CN117473539B - Data encryption method, data decryption method, terminal device, and readable storage medium - Google Patents
Data encryption method, data decryption method, terminal device, and readable storage medium Download PDFInfo
- Publication number
- CN117473539B CN117473539B CN202311824370.2A CN202311824370A CN117473539B CN 117473539 B CN117473539 B CN 117473539B CN 202311824370 A CN202311824370 A CN 202311824370A CN 117473539 B CN117473539 B CN 117473539B
- Authority
- CN
- China
- Prior art keywords
- data
- private key
- encrypted data
- encryption
- half part
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
- G06F11/1044—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices with specific ECC/EDC distribution
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The application is applicable to the technical field of data processing, and provides a data encryption method, a data decryption method, terminal equipment and a readable storage medium. The method comprises the following steps: acquiring original data to be encrypted; acquiring fingerprint information and eyeball information; performing ECC encryption on the first half part of data based on the fingerprint information, generating a first private key and obtaining first segment encrypted data; ECC encryption is carried out on the second half part of data based on the eyeball information, a second private key is generated, and second segment encrypted data is obtained; and combining the first segmented encryption data, the second segmented encryption data, the first private key and the second private key to obtain encryption data. The embodiment of the application utilizes fingerprint information, eyeball information and ECC encryption technology to encrypt the original data in a combined way, thereby improving the confidentiality of the encrypted data and ensuring that the encrypted data is not easy to crack.
Description
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data encryption method, a data decryption method, a terminal device, and a readable storage medium.
Background
Encryption processing is required for important data. In the related art, the encryption method for the data is single, the confidentiality is not strong, and the encrypted data is still easy to crack.
Disclosure of Invention
The embodiment of the application provides a data encryption method, a data decryption method, terminal equipment and a readable storage medium, which can solve the problems of single encryption method and poor confidentiality of data in the related technology.
In a first aspect, an embodiment of the present application provides a data encryption method, including:
acquiring original data to be encrypted;
Acquiring fingerprint information and eyeball information;
Performing ECC encryption on first half part of data based on the fingerprint information, generating a first private key and obtaining first segment encrypted data, wherein the first half part of data is the first half part of data of the original data;
ECC encryption is carried out on the second half part of data based on the eyeball information, a second private key is generated, and second segment encrypted data is obtained, wherein the second half part of data is the second half part of data of the original data;
And combining the first segmented encryption data, the second segmented encryption data, the first private key and the second private key to obtain encryption data.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the embodiment of the application can acquire the original data to be encrypted, the fingerprint information and the eyeball information, perform ECC encryption on the first half part of data based on the fingerprint information, generate a first private key and acquire first segment encrypted data, perform ECC encryption on the second half part of data based on the eyeball information, generate a second private key and acquire second segment encrypted data, and acquire encrypted data by combining the first segment encrypted data, the second segment encrypted data, the first private key and the second private key. The embodiment of the application utilizes fingerprint information, eyeball information and ECC encryption technology to encrypt the original data in a combined way, thereby improving the confidentiality of the encrypted data and ensuring that the encrypted data is not easy to crack.
In a second aspect, an embodiment of the present application provides a data encryption apparatus, including:
the first acquisition module is used for acquiring the original data to be encrypted;
the second acquisition module is used for acquiring fingerprint information and eyeball information;
the first encryption module is used for performing ECC encryption on the first half part of data based on the fingerprint information, generating a first private key and obtaining first segmented encrypted data, wherein the first half part of data is the first half part of data of the original data;
The second encryption module is used for carrying out ECC encryption on the second half part of data based on the eyeball information, generating a second private key and obtaining second segmented encrypted data, wherein the second half part of data is the data of the second half of the original data;
and the first combination module is used for combining the first segmented encryption data, the second segmented encryption data, the first private key and the second private key to obtain encryption data.
In a third aspect, an embodiment of the present application provides a data decryption method, including:
acquiring encrypted data to be decrypted;
the encrypted data is overturned to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key;
Acquiring fingerprint information and eyeball information;
performing ECC decryption on the first segment encrypted data according to the fingerprint information and the first private key to obtain first half part data, wherein the first half part data is the first half part of the original data;
Performing ECC decryption on the second segment encrypted data according to the eyeball information and the second private key to obtain second half part data, wherein the second half part data is the second half part of the original data;
and combining the first half part data and the second half part data to obtain the original data.
In a fourth aspect, an embodiment of the present application provides a data decryption apparatus, including:
the third acquisition module is used for acquiring the encrypted data to be decrypted;
The overturning module is used for overturning the encrypted data to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key;
the fourth acquisition module is used for acquiring fingerprint information and eyeball information;
The first decryption module is used for performing ECC decryption on the first segment encrypted data according to the fingerprint information and the first private key to obtain first half data, wherein the first half data is the first half data of the original data;
The second decryption module is used for performing ECC decryption on the second segment encrypted data according to the eyeball information and the second private key to obtain second half data, wherein the second half data is the second half data of the original data;
And the second combination module is used for combining the first half part data and the second half part data to obtain the original data.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the data encryption method described in the first aspect when the processor executes the computer program.
In a sixth aspect, an embodiment of the present application provides a computer readable storage medium storing a computer program, where the computer program is executed by a processor to implement the steps of the data encryption method according to the first aspect.
In a seventh aspect, an embodiment of the present application provides a computer program product for causing a terminal device to execute the data encryption method according to the first aspect.
It will be appreciated that the advantages of the second to seventh aspects may be found in the relevant description of the first aspect, and are not described here again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an implementation flow of a data encryption method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a complete implementation of encrypting original data according to an embodiment of the present application;
fig. 3 is a schematic implementation flow chart of a data decryption method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a complete implementation of decrypting encrypted data according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data encryption device according to an embodiment of the present application;
Fig. 6 is a schematic structural diagram of a data decryption device according to an embodiment of the present application;
Fig. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be protected by the present application based on the embodiments of the present application.
It is noted that the terms "comprising," "including," and "having," and any variations thereof, in the description and claims of the application and in the foregoing figures, are intended to cover non-exclusive inclusions. For example, a process, method, terminal, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus. In the claims, specification, and drawings of the present application, relational terms such as "first" and "second", and the like are used solely to distinguish one entity/operation/object from another entity/operation/object without necessarily requiring or implying any such real-time relationship or order between such entities/operations/objects.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Encryption processing is required for important data. In the related art, the encryption method for the data is single, the confidentiality is not strong, and the encrypted data is still easy to crack.
In view of this, the embodiment of the application uses fingerprint information, eyeball information and ECC encryption technology to encrypt the original data in a combined way, thereby improving the confidentiality of the encrypted data and making the encrypted data not easy to be cracked.
In order to illustrate the technical scheme of the application, the following description is made by specific examples.
Fig. 1 shows a schematic implementation flow chart of a data encryption method according to an embodiment of the present application, where the method may be applied to a terminal device. The terminal device may be a mobile phone, tablet computer, notebook computer, ultra-mobile personal computer (UMPC), netbook, etc.
Specifically, the above-described data encryption method may include the following steps S101 to S105.
Step S101, obtaining the original data to be encrypted.
In an embodiment of the present application, a user may input original data to be encrypted to a terminal device. The terminal device may receive raw data input by a user. It will be appreciated that the terminal device may also obtain the raw data in other ways.
Step S102, fingerprint information and eyeball information are acquired.
In the embodiment of the application, the terminal equipment can collect fingerprint data and eyeball data of a user through the terminal equipment or other encryption equipment electrically connected with the terminal equipment. Fingerprint data and eyeball data are obtained, and the terminal equipment can convert the fingerprint data and the eyeball data into corresponding binary data, so that binary fingerprint information and eyeball information are obtained.
Step S103, ECC encryption is conducted on the first half part of data based on the fingerprint information, a first private key is generated, and first segment encrypted data is obtained.
Wherein the first half data is the first half data of the original data.
It will be appreciated that the terminal device may divide the original data equally into two parts, i.e. the original data may be divided into a first half of data and a second half of data.
It should be appreciated that ECC (Ellipse Curve Ctyptography) is a public key encryption algorithm based on elliptic curve math. ECC is a cryptosystem established on the discrete logarithm problem based on an elliptic curve, a point G on the elliptic curve is given, an integer K is selected, and K=kG is easy to solve; conversely, given two points K and G on the elliptic curve, if k=kg, it is a difficult problem to find an integer K. ECC is based on this mathematical problem, which is called the elliptic curve discrete logarithm problem. Wherein the point K on the elliptic curve is the public key and the integer K is the private key.
In the embodiment of the application, the terminal equipment can perform ECC encryption on the first half part of data by utilizing the fingerprint information so as to obtain first segment encrypted data, and meanwhile, a first private key is generated in the ECC encryption process.
Step S104, ECC encryption is conducted on the second half part of data based on eyeball information, a second private key is generated, and second segment encrypted data is obtained.
The second half data is the second half data of the original data.
In the embodiment of the application, the terminal device can perform ECC encryption on the second half part of data by utilizing eyeball information so as to obtain second segment encrypted data, and a second private key is generated in the ECC encryption process.
Step S105, combining the first segment encrypted data, the second segment encrypted data, the first private key and the second private key to obtain encrypted data.
In the embodiment of the application, after the first segmented encryption data, the second segmented encryption data, the first private key and the second private key are obtained, the terminal equipment can combine the first segmented encryption data and the second segmented encryption data, and the first private key and the second private key are respectively inserted into the combined data, so that the encryption data is finally obtained.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the embodiment of the application can acquire the original data to be encrypted, the fingerprint information and the eyeball information, perform ECC encryption on the first half part of data based on the fingerprint information, generate a first private key and acquire first segment encrypted data, perform ECC encryption on the second half part of data based on the eyeball information, generate a second private key and acquire second segment encrypted data, and acquire encrypted data by combining the first segment encrypted data, the second segment encrypted data, the first private key and the second private key. The embodiment of the application utilizes fingerprint information, eyeball information and ECC encryption technology to encrypt the original data in a combined way, thereby improving the confidentiality of the encrypted data and ensuring that the encrypted data is not easy to crack.
In some embodiments of the present application, the above-mentioned combination of the first segmented encryption data, the second segmented encryption data, the first private key and the second private key may specifically include step S801 to step S803.
Step S801, the first segment encrypted data and the second segment encrypted data are combined to obtain initial encrypted data.
In an embodiment of the present application, the terminal device may combine the first piece of encrypted data with the second piece of encrypted data to obtain the initial encrypted data in a preset order, for example, the first piece of encrypted data is preceded and the second piece of encrypted data is followed.
Step S802, the initial encrypted data is transposed according to a first preset character length, and one character of the first private key is sequentially inserted after each transposition.
The first preset character length may be set as required, for example, may be set to be 3 characters long.
In the embodiment of the present application, the terminal device may perform transposition once every first preset character length on the initial encrypted data from the beginning, where transposition refers to reversing the character sequence, for example, transposition is performed on 3 characters abc, where the character after transposition is cba. At each transposition, one character of the first private key is inserted in turn after the character after the transposition.
For example, if the initial encrypted data is abcdef and the first private key is AB, performing first transposition on the initial encrypted data to obtain a character cba, and inserting a first character a of the first private key behind the character a to obtain a character cbaA; and performing second transposition on the initial encrypted data to obtain a character fed, inserting a second character B of the first private key behind the character d to obtain a character fedB, and combining the character cbaA obtained in front of fedB to obtain data cbaAfedB after the first private key is inserted.
In step S803, after the first private key is inserted, one character of the second private key is inserted in sequence after each transposition, so as to obtain encrypted data.
In the embodiment of the application, after the first private key is inserted, the terminal equipment can continue to insert the second private key after transposition at the moment, and finally the encrypted data is obtained.
For example, assuming that the initial encrypted data is abcdefghijkl, the first private key is AB, and the second private key is CD, in the example of step S802 described above, it has been found that the data inserted into the first private key after the transposition is cbaAfedB. And at the moment, continuing to transpose the initial encrypted data, and inserting the second private key into the transposed data. Specifically, the initial encrypted data is subjected to third transposition to obtain a character ihg, and a first character C of a second private key is inserted behind the character g to obtain a character ihgC; the initial encrypted data is transposed a fourth time to obtain a character lkj, a second character D of the second private key is inserted after the character j to obtain a character lkjD, and the character ihgC obtained before lkjD is combined to obtain data ihgClkjD after the second private key is inserted. And then ihgClkjD is combined with the data cbaAfedB inserted with the first private key to obtain encrypted data cbaAfedBihgClkjD.
According to the embodiment of the application, the initial encrypted data is transposed, and the first private key and the second private key are inserted into the transposed initial encrypted data, so that the encrypted data is finally obtained, and the confidentiality of the encrypted data is further improved.
In some embodiments of the present application, the first half data is ECC encrypted based on the fingerprint information, and a first private key is generated and first segment encrypted data is obtained, which may specifically include step S901 and step S902.
Step S901 generates a third private key based on fingerprint information.
In step S902, the first half of data is ECC encrypted based on the third private key, and the first private key is generated and the first piece of encrypted data is obtained.
In the embodiment of the application, the terminal equipment can generate the public key and the private key according to the fingerprint information by utilizing an RSA algorithm, wherein the private key is the third private key. After the third private key is obtained, the terminal equipment can use the third private key as a public key in ECC encryption, and the public key is used for ECC encryption of the first half part of data to obtain first segmented encrypted data after ECC encryption. Meanwhile, in the ECC encryption process, a public key and a private key are generated, wherein the private key is the first private key.
In some embodiments of the present application, the ECC encryption may be performed on the second half of data based on the eyeball information, and the second private key may be generated and the second segment encrypted data may be obtained, which may specifically include step S1001 and step S1002.
Step S1001 generates a fourth private key based on eyeball information.
In step S1002, the second half data is ECC encrypted based on the fourth private key, and a second private key is generated and second segment encrypted data is obtained.
In the embodiment of the application, the terminal equipment can also generate the public key and the private key according to eyeball information by utilizing an RSA algorithm, wherein the private key is the fourth private key. After the fourth private key is obtained, the terminal equipment can use the fourth private key as a public key in ECC encryption, and the public key is used for ECC encryption of the second half part of data to obtain second segment encrypted data after ECC encryption. Meanwhile, in the ECC encryption process, a public key and a private key are generated, wherein the private key is the second private key.
To facilitate understanding of the encryption process, specific examples are: for example, as shown in fig. 2, assume that the original data is aaabbbcccddd, the fingerprint information is 010100101, and the eyeball information is 101001100. The terminal device may divide the original data into first half data aaabbb and second half data cccddd. And generates a third private key adcrws based on the fingerprint information 010100101 and a fourth private key 0fe8& fah based on the eyeball information 101001100. The first half of the data aaabbb may then be ECC encrypted using the third private key adcrws to obtain first piece of encrypted data YWFh k0YmJiY2NjkkL and generate a first private key fksdf #. The second half data cccddd may be ECC encrypted by using the fourth private key 0fe8& fah to obtain second segmented encrypted data JHHh12YggayYSGfafb, and generate the second private key 46× #f &. Next, the first piece of encrypted data YWFh k0YmJiY2NjkkL is combined with the second piece of encrypted data JHHh12YggayYSGfafb, and initial encrypted data YWFh k0YmJiY2NjkkLJHHh12YggayYSGfafb can be obtained. The original encrypted data is then transposed by 3 characters in length (the order of the 3 characters is transposed), and the transposed data is FWYk, hmY, yiJjN, lkkHHJ, hggYYYafGSbfa. After each transposition, the first private key fksdf # and the second private key 46 x#f &aresequentially inserted, that is, the characters of the first private key fksdf # and the second private key 46 x#f & are sequentially inserted every 3 characters in the data after the transposition, and finally the encrypted data FWYfk3hkmY0sYiJdjN2fLkk #HHJ421h6ggY x YYa # fGSfbfa &canbe obtained.
It will be appreciated that after the encryption of the original data is completed, the login user may be given data operation rights and the data operation rights may be encrypted. When a user logs in, login information can be obtained and verified, and if the verification is passed, the data operation authority is decrypted and given to the user.
In some scenarios, after encrypting the original data, the encrypted data needs to be decrypted, so the embodiment of the application provides a data decryption method, which can decrypt the encrypted data obtained based on the data encryption method.
In order to illustrate the technical scheme of the application, the following description is made by specific examples.
Fig. 3 is a schematic implementation flow chart of a data decryption method according to an embodiment of the present application, where the method may be applied to a terminal device. The terminal device may be a mobile phone, tablet computer, notebook computer, ultra-mobile personal computer (UMPC), netbook, etc.
Specifically, the data decryption method may include the following steps S301 to S306.
Step S301, obtaining encrypted data to be decrypted.
In an embodiment of the present application, the terminal device may read the encrypted data stored in its internal memory. Of course, the encrypted data may be obtained in other manners, which the present application is not limited to.
Step S302, the encrypted data is turned over to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key.
In the embodiment of the application, the terminal equipment can overturn the encrypted data and extract the first segmented encrypted data, the second segmented encrypted data, the first private key and the second private key from the encrypted data.
Step S303, fingerprint information and eyeball information are acquired.
In the embodiment of the application, the terminal equipment can collect fingerprint data and eyeball data of a user through the terminal equipment or other encryption equipment electrically connected with the terminal equipment. Fingerprint data and eyeball data are obtained, and the terminal equipment can convert the fingerprint data and the eyeball data into corresponding binary data, so that binary fingerprint information and eyeball information are obtained.
Step S304, ECC decryption is carried out on the first segment encrypted data according to the fingerprint information and the first private key, and the first half part of data is obtained.
Wherein the first half data is the first half data of the original data.
In the embodiment of the application, the encrypted data is subjected to ECC decryption, and a corresponding public key and a private key are needed, wherein the first private key is the private key needed for ECC decryption of the first segmented encrypted data, and the public key needed for ECC decryption can be obtained from the fingerprint information. Therefore, after obtaining the fingerprint information and the first private key, the terminal device can obtain the public key according to the fingerprint information, and combine the first private key to perform ECC decryption on the first segment encrypted data, thereby obtaining the first half data.
Step S305, ECC decryption is performed on the second segment encrypted data according to the eyeball information and the second private key, and the second half part of data is obtained.
The second half data is the second half data of the original data.
In the embodiment of the application, the encrypted data is subjected to ECC decryption, and a corresponding public key and a private key are needed, wherein the second private key is the private key needed for ECC decryption of the second segmented encrypted data, and the public key needed for ECC decryption can be obtained from eyeball information. Therefore, after the eyeball information and the second private key are obtained, the terminal device can obtain the public key according to the eyeball information and combine the second private key to perform ECC decryption on the second segment encrypted data, so that the second half data is obtained.
Step S306, combining the first half data and the second half data to obtain the original data.
In the embodiment of the present application, after the first half data and the second half data are obtained, the terminal device may obtain the original data by using the first half data and the second half data, specifically, the first half data and the second half data are before and after the first half data.
In some embodiments of the present application, the flipping the encrypted data to obtain the first segmented encrypted data, the second segmented encrypted data, the first private key and the second private key may specifically include steps S1101 to S1104.
Step 1101, the encrypted data is flipped according to the first preset character length, and a character is extracted after each flipping, so as to obtain the initial encrypted data.
In the embodiment of the application, the terminal device can overturn the encrypted data according to the first preset character length, which can be understood as transposition of the encrypted data, extraction of one character after each overturn, that is, extraction of the latter character every first preset character length, and finally obtaining the initial encrypted data.
Illustratively, assume that the encrypted data is cbaAfedBihgClkjD and the first predetermined character length is 3. And performing first overturn on the encrypted data cbaAfedBihgClkjD according to the length of 3 characters to obtain characters abc, and extracting the characters after the first overturn to obtain characters A. And (5) performing second overturn to obtain a character def, and extracting the character after the second overturn to obtain a character B. And (3) performing third overturn to obtain a character ghi, and extracting the character after the third overturn to obtain a character C. And performing fourth overturn to obtain a character jkl, and extracting the character after the fourth overturn to obtain a character D. The initial encrypted data abcdefghijkl, as well as the characters A, B, C, D, are ultimately available.
In step S1102, when the extracted character length meets the second preset character length, the extracted characters are sequentially formed into the first private key.
It can be appreciated that the second predetermined character length is identical to the lengths of the first private key and the second private key in the encryption process.
In the embodiment of the application, after the extracted characters are obtained, the terminal equipment can sequentially form the extracted characters into the first private key according to the second preset character length.
For example, referring to the example of step S1101, assuming that the second preset character length is 2, the terminal device may combine a and B in the extracted characters A, B, C, D into the first private key AB.
In step S1103, after the first private key is obtained, the characters extracted again are sequentially formed into the second private key.
In the embodiment of the application, after the first private key is obtained, the terminal device can sequentially form the remaining characters in the extracted characters into the second private key.
For example, referring to the examples of step S1101 and step S1102 described above, assuming that the second preset character length is 2, the terminal device may combine C and D remaining in the extracted character A, B, C, D into the second private key CD.
In step S1104, the initial encrypted data is decomposed to obtain the first segmented encrypted data and the second segmented encrypted data.
In the embodiment of the application, after the initial encrypted data is obtained, the terminal device can divide the initial encrypted data evenly to obtain the first segmented encrypted data and the second segmented encrypted data.
In some embodiments of the present application, the first segment encrypted data is subjected to ECC decryption according to the fingerprint information and the first private key to obtain first half data, which may specifically include step S1201 and step S1202.
Step S1201, a third private key is generated based on the fingerprint information.
In step S1202, the third private key is used as the public key corresponding to the first private key, and ECC decryption is performed on the first segment encrypted data in combination with the first private key to obtain the first half data.
In the embodiment of the application, the terminal equipment can generate the public key and the private key according to the fingerprint information by utilizing an RSA algorithm, wherein the private key is the third private key. Since the first half data is ECC encrypted using the third private key at the time of ECC encryption of the first half data, the public key and the first private key are generated during this encryption. Therefore, the terminal device can use the third private key as the public key corresponding to the first private key, and combine the first private key to perform ECC decryption on the first segment encrypted data, thereby obtaining the first half data.
In some embodiments of the present application, the ECC decryption is performed on the second segment encrypted data according to the eyeball information and the second private key to obtain the second half data, which may specifically include step S1301 and step S1302.
Step S1301 generates a fourth private key based on eyeball information.
In step S1302, the fourth private key is used as the public key corresponding to the second private key, and the second segment encrypted data is ECC decrypted in combination with the second private key to obtain the second half data.
In the embodiment of the application, the terminal equipment can generate the public key and the private key according to eyeball information by utilizing an RSA algorithm, wherein the private key is the fourth private key. Since the second half of the data is ECC-encrypted using the fourth private key at the time of ECC-encrypting the second half of the data, the public key and the second private key are generated during this encryption. Therefore, the terminal device can use the fourth private key as the public key corresponding to the second private key, and combine the second private key to perform ECC decryption on the second segment encrypted data, thereby obtaining the second half data.
To facilitate understanding of the encryption process, specific examples are: as shown in fig. 4, it is assumed that the encrypted data is FWYfk3hkmY0sYiJdjN2fLkk #hhj421h6ggY YYa # fGSfbfa &, the fingerprint information is 010100101, the eyeball information is 101001100, and the first preset character length is 3. The terminal device may invert the encrypted data according to 3 character lengths, extract a character after each inversion, and obtain initial encrypted data YWFh k0YmJiY2NjkkLJHHh YggayYSGfafb, and characters f, k, s, d, f, #, 4, 6, #, f, and &, and if the second preset character length is 6, may combine to obtain the first private key fksdf # and the second private key 46 x #f &. The terminal device may then disassemble the initial encrypted data into first segmented encrypted data YWFh k0YmJiY2NjkkL and second segmented encrypted data JHHh12YggayYSGfafb. In addition, the terminal device may also generate a third private key adcrws based on the fingerprint information 010100101 and a fourth private key 0fe8& fah based on the eyeball information 101001100. Then, the terminal device may use the third private key adcrws as the public key corresponding to the first private key fksdf #, and perform ECC decryption on the first segment encrypted data YWFh k0YmJiY2NjkkL by combining the third private key adcrws and the first private key fksdf #, so as to obtain the first half data aaabbb. The terminal device may further use the fourth private key 0fe8& fah as the public key corresponding to the second private key 46× #f, and perform ECC decryption on the second segmented encrypted data JHHh and YggayYSGfafb by combining the fourth private key 0fe8& fah and the second private key 46× #f & so as to obtain second half data cccddd. Finally, by combining the first half data aaabbb and the second half data cccddd, the original data aaabbbcccddd can be obtained.
Fig. 5 shows a schematic structural diagram of a data encryption device according to an embodiment of the present application, where the data encryption device 5 may be configured on a terminal device, and specifically, the data encryption device 5 may include:
a first obtaining module 501, configured to obtain original data to be encrypted;
a second obtaining module 502, configured to obtain fingerprint information and eyeball information;
a first encryption module 503, configured to perform ECC encryption on first half data based on the fingerprint information, generate a first private key, and obtain first segment encrypted data, where the first half data is first half data of the original data;
a second encryption module 504, configured to perform ECC encryption on a second half of data based on the eyeball information, generate a second private key, and obtain second segment encrypted data, where the second half of data is a second half of the original data;
a first combining module 505, configured to combine the first segment encrypted data, the second segment encrypted data, the first private key, and the second private key to obtain encrypted data.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the embodiment of the application can acquire the original data to be encrypted, the fingerprint information and the eyeball information, perform ECC encryption on the first half part of data based on the fingerprint information, generate a first private key and acquire first segment encrypted data, perform ECC encryption on the second half part of data based on the eyeball information, generate a second private key and acquire second segment encrypted data, and acquire encrypted data by combining the first segment encrypted data, the second segment encrypted data, the first private key and the second private key. The embodiment of the application utilizes fingerprint information, eyeball information and ECC encryption technology to encrypt the original data in a combined way, thereby improving the confidentiality of the encrypted data and ensuring that the encrypted data is not easy to crack.
In some embodiments of the present application, the first combining module 505 may be further configured to: combining the first segmented encryption data with the second segmented encryption data to obtain initial encryption data; transposition is carried out on the initial encrypted data according to a first preset character length, and one character of the first private key is inserted after each transposition in sequence; and after the first private key is inserted, sequentially inserting one character of the second private key after each transposition to obtain the encrypted data.
In some embodiments of the present application, the first encryption module 503 may be further configured to: generating a fourth private key based on the eyeball information; and carrying out ECC encryption on the second half part of data based on the fourth private key, generating the second private key and obtaining the second segmented encryption data.
Fig. 6 is a schematic structural diagram of a data decryption device according to an embodiment of the present application, where the data decryption device 6 may be configured on a terminal device, and specifically, the data decryption device 6 may include:
a third obtaining module 601, configured to obtain encrypted data to be decrypted;
the overturning module 602 is configured to overturn the encrypted data to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key;
A fourth acquiring module 603, configured to acquire fingerprint information and eyeball information;
the first decryption module 604 is configured to perform ECC decryption on the first segment encrypted data according to the fingerprint information and the first private key, to obtain first half data, where the first half data is first half of the original data;
A second decryption module 605, configured to perform ECC decryption on the second segment encrypted data according to the eyeball information and the second private key, to obtain second half data, where the second half data is second half data of the original data;
And a second combining module 606, configured to combine the first half data and the second half data to obtain the original data.
In some embodiments of the present application, the flipping module 602 may also be configured to: turning the encrypted data according to a first preset character length, and extracting a character after each turn to obtain initial encrypted data; when the extracted character length meets a second preset character length, sequentially forming the extracted characters into the first private key; after the first private key is obtained, sequentially forming the character extracted again into the second private key; and decomposing the initial encrypted data to obtain the first segmented encrypted data and the second segmented encrypted data.
In some embodiments of the present application, the first decryption module 604 may be further configured to: generating a third private key based on the fingerprint information; and taking the third private key as a public key corresponding to the first private key, and combining the first private key to perform ECC decryption on the first segment encrypted data to obtain the first half part data.
In some embodiments of the present application, the second decryption module 605 may also be configured to: generating a fourth private key based on the eyeball information; and taking the fourth private key as a public key corresponding to the second private key, and combining the second private key to perform ECC decryption on the second segment encrypted data to obtain the second half data.
Fig. 7 is a schematic diagram of a terminal device according to an embodiment of the present application. The terminal device 7 may include: a processor 701, a memory 702, and a computer program 703, such as a data encryption program or a data decryption program, stored in the memory 702 and executable on the processor 701. The processor 701 implements the steps in the above-described data encryption method embodiment when executing the computer program 703, for example, steps S101 to S105 shown in fig. 1 or steps S301 to S306 shown in fig. 3. Or the processor 701 executes the computer program 703 to implement the functions of the modules/units in the above embodiment of the apparatus, for example, the first acquisition module 501, the second acquisition module 502, the first encryption module 503, the second encryption module 504, the first combination module 505 shown in fig. 5, or the third acquisition module 601, the flipping module 602, the fourth acquisition module 603, the first decryption module 604, the second decryption module 605, and the second combination module 606 shown in fig. 6.
The computer program may be divided into one or more modules/units, which are stored in the memory 702 and executed by the processor 701 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing the specified functions, which instruction segments are used for describing the execution of the computer program in the terminal device.
The terminal device may include, but is not limited to, a processor 701, a memory 702. It will be appreciated by those skilled in the art that fig. 7 is merely an example of a terminal device and is not limiting of the terminal device, and may include more or fewer components than shown, or may combine some components, or different components, e.g., the terminal device may also include input and output devices, network access devices, buses, etc.
The Processor 701 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), off-the-shelf Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 702 may be an internal storage unit of the terminal device, such as a hard disk or a memory of the terminal device. The memory 702 may also be an external storage device of the terminal device, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like. Further, the memory 702 may also include both internal storage units and external storage devices of the terminal device. The memory 702 is used for storing the computer program and other programs and data required by the terminal device. The memory 702 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for convenience and brevity of description, the structure of the above terminal device may also refer to a specific description of the structure in the method embodiment, which is not repeated herein.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Embodiments of the present application also provide a computer-readable storage medium storing a computer program that, when executed by a processor, implements the steps of the data encryption method described above.
Embodiments of the present application provide a computer program product which, when run on a mobile terminal, causes the mobile terminal to perform the steps of the data encryption method described above.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.
Claims (4)
1. A data encryption method, comprising:
acquiring original data to be encrypted;
Acquiring fingerprint information and eyeball information;
Performing ECC encryption on first half part of data based on the fingerprint information, generating a first private key and obtaining first segment encrypted data, wherein the first half part of data is the first half part of data of the original data;
ECC encryption is carried out on the second half part of data based on the eyeball information, a second private key is generated, and second segment encrypted data is obtained, wherein the second half part of data is the second half part of data of the original data;
Combining the first segmented encryption data, the second segmented encryption data, the first private key and the second private key to obtain encryption data;
The first half part of data is subjected to ECC encryption based on the fingerprint information, a first private key is generated, first segmented encrypted data is obtained, and the method comprises the following steps:
generating a third private key based on the fingerprint information by using an RSA algorithm;
Taking the third private key as a first public key in ECC encryption, performing ECC encryption on the first half part of data based on the first public key, generating the first private key and obtaining the first segmented encrypted data, wherein the first private key is a private key generated in ECC encryption;
The ECC encryption is performed on the second half part of data based on the eyeball information, a second private key is generated, and second segment encrypted data is obtained, and the method comprises the following steps:
generating a fourth private key based on the eyeball information by using an RSA algorithm;
Taking the fourth private key as a second public key in the ECC encryption, performing ECC encryption on the second half part of data based on the second public key, generating the second private key and obtaining the second segmented encrypted data, wherein the second private key is the private key generated in the ECC encryption;
Wherein said combining said first segmented encrypted data, said second segmented encrypted data, said first private key, and said second private key to obtain encrypted data comprises:
combining the first segmented encryption data with the second segmented encryption data to obtain initial encryption data;
transposition is carried out on the initial encrypted data according to a first preset character length, and one character of the first private key is inserted after each transposition in sequence;
and after the first private key is inserted, sequentially inserting one character of the second private key after each transposition to obtain the encrypted data.
2. A data decryption method, comprising:
acquiring encrypted data to be decrypted;
the encrypted data is overturned to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key;
Acquiring fingerprint information and eyeball information;
performing ECC decryption on the first segment encrypted data according to the fingerprint information and the first private key to obtain first half part data, wherein the first half part data is the first half part of the original data;
Performing ECC decryption on the second segment encrypted data according to the eyeball information and the second private key to obtain second half part data, wherein the second half part data is the second half part of the original data;
combining the first half part data and the second half part data to obtain the original data;
The step of performing ECC decryption on the first segment encrypted data according to the fingerprint information and the first private key to obtain first half data includes:
Generating a third private key based on the fingerprint information;
taking the third private key as a public key corresponding to the first private key, and combining the first private key to perform ECC decryption on the first segment encrypted data to obtain the first half part data;
and performing ECC decryption on the second segment encrypted data according to the eyeball information and the second private key to obtain second half data, where the second half data includes:
generating a fourth private key based on the eyeball information;
taking the fourth private key as a public key corresponding to the second private key, and combining the second private key to perform ECC decryption on the second segment encrypted data to obtain the second half data;
The step of turning over the encrypted data to obtain first segmented encrypted data, second segmented encrypted data, a first private key and a second private key comprises the following steps:
turning the encrypted data according to a first preset character length, and extracting a character after each turn to obtain initial encrypted data;
When the extracted character length meets a second preset character length, sequentially forming the extracted characters into the first private key;
after the first private key is obtained, sequentially forming the character extracted again into the second private key;
And decomposing the initial encrypted data to obtain the first segmented encrypted data and the second segmented encrypted data.
3. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the data encryption method according to claim 1 or the steps of the data decryption method according to claim 2 when the computer program is executed.
4. A computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the data encryption method of claim 1 or the steps of the data decryption method of claim 2.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311824370.2A CN117473539B (en) | 2023-12-28 | 2023-12-28 | Data encryption method, data decryption method, terminal device, and readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311824370.2A CN117473539B (en) | 2023-12-28 | 2023-12-28 | Data encryption method, data decryption method, terminal device, and readable storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN117473539A CN117473539A (en) | 2024-01-30 |
| CN117473539B true CN117473539B (en) | 2024-04-26 |
Family
ID=89640050
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311824370.2A Active CN117473539B (en) | 2023-12-28 | 2023-12-28 | Data encryption method, data decryption method, terminal device, and readable storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117473539B (en) |
Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1292185A (en) * | 1998-01-19 | 2001-04-18 | 特伦斯·E·萨姆纳 | Method and apparatus for communicating private messages to selected members |
| JP2009071362A (en) * | 2007-09-10 | 2009-04-02 | Ntt Comware West Corp | Encryption/decryption system and method |
| KR20090097418A (en) * | 2008-03-11 | 2009-09-16 | 인하대학교 산학협력단 | Fragmentation method of data packet with biometric information inserted and authentication method of fragmented data packet with biometric information inserted |
| CN110601853A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain private key generation method and equipment |
| CN110740128A (en) * | 2019-09-27 | 2020-01-31 | 武汉虹识技术有限公司 | off-line data encryption method and device |
| CN112235608A (en) * | 2020-12-11 | 2021-01-15 | 视联动力信息技术股份有限公司 | A data encryption transmission method, device and medium based on video networking |
| CN112800477A (en) * | 2021-04-02 | 2021-05-14 | 西安慧博文定信息技术有限公司 | Data encryption and decryption system and method based on biological characteristic value |
| CN114282882A (en) * | 2021-11-15 | 2022-04-05 | 深圳市东信时代信息技术有限公司 | Material work order auditing method, device and equipment and storage medium |
| CN114692121A (en) * | 2021-12-23 | 2022-07-01 | 深圳市普渡科技有限公司 | Information acquisition methods and related products |
| CN116405211A (en) * | 2023-06-07 | 2023-07-07 | 深圳市乐凡信息科技有限公司 | Multiple encryption method, device, equipment and storage medium based on biological characteristics |
| CN116668167A (en) * | 2023-06-26 | 2023-08-29 | 云南财经大学 | Intelligent contract method for data communication based on block chain |
| CN117135624A (en) * | 2023-10-27 | 2023-11-28 | 中国铁道科学研究院集团有限公司通信信号研究所 | Vehicle data wireless download method and system based on hybrid encryption and decryption algorithm |
-
2023
- 2023-12-28 CN CN202311824370.2A patent/CN117473539B/en active Active
Patent Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1292185A (en) * | 1998-01-19 | 2001-04-18 | 特伦斯·E·萨姆纳 | Method and apparatus for communicating private messages to selected members |
| JP2009071362A (en) * | 2007-09-10 | 2009-04-02 | Ntt Comware West Corp | Encryption/decryption system and method |
| KR20090097418A (en) * | 2008-03-11 | 2009-09-16 | 인하대학교 산학협력단 | Fragmentation method of data packet with biometric information inserted and authentication method of fragmented data packet with biometric information inserted |
| CN110601853A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain private key generation method and equipment |
| CN110740128A (en) * | 2019-09-27 | 2020-01-31 | 武汉虹识技术有限公司 | off-line data encryption method and device |
| CN112235608A (en) * | 2020-12-11 | 2021-01-15 | 视联动力信息技术股份有限公司 | A data encryption transmission method, device and medium based on video networking |
| CN112800477A (en) * | 2021-04-02 | 2021-05-14 | 西安慧博文定信息技术有限公司 | Data encryption and decryption system and method based on biological characteristic value |
| CN114282882A (en) * | 2021-11-15 | 2022-04-05 | 深圳市东信时代信息技术有限公司 | Material work order auditing method, device and equipment and storage medium |
| CN114692121A (en) * | 2021-12-23 | 2022-07-01 | 深圳市普渡科技有限公司 | Information acquisition methods and related products |
| CN116405211A (en) * | 2023-06-07 | 2023-07-07 | 深圳市乐凡信息科技有限公司 | Multiple encryption method, device, equipment and storage medium based on biological characteristics |
| CN116668167A (en) * | 2023-06-26 | 2023-08-29 | 云南财经大学 | Intelligent contract method for data communication based on block chain |
| CN117135624A (en) * | 2023-10-27 | 2023-11-28 | 中国铁道科学研究院集团有限公司通信信号研究所 | Vehicle data wireless download method and system based on hybrid encryption and decryption algorithm |
Also Published As
| Publication number | Publication date |
|---|---|
| CN117473539A (en) | 2024-01-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110324143B (en) | Data transmission method, electronic device and storage medium | |
| US20240291668A1 (en) | Internet-of-things device identity authentication method, apparatus and system, and storage medium | |
| CN110149209B (en) | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment | |
| CN109547201B (en) | Encryption method of root key, computer readable storage medium and terminal equipment | |
| US20130114806A1 (en) | Method for encrypting a message through the computation of mathematical functions comprising modular multiplications | |
| CN108259171B (en) | Shader file protection method and device | |
| CN112035860B (en) | File encryption method, terminal, device, equipment and medium | |
| CN115941304B (en) | Data encryption method, device, terminal device and computer-readable storage medium | |
| CN110224834A (en) | Identity identifying method, decryption and ciphering terminal based on dynamic token | |
| CN108229144B (en) | Verification method of application program, terminal equipment and storage medium | |
| CN108830096B (en) | Data processing method and device, electronic equipment and storage medium | |
| CN110210591B (en) | Writing method of intelligent IC card personalized data, computer device and computer readable storage medium | |
| CN112199730A (en) | Method and device for processing application data on terminal and electronic equipment | |
| CN107248972B (en) | Data encryption and decryption method and device and electronic equipment | |
| CN111935197A (en) | Bidding document encryption and decryption method and device | |
| CN113645025A (en) | Data encryption storage method, storage device, user equipment and storage medium | |
| CN111177748A (en) | Fingerprint storage encryption method, device and system | |
| CN117473539B (en) | Data encryption method, data decryption method, terminal device, and readable storage medium | |
| CN113886850A (en) | Information encryption method, decryption method, apparatus, electronic device, storage medium | |
| CA2916341C (en) | Signature data transmission method and electronic signature token | |
| CN107959670B (en) | A method, device, terminal device and storage medium for generating a dynamic password | |
| CN116418566A (en) | SM encryption algorithm-based image data storage method and device | |
| CN116992474A (en) | Firmware encryption method and device | |
| CN110968878A (en) | Information transmission method, system, electronic device and readable medium | |
| KR101146509B1 (en) | Internet banking transaction system and the method that use maintenance of public security card to be mobile |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |