encrypting method, decryption method and device
CN111970109A (en) * 2020-08-13 2020-11-20 山东英信计算机技术有限公司 Data transmission method and system
CN111970109B (en) * 2020-08-13 2023-01-24 山东英信计算机技术有限公司 Data transmission method and system
WO2022082667A1 (en) * 2020-10-22 2022-04-28 华为技术有限公司 Method and apparatus for secure transmission of data

Similar Documents

Publication Publication Date Title
CN102904712B (en) Information ciphering method
CN100536393C (en) Secret shared key mechanism based user management method
CN107171797A (en) A kind of data ciphering method and device
CN103414549B (en) A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method
CN106529327A (en) Data access system and method oriented to encryption database under hybrid cloud environment
CN113132099B (en) Method and device for encrypting and decrypting transmission file based on hardware password equipment
CN112511304A (en) Power data privacy communication method based on hybrid encryption algorithm
CN107896223A (en) A kind of data processing method and system, data collecting system and data receiving system
CN110474908A (en) Transaction monitoring and managing method and device, storage medium and computer equipment
CN106355106A (en) Account information storing method and system
CN103684758A (en) User password mixing encryption method and system
CN105656626A (en) Reverse reconstruction encryption method
CN104660590A (en) Cloud storage scheme for file encryption security
CN106411515A (en) Method of using cipher machine to segment secret key so as to increase secret key safety and system thereof
CN104579680A (en) Method for safe distribution of seed
CN113411328A (en) Efficient transmission system based on data pre-identification sensitive data
CN105959116B (en) A kind of password input system and method cryptographically inputting password
CN107070637A (en) A kind of data encryption/decryption method of overlapping packet
CN105871858A (en) Method and system for ensuring high data safety
CN108965278A (en) Transaction request processing method and processing device
CN100561913C (en) A kind of method of access code equipment
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN1788451A (en) DES algorithm-based encryption method
CN108134799A (en) Novel encipher-decipher method and its device
CN111010386B (en) Privacy protection and data supervision control method based on shared account book

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915

RJ01 Rejection of invention patent application after publication