CN114282239A - Data encryption method, device, storage medium and processor - Google Patents

Data encryption method, device, storage medium and processor Download PDF

Info

Publication number
CN114282239A
CN114282239A CN202111585259.3A CN202111585259A CN114282239A CN 114282239 A CN114282239 A CN 114282239A CN 202111585259 A CN202111585259 A CN 202111585259A CN 114282239 A CN114282239 A CN 114282239A
Authority
CN
China
Prior art keywords
data
encrypted
determining
target object
motion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111585259.3A
Other languages
Chinese (zh)
Inventor
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111585259.3A priority Critical patent/CN114282239A/en
Publication of CN114282239A publication Critical patent/CN114282239A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a data encryption method, a data encryption device, a storage medium and a processor. The method comprises the following steps: acquiring data to be encrypted and multi-dimensional information of a target object; determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object; respectively converting the multi-dimensional information into motion parameters of preset physical motion; and determining a target physical value corresponding to the motion parameter, and encrypting the data to be encrypted at least based on the target physical value. The method and the device solve the technical problem that in the prior art, the user information is encrypted, the secret key leaks out, and the safety degree of the user information is not high.

Description

Data encryption method, device, storage medium and processor
Technical Field
The present application relates to the field of data encryption, and in particular, to a data encryption method, apparatus, storage medium, and processor.
Background
With the rapid development of information technology, the internet is no longer a strange word, more and more people join the ranks of internet users, and the network changes the living space and the living mode of people in a rapid, convenient and super-space-time transfer mode. Meanwhile, how to ensure that personal information can be safely transmitted on the network also becomes a serious concern for internet practitioners.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a data encryption method, a data encryption device, a storage medium and a processor, and at least solves the technical problem that in the prior art, when user information is encrypted, a secret key leaks out, and the safety degree of the user information is not high.
According to an aspect of an embodiment of the present application, there is provided a data encryption method, including: acquiring data to be encrypted and multi-dimensional information of a target object; determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; respectively converting the multi-dimensional information into motion parameters of preset physical motion; determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and encrypting the data to be encrypted at least based on the target physical value.
Optionally, the obtaining of the data to be encrypted and the determining of the digital feature used when encrypting the data to be encrypted based on the multidimensional information of the target object include: acquiring digital content and non-digital content of multi-dimensional information; determining the digital content as a first digital characteristic; the non-digital content is converted to obtain a second digital characteristic.
Optionally, the converting the multi-dimensional information into motion parameters of a preset physical motion respectively includes: determining the name of a target object in the multi-dimensional information; converting the name of the target object into a second digital characteristic, and determining the second digital characteristic as a constant parameter in the motion parameters; acquiring the age of a target object in multi-dimensional information; obtaining a first variable parameter in the motion parameters according to the age of the target object; acquiring time consumed by a target object to carry out verification operation on a verification interface before data to be encrypted is input; the elapsed time is determined as a second variable parameter of the motion parameters.
Optionally, determining a target physical value corresponding to the motion parameter includes: obtaining a first displacement of the preset physical motion in the horizontal direction according to the first variable parameter and the second variable parameter; obtaining a second displacement of the preset physical motion in the vertical direction according to the constant parameter and the second variable parameter; and obtaining a combined displacement according to the first displacement and the second displacement.
Optionally, encrypting data to be encrypted based on at least the target physical value includes: acquiring a randomly generated character string; splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key; and encrypting the data to be encrypted based on the encryption key.
Optionally, obtaining a randomly generated character string includes: arranging and combining the constant parameters, the first variable parameters and the second variable parameters to obtain a plurality of groups of arrays; a group of arrays is randomly selected from the plurality of groups of arrays, and the array is determined as a character string.
Encrypting data to be encrypted based on a key, comprising: acquiring a first data length of data to be encrypted, wherein the first data length is used for indicating the number of bytes occupied by the data to be encrypted; acquiring a second data length of the secret key, and performing remainder operation on the second data length based on the first data length to obtain a first remainder value, wherein the second data length is used for indicating the number of bytes occupied by the secret key; determining the insertion position of the key in the data to be encrypted according to the first residual value; and inserting the key into the insertion position to encrypt the data to be encrypted.
Determining the insertion position of the key in the data to be encrypted according to the first residual value, comprising: determining the first residual value as the insertion position of the key in the data to be encrypted under the condition that the first residual value is smaller than the first data length; and under the condition that the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value, and determining the second residual value as the insertion position of the key in the data to be encrypted.
According to another aspect of the embodiments of the present application, there is also provided a data encryption apparatus, including: the acquisition module is used for acquiring data to be encrypted and multi-dimensional information of a target object; the first determining module is used for determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; the conversion module is used for respectively converting the multi-dimensional information into motion parameters of preset physical motion; the second determination module is used for determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and the encryption module is used for encrypting the data to be encrypted at least based on the target physical value.
According to another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium, which includes a stored program, and controls a device in which the nonvolatile storage medium is located to execute the above-mentioned data encryption method when the program is executed.
According to another aspect of the embodiments of the present application, there is further provided a processor, wherein the processor is configured to execute a program, and the program executes the data encryption method.
In the embodiment of the application, the digital characteristics used when the information to be encrypted is encrypted are determined by adopting the multidimensional information based on the information to be encrypted and the target object, then the multidimensional information is respectively converted into the motion parameters of the preset physical motion, the target physical value is determined based on the motion parameters, and finally the data to be encrypted is encrypted based on the target physical value.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of a computer terminal for implementing a data encryption method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a data encryption method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a data encryption apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present application, there is provided an embodiment of a data encryption method, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The data encryption method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation device. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing a data encryption method. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …, 102 n) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the data encryption method in the embodiment of the present application, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, so as to implement the data encryption method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
It should be noted here that in some alternative embodiments, the computer device (or mobile device) shown in fig. 1 described above may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that fig. 1 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in the computer device (or mobile device) described above.
Under the operating environment, the embodiment of the application provides a data encryption method as shown in fig. 2.
Fig. 2 is a flowchart of a data encryption method according to an embodiment of the present application, as shown in fig. 2, the method includes the following steps:
step S202, acquiring data to be encrypted and multi-dimensional information of a target object;
step S204, determining digital characteristics used when encrypting data to be encrypted based on the multidimensional information of the target object, wherein the data to be encrypted comprises: password data set by the target object;
step S206, converting the multi-dimensional information into motion parameters of preset physical motion respectively;
step S208, determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction;
step S210, encrypting the data to be encrypted at least based on the target physical value.
The method comprises the steps of determining digital characteristics used when information to be encrypted is encrypted through acquired information to be encrypted and multidimensional information of a target object, converting the multidimensional information into motion parameters of preset physical motion respectively, determining a target physical value based on the motion parameters, and finally encrypting the data to be encrypted based on the target physical value, so that the purpose of preventing encrypted data from being leaked is achieved, the technical effect of performing deeper encryption on user information by using a parabolic secret key is achieved, and the technical problem that the user information is not high in safety degree due to the fact that the secret key leaks when the user information is encrypted in the prior art is solved.
Alternatively, in step S202, the data to be encrypted and the multidimensional information of the target object may be acquired in the following manner. In some embodiments of the present application, the data to be encrypted and the multidimensional information of the target object are actively selected by the target object or determined by the encryption system. For example: under the condition that an encryption system monitors that a target object is suspected to exist and personal information is input, acquiring data to be encrypted and multi-dimensional information of the target object, wherein the data to be encrypted at least comprises the following components: account data, password data and personal asset data in the account, and the multi-dimensional information of the target object at least comprises the following steps: the information of the internet protocol address of the remote device of the target object, the type information of the remote device, the name and the age of the target object, and the like.
Optionally, in step S204, the following manner may be adopted to determine the digital characteristics used in encrypting the data to be encrypted based on the multidimensional information of the target object, where the data to be encrypted includes: cryptographic data set by the target object. Specifically, digital content and non-digital content of multi-dimensional information are obtained; determining the digital content as a first digital characteristic; the non-digital content is converted to obtain a second digital characteristic.
In some optional embodiments of the present application, the digital content and the non-digital content in the multi-dimensional information of the target object are determined, for example, if it is determined that the internet protocol address information of the remote device of the target object is digital content, it is determined that the type information of the remote device and the name of the target object are non-digital content; and determining the Internet protocol address information as a first digital characteristic, and converting the type information of the remote equipment and the name of the target object into a second digital characteristic.
Alternatively, in step S206, the multidimensional information may be respectively converted into motion parameters of the preset physical motion through the following specific steps. Specifically, determining the name of a target object in the multi-dimensional information; converting the name of the target object into a second digital characteristic, and determining the second digital characteristic as a constant parameter in the motion parameters; acquiring the age of a target object in multi-dimensional information; obtaining a first variable parameter in the motion parameters according to the age of the target object; acquiring time consumed by a target object to carry out verification operation on a verification interface before data to be encrypted is input; the elapsed time is determined as a second variable parameter of the motion parameters.
In some embodiments of the present application, the name of the target object may be converted into a second digital feature as the gravitational acceleration g, i.e. a constant parameter in the horizontal projectile motion; converting the age of the target object into a second digital feature as an initial velocity v in the horizontal direction of the horizontal projectile motion0I.e. the first variable parameter in the horizontal projectile motion; and converting the time consumed by the target object for verification operation on the verification interface into a second digital characteristic before the target object inputs the data to be encrypted, wherein the second digital characteristic is used as the time t of the horizontal projectile motion, namely a second variable parameter in the horizontal projectile motion.
Alternatively, in step S208, the target physical value corresponding to the motion parameter is determined in the following manner. Specifically, a first displacement of the preset physical motion in the horizontal direction is obtained according to a first variable parameter and a second variable parameter; obtaining a second displacement of the preset physical motion in the vertical direction according to the constant parameter and the second variable parameter; and obtaining a combined displacement according to the first displacement and the second displacement.
Determining a parameter v according to a first variable based on a correlation formula of the horizontal projectile motion0A first displacement of the preset physical movement in the horizontal direction, obtained with the second variable parameter t: s ═ v0X t (i.e. initial velocity v in horizontal direction)0Uniform linear motion); determining a pre-value obtained according to a constant parameter g and a second variable parameter tSetting a second displacement of the physical movement in the vertical direction: h ═ 1/2) gt2(i.e., the vertical direction is free fall movement); and combining the vector of the first displacement and the vector of the second displacement to obtain a vector of a combined displacement, and further determining the combined displacement. It is easy to understand that the first displacement s, the second displacement h, and the resultant displacement can be used as a flat throw motion key generated based on a flat throw motion.
Optionally, in step S210, the data to be encrypted is encrypted based on at least the target physical value in the following manner. Specifically, a randomly generated character string is obtained; splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key; and encrypting the data to be encrypted based on the encryption key.
Optionally, obtaining a randomly generated character string includes: arranging and combining the constant parameters, the first variable parameters and the second variable parameters to obtain a plurality of groups of arrays; a group of arrays is randomly selected from the plurality of groups of arrays, and the array is determined as a character string. For example, a constant parameter g, a first variable parameter v0The second variable parameter t is arranged and combined to obtain a plurality of groups, such as a numeral group [1]]={g,v0}, array [2]{ g, t }, array [3 }]={v0T, and randomly selecting an array as a character string.
In some embodiments of the present application, the first shift s, the second shift h, the combined shift, and the character string may be concatenated to obtain the encryption key.
Optionally, encrypting the data to be encrypted based on the key is implemented by: acquiring a first data length of data to be encrypted, wherein the first data length is used for indicating the number of bytes occupied by the data to be encrypted; acquiring a second data length of the secret key, and performing remainder operation on the second data length based on the first data length to obtain a first remainder value, wherein the second data length is used for indicating the number of bytes occupied by the secret key; determining the insertion position of the key in the data to be encrypted according to the first residual value; and inserting the key into the insertion position to encrypt the data to be encrypted. Specifically, the following method is adopted to determine the insertion position of the key in the data to be encrypted according to the first residual value: determining the first residual value as the insertion position of the key in the data to be encrypted under the condition that the first residual value is smaller than the first data length; and under the condition that the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value, and determining the second residual value as the insertion position of the key in the data to be encrypted.
In some optional embodiments of the present application, the data to be encrypted may be encrypted by: acquiring a first data length of data to be encrypted, wherein the first data length of a user password "165943 xfy 2" is 100 bits, and the number of intervals of the first data length is 11, wherein the left side of "1" is a start interval of the first data length, a first interval of the first data length is between "1" and "6", and so on, the ninth interval of the first data length is between "y" and "2", and the tenth interval of the first data length is on the right side of "2"; acquiring a second data length of the key, wherein the second data length of the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] is 12 bits; based on the first data length, carrying out remainder operation on the second data length to obtain a first remainder value 4; and based on the fact that the first remainder 4 is smaller than the interval number 11 in the first data length, determining a fourth interval position in the first data length corresponding to the first remainder 4 as an insertion position of the key in the data to be encrypted, inserting the key formed by splicing the first displacement s, the second displacement h, the resultant displacement and the array [1] into the fourth interval position in the first data length, and encrypting the data to be encrypted.
In some embodiments of the present application, if the user password is "1659", the first data length is 66 bits, and the number of intervals of the first data length is 5; under the condition that the second data length of the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] is 12 bits, carrying out remainder operation on the second data length based on the first data length to obtain a first remainder 6, wherein the first remainder 6 is larger than the interval number 5 of the first data length; when the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value 0, wherein the second residual value 0 is smaller than the interval quantity 5 of the first data length; and based on the second remainder value 0, determining the initial interval position in the first data length corresponding to the second remainder value 0 as the insertion position of the key in the data to be encrypted, inserting the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] into the initial interval position in the first data length, and encrypting the data to be encrypted.
When the first remainder is larger than the first data length, the first remainder is subjected to remainder operation based on the first data length to obtain a second remainder, and the second remainder is determined as the insertion position of the key in the data to be encrypted
Fig. 3 is a data encryption apparatus according to an embodiment of the present application, and as shown in fig. 3, the apparatus includes the following modules:
the acquiring module 40 is used for acquiring data to be encrypted and multi-dimensional information of a target object;
a first determining module 42, configured to determine, based on the multidimensional information of the target object, a digital feature used when encrypting data to be encrypted, where the data to be encrypted includes: password data set by the target object;
the conversion module 44 is configured to convert the multidimensional information into motion parameters of a preset physical motion respectively;
a second determining module 46, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate displacement of the preset physical motion in each direction;
and the encryption module 48 is used for encrypting the data to be encrypted at least based on the target physical value.
In the data encryption device, an acquisition module 40 is used for acquiring data to be encrypted and multi-dimensional information of a target object; a first determining module 42, configured to determine, based on the multidimensional information of the target object, a digital feature used when encrypting data to be encrypted, where the data to be encrypted includes: password data set by the target object; the conversion module 44 is configured to convert the multidimensional information into motion parameters of a preset physical motion respectively; a second determining module 46, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate displacement of the preset physical motion in each direction; the encryption module 48 is configured to encrypt the data to be encrypted at least based on the target physical value, so as to achieve the purpose of preventing the encrypted data from being leaked, thereby achieving the technical effect of performing deeper encryption on the user information by using the parabolic key, and further solving the technical problem that the user information is not high in security because the key leaks when the user information is encrypted in the prior art.
In the data encryption module, the first determination module comprises: the device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring digital content and non-digital content of multi-dimensional information; a first determining unit, configured to determine that the digital content is a first digital feature; and the conversion unit is used for converting the non-digital content to obtain the second digital characteristic.
In some embodiments of the present application, the conversion module comprises: the second determining unit is used for determining the name of the target object in the multi-dimensional information; the third determining unit is used for converting the name of the target object into a second digital characteristic and determining the second digital characteristic as a constant parameter in the motion parameters; the second acquisition unit is used for acquiring the age of the target object in the multi-dimensional information; the obtaining unit is used for obtaining a first variable parameter in the motion parameters according to the age of the target object; the verification unit is used for acquiring the time consumed by the target object to perform verification operation on a verification interface before the target object inputs the data to be encrypted; and a fourth determination unit for determining the consumed time as a second variable parameter among the motion parameters.
According to another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and the program, when running, controls a device in which the nonvolatile storage medium is located to execute the above-mentioned data encryption method.
The storage medium is used for storing program instructions for executing the following functions, and the following functions are realized, namely acquiring data to be encrypted and multidimensional information of a target object; determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; respectively converting the multi-dimensional information into motion parameters of preset physical motion; determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and encrypting the data to be encrypted at least based on the target physical value.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (11)

1. A method for data encryption, comprising:
acquiring data to be encrypted and multi-dimensional information of a target object;
determining digital characteristics used in encrypting the data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object;
respectively converting the multi-dimensional information into motion parameters of preset physical motion;
determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction;
and encrypting the data to be encrypted at least based on the target physical value.
2. The method of claim 1, wherein obtaining data to be encrypted, determining digital features for use in encrypting the data to be encrypted based on multi-dimensional information of a target object, comprises:
acquiring digital content and non-digital content of the multi-dimensional information;
determining the digital content as a first digital characteristic;
and converting the non-digital content to obtain a second digital characteristic.
3. The method of claim 2, wherein converting the multi-dimensional information into motion parameters of preset physical motions respectively comprises:
determining the name of the target object in the multi-dimensional information;
converting the name of the target object into the second digital characteristic, and determining the second digital characteristic as a constant parameter in the motion parameters;
acquiring the age of the target object in the multi-dimensional information;
obtaining a first variable parameter in the motion parameters according to the age of the target object;
acquiring time consumed by a target object to carry out verification operation on a verification interface before data to be encrypted is input;
determining the elapsed time as a second variable parameter of the motion parameters.
4. The method of claim 3, wherein determining the target physical value corresponding to the motion parameter comprises:
obtaining a first displacement of the preset physical motion in the horizontal direction according to the first variable parameter and the second variable parameter;
obtaining a second displacement of the preset physical movement in the vertical direction according to the constant parameter and the second variable parameter;
and obtaining a combined displacement according to the first displacement and the second displacement.
5. The method of claim 4, wherein encrypting the data to be encrypted based on at least the target physical value comprises:
acquiring a randomly generated character string;
splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key;
and encrypting the data to be encrypted based on the encryption key.
6. The method of claim 5, wherein obtaining a randomly generated string comprises:
arranging and combining the constant parameters, the first variable parameters and the second variable parameters to obtain a plurality of groups of arrays;
and randomly selecting one array from the plurality of arrays, and determining the array as the character string.
7. The method of claim 5, wherein encrypting the data to be encrypted based on the key comprises:
acquiring a first data length of the data to be encrypted, wherein the first data length is used for indicating the number of bytes occupied by the data to be encrypted;
acquiring a second data length of the secret key, and performing remainder operation on the second data length based on the first data length to obtain a first remainder value, wherein the second data length is used for indicating the number of bytes occupied by the secret key;
determining the insertion position of the key in the data to be encrypted according to the first residual value;
and inserting the key into the insertion position to encrypt the data to be encrypted.
8. The method of claim 7, wherein determining an insertion location of the key in the data to be encrypted according to the first remainder comprises:
determining the first residual value as an insertion position of the key in the data to be encrypted if the first residual value is smaller than the first data length;
and under the condition that the first residual value is larger than the first data length, performing remainder operation on the first residual value based on the first data length to obtain a second residual value, and determining the second residual value as the insertion position of the key in the data to be encrypted.
9. A data encryption apparatus, comprising:
the acquisition module is used for acquiring data to be encrypted and multi-dimensional information of a target object;
a first determining module, configured to determine, based on multidimensional information of a target object, a digital feature used when encrypting the data to be encrypted, where the data to be encrypted includes: password data set by the target object;
the conversion module is used for respectively converting the multi-dimensional information into motion parameters of preset physical motion;
a second determining module, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate displacement of the preset physical motion in each direction;
and the encryption module is used for encrypting the data to be encrypted at least based on the target physical value.
10. A non-volatile storage medium, comprising a stored program that, when executed, controls a device in which the non-volatile storage medium is located to perform the data encryption method of any one of claims 1 to 8.
11. A processor configured to run a program, the program when executed performing the data encryption method of any one of claims 1 to 8.
CN202111585259.3A 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor Pending CN114282239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111585259.3A CN114282239A (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111585259.3A CN114282239A (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Publications (1)

Publication Number Publication Date
CN114282239A true CN114282239A (en) 2022-04-05

Family

ID=80874109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111585259.3A Pending CN114282239A (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Country Status (1)

Country Link
CN (1) CN114282239A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116260659A (en) * 2023-05-15 2023-06-13 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116260659A (en) * 2023-05-15 2023-06-13 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet
CN116260659B (en) * 2023-05-15 2023-07-11 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet

Similar Documents

Publication Publication Date Title
RU2728519C1 (en) Key matching protocol based on elliptic curve isogeny
CN110400164B (en) Data determining method and device, storage medium and electronic device
CN112380464B (en) Short link generation method and related equipment
CN107204986A (en) High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
Park One-time password based on hash chain without shared secret and re-registration
CN110519052B (en) Data interaction method and device based on Internet of things operating system
CN101964789A (en) Method and system for safely accessing protected resources
US9641328B1 (en) Generation of public-private key pairs
CN114282239A (en) Data encryption method, device, storage medium and processor
CN116663038A (en) Data encryption method and device and electronic equipment
CN112637300B (en) Block chain-based distributed storage and acquisition method and device for video information
CN110287733B (en) File tamper-proofing method and device
CN114338009B (en) Data encryption method and device and nonvolatile storage medium
CN109560918B (en) Method for generating NTRU key and terminal equipment
Guo et al. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks
CN111343150B (en) Transaction data transmission method and system based on block chain and related components
CN113452513B (en) Key distribution method, device and system
CN110458566B (en) Block chain account address generation method, system and device and computer readable storage medium
CN111031049A (en) Data transmission method, device and medium
CN114285563B (en) Key generation method and device
CN114254368A (en) Data encryption method and device
CN117076385A (en) File digest processing method and device
CN115774543A (en) Method and device for generating random number, nonvolatile storage medium and electronic equipment
CN117527213A (en) Encryption method and device, nonvolatile storage medium and decryption method
CN114301681A (en) Service data transmission method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination