技术领域technical field
本发明涉及网络技术,尤指一种加密方法、解密方法及装置。The invention relates to network technology, in particular to an encryption method, a decryption method and a device.
背景技术Background technique
随着信息共享范围的不断扩大,网络上的许多不安全因素对用户数据构成了极大威胁。出于日常应用的各种需要,一些敏感的数据需要在网上供多人共享,这也增加了信息泄露的可能性。面对巨大的、无处不在的信息安全威胁,人们想出了各种应对措施。其中最通常的方式就是对数据进行加密操作,只有通过相应的解密才能使其恢复原貌,获取有用信息。近年来随着密码学技术不断发展,各种加密算法也层出不穷,然而加密安全性与加密效率如何兼顾一直是一个问题。With the continuous expansion of the scope of information sharing, many insecure factors on the network pose a great threat to user data. Due to the various needs of daily applications, some sensitive data needs to be shared by multiple people on the Internet, which also increases the possibility of information leakage. In the face of huge and ubiquitous information security threats, people have come up with various countermeasures. The most common way is to encrypt the data, and only through the corresponding decryption can it restore its original appearance and obtain useful information. In recent years, with the continuous development of cryptography technology, various encryption algorithms emerge in an endless stream, but how to balance encryption security and encryption efficiency has always been a problem.
发明内容Contents of the invention
为了解决上述技术问题,本发明提供了一种加密方法,包括,In order to solve the above technical problems, the present invention provides an encryption method, comprising:
利用第一密钥及对称加密算法对数据进行加密,得加密数据;Using the first key and the symmetric encryption algorithm to encrypt the data to obtain the encrypted data;
利用第二密钥及非对称加密算法对所述第一密钥进行加密,得加密密钥;Encrypting the first key with a second key and an asymmetric encryption algorithm to obtain an encryption key;
发送所述加密数据和所述加密密钥。The encrypted data and the encryption key are sent.
本发明实施例的加密方法,既能保障数据的安全性,又具有较高的加解密效率。The encryption method in the embodiment of the present invention can not only guarantee data security, but also have high encryption and decryption efficiency.
进一步地,所述第二密钥为预定公钥或预定私钥。Further, the second key is a predetermined public key or a predetermined private key.
一种加密装置,包括:An encryption device comprising:
第一加密模块,用于利用第一密钥及对称加密算法对主数据进行加密,得加密数据;The first encryption module is used to encrypt the main data by using the first key and a symmetric encryption algorithm to obtain encrypted data;
第二加密模块,用于利用第二密钥及非对称加密算法对所述第一密钥进行加密,得加密密钥;a second encryption module, configured to encrypt the first key by using a second key and an asymmetric encryption algorithm to obtain an encryption key;
发送模块,用于发送所述加密数据和所述加密密钥。A sending module, configured to send the encrypted data and the encryption key.
进一步地,所述第二密钥为预定公钥或预定私钥。Further, the second key is a predetermined public key or a predetermined private key.
一种加密装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现如上述的方法。An encryption device includes a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, the above method is implemented.
一种解密方法,包括:A decryption method comprising:
接收加密数据和加密密钥;Receive encrypted data and encryption keys;
利用第三密钥对所述加密密钥进行解密,得到第一密钥;Decrypting the encryption key by using the third key to obtain the first key;
利用解密后的密钥对所述加密数据进行解密。The encrypted data is decrypted using the decrypted key.
进一步地,所述第三密钥为与用于对所述加密密钥进行加密的第二密钥对应的密钥。Further, the third key is a key corresponding to the second key used to encrypt the encryption key.
一种解密装置,包括:A decryption device, comprising:
接收模块,用于接收加密数据和加密密钥;A receiving module, configured to receive encrypted data and an encryption key;
第一解密模块,用于利用第三密钥对所述加密密钥进行解密,得到第一密钥;The first decryption module is used to decrypt the encryption key by using the third key to obtain the first key;
第二解密模块,用于利用解密后的密钥对所述加密数据进行解密。The second decryption module is used to decrypt the encrypted data by using the decrypted key.
进一步地,所述第三密钥为与用于对所述加密密钥进行加密的第二密钥对应的密钥。Further, the third key is a key corresponding to the second key used to encrypt the encryption key.
一种解密装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现如上述的方法。A decryption device includes a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, the above method is implemented.
本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Additional features and advantages of the invention will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
附图说明Description of drawings
附图用来提供对本发明技术方案的进一步理解,并且构成说明书的一部分,与本申请的实施例一起用于解释本发明的技术方案,并不构成对本发明技术方案的限制。The accompanying drawings are used to provide a further understanding of the technical solution of the present invention, and constitute a part of the description, and are used together with the embodiments of the application to explain the technical solution of the present invention, and do not constitute a limitation to the technical solution of the present invention.
图1为本发明实施例的加密方法的流程图;Fig. 1 is the flowchart of the encryption method of the embodiment of the present invention;
图2为本发明实施例的加密装置的示意图;FIG. 2 is a schematic diagram of an encryption device according to an embodiment of the present invention;
图3为本发明实施例的一种解密方法的流程图;Fig. 3 is a flowchart of a decryption method according to an embodiment of the present invention;
图4为本发明实施例的一种解密装置的示意图。Fig. 4 is a schematic diagram of a decryption device according to an embodiment of the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚明白,下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.
在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
目前,实现数据加密的算法根据密钥类型可以分成两大类别:对称加密算法和非对称加密算法。对称加密算法速度较快,但是存在一定的安全隐患。非对称加密算法虽然安全性高,却速度偏慢。显然,如果只使用其中任何一种单一的加密算法,都无法使加密系统兼顾安全性与高效性。At present, algorithms for data encryption can be divided into two categories according to key types: symmetric encryption algorithms and asymmetric encryption algorithms. The symmetric encryption algorithm is faster, but there are certain security risks. Although the asymmetric encryption algorithm has high security, it is slow. Obviously, if only any single encryption algorithm is used, it is impossible to make the encryption system both safe and efficient.
图1为本发明实施例的加密方法的流程图,如图1所示,本实施例的加密方法包括:Fig. 1 is the flowchart of the encryption method of the embodiment of the present invention, as shown in Fig. 1, the encryption method of the present embodiment comprises:
步骤101、利用第一密钥及对称加密算法对数据进行加密,得加密数据;Step 101, using the first key and a symmetric encryption algorithm to encrypt data to obtain encrypted data;
步骤102、利用第二密钥及非对称加密算法对所述第一密钥进行加密,得加密密钥;Step 102, using the second key and an asymmetric encryption algorithm to encrypt the first key to obtain an encryption key;
步骤103、发送所述加密数据和所述加密密钥。Step 103, sending the encrypted data and the encryption key.
其中,所述第二密钥为预定公钥或预定私钥。Wherein, the second key is a predetermined public key or a predetermined private key.
非对称加密算法需要两个密钥:公开密钥和私有密钥。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。因为加密和解密使用的是两个不同的密钥,所以这种算法叫作非对称加密算法。Asymmetric encryption algorithms require two keys: a public key and a private key. The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used to decrypt it; if the data is encrypted with the private key, only the corresponding public key can be used to decrypt the data. decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm.
本实施例中,加密方首先利用对称加密算法对主数据进行加密,然后利用约定公钥对对称密钥进行非对称加密,将加密的对称密钥与主数据的密文一同存入加密数据中,进行打包。In this embodiment, the encryption party first uses a symmetric encryption algorithm to encrypt the main data, and then uses the agreed public key to asymmetrically encrypt the symmetric key, and stores the encrypted symmetric key together with the ciphertext of the main data in the encrypted data , to pack.
本实施例中,对称加密算法可以包括以下的任一种,但不限于此:In this embodiment, the symmetric encryption algorithm may include any of the following, but is not limited thereto:
DES(Data Encryption Standard,数据加密标准)算法,3DES(Triple DataEncryption Algorithm,三重数据加密算法)算法,TDEA(Triple Data EncryptionAlgorithm,三位数据加密算法),Blowfish(河豚)算法,RC5算法,IDEA(InternationalData Encryption Algorithm,国际数据加密算法)等。DES (Data Encryption Standard, data encryption standard) algorithm, 3DES (Triple Data Encryption Algorithm, triple data encryption algorithm) algorithm, TDEA (Triple Data Encryption Algorithm, three data encryption algorithm), Blowfish (blowfish) algorithm, RC5 algorithm, IDEA (InternationalData Encryption Algorithm, International Data Encryption Algorithm), etc.
对称加密算法可以包括以下的任一种,但不限于此:Symmetric encryption algorithms can include any of the following, but are not limited to:
RSA、背包算法、ECC(椭圆曲线加密算法)等。RSA, knapsack algorithm, ECC (elliptic curve encryption algorithm), etc.
本发明实施例的加密方法是一种基于基础安全机制的组合加密方案,该方案既能保障数据的安全性,又具有较高的加解密效率。The encryption method in the embodiment of the present invention is a combined encryption scheme based on a basic security mechanism, which can not only guarantee data security, but also have high encryption and decryption efficiency.
相应地,本发明实施例还提供一种加密装置,如图2所示,本实施例的加密装置200可以包括:Correspondingly, the embodiment of the present invention also provides an encryption device. As shown in FIG. 2, the encryption device 200 of this embodiment may include:
第一加密模块201,用于利用第一密钥及对称加密算法对数据进行加密,得加密数据;The first encryption module 201 is used to encrypt data by using a first key and a symmetric encryption algorithm to obtain encrypted data;
第二加密模块202,用于利用第二密钥及非对称加密算法对所述第一密钥进行加密,得加密密钥;The second encryption module 202 is configured to use a second key and an asymmetric encryption algorithm to encrypt the first key to obtain an encryption key;
处理模块203,用于发送所述加密数据和所述加密密钥。A processing module 203, configured to send the encrypted data and the encryption key.
本实施例中,所述第二密钥为预定公钥或预定私钥。In this embodiment, the second key is a predetermined public key or a predetermined private key.
本实施例的加密装置既能保障数据的安全性,又具有较高的加解密效率,保护私密数据信息不受各种不安全因素的威胁。The encryption device of this embodiment can not only guarantee the security of data, but also have high encryption and decryption efficiency, and protect private data information from threats of various insecure factors.
本实施例还提供一种加密装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述的加密方法。This embodiment also provides an encryption device, including a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, the above-mentioned encryption method is implemented.
图3为本发明实施例的一种解密方法的流程图,如图3所示,本实施例的解密方法包括:Fig. 3 is a flowchart of a decryption method according to an embodiment of the present invention. As shown in Fig. 3, the decryption method according to this embodiment includes:
步骤301、接收加密数据和加密密钥;Step 301, receiving encrypted data and an encryption key;
步骤302、利用第三密钥对所述加密密钥进行解密;Step 302, using a third key to decrypt the encryption key;
步骤303、利用解密后的密钥对所述加密数据进行解密。Step 303: Decrypt the encrypted data by using the decrypted key.
本实施例中,所述第三密钥为与用于对所述加密密钥进行加密的第二密钥对应。In this embodiment, the third key corresponds to the second key used to encrypt the encryption key.
解密方在收到加密的数据包后,利用对应的非对称私钥对加密的对称密钥进行解密操作,得到对称密钥后,再用该密钥对主加密数据密文进行解密操作,从而得到主数据的内容。After receiving the encrypted data packet, the decryption party uses the corresponding asymmetric private key to decrypt the encrypted symmetric key. After obtaining the symmetric key, it uses the key to decrypt the ciphertext of the main encrypted data, thus Get the contents of master data.
本实施例的加密方案,虽然主要数据是由安全性较差的对称加密机制加密的,但是鉴于对称密钥通过非对称加密算法得到了加密,所以整个系统的安全性也就可以说是逼近于非对称加密机制了。因为对称加密算法的安全性依赖于其密钥的安全性,而其密钥的安全性又由非对称加密算法得以保障,故而可以消除对称加密中存在的最大安全隐患,即每次交换对称密钥时的不安全性。而主要数据都是由速度较快的对称加密算法加密的,而速度较慢的非对称加密算法只负责加密对称密钥(其长度一般为几十到上百个字节不等,相对于主加密数据,基本可以忽略不计),故其效率基本上相当于对称加密算法。In the encryption scheme of this embodiment, although the main data is encrypted by a symmetric encryption mechanism with poor security, since the symmetric key is encrypted by an asymmetric encryption algorithm, the security of the entire system can be said to be close to Asymmetric encryption mechanism. Because the security of the symmetric encryption algorithm depends on the security of its key, and the security of its key is guaranteed by the asymmetric encryption algorithm, it can eliminate the biggest security risk in the symmetric encryption, that is, each exchange of the symmetric key The insecurity of the key. The main data is encrypted by the faster symmetric encryption algorithm, and the slower asymmetric encryption algorithm is only responsible for encrypting the symmetric key (the length of which generally ranges from tens to hundreds of bytes, compared to the main Encrypted data, basically negligible), so its efficiency is basically equivalent to the symmetric encryption algorithm.
相应的,本发明实施例还提供一种解密装置,如图4所示,本实施例的解密装置400包括:Correspondingly, the embodiment of the present invention also provides a decryption device. As shown in FIG. 4 , the decryption device 400 of this embodiment includes:
接收模块401,用于接收加密数据和加密密钥;A receiving module 401, configured to receive encrypted data and an encryption key;
第一解密模块402,用于利用第三密钥对所述加密密钥进行解密;The first decryption module 402 is configured to use a third key to decrypt the encryption key;
第二解密模块403,用于利用解密后的密钥对所述加密数据进行解密。The second decryption module 403 is configured to use the decrypted key to decrypt the encrypted data.
本发明实施例还提供一种解密装置,包括处理器和计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令被所述处理器执行时,实现上述的解密方法。An embodiment of the present invention also provides a decryption device, including a processor and a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed by the processor, the above-mentioned decryption method is implemented .
本发明实施例还提供了一种计算机可读存储介质,其存储有计算机可执行指令,所述计算机可执行指令被执行时实现所述加密方法及解密方法。The embodiment of the present invention also provides a computer-readable storage medium, which stores computer-executable instructions, and implements the encryption method and decryption method when the computer-executable instructions are executed.
本实施例的方案既能保障数据的安全性,又具有较高的加解密效率,保护私密数据信息不受各种不安全因素的威胁。The solution of this embodiment can not only guarantee data security, but also have high encryption and decryption efficiency, and protect private data information from threats of various insecure factors.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art can understand that all or some of the steps in the methods disclosed above, the functional modules/units in the system, and the device can be implemented as software, firmware, hardware, and an appropriate combination thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components. Components cooperate to execute. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As known to those of ordinary skill in the art, the term computer storage media includes both volatile and nonvolatile media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. permanent, removable and non-removable media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer. In addition, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810788958.XACN108810022A (en) | 2018-07-18 | 2018-07-18 | A kind of encryption method, decryption method and device |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810788958.XACN108810022A (en) | 2018-07-18 | 2018-07-18 | A kind of encryption method, decryption method and device |
| Publication Number | Publication Date |
|---|---|
| CN108810022Atrue CN108810022A (en) | 2018-11-13 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810788958.XAPendingCN108810022A (en) | 2018-07-18 | 2018-07-18 | A kind of encryption method, decryption method and device |
| Country | Link |
|---|---|
| CN (1) | CN108810022A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108881318A (en)* | 2018-09-06 | 2018-11-23 | 程杰 | The encrypted transmission method and encryption transmission system of marine environment detection data |
| CN111143870A (en)* | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
| CN111614670A (en)* | 2020-05-20 | 2020-09-01 | 浙江大华技术股份有限公司 | Method and device for sending encrypted file, and storage medium |
| CN111614667A (en)* | 2020-05-20 | 2020-09-01 | 北京科东电力控制系统有限责任公司 | Security encryption method, device and system for real-time data transmission of power grid regulation information |
| CN112182512A (en)* | 2020-09-01 | 2021-01-05 | 北京幻想纵横网络技术有限公司 | Information processing method, device and storage medium |
| WO2021114891A1 (en)* | 2019-12-11 | 2021-06-17 | 中兴通讯股份有限公司 | Key encryption method and decryption method, and, data encryption method and decryption method |
| CN113487851A (en)* | 2021-05-18 | 2021-10-08 | 浙江工业大学 | Remote control instruction transmission method for high-voltage circuit breaker |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050091517A1 (en)* | 2003-07-16 | 2005-04-28 | Pkware, Inc. | Method and system for mixed symmetric and asymmetric encryption of .ZIP files |
| CN101964793A (en)* | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
| CN102118710A (en)* | 2011-03-08 | 2011-07-06 | 上海红松信息技术有限公司 | System and method for transmitting data between mobile terminals |
| CN104821944A (en)* | 2015-04-28 | 2015-08-05 | 广东小天才科技有限公司 | Hybrid encryption network data security method and system |
| CN104868996A (en)* | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
| CN107770127A (en)* | 2016-08-17 | 2018-03-06 | 北京京东尚科信息技术有限公司 | The transmission method and device of a kind of data |
| CN107896223A (en)* | 2017-12-04 | 2018-04-10 | 山东渔翁信息技术股份有限公司 | A kind of data processing method and system, data collecting system and data receiving system |
| CN107911370A (en)* | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050091517A1 (en)* | 2003-07-16 | 2005-04-28 | Pkware, Inc. | Method and system for mixed symmetric and asymmetric encryption of .ZIP files |
| CN101964793A (en)* | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
| CN102118710A (en)* | 2011-03-08 | 2011-07-06 | 上海红松信息技术有限公司 | System and method for transmitting data between mobile terminals |
| CN104868996A (en)* | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
| CN104821944A (en)* | 2015-04-28 | 2015-08-05 | 广东小天才科技有限公司 | Hybrid encryption network data security method and system |
| CN107770127A (en)* | 2016-08-17 | 2018-03-06 | 北京京东尚科信息技术有限公司 | The transmission method and device of a kind of data |
| CN107911370A (en)* | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
| CN107896223A (en)* | 2017-12-04 | 2018-04-10 | 山东渔翁信息技术股份有限公司 | A kind of data processing method and system, data collecting system and data receiving system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108881318A (en)* | 2018-09-06 | 2018-11-23 | 程杰 | The encrypted transmission method and encryption transmission system of marine environment detection data |
| WO2021114891A1 (en)* | 2019-12-11 | 2021-06-17 | 中兴通讯股份有限公司 | Key encryption method and decryption method, and, data encryption method and decryption method |
| CN111143870A (en)* | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
| CN111143870B (en)* | 2019-12-30 | 2022-05-13 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
| CN111614670A (en)* | 2020-05-20 | 2020-09-01 | 浙江大华技术股份有限公司 | Method and device for sending encrypted file, and storage medium |
| CN111614667A (en)* | 2020-05-20 | 2020-09-01 | 北京科东电力控制系统有限责任公司 | Security encryption method, device and system for real-time data transmission of power grid regulation information |
| CN112182512A (en)* | 2020-09-01 | 2021-01-05 | 北京幻想纵横网络技术有限公司 | Information processing method, device and storage medium |
| CN113487851A (en)* | 2021-05-18 | 2021-10-08 | 浙江工业大学 | Remote control instruction transmission method for high-voltage circuit breaker |
| Publication | Publication Date | Title |
|---|---|---|
| US11210658B2 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
| US10785019B2 (en) | Data transmission method and apparatus | |
| US10187361B2 (en) | Method for secure communication using asymmetric and symmetric encryption over insecure communications | |
| CN108810022A (en) | A kind of encryption method, decryption method and device | |
| TWI736271B (en) | Method, device and equipment for generating and using private key in asymmetric key | |
| KR101894232B1 (en) | Method and apparatus for cloud-assisted cryptography | |
| EP4150879A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
| CN104205117B (en) | device file encryption and decryption method and device | |
| US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
| EP3566385A1 (en) | Homomorphic white box system and method for using same | |
| CN103475664A (en) | Credible extraction method for digital evidence of Android | |
| US12210658B2 (en) | Executing entity-specific cryptographic code in a cryptographic | |
| CN109525388B (en) | Combined encryption method and system with separated keys | |
| US12058257B2 (en) | Data storage method, data read method, electronic device, and program product | |
| Raeisi-Varzaneh et al. | Internet of things: security, issues, threats, and assessment of different cryptographic technologies | |
| CN118898081B (en) | File encryption method and system based on CP-ABE and USBKEY | |
| US20210111901A1 (en) | Executing entity-specific cryptographic code in a trusted execution environment | |
| Shakor et al. | Hybrid security model for medical image protection in cloud | |
| CN112187767A (en) | Multi-party contract consensus system, method and medium based on block chain | |
| CN107483387A (en) | A kind of method of controlling security and device | |
| CN113691373B (en) | A quantum-resistant key escrow system and method based on consortium blockchain | |
| CN110419195A (en) | Data management method and system based on proxy re-encryption in IOT lightweight terminal environment | |
| EP4042630A1 (en) | Executing entity-specific cryptographic code in a cryptographic coprocessor | |
| CA2988628C (en) | Methods and computer program products for encryption key generation and management | |
| US20220337409A1 (en) | System and method for data encryption using key derivation |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20181113 | |
| RJ01 | Rejection of invention patent application after publication |