CN113821820B - Method, device, medium and equipment for encrypting and decrypting resources in splitting mode - Google Patents

Method, device, medium and equipment for encrypting and decrypting resources in splitting mode Download PDF

Info

Publication number
CN113821820B
CN113821820B CN202111387181.4A CN202111387181A CN113821820B CN 113821820 B CN113821820 B CN 113821820B CN 202111387181 A CN202111387181 A CN 202111387181A CN 113821820 B CN113821820 B CN 113821820B
Authority
CN
China
Prior art keywords
resource
content
content blocks
pseudo
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111387181.4A
Other languages
Chinese (zh)
Other versions
CN113821820A (en
Inventor
吴俊华
李鉴
黄正雨
何志强
谢帅
井刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youhao Technology Co ltd
Original Assignee
Beijing Younuo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Younuo Technology Co ltd filed Critical Beijing Younuo Technology Co ltd
Priority to CN202111387181.4A priority Critical patent/CN113821820B/en
Publication of CN113821820A publication Critical patent/CN113821820A/en
Application granted granted Critical
Publication of CN113821820B publication Critical patent/CN113821820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method for encrypting and decrypting resources in a segmentation mode, which comprises the following steps: encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm; generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file; generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process; the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks; and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process. The invention unifies the resource encryption mode, enhances the difficulty of resource cracking and can transmit and process the user-defined content. The invention also relates to a device, a storage medium and equipment for encrypting and decrypting the resources in a segmentation mode.

Description

Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device, a storage medium and equipment for encrypting and decrypting resources in a segmentation mode.
Background
At present, the process of encrypting and decrypting resources is generally carried out on the contents of the resources in a certain key mode for confusion processing, the security guarantee is mainly on the used algorithm and key information, and if the two points are cracked, the security of the resources cannot be guaranteed.
For this reason, there is a strong need in the art for a method that can improve resource security.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, an apparatus, a storage medium, and a device for encrypting and decrypting resources in a split manner, aiming at the defects of the prior art.
The technical scheme for solving the technical problems is as follows:
a method for encrypting and decrypting resources in a slicing mode comprises the following steps:
encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process.
Preferably, the encrypting the resource file acquired in the form of the directory structure information list by using an encryption algorithm includes:
acquiring a resource file needing to be encrypted;
setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
Preferably, the generating the content block and the pseudo content block by the content splitting processing method according to the encrypted resource file size includes:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
and acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate the pseudo content blocks in the quantity range.
Preferably, the generating the content block and the pseudo content block by the content splitting processing method according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content block after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
Preferably, the offset data is 4-byte offset data, and the identification value is a 4-byte identification value.
Preferably, the generating a resource correspondence list of the resource file, the content block, and the pseudo content block, and updating a directory structure information list corresponding to the resource correspondence list for resource reading, and the completing the resource encryption processing process includes:
providing an original address of a resource file and content block list data;
updating a directory structure information list according to the original address to generate a resource corresponding list;
encrypting the resource corresponding list;
and completing the resource encryption processing.
Preferably, the acquiring, by the resource request end, all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks includes:
a resource request terminal requests to acquire a resource loading path;
the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
Preferably, the resource decryption is performed after all the content blocks are loaded, and the process of completing the resource decryption includes:
after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
searching identification data from the beginning offset data of each content block, wherein the content blocks with the identification data smaller than zero are pseudo content blocks, and the content blocks with the identification data larger than or equal to zero are real content blocks;
removing the offset data at the beginning and the final identification data and then acquiring the resource content in the real content block;
data sorting processing is carried out according to the identification data of the real content block, and encrypted data information is restored;
and completing the resource decryption processing process.
The method for encrypting and decrypting the resources in the splitting mode unifies the resource encryption mode, enhances the difficulty of resource cracking, and can transmit and process the user-defined content.
The invention also solves another technical scheme of the technical problems as follows:
an apparatus for encrypting and decrypting resources in a slicing manner, the apparatus comprising:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
and the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process.
Furthermore, the present invention provides a computer-readable storage medium, which stores one or more programs that can be executed by one or more processors to implement the steps in the method for encrypting and decrypting resources in a slicing manner according to any one of the above technical solutions.
The invention also provides a device for encrypting and decrypting resources in a segmentation mode, which comprises: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; when the processor executes the computer readable program, the steps in the method for encrypting and decrypting the resources in the splitting mode according to any one of the above technical solutions are realized.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention or in the description of the prior art will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for encrypting and decrypting a resource in a split manner according to an embodiment of the present invention;
fig. 2 is a schematic block diagram of an apparatus for encrypting and decrypting resources in a split manner according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, shall fall within the scope of protection of the present invention.
As shown in fig. 1, a method for encrypting and decrypting resources in a split manner includes the following steps:
110. encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
120. generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
130. generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
140. the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
150. and after all the content blocks are loaded, carrying out resource decryption to finish the resource decryption processing process.
The resource files can be various data resources, such as pictures, models, scripts and the like, so that the use of non-standard encryption schemes for various resource files can be avoided, and the code function maintenance cost is reduced.
The resource file is acquired in the form of a directory structure information list, so that when the resource is read, the corresponding relation between the content and the file needs to be found from the directory structure information list, and the correct data decryption reading can be carried out.
The invention can generate various pseudo content blocks to increase the cracking difficulty, and can also verify the authority of the user, thereby preventing the user without authority from using corresponding resources which are not authorized yet.
The method for encrypting and decrypting the resources in the splitting mode unifies the resource encryption mode, enhances the difficulty of resource cracking, and can transmit and process the user-defined content.
The method for encrypting and decrypting the resources in a segmentation mode removes the process of encrypting the file by the resource production end, the resource file is uniformly encrypted only when being issued, and the content blocking function can also transmit customized business behaviors, so that the resources can obtain further safety guarantee.
According to the invention, through carrying out resource segmentation encryption and resource dynamic combination, content blocks and pseudo content blocks are generated simultaneously, and the pseudo content blocks are pseudo content blocks formed by user-defined data contents, so that the encrypted resource file has good safety guarantee.
Based on the foregoing embodiment, further, step 110 specifically includes:
111. acquiring a resource file needing to be encrypted;
112. setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
It should be noted that the encryption algorithm here is a general encryption algorithm in the industry, that is, the acquired resource file is encrypted for the first time according to the general encryption algorithm, then is subjected to segmentation processing, and is encrypted for the second time by taking the start timestamp as a random seed.
Based on the foregoing embodiment, further, step 120 specifically includes:
121. setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
122. storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
123. and acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate the pseudo content blocks in the quantity range.
The content blocks in step 122 may be encrypted twice by using the start time stamp, and the content blocks generated by encryption satisfy the number range set in step 121.
In step 123, the user-defined pseudo content data includes user right verification, user-defined content, pseudo content data and other pseudo content data different from the real data content.
The invention can improve the security of resources, unify the resource encryption scheme and embed self-defined service data.
Based on the above embodiment, further, step 120 specifically includes:
124. for the split pseudo content blocks, randomly writing 4-byte offset data at the beginning, and randomly writing a 4-byte identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
125. for the content block after the splitting processing, randomly writing 4-byte offset data at the beginning, and randomly writing a 4-byte identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block. And excluding the offset data of the first 4 bytes and the identification value of the 4 bytes, and taking other contents as the data contents of the resource file.
Based on the foregoing embodiment, further, step 130 specifically includes:
131. providing an original address of a resource file and content block list data;
132. updating a directory structure information list according to the original address to generate a resource corresponding list;
133. encrypting the resource corresponding list, which is essentially to simply encrypt the directory structure information list so as to enhance the security;
134. and completing the resource encryption processing.
Based on the above embodiment, further, step 140 specifically includes:
141. a resource request terminal requests to acquire a resource loading path;
142. the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
143. and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
Based on the above embodiment, further, step 150 specifically includes:
151. after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
152. searching past data from the first 4 bytes of offset data of each content block, finding byte identification data of the data block, if the identification data is less than zero, considering the data block as a pseudo data block, and if the identification data is more than or equal to zero, expressing the data block as the identification data of a real data block;
153. removing offset data at the beginning of the real data block and the final identification data and then acquiring resource content in the real content block;
154. data sorting processing is carried out according to the identification data of the real data block, and encrypted data information is restored;
155. and completing the resource decryption processing process.
The invention also solves another technical scheme of the technical problems as follows:
as shown in fig. 2, an apparatus for encrypting and decrypting a resource in a split manner includes:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
and the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process.
In the invention, the resource file is encrypted, and the content is segmented, and the rule of content combination is hidden, so that the cracking difficulty can be increased again on the integrity of the content, and the safety of the resource is improved. And the content fragments generated by splitting the content fragment can be processed, and dummy data can be inserted to improve the difficulty of acquiring real content blocks.
Furthermore, the present invention provides a computer-readable storage medium, which stores one or more programs that can be executed by one or more processors to implement the steps in the method for encrypting and decrypting resources in a slicing manner according to any one of the above technical solutions.
The invention also provides a device for encrypting and decrypting resources in a segmentation mode, which comprises: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; when the processor executes the computer readable program, the steps in the method for encrypting and decrypting the resources in the splitting mode according to any one of the above technical solutions are realized.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium.
Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A method for encrypting and decrypting resources in a splitting mode is characterized by comprising the following steps:
encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm;
generating content blocks and pseudo content blocks in a content splitting processing mode according to the size of the encrypted resource file;
generating a resource corresponding list of the resource file, the content block and the pseudo content block, updating a directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing a resource encryption processing process;
the resource request terminal acquires all encrypted content blocks according to the loading paths of the content blocks and the pseudo content blocks;
after all the content blocks are loaded, carrying out resource decryption to complete a resource decryption processing process;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the size of the encrypted resource file comprises the following steps:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate pseudo content blocks within the quantity range;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content blocks after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
2. The method for encrypting and decrypting the resources in the slicing manner according to claim 1, wherein the encrypting the resource file acquired in the directory structure information list form by an encryption algorithm comprises:
acquiring a resource file needing to be encrypted;
setting an encryption algorithm and a corresponding key, and encrypting the resource file according to the encryption algorithm.
3. The method according to claim 1, wherein the generating resource correspondence lists of resource files, content blocks, and pseudo content blocks, and updating directory structure information lists corresponding to the resource correspondence lists for resource reading, and the completing the resource encryption process includes:
providing an original address of a resource file and content block list data;
updating a directory structure information list according to the original address to generate a resource corresponding list;
encrypting the resource corresponding list;
and completing the resource encryption processing.
4. The method for encrypting and decrypting resource in a split manner according to claim 1, wherein the resource request side acquires all encrypted content blocks according to loading paths of the content blocks and the pseudo content blocks comprises:
a resource request terminal requests to acquire a resource loading path;
the server transmits all content block loading paths including the content blocks and the pseudo content blocks to the resource request end;
and the resource request terminal acquires all the content blocks and the pseudo content blocks according to the loading paths of all the content blocks.
5. The method for encrypting and decrypting the resources in the split mode according to claim 4, wherein the resource decryption is performed after all the content blocks are loaded, and the process of completing the resource decryption process comprises:
after all the content blocks are loaded, all the content blocks and the pseudo content blocks are obtained;
searching identification data from the beginning offset data of each content block, wherein the content blocks with the identification data smaller than zero are pseudo content blocks, and the content blocks with the identification data larger than or equal to zero are real content blocks;
removing the offset data at the beginning and the final identification data and then acquiring the resource content in the real content block;
data sorting processing is carried out according to the identification data of the real content block, and encrypted data information is restored;
and completing the resource decryption processing process.
6. An apparatus for encrypting and decrypting resources in a split manner, the apparatus comprising:
the resource encryption module is used for encrypting the resource file acquired in the form of the directory structure information list by an encryption algorithm, generating content blocks and pseudo content blocks by a content splitting processing mode according to the size of the encrypted resource file, generating a resource corresponding list of the resource file, the content blocks and the pseudo content blocks, updating the directory structure information list corresponding to the resource corresponding list for resource reading and use, and completing the resource encryption processing process;
the resource decryption module is used for acquiring all encrypted content blocks through the resource request end according to the loading paths of the content blocks and the pseudo content blocks, and performing resource decryption after all the content blocks are loaded to finish the resource decryption processing process;
the resource encryption module is specifically configured to:
setting the number range of the content blocks and the pseudo content blocks according to the size of the encrypted resource file;
storing the encrypted initial timestamp, and taking the initial timestamp as a random seed to split the resource file to generate content blocks within the quantity range;
acquiring user-defined pseudo content data, and encrypting the pseudo content data by using the initial timestamp to generate pseudo content blocks within the quantity range;
the generating of the content block and the pseudo content block by the content splitting processing mode according to the encrypted resource file size further includes:
for the split pseudo content blocks, randomly writing offset data at the beginning, and randomly writing an identification value smaller than zero in the final offset data, wherein the intermediate data is randomly generated data;
for the content blocks after the splitting processing, randomly writing offset data at the beginning, and randomly writing an identification numerical value which is more than or equal to zero in the final offset data, wherein the intermediate data is resource content data; and setting the identification numerical value content which is greater than or equal to zero according to the blocking position of the content block.
7. A computer readable storage medium, storing one or more programs, which are executable by one or more processors to implement the steps in the method for encrypting and decrypting resources in a split manner according to any one of claims 1 to 5.
8. An apparatus for encrypting and decrypting resources in a split manner, comprising: a processor and a memory; the memory has stored thereon a computer readable program executable by the processor; the processor, when executing the computer readable program, implements the steps in the method for encrypting and decrypting the resources in a slicing manner according to any one of claims 1 to 5.
CN202111387181.4A 2021-11-22 2021-11-22 Method, device, medium and equipment for encrypting and decrypting resources in splitting mode Active CN113821820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111387181.4A CN113821820B (en) 2021-11-22 2021-11-22 Method, device, medium and equipment for encrypting and decrypting resources in splitting mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111387181.4A CN113821820B (en) 2021-11-22 2021-11-22 Method, device, medium and equipment for encrypting and decrypting resources in splitting mode

Publications (2)

Publication Number Publication Date
CN113821820A CN113821820A (en) 2021-12-21
CN113821820B true CN113821820B (en) 2022-02-22

Family

ID=78919610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111387181.4A Active CN113821820B (en) 2021-11-22 2021-11-22 Method, device, medium and equipment for encrypting and decrypting resources in splitting mode

Country Status (1)

Country Link
CN (1) CN113821820B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484407B (en) * 2023-04-23 2024-03-22 深圳市天下房仓科技有限公司 Data security protection method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN112214784A (en) * 2020-11-30 2021-01-12 北京蜜莱坞网络科技有限公司 Resource processing method, device, electronic equipment and medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101379861B1 (en) * 2006-10-20 2014-04-17 삼성전자주식회사 Apparatus, system and method for providing DRM
US9356782B2 (en) * 2013-03-15 2016-05-31 Unsene, Inc. Block encryption
CN104780048B (en) * 2015-04-13 2018-04-10 中国电子科技集团公司第二十八研究所 The image file encryption system and method for a kind of lightweight
CN110968554A (en) * 2018-09-30 2020-04-07 苏州中宇云网数字科技有限公司 Block chain storage method, storage system and storage medium based on file chain blocks
CN111259432B (en) * 2020-02-18 2023-09-12 瑞芯微电子股份有限公司 Model data protection method and readable computer storage medium
CN112764677B (en) * 2021-01-14 2022-12-23 杭州电子科技大学 Method for enhancing data migration security in cloud storage

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204986A (en) * 2017-06-27 2017-09-26 四川捷云信通信息技术有限公司 High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN112214784A (en) * 2020-11-30 2021-01-12 北京蜜莱坞网络科技有限公司 Resource processing method, device, electronic equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于HTML5、AJAX的文件分割上传与加密存储研究;叶文全;《三明学院学报》;20180820(第04期);第7-8页 *

Also Published As

Publication number Publication date
CN113821820A (en) 2021-12-21

Similar Documents

Publication Publication Date Title
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN112464212B (en) Data authority control reconstruction method based on mature complex service system
CN110995446B (en) Evidence verification method, device, server and storage medium
CN104050217A (en) MEDIA CONTENT SUBSTITUTION method and system
CN111143869A (en) Application package processing method and device, electronic equipment and storage medium
CN109447809B (en) Video active identification method combined with block chain
CN111404692B (en) Block chain identity information confirmation system and confirmation method based on big data
CN115238286A (en) Data protection method and device, computer equipment and storage medium
US20180365389A1 (en) A method and system for securing a client's access to a drm agent's services for a video player
CN113553629A (en) Hardware authorization method and system
CN115952552B (en) Remote data destruction method, system and equipment
CN113821820B (en) Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
CN114745373A (en) File transmission method, device, equipment and storage medium
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
US20230037023A1 (en) Registration Device, Verification Device, Identification Device, and Individual Identification System
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN116644485A (en) Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium
CN115935388A (en) Software package safety sending method, device, equipment and storage medium
CN112561449B (en) Method and system for synchronizing inventory information
CN114124469B (en) Data processing method, device and equipment
CN114329567A (en) Bid file generation method, verification method, electronic device and medium
CN112926047A (en) Authorization control method and device for localized deployment product, electronic equipment and medium
CN112214771A (en) Information analysis method and device based on big data and computer readable storage medium
CN111523128A (en) Information protection method, system, electronic device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 105, first floor, building 82, No. 10, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Youhao Technology Co.,Ltd.

Country or region after: China

Address before: Room 105, first floor, building 82, No. 10, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee before: BEIJING YOUNUO TECHNOLOGY Co.,Ltd.

Country or region before: China