CN108173885A - Data ciphering method, data decryption method and relevant apparatus - Google Patents
Data ciphering method, data decryption method and relevant apparatus Download PDFInfo
- Publication number
- CN108173885A CN108173885A CN201810257581.5A CN201810257581A CN108173885A CN 108173885 A CN108173885 A CN 108173885A CN 201810257581 A CN201810257581 A CN 201810257581A CN 108173885 A CN108173885 A CN 108173885A
- Authority
- CN
- China
- Prior art keywords
- character
- data
- encrypted
- redundancy check
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to technical field of information processing, disclose a kind of data ciphering method, data decryption method and relevant apparatus.In the present invention, data ciphering method includes:Be-encrypted data is obtained, and be that be-encrypted data distributes a block serial number, is all character assigned sequences number in be-encrypted data and is that each character distributes random parameter;The cyclic redundancy check code of be-encrypted data is calculated, and following operate is carried out to each character:Based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, the corresponding fixed code of calculating character, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters;Each encrypted characters is obtained successively, according to the cryptographic block of all encrypted characters generation be-encrypted data got.The data encryption and decryption method provided in embodiment of the present invention can effectively avoid measurement of the level data from being destroyed and distort.
Description
Technical field
The present invention relates to technical field of information processing, more particularly to a kind of data ciphering method, data decryption method and phase
Close device.
Background technology
The measurement of the level also known as " levelling " are the sides that point-to-point transmission height difference on ground is measured with spirit level and levelling rod
Method.The height difference of the point-to-point transmission obtained is measured, is mainly used for the number for arranging, being stored in more new nation's measurement of the level data record sheet
According to, so as to correct elevation is determined according to correct measurement data that is, certain point along plumb line direction to absolute datum away from
From.
At present, it is not distorted maliciously by other people to ensure to measure the data obtained, can be added usually in transmission process
It is close, for example (rsa encryption is calculated using des encryption algorithm (symmetric cryptography, Des symmetric encryption), RSA Algorithm
Method, RSA algorithm).
But inventor has found that at least there are the following problems in the prior art:
1st, the encryption principle based on des encryption algorithm is decoded practical by the way of the data after des encryption algorithm for encryption
On be exactly the coding for searching for secret key.For the secret key of 56 bit lengths, although being scanned for using the method for exhaustion, carry out 2 is needed
56 powers operation, operand can be very big, but with the continuous development of computer-system capabilities, using des encryption algorithm
The safety of encrypted data is progressively reduced.In addition, since des encryption algorithm is binary system Encryption Algorithm, added using being somebody's turn to do
After close algorithm is to data encryption, the array format of measurement of the level data can be destroyed, it can not be direct so as to cause the data after decryption
Carry out the data processing operation of later stage in the industry.
2nd, although RSA cryptographic algorithms are not easy to decode, but since its ciphering process needs to carry out a large amount of data run, nothing
The doubtful arithmetic speed that can substantially reduce the equipment that data are encrypted, if to ensure arithmetic speed, to the resource of equipment
It is more demanding, therefore when carrying out extensive operation using spirit level, which does not apply to simultaneously.In addition, the encryption method
Too dependent on independent public key and key, once key is compromised, encryption method will be cracked, thus safety also compared with
It is weak.
Invention content
The purpose of the present invention is to provide a kind of data ciphering method, data decryption method and relevant apparatus, in solution
State technical problem.
In order to solve the above technical problems, embodiments of the present invention provide a kind of data ciphering method, the data encryption
Method includes:Be-encrypted data is obtained, and a block serial number is distributed for be-encrypted data;Wherein, be-encrypted data is water
The measurement of the level data that each observation cycle generates during locating tab assembly, a measurement of the level data include several words
Symbol;For all character assigned sequences number in be-encrypted data;Wherein, sequence number is used to identify character institute in be-encrypted data
The position at place;According to block serial number and the sequence number of character, random parameter is distributed for character;According to cyclic redundancy check code
Coding rule calculates the cyclic redundancy check code of be-encrypted data;Following operate is carried out to each character:Based on des encryption
Algorithm according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, calculates word
Corresponding fixed code is accorded with, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters;
Each encrypted characters is obtained successively, according to the cryptographic block of all encrypted characters generation be-encrypted data got.
Embodiments of the present invention additionally provide a kind of data decryption method, which includes:Obtain encryption
File;Wherein, encryption file is made of several cryptographic blocks;Obtain block flowing water and each encryption of each cryptographic block
All encrypted characters sequence number corresponding with each encrypted characters in block;Each encrypted characters is proceeded as follows:
According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters;Obtain following for preamble cryptographic block
Ring redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, the cyclic redundancy school of preamble cryptographic block
Test cyclic redundancy check code of the code for previous be-encrypted data;According to the inverse operation criterion of fixed code, to fixed code, block stream
The cyclic redundancy check code of water number, the sequence number of encrypted characters and preamble cryptographic block carries out inverse operation, obtains encrypted characters pair
The original character answered;After all encrypted characters in encryption file are decrypted, encryption file decryption success is determined.
Embodiments of the present invention additionally provide a kind of data encryption device, which includes:Acquisition module,
First distribution module, the second distribution module, third distribution module, computing module, encryption processing module and generation module;Obtain mould
Block, for obtaining be-encrypted data;Wherein, generated for each observation cycle in leveling process one of be-encrypted data
Measurement of the level data, a measurement of the level data include several characters;First distribution module, for being distributed for be-encrypted data
One block serial number;Second distribution module, for for all character assigned sequences number in be-encrypted data;Wherein, sequence
Number for identifying character third distribution module the location of in be-encrypted data, for according to block serial number and character
Sequence number distributes random parameter for character;Computing module for the coding rule according to cyclic redundancy check code, calculates to be added
The cyclic redundancy check code of ciphertext data;Encryption processing module, for carrying out following operate to each character:Based on des encryption
Algorithm according to the cyclic redundancy check code of be-encrypted data, block serial number, character and the corresponding sequence number of character, calculates word
Corresponding fixed code is accorded with, and according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters;
Generation module, for obtaining each encrypted characters successively, according to all encrypted characters generation be-encrypted data got
Cryptographic block.
Embodiments of the present invention additionally provide a kind of data decryption apparatus, which includes:First obtains
Module, the first acquisition module of the second acquisition module, decryption processing module and determining module encrypt file for obtaining;Wherein, add
Ciphertext part is made of several cryptographic blocks;Second acquisition module, for obtaining the block flowing water of each cryptographic block and each
All encrypted characters sequence number corresponding with each encrypted characters in a cryptographic block;Decryption processing module, for each
A encrypted characters proceed as follows:According to can show character code table and complementation operational criterion, obtain encrypted characters it is corresponding solid
Determine code;Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, encryption of the preamble cryptographic block for previous be-encrypted data
Block, the cyclic redundancy check code of preamble cryptographic block are the cyclic redundancy check code of previous be-encrypted data;According to fixed code
Inverse operation criterion, to the cyclic redundancy check code of fixed code, block serial number, the sequence number of encrypted characters and preamble cryptographic block
Inverse operation is carried out, obtains the corresponding original character of encrypted characters;Determining module, for all encrypted words in encryption file
After symbol is decrypted, encryption file decryption success is determined.
Embodiments of the present invention additionally provide a kind of data encryption equipment, at least one processor;And at least one
The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be performed by least one processor, instructs quilt
At least one processor performs, so that the data that at least one processor is able to carry out involved in arbitrary embodiment of the invention add
Decryption method.
Embodiments of the present invention additionally provide a kind of data decryption apparatus, at least one processor;And at least one
The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be performed by least one processor, instructs quilt
At least one processor performs, so that at least one processor is able to carry out the data solution involved in arbitrary embodiment of the invention
Decryption method.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are deposited in computer readable storage medium
Computer program is contained, the data involved in arbitrary embodiment of the invention can be realized when computer program is executed by processor
Encryption method.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are deposited in computer readable storage medium
Computer program is contained, the data involved in arbitrary embodiment of the invention can be realized when computer program is executed by processor
Decryption method.
Embodiment of the present invention in terms of existing technologies, when be-encrypted data is encrypted, by using treating
Cyclic redundancy check code, block serial number, character and the corresponding sequence number of character of encryption data, it is corresponding solid to carry out calculating character
Determine code, then according to the corresponding fixed code of each character random parameter corresponding with the character, character is encrypted, is obtained
Encrypted characters finally combine whole encrypted characters, generate a cryptographic block, complete the encryption to be-encrypted data.Right
When being decrypted according to the encrypted encryption file of aforesaid way, reverse operation, only adjacent previous cryptographic block proper solution
Close (i.e. internal data not be tampered), the corresponding cyclic redundancy check code of the cryptographic block just can be next for decrypting
Cryptographic block, otherwise once any one in encryption file is encrypted content in the block and be tampered, subsequent cryptographic block just can not be into
Row decryption oprerations, entire file of encrypting also can not be just decrypted.Based on above-mentioned data encryption and decryption method, can effectively keep away
Exempt from initial data to be destroyed and distort.
In addition, according to the coding rule of cyclic redundancy check code, before the cyclic redundancy check code for calculating be-encrypted data,
Data ciphering method further includes:Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, preamble cryptographic block is to be added for previous item
The cryptographic block of ciphertext data, the cyclic redundancy check code of preamble cryptographic block are the cyclic redundancy check code of previous be-encrypted data;
According to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of be-encrypted data is calculated, is specifically included:According to be added
The cyclic redundancy check code of previous character in ciphertext data calculates the cyclic redundancy check of the latter character adjacent with character
Code, the cyclic redundancy check code until calculating last character in be-encrypted data;By the last one in be-encrypted data
The cyclic redundancy check code of character, the cyclic redundancy check code as be-encrypted data;Wherein, first character in be-encrypted data
The cyclic redundancy check code of symbol is calculated according to the cyclic redundancy check code of preamble cryptographic block and is obtained.Present embodiments provide for one
The coding rule according to cyclic redundancy check code is planted, calculates the concrete mode of the cyclic redundancy check code of be-encrypted data.
In addition, according to fixed code and the corresponding random parameter of character, character is encrypted, after obtaining encrypted characters,
Data ciphering method further includes:Character visible coding can be obtained from preset in show character code table;It wherein, can show character code
Character visible coding in table is composed of visible ascii character according to irregular sequence;It is encoded according to character visible, it will
Encrypted characters are compiled as viewable format.By being encoded according to character visible, encrypted characters are compiled as viewable format, solve two
The problem of des encryption algorithm of system can destroy the array format of measurement of the level data, so as to so that decryption after data energy
Enough data processing operations for directly carrying out the later stage.
In addition, after according to the cryptographic block of all encrypted characters generation be-encrypted data got, data ciphering method
It further includes:Determine that the number of cryptographic block reaches preset number;According to the block stream of the corresponding be-encrypted data of each cryptographic block
Water number is ranked up, and forms a complete encryption file.By the way that encrypted cryptographic block is formed a complete encryption text
Part, so as to ensure that the cyclic redundancy check code of only cryptographic block is correct (encrypting data in the block to be not tampered with),
Postorder cryptographic block can be decrypted, realized to encrypting the decryption of file, and then ensure that the safety of data.
Description of the drawings
One or more embodiments are illustrated by the picture in corresponding attached drawing, these are exemplary
Illustrate not form the restriction to embodiment, the element with same reference numbers label is expressed as similar member in attached drawing
Part, unless there are special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the flow chart of the data ciphering method of first embodiment of the invention;
Fig. 2 is the flow chart of the data ciphering method of second embodiment of the invention;
Fig. 3 is the flow chart of the data decryption method of third embodiment of the invention;
Fig. 4 is the frame structure schematic diagram of the data encryption device of four embodiment of the invention;
Fig. 5 is the frame structure schematic diagram of the data decryption apparatus of fifth embodiment of the invention;
Fig. 6 is the frame structure schematic diagram of the data encryption equipment of sixth embodiment of the invention;
Fig. 7 is the frame structure schematic diagram of the data decryption apparatus of seventh embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to each reality of the present invention
The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the present invention,
In order to make the reader understand this application better, many technical details are proposed.But even if without these technical details and base
In the various changes and modifications of following embodiment, each claim of the application technical side claimed can also be realized
Case.
The first embodiment of the present invention is related to a kind of data ciphering methods.The data ciphering method is mainly used in level
Measuring spirit level can be specifically digital level (also referred to as electronic level), so as in generation measurement of the level number
According to when can directly be encrypted.
In addition, in order not to increase the operating pressure of digital level, can also be set by the electronics being connected with digital level
Standby to perform the data ciphering method, electronic equipment described herein can be tablet computer, portability computer etc..
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can select suitable data encryption according to usage scenario
Equipment is not limited herein.
In order to make it easy to understand, the data ciphering method is specifically described below in conjunction with Fig. 1:
In a step 101, be-encrypted data is obtained.
Specifically, the be-encrypted data got in present embodiment is each observation cycle in leveling process
The measurement of the level data generated, and a measurement of the level data can include several characters.
It should be noted that in leveling process, the generation period of a measurement of the level data is generally 1-2 points
Clock, the generation period of a measurement of the level data file (including several measurement of the level data) are generally 1-2 days.
Thus, above-mentioned observation cycle can be by observation scene of the those skilled in the art according to spirit level, whole sight
The time is surveyed to set, is not limited herein.
In a step 102, the cyclic redundancy check code of be-encrypted data is calculated.
Specifically, the cyclic redundancy check code of be-encrypted data is calculated according to the coding rule of cyclic redundancy check code
It obtains.
In order to make it easy to understand, calculating the operation of the cyclic redundancy check code of be-encrypted data, it is specifically described below:
It is first before the coding rule according to cyclic redundancy check code, the cyclic redundancy check code for calculating be-encrypted data
First need the cyclic redundancy check code of acquisition preamble cryptographic block.
Specifically, cryptographic block of the preamble cryptographic block that present embodiment is obtained for previous be-encrypted data, preamble add
Cyclic redundancy check code of close piece of the cyclic redundancy check code for previous be-encrypted data.
In doing so, it can carry out calculating the cyclic redundancy check code of be-encrypted data, it is specific as follows:
According to the cyclic redundancy check code of character previous in be-encrypted data, the latter character adjacent with character is calculated
Cyclic redundancy check code, the cyclic redundancy check code until calculating last character in be-encrypted data;
By the cyclic redundancy check code of last character in be-encrypted data, the cyclic redundancy school as be-encrypted data
Test code.
It should be noted that in be-encrypted data first character cyclic redundancy check code, be according to preamble cryptographic block
Cyclic redundancy check code calculate obtain.
In addition, the coding rule about cyclic redundancy check code is more universal, those skilled in the art can root
According to needing voluntarily to realize, details are not described herein again.
In present embodiment, by introducing cyclic redundancy check code, using cyclic redundancy check code as institute in ciphering process
The important parameter needed, and when each measurement of the level data are encrypted, cyclic redundancy check code will be according to
Rely the cyclic redundancy check code of a upper measurement of the level data, so that encrypted file, is only surveyed in each level
In the case that amount data are not tampered, cyclic redundancy check code will not just change, just can be successively by adjacent whole
Encryption data is decoded, otherwise at all can not successful decryption.
In step 103, each character is encrypted, obtains encrypted characters.
In order to make it easy to understand, each character is encrypted, the operation of encrypted characters is obtained, is carried out below specifically
It is bright:
First, based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and
The corresponding sequence number of character, the corresponding fixed code of calculating character.
It should be noted that des encryption algorithm is a kind of key using one 56 and additional 8 bit parity check
Position, generates packet size 64 maximum, and basic operation includes exclusive or, displacement, replacement, four kinds of shifting function.In logarithm
During according to being encrypted, particular by sub-key is used to wherein half application circulatory function, then will output with the other half into
Row nonequivalence operation then exchanges this two halves, this process will continue to down, but the last one cycle does not exchange.
Due to the use of des encryption algorithm and more mature, those skilled in the art can knowing according to its grasp
Know and means realize that details are not described herein again.
Then, according to fixed code and the corresponding random parameter of character, character is encrypted, obtains encrypted characters.
It should be noted that block serial number, character and the corresponding sequence number of character needed for above-mentioned ciphering process, be
After acquiring be-encrypted data, distributed by data encryption equipment.
Wherein, each be-encrypted data corresponds to a block serial number, i.e., all characters in be-encrypted data are all common
Enjoy this block serial number, which can be according to the sequencing of the be-encrypted data got, from preset a certain
A value starts, and adds up successively.
It is that Article 2 is to be added for example, can be " 1 " for the block serial number of first be-encrypted data distribution received
The block serial number of ciphertext data distribution can be " 2 ".
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
It each character corresponding sequence number and is distributed by data encryption equipment, the method for salary distribution and block stream
The method of salary distribution of water number is roughly the same, and details are not described herein again, and in practical applications, those skilled in the art can be as needed
Rationally setting, is also not particularly limited herein.
In addition, it is necessary to illustrate, the sequence number in present embodiment for the distribution of each character is primarily used to identify
Character is the location of in be-encrypted data.
In addition, the corresponding random parameter of each character, specifically divides according to the sequence number of block serial number and character
Match.Its method of salary distribution can be the generation random number by implant data encryption device (such as spirit level, other electronic equipments)
Application program generate, specifically, those skilled in the art can select the producing method of random number as needed, herein
It is not limited.
At step 104, according to the cryptographic block of all encrypted characters generation be-encrypted data got.
Specifically, in the present embodiment, according to the encryption of all encrypted characters generation be-encrypted data got
Block, specifically can be as follows:
Each encrypted characters is obtained successively, then according to the corresponding sequence number of each encrypted characters, by encrypted characters
Arranged in sequence after whole encrypted characters in getting the measurement of the level data, generates the cryptographic block of be-encrypted data.
In addition, it is noted that due in practical applications, during the measurement of the level, spirit level can not generally connect
Network is connected to, therefore the encryption data generated cannot be sent to data decryption apparatus in time and be handled, therefore, passed for convenience
It send and is further ensured that relevance and the safety of data, number to be encrypted is being generated according to all encrypted characters got
According to cryptographic block after, can also according to the preset period, by the cryptographic block obtained in the period or preset number, when
When the number of cryptographic block reaches preset number, arranged according to the block serial number of the corresponding be-encrypted data of each cryptographic block
Sequence forms a complete encryption file.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
By foregoing description it is not difficult to find that the data ciphering method provided in present embodiment, by introducing cyclic redundancy
Check code, and existing des encryption algorithm is used for reference, when be-encrypted data is encrypted, according to previous be-encrypted data
Cyclic redundancy check code, calculate the cyclic redundancy check code of current be-encrypted data, then the position in des encryption algorithm
Be-encrypted data is encrypted in operation and bit map (displacement, displacement and exclusive or) operation.Based on this cipher mode, work as output
Encryption a certain position in the block on encrypted characters when being destroyed, the data after position is destroyed can be made, will be unable to correct
Decryption, so as to which initial data is effectively avoided to be destroyed and is distorted so that encrypted data are safer.
In addition, random parameter is also introduced in ciphering process, so as to further improve the safety of encryption data.
Second embodiment of the present invention is related to a kind of data ciphering method.Present embodiment is in the base of first embodiment
It is further improved on plinth, specific improvements are:According to fixed code and the corresponding random parameter of character, character is carried out
Encryption, after obtaining encrypted characters, encodes according to character visible, encrypted characters is compiled for viewable format, idiographic flow is such as
Shown in Fig. 2.
Specifically, in the present embodiment, comprising step 2011 to step 205, wherein, step 201 to step 203 is divided
It is not roughly the same to step 103 with the step 101 in first embodiment, step 205 and the step 104 in first embodiment
Roughly the same, details are not described herein again, mainly introduces difference below, and the technology of detailed description is not thin in the present embodiment
Section, reference can be made to the data ciphering method that first embodiment is provided, details are not described herein again.
In step 204, it is encoded according to character visible, encrypted characters is compiled as viewable format.
Specifically, the above-mentioned character visible for being used to encrypted characters being compiled as viewable format is encoded to from preset and shows
Show what is obtained in character code table.
In addition, in the present embodiment, character visible coding that can be in show character code table be by visible ascii character by
It is composed according to irregular sequence.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art needs rationally setting, is not limited herein.
In addition, it is noted that in order to further ensure the safety of encrypted data, other people are avoided get can
After showing character code table, quick breaking encryption content, in practical applications, those skilled in the art can be as needed,
The sequence of the character visible coding that can once store in show character code table and character visible coding is regularly updated, so as to reach
To the effect for promoting security level.
By foregoing description it is not difficult to find that the data ciphering method provided in present embodiment, according to fixed code and word
Accord with corresponding random parameter, character be encrypted, after obtaining encrypted characters, by from it is preset can be in show character code table
Character visible coding is obtained, and is encoded according to the character visible got, encrypted characters are compiled as viewable format, and (being based on will
Binary data after des encryption algorithm for encryption is converted to visible ASCII character corresponding content), solve binary DES
Encryption Algorithm can be destroyed the problem of array format of measurement of the level data, i.e., the data ciphering method provided in present embodiment,
When be-encrypted data is encrypted, until to the numerical part in measurement of the level data, as rod reading, distance are read
The numerical value of sensitivity such as number, temperature, time is encrypted, and can keep original arrangement side to the gauge outfit part in data file
Formula, so as to so that the data after decryption can directly carry out the data processing operation in later stage.
Third embodiment of the present invention is related to a kind of data decryption method.The data decryption method is mainly used in reception
Data ciphering method according to involved in embodiment of the invention arbitrary be encrypted after encryption file electronic equipment, such as
People's computer, portability computer, tablet computer etc. or server, such as local server, cloud server.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can select suitable data deciphering according to usage scenario
Equipment is not limited herein.
In order to make it easy to understand, the data decryption method is specifically described below in conjunction with Fig. 3:
In step 301, encryption file is obtained.
Specifically, in the present embodiment, the encryption file that data decryption apparatus is got is (according to arbitrary number of the present invention
The encryption file obtained according to encryption method) it is made of several cryptographic blocks.
But the encryption file that in practical applications, data decryption apparatus is got may also be only a cryptographic block.
The selection of above two mode can determine according to the communication line between data encryption equipment and data decryption apparatus
It is fixed, can also be determined according to the operative scenario of each equipment, can also two ways interact, specifically, those skilled in the art
It can need to set according to actual job, not be limited herein.
In step 302, encrypted word all in the block flowing water and each cryptographic block of each cryptographic block is obtained
Symbol sequence number corresponding with each encrypted characters.
Specifically, above-mentioned encryption file is being got from the server of data encryption equipment or storage encryption file
When, it can send to send to above equipment simultaneously and ask, obtain the block flowing water of each cryptographic block required during encryption data
And all encrypted characters sequence number corresponding with each encrypted characters in each cryptographic block.
It should be noted that the corresponding sequence number of encrypted characters described in present embodiment, is actually for the encryption
The sequence number of the corresponding original character distribution of character.
In step 303, each character is decrypted, obtains original character.
In order to make it easy to understand, being decrypted to character, the process of original character is obtained, is specifically described below:
First, according to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters.
Specifically, needed for decrypting process can show character code table be similarly at encryption device obtain come.
Then, the cyclic redundancy check code of preamble cryptographic block is obtained.
It should be noted that the cryptographic block of preamble cryptographic block described in present embodiment for previous be-encrypted data,
Cyclic redundancy check code of the cyclic redundancy check code of preamble cryptographic block for previous be-encrypted data.
Finally, according to the inverse operation criterion of fixed code, to fixed code, block serial number, encrypted characters sequence number and
The cyclic redundancy check code of preamble cryptographic block carries out inverse operation, obtains the corresponding original character of encrypted characters.
It should be noted that the calculating function based on fixed code is it is found that in known fixed code, block serial number, encrypted word
It, can be in the hope of unknown in the sequence number of symbol, the cyclic redundancy check code of preamble cryptographic block and original character during arbitrary 4 parameters
Parameter.Therefore, it based on above-mentioned principle, is encrypted in known fixed code, block serial number, the sequence number of encrypted characters and preamble
In the case of the cyclic redundancy check code of block, the corresponding original character of encrypted characters can be acquired by inverse operation.
In step 304, judge to encrypt the whether whole successful decryptions of all encrypted characters in file.
Specifically, if it is decided that all encrypted characters whole successful decryptions in encryption file enter step 305;It is no
Then, decryption oprerations are directly exited, terminate this operating process (encrypt file and decode failure).
In step 305, encryption file decryption success is determined.
By foregoing description it is not difficult to find that the data decryption method provided in present embodiment, to being appointed according to the present invention
When the encrypted encryption file of data ciphering method involved in meaning embodiment is decrypted, pass through reverse operation, only phase
The previous cryptographic block faced normally decrypts (i.e. internal data not be tampered), the corresponding cyclic redundancy check of the cryptographic block
Code can just be used for decrypting next cryptographic block, otherwise once any one encryption content in the block in encryption file is usurped
Change, operation can not be just decrypted in subsequent cryptographic block, and entire file of encrypting also can not be just decrypted, so as to effectively avoid
Initial data is destroyed and distorts.
The 4th embodiment of the present invention is related to a kind of data encryption device.The specific implementation of the data encryption device can be joined
See the description in any of the above-described data ciphering method embodiment, specific frame structure is as shown in Figure 4.
As shown in figure 4, data encryption device mainly includes:Acquisition module 401, the first distribution module 402, second distribution mould
Block 403, third distribution module 404, computing module 405, encryption processing module 406 and generation module 407.
Wherein, acquisition module 401, for obtaining be-encrypted data.
Specifically, the be-encrypted data got in present embodiment is each observation cycle in leveling process
The measurement of the level data generated, and a measurement of the level data include several characters.
It should be noted that in leveling process, the generation period of a measurement of the level data is generally 1-2 points
Clock, the generation period of a measurement of the level data file (including several measurement of the level data) are generally 1-2 days.
Thus, above-mentioned observation cycle can be by observation scene of the those skilled in the art according to spirit level, whole sight
The time is surveyed to set, is not limited herein.
First distribution module 402, for distributing a block serial number for be-encrypted data.
Second distribution module 403, for for all character assigned sequences number in be-encrypted data.
It should be noted that the sequence number in present embodiment for the character distribution in be-encrypted data is mainly used for marking
Character learning symbol is the location of in be-encrypted data.
For the sequence number according to block serial number and character, random parameter is distributed for character for third distribution module 404.
For example, the application journey of the generation random number by implant data encryption device (such as spirit level, other electronic equipments)
Sequence specifically, those skilled in the art can select the producing method of random number as needed, is not limited herein.
Computing module 405 for the coding rule according to cyclic redundancy check code, calculates the cyclic redundancy of be-encrypted data
Check code.
Specifically, according to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of be-encrypted data is calculated
Mode, it is specific as follows:
According to the cyclic redundancy check code of character previous in be-encrypted data, the latter character adjacent with character is calculated
Cyclic redundancy check code, then the cyclic redundancy check code until calculating last character in be-encrypted data will treat
The cyclic redundancy check code of last character in encryption data, the cyclic redundancy check code as be-encrypted data.
In addition, it is noted that in be-encrypted data first character cyclic redundancy check code, encrypted according to preamble
The cyclic redundancy check code of block, which calculates, to be obtained.
Encryption processing module 406, for carrying out following operate to each character:
Based on des encryption algorithm, according to the cyclic redundancy check code of be-encrypted data, block serial number, character and character
Corresponding sequence number, the corresponding fixed code of calculating character, and according to fixed code and the corresponding random parameter of character, character is carried out
Encryption, obtains encrypted characters.
Generation module 407 for obtaining each encrypted characters successively, is treated according to all encrypted characters generation got
The cryptographic block of encryption data.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can rationally be set as needed, not be limited herein.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided
Data ciphering method, details are not described herein again.
By foregoing description it is not difficult to find that compared with prior art, the data encryption device provided in present embodiment,
When be-encrypted data is encrypted, by using the cyclic redundancy check code of be-encrypted data, block serial number, character and word
Corresponding sequence number is accorded with, carrys out the corresponding fixed code of calculating character, then according to the corresponding fixed code of each character and the character
Corresponding random parameter, is encrypted character, obtains encrypted characters, finally combines whole encrypted characters, generates one
Cryptographic block completes the encryption to be-encrypted data, so as to which initial data is effectively avoided to be destroyed and is distorted.
The 5th embodiment of the present invention is related to a kind of data decryption apparatus.The specific implementation of the data decryption apparatus can be joined
See the description in any of the above-described data decryption method embodiment, specific frame structure is as shown in Figure 5.
As shown in figure 5, data decryption apparatus mainly includes:First acquisition module 501, the second acquisition module 502, at decryption
Manage module 503 and determining module 504.
Wherein, the first acquisition module 501 encrypts file for obtaining.
It should be noted that the encryption file got in present embodiment is made of several cryptographic blocks.
Second acquisition module 502 owns for obtaining in the block flowing water of each cryptographic block and each cryptographic block
Encrypted characters sequence number corresponding with each encrypted characters.
Decryption processing module 503, for being proceeded as follows to each encrypted characters:
According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of encrypted characters;Preamble is obtained to add
Close piece of cyclic redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, preamble cryptographic block follow
Cyclic redundancy check code of the ring redundancy check code for previous be-encrypted data;According to the inverse operation criterion of fixed code, to fixation
The cyclic redundancy check code of code, block serial number, the sequence number of encrypted characters and preamble cryptographic block carries out inverse operation, is added
The corresponding original character of close character.
Determining module 504, for after all encrypted characters in encryption file are decrypted, determining encryption file solution
Close success.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can rationally be set as needed, not be limited herein.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided
Data ciphering method, details are not described herein again.
By foregoing description it is not difficult to find that compared with prior art, the data decryption apparatus provided in present embodiment,
During to being decrypted according to the encrypted encryption file of data ciphering method involved in arbitrary embodiment of the invention, by inverse
To operation, only adjacent previous cryptographic block normally decrypts (i.e. internal data not be tampered), cryptographic block correspondence
Cyclic redundancy check code just can be used for decrypt next cryptographic block, otherwise once encryption file in any one cryptographic block
In content be tampered, operation can not be just decrypted in subsequent cryptographic block, and entire file of encrypting also can not be just decrypted, so as to
It is possible to prevente effectively from initial data is destroyed and distorts.
Device embodiments described above are only schematical, and protection scope of the present invention is not formed and is limited
Fixed, in practical applications, those skilled in the art can select according to the actual needs some or all of module therein
It realizes the purpose of present embodiment scheme, is not limited herein.
The sixth embodiment of the present invention is related to a kind of data encryption equipment, and concrete structure is as shown in Figure 6.
Specifically, the data encryption equipment involved in present embodiment can be the spirit level of the measurement of the level, specifically
Can be digital level (also referred to as electronic level), so as to when measurement of the level data are generated can directly into
Row encryption.
In addition, in order not to increase the operating pressure of digital level, data encryption equipment may be and digital level
Connected electronic equipment, electronic equipment described herein can be tablet computer, portability computer etc..
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can select suitable data encryption according to usage scenario
Equipment is not limited herein.
In order to make it easy to understand, the specific frame structure of data encryption equipment is illustrated below:
Specifically, at least one processor 601 can specifically be included inside the data encryption equipment;And at least
The memory 602 and communication component 603 that one processor 601 communicates to connect, in Fig. 6 by taking a processor 601 as an example.Communication
Component 603 is received under the control of processor 601 and/or transmission data.Wherein, be stored with can be at least one for memory 602
The instruction that processor 601 performs, instructs and is performed by least one processor 601, so that at least one processor 601 is able to carry out
Data ciphering method involved in arbitrary embodiment of the invention.
In practical applications, the instruction that at least one processor 601 performs can be stored in memory 602, is instructed by extremely
A few processor 601 performs, so that at least one processor 601 is able to carry out what any means embodiment of the present invention was related to
Data ciphering method, the not technical detail of detailed description in the present embodiment, reference can be made to what embodiment of the present invention was provided
Data ciphering method.
The 7th embodiment of the present invention is related to a kind of data decryption apparatus, and concrete structure is as shown in Figure 7.
Specifically, the data decryption apparatus involved in present embodiment can be for receiving according to of the invention arbitrary real
The electronic equipment of the encryption file after the data ciphering method involved in mode is encrypted is applied, such as personal computer, portability
Computer, tablet computer etc. or server, such as local server, cloud server.
It should be noted that it these are only for example, not to technical scheme of the present invention and technology model to be protected
It encloses composition to limit, in practical applications, those skilled in the art can select suitable data deciphering according to usage scenario
Equipment is not limited herein.
In order to make it easy to understand, the specific frame structure of data decryption apparatus is illustrated below:
Specifically, at least one processor 701 can specifically be included inside the network interconnection apparatus, network interconnection;And at least
The memory 702 and communication component 703 that one processor 701 communicates to connect, communication component 703 is in the control of processor 701
Lower reception and/or transmission data.Wherein, memory 702 is stored with the instruction that can be performed by least one processor 701, instruction
It is performed by least one processor 701, so that at least one processor 701 is able to carry out involved in arbitrary embodiment of the invention
Data decryption method.
In addition, it is noted that in practical applications, the processor in sixth embodiment and the 7th embodiment can
To be CPU (central processing unit, Central Processing Unit), memory can be RAM (readable and writable memory,
Random Access Memory), communication component can be the communication interface with communication function, pin etc..In addition, processing
Device, memory can be connected by bus or other modes, Fig. 6 in Fig. 7 for being connected by bus.Memory conduct
A kind of non-volatile computer readable storage medium storing program for executing can be held available for storage non-volatile software program, non-volatile computer
Line program and module, as in the arbitrary embodiment of the present invention it is preset can show character code table be stored in memory.Place
Reason device is by running non-volatile software program stored in memory, instruction and module, so as to perform the various of equipment
The data ciphering method involved in the arbitrary embodiment of the present invention or data deciphering side are realized in application of function and data processing
Method.
Memory can include storing program area and storage data field, wherein, storing program area can storage program area, extremely
A few required application program of function;Storage data field can the Save option list etc..In addition, memory can be included at a high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other non-volatile solid state memory parts.In some embodiments, memory is optional including remotely located relative to processor
Memory, these remote memories can pass through network connection to external equipment.The example of above-mentioned network includes but not limited to
Internet, intranet, LAN, mobile radio communication and combinations thereof.
One or more module stores in memory, when being performed by one or more processor, performs this hair
Data ciphering method or data decryption method involved in bright arbitrary embodiment.
The said goods can perform the method that embodiment of the present invention is provided, have the corresponding function module of execution method and
Advantageous effect, the not technical detail of detailed description in the present embodiment, reference can be made to provided in the arbitrary embodiment of the present invention
Method.
The 8th embodiment of the present invention is related to a kind of computer readable storage medium, in the computer readable storage medium
Computer instruction is stored with, the data which enables a computer to perform involved in the arbitrary embodiment of the present invention add
Decryption method or data decryption method.
That is, it will be appreciated by those skilled in the art that realize that all or part of step in above method embodiment is can be with
Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions making
It obtains an equipment (can be microcontroller, chip etc.) or processor (processor) is performed described in each embodiment of the application
The all or part of step of method.And aforementioned storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with
Store the medium of program code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment party of the present invention
Formula, and in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and model of the present invention
It encloses.
Claims (10)
1. a kind of data ciphering method, which is characterized in that including:
Be-encrypted data is obtained, and a block serial number is distributed for the be-encrypted data;Wherein, the be-encrypted data is
The measurement of the level data that each observation cycle generates in leveling process, if the measurement of the level data include
Dry character;
For all character assigned sequences number in the be-encrypted data;Wherein, the sequence number exists for identifying the character
The location of in the be-encrypted data;
According to the block serial number and the sequence number of the character, random parameter is distributed for the character;
According to the coding rule of cyclic redundancy check code, the cyclic redundancy check code of the be-encrypted data is calculated;
Following operate is carried out to character each described:Based on des encryption algorithm, according to the cyclic redundancy of the be-encrypted data
Check code, the block serial number, the character and the corresponding sequence number of the character, calculate the corresponding fixation of the character
Code, and according to the fixed code and the corresponding random parameter of the character, the character is encrypted, obtains encrypted characters;
Each described encrypted characters is obtained successively, and adding for the be-encrypted data is generated according to all encrypted characters got
Close piece.
2. data ciphering method according to claim 1, which is characterized in that the coding according to cyclic redundancy check code
Rule, before the cyclic redundancy check code for calculating the be-encrypted data, the data ciphering method further includes:
Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, the preamble cryptographic block for previous be-encrypted data plus
Close piece, the cyclic redundancy check code of the preamble cryptographic block is the cyclic redundancy check code of the previous be-encrypted data;
The coding rule according to cyclic redundancy check code calculates the cyclic redundancy check code of the be-encrypted data, specifically
Including:
According to the cyclic redundancy check code of character previous in the be-encrypted data, the latter adjacent with the character is calculated
The cyclic redundancy check code of character, the cyclic redundancy check code until calculating last character in the be-encrypted data;
By the cyclic redundancy check code of last character in the be-encrypted data, the cycle as the be-encrypted data is superfluous
Remaining check code;
Wherein, in the be-encrypted data first character cyclic redundancy check code, according to the cycle of the preamble cryptographic block
Redundancy check code, which calculates, to be obtained.
3. data ciphering method according to claim 1 or 2, which is characterized in that described according to the fixed code and described
The corresponding random parameter of character, is encrypted the character, and after obtaining encrypted characters, the data ciphering method also wraps
It includes:
Character visible coding can be obtained from preset in show character code table;Wherein, it is described can be in show character code table it is described
Character visible coding is composed of visible ascii character according to irregular sequence;
It is encoded according to the character visible, the encrypted characters is compiled as viewable format.
4. data ciphering method according to claim 1 or 2, which is characterized in that all encryptions that the basis is got
After character generates the cryptographic block of the be-encrypted data, the data ciphering method further includes:
Determine that the number of the cryptographic block reaches preset number;
Be ranked up according to the block serial number of the corresponding be-encrypted data of each described cryptographic block, form one it is complete
Encryption file.
5. a kind of data decryption method, which is characterized in that including:
Obtain encryption file;Wherein, the encryption file is made of several cryptographic blocks;
Obtain encrypted characters all in the block flowing water and each described cryptographic block of each cryptographic block and each
The corresponding sequence number of a encrypted characters;
Encrypted characters each described are proceeded as follows:According to can show character code table and complementation operational criterion, obtain institute
State the corresponding fixed code of encrypted characters;Obtain the cyclic redundancy check code of preamble cryptographic block;Wherein, before the preamble cryptographic block is
The cryptographic block of one be-encrypted data, the cyclic redundancy check code of the preamble cryptographic block is the previous be-encrypted data
Cyclic redundancy check code;According to the inverse operation criterion of the fixed code, to the fixed code, the block serial number, it is described plus
The sequence number of close character and the cyclic redundancy check code of preamble cryptographic block carry out inverse operation, and it is corresponding to obtain the encrypted characters
Original character;
After all encrypted characters in the encryption file are decrypted, the encryption file decryption success is determined.
6. a kind of data encryption device, which is characterized in that including:Acquisition module, the first distribution module, the second distribution module,
Three distribution modules, computing module, encryption processing module and generation module;
The acquisition module, for obtaining be-encrypted data;Wherein, the be-encrypted data is each in leveling process
The measurement of the level data that observation cycle generates, the measurement of the level data include several characters;
First distribution module, for distributing a block serial number for the be-encrypted data;
Second distribution module, for for all character assigned sequences number in the be-encrypted data;Wherein, the sequence
Number for identifying the character the location of in the be-encrypted data;
The third distribution module for the sequence number according to the block serial number and the character, is distributed for the character
Random parameter;
The computing module, for the coding rule according to cyclic redundancy check code, the cycle for calculating the be-encrypted data is superfluous
Remaining check code;
The encryption processing module, for carrying out following operate to character each described:
Based on des encryption algorithm, according to the cyclic redundancy check code of the be-encrypted data, the block serial number, the word
Symbol sequence number corresponding with the character, calculates the corresponding fixed code of the character, and according to the fixed code and the character
Corresponding random parameter is encrypted the character, obtains encrypted characters;
The generation module for obtaining each described encrypted characters successively, is generated according to all encrypted characters got
The cryptographic block of the be-encrypted data.
7. a kind of data decryption apparatus, which is characterized in that including:First acquisition module, the second acquisition module, decryption processing module
And determining module;
First acquisition module encrypts file for obtaining;Wherein, the encryption file is made of several cryptographic blocks;
Second acquisition module, for obtaining in the block flowing water of each cryptographic block and each described cryptographic block
All encrypted characters sequence number corresponding with each encrypted characters;
The decryption processing module, for being proceeded as follows to encrypted characters each described:
According to can show character code table and complementation operational criterion, obtain the corresponding fixed code of the encrypted characters;Preamble is obtained to add
Close piece of cyclic redundancy check code;Wherein, cryptographic block of the preamble cryptographic block for previous be-encrypted data, the preamble add
Close piece of cyclic redundancy check code is the cyclic redundancy check code of the previous be-encrypted data;According to the inverse of the fixed code
Operational criterion, to the cycle of the fixed code, the block serial number, the sequence number of the encrypted characters and preamble cryptographic block
Redundancy check code carries out inverse operation, obtains the corresponding original character of the encrypted characters;
The determining module, for after all encrypted characters in the encryption file are decrypted, determining the encryption
File decryption success.
8. a kind of data encryption equipment, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be performed by least one processor, and described instruction is by least one place
It manages device to perform, so that at least one processor is able to carry out the data encryption side as described in Claims 1-4 any one
Method.
9. a kind of data decryption apparatus, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be performed by least one processor, and described instruction is by least one place
It manages device to perform, so that at least one processor is able to carry out data decryption method as claimed in claim 5.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program realizes the data ciphering method as described in Claims 1-4 any one when the computer program is executed by processor
Or data decryption method as claimed in claim 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257581.5A CN108173885B (en) | 2018-03-27 | 2018-03-27 | Data encryption method, data decryption method and related devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257581.5A CN108173885B (en) | 2018-03-27 | 2018-03-27 | Data encryption method, data decryption method and related devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108173885A true CN108173885A (en) | 2018-06-15 |
CN108173885B CN108173885B (en) | 2020-09-15 |
Family
ID=62511323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810257581.5A Active CN108173885B (en) | 2018-03-27 | 2018-03-27 | Data encryption method, data decryption method and related devices |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108173885B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN110020535A (en) * | 2019-03-29 | 2019-07-16 | 深圳市九洲电器有限公司 | Critical data area data processing method, device and set-top box |
CN112637246A (en) * | 2021-01-14 | 2021-04-09 | 山西太钢不锈钢股份有限公司 | Method for intelligently encoding and transmitting coal type information of coking coal sampling control system |
CN112668278A (en) * | 2020-12-23 | 2021-04-16 | 上海磐启微电子有限公司 | Environment verification system and method |
CN114390317A (en) * | 2022-01-18 | 2022-04-22 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
CN112668278B (en) * | 2020-12-23 | 2024-05-31 | 上海磐启微电子有限公司 | Environment verification system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
US20120328097A1 (en) * | 2011-06-21 | 2012-12-27 | Farhana Sheikh | Apparatus and method for skein hashing |
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
WO2014089843A1 (en) * | 2012-12-14 | 2014-06-19 | 华为技术有限公司 | Method and device for data encryption and decryption |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN107786331A (en) * | 2017-09-28 | 2018-03-09 | 平安普惠企业管理有限公司 | Data processing method, device, system and computer-readable recording medium |
CN107800675A (en) * | 2016-09-07 | 2018-03-13 | 深圳市腾讯计算机***有限公司 | A kind of data transmission method, terminal and server |
-
2018
- 2018-03-27 CN CN201810257581.5A patent/CN108173885B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120328097A1 (en) * | 2011-06-21 | 2012-12-27 | Farhana Sheikh | Apparatus and method for skein hashing |
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
WO2014089843A1 (en) * | 2012-12-14 | 2014-06-19 | 华为技术有限公司 | Method and device for data encryption and decryption |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN107800675A (en) * | 2016-09-07 | 2018-03-13 | 深圳市腾讯计算机***有限公司 | A kind of data transmission method, terminal and server |
CN107786331A (en) * | 2017-09-28 | 2018-03-09 | 平安普惠企业管理有限公司 | Data processing method, device, system and computer-readable recording medium |
Non-Patent Citations (1)
Title |
---|
张庆兰: "无证书签密方案的研究及其应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN110020535A (en) * | 2019-03-29 | 2019-07-16 | 深圳市九洲电器有限公司 | Critical data area data processing method, device and set-top box |
CN112668278A (en) * | 2020-12-23 | 2021-04-16 | 上海磐启微电子有限公司 | Environment verification system and method |
CN112668278B (en) * | 2020-12-23 | 2024-05-31 | 上海磐启微电子有限公司 | Environment verification system and method |
CN112637246A (en) * | 2021-01-14 | 2021-04-09 | 山西太钢不锈钢股份有限公司 | Method for intelligently encoding and transmitting coal type information of coking coal sampling control system |
CN114390317A (en) * | 2022-01-18 | 2022-04-22 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
CN114390317B (en) * | 2022-01-18 | 2024-03-19 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
Also Published As
Publication number | Publication date |
---|---|
CN108173885B (en) | 2020-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105450620B (en) | A kind of information processing method and device | |
CN106416124B (en) | Semidefiniteness digital signature generates | |
CN108173885A (en) | Data ciphering method, data decryption method and relevant apparatus | |
CN100566243C (en) | Use the computing equipment and the method thereof of fixed token and removable token | |
KR101546204B1 (en) | Host device, semiconductor memory device, and authentication method | |
US9553722B2 (en) | Generating a key based on a combination of keys | |
CN101405988B (en) | Method for the secure determination of data | |
CN110710155A (en) | Progressive key encryption algorithm | |
CN105468940B (en) | Method for protecting software and device | |
CN109768862B (en) | A kind of key management method, key call method and cipher machine | |
CN105007155A (en) | Two-dimension code mask encrypting and decrypting method and system | |
TW202014919A (en) | Two-dimensional code generation method, data processing method, apparatus, and server | |
EP1830240A1 (en) | Memory information protecting system, semiconductor memory, and method for protecting memory information | |
CN107368744A (en) | For updating the method and the equipment of measurement and control technology of fastener components | |
CN106599723A (en) | File encryption method and device, and file decryption method and device | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
TW201141172A (en) | Methods, circuits, devices, and systems for provisioning of cryptographic data to one or more electronic devices | |
US20060129845A1 (en) | Memory information protection system and methods | |
TW200803399A (en) | Authentication system and device to be authenticated | |
KR101832861B1 (en) | Method and Apparatus for Evaluating Passwords | |
KR20130093557A (en) | System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction | |
US20100070780A1 (en) | Quantum program concealing device and quantum program concealing method | |
US9087252B2 (en) | Grayscale incremental information object | |
CN115001700B (en) | Ecological environment supervision method and system based on blockchain | |
CN113645183B (en) | Data encryption transmission method, system, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |