CN108173885A - Data ciphering method, data decryption method and relevant apparatus - Google Patents

Data ciphering method, data decryption method and relevant apparatus Download PDF

Info

Publication number
CN108173885A
CN108173885A CN201810257581.5A CN201810257581A CN108173885A CN 108173885 A CN108173885 A CN 108173885A CN 201810257581 A CN201810257581 A CN 201810257581A CN 108173885 A CN108173885 A CN 108173885A
Authority
CN
China
Prior art keywords
character
data
encrypted
redundancy check
check code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810257581.5A
Other languages
Chinese (zh)
Other versions
CN108173885B (en
Inventor
鄢中堡
陈现军
张鹏
张庆兰
王明善
田道平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NATIONAL GEOMATICS CENTER OF CHINA
Original Assignee
NATIONAL GEOMATICS CENTER OF CHINA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NATIONAL GEOMATICS CENTER OF CHINA filed Critical NATIONAL GEOMATICS CENTER OF CHINA
Priority to CN201810257581.5A priority Critical patent/CN108173885B/en
Publication of CN108173885A publication Critical patent/CN108173885A/en
Application granted granted Critical
Publication of CN108173885B publication Critical patent/CN108173885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to technical field of information processing, disclose a kind of data ciphering method, data decryption method and relevant apparatus.In the present invention, data ciphering method includes:Be-encrypted data is obtained, and be that be-encrypted data distributes a block serial number, is all character assigned sequences number in be-encrypted data and is that each character distributes random parameter;The cyclic redundancy check code of be-encrypted data is calculated, and following operate is carried out to each character:Based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, the corresponding fixed code of calculating character, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters;Each encrypted characters is obtained successively, according to the cryptographic block of all encrypted characters generation be-encrypted data got.The data encryption and decryption method provided in embodiment of the present invention can effectively avoid measurement of the level data from being destroyed and distort.

Description

Data ciphering method, data decryption method and relevant apparatus
Technical field
The present invention relates to technical field of information processing, more particularly to a kind of data ciphering method, data decryption method and phase Close device.
Background technology
The measurement of the level also known as " levelling " are the sides that point-to-point transmission height difference on ground is measured with spirit level and levelling rod Method.The height difference of the point-to-point transmission obtained is measured, is mainly used for the number for arranging, being stored in more new nation's measurement of the level data record sheet According to, so as to correct elevation is determined according to correct measurement data that is, certain point along plumb line direction to absolute datum away from From.
At present, it is not distorted maliciously by other people to ensure to measure the data obtained, can be added usually in transmission process It is close, for example (rsa encryption is calculated using des encryption algorithm (symmetric cryptography, Des symmetric encryption), RSA Algorithm Method, RSA algorithm).
But inventor has found that at least there are the following problems in the prior art:
1st, the encryption principle based on des encryption algorithm is decoded practical by the way of the data after des encryption algorithm for encryption On be exactly the coding for searching for secret key.For the secret key of 56 bit lengths, although being scanned for using the method for exhaustion, carry out 2 is needed 56 powers operation, operand can be very big, but with the continuous development of computer-system capabilities, using des encryption algorithm The safety of encrypted data is progressively reduced.In addition, since des encryption algorithm is binary system Encryption Algorithm, added using being somebody's turn to do After close algorithm is to data encryption, the array format of measurement of the level data can be destroyed, it can not be direct so as to cause the data after decryption Carry out the data processing operation of later stage in the industry.
2nd, although RSA cryptographic algorithms are not easy to decode, but since its ciphering process needs to carry out a large amount of data run, nothing The doubtful arithmetic speed that can substantially reduce the equipment that data are encrypted, if to ensure arithmetic speed, to the resource of equipment It is more demanding, therefore when carrying out extensive operation using spirit level, which does not apply to simultaneously.In addition, the encryption method Too dependent on independent public key and key, once key is compromised, encryption method will be cracked, thus safety also compared with It is weak.
Invention content
The purpose of the present invention is to provide a kind of data ciphering method, data decryption method and relevant apparatus, in solution State technical problem.
In order to solve the above technical problems, embodiments of the present invention provide a kind of data ciphering method, the data encryption Method includes:Be-encrypted data is obtained, and a block serial number is distributed for be-encrypted data;Wherein, be-encrypted data is water The measurement of the level data that each observation cycle generates during locating tab assembly, a measurement of the level data include several words Symbol;For all character assigned sequences number in be-encrypted data;Wherein, sequence number is used to identify character institute in be-encrypted data The position at place;According to block serial number and the sequence number of character, random parameter is distributed for character;According to cyclic redundancy check code Coding rule calculates the cyclic redundancy check code of be-encrypted data;Following operate is carried out to each character:Based on des encryption Algorithm according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, calculates word Corresponding fixed code is accorded with, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters; Each encrypted characters is obtained successively, according to the cryptographic block of all encrypted characters generation be-encrypted data got.
Embodiments of the present invention additionally provide a kind of data decryption method, which includes:Obtain encryption File;Wherein, encryption file is made of several cryptographic blocks;Obtain block flowing water and each encryption of each cryptographic block All encrypted characters sequence number corresponding with each encrypted characters in block;Each encrypted characters is proceeded as follows: According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters;Obtain following for preamble cryptographic block Ring redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, the cyclic redundancy school of preamble cryptographic block Test cyclic redundancy check code of the code for previous be-encrypted data;According to the inverse operation criterion of fixed code, to fixed code, block stream The cyclic redundancy check code of water number, the sequence number of encrypted characters and preamble cryptographic block carries out inverse operation, obtains encrypted characters pair The original character answered;After all encrypted characters in encryption file are decrypted, encryption file decryption success is determined.
Embodiments of the present invention additionally provide a kind of data encryption device, which includes:Acquisition module, First distribution module, the second distribution module, third distribution module, computing module, encryption processing module and generation module;Obtain mould Block, for obtaining be-encrypted data;Wherein, generated for each observation cycle in leveling process one of be-encrypted data Measurement of the level data, a measurement of the level data include several characters;First distribution module, for being distributed for be-encrypted data One block serial number;Second distribution module, for for all character assigned sequences number in be-encrypted data;Wherein, sequence Number for identifying character third distribution module the location of in be-encrypted data, for according to block serial number and character Sequence number distributes random parameter for character;Computing module for the coding rule according to cyclic redundancy check code, calculates to be added The cyclic redundancy check code of ciphertext data;Encryption processing module, for carrying out following operate to each character:Based on des encryption Algorithm according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, calculates word Corresponding fixed code is accorded with, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters; Generation module, for obtaining each encrypted characters successively, according to all encrypted characters generation be-encrypted data got Cryptographic block.
Embodiments of the present invention additionally provide a kind of data decryption apparatus, which includes:First obtains Module, the first acquisition module of the second acquisition module, decryption processing module and determining module encrypt file for obtaining;Wherein, add Ciphertext part is made of several cryptographic blocks;Second acquisition module, for obtaining the block flowing water of each cryptographic block and each All encrypted characters sequence number corresponding with each encrypted characters in a cryptographic block;Decryption processing module, for each A encrypted characters proceed as follows:According to can show character code table and complementation operational criterion, obtain encrypted characters it is corresponding solid Determine code;Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, encryption of the preamble cryptographic block for previous be-encrypted data Block, the cyclic redundancy check code of preamble cryptographic block are the cyclic redundancy check code of previous be-encrypted data;According to fixed code Inverse operation criterion, to the cyclic redundancy check code of fixed code, block serial number, the sequence number of encrypted characters and preamble cryptographic block Inverse operation is carried out, obtains the corresponding original character of encrypted characters;Determining module, for all encrypted words in encryption file After symbol is decrypted, encryption file decryption success is determined.
Embodiments of the present invention additionally provide a kind of data encryption equipment, at least one processor;And at least one The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be performed by least one processor, instructs quilt At least one processor performs, so that the data that at least one processor is able to carry out involved in arbitrary embodiment of the invention add Decryption method.
Embodiments of the present invention additionally provide a kind of data decryption apparatus, at least one processor;And at least one The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be performed by least one processor, instructs quilt At least one processor performs, so that at least one processor is able to carry out the data solution involved in arbitrary embodiment of the invention Decryption method.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are deposited in computer readable storage medium Computer program is contained, the data involved in arbitrary embodiment of the invention can be realized when computer program is executed by processor Encryption method.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are deposited in computer readable storage medium Computer program is contained, the data involved in arbitrary embodiment of the invention can be realized when computer program is executed by processor Decryption method.
Embodiment of the present invention in terms of existing technologies, when be-encrypted data is encrypted, by using treating Cyclic redundancy check code, block serial number, character and the corresponding sequence number of character of encryption data, it is corresponding solid to carry out calculating character Determine code, then according to the corresponding fixed code of each character random parameter corresponding with the character, character is encrypted, is obtained Encrypted characters finally combine whole encrypted characters, generate a cryptographic block, complete the encryption to be-encrypted data.Right When being decrypted according to the encrypted encryption file of aforesaid way, reverse operation, only adjacent previous cryptographic block proper solution Close (i.e. internal data not be tampered), the corresponding cyclic redundancy check code of the cryptographic block just can be next for decrypting Cryptographic block, otherwise once any one in encryption file is encrypted content in the block and be tampered, subsequent cryptographic block just can not be into Row decryption oprerations, entire file of encrypting also can not be just decrypted.Based on above-mentioned data encryption and decryption method, can effectively keep away Exempt from initial data to be destroyed and distort.
In addition, according to the coding rule of cyclic redundancy check code, before the cyclic redundancy check code for calculating be-encrypted data, Data ciphering method further includes:Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, preamble cryptographic block is to be added for previous item The cryptographic block of ciphertext data, the cyclic redundancy check code of preamble cryptographic block are the cyclic redundancy check code of previous be-encrypted data; According to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of be-encrypted data is calculated, is specifically included:According to be added The cyclic redundancy check code of previous character in ciphertext data calculates the cyclic redundancy check of the latter character adjacent with character Code, the cyclic redundancy check code until calculating last character in be-encrypted data;By the last one in be-encrypted data The cyclic redundancy check code of character, the cyclic redundancy check code as be-encrypted data;Wherein, first character in be-encrypted data The cyclic redundancy check code of symbol is calculated according to the cyclic redundancy check code of preamble cryptographic block and is obtained.Present embodiments provide for one The coding rule according to cyclic redundancy check code is planted, calculates the concrete mode of the cyclic redundancy check code of be-encrypted data.
In addition, according to fixed code and the corresponding random parameter of character, character is encrypted, after obtaining encrypted characters, Data ciphering method further includes:Character visible coding can be obtained from preset in show character code table;It wherein, can show character code Character visible coding in table is composed of visible ascii character according to irregular sequence;It is encoded according to character visible, it will Encrypted characters are compiled as viewable format.By being encoded according to character visible, encrypted characters are compiled as viewable format, solve two The problem of des encryption algorithm of system can destroy the array format of measurement of the level data, so as to so that decryption after data energy Enough data processing operations for directly carrying out the later stage.
In addition, after according to the cryptographic block of all encrypted characters generation be-encrypted data got, data ciphering method It further includes:Determine that the number of cryptographic block reaches preset number;According to the block stream of the corresponding be-encrypted data of each cryptographic block Water number is ranked up, and forms a complete encryption file.By the way that encrypted cryptographic block is formed a complete encryption text Part, so as to ensure that the cyclic redundancy check code of only cryptographic block is correct (encrypting data in the block to be not tampered with), Postorder cryptographic block can be decrypted, realized to encrypting the decryption of file, and then ensure that the safety of data.
Description of the drawings
One or more embodiments are illustrated by the picture in corresponding attached drawing, these are exemplary Illustrate not form the restriction to embodiment, the element with same reference numbers label is expressed as similar member in attached drawing Part, unless there are special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the flow chart of the data ciphering method of first embodiment of the invention;
Fig. 2 is the flow chart of the data ciphering method of second embodiment of the invention;
Fig. 3 is the flow chart of the data decryption method of third embodiment of the invention;
Fig. 4 is the frame structure schematic diagram of the data encryption device of four embodiment of the invention;
Fig. 5 is the frame structure schematic diagram of the data decryption apparatus of fifth embodiment of the invention;
Fig. 6 is the frame structure schematic diagram of the data encryption equipment of sixth embodiment of the invention;
Fig. 7 is the frame structure schematic diagram of the data decryption apparatus of seventh embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to each reality of the present invention The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the present invention, In order to make the reader understand this application better, many technical details are proposed.But even if without these technical details and base In the various changes and modifications of following embodiment, each claim of the application technical side claimed can also be realized Case.
The first embodiment of the present invention is related to a kind of data ciphering methods.The data ciphering method is mainly used in level Measuring spirit level can be specifically digital level (also referred to as electronic level), so as in generation measurement of the level number According to when can directly be encrypted.
In addition, in order not to increase the operating pressure of digital level, can also be set by the electronics being connected with digital level Standby to perform the data ciphering method, electronic equipment described herein can be tablet computer, portability computer etc..
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can select suitable data encryption according to usage scenario Equipment is not limited herein.
In order to make it easy to understand, the data ciphering method is specifically described below in conjunction with Fig. 1:
In a step 101, be-encrypted data is obtained.
Specifically, the be-encrypted data got in present embodiment is each observation cycle in leveling process The measurement of the level data generated, and a measurement of the level data can include several characters.
It should be noted that in leveling process, the generation period of a measurement of the level data is generally 1-2 points Clock, the generation period of a measurement of the level data file (including several measurement of the level data) are generally 1-2 days.
Thus, above-mentioned observation cycle can be by observation scene of the those skilled in the art according to spirit level, whole sight The time is surveyed to set, is not limited herein.
In a step 102, the cyclic redundancy check code of be-encrypted data is calculated.
Specifically, the cyclic redundancy check code of be-encrypted data is calculated according to the coding rule of cyclic redundancy check code It obtains.
In order to make it easy to understand, calculating the operation of the cyclic redundancy check code of be-encrypted data, it is specifically described below:
It is first before the coding rule according to cyclic redundancy check code, the cyclic redundancy check code for calculating be-encrypted data First need the cyclic redundancy check code of acquisition preamble cryptographic block.
Specifically, cryptographic block of the preamble cryptographic block that present embodiment is obtained for previous be-encrypted data, preamble add Cyclic redundancy check code of close piece of the cyclic redundancy check code for previous be-encrypted data.
In doing so, it can carry out calculating the cyclic redundancy check code of be-encrypted data, it is specific as follows:
According to the cyclic redundancy check code of character previous in be-encrypted data, the latter character adjacent with character is calculated Cyclic redundancy check code, the cyclic redundancy check code until calculating last character in be-encrypted data;
By the cyclic redundancy check code of last character in be-encrypted data, the cyclic redundancy school as be-encrypted data Test code.
It should be noted that in be-encrypted data first character cyclic redundancy check code, be according to preamble cryptographic block Cyclic redundancy check code calculate obtain.
In addition, the coding rule about cyclic redundancy check code is more universal, those skilled in the art can root According to needing voluntarily to realize, details are not described herein again.
In present embodiment, by introducing cyclic redundancy check code, using cyclic redundancy check code as institute in ciphering process The important parameter needed, and when each measurement of the level data are encrypted, cyclic redundancy check code will be according to Rely the cyclic redundancy check code of a upper measurement of the level data, so that encrypted file, is only surveyed in each level In the case that amount data are not tampered, cyclic redundancy check code will not just change, just can be successively by adjacent whole Encryption data is decoded, otherwise at all can not successful decryption.
In step 103, each character is encrypted, obtains encrypted characters.
In order to make it easy to understand, each character is encrypted, the operation of encrypted characters is obtained, is carried out below specifically It is bright:
First, based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and The corresponding sequence number of character, the corresponding fixed code of calculating character.
It should be noted that des encryption algorithm is a kind of key using one 56 and additional 8 bit parity check Position, generates packet size 64 maximum, and basic operation includes exclusive or, displacement, replacement, four kinds of shifting function.In logarithm During according to being encrypted, particular by sub-key is used to wherein half application circulatory function, then will output with the other half into Row nonequivalence operation then exchanges this two halves, this process will continue to down, but the last one cycle does not exchange.
Due to the use of des encryption algorithm and more mature, those skilled in the art can knowing according to its grasp Know and means realize that details are not described herein again.
Then, according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters.
It should be noted that block serial number, character and the corresponding sequence number of character needed for above-mentioned ciphering process, be After acquiring be-encrypted data, distributed by data encryption equipment.
Wherein, each be-encrypted data corresponds to a block serial number, i.e., all characters in be-encrypted data are all common Enjoy this block serial number, which can be according to the sequencing of the be-encrypted data got, from preset a certain A value starts, and adds up successively.
It is that Article 2 is to be added for example, can be " 1 " for the block serial number of first be-encrypted data distribution received The block serial number of ciphertext data distribution can be " 2 ".
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
It each character corresponding sequence number and is distributed by data encryption equipment, the method for salary distribution and block stream The method of salary distribution of water number is roughly the same, and details are not described herein again, and in practical applications, those skilled in the art can be as needed Rationally setting, is also not particularly limited herein.
In addition, it is necessary to illustrate, the sequence number in present embodiment for the distribution of each character is primarily used to identify Character is the location of in be-encrypted data.
In addition, the corresponding random parameter of each character, specifically divides according to the sequence number of block serial number and character Match.Its method of salary distribution can be the generation random number by implant data encryption device (such as spirit level, other electronic equipments) Application program generate, specifically, those skilled in the art can select the producing method of random number as needed, herein It is not limited.
At step 104, according to the cryptographic block of all encrypted characters generation be-encrypted data got.
Specifically, in the present embodiment, according to the encryption of all encrypted characters generation be-encrypted data got Block, specifically can be as follows:
Each encrypted characters is obtained successively, then according to the corresponding sequence number of each encrypted characters, by encrypted characters Arranged in sequence after whole encrypted characters in getting the measurement of the level data, generates the cryptographic block of be-encrypted data.
In addition, it is noted that due in practical applications, during the measurement of the level, spirit level can not generally connect Network is connected to, therefore the encryption data generated cannot be sent to data decryption apparatus in time and be handled, therefore, passed for convenience It send and is further ensured that relevance and the safety of data, number to be encrypted is being generated according to all encrypted characters got According to cryptographic block after, can also according to the preset period, by the cryptographic block obtained in the period or preset number, when When the number of cryptographic block reaches preset number, arranged according to the block serial number of the corresponding be-encrypted data of each cryptographic block Sequence forms a complete encryption file.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
By foregoing description it is not difficult to find that the data ciphering method provided in present embodiment, by introducing cyclic redundancy Check code, and existing des encryption algorithm is used for reference, when be-encrypted data is encrypted, according to previous be-encrypted data Cyclic redundancy check code, calculate the cyclic redundancy check code of current be-encrypted data, then the position in des encryption algorithm Be-encrypted data is encrypted in operation and bit map (displacement, displacement and exclusive or) operation.Based on this cipher mode, work as output Encryption a certain position in the block on encrypted characters when being destroyed, the data after position is destroyed can be made, will be unable to correct Decryption, so as to which initial data is effectively avoided to be destroyed and is distorted so that encrypted data are safer.
In addition, random parameter is also introduced in ciphering process, so as to further improve the safety of encryption data.
Second embodiment of the present invention is related to a kind of data ciphering method.Present embodiment is in the base of first embodiment It is further improved on plinth, specific improvements are:According to fixed code and the corresponding random parameter of character, character is carried out Encryption, after obtaining encrypted characters, encodes according to character visible, encrypted characters is compiled for viewable format, idiographic flow is such as Shown in Fig. 2.
Specifically, in the present embodiment, comprising step 2011 to step 205, wherein, step 201 to step 203 is divided It is not roughly the same to step 103 with the step 101 in first embodiment, step 205 and the step 104 in first embodiment Roughly the same, details are not described herein again, mainly introduces difference below, and the technology of detailed description is not thin in the present embodiment Section, reference can be made to the data ciphering method that first embodiment is provided, details are not described herein again.
In step 204, it is encoded according to character visible, encrypted characters is compiled as viewable format.
Specifically, the above-mentioned character visible for being used to encrypted characters being compiled as viewable format is encoded to from preset and shows Show what is obtained in character code table.
In addition, in the present embodiment, character visible coding that can be in show character code table be by visible ascii character by It is composed according to irregular sequence.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
In addition, it is noted that in order to further ensure the safety of encrypted data, other people are avoided get can After showing character code table, quick breaking encryption content, in practical applications, those skilled in the art can be as needed, The sequence of the character visible coding that can once store in show character code table and character visible coding is regularly updated, so as to reach To the effect for promoting security level.
By foregoing description it is not difficult to find that the data ciphering method provided in present embodiment, according to fixed code and word Accord with corresponding random parameter, character be encrypted, after obtaining encrypted characters, by from it is preset can be in show character code table Character visible coding is obtained, and is encoded according to the character visible got, encrypted characters are compiled as viewable format, and (being based on will Binary data after des encryption algorithm for encryption is converted to visible ASCII character corresponding content), solve binary DES Encryption Algorithm can be destroyed the problem of array format of measurement of the level data, i.e., the data ciphering method provided in present embodiment, When be-encrypted data is encrypted, until to the numerical part in measurement of the level data, as rod reading, distance are read The numerical value of sensitivity such as number, temperature, time is encrypted, and can keep original arrangement side to the gauge outfit part in data file Formula, so as to so that the data after decryption can directly carry out the data processing operation in later stage.
Third embodiment of the present invention is related to a kind of data decryption method.The data decryption method is mainly used in reception Data ciphering method according to involved in embodiment of the invention arbitrary be encrypted after encryption file electronic equipment, such as People's computer, portability computer, tablet computer etc. or server, such as local server, cloud server.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can select suitable data deciphering according to usage scenario Equipment is not limited herein.
In order to make it easy to understand, the data decryption method is specifically described below in conjunction with Fig. 3:
In step 301, encryption file is obtained.
Specifically, in the present embodiment, the encryption file that data decryption apparatus is got is (according to arbitrary number of the present invention The encryption file obtained according to encryption method) it is made of several cryptographic blocks.
But the encryption file that in practical applications, data decryption apparatus is got may also be only a cryptographic block.
The selection of above two mode can determine according to the communication line between data encryption equipment and data decryption apparatus It is fixed, can also be determined according to the operative scenario of each equipment, can also two ways interact, specifically, those skilled in the art It can need to set according to actual job, not be limited herein.
In step 302, encrypted word all in the block flowing water and each cryptographic block of each cryptographic block is obtained Symbol sequence number corresponding with each encrypted characters.
Specifically, above-mentioned encryption file is being got from the server of data encryption equipment or storage encryption file When, it can send to send to above equipment simultaneously and ask, obtain the block flowing water of each cryptographic block required during encryption data And all encrypted characters sequence number corresponding with each encrypted characters in each cryptographic block.
It should be noted that the corresponding sequence number of encrypted characters described in present embodiment, is actually for the encryption The sequence number of the corresponding original character distribution of character.
In step 303, each character is decrypted, obtains original character.
In order to make it easy to understand, being decrypted to character, the process of original character is obtained, is specifically described below:
First, according to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters.
Specifically, needed for decrypting process can show character code table be similarly at encryption device obtain come.
Then, the cyclic redundancy check code of preamble cryptographic block is obtained.
It should be noted that the cryptographic block of preamble cryptographic block described in present embodiment for previous be-encrypted data, Cyclic redundancy check code of the cyclic redundancy check code of preamble cryptographic block for previous be-encrypted data.
Finally, according to the inverse operation criterion of fixed code, to fixed code, block serial number, encrypted characters sequence number and The cyclic redundancy check code of preamble cryptographic block carries out inverse operation, obtains the corresponding original character of encrypted characters.
It should be noted that the calculating function based on fixed code is it is found that in known fixed code, block serial number, encrypted word It, can be in the hope of unknown in the sequence number of symbol, the cyclic redundancy check code of preamble cryptographic block and original character during arbitrary 4 parameters Parameter.Therefore, it based on above-mentioned principle, is encrypted in known fixed code, block serial number, the sequence number of encrypted characters and preamble In the case of the cyclic redundancy check code of block, the corresponding original character of encrypted characters can be acquired by inverse operation.
In step 304, judge to encrypt the whether whole successful decryptions of all encrypted characters in file.
Specifically, if it is decided that all encrypted characters whole successful decryptions in encryption file enter step 305;It is no Then, decryption oprerations are directly exited, terminate this operating process (encrypt file and decode failure).
In step 305, encryption file decryption success is determined.
By foregoing description it is not difficult to find that the data decryption method provided in present embodiment, to being appointed according to the present invention When the encrypted encryption file of data ciphering method involved in meaning embodiment is decrypted, pass through reverse operation, only phase The previous cryptographic block faced normally decrypts (i.e. internal data not be tampered), the corresponding cyclic redundancy check of the cryptographic block Code can just be used for decrypting next cryptographic block, otherwise once any one encryption content in the block in encryption file is usurped Change, operation can not be just decrypted in subsequent cryptographic block, and entire file of encrypting also can not be just decrypted, so as to effectively avoid Initial data is destroyed and distorts.
The 4th embodiment of the present invention is related to a kind of data encryption device.The specific implementation of the data encryption device can be joined See the description in any of the above-described data ciphering method embodiment, specific frame structure is as shown in Figure 4.
As shown in figure 4, data encryption device mainly includes:Acquisition module 401, the first distribution module 402, second distribution mould Block 403, third distribution module 404, computing module 405, encryption processing module 406 and generation module 407.
Wherein, acquisition module 401, for obtaining be-encrypted data.
Specifically, the be-encrypted data got in present embodiment is each observation cycle in leveling process The measurement of the level data generated, and a measurement of the level data include several characters.
It should be noted that in leveling process, the generation period of a measurement of the level data is generally 1-2 points Clock, the generation period of a measurement of the level data file (including several measurement of the level data) are generally 1-2 days.
Thus, above-mentioned observation cycle can be by observation scene of the those skilled in the art according to spirit level, whole sight The time is surveyed to set, is not limited herein.
First distribution module 402, for distributing a block serial number for be-encrypted data.
Second distribution module 403, for for all character assigned sequences number in be-encrypted data.
It should be noted that the sequence number in present embodiment for the character distribution in be-encrypted data is mainly used for marking Character learning symbol is the location of in be-encrypted data.
For the sequence number according to block serial number and character, random parameter is distributed for character for third distribution module 404.
For example, the application journey of the generation random number by implant data encryption device (such as spirit level, other electronic equipments) Sequence specifically, those skilled in the art can select the producing method of random number as needed, is not limited herein.
Computing module 405 for the coding rule according to cyclic redundancy check code, calculates the cyclic redundancy of be-encrypted data Check code.
Specifically, according to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of be-encrypted data is calculated Mode, it is specific as follows:
According to the cyclic redundancy check code of character previous in be-encrypted data, the latter character adjacent with character is calculated Cyclic redundancy check code, then the cyclic redundancy check code until calculating last character in be-encrypted data will treat The cyclic redundancy check code of last character in encryption data, the cyclic redundancy check code as be-encrypted data.
In addition, it is noted that in be-encrypted data first character cyclic redundancy check code, encrypted according to preamble The cyclic redundancy check code of block, which calculates, to be obtained.
Encryption processing module 406, for carrying out following operate to each character:
Based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and character Corresponding sequence number, the corresponding fixed code of calculating character, and according to fixed code and the corresponding random parameter of character, character is carried out Encryption, obtains encrypted characters.
Generation module 407 for obtaining each encrypted characters successively, is treated according to all encrypted characters generation got The cryptographic block of encryption data.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can rationally be set as needed, not be limited herein.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided Data ciphering method, details are not described herein again.
By foregoing description it is not difficult to find that compared with prior art, the data encryption device provided in present embodiment, When be-encrypted data is encrypted, by using the cyclic redundancy check code of be-encrypted data, block serial number, character and word Corresponding sequence number is accorded with, carrys out the corresponding fixed code of calculating character, then according to the corresponding fixed code of each character and the character Corresponding random parameter, is encrypted character, obtains encrypted characters, finally combines whole encrypted characters, generates one Cryptographic block completes the encryption to be-encrypted data, so as to which initial data is effectively avoided to be destroyed and is distorted.
The 5th embodiment of the present invention is related to a kind of data decryption apparatus.The specific implementation of the data decryption apparatus can be joined See the description in any of the above-described data decryption method embodiment, specific frame structure is as shown in Figure 5.
As shown in figure 5, data decryption apparatus mainly includes:First acquisition module 501, the second acquisition module 502, at decryption Manage module 503 and determining module 504.
Wherein, the first acquisition module 501 encrypts file for obtaining.
It should be noted that the encryption file got in present embodiment is made of several cryptographic blocks.
Second acquisition module 502 owns for obtaining in the block flowing water of each cryptographic block and each cryptographic block Encrypted characters sequence number corresponding with each encrypted characters.
Decryption processing module 503, for being proceeded as follows to each encrypted characters:
According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters;Preamble is obtained to add Close piece of cyclic redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, preamble cryptographic block follow Cyclic redundancy check code of the ring redundancy check code for previous be-encrypted data;According to the inverse operation criterion of fixed code, to fixation The cyclic redundancy check code of code, block serial number, the sequence number of encrypted characters and preamble cryptographic block carries out inverse operation, is added The corresponding original character of close character.
Determining module 504, for after all encrypted characters in encryption file are decrypted, determining encryption file solution Close success.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can rationally be set as needed, not be limited herein.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided Data ciphering method, details are not described herein again.
By foregoing description it is not difficult to find that compared with prior art, the data decryption apparatus provided in present embodiment, During to being decrypted according to the encrypted encryption file of data ciphering method involved in arbitrary embodiment of the invention, by inverse To operation, only adjacent previous cryptographic block normally decrypts (i.e. internal data not be tampered), cryptographic block correspondence Cyclic redundancy check code just can be used for decrypt next cryptographic block, otherwise once encryption file in any one cryptographic block In content be tampered, operation can not be just decrypted in subsequent cryptographic block, and entire file of encrypting also can not be just decrypted, so as to It is possible to prevente effectively from initial data is destroyed and distorts.
Device embodiments described above are only schematical, and protection scope of the present invention is not formed and is limited Fixed, in practical applications, those skilled in the art can select according to the actual needs some or all of module therein It realizes the purpose of present embodiment scheme, is not limited herein.
The sixth embodiment of the present invention is related to a kind of data encryption equipment, and concrete structure is as shown in Figure 6.
Specifically, the data encryption equipment involved in present embodiment can be the spirit level of the measurement of the level, specifically Can be digital level (also referred to as electronic level), so as to when measurement of the level data are generated can directly into Row encryption.
In addition, in order not to increase the operating pressure of digital level, data encryption equipment may be and digital level Connected electronic equipment, electronic equipment described herein can be tablet computer, portability computer etc..
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can select suitable data encryption according to usage scenario Equipment is not limited herein.
In order to make it easy to understand, the specific frame structure of data encryption equipment is illustrated below:
Specifically, at least one processor 601 can specifically be included inside the data encryption equipment;And at least The memory 602 and communication component 603 that one processor 601 communicates to connect, in Fig. 6 by taking a processor 601 as an example.Communication Component 603 is received under the control of processor 601 and/or transmission data.Wherein, be stored with can be at least one for memory 602 The instruction that processor 601 performs, instructs and is performed by least one processor 601, so that at least one processor 601 is able to carry out Data ciphering method involved in arbitrary embodiment of the invention.
In practical applications, the instruction that at least one processor 601 performs can be stored in memory 602, is instructed by extremely A few processor 601 performs, so that at least one processor 601 is able to carry out what any means embodiment of the present invention was related to Data ciphering method, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided Data ciphering method.
The 7th embodiment of the present invention is related to a kind of data decryption apparatus, and concrete structure is as shown in Figure 7.
Specifically, the data decryption apparatus involved in present embodiment can be for receiving according to of the invention arbitrary real The electronic equipment of the encryption file after the data ciphering method involved in mode is encrypted is applied, such as personal computer, portability Computer, tablet computer etc. or server, such as local server, cloud server.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected It encloses composition to limit, in practical applications, those skilled in the art can select suitable data deciphering according to usage scenario Equipment is not limited herein.
In order to make it easy to understand, the specific frame structure of data decryption apparatus is illustrated below:
Specifically, at least one processor 701 can specifically be included inside the network interconnection apparatus, network interconnection;And at least The memory 702 and communication component 703 that one processor 701 communicates to connect, communication component 703 is in the control of processor 701 Lower reception and/or transmission data.Wherein, memory 702 is stored with the instruction that can be performed by least one processor 701, instruction It is performed by least one processor 701, so that at least one processor 701 is able to carry out involved in arbitrary embodiment of the invention Data decryption method.
In addition, it is noted that in practical applications, the processor in sixth embodiment and the 7th embodiment can To be CPU (central processing unit, Central Processing Unit), memory can be RAM (readable and writable memory, Random Access Memory), communication component can be the communication interface with communication function, pin etc..In addition, processing Device, memory can be connected by bus or other modes, Fig. 6 in Fig. 7 for being connected by bus.Memory conduct A kind of non-volatile computer readable storage medium storing program for executing can be held available for storage non-volatile software program, non-volatile computer Line program and module, as in the arbitrary embodiment of the present invention it is preset can show character code table be stored in memory.Place Reason device is by running non-volatile software program stored in memory, instruction and module, so as to perform the various of equipment The data ciphering method involved in the arbitrary embodiment of the present invention or data deciphering side are realized in application of function and data processing Method.
Memory can include storing program area and storage data field, wherein, storing program area can storage program area, extremely A few required application program of function;Storage data field can the Save option list etc..In addition, memory can be included at a high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other non-volatile solid state memory parts.In some embodiments, memory is optional including remotely located relative to processor Memory, these remote memories can pass through network connection to external equipment.The example of above-mentioned network includes but not limited to Internet, intranet, LAN, mobile radio communication and combinations thereof.
One or more module stores in memory, when being performed by one or more processor, performs this hair Data ciphering method or data decryption method involved in bright arbitrary embodiment.
The said goods can perform the method that embodiment of the present invention is provided, have the corresponding function module of execution method and Advantageous effect, the not technical detail of detailed description in the present embodiment, reference can be made to provided in the arbitrary embodiment of the present invention Method.
The 8th embodiment of the present invention is related to a kind of computer readable storage medium, in the computer readable storage medium Computer instruction is stored with, the data which enables a computer to perform involved in the arbitrary embodiment of the present invention add Decryption method or data decryption method.
That is, it will be appreciated by those skilled in the art that realize that all or part of step in above method embodiment is can be with Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions making It obtains an equipment (can be microcontroller, chip etc.) or processor (processor) is performed described in each embodiment of the application The all or part of step of method.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Store the medium of program code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment party of the present invention Formula, and in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and model of the present invention It encloses.

Claims (10)

1. a kind of data ciphering method, which is characterized in that including:
Be-encrypted data is obtained, and a block serial number is distributed for the be-encrypted data;Wherein, the be-encrypted data is The measurement of the level data that each observation cycle generates in leveling process, if the measurement of the level data include Dry character;
For all character assigned sequences number in the be-encrypted data;Wherein, the sequence number exists for identifying the character The location of in the be-encrypted data;
According to the block serial number and the sequence number of the character, random parameter is distributed for the character;
According to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of the be-encrypted data is calculated;
Following operate is carried out to character each described:Based on des encryption algorithm, according to the cyclic redundancy of the be-encrypted data Check code, the block serial number, the character and the corresponding sequence number of the character, calculate the corresponding fixation of the character Code, and according to the fixed code and the corresponding random parameter of the character, the character is encrypted, obtains encrypted characters;
Each described encrypted characters is obtained successively, and adding for the be-encrypted data is generated according to all encrypted characters got Close piece.
2. data ciphering method according to claim 1, which is characterized in that the coding according to cyclic redundancy check code Rule, before the cyclic redundancy check code for calculating the be-encrypted data, the data ciphering method further includes:
Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, the preamble cryptographic block for previous be-encrypted data plus Close piece, the cyclic redundancy check code of the preamble cryptographic block is the cyclic redundancy check code of the previous be-encrypted data;
The coding rule according to cyclic redundancy check code calculates the cyclic redundancy check code of the be-encrypted data, specifically Including:
According to the cyclic redundancy check code of character previous in the be-encrypted data, the latter adjacent with the character is calculated The cyclic redundancy check code of character, the cyclic redundancy check code until calculating last character in the be-encrypted data;
By the cyclic redundancy check code of last character in the be-encrypted data, the cycle as the be-encrypted data is superfluous Remaining check code;
Wherein, in the be-encrypted data first character cyclic redundancy check code, according to the cycle of the preamble cryptographic block Redundancy check code, which calculates, to be obtained.
3. data ciphering method according to claim 1 or 2, which is characterized in that described according to the fixed code and described The corresponding random parameter of character, is encrypted the character, and after obtaining encrypted characters, the data ciphering method also wraps It includes:
Character visible coding can be obtained from preset in show character code table;Wherein, it is described can be in show character code table it is described Character visible coding is composed of visible ascii character according to irregular sequence;
It is encoded according to the character visible, the encrypted characters is compiled as viewable format.
4. data ciphering method according to claim 1 or 2, which is characterized in that all encryptions that the basis is got After character generates the cryptographic block of the be-encrypted data, the data ciphering method further includes:
Determine that the number of the cryptographic block reaches preset number;
Be ranked up according to the block serial number of the corresponding be-encrypted data of each described cryptographic block, form one it is complete Encryption file.
5. a kind of data decryption method, which is characterized in that including:
Obtain encryption file;Wherein, the encryption file is made of several cryptographic blocks;
Obtain encrypted characters all in the block flowing water and each described cryptographic block of each cryptographic block and each The corresponding sequence number of a encrypted characters;
Encrypted characters each described are proceeded as follows:According to can show character code table and complementation operational criterion, obtain institute State the corresponding fixed code of encrypted characters;Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, before the preamble cryptographic block is The cryptographic block of one be-encrypted data, the cyclic redundancy check code of the preamble cryptographic block is the previous be-encrypted data Cyclic redundancy check code;According to the inverse operation criterion of the fixed code, to the fixed code, the block serial number, it is described plus The sequence number of close character and the cyclic redundancy check code of preamble cryptographic block carry out inverse operation, and it is corresponding to obtain the encrypted characters Original character;
After all encrypted characters in the encryption file are decrypted, the encryption file decryption success is determined.
6. a kind of data encryption device, which is characterized in that including:Acquisition module, the first distribution module, the second distribution module, Three distribution modules, computing module, encryption processing module and generation module;
The acquisition module, for obtaining be-encrypted data;Wherein, the be-encrypted data is each in leveling process The measurement of the level data that observation cycle generates, the measurement of the level data include several characters;
First distribution module, for distributing a block serial number for the be-encrypted data;
Second distribution module, for for all character assigned sequences number in the be-encrypted data;Wherein, the sequence Number for identifying the character the location of in the be-encrypted data;
The third distribution module for the sequence number according to the block serial number and the character, is distributed for the character Random parameter;
The computing module, for the coding rule according to cyclic redundancy check code, the cycle for calculating the be-encrypted data is superfluous Remaining check code;
The encryption processing module, for carrying out following operate to character each described:
Based on des encryption algorithm, according to the cyclic redundancy check code of the be-encrypted data, the block serial number, the word Symbol sequence number corresponding with the character, calculates the corresponding fixed code of the character, and according to the fixed code and the character Corresponding random parameter is encrypted the character, obtains encrypted characters;
The generation module for obtaining each described encrypted characters successively, is generated according to all encrypted characters got The cryptographic block of the be-encrypted data.
7. a kind of data decryption apparatus, which is characterized in that including:First acquisition module, the second acquisition module, decryption processing module And determining module;
First acquisition module encrypts file for obtaining;Wherein, the encryption file is made of several cryptographic blocks;
Second acquisition module, for obtaining in the block flowing water of each cryptographic block and each described cryptographic block All encrypted characters sequence number corresponding with each encrypted characters;
The decryption processing module, for being proceeded as follows to encrypted characters each described:
According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of the encrypted characters;Preamble is obtained to add Close piece of cyclic redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, the preamble add Close piece of cyclic redundancy check code is the cyclic redundancy check code of the previous be-encrypted data;According to the inverse of the fixed code Operational criterion, to the cycle of the fixed code, the block serial number, the sequence number of the encrypted characters and preamble cryptographic block Redundancy check code carries out inverse operation, obtains the corresponding original character of the encrypted characters;
The determining module, for after all encrypted characters in the encryption file are decrypted, determining the encryption File decryption success.
8. a kind of data encryption equipment, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be performed by least one processor, and described instruction is by least one place It manages device to perform, so that at least one processor is able to carry out the data encryption side as described in Claims 1-4 any one Method.
9. a kind of data decryption apparatus, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be performed by least one processor, and described instruction is by least one place It manages device to perform, so that at least one processor is able to carry out data decryption method as claimed in claim 5.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes the data ciphering method as described in Claims 1-4 any one when the computer program is executed by processor Or data decryption method as claimed in claim 5.
CN201810257581.5A 2018-03-27 2018-03-27 Data encryption method, data decryption method and related devices Active CN108173885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810257581.5A CN108173885B (en) 2018-03-27 2018-03-27 Data encryption method, data decryption method and related devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810257581.5A CN108173885B (en) 2018-03-27 2018-03-27 Data encryption method, data decryption method and related devices

Publications (2)

Publication Number Publication Date
CN108173885A true CN108173885A (en) 2018-06-15
CN108173885B CN108173885B (en) 2020-09-15

Family

ID=62511323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810257581.5A Active CN108173885B (en) 2018-03-27 2018-03-27 Data encryption method, data decryption method and related devices

Country Status (1)

Country Link
CN (1) CN108173885B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109254734A (en) * 2018-09-06 2019-01-22 郑州云海信息技术有限公司 A kind of date storage method, device, equipment and computer readable storage medium
CN110020535A (en) * 2019-03-29 2019-07-16 深圳市九洲电器有限公司 Critical data area data processing method, device and set-top box
CN112637246A (en) * 2021-01-14 2021-04-09 山西太钢不锈钢股份有限公司 Method for intelligently encoding and transmitting coal type information of coking coal sampling control system
CN112668278A (en) * 2020-12-23 2021-04-16 上海磐启微电子有限公司 Environment verification system and method
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
CN112668278B (en) * 2020-12-23 2024-05-31 上海磐启微电子有限公司 Environment verification system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
US20120328097A1 (en) * 2011-06-21 2012-12-27 Farhana Sheikh Apparatus and method for skein hashing
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
WO2014089843A1 (en) * 2012-12-14 2014-06-19 华为技术有限公司 Method and device for data encryption and decryption
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN107786331A (en) * 2017-09-28 2018-03-09 平安普惠企业管理有限公司 Data processing method, device, system and computer-readable recording medium
CN107800675A (en) * 2016-09-07 2018-03-13 深圳市腾讯计算机***有限公司 A kind of data transmission method, terminal and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120328097A1 (en) * 2011-06-21 2012-12-27 Farhana Sheikh Apparatus and method for skein hashing
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
WO2014089843A1 (en) * 2012-12-14 2014-06-19 华为技术有限公司 Method and device for data encryption and decryption
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN107800675A (en) * 2016-09-07 2018-03-13 深圳市腾讯计算机***有限公司 A kind of data transmission method, terminal and server
CN107786331A (en) * 2017-09-28 2018-03-09 平安普惠企业管理有限公司 Data processing method, device, system and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张庆兰: "无证书签密方案的研究及其应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109254734A (en) * 2018-09-06 2019-01-22 郑州云海信息技术有限公司 A kind of date storage method, device, equipment and computer readable storage medium
CN110020535A (en) * 2019-03-29 2019-07-16 深圳市九洲电器有限公司 Critical data area data processing method, device and set-top box
CN112668278A (en) * 2020-12-23 2021-04-16 上海磐启微电子有限公司 Environment verification system and method
CN112668278B (en) * 2020-12-23 2024-05-31 上海磐启微电子有限公司 Environment verification system and method
CN112637246A (en) * 2021-01-14 2021-04-09 山西太钢不锈钢股份有限公司 Method for intelligently encoding and transmitting coal type information of coking coal sampling control system
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
CN114390317B (en) * 2022-01-18 2024-03-19 山东点盾云网络科技有限公司 Encryption method and system for streaming video

Also Published As

Publication number Publication date
CN108173885B (en) 2020-09-15

Similar Documents

Publication Publication Date Title
CN105450620B (en) A kind of information processing method and device
CN106416124B (en) Semidefiniteness digital signature generates
CN108173885A (en) Data ciphering method, data decryption method and relevant apparatus
CN100566243C (en) Use the computing equipment and the method thereof of fixed token and removable token
KR101546204B1 (en) Host device, semiconductor memory device, and authentication method
US9553722B2 (en) Generating a key based on a combination of keys
CN101405988B (en) Method for the secure determination of data
CN110710155A (en) Progressive key encryption algorithm
CN105468940B (en) Method for protecting software and device
CN109768862B (en) A kind of key management method, key call method and cipher machine
CN105007155A (en) Two-dimension code mask encrypting and decrypting method and system
TW202014919A (en) Two-dimensional code generation method, data processing method, apparatus, and server
EP1830240A1 (en) Memory information protecting system, semiconductor memory, and method for protecting memory information
CN107368744A (en) For updating the method and the equipment of measurement and control technology of fastener components
CN106599723A (en) File encryption method and device, and file decryption method and device
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
TW201141172A (en) Methods, circuits, devices, and systems for provisioning of cryptographic data to one or more electronic devices
US20060129845A1 (en) Memory information protection system and methods
TW200803399A (en) Authentication system and device to be authenticated
KR101832861B1 (en) Method and Apparatus for Evaluating Passwords
KR20130093557A (en) System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction
US20100070780A1 (en) Quantum program concealing device and quantum program concealing method
US9087252B2 (en) Grayscale incremental information object
CN115001700B (en) Ecological environment supervision method and system based on blockchain
CN113645183B (en) Data encryption transmission method, system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant