Nothing Special   »   [go: up one dir, main page]

CN114282239A - Data encryption method, device, storage medium and processor - Google Patents

Data encryption method, device, storage medium and processor Download PDF

Info

Publication number
CN114282239A
CN114282239A CN202111585259.3A CN202111585259A CN114282239A CN 114282239 A CN114282239 A CN 114282239A CN 202111585259 A CN202111585259 A CN 202111585259A CN 114282239 A CN114282239 A CN 114282239A
Authority
CN
China
Prior art keywords
data
encrypted
target object
displacement
dimensional information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111585259.3A
Other languages
Chinese (zh)
Other versions
CN114282239B (en
Inventor
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111585259.3A priority Critical patent/CN114282239B/en
Publication of CN114282239A publication Critical patent/CN114282239A/en
Application granted granted Critical
Publication of CN114282239B publication Critical patent/CN114282239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本申请公开了一种数据加密方法、装置、存储介质及处理器。该方法包括:获取待加密数据以及目标对象的多维度信息;基于目标对象的多维度信息确定在对待加密数据进行加密时使用的数字特征;将多维度信息分别转换为预设物理运动的运动参数;确定运动参数对应的目标物理值,至少基于目标物理值对待加密数据进行加密。本申请解决了现有技术对用户信息进行加密存在密钥外泄,造成的用户信息安全度不高的技术问题。

Figure 202111585259

The present application discloses a data encryption method, device, storage medium and processor. The method includes: acquiring data to be encrypted and multi-dimensional information of a target object; determining digital features used when encrypting data to be encrypted based on the multi-dimensional information of the target object; converting the multi-dimensional information into motion parameters of preset physical motions respectively ; Determine the target physical value corresponding to the motion parameter, at least encrypt the data to be encrypted based on the target physical value. The present application solves the technical problem of low security of user information caused by leakage of the key when encrypting user information in the prior art.

Figure 202111585259

Description

Data encryption method, device, storage medium and processor
Technical Field
The present application relates to the field of data encryption, and in particular, to a data encryption method, apparatus, storage medium, and processor.
Background
With the rapid development of information technology, the internet is no longer a strange word, more and more people join the ranks of internet users, and the network changes the living space and the living mode of people in a rapid, convenient and super-space-time transfer mode. Meanwhile, how to ensure that personal information can be safely transmitted on the network also becomes a serious concern for internet practitioners.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a data encryption method, a data encryption device, a storage medium and a processor, and at least solves the technical problem that in the prior art, when user information is encrypted, a secret key leaks out, and the safety degree of the user information is not high.
According to an aspect of an embodiment of the present application, there is provided a data encryption method, including: acquiring data to be encrypted and multi-dimensional information of a target object; determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; respectively converting the multi-dimensional information into motion parameters of preset physical motion; determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and encrypting the data to be encrypted at least based on the target physical value.
Optionally, the obtaining of the data to be encrypted and the determining of the digital feature used when encrypting the data to be encrypted based on the multidimensional information of the target object include: acquiring digital content and non-digital content of multi-dimensional information; determining the digital content as a first digital characteristic; the non-digital content is converted to obtain a second digital characteristic.
Optionally, the converting the multi-dimensional information into motion parameters of a preset physical motion respectively includes: determining the name of a target object in the multi-dimensional information; converting the name of the target object into a second digital characteristic, and determining the second digital characteristic as a constant parameter in the motion parameters; acquiring the age of a target object in multi-dimensional information; obtaining a first variable parameter in the motion parameters according to the age of the target object; acquiring time consumed by a target object to carry out verification operation on a verification interface before data to be encrypted is input; the elapsed time is determined as a second variable parameter of the motion parameters.
Optionally, determining a target physical value corresponding to the motion parameter includes: obtaining a first displacement of the preset physical motion in the horizontal direction according to the first variable parameter and the second variable parameter; obtaining a second displacement of the preset physical motion in the vertical direction according to the constant parameter and the second variable parameter; and obtaining a combined displacement according to the first displacement and the second displacement.
Optionally, encrypting data to be encrypted based on at least the target physical value includes: acquiring a randomly generated character string; splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key; and encrypting the data to be encrypted based on the encryption key.
Optionally, obtaining a randomly generated character string includes: arranging and combining the constant parameters, the first variable parameters and the second variable parameters to obtain a plurality of groups of arrays; a group of arrays is randomly selected from the plurality of groups of arrays, and the array is determined as a character string.
Encrypting data to be encrypted based on a key, comprising: acquiring a first data length of data to be encrypted, wherein the first data length is used for indicating the number of bytes occupied by the data to be encrypted; acquiring a second data length of the secret key, and performing remainder operation on the second data length based on the first data length to obtain a first remainder value, wherein the second data length is used for indicating the number of bytes occupied by the secret key; determining the insertion position of the key in the data to be encrypted according to the first residual value; and inserting the key into the insertion position to encrypt the data to be encrypted.
Determining the insertion position of the key in the data to be encrypted according to the first residual value, comprising: determining the first residual value as the insertion position of the key in the data to be encrypted under the condition that the first residual value is smaller than the first data length; and under the condition that the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value, and determining the second residual value as the insertion position of the key in the data to be encrypted.
According to another aspect of the embodiments of the present application, there is also provided a data encryption apparatus, including: the acquisition module is used for acquiring data to be encrypted and multi-dimensional information of a target object; the first determining module is used for determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; the conversion module is used for respectively converting the multi-dimensional information into motion parameters of preset physical motion; the second determination module is used for determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and the encryption module is used for encrypting the data to be encrypted at least based on the target physical value.
According to another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium, which includes a stored program, and controls a device in which the nonvolatile storage medium is located to execute the above-mentioned data encryption method when the program is executed.
According to another aspect of the embodiments of the present application, there is further provided a processor, wherein the processor is configured to execute a program, and the program executes the data encryption method.
In the embodiment of the application, the digital characteristics used when the information to be encrypted is encrypted are determined by adopting the multidimensional information based on the information to be encrypted and the target object, then the multidimensional information is respectively converted into the motion parameters of the preset physical motion, the target physical value is determined based on the motion parameters, and finally the data to be encrypted is encrypted based on the target physical value.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of a computer terminal for implementing a data encryption method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a data encryption method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a data encryption apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present application, there is provided an embodiment of a data encryption method, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The data encryption method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation device. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing a data encryption method. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …, 102 n) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the data encryption method in the embodiment of the present application, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, so as to implement the data encryption method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
It should be noted here that in some alternative embodiments, the computer device (or mobile device) shown in fig. 1 described above may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that fig. 1 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in the computer device (or mobile device) described above.
Under the operating environment, the embodiment of the application provides a data encryption method as shown in fig. 2.
Fig. 2 is a flowchart of a data encryption method according to an embodiment of the present application, as shown in fig. 2, the method includes the following steps:
step S202, acquiring data to be encrypted and multi-dimensional information of a target object;
step S204, determining digital characteristics used when encrypting data to be encrypted based on the multidimensional information of the target object, wherein the data to be encrypted comprises: password data set by the target object;
step S206, converting the multi-dimensional information into motion parameters of preset physical motion respectively;
step S208, determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction;
step S210, encrypting the data to be encrypted at least based on the target physical value.
The method comprises the steps of determining digital characteristics used when information to be encrypted is encrypted through acquired information to be encrypted and multidimensional information of a target object, converting the multidimensional information into motion parameters of preset physical motion respectively, determining a target physical value based on the motion parameters, and finally encrypting the data to be encrypted based on the target physical value, so that the purpose of preventing encrypted data from being leaked is achieved, the technical effect of performing deeper encryption on user information by using a parabolic secret key is achieved, and the technical problem that the user information is not high in safety degree due to the fact that the secret key leaks when the user information is encrypted in the prior art is solved.
Alternatively, in step S202, the data to be encrypted and the multidimensional information of the target object may be acquired in the following manner. In some embodiments of the present application, the data to be encrypted and the multidimensional information of the target object are actively selected by the target object or determined by the encryption system. For example: under the condition that an encryption system monitors that a target object is suspected to exist and personal information is input, acquiring data to be encrypted and multi-dimensional information of the target object, wherein the data to be encrypted at least comprises the following components: account data, password data and personal asset data in the account, and the multi-dimensional information of the target object at least comprises the following steps: the information of the internet protocol address of the remote device of the target object, the type information of the remote device, the name and the age of the target object, and the like.
Optionally, in step S204, the following manner may be adopted to determine the digital characteristics used in encrypting the data to be encrypted based on the multidimensional information of the target object, where the data to be encrypted includes: cryptographic data set by the target object. Specifically, digital content and non-digital content of multi-dimensional information are obtained; determining the digital content as a first digital characteristic; the non-digital content is converted to obtain a second digital characteristic.
In some optional embodiments of the present application, the digital content and the non-digital content in the multi-dimensional information of the target object are determined, for example, if it is determined that the internet protocol address information of the remote device of the target object is digital content, it is determined that the type information of the remote device and the name of the target object are non-digital content; and determining the Internet protocol address information as a first digital characteristic, and converting the type information of the remote equipment and the name of the target object into a second digital characteristic.
Alternatively, in step S206, the multidimensional information may be respectively converted into motion parameters of the preset physical motion through the following specific steps. Specifically, determining the name of a target object in the multi-dimensional information; converting the name of the target object into a second digital characteristic, and determining the second digital characteristic as a constant parameter in the motion parameters; acquiring the age of a target object in multi-dimensional information; obtaining a first variable parameter in the motion parameters according to the age of the target object; acquiring time consumed by a target object to carry out verification operation on a verification interface before data to be encrypted is input; the elapsed time is determined as a second variable parameter of the motion parameters.
In some embodiments of the present application, the name of the target object may be converted into a second digital feature as the gravitational acceleration g, i.e. a constant parameter in the horizontal projectile motion; converting the age of the target object into a second digital feature as an initial velocity v in the horizontal direction of the horizontal projectile motion0I.e. the first variable parameter in the horizontal projectile motion; and converting the time consumed by the target object for verification operation on the verification interface into a second digital characteristic before the target object inputs the data to be encrypted, wherein the second digital characteristic is used as the time t of the horizontal projectile motion, namely a second variable parameter in the horizontal projectile motion.
Alternatively, in step S208, the target physical value corresponding to the motion parameter is determined in the following manner. Specifically, a first displacement of the preset physical motion in the horizontal direction is obtained according to a first variable parameter and a second variable parameter; obtaining a second displacement of the preset physical motion in the vertical direction according to the constant parameter and the second variable parameter; and obtaining a combined displacement according to the first displacement and the second displacement.
Determining a parameter v according to a first variable based on a correlation formula of the horizontal projectile motion0A first displacement of the preset physical movement in the horizontal direction, obtained with the second variable parameter t: s ═ v0X t (i.e. initial velocity v in horizontal direction)0Uniform linear motion); determining a pre-value obtained according to a constant parameter g and a second variable parameter tSetting a second displacement of the physical movement in the vertical direction: h ═ 1/2) gt2(i.e., the vertical direction is free fall movement); and combining the vector of the first displacement and the vector of the second displacement to obtain a vector of a combined displacement, and further determining the combined displacement. It is easy to understand that the first displacement s, the second displacement h, and the resultant displacement can be used as a flat throw motion key generated based on a flat throw motion.
Optionally, in step S210, the data to be encrypted is encrypted based on at least the target physical value in the following manner. Specifically, a randomly generated character string is obtained; splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key; and encrypting the data to be encrypted based on the encryption key.
Optionally, obtaining a randomly generated character string includes: arranging and combining the constant parameters, the first variable parameters and the second variable parameters to obtain a plurality of groups of arrays; a group of arrays is randomly selected from the plurality of groups of arrays, and the array is determined as a character string. For example, a constant parameter g, a first variable parameter v0The second variable parameter t is arranged and combined to obtain a plurality of groups, such as a numeral group [1]]={g,v0}, array [2]{ g, t }, array [3 }]={v0T, and randomly selecting an array as a character string.
In some embodiments of the present application, the first shift s, the second shift h, the combined shift, and the character string may be concatenated to obtain the encryption key.
Optionally, encrypting the data to be encrypted based on the key is implemented by: acquiring a first data length of data to be encrypted, wherein the first data length is used for indicating the number of bytes occupied by the data to be encrypted; acquiring a second data length of the secret key, and performing remainder operation on the second data length based on the first data length to obtain a first remainder value, wherein the second data length is used for indicating the number of bytes occupied by the secret key; determining the insertion position of the key in the data to be encrypted according to the first residual value; and inserting the key into the insertion position to encrypt the data to be encrypted. Specifically, the following method is adopted to determine the insertion position of the key in the data to be encrypted according to the first residual value: determining the first residual value as the insertion position of the key in the data to be encrypted under the condition that the first residual value is smaller than the first data length; and under the condition that the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value, and determining the second residual value as the insertion position of the key in the data to be encrypted.
In some optional embodiments of the present application, the data to be encrypted may be encrypted by: acquiring a first data length of data to be encrypted, wherein the first data length of a user password "165943 xfy 2" is 100 bits, and the number of intervals of the first data length is 11, wherein the left side of "1" is a start interval of the first data length, a first interval of the first data length is between "1" and "6", and so on, the ninth interval of the first data length is between "y" and "2", and the tenth interval of the first data length is on the right side of "2"; acquiring a second data length of the key, wherein the second data length of the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] is 12 bits; based on the first data length, carrying out remainder operation on the second data length to obtain a first remainder value 4; and based on the fact that the first remainder 4 is smaller than the interval number 11 in the first data length, determining a fourth interval position in the first data length corresponding to the first remainder 4 as an insertion position of the key in the data to be encrypted, inserting the key formed by splicing the first displacement s, the second displacement h, the resultant displacement and the array [1] into the fourth interval position in the first data length, and encrypting the data to be encrypted.
In some embodiments of the present application, if the user password is "1659", the first data length is 66 bits, and the number of intervals of the first data length is 5; under the condition that the second data length of the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] is 12 bits, carrying out remainder operation on the second data length based on the first data length to obtain a first remainder 6, wherein the first remainder 6 is larger than the interval number 5 of the first data length; when the first residual value is larger than the first data length, carrying out remainder operation on the first residual value based on the first data length to obtain a second residual value 0, wherein the second residual value 0 is smaller than the interval quantity 5 of the first data length; and based on the second remainder value 0, determining the initial interval position in the first data length corresponding to the second remainder value 0 as the insertion position of the key in the data to be encrypted, inserting the key formed by splicing the first displacement s, the second displacement h, the combined displacement and the array [1] into the initial interval position in the first data length, and encrypting the data to be encrypted.
When the first remainder is larger than the first data length, the first remainder is subjected to remainder operation based on the first data length to obtain a second remainder, and the second remainder is determined as the insertion position of the key in the data to be encrypted
Fig. 3 is a data encryption apparatus according to an embodiment of the present application, and as shown in fig. 3, the apparatus includes the following modules:
the acquiring module 40 is used for acquiring data to be encrypted and multi-dimensional information of a target object;
a first determining module 42, configured to determine, based on the multidimensional information of the target object, a digital feature used when encrypting data to be encrypted, where the data to be encrypted includes: password data set by the target object;
the conversion module 44 is configured to convert the multidimensional information into motion parameters of a preset physical motion respectively;
a second determining module 46, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate displacement of the preset physical motion in each direction;
and the encryption module 48 is used for encrypting the data to be encrypted at least based on the target physical value.
In the data encryption device, an acquisition module 40 is used for acquiring data to be encrypted and multi-dimensional information of a target object; a first determining module 42, configured to determine, based on the multidimensional information of the target object, a digital feature used when encrypting data to be encrypted, where the data to be encrypted includes: password data set by the target object; the conversion module 44 is configured to convert the multidimensional information into motion parameters of a preset physical motion respectively; a second determining module 46, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate displacement of the preset physical motion in each direction; the encryption module 48 is configured to encrypt the data to be encrypted at least based on the target physical value, so as to achieve the purpose of preventing the encrypted data from being leaked, thereby achieving the technical effect of performing deeper encryption on the user information by using the parabolic key, and further solving the technical problem that the user information is not high in security because the key leaks when the user information is encrypted in the prior art.
In the data encryption module, the first determination module comprises: the device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring digital content and non-digital content of multi-dimensional information; a first determining unit, configured to determine that the digital content is a first digital feature; and the conversion unit is used for converting the non-digital content to obtain the second digital characteristic.
In some embodiments of the present application, the conversion module comprises: the second determining unit is used for determining the name of the target object in the multi-dimensional information; the third determining unit is used for converting the name of the target object into a second digital characteristic and determining the second digital characteristic as a constant parameter in the motion parameters; the second acquisition unit is used for acquiring the age of the target object in the multi-dimensional information; the obtaining unit is used for obtaining a first variable parameter in the motion parameters according to the age of the target object; the verification unit is used for acquiring the time consumed by the target object to perform verification operation on a verification interface before the target object inputs the data to be encrypted; and a fourth determination unit for determining the consumed time as a second variable parameter among the motion parameters.
According to another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and the program, when running, controls a device in which the nonvolatile storage medium is located to execute the above-mentioned data encryption method.
The storage medium is used for storing program instructions for executing the following functions, and the following functions are realized, namely acquiring data to be encrypted and multidimensional information of a target object; determining digital characteristics used when encrypting data to be encrypted based on multi-dimensional information of a target object, wherein the data to be encrypted comprises: password data set by the target object; respectively converting the multi-dimensional information into motion parameters of preset physical motion; determining a target physical value corresponding to the motion parameter, wherein the target physical value is used for indicating the displacement of the preset physical motion in each direction; and encrypting the data to be encrypted at least based on the target physical value.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (11)

1.一种数据加密方法,其特征在于,包括:1. a data encryption method, is characterized in that, comprises: 获取待加密数据以及目标对象的多维度信息;Obtain the data to be encrypted and the multi-dimensional information of the target object; 基于目标对象的多维度信息确定在对所述待加密数据进行加密时使用的数字特征,所述待加密数据包括:所述目标对象设置的密码数据;Determine the digital feature used when encrypting the data to be encrypted based on the multi-dimensional information of the target object, where the data to be encrypted includes: password data set by the target object; 将所述多维度信息分别转换为预设物理运动的运动参数;converting the multi-dimensional information into motion parameters of preset physical motions respectively; 确定所述运动参数对应的目标物理值,所述目标物理值用于指示所述预设物理运动在各个方向的位移;determining a target physical value corresponding to the motion parameter, where the target physical value is used to indicate the displacement of the preset physical motion in various directions; 至少基于所述目标物理值对所述待加密数据进行加密。The data to be encrypted is encrypted based on at least the target physical value. 2.根据权利要求1所述的方法,其特征在于,获取待加密数据,基于目标对象的多维度信息确定在对所述待加密数据进行加密时使用的数字特征,包括:2. The method according to claim 1, characterized in that, obtaining data to be encrypted, and determining a digital feature used when encrypting the data to be encrypted based on the multi-dimensional information of the target object, comprising: 获取所述多维度信息的数字内容与非数字内容;obtaining digital content and non-digital content of the multi-dimensional information; 确定所述数字内容为第一数字特征;determining that the digital content is a first digital feature; 对所述非数字内容进行转换得到第二数字特征。Converting the non-digital content results in a second digital feature. 3.根据权利要求2所述的方法,其特征在于,将所述多维度信息分别转换为预设物理运动的运动参数,包括:3. The method according to claim 2, wherein the multi-dimensional information is respectively converted into motion parameters of preset physical motion, comprising: 确定所述多维度信息中所述目标对象的名字;determining the name of the target object in the multi-dimensional information; 将所述目标对象的名字转换为所述第二数字特征,确定所述第二数字特征为所述运动参数中的常量参数;Converting the name of the target object into the second digital feature, and determining that the second digital feature is a constant parameter in the motion parameter; 获取所述多维度信息中所述目标对象的年龄;obtaining the age of the target object in the multi-dimensional information; 根据目标对象的年龄得到所述运动参数中的第一变量参数;Obtain the first variable parameter in the motion parameters according to the age of the target object; 获取目标对象在输入待加密数据之前,在验证界面进行验证操作所消耗的时间;Obtain the time consumed by the target object to perform the verification operation on the verification interface before entering the data to be encrypted; 将所述所消耗的时间确定为所述运动参数中的第二变量参数。The elapsed time is determined as a second variable parameter of the motion parameters. 4.根据权利要求3所述的方法,其特征在于,确定所述运动参数对应的目标物理值,包括:4. The method according to claim 3, wherein determining the target physical value corresponding to the motion parameter comprises: 根据所述第一变量参数与所述第二变量参数得到所述预设物理运动在水平方向上的第一位移;obtaining the first displacement of the preset physical movement in the horizontal direction according to the first variable parameter and the second variable parameter; 根据所述常量参数与所述第二变量参数得到所述预设物理运动在竖直方向上的第二位移;Obtaining the second displacement of the preset physical movement in the vertical direction according to the constant parameter and the second variable parameter; 根据所述第一位移与所述第二位移得到合位移。A combined displacement is obtained according to the first displacement and the second displacement. 5.根据权利要求4所述的方法,其特征在于,至少基于所述目标物理值对所述待加密数据进行加密,包括:5. The method according to claim 4, wherein encrypting the data to be encrypted based on at least the target physical value comprises: 获取随机生成的字符串;Get a randomly generated string; 将所述第一位移、所述第二位移、所述合位移与所述字符串进行拼接得到加密密钥;Splicing the first displacement, the second displacement, the combined displacement and the character string to obtain an encryption key; 基于所述加密密钥对所述待加密数据进行加密。The data to be encrypted is encrypted based on the encryption key. 6.根据权利要求5所述的方法,其特征在于,获取随机生成的字符串,包括:6. The method according to claim 5, wherein obtaining a randomly generated character string, comprising: 对所述常量参数、第一变量参数与所述第二变量参数进行排列组合,得到多组数组;Arrange and combine the constant parameter, the first variable parameter and the second variable parameter to obtain multiple groups of arrays; 从所述多组数组随机选中一组数组,将该数组确定为所述字符串。A group of arrays is randomly selected from the plurality of groups of arrays, and the array is determined as the character string. 7.根据权利要求5所述的方法,其特征在于,基于所述密钥对所述待加密数据进行加密,包括:7. The method according to claim 5, wherein encrypting the data to be encrypted based on the key comprises: 获取所述待加密数据的第一数据长度,所述第一数据长度用于指示所述待加密数据所占用的字节数;Obtain the first data length of the data to be encrypted, where the first data length is used to indicate the number of bytes occupied by the data to be encrypted; 获取所述密钥的第二数据长度,基于第一数据长度对第二数据长度进行取余运算,得到第一余值,所述第二数据长度用于指示所述密钥所占用的字节数;Obtain the second data length of the key, and perform a remainder operation on the second data length based on the first data length to obtain a first remainder value, where the second data length is used to indicate the bytes occupied by the key number; 根据所述第一余值确定所述密钥在所述待加密数据的插入位置;Determine the insertion position of the key in the data to be encrypted according to the first residual value; 将所述密钥插入至所述插入位置对所述待加密数据进行加密。The data to be encrypted is encrypted by inserting the key into the insertion position. 8.根据权利要求7所述的方法,其特征在于,根据所述第一余值确定所述密钥在所述待加密数据的插入位置,包括:8. The method according to claim 7, wherein determining the insertion position of the key in the to-be-encrypted data according to the first residual value, comprising: 在所述第一余值小于所述第一数据长度的情况下,将所述第一余值确定为所述密钥在所述待加密数据的插入位置;In the case that the first residual value is smaller than the first data length, determining the first residual value as the insertion position of the key in the to-be-encrypted data; 在所述第一余值大于所述第一数据长度的情况下,基于所述第一数据长度对所述第一余值进行取余运算,得到第二余值,将所述第二余值确定为所述密钥在所述待加密数据的插入位置。In the case where the first residual value is greater than the first data length, a remainder operation is performed on the first residual value based on the first data length to obtain a second residual value, and the second residual value is It is determined as the insertion position of the key in the data to be encrypted. 9.一种数据加密装置,其特征在于,包括:9. A data encryption device, comprising: 获取模块,用于获取待加密数据以及目标对象的多维度信息;The acquisition module is used to acquire the data to be encrypted and the multi-dimensional information of the target object; 第一确定模块,用于基于目标对象的多维度信息确定在对所述待加密数据进行加密时使用的数字特征,所述待加密数据包括:所述目标对象设置的密码数据;a first determining module, configured to determine, based on the multi-dimensional information of the target object, a digital feature used when encrypting the data to be encrypted, where the data to be encrypted includes: cipher data set by the target object; 转换模块,用于将所述多维度信息分别转换为预设物理运动的运动参数;a conversion module for converting the multi-dimensional information into motion parameters of preset physical motions respectively; 第二确定模块,用于确定所述运动参数对应的目标物理值,所述目标物理值用于指示所述预设物理运动在各个方向的位移;a second determination module, configured to determine a target physical value corresponding to the motion parameter, where the target physical value is used to indicate the displacement of the preset physical motion in various directions; 加密模块,用于至少基于所述目标物理值对所述待加密数据进行加密。An encryption module, configured to encrypt the data to be encrypted based on at least the target physical value. 10.一种非易失性存储介质,其特征在于,所述非易失性存储介质包括存储的程序,在所述程序运行时控制所述非易失性存储介质所在设备执行权利要求1至8中任意一项所述的数据加密方法。10. A non-volatile storage medium, characterized in that, the non-volatile storage medium comprises a stored program, and when the program runs, a device where the non-volatile storage medium is located is controlled to execute claims 1 to 10. The data encryption method described in any one of 8. 11.一种处理器,其特征在于,所述处理器用于运行程序,所述程序运行时执行权利要求1至8中任意一项所述的数据加密方法。11. A processor, wherein the processor is configured to run a program, and when the program runs, the data encryption method according to any one of claims 1 to 8 is executed.
CN202111585259.3A 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor Active CN114282239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111585259.3A CN114282239B (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111585259.3A CN114282239B (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Publications (2)

Publication Number Publication Date
CN114282239A true CN114282239A (en) 2022-04-05
CN114282239B CN114282239B (en) 2024-12-27

Family

ID=80874109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111585259.3A Active CN114282239B (en) 2021-12-22 2021-12-22 Data encryption method, device, storage medium and processor

Country Status (1)

Country Link
CN (1) CN114282239B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116260659A (en) * 2023-05-15 2023-06-13 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10121022B1 (en) * 2017-10-09 2018-11-06 Jason McNutt Methods and systems for encrypting data using object-based screens
US20200159944A1 (en) * 2017-10-09 2020-05-21 Jason McNutt Methods and systems for encrypting data using object-based screens
CN113111357A (en) * 2021-03-09 2021-07-13 深圳市教育信息技术中心(深圳市教育装备中心) Field encryption method, device, equipment and medium
US20210243595A1 (en) * 2020-02-05 2021-08-05 Lookout Inc. Use Of Geolocation To Improve Security While Protecting Privacy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10121022B1 (en) * 2017-10-09 2018-11-06 Jason McNutt Methods and systems for encrypting data using object-based screens
US20200159944A1 (en) * 2017-10-09 2020-05-21 Jason McNutt Methods and systems for encrypting data using object-based screens
US20210243595A1 (en) * 2020-02-05 2021-08-05 Lookout Inc. Use Of Geolocation To Improve Security While Protecting Privacy
CN113111357A (en) * 2021-03-09 2021-07-13 深圳市教育信息技术中心(深圳市教育装备中心) Field encryption method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
于浩, 王伟: "宽带电力线MIMO通信物理层安全传输方法", 《电力信息与通信技术》, vol. 15, no. 01, 15 January 2017 (2017-01-15), pages 94 - 97 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116260659A (en) * 2023-05-15 2023-06-13 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet
CN116260659B (en) * 2023-05-15 2023-07-11 典基网络科技(上海)有限公司 Method for processing packet loss of ipsec data packet

Also Published As

Publication number Publication date
CN114282239B (en) 2024-12-27

Similar Documents

Publication Publication Date Title
CN107959656B (en) Data security guarantee system, method and device
JP6720424B1 (en) Key sharing device and method
CN110400164B (en) Data determining method and device, storage medium and electronic device
CN112380464B (en) Short link generation method and related equipment
CN110427779A (en) A kind of the Encrypt and Decrypt method and data server of database table field
CN113691502A (en) Communication method, communication device, gateway server, client and storage medium
CN110519052B (en) Data interaction method and device based on Internet of things operating system
CN111512590B (en) Homomorphic encryption for password authentication
US9641328B1 (en) Generation of public-private key pairs
CN110912682A (en) Data processing method, device and system
CN114443718B (en) A data query method and system
CN116663038A (en) Data encryption method and device and electronic equipment
CN114282239B (en) Data encryption method, device, storage medium and processor
CN110290192B (en) Block chain-based data distributed storage and data acquisition method and device
CN110287733B (en) File tamper-proofing method and device
Guo et al. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks
CN114338009B (en) Data encryption method and device and nonvolatile storage medium
CN109560918B (en) Method for generating NTRU key and terminal equipment
CN118041605A (en) Access control method and system for local resources
CN113452513B (en) Key distribution method, device and system
Xie et al. Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps
CN115150073A (en) Cloud service unified identity authentication method, device and equipment based on biological characteristics
CN114329415A (en) A Mobile Web Login Password Encryption Method Based on Random Image Scheme
CN114254349A (en) Data encryption method and device and electronic equipment
US20220303124A1 (en) Key exchange system, communication apparatus, key exchange method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant