CN109412791A - Key information processing method, device, electronic equipment and computer-readable medium - Google Patents

Key information processing method, device, electronic equipment and computer-readable medium Download PDF

Info

Publication number
CN109412791A
CN109412791A CN201811442419.7A CN201811442419A CN109412791A CN 109412791 A CN109412791 A CN 109412791A CN 201811442419 A CN201811442419 A CN 201811442419A CN 109412791 A CN109412791 A CN 109412791A
Authority
CN
China
Prior art keywords
tactics
key
vary
data
varies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811442419.7A
Other languages
Chinese (zh)
Other versions
CN109412791B (en
Inventor
李建熠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201811442419.7A priority Critical patent/CN109412791B/en
Publication of CN109412791A publication Critical patent/CN109412791A/en
Priority to CA3061776A priority patent/CA3061776A1/en
Application granted granted Critical
Publication of CN109412791B publication Critical patent/CN109412791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

This disclosure relates to a kind of key information processing method, device, electronic equipment and computer-readable medium.It is related to computer information processing field, this method comprises: determining that at least one varies one's tactics;The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;By it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And target cipher key file is generated by the key data and the policy data.This disclosure relates to key information processing method, device, electronic equipment and computer-readable medium, can to key to be transmitted carry out varying strength safety encrypt, thus key information transmission when improve key information security intensity.

Description

Key information processing method, device, electronic equipment and computer-readable medium
Technical field
This disclosure relates to computer information processing field, in particular to a kind of key information processing method, device, Electronic equipment and computer-readable medium.
Background technique
Key is a kind of parameter, it is the ginseng inputted in being converted to ciphertext or the algorithm for converting ciphertext into plaintext in plain text Number.Key encryption is the both sides for sending and receiving data, carries out encrypting and decrypting fortune in plain text using identical or symmetrical key pair The encryption method of calculation.Under normal circumstances, Encryption Algorithm is disclosed, can guarantee that the key of a plaintext is that key, key must It must be secrecy, it is usually a character string, and can frequently be replaced on demand.Therefore, the length of key is critically important, because Password has been decoded once finding decruption key also, and the length of key is longer, key space is bigger, traverses key space institute A possibility that time of cost is longer, decoding is also just smaller.
In the prior art, key is hidden or Preservation tactics are then transmitted again by carrying out data transformation to key Mode realizes key secret.But method key in the prior art hides or Preservation tactics its security intensities is fixed , the security intensity that can not be hidden according to different environment alternate key, so as to cause over time, computing capability It is promoted, hiding for key may be no longer safe.
Therefore, it is necessary to a kind of new key information processing method, device, electronic equipment and computer-readable mediums.
Above- mentioned information are only used for reinforcing the understanding to the background of the disclosure, therefore it disclosed in the background technology part It may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
In view of this, the disclosure provides a kind of key information processing method, device, electronic equipment and computer-readable Jie Matter, the safety that varying strength can be carried out to key to be transmitted encrypt, to improve the letter of key in key information transmission Cease security intensity.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the one side of the disclosure, a kind of key information processing method is proposed, comprising: determine at least one transformation plan Slightly;The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;It will be described At least one, which varies one's tactics, carries out abstract processing, generation strategy data;And pass through the key data and the strategy number According to generation target cipher key file.
In a kind of exemplary embodiment of the disclosure, further includes: varied one's tactics group by multiple generations that vary one's tactics.
In a kind of exemplary embodiment of the disclosure, determining that at least one varies one's tactics includes: to generate M transformation plan Slightly;And from the M vary one's tactics in randomly select N number of vary one's tactics;It will be described original close by N number of vary one's tactics Key carries out n times transformation, generates key data;Wherein, M >=N > 1, M, N are positive integer.
In a kind of exemplary embodiment of the disclosure, by it is described at least one vary one's tactics and carry out abstract processing, it is raw At policy data include: by it is described at least one vary one's tactics and carry out hash conversion one by one, generate at least one Hash value;It will At least one described Hash value carries out abstract processing and maps in bit array;And by described in bit array generation Policy data.
In a kind of exemplary embodiment of the disclosure, at least one described Hash value is subjected to abstract processing and is reflected Being incident upon in bit array includes: the digit that predetermined number is extracted in each of at least one Hash value Hash value Value;Digit value set is generated by the bit value of at least one Hash value;And by the bit value in the digit value set It successively maps in the bit array.
According to the one side of the disclosure, a kind of key information processing method is proposed, comprising: extracted by target cipher key file close Key data and policy data;At least one is obtained by the policy data to vary one's tactics;And pass through at least one described change It changes strategy and inverse transformation is carried out to obtain key information to the key data.
In a kind of exemplary embodiment of the disclosure, at least one packet that varies one's tactics is obtained by the policy data It includes: at least one being obtained with the policy data by the group that varies one's tactics and is varied one's tactics.
In a kind of exemplary embodiment of the disclosure, obtained at least by the group that varies one's tactics with the policy data It includes: to generate multiple bit arrays by the multiple vary one's tactics in the group that varies one's tactics that one, which varies one's tactics,;Extract institute State the bit array in policy data;And by multiple bit arrays in the group that varies one's tactics successively with the bit array in policy data into Row is compared to determine that at least one varies one's tactics.
In a kind of exemplary embodiment of the disclosure, by multiple bit arrays in the group that varies one's tactics successively with policy data In bit array be compared with determine at least one vary one's tactics include: will be each in multiple bit arrays in the group that varies one's tactics The digit of units group is successively compared with the digit of the bit array in policy data;And when comparison result is consistent, really Surely it varies one's tactics.
In a kind of exemplary embodiment of the disclosure, by it is described at least one vary one's tactics to the key data into Row inverse transformation includes: that at least one described sequence to vary one's tactics is carried out random alignment to obtain key information, is generated multiple Vary one's tactics permutation and combination;And it is close to obtain to key data progress inverse transformation by multiple permutation and combination that vary one's tactics Key information.
According to the one side of the disclosure, a kind of key information processing unit is proposed, which includes: policy module, is used for Determine that at least one varies one's tactics;Conversion module, for by key information by it is described at least one vary one's tactics and carry out key Transformation generates key data;Abstract module, for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy Data;And cipher key module, for generating target cipher key file by the key data and the policy data.
In a kind of exemplary embodiment of the disclosure, further includes: extraction module, it is close for being extracted by target cipher key file Key data and policy data;Conversion module varies one's tactics for obtaining at least one by the policy data;And inverse transformation Module, for by it is described at least one vary one's tactics inverse transformation carried out to obtain key information to the key data.
According to the one side of the disclosure, a kind of electronic equipment is proposed, which includes: one or more processors; Storage device, for storing one or more programs;When one or more programs are executed by one or more processors, so that one A or multiple processors realize such as methodology above.
According to the one side of the disclosure, it proposes a kind of computer-readable medium, is stored thereon with computer program, the program Method as mentioned in the above is realized when being executed by processor.
It, can be to be passed according to the key information processing method of the disclosure, device, electronic equipment and computer-readable medium Defeated key carries out the safety encryption of varying strength, to improve the information security intensity of key in key information transmission.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the disclosure will It becomes more fully apparent.Drawings discussed below is only some embodiments of the present disclosure, for the ordinary skill of this field For personnel, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the system block diagram of a kind of key information processing method and device shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of key information processing method shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.
Fig. 5 is a kind of schematic diagram of key information processing method shown according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Fig. 9 is that a kind of computer readable storage medium schematic diagram is shown according to an exemplary embodiment.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However, It will be appreciated by persons skilled in the art that can with technical solution of the disclosure without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy all aspects of this disclosure.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
It should be understood that although herein various assemblies may be described using term first, second, third, etc., these groups Part should not be limited by these terms.These terms are to distinguish a component and another component.Therefore, first group be discussed herein below Part can be described as the second component without departing from the teaching of disclosure concept.As used herein, term " and/or " include associated All combinations for listing any of project and one or more.
It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, module or process in attached drawing Necessary to not necessarily implementing the disclosure, therefore it cannot be used for the protection scope of the limitation disclosure.
The inventors of the present application found that the existing scheme hidden for key is all to carry out a kind of specific change to key It changes, and key to transformation and strategy directly store.This key in the prior art hides or Preservation tactics its safety Intensity be it is fixed, can not according to different environment alternate keys hide security intensity, so as to cause over time, The promotion of computing capability, hiding for key may be no longer safe.
Following disadvantage exists in the prior art:
1, existing scheme only carries out primary specific transformation to key, and there is no realize to carry out the changes taken turns to key more It changes, to adapt to different security levels.
2, the strategy of transformation is directly stored or is sent by existing scheme, is not hidden to relevant strategy, To ensure the safety to vary one's tactics.
In view of this, present inventor proposes the key information processing method in the application, by original close Key is converted, and user is by the wheel number of control transformation and the strategy of every wheel, and the intensity for enabling to key hiding is with transformation The increase of wheel number is consequently increased.Varying one's tactics for every wheel is hidden into one by the key information processing method in the application simultaneously Comprising in a large amount of false strategy files to vary one's tactics, the increase of strategy file entry will also increase vary one's tactics it is hiding strong Degree, and then increase the hiding intensity of key.And according to key information processing method, additionally it is possible to provide the use that varies one's tactics accordingly In restoring really to vary one's tactics from multiple strategy files, for restoring original key.
According to the key information processing method of the application, the safety that can carry out varying strength to key to be transmitted adds It is close, to improve the information security intensity of key in key information transmission.
The detailed content of the application will be illustrated below:
Fig. 1 is the system block diagram of a kind of key information processing method and device shown according to an exemplary embodiment.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and terminal device 105,106,107.Network 104 is to provide communication between terminal device 101,102,103 and terminal device 105,106,107 The medium of link.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with terminal device 105,106,107, To receive or send message etc..It can be equipped on terminal device 101,102,103 and terminal device 105,106,107 various logical Interrogate client application, such as shopping class application, web browser applications, searching class application, instant messaging tools, mailbox client End, social platform software etc..
Terminal device 101,102,103 and terminal device 105,106,107 can be with display screen and supported web page The various electronic equipments of browsing, including but not limited to smart phone, tablet computer, pocket computer on knee and desktop computer Etc..
Terminal device 101,102,103 can for example be encrypted target message to be sent by key, and end is then sent to End equipment 105,106,107, terminal device 105,106,107 can be for example decrypted by the message that key pair receives, with Extract target message.
Terminal device 101,102,103 can for example determine that at least one varies one's tactics;Terminal device 101,102,103 can example At least one, which varies one's tactics, as described in passing through the primary key that will acquire carries out key conversion, generates key data;Terminal is set Standby 101,102,103 can for example by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;Terminal device 101,102,103 target cipher key file for example can be generated by the key data and the policy data.
Terminal device 101,102,103 can be close with target by target message for example by target message after key encrypts Key file is sent to terminal device 105,106,107, so that reduction target message is decrypted in terminal device 105,106,107.
Terminal device 105,106,107 for example can extract key data and policy data by target cipher key file;Terminal is set Standby 105,106,107, which for example can obtain at least one by the policy data, varies one's tactics;Terminal device 105,106,107 can Such as by it is described at least one vary one's tactics to the key data carry out inverse transformation to obtain key information.
Terminal device 105,106,107 can also be received for example to be added by the process that terminal device 101,102,103 sends over Close target message, terminal device 105,106,107 can also for example solve the target information received by key information It is close, to restore target message.
It should be noted that key information processing method provided by the embodiment of the present disclosure can by terminal device 101, 102, it 103 is executed with terminal device 105,106,107, correspondingly, key information processing unit can be set in terminal device 101,102,103 with terminal device 105,106,107 in.
Fig. 2 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.At key information Reason method 20 includes at least step S202 to S208.
As shown in Fig. 2, determining that at least one varies one's tactics in S202.It can be for example in terminal device A by mesh to be sent It marks message to encrypt by key information, then determines that at least one varies one's tactics for encrypting to key information itself.
In one embodiment, can be varied one's tactics group by multiple generations that vary one's tactics, and in the group that varies one's tactics, extracted and become Change strategy.By using a variety of different transformation rules, generates large batch of key conversion strategy and then generate multiple transformation plans Slightly.
In one embodiment, it determines that at least one varies one's tactics and comprises determining that target strategy quantity of documents M;And by M are randomly selected in the group that varies one's tactics to vary one's tactics;Wherein, M is positive integer.It specifically can be for example, in the group that will vary one's tactics Multiple number consecutivelies that vary one's tactics determine target strategy quantity of documents M in be extracted vary one's tactics, then by random Number generators, generate M random number, then successively number corresponding with varying one's tactics by M random number, determine M transformation plan Slightly.
In one embodiment, can be according to own service demand for security, determining needs the item number to be used to vary one's tactics, false If this number is N.And random screening goes out M item strategy from multiple strategy files, this M item strategy is that subsequent key ready for use becomes Strategy is changed,
In one embodiment, target strategy quantity of documents M for example can be determined by the secret grade of target message, it can example Such as, target message is defined as to different confidentials in advance: secret, top secret, secret etc., different confidentials set key Different strategy file quantity.It can be for example, top-secret target message for higher level, to the close of the target message of top-secret grade The strategy file quantity that key is encrypted may be, for example, 10.It can also be for example, secret target message for lower grade, to secret The strategy file quantity that the key of the target message of close grade is encrypted may be, for example, 2.
In one embodiment, target strategy quantity of documents M can be determined with the transmission channel of target message, can for example be existed In local area network when transmission message, determine small number of target strategy file, on the internet when transmission objectives message, determine compared with The target strategy file of multi-quantity.In the embodiment of the present application, also the different mark strategy of rule setting can be judged by other Quantity of documents M, the application are not limited.
In S204, the primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate Key data.It can be varied one's tactics by using M item, key is converted, obtain transformed key.M can for example be generated It varies one's tactics;And from the M vary one's tactics in randomly select N number of vary one's tactics;It will be described by N number of vary one's tactics Primary key carries out n times transformation, generates key data;Wherein, M >=N > 1, M, N are positive integer.
In one embodiment, the rule of key conversion can be customized according to different needs, such as fairly simple Mapping mode is exactly two values exchanged in key array, by key information by it is described at least one vary one's tactics and carry out key Transformation may be, for example, and by different transformation rules (every rule will do it the exchange being repeatedly worth), successively exchange key array In multiple numerical value, it is a plurality of vary one's tactics to be equivalent to carry out the multiple exchange of values of more wheels.
In one embodiment, it such as varies one's tactics to one: 161520100414102003052411, the hashed transformation It is as follows that Hash Hash Hash array is generated after after strategy:
0=-534694747;
1=1985910054;
2=-488763339;
3=1331411845;
4=-137102220;
5=-81949194;
6=1794769274;
7=966099589;
8=907334699;
9=816196382;
Using the absolute value in Hash array except bit array length (can for example, this transformation test bit array length are as follows: BitSetSize=7357745), obtain its remainder, code sample: Math.abs (hash%bitSetSize), acquisition it is remaining Number array are as follows:
4937107;
6676649;
3152169;
7017745;
4662810;
1013999;
6837239;
2234994;
2332064;
6844432;
In bit array, 1 is set by the corresponding position of above-mentioned digit, to realize that is varied one's tactics hides.
In S206, by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data.
In one embodiment, by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data include: By it is described at least one vary one's tactics and carry out hash conversion one by one, generate at least one Hash value;It will at least one described Kazakhstan Uncommon numerical value carries out abstract processing and maps in bit array;And the policy data is generated by the bit array.
In one embodiment, at least one described Hash value is carried out abstract processing and mapped in bit array to wrap It includes: extracting the bit value of predetermined number in each of at least one Hash value Hash value;Pass through at least one The bit value of a Hash value generates digit value set;And the bit value in the digit value set is successively mapped to described In bit array.
In S208, target cipher key file is generated by the key data and the policy data.For example, after converting Key data and policy data be merged into a file, generate target cipher key file to facilitate storage and transmission.
According to the key information processing method of the disclosure, by the key conversion strategy of different number to key to be transmitted The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission Improve the information security intensity of key.
It will be clearly understood that the present disclosure describes how to form and use particular example, but the principle of the disclosure is not limited to These exemplary any details.On the contrary, the introduction based on disclosure disclosure, these principles can be applied to many other Embodiment.
Fig. 3 is a kind of schematic diagram of the key information processing method shown according to another exemplary embodiment.Fig. 3 is exemplary The step S206 for illustrating key information processing method 20 as shown in Figure 2 in " by least one described progress that varies one's tactics The particular content of abstract processing, generation strategy data ".
Key is converted according to the M item strategy filtered out, and genuine policy is abstracted, is such as abstracted into a position In array, and the array and transformed key are merged into a file, the specific steps are as follows:
A) it is varied one's tactics using M item, key is converted, obtain transformed key.Can such as M be 2, as pass through It (may be, for example, that the A and B that varies one's tactics) that varies one's tactics converts key that 2, which vary one's tactics,.
B) it varies one's tactics to M item and carries out hash conversion one by one, then obtained cryptographic Hash is abstracted into a units group. Wherein, hash algorithm is the smaller binary value that the binary value of random length is mapped as to regular length, this small two into Value processed is known as cryptographic Hash.Cryptographic Hash is the unique and extremely compact numerical value representation of one piece of data.If hashing a Duan Mingwen And even only changing a letter of the paragraph, subsequent Hash will all generate different values.It is same for finding hash Two different inputs of value, are computationally impossible.
After the A that varies one's tactics carries out hash conversion, cryptographic Hash are as follows: E8C636D0C048637;
After the B that varies one's tactics carries out hash conversion, cryptographic Hash are as follows: 8BF61E6A3000D0F;
The cryptographic Hash for the A that varies one's tactics is converted into the only binary form comprising 01, then by the cryptographic Hash for the A that varies one's tactics It is mapped in bit array;
The cryptographic Hash for the A that varies one's tactics is converted into the only binary form comprising 01, then by the cryptographic Hash for the B that varies one's tactics It is mapped in bit array;
Wherein, it is worth mentioning at this point that, varying one's tactics A and varies one's tactics B when being mapped in the same bit array, position Number in this case, will not influence the decryption processing of subsequent file there may be being overlapped.
C) transformed key and bit array are merged into a file, to be transmitted.
It, can be raw according to the requirement of information inherently safe intensity to be transmitted according to the key information processing method of the disclosure It varies one's tactics at a plurality of different, every varies one's tactics to one wheel of key progress (or primary) transformation, to realize the more of key Round transformation, to adapt to different security intensity requirements.
It is specific by arbitrarily being picked out from a large amount of stochastic transformation strategy according to the key information processing method of the disclosure Item number varies one's tactics, and when recipient stores, will store it is all vary one's tactics, rather than only storage is true It varies one's tactics, to realize that true key varies one's tactics hiding.Change the entry to vary one's tactics in strategy file, can adapt to Different security intensity requirements.
According to the key information processing method of the disclosure, true key conversion strategy is subjected to Hash and is abstracted into one In bit array, to prevent true transformation strategy to be reduced, and it is merged into a file with transformed key, it is true to realize The reduction of key conversion strategy.
Fig. 4 is a kind of flow chart of the key information processing method shown according to another exemplary embodiment.It is shown in Fig. 4 Process is the detailed description to target message decryption step in key information processing method 20 shown in Fig. 2,
As shown in figure 4, extracting key data and policy data by target cipher key file in S402.It can be for example in terminal Equipment B receives target cipher key file and target message, and terminal device B extracts key data and strategy number by target cipher key file According to.
In S404, at least one is obtained by the policy data and is varied one's tactics.It include: by the group that varies one's tactics At least one is obtained with the policy data to vary one's tactics.
In one embodiment, at least one packet that varies one's tactics is obtained with the policy data by the group that varies one's tactics It includes: multiple bit arrays is generated by the multiple vary one's tactics in the group that varies one's tactics;It extracts in the policy data Bit array;And multiple bit arrays in the group that varies one's tactics successively are compared with the bit array in policy data to determine extremely Few one varies one's tactics.
In one embodiment, multiple bit arrays in the group that varies one's tactics successively are carried out with the bit array in policy data Comparing to determine that at least one varies one's tactics includes: by the digit of each bit array in multiple bit arrays in the group that varies one's tactics Successively it is compared with the digit of the bit array in policy data;And when comparison result is consistent, determination varies one's tactics.
In S406, by it is described at least one vary one's tactics to the key data carry out inverse transformation with obtain key letter Breath.It can be for example, at least one described sequence to vary one's tactics be carried out random alignment, the multiple permutation and combination that vary one's tactics of generation; And inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
According to the key information processing method of the disclosure, by the key conversion strategy of different number to key to be transmitted The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission Improve the information security intensity of key.In decruption key file, by passing through group and the policy data of varying one's tactics Acquisition varies one's tactics, and then the mode decrypted, and can effectively ensure that the information security of key.
Fig. 5 is a kind of schematic diagram of the key information processing method shown according to another exemplary embodiment.Fig. 5 is exemplary The step S404 for illustrating key information processing method 40 as shown in Figure 4 in " pass through the policy data obtain at least one It is a to vary one's tactics " particular content.
A) restore transformed key, bit array from transformed key & bit array file.
B) using the strategy file comprising true transformation strategy and a) in bit array, obtain true M item and vary one's tactics.
It can be for example, varying one's tactics in the group that varies one's tactics comprising 10, respectively vary one's tactics A, B, C, D, E, F, G, H, I;
Hash conversion is carried out respectively by varying one's tactics above, generates multiple cryptographic Hash A, B, C, D, E, F, G, H, I;Convert plan Slightly A, B, C, D, E, F, G, H, I corresponding cryptographic Hash A, B, C, D, E, F, G, H, I are respectively converted into the only binary system shape comprising 01 Formula, and be mapped in bit array, generate bit array set.
Each of bit array set bit array is compared with the bit array in policy data respectively, is become with determining Change strategy.During comparison, if each of corresponding bit array A of the A that varies one's tactics bit value (digit 1) with When numerical value in bit array in policy data on corresponding position is consistent, determine that the A that varies one's tactics is in original vary one's tactics One.
After determining that one varies one's tactics, continues comparison others and vary one's tactics, until all files are completeer Finish position, is varied one's tactics with determination M to be processed.
C) using the transformed key in a) and b) in M item vary one's tactics and carry out inverse transformation, restore true close Key.
According to the key information processing method of the disclosure, abstract hide and according to strategy can be carried out to true transformation strategy File access pattern true transformation strategy.
According to the key information processing method of the disclosure, a large amount of false transformation plans are hidden by will really vary one's tactics In slightly, can be realized vary one's tactics hide, to adapt to the demand for security of varying strength.
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as being executed by CPU Computer program.When the computer program is executed by CPU, above-mentioned function defined by the above method that the disclosure provides is executed Energy.The program can store in a kind of computer readable storage medium, which can be read-only memory, magnetic Disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place according to included by the method for disclosure exemplary embodiment Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 6 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.Key information processing Device 60 includes: policy module 602, conversion module 604, abstract module 606 and cipher key module 608.Wherein, key information Processing unit 60 can be located at the terminal of information to be sent.
Policy module 602 is for determining that at least one varies one's tactics;Can be varied one's tactics group by multiple generations that vary one's tactics, In the group that varies one's tactics, extraction varies one's tactics.By using a variety of different transformation rules, large batch of key conversion plan is generated Slightly and then generate multiple vary one's tactics.
Conversion module 604 be used for by key information by it is described at least one vary one's tactics and carry out key conversion, generate close Key data;It can be varied one's tactics by using N item, key is converted, obtain transformed key.
Abstract module 606 be used for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;It can example At least one varies one's tactics as will be described carries out hash conversion one by one, generates at least one Hash value;Will it is described at least one Hash value carries out abstract processing and maps in bit array;And the policy data is generated by the bit array.
Cipher key module 608 is used to generate target cipher key file by the key data and the policy data.For example, will Transformed key data and policy data are merged into a file, generate target cipher key file to facilitate storage and transmission.
According to the key information processing unit of the disclosure, by the key conversion strategy of different number to key to be transmitted The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission Improve the information security intensity of key.
Fig. 7 is a kind of block diagram of the key information processing unit shown according to another exemplary embodiment.At key information Managing device 70 includes: extraction module 702, conversion module 704 and inverse transform module 706.
Extraction module 702 is used to extract key data and policy data by target cipher key file;It can be for example in terminal device B Target cipher key file and target message are received, terminal device B extracts key data and policy data by target cipher key file.
Conversion module 704 varies one's tactics for obtaining at least one by the policy data;.It include: by the change Strategy group is changed to obtain at least one with the policy data and vary one's tactics.And
Inverse transform module 706 be used for by it is described at least one vary one's tactics inverse transformation carried out to obtain to the key data Take key information.It can be for example, at least one described sequence to vary one's tactics be carried out random alignment, the multiple rows of varying one's tactics of generation Column combination;And inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
According to the key information processing unit of the disclosure, in decruption key file, by passing through the group that varies one's tactics The mode for varying one's tactics with policy data acquisition, and then decrypting, can effectively ensure that the information security of key.
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the disclosure is described referring to Fig. 8.The electronics that Fig. 8 is shown Equipment 200 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in figure 8, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210 Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of disclosing various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, walked shown in Fig. 4 Suddenly.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205 Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited In: microcode, device driver, redundant processing unit, external disk drive array, RAI d system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 9 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method according to embodiment of the present disclosure 400, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, the program product of the disclosure is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by one When the equipment executes, so that the computer-readable medium implements function such as: determining that at least one varies one's tactics;By key information By it is described at least one vary one's tactics and carry out key conversion, generate key data;By at least one described progress that varies one's tactics Abstract processing, generation strategy data;And target cipher key file is generated by the key data and the policy data.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the disclosure The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present disclosure.
It is particularly shown and described the exemplary embodiment of the disclosure above.It should be appreciated that the present disclosure is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, disclosure intention covers included in appended claims Various modifications and equivalence setting in spirit and scope.

Claims (13)

1. a kind of key information processing method characterized by comprising
Determine that at least one varies one's tactics;
The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;
By it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And
Target cipher key file is generated by the key data and the policy data.
2. the method as described in claim 1, which is characterized in that the primary key key information that will acquire passes through described At least one, which varies one's tactics, carries out key conversion, generates key data and includes:
M are generated to vary one's tactics;And
From the M vary one's tactics in randomly select N number of vary one's tactics;It N number of is varied one's tactics the primary key by described N times transformation is carried out, key data is generated;
Wherein, M >=N > 1, M, N are positive integer.
3. the method as described in claim 1, which is characterized in that by it is described at least one vary one's tactics and carry out abstract processing, Generation strategy data include:
By it is described at least one vary one's tactics and carry out hash conversion, generate at least one Hash value;
At least one described Hash value is subjected to abstract processing and is mapped in bit array;And
The policy data is generated by the bit array.
4. method as claimed in claim 3, which is characterized in that at least one described Hash value is carried out abstract processing simultaneously It maps in bit array and includes:
The bit value of predetermined number is extracted in each of at least one Hash value Hash value;
Digit value set is generated by the bit value of at least one Hash value;And
Bit value in the digit value set is successively mapped in the bit array.
5. a kind of key information processing method, which is characterized in that further include:
Key data and policy data are extracted by target cipher key file;
At least one is obtained by the policy data to vary one's tactics;And
By it is described at least one vary one's tactics to the key data carry out inverse transformation to obtain key information.
6. method as claimed in claim 5, which is characterized in that obtain at least one packet that varies one's tactics by the policy data It includes:
At least one is obtained with the policy data by the group that varies one's tactics to vary one's tactics.
7. method as claimed in claim 6, which is characterized in that by it is described vary one's tactics group with the policy data obtain to Few one varies one's tactics and includes:
Multiple bit arrays are generated by multiple vary one's tactics in the group that varies one's tactics;
Extract the bit array in the policy data;And
Multiple bit arrays in the group that varies one's tactics successively are compared with the bit array in policy data to determine at least one It varies one's tactics.
8. method as claimed in claim 6, which is characterized in that by multiple bit arrays in the group that varies one's tactics successively with strategy number Bit array in is compared to determine that at least one varies one's tactics to include:
By the digit of each bit array in multiple bit arrays in the group that varies one's tactics successively with the bit array in policy data Digit is compared;And
When comparison result is consistent, determination varies one's tactics.
9. method as claimed in claim 5, which is characterized in that by it is described at least one vary one's tactics to the key data Inverse transformation, which is carried out, to obtain key information includes:
At least one described sequence to vary one's tactics is subjected to random alignment, generates multiple permutation and combination that vary one's tactics;And
Inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
10. a kind of key information processing unit characterized by comprising
Policy module, for determining that at least one varies one's tactics;
Conversion module, primary key for will acquire by it is described at least one vary one's tactics and carry out key conversion, generate Key data;
Abstract module, for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And
Cipher key module, for generating target cipher key file by the key data and the policy data.
11. a kind of key information processing unit, which is characterized in that further include:
Extraction module, for extracting key data and policy data by target cipher key file;
Conversion module varies one's tactics for obtaining at least one by the policy data;And
Inverse transform module, for by it is described at least one vary one's tactics inverse transformation carried out to obtain key to the key data Information.
12. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-4 or 5-9.
13. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1-4 or 5-9 is realized when row.
CN201811442419.7A 2018-11-29 2018-11-29 Key information processing method, device, electronic equipment and computer-readable medium Active CN109412791B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811442419.7A CN109412791B (en) 2018-11-29 2018-11-29 Key information processing method, device, electronic equipment and computer-readable medium
CA3061776A CA3061776A1 (en) 2018-11-29 2019-11-15 Key information processing method and apparatus, electronic device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811442419.7A CN109412791B (en) 2018-11-29 2018-11-29 Key information processing method, device, electronic equipment and computer-readable medium

Publications (2)

Publication Number Publication Date
CN109412791A true CN109412791A (en) 2019-03-01
CN109412791B CN109412791B (en) 2019-11-22

Family

ID=65456322

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811442419.7A Active CN109412791B (en) 2018-11-29 2018-11-29 Key information processing method, device, electronic equipment and computer-readable medium

Country Status (2)

Country Link
CN (1) CN109412791B (en)
CA (1) CA3061776A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583588A (en) * 2020-12-08 2021-03-30 四川虹微技术有限公司 Communication method and device and readable storage medium
CN114024671A (en) * 2021-11-05 2022-02-08 深圳市联洲国际技术有限公司 Key generation method and device and computer-readable storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208701B (en) * 2022-09-15 2022-12-20 广州万协通信息技术有限公司 Data packet selective encryption method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182448A1 (en) * 2002-03-21 2003-09-25 Mark Gooch Method and system for performing a hash transformation to generate a hash pointer for an address input by using rotation
CN1697371A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sending and receiving data of cipher key
CN101364868A (en) * 2008-09-12 2009-02-11 华南理工大学 Pseudo-noise code generator based on broad sense information field and generating method thereof
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system
CN101902332A (en) * 2010-07-16 2010-12-01 北京邮电大学 Hashing method with secrete key based on coupled chaotic mapping system
CN102868518A (en) * 2004-08-12 2013-01-09 Cmla有限公司 Permutation data transform to enhance security
CN104601321A (en) * 2013-10-31 2015-05-06 上海复旦微电子集团股份有限公司 Key expansion method and device
CN105591734A (en) * 2015-04-24 2016-05-18 桂林电子科技大学 White-box cryptograph non-linear encoding protection method based on table lookup
CN106452729A (en) * 2016-08-30 2017-02-22 上海交通大学 Method for encrypting white box password based on random permutation
CN107947917A (en) * 2017-12-29 2018-04-20 北京梆梆安全科技有限公司 A kind of method and device for generating whitepack key

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030182448A1 (en) * 2002-03-21 2003-09-25 Mark Gooch Method and system for performing a hash transformation to generate a hash pointer for an address input by using rotation
CN1697371A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sending and receiving data of cipher key
CN102868518A (en) * 2004-08-12 2013-01-09 Cmla有限公司 Permutation data transform to enhance security
CN101364868A (en) * 2008-09-12 2009-02-11 华南理工大学 Pseudo-noise code generator based on broad sense information field and generating method thereof
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system
CN101902332A (en) * 2010-07-16 2010-12-01 北京邮电大学 Hashing method with secrete key based on coupled chaotic mapping system
CN104601321A (en) * 2013-10-31 2015-05-06 上海复旦微电子集团股份有限公司 Key expansion method and device
CN105591734A (en) * 2015-04-24 2016-05-18 桂林电子科技大学 White-box cryptograph non-linear encoding protection method based on table lookup
CN106452729A (en) * 2016-08-30 2017-02-22 上海交通大学 Method for encrypting white box password based on random permutation
CN107947917A (en) * 2017-12-29 2018-04-20 北京梆梆安全科技有限公司 A kind of method and device for generating whitepack key

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583588A (en) * 2020-12-08 2021-03-30 四川虹微技术有限公司 Communication method and device and readable storage medium
CN114024671A (en) * 2021-11-05 2022-02-08 深圳市联洲国际技术有限公司 Key generation method and device and computer-readable storage medium
CN114024671B (en) * 2021-11-05 2024-03-29 深圳市联洲国际技术有限公司 Method and device for generating secret key, and computer readable storage medium

Also Published As

Publication number Publication date
CA3061776A1 (en) 2020-05-29
CN109412791B (en) 2019-11-22

Similar Documents

Publication Publication Date Title
CN109478279A (en) Method and system for realizing block chain
KR101393806B1 (en) Multistage physical unclonable function system
CN109412791B (en) Key information processing method, device, electronic equipment and computer-readable medium
Hu et al. Batch image encryption using generated deep features based on stacked autoencoder network
CN105007256B (en) Security module for executing security function on non-trusted platform
CN104022866A (en) Searchable encryption method for multi-user cipher text keyword in cloud storage
WO2014132552A1 (en) Order-preserving encryption system, device, method, and program
Wang et al. New chaotic encryption algorithm based on chaotic sequence and plain text
CN108833117B (en) Private key storage and reading method and device and hardware equipment
KR102011043B1 (en) Method for digital signature based on quantum key distribution and system performing the same
CN110084599A (en) Cipher key processing method, device, equipment and storage medium
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
Ahmad et al. A secure network communication protocol based on text to barcode encryption algorithm
CN110635900B (en) Key management method and system suitable for Internet of things system
Agarwal et al. Prime weighted graph in cryptographic system for secure communication
CN111475690B (en) Character string matching method and device, data detection method and server
CN109560914A (en) Data ciphering method and device, storage medium, electronic equipment
CN105678185B (en) A kind of data security protection method and intelligent terminal management system
CN110990848A (en) Sensitive word encryption method and device based on hive data warehouse and storage medium
US10445510B2 (en) Data checking apparatus and method using same
CN109412754A (en) A kind of data storage, distribution and access method encoding cloud
Rachmawanto et al. Testing Data Security Using a Vigenere Cipher Based on the QR Code
Touil et al. Efficient Braille Transformation for Secure Password Hashing
Adeniji et al. Text encryption with advanced encryption standard (AES) for near field communication (NFC) using Huffman compression
Pokharana et al. Encryption, file splitting and file compression techniques for data security in virtualized environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant