CN113572593B - Complex format parameter transmission method and device - Google Patents
Complex format parameter transmission method and device Download PDFInfo
- Publication number
- CN113572593B CN113572593B CN202110767958.3A CN202110767958A CN113572593B CN 113572593 B CN113572593 B CN 113572593B CN 202110767958 A CN202110767958 A CN 202110767958A CN 113572593 B CN113572593 B CN 113572593B
- Authority
- CN
- China
- Prior art keywords
- parameter
- parameters
- format
- encryption
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000005540 biological transmission Effects 0.000 title abstract description 19
- 230000006870 function Effects 0.000 claims description 71
- 238000004590 computer program Methods 0.000 claims description 16
- 238000012546 transfer Methods 0.000 claims description 10
- 238000003860 storage Methods 0.000 claims description 6
- 238000002716 delivery method Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 13
- 238000004891 communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 description 2
- 235000008434 ginseng Nutrition 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Communication Control (AREA)
Abstract
The invention provides a complex format parameter transmission method and a complex format parameter transmission device, which are applied to the technical field of network security. The method comprises the following steps: determining whether the incoming parameters are complex format parameters; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
Description
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for transmitting parameters in a complex format.
Background
When the application is designed and called, the use parameters are designed to improve the flexibility and expansibility of the program, and only the parameters are modified to play different roles, so that the program runs in a desired direction. However, the format requirements for the parameters are not the same, especially the software engineer always encounters unexpected format requirements for the parameters in the function call, and the situation is well solved in the self-written function, if the problem is encountered in a program interface which is used stably or a standard method, the program operation is often failed due to the failure of the check-in caused by some special characters in the check-in.
In the prior art, a special symbol replacement method is generally adopted, and the situation that one special character is replaced by one special character is found to be complex, so that the next character cannot be determined, the parameter format cannot be transmitted due to illegal format, and unpredictable risks exist.
Disclosure of Invention
The embodiment of the invention provides a complex format parameter transmission method, which is used for simply, quickly and safely transmitting complex format parameters, and comprises the following steps:
Determining whether the incoming parameters are complex format parameters;
when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
and transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm, and obtaining the decrypted complex format parameters.
The embodiment of the invention also provides a complex format parameter transmission device which is used for simply, quickly and safely transmitting complex format parameters, and comprises the following steps:
the parameter format determining module is used for determining whether the input parameters are complex format parameters or not;
The parameter encryption module is used for converting the input parameters into encryption parameters by using an SM encryption algorithm when the input parameters are parameters in a complex format;
And the parameter decryption module is used for transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using the SM encryption algorithm, and obtaining the decrypted complex format parameters.
The embodiment of the invention also provides computer equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the complex format parameter transmission method when executing the computer program.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program for executing the above-described complex format parameter transfer method.
In the embodiment of the invention, whether the input parameters are complex format parameters is determined; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a complex format parameter transmission method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a method for implementing step 101 in an embodiment of the present invention.
Fig. 3 is a schematic diagram of a method for implementing step 101 in another embodiment of the present invention.
Fig. 4 is a schematic diagram of a method for implementing step 102 in an embodiment of the present invention.
Fig. 5 is a schematic diagram of a complex format parameter transferring apparatus according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
For a better understanding of the embodiments of the present invention, the technical terms related to the embodiments of the present invention will be explained first:
Json: json (JavaScript Object Notation, JS object numbered musical notation) is a lightweight data exchange format. It stores and presents data in a text format that is completely independent of the programming language, based on a subset of ECMAScript (js specification formulated by the european computer institute). The compact and clear hierarchical structure makes Json an ideal data exchange language. Is easy to read and write by people, is easy to analyze and generate by machines, and effectively improves the network transmission efficiency.
SM4 encryption algorithm: SM4.0 (original name SMs 4.0) is a block cipher standard adopted by the government of the people's republic of China, issued by the national cipher administration on day 21, 3, 2012. The relevant standard is "GM/T0002-2012" SM4 block cipher algorithm (original SMS4 block cipher algorithm) ".
In a commercial cryptosystem, SM4 is mainly used for data encryption, an algorithm of the SM4 discloses that the packet length and the key length are 128 bits, the encryption algorithm and the key expansion algorithm both adopt a 32-round nonlinear iteration structure, and an S box is fixed 8-bit input and 8-bit output.
The instruction length in SM4.0 is raised to a level greater than 64K (i.e., 64 x 1024), which is 128 times the SM 3.0 specification (rendering instruction length allowed to be greater than 512).
The inventors have found that there may be two situations when parameters are passed into a function: (1) When the parameters to be transmitted do not meet the format check requirement of the function and the parameters are required to be transmitted; (2) At mian function entry, the incoming Json will automatically be converted into a string array, resulting in erroneous parameter readings.
For the first case, the method of replacing with special symbols is mostly used, and this case finds that replacing one special character with another one makes parameter transfer very complicated and there is an unpredictable risk. The Json character string transmitted by the main function inlet is automatically converted into a character string array, and the Json character string can be processed as the character string array without any solution; if Json string elements are numerous, the main function can be quite cumbersome to handle for the joining.
Therefore, an embodiment of the present invention provides a complex format parameter transmission method for simply, quickly and safely transmitting complex format parameters, as shown in fig. 1, where the method includes:
Step 101: determining whether the incoming parameters are complex format parameters;
Step 102: when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
step 103: and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters.
As can be seen from the flow shown in fig. 1, in the embodiment of the present invention, whether the incoming parameters are complex format parameters is determined; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
In implementation, first, it is determined whether the incoming parameters are complex format parameters, and the implementation process, as shown in fig. 2, includes:
Step 201: acquiring function information and incoming parameter information of parameter transfer;
step 202: and when the function is main function and the input parameter is Json character string according to the function information and the input parameter information of the parameter transfer, determining that the input parameter is a complex format parameter.
In a specific embodiment, the implementation method for determining whether the incoming parameters are complex format parameters, as shown in fig. 3, further includes, based on fig. 2:
Step 301: when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
Step 302: if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
After determining that the input parameters are parameters in a complex format, the input parameters are converted into encryption parameters by using an SM encryption algorithm. The specific implementation process, as shown in fig. 4, includes:
step 401: determining a part which does not meet the format requirement in the input parameters according to the format check result;
step 402: converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
Step 403: and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
In the specific embodiment, the problem of illegal parameters can be thoroughly solved by encrypting part of the content which does not accord with the parameter format into a 16-system character string through an SM4 encryption algorithm.
And after the SM encryption algorithm is utilized to convert the input parameters into the encryption parameters, the encryption parameters are transferred to the function. After the function is read, the encryption parameters read by the function are decrypted by using an SM encryption algorithm, and the decrypted complex format parameters are obtained. And (3) after decrypting the read encrypted character string, re-splicing the read encrypted character string with the rest of the parameters to obtain original parameter content, and transmitting the original parameter content to a subsequent program.
In the specific embodiment of the invention, an encryption algorithm is used for illegal parameters to convert illegal parts into character strings of pure letter data, and then the character strings are combined into legal parameters. The parameter content is not changed, but format checking when the function is participating (the parameter is imported) or excessive conversion of main function participating to Json format is avoided. Thereby solving the problem of illegally entering the ginseng at one time and quickly. And the encryption is carried out on the ginseng, so that the confidentiality is improved. The related work of the test is realized, and no bug is generated after the test is basically finished.
A specific example is given below to illustrate how the embodiment of the present invention performs complex format parameter delivery. The method is applied to main functions to input a large Json character string, and spaces exist in the large Json character string, so that the main functions can be used for inputting a plurality of parameters, and the subsequent program processing errors are caused.
The following are provided:
original entry of "name": "haidi", "id": "888", "remarks": "this is an sample" }
The intention is to take only one parameter and directly analyze it by Json
{“name”:”haidi”,”id”:”888”,”remarks”:”this is an example.”}
The actual input through the main function is divided by space.
First parameter: { "name": "haidi", "id": "888", "remarks": "this
The second parameter:
is
Third parameter:
an
fourth parameter:
example.”}
If the complex format parameter transmission method provided by the above embodiment is used for encryption, then:
original entry of "name": "haidi", "id": "888", "remarks": "this is an sample" }
After passing through the encryption process, it is similar to: ciphertext such as 4r5fse232dd8hfd is decrypted after the ciphertext is transmitted, and then the result is half-time according to Json analysis.
The implementation of the above specific application is only an example, and the rest of the embodiments are not described in detail.
Based on the same inventive concept, the embodiment of the present invention further provides a complex format parameter transmission device, and because the principle of the problem solved by the complex format parameter transmission device is similar to that of the complex format parameter transmission method, the implementation of the complex format parameter transmission device can refer to the implementation of the complex format parameter transmission method, and the repetition is omitted, and the specific structure is shown in fig. 5:
a parameter format determining module 501, configured to determine whether the incoming parameter is a complex format parameter;
the parameter encryption module 502 is configured to convert the input parameter into an encrypted parameter by using an SM encryption algorithm when the input parameter is a complex format parameter;
The parameter decryption module 503 is configured to transfer the encrypted parameter to a function, decrypt the encrypted parameter read by the function by using an SM encryption algorithm, and obtain a decrypted complex format parameter.
In a specific embodiment, the parameter format determining module 501 is specifically configured to:
acquiring function information and incoming parameter information of parameter transfer;
And determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information of parameter transfer.
Specifically, the parameter format determining module 501 is specifically configured to:
When the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the input parameter of the function is obtained;
if the format check result is that the special character exists, the input parameter is determined to be the complex format parameter.
Accordingly, in a specific embodiment, the parameter encryption module 502 is specifically configured to:
determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
The embodiment of the present invention further provides a computer device, and fig. 6 is a schematic diagram of the computer device in the embodiment of the present invention, where the computer device can implement all the steps in the complex format parameter transmission processing method in the foregoing embodiment, and the computer device specifically includes the following contents:
A processor 601, a memory 602, a communication interface (Communications Interface) 603, and a communication bus 604;
wherein the processor 601, the memory 602, and the communication interface 603 complete communication with each other through the communication bus 604; the communication interface 603 is used for implementing information transmission between related devices;
The processor 601 is configured to invoke a computer program in the memory 602, where the processor executes the computer program to implement the complex format parameter delivery method in the above embodiment.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program for executing the complex format parameter transmission method.
In summary, the embodiment of the invention provides a method and a device for transmitting complex format parameters, which have the following advantages:
By determining whether the incoming parameters are complex format parameters; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
Although the invention provides method operational steps as described in the examples or flowcharts, more or fewer operational steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When implemented by an actual device or client product, the instructions may be executed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment) as shown in the embodiments or figures.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, apparatus (system) or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments. In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The orientation or positional relationship indicated by the terms "upper", "lower", etc. are based on the orientation or positional relationship shown in the drawings, are merely for convenience of description and to simplify the description, and are not indicative or implying that the apparatus or elements in question must have a specific orientation, be constructed and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Unless specifically stated or limited otherwise, the terms "mounted," "connected," and "coupled" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances. It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The present invention is not limited to any single aspect, nor to any single embodiment, nor to any combination and/or permutation of these aspects and/or embodiments. Moreover, each aspect and/or embodiment of the invention may be used alone or in combination with one or more other aspects and/or embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.
Claims (6)
1. A complex format parameter delivery method, comprising:
Determining whether the incoming parameters are complex format parameters;
when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters;
determining whether the incoming parameter is a complex format parameter includes:
acquiring function information and incoming parameter information of parameter transfer;
determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information transferred by the parameter;
determining whether the incoming parameter is a complex format parameter further comprises:
when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
And if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
2. The complex-format parameter transfer method of claim 1, wherein when the incoming parameter is a complex-format parameter, converting the incoming parameter into the encrypted parameter using an SM encryption algorithm, comprises:
Determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
3. A complex format parameter delivery device, comprising:
the parameter format determining module is used for determining whether the input parameters are complex format parameters or not;
The parameter encryption module is used for converting the input parameters into encryption parameters by using an SM encryption algorithm when the input parameters are parameters in a complex format;
the parameter decryption module is used for transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using the SM encryption algorithm, and obtaining decrypted complex format parameters;
The parameter format determining module is specifically configured to:
acquiring function information and incoming parameter information of parameter transfer;
determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information transferred by the parameter;
The parameter format determining module is specifically configured to:
when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
And if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
4. A complex-format parameter delivery device according to claim 3, wherein the parameter encryption module is specifically configured to:
Determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 2 when executing the computer program.
6. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the steps of the method of any of claims 1 to 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110767958.3A CN113572593B (en) | 2021-07-07 | 2021-07-07 | Complex format parameter transmission method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110767958.3A CN113572593B (en) | 2021-07-07 | 2021-07-07 | Complex format parameter transmission method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113572593A CN113572593A (en) | 2021-10-29 |
CN113572593B true CN113572593B (en) | 2024-04-19 |
Family
ID=78163935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110767958.3A Active CN113572593B (en) | 2021-07-07 | 2021-07-07 | Complex format parameter transmission method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113572593B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766264A (en) * | 2018-12-15 | 2019-05-17 | 深圳壹账通智能科技有限公司 | Method of calibration, device, computer equipment and the storage medium of interface parameters |
CN110138818A (en) * | 2018-02-09 | 2019-08-16 | 北京京东尚科信息技术有限公司 | Method, website application, system, device and the serving backend of Transfer Parameters |
CN110611670A (en) * | 2019-09-12 | 2019-12-24 | 贵阳叁玖互联网医疗有限公司 | API request encryption method and device |
CN112383522A (en) * | 2020-11-02 | 2021-02-19 | 浙江苍南仪表集团股份有限公司 | Function parameter data transmission encryption method, system, device and readable storage medium |
CN112966303A (en) * | 2021-03-10 | 2021-06-15 | 中国民航信息网络股份有限公司 | Data encryption and decryption method and device, electronic equipment and computer storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9634838B2 (en) * | 2014-06-05 | 2017-04-25 | International Business Machines Corporation | Complex format-preserving encryption scheme |
-
2021
- 2021-07-07 CN CN202110767958.3A patent/CN113572593B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138818A (en) * | 2018-02-09 | 2019-08-16 | 北京京东尚科信息技术有限公司 | Method, website application, system, device and the serving backend of Transfer Parameters |
CN109766264A (en) * | 2018-12-15 | 2019-05-17 | 深圳壹账通智能科技有限公司 | Method of calibration, device, computer equipment and the storage medium of interface parameters |
CN110611670A (en) * | 2019-09-12 | 2019-12-24 | 贵阳叁玖互联网医疗有限公司 | API request encryption method and device |
CN112383522A (en) * | 2020-11-02 | 2021-02-19 | 浙江苍南仪表集团股份有限公司 | Function parameter data transmission encryption method, system, device and readable storage medium |
CN112966303A (en) * | 2021-03-10 | 2021-06-15 | 中国民航信息网络股份有限公司 | Data encryption and decryption method and device, electronic equipment and computer storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN113572593A (en) | 2021-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barker et al. | Recommendation for the triple data encryption algorithm (TDEA) block cipher | |
Maram et al. | Intelligent security algorithm for UNICODE data privacy and security in IOT | |
Datta et al. | Protocol composition logic (PCL) | |
CN1117463C (en) | Method of transmitting information data from a sender to a receiver via a transcoder | |
US8938067B2 (en) | Format preserving encryption methods for data strings with constraints | |
JP2021513141A (en) | Generation and identification of 2D barcodes | |
Durante et al. | Automatic testing equivalence verification of spi calculus specifications | |
JP2016521875A (en) | Data protection | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
US20210279341A1 (en) | Cryptographic security system, method, and program product using data partitioning | |
JP5843261B2 (en) | A system that authenticates whether a string is accepted by an automaton | |
CN106789058B (en) | Proxy re-encryption algorithm description and analysis method | |
WO2021084507A1 (en) | System and method for encryption and decryption using logic synthesis | |
Jaswanth et al. | Data Encryption: A Compiler Based Approach | |
CN113572593B (en) | Complex format parameter transmission method and device | |
JP4938430B2 (en) | Nonlinear function unit, stream cipher encryption apparatus, decryption apparatus, MAC generation apparatus, stream cipher encryption method, decryption method, MAC generation method, and program | |
CN104393988A (en) | Reversible data encryption method and device | |
CN107241185A (en) | Data transmitting and receiving method and transmission and reception device | |
JP5415020B2 (en) | Stream cipher encryption apparatus, decryption apparatus, MAC generation apparatus, stream cipher encryption method, decryption method, MAC generation method, and program | |
CN113746642A (en) | Method and system for communication between computers | |
JP2010256749A (en) | Device and method for generating hash value, and program | |
Keller et al. | Converting alice&bob protocol specifications to tamarin | |
Abdul-Jabbar | Secure QR-code generation in healthcare | |
Pan et al. | Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |