Nothing Special   »   [go: up one dir, main page]

CN113572593B - Complex format parameter transmission method and device - Google Patents

Complex format parameter transmission method and device Download PDF

Info

Publication number
CN113572593B
CN113572593B CN202110767958.3A CN202110767958A CN113572593B CN 113572593 B CN113572593 B CN 113572593B CN 202110767958 A CN202110767958 A CN 202110767958A CN 113572593 B CN113572593 B CN 113572593B
Authority
CN
China
Prior art keywords
parameter
parameters
format
encryption
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110767958.3A
Other languages
Chinese (zh)
Other versions
CN113572593A (en
Inventor
朱阿龙
田林
石慧彪
张小乐
刘琦
张靖羚
豆敏娟
何聪聪
刘宇琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110767958.3A priority Critical patent/CN113572593B/en
Publication of CN113572593A publication Critical patent/CN113572593A/en
Application granted granted Critical
Publication of CN113572593B publication Critical patent/CN113572593B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Communication Control (AREA)

Abstract

The invention provides a complex format parameter transmission method and a complex format parameter transmission device, which are applied to the technical field of network security. The method comprises the following steps: determining whether the incoming parameters are complex format parameters; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.

Description

Complex format parameter transmission method and device
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for transmitting parameters in a complex format.
Background
When the application is designed and called, the use parameters are designed to improve the flexibility and expansibility of the program, and only the parameters are modified to play different roles, so that the program runs in a desired direction. However, the format requirements for the parameters are not the same, especially the software engineer always encounters unexpected format requirements for the parameters in the function call, and the situation is well solved in the self-written function, if the problem is encountered in a program interface which is used stably or a standard method, the program operation is often failed due to the failure of the check-in caused by some special characters in the check-in.
In the prior art, a special symbol replacement method is generally adopted, and the situation that one special character is replaced by one special character is found to be complex, so that the next character cannot be determined, the parameter format cannot be transmitted due to illegal format, and unpredictable risks exist.
Disclosure of Invention
The embodiment of the invention provides a complex format parameter transmission method, which is used for simply, quickly and safely transmitting complex format parameters, and comprises the following steps:
Determining whether the incoming parameters are complex format parameters;
when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
and transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm, and obtaining the decrypted complex format parameters.
The embodiment of the invention also provides a complex format parameter transmission device which is used for simply, quickly and safely transmitting complex format parameters, and comprises the following steps:
the parameter format determining module is used for determining whether the input parameters are complex format parameters or not;
The parameter encryption module is used for converting the input parameters into encryption parameters by using an SM encryption algorithm when the input parameters are parameters in a complex format;
And the parameter decryption module is used for transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using the SM encryption algorithm, and obtaining the decrypted complex format parameters.
The embodiment of the invention also provides computer equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the complex format parameter transmission method when executing the computer program.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program for executing the above-described complex format parameter transfer method.
In the embodiment of the invention, whether the input parameters are complex format parameters is determined; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a complex format parameter transmission method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a method for implementing step 101 in an embodiment of the present invention.
Fig. 3 is a schematic diagram of a method for implementing step 101 in another embodiment of the present invention.
Fig. 4 is a schematic diagram of a method for implementing step 102 in an embodiment of the present invention.
Fig. 5 is a schematic diagram of a complex format parameter transferring apparatus according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
For a better understanding of the embodiments of the present invention, the technical terms related to the embodiments of the present invention will be explained first:
Json: json (JavaScript Object Notation, JS object numbered musical notation) is a lightweight data exchange format. It stores and presents data in a text format that is completely independent of the programming language, based on a subset of ECMAScript (js specification formulated by the european computer institute). The compact and clear hierarchical structure makes Json an ideal data exchange language. Is easy to read and write by people, is easy to analyze and generate by machines, and effectively improves the network transmission efficiency.
SM4 encryption algorithm: SM4.0 (original name SMs 4.0) is a block cipher standard adopted by the government of the people's republic of China, issued by the national cipher administration on day 21, 3, 2012. The relevant standard is "GM/T0002-2012" SM4 block cipher algorithm (original SMS4 block cipher algorithm) ".
In a commercial cryptosystem, SM4 is mainly used for data encryption, an algorithm of the SM4 discloses that the packet length and the key length are 128 bits, the encryption algorithm and the key expansion algorithm both adopt a 32-round nonlinear iteration structure, and an S box is fixed 8-bit input and 8-bit output.
The instruction length in SM4.0 is raised to a level greater than 64K (i.e., 64 x 1024), which is 128 times the SM 3.0 specification (rendering instruction length allowed to be greater than 512).
The inventors have found that there may be two situations when parameters are passed into a function: (1) When the parameters to be transmitted do not meet the format check requirement of the function and the parameters are required to be transmitted; (2) At mian function entry, the incoming Json will automatically be converted into a string array, resulting in erroneous parameter readings.
For the first case, the method of replacing with special symbols is mostly used, and this case finds that replacing one special character with another one makes parameter transfer very complicated and there is an unpredictable risk. The Json character string transmitted by the main function inlet is automatically converted into a character string array, and the Json character string can be processed as the character string array without any solution; if Json string elements are numerous, the main function can be quite cumbersome to handle for the joining.
Therefore, an embodiment of the present invention provides a complex format parameter transmission method for simply, quickly and safely transmitting complex format parameters, as shown in fig. 1, where the method includes:
Step 101: determining whether the incoming parameters are complex format parameters;
Step 102: when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
step 103: and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters.
As can be seen from the flow shown in fig. 1, in the embodiment of the present invention, whether the incoming parameters are complex format parameters is determined; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
In implementation, first, it is determined whether the incoming parameters are complex format parameters, and the implementation process, as shown in fig. 2, includes:
Step 201: acquiring function information and incoming parameter information of parameter transfer;
step 202: and when the function is main function and the input parameter is Json character string according to the function information and the input parameter information of the parameter transfer, determining that the input parameter is a complex format parameter.
In a specific embodiment, the implementation method for determining whether the incoming parameters are complex format parameters, as shown in fig. 3, further includes, based on fig. 2:
Step 301: when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
Step 302: if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
After determining that the input parameters are parameters in a complex format, the input parameters are converted into encryption parameters by using an SM encryption algorithm. The specific implementation process, as shown in fig. 4, includes:
step 401: determining a part which does not meet the format requirement in the input parameters according to the format check result;
step 402: converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
Step 403: and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
In the specific embodiment, the problem of illegal parameters can be thoroughly solved by encrypting part of the content which does not accord with the parameter format into a 16-system character string through an SM4 encryption algorithm.
And after the SM encryption algorithm is utilized to convert the input parameters into the encryption parameters, the encryption parameters are transferred to the function. After the function is read, the encryption parameters read by the function are decrypted by using an SM encryption algorithm, and the decrypted complex format parameters are obtained. And (3) after decrypting the read encrypted character string, re-splicing the read encrypted character string with the rest of the parameters to obtain original parameter content, and transmitting the original parameter content to a subsequent program.
In the specific embodiment of the invention, an encryption algorithm is used for illegal parameters to convert illegal parts into character strings of pure letter data, and then the character strings are combined into legal parameters. The parameter content is not changed, but format checking when the function is participating (the parameter is imported) or excessive conversion of main function participating to Json format is avoided. Thereby solving the problem of illegally entering the ginseng at one time and quickly. And the encryption is carried out on the ginseng, so that the confidentiality is improved. The related work of the test is realized, and no bug is generated after the test is basically finished.
A specific example is given below to illustrate how the embodiment of the present invention performs complex format parameter delivery. The method is applied to main functions to input a large Json character string, and spaces exist in the large Json character string, so that the main functions can be used for inputting a plurality of parameters, and the subsequent program processing errors are caused.
The following are provided:
original entry of "name": "haidi", "id": "888", "remarks": "this is an sample" }
The intention is to take only one parameter and directly analyze it by Json
{“name”:”haidi”,”id”:”888”,”remarks”:”this is an example.”}
The actual input through the main function is divided by space.
First parameter: { "name": "haidi", "id": "888", "remarks": "this
The second parameter:
is
Third parameter:
an
fourth parameter:
example.”}
If the complex format parameter transmission method provided by the above embodiment is used for encryption, then:
original entry of "name": "haidi", "id": "888", "remarks": "this is an sample" }
After passing through the encryption process, it is similar to: ciphertext such as 4r5fse232dd8hfd is decrypted after the ciphertext is transmitted, and then the result is half-time according to Json analysis.
The implementation of the above specific application is only an example, and the rest of the embodiments are not described in detail.
Based on the same inventive concept, the embodiment of the present invention further provides a complex format parameter transmission device, and because the principle of the problem solved by the complex format parameter transmission device is similar to that of the complex format parameter transmission method, the implementation of the complex format parameter transmission device can refer to the implementation of the complex format parameter transmission method, and the repetition is omitted, and the specific structure is shown in fig. 5:
a parameter format determining module 501, configured to determine whether the incoming parameter is a complex format parameter;
the parameter encryption module 502 is configured to convert the input parameter into an encrypted parameter by using an SM encryption algorithm when the input parameter is a complex format parameter;
The parameter decryption module 503 is configured to transfer the encrypted parameter to a function, decrypt the encrypted parameter read by the function by using an SM encryption algorithm, and obtain a decrypted complex format parameter.
In a specific embodiment, the parameter format determining module 501 is specifically configured to:
acquiring function information and incoming parameter information of parameter transfer;
And determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information of parameter transfer.
Specifically, the parameter format determining module 501 is specifically configured to:
When the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the input parameter of the function is obtained;
if the format check result is that the special character exists, the input parameter is determined to be the complex format parameter.
Accordingly, in a specific embodiment, the parameter encryption module 502 is specifically configured to:
determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
The embodiment of the present invention further provides a computer device, and fig. 6 is a schematic diagram of the computer device in the embodiment of the present invention, where the computer device can implement all the steps in the complex format parameter transmission processing method in the foregoing embodiment, and the computer device specifically includes the following contents:
A processor 601, a memory 602, a communication interface (Communications Interface) 603, and a communication bus 604;
wherein the processor 601, the memory 602, and the communication interface 603 complete communication with each other through the communication bus 604; the communication interface 603 is used for implementing information transmission between related devices;
The processor 601 is configured to invoke a computer program in the memory 602, where the processor executes the computer program to implement the complex format parameter delivery method in the above embodiment.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program for executing the complex format parameter transmission method.
In summary, the embodiment of the invention provides a method and a device for transmitting complex format parameters, which have the following advantages:
By determining whether the incoming parameters are complex format parameters; when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters; and after the encryption parameters are transferred to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters. By encrypting the complex format parameters by using the SM encryption algorithm and decrypting after the complex format parameters are transmitted into the function, the function is prevented from checking the format of the complex format parameters when the complex format parameters are transmitted, and compared with the method adopting special symbol replacement in the prior art, the method is simple and quick, the unpredictable risk caused by the fact that characters cannot be determined is avoided, and the method is safer.
Although the invention provides method operational steps as described in the examples or flowcharts, more or fewer operational steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When implemented by an actual device or client product, the instructions may be executed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment) as shown in the embodiments or figures.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, apparatus (system) or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments. In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The orientation or positional relationship indicated by the terms "upper", "lower", etc. are based on the orientation or positional relationship shown in the drawings, are merely for convenience of description and to simplify the description, and are not indicative or implying that the apparatus or elements in question must have a specific orientation, be constructed and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Unless specifically stated or limited otherwise, the terms "mounted," "connected," and "coupled" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances. It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The present invention is not limited to any single aspect, nor to any single embodiment, nor to any combination and/or permutation of these aspects and/or embodiments. Moreover, each aspect and/or embodiment of the invention may be used alone or in combination with one or more other aspects and/or embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (6)

1. A complex format parameter delivery method, comprising:
Determining whether the incoming parameters are complex format parameters;
when the input parameters are parameters in a complex format, the SM encryption algorithm is utilized to convert the input parameters into encryption parameters;
transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using an SM encryption algorithm to obtain decrypted complex format parameters;
determining whether the incoming parameter is a complex format parameter includes:
acquiring function information and incoming parameter information of parameter transfer;
determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information transferred by the parameter;
determining whether the incoming parameter is a complex format parameter further comprises:
when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
And if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
2. The complex-format parameter transfer method of claim 1, wherein when the incoming parameter is a complex-format parameter, converting the incoming parameter into the encrypted parameter using an SM encryption algorithm, comprises:
Determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
3. A complex format parameter delivery device, comprising:
the parameter format determining module is used for determining whether the input parameters are complex format parameters or not;
The parameter encryption module is used for converting the input parameters into encryption parameters by using an SM encryption algorithm when the input parameters are parameters in a complex format;
the parameter decryption module is used for transmitting the encryption parameters to the function, decrypting the encryption parameters read by the function by using the SM encryption algorithm, and obtaining decrypted complex format parameters;
The parameter format determining module is specifically configured to:
acquiring function information and incoming parameter information of parameter transfer;
determining that the input parameter is a complex format parameter when the function is main function and the input parameter is Json character string according to the function information and the input parameter information transferred by the parameter;
The parameter format determining module is specifically configured to:
when the function is determined not to be a main function or the input parameter is determined not to be a Json character string, a format check result of the function on the input parameter is obtained;
And if the format check result is that the special character exists, determining that the input parameter is a complex format parameter.
4. A complex-format parameter delivery device according to claim 3, wherein the parameter encryption module is specifically configured to:
Determining a part which does not meet the format requirement in the input parameters according to the format check result;
converting the part which does not meet the format requirement in the input parameters into an encryption character string by using an SM encryption algorithm;
and replacing the part which does not meet the format requirement in the input parameters by using the encryption character string to obtain the encryption parameters.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 2 when executing the computer program.
6. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the steps of the method of any of claims 1 to 2.
CN202110767958.3A 2021-07-07 2021-07-07 Complex format parameter transmission method and device Active CN113572593B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110767958.3A CN113572593B (en) 2021-07-07 2021-07-07 Complex format parameter transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110767958.3A CN113572593B (en) 2021-07-07 2021-07-07 Complex format parameter transmission method and device

Publications (2)

Publication Number Publication Date
CN113572593A CN113572593A (en) 2021-10-29
CN113572593B true CN113572593B (en) 2024-04-19

Family

ID=78163935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110767958.3A Active CN113572593B (en) 2021-07-07 2021-07-07 Complex format parameter transmission method and device

Country Status (1)

Country Link
CN (1) CN113572593B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766264A (en) * 2018-12-15 2019-05-17 深圳壹账通智能科技有限公司 Method of calibration, device, computer equipment and the storage medium of interface parameters
CN110138818A (en) * 2018-02-09 2019-08-16 北京京东尚科信息技术有限公司 Method, website application, system, device and the serving backend of Transfer Parameters
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device
CN112383522A (en) * 2020-11-02 2021-02-19 浙江苍南仪表集团股份有限公司 Function parameter data transmission encryption method, system, device and readable storage medium
CN112966303A (en) * 2021-03-10 2021-06-15 中国民航信息网络股份有限公司 Data encryption and decryption method and device, electronic equipment and computer storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9634838B2 (en) * 2014-06-05 2017-04-25 International Business Machines Corporation Complex format-preserving encryption scheme

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138818A (en) * 2018-02-09 2019-08-16 北京京东尚科信息技术有限公司 Method, website application, system, device and the serving backend of Transfer Parameters
CN109766264A (en) * 2018-12-15 2019-05-17 深圳壹账通智能科技有限公司 Method of calibration, device, computer equipment and the storage medium of interface parameters
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device
CN112383522A (en) * 2020-11-02 2021-02-19 浙江苍南仪表集团股份有限公司 Function parameter data transmission encryption method, system, device and readable storage medium
CN112966303A (en) * 2021-03-10 2021-06-15 中国民航信息网络股份有限公司 Data encryption and decryption method and device, electronic equipment and computer storage medium

Also Published As

Publication number Publication date
CN113572593A (en) 2021-10-29

Similar Documents

Publication Publication Date Title
Barker et al. Recommendation for the triple data encryption algorithm (TDEA) block cipher
Maram et al. Intelligent security algorithm for UNICODE data privacy and security in IOT
Datta et al. Protocol composition logic (PCL)
CN1117463C (en) Method of transmitting information data from a sender to a receiver via a transcoder
US8938067B2 (en) Format preserving encryption methods for data strings with constraints
JP2021513141A (en) Generation and identification of 2D barcodes
Durante et al. Automatic testing equivalence verification of spi calculus specifications
JP2016521875A (en) Data protection
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
US20210279341A1 (en) Cryptographic security system, method, and program product using data partitioning
JP5843261B2 (en) A system that authenticates whether a string is accepted by an automaton
CN106789058B (en) Proxy re-encryption algorithm description and analysis method
WO2021084507A1 (en) System and method for encryption and decryption using logic synthesis
Jaswanth et al. Data Encryption: A Compiler Based Approach
CN113572593B (en) Complex format parameter transmission method and device
JP4938430B2 (en) Nonlinear function unit, stream cipher encryption apparatus, decryption apparatus, MAC generation apparatus, stream cipher encryption method, decryption method, MAC generation method, and program
CN104393988A (en) Reversible data encryption method and device
CN107241185A (en) Data transmitting and receiving method and transmission and reception device
JP5415020B2 (en) Stream cipher encryption apparatus, decryption apparatus, MAC generation apparatus, stream cipher encryption method, decryption method, MAC generation method, and program
CN113746642A (en) Method and system for communication between computers
JP2010256749A (en) Device and method for generating hash value, and program
Keller et al. Converting alice&bob protocol specifications to tamarin
Abdul-Jabbar Secure QR-code generation in healthcare
Pan et al. Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant