Encryption method and device, decryption method and device

文档序号:1470082 发布日期:2020-02-21 浏览:12次 中文

阅读说明:本技术 加密方法和装置、解密方法和装置 (Encryption method and device, decryption method and device ) 是由 吴勋 孙江涛 于 2018-08-07 设计创作,主要内容包括:本发明实施例提供了一种加密方法和装置、解密方法和装置。本发明实施例通过接收网页端发送的第一加密内容;对第一加密内容进行加密,得到第二加密内容,创建唯一标识识别码;向第三方发送第二加密内容和唯一标识识别码;接收第三方发送的第三加密内容和唯一标识识别码;根据唯一标识识别码对第三加密内容进行加密,得到第四加密内容;向去中心化存储平台发送第四加密内容和唯一标识识别码;多方加密并将加密后的信息存储在去中心化存储平台,进而提高了加密的安全性。因此,本发明实施例提供的技术方案能够解决现有技术中加密安全性较低的问题。(The embodiment of the invention provides an encryption method and device and a decryption method and device. The embodiment of the invention receives first encrypted content sent by a webpage end; encrypting the first encrypted content to obtain a second encrypted content, and creating a unique identification code; sending the second encrypted content and the unique identification code to a third party; receiving third encrypted content and a unique identification code sent by a third party; encrypting the third encrypted content according to the unique identification code to obtain fourth encrypted content; sending the fourth encrypted content and the unique identification code to the decentralized storage platform; the multi-party encryption is carried out, and the encrypted information is stored in the decentralized storage platform, so that the encryption safety is improved. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of low encryption security in the prior art.)

1. A method of encryption, the method comprising:

encrypting target content by a webpage end to obtain first encrypted content, and sending the first encrypted content to a server by the webpage end;

the server of the service provider encrypts the first encrypted content to obtain a second encrypted content, creates a unique identification code, and sends the second encrypted content and the unique identification code to a third party;

the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the third party sends the third encrypted content to the server of the service provider;

and the server encrypts the third encrypted content according to the unique identification code to obtain fourth encrypted content, and the server sends the fourth encrypted content and the unique identification code to a decentralized storage platform.

2. A method of encryption, the method comprising:

receiving first encrypted content sent by a webpage end, wherein the first encrypted content is obtained by encrypting target content by the webpage end;

encrypting the first encrypted content to obtain a second encrypted content, and creating a unique identification code;

sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content;

receiving the third encrypted content and the unique identification code sent by the third party;

encrypting the third encrypted content according to the unique identification code to obtain fourth encrypted content;

sending the fourth encrypted content and the unique identification code to a decentralized storage platform.

3. The method according to claim 2, wherein the third party has N numbers, the second encrypted content includes N second sub-encrypted contents, the third encrypted content includes N third sub-encrypted contents,

sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain a third encrypted content, comprising:

segmenting the second encrypted content to obtain N second sub-encrypted contents; transmitting one of the second sub-encrypted contents to each of the third parties so that the third parties encrypt the second sub-encrypted contents to obtain the third sub-encrypted contents,

receiving the third encrypted content and the unique identification code sent by the third party, including: and receiving the third sub-encrypted content and the unique identification code sent by each third party, and splicing N third sub-encrypted contents according to the unique identification code to obtain the third encrypted content.

4. The method of claim 3,

encrypting the first encrypted content to obtain a second encrypted content, comprising: calling a first encryption function of the intelligent contract to encrypt the first encryption content to obtain second encryption content, wherein the intelligent contract at least has the first encryption function, the second encryption function and a third encryption function,

sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain a third encrypted content, comprising: sending the second encrypted content, the unique identification code and an intelligent contract address to the third party so that the third party can call the second encryption function of the intelligent contract according to the intelligent contract address, wherein the second encryption function is used for encrypting the second encrypted content according to the unique identification code so as to obtain third encrypted content,

encrypting the third encrypted content according to the unique identification code to obtain a fourth encrypted content, comprising: and calling the third encryption function of the intelligent contract, wherein the third encryption function is used for encrypting the third encrypted content according to the unique identification code so as to obtain the fourth encrypted content.

5. The method of claim 2,

encrypting the first encrypted content to obtain a second encrypted content, comprising: calling a first encryption function of the intelligent contract to encrypt the first encryption content to obtain second encryption content, wherein the intelligent contract at least has the first encryption function, the second encryption function and a third encryption function,

sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain a third encrypted content, comprising: sending the second encrypted content, the unique identification code and an intelligent contract address to the third party so that the third party can call the second encryption function of the intelligent contract according to the intelligent contract address, wherein the second encryption function is used for encrypting the second encrypted content according to the unique identification code so as to obtain third encrypted content,

encrypting the third encrypted content according to the unique identification code to obtain a fourth encrypted content, comprising: and calling the third encryption function of the intelligent contract, wherein the third encryption function is used for encrypting the third encrypted content according to the unique identification code so as to obtain the fourth encrypted content.

6. The method according to any one of claims 2 to 5, wherein encrypting the first encrypted content to obtain a second encrypted content comprises:

establishing a virtual machine, wherein an encryption formula is stored in the virtual machine;

encrypting the first encrypted content according to the encryption formula in the virtual machine to obtain the second encrypted content,

and after the fourth encrypted content and the unique identification code are sent to a decentralized storage platform, performing offline processing on the virtual machine.

7. A method of decryption, the method comprising:

the server of the service provider receives a decryption request sent by a user, wherein the decryption request carries a unique identification code;

the server downloads fourth encrypted content from a decentralized storage platform, decrypts the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sends the third encrypted content and the unique identification code to a third party;

the third party receives the third encrypted content and the unique identification code, decrypts the third encrypted content according to the unique identification code to obtain second encrypted content, and sends the second encrypted content and the unique identification code to the server;

the server decrypts the second encrypted content according to the unique identification code to obtain first encrypted content, and the server sends the first encrypted content and the unique identification code to the webpage end;

and the webpage end decrypts the first encrypted content to obtain target content.

8. A method of decryption, the method comprising:

receiving a decryption request sent by a user, wherein the decryption request carries a unique identification code;

downloading fourth encrypted content on a decentralized storage platform, decrypting the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sending the third encrypted content and the unique identification code to a third party so that the third party decrypts the third encrypted content according to the unique identification code to obtain second encrypted content;

receiving the second encrypted content and the unique identification code sent by the third party;

and decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, and sending the first encrypted content and the unique identification code to a webpage end so that the webpage end decrypts the first encrypted content to obtain target content.

9. The method according to claim 8, wherein the third party has N numbers, the second encrypted content includes N second sub-encrypted contents, the third encrypted content includes N third sub-encrypted contents,

sending the third encrypted content and the unique identification code to a third party so that the third party decrypts the third encrypted content according to the unique identification code to obtain a second encrypted content, comprising:

segmenting the third encrypted content to obtain N third sub-encrypted contents;

sending the unique identification code and the third sub-encrypted content to each third party, so that the third parties decrypt the third sub-encrypted content according to the unique identification code, and the second sub-encrypted content is obtained;

and receiving the second sub-encrypted content sent by each third party, and combining the N second sub-encrypted contents to obtain the second encrypted content.

10. The method of claim 9, wherein decrypting the fourth encrypted content according to the unique identification code to obtain a third encrypted content comprises:

starting a virtual machine, and connecting the virtual machine with a network, wherein a decryption formula is stored in the virtual machine;

decrypting the fourth encrypted content according to the unique identification code and the decryption formula stored in the virtual machine to obtain third encrypted content;

decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, comprising:

decrypting the second encrypted content according to the unique identification code and the decryption formula stored in the virtual machine to obtain the first encrypted content,

and after the first encrypted content and the unique identification code are sent to a webpage end, performing offline processing on the virtual machine.

11. The method of claim 8, wherein decrypting the second encrypted content based on the unique identification number comprises:

sending a verification request to a target user;

and after the verification is passed, decrypting the second encrypted content according to the unique identification code.

12. The method of claim 8, wherein sending the third encrypted content and the unique identification code to a third party comprises:

verifying whether the interface parameters between the server of the service provider and the third party are consistent or not according to an asymmetric encryption algorithm;

and if the interface parameters are consistent, sending the third encrypted content and the unique identification code to the third party.

13. A method of encryption, the method comprising:

encrypting the target content to obtain a first encrypted content;

transmitting the first encrypted content to a server.

14. The method of claim 13, wherein prior to encrypting the target content, the method further comprises:

receiving a target character string, user identity information and an accidental encryption request input by a user;

and performing associated storage on the target character string, the user identity information and the accidental encryption request.

15. A method of decryption, the method comprising:

receiving first encrypted content sent by a server of a service provider;

and decrypting the first encrypted content to obtain the target content.

16. The method of claim 15, wherein prior to decrypting the first encrypted content, the method further comprises:

receiving a target character string, user identity information and an accidental decryption request input by a user;

and decrypting the first encrypted content according to the target character string, the user identity information and the accidental decryption request to obtain the target content.

17. An encryption apparatus, characterized in that the apparatus comprises:

the device comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving first encrypted content sent by a webpage end, and the first encrypted content is obtained by encrypting target content by the webpage end;

the first encryption unit is used for encrypting the first encrypted content to obtain second encrypted content and creating a unique identification code;

the first sending unit is used for sending the second encrypted content and the unique identification code to a third party so that the third party can encrypt the second encrypted content according to the unique identification code to obtain third encrypted content;

a second receiving unit, configured to receive the third encrypted content and the unique identification code sent by the third party;

the second encryption unit is used for encrypting the third encrypted content according to the unique identification code to obtain a fourth encrypted content;

a second sending unit, configured to send the fourth encrypted content and the unique identification code to a decentralized storage platform.

18. A decryption apparatus, characterized in that the apparatus comprises:

the third receiving unit is used for receiving a decryption request sent by a user, wherein the decryption request carries a unique identification code;

the downloading unit is used for downloading fourth encrypted content on a decentralized storage platform, decrypting the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sending the third encrypted content and the unique identification code to a third party so that the third party can decrypt the third encrypted content according to the unique identification code to obtain second encrypted content;

a fourth receiving unit, configured to receive the second encrypted content and the unique identification code sent by the third party;

and the first decryption unit is used for decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, and sending the first encrypted content and the unique identification code to a webpage end so that the webpage end decrypts the first encrypted content to obtain target content.

19. An encryption apparatus, characterized in that the apparatus comprises:

the third encryption unit is used for encrypting the target content to obtain first encrypted content;

a third transmitting unit for transmitting the first encrypted content to a server of a service provider.

20. A decryption apparatus, characterized in that the apparatus comprises:

a fifth receiving unit for receiving the first encrypted content transmitted by the server;

and the second decryption unit is used for decrypting the first encrypted content to obtain the target content.

21. A method of encryption, the method comprising:

the authority mechanism stores the preset digital sequence input by the user and the user identity information in an associated manner;

the method comprises the steps that a webpage side encrypts target content based on an accidental encryption mechanism to obtain first encrypted content, and the webpage side sends the first encrypted content to a server;

the server of the service provider encrypts the first encrypted content based on the accidental encryption mechanism to obtain second encrypted content, creates a unique identification code, and sends the second encrypted content and the unique identification code to a third party;

the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the third party sends the third encrypted content to the server of the service provider;

and the server encrypts the third encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain fourth encrypted content, and the server sends the fourth encrypted content and the unique identification code to a decentralized storage platform.

22. A method of decryption, the method comprising:

acquiring a preset digital sequence from an authority through identification information and/or proxy identification information;

sending a starting request to a server of a service provider, wherein the starting request is used for starting an unexpected decryption mechanism, and the server of the service provider receives the starting request and then carries out verification;

after the server of the service provider passes the verification, a decryption request is sent to the server of the service provider, and the decryption request carries a unique identification code;

the server receives the decryption request;

the server downloads fourth encrypted content from a decentralized storage platform, decrypts the fourth encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain third encrypted content, and sends the third encrypted content and the unique identification code to a third party;

the third party receives the third encrypted content and the unique identification code, decrypts the third encrypted content according to the unique identification code to obtain second encrypted content, and sends the second encrypted content and the unique identification code to the server;

the server decrypts the second encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain first encrypted content, and the server sends the first encrypted content and the unique identification code to the webpage end;

and the webpage terminal decrypts the first encrypted content according to the preset digital sequence based on the accidental encryption mechanism to obtain the target content.

[ technical field ] A method for producing a semiconductor device

The present invention relates to the field of encryption, and in particular, to an encryption method and apparatus, and a decryption method and apparatus.

[ background of the invention ]

The basic process of data encryption is to process the original plaintext file or data according to some algorithm to make it become an unreadable segment of code, usually called "ciphertext", so that it can only display the original content after inputting the corresponding key, and the purpose of protecting the data from illegal stealing and reading is achieved through this way. The reverse of this process is decryption, i.e., the process of converting the encoded information into its original data.

Encryption on the network serves to prevent useful or proprietary information from being intercepted and stolen on the network. A simple example is the transmission of passwords, which are of paramount importance, many security systems are password-based, and the disclosure of a password in a sense means a complete breakdown of its security system.

The existing encryption method is easy to be broken by attackers, and the encryption security is low.

[ summary of the invention ]

In view of this, embodiments of the present invention provide an encryption method and apparatus, and a decryption method and apparatus, so as to solve the problem of low encryption security degree in the prior art.

In one aspect, an embodiment of the present invention provides an encryption method, where the method includes: encrypting target content by a webpage end to obtain first encrypted content, and sending the first encrypted content to a server by the webpage end; the server of the service provider encrypts the first encrypted content to obtain a second encrypted content, creates a unique identification code, and sends the second encrypted content and the unique identification code to a third party; the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the third party sends the third encrypted content to the server of the service provider; and the server encrypts the third encrypted content according to the unique identification code to obtain fourth encrypted content, and the server sends the fourth encrypted content and the unique identification code to a decentralized storage platform.

In one aspect, an embodiment of the present invention provides an encryption method, where the method includes: receiving first encrypted content sent by a webpage end, wherein the first encrypted content is obtained by encrypting target content by the webpage end; encrypting the first encrypted content to obtain a second encrypted content, and creating a unique identification code; sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content; receiving the third encrypted content and the unique identification code sent by the third party; encrypting the third encrypted content according to the unique identification code to obtain fourth encrypted content; sending the fourth encrypted content and the unique identification code to a decentralized storage platform.

Further, N third parties exist, the second encrypted content includes N second sub-encrypted contents, the third encrypted content includes N third sub-encrypted contents, and the second encrypted content and the unique identification code are sent to the third party, so that the third party encrypts the second encrypted content according to the unique identification code to obtain a third encrypted content, including: segmenting the second encrypted content to obtain N second sub-encrypted contents; sending one of the second sub-encrypted contents to each of the third parties, so that the third parties encrypt the second sub-encrypted contents to obtain third sub-encrypted contents, and receiving the third encrypted contents and the unique identification codes sent by the third parties, including: and receiving the third sub-encrypted content and the unique identification code sent by each third party, and splicing N third sub-encrypted contents according to the unique identification code to obtain the third encrypted content.

Further, encrypting the first encrypted content to obtain a second encrypted content includes: calling a first encryption function of an intelligent contract to encrypt the first encrypted content to obtain second encrypted content, wherein the intelligent contract at least has the first encryption function, the second encryption function and a third encryption function, and sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the method comprises the following steps of: sending the second encrypted content, the unique identification code and the intelligent contract address to the third party so that the third party can call the second encryption function of the intelligent contract according to the intelligent contract address, wherein the second encryption function is used for encrypting the second encrypted content according to the unique identification code to obtain the third encrypted content, and encrypting the third encrypted content according to the unique identification code to obtain the fourth encrypted content, and the method comprises the following steps: and calling the third encryption function of the intelligent contract, wherein the third encryption function is used for encrypting the third encrypted content according to the unique identification code so as to obtain the fourth encrypted content.

Further, encrypting the first encrypted content to obtain a second encrypted content includes: calling a first encryption function of an intelligent contract to encrypt the first encrypted content to obtain second encrypted content, wherein the intelligent contract at least has the first encryption function, the second encryption function and a third encryption function, and sending the second encrypted content and the unique identification code to a third party so that the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the method comprises the following steps of: sending the second encrypted content, the unique identification code and the intelligent contract address to the third party so that the third party can call the second encryption function of the intelligent contract according to the intelligent contract address, wherein the second encryption function is used for encrypting the second encrypted content according to the unique identification code to obtain the third encrypted content, and encrypting the third encrypted content according to the unique identification code to obtain the fourth encrypted content, and the method comprises the following steps: and calling the third encryption function of the intelligent contract, wherein the third encryption function is used for encrypting the third encrypted content according to the unique identification code so as to obtain the fourth encrypted content.

Further, encrypting the first encrypted content to obtain a second encrypted content includes: establishing a virtual machine, wherein an encryption formula is stored in the virtual machine; and encrypting the first encrypted content according to the encryption formula in the virtual machine to obtain the second encrypted content, and performing offline processing on the virtual machine after sending the fourth encrypted content and the unique identification code to a decentralized storage platform.

In one aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes: the server of the service provider receives a decryption request sent by a user, wherein the decryption request carries a unique identification code; the server downloads fourth encrypted content from a decentralized storage platform, decrypts the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sends the third encrypted content and the unique identification code to a third party; the third party receives the third encrypted content and the unique identification code, decrypts the third encrypted content according to the unique identification code to obtain second encrypted content, and sends the second encrypted content and the unique identification code to the server; the server decrypts the second encrypted content according to the unique identification code to obtain first encrypted content, and the server sends the first encrypted content and the unique identification code to the webpage end; and the webpage end decrypts the first encrypted content to obtain target content.

In one aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes: receiving a decryption request sent by a user, wherein the decryption request carries a unique identification code; downloading fourth encrypted content on a decentralized storage platform, decrypting the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sending the third encrypted content and the unique identification code to a third party so that the third party decrypts the third encrypted content according to the unique identification code to obtain second encrypted content; receiving the second encrypted content and the unique identification code sent by the third party; and decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, and sending the first encrypted content and the unique identification code to a webpage end so that the webpage end decrypts the first encrypted content to obtain target content.

Further, N third parties are provided, where the second encrypted content includes N second sub-encrypted contents, and the third encrypted content includes N third sub-encrypted contents, and the third encrypted content and the unique identification code are sent to the third party, so that the third party decrypts the third encrypted content according to the unique identification code to obtain the second encrypted content, including: segmenting the third encrypted content to obtain N third sub-encrypted contents; sending the unique identification code and the third sub-encrypted content to each third party, so that the third parties decrypt the third sub-encrypted content according to the unique identification code, and the second sub-encrypted content is obtained; and receiving the second sub-encrypted content sent by each third party, and combining the N second sub-encrypted contents to obtain the second encrypted content.

Further, decrypting the fourth encrypted content according to the unique identification code to obtain a third encrypted content, including: starting a virtual machine, and connecting the virtual machine with a network, wherein a decryption formula is stored in the virtual machine; decrypting the fourth encrypted content according to the unique identification code and the decryption formula stored in the virtual machine to obtain third encrypted content; decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, comprising: and decrypting the second encrypted content according to the unique identification code and the decryption formula stored in the virtual machine to obtain the first encrypted content, and performing offline processing on the virtual machine after sending the first encrypted content and the unique identification code to a webpage end.

Further, decrypting the second encrypted content according to the unique identification code includes: sending a verification request to a target user; and after the verification is passed, decrypting the second encrypted content according to the unique identification code.

Further, sending the third encrypted content and the unique identification code to a third party includes: verifying whether the interface parameters between the server of the service provider and the third party are consistent or not according to an asymmetric encryption algorithm; and if the interface parameters are consistent, sending the third encrypted content and the unique identification code to the third party.

In one aspect, an embodiment of the present invention provides an encryption method, where the method includes: encrypting the target content to obtain a first encrypted content; transmitting the first encrypted content to a server.

Further, before encrypting the target content, the method further comprises: receiving a target character string, user identity information and an accidental encryption request input by a user; and performing associated storage on the target character string, the user identity information and the accidental encryption request.

In one aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes: receiving first encrypted content sent by a server of a service provider; and decrypting the first encrypted content to obtain the target content.

Further, prior to decrypting the first encrypted content, the method further comprises: receiving a target character string, user identity information and an accidental decryption request input by a user; and decrypting the first encrypted content according to the target character string, the user identity information and the accidental decryption request to obtain the target content.

In one aspect, an embodiment of the present invention provides an encryption apparatus, where the apparatus includes: the device comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving first encrypted content sent by a webpage end, and the first encrypted content is obtained by encrypting target content by the webpage end; the first encryption unit is used for encrypting the first encrypted content to obtain second encrypted content and creating a unique identification code; the first sending unit is used for sending the second encrypted content and the unique identification code to a third party so that the third party can encrypt the second encrypted content according to the unique identification code to obtain third encrypted content; a second receiving unit, configured to receive the third encrypted content and the unique identification code sent by the third party; the second encryption unit is used for encrypting the third encrypted content according to the unique identification code to obtain a fourth encrypted content; a second sending unit, configured to send the fourth encrypted content and the unique identification code to a decentralized storage platform.

In one aspect, an embodiment of the present invention provides a decryption apparatus, where the apparatus includes: the third receiving unit is used for receiving a decryption request sent by a user, wherein the decryption request carries a unique identification code; the downloading unit is used for downloading fourth encrypted content on a decentralized storage platform, decrypting the fourth encrypted content according to the unique identification code to obtain third encrypted content, and sending the third encrypted content and the unique identification code to a third party so that the third party can decrypt the third encrypted content according to the unique identification code to obtain second encrypted content; a fourth receiving unit, configured to receive the second encrypted content and the unique identification code sent by the third party; and the first decryption unit is used for decrypting the second encrypted content according to the unique identification code to obtain first encrypted content, and sending the first encrypted content and the unique identification code to a webpage end so that the webpage end decrypts the first encrypted content to obtain target content.

In one aspect, an embodiment of the present invention provides an encryption apparatus, where the apparatus includes: the third encryption unit is used for encrypting the target content to obtain first encrypted content; a third transmitting unit for transmitting the first encrypted content to a server of a service provider.

In one aspect, an embodiment of the present invention provides a decryption apparatus, where the apparatus includes: a fifth receiving unit for receiving the first encrypted content transmitted by the server; and the second decryption unit is used for decrypting the first encrypted content to obtain the target content.

In one aspect, an embodiment of the present invention provides an encryption method, where the method includes: the authority mechanism stores the preset digital sequence input by the user and the user identity information in an associated manner; the method comprises the steps that a webpage side encrypts target content based on an accidental encryption mechanism to obtain first encrypted content, and the webpage side sends the first encrypted content to a server; the server of the service provider encrypts the first encrypted content based on the accidental encryption mechanism to obtain second encrypted content, creates a unique identification code, and sends the second encrypted content and the unique identification code to a third party; the third party encrypts the second encrypted content according to the unique identification code to obtain third encrypted content, and the third party sends the third encrypted content to the server of the service provider; and the server encrypts the third encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain fourth encrypted content, and the server sends the fourth encrypted content and the unique identification code to a decentralized storage platform.

In one aspect, an embodiment of the present invention provides a decryption method, where the decryption method includes: acquiring a preset digital sequence from an authority through identification information and/or proxy identification information; sending a starting request to a server of a service provider, wherein the starting request is used for starting an unexpected decryption mechanism, and the server of the service provider receives the starting request and then carries out verification; after the server of the service provider passes the verification, a decryption request is sent to the server of the service provider, and the decryption request carries a unique identification code; the server receives the decryption request; the server downloads fourth encrypted content from a decentralized storage platform, decrypts the fourth encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain third encrypted content, and sends the third encrypted content and the unique identification code to a third party; the third party receives the third encrypted content and the unique identification code, decrypts the third encrypted content according to the unique identification code to obtain second encrypted content, and sends the second encrypted content and the unique identification code to the server; the server decrypts the second encrypted content according to the unique identification code based on the accidental encryption mechanism to obtain first encrypted content, and the server sends the first encrypted content and the unique identification code to the webpage end; and the webpage terminal decrypts the first encrypted content according to the preset digital sequence based on the accidental encryption mechanism to obtain the target content.

The embodiment of the invention receives first encrypted content sent by a webpage end; encrypting the first encrypted content to obtain a second encrypted content, and creating a unique identification code; sending the second encrypted content and the unique identification code to a third party; receiving third encrypted content and a unique identification code sent by a third party; encrypting the third encrypted content according to the unique identification code to obtain fourth encrypted content; and sending fourth encrypted content and the unique identification code to the decentralized storage platform, jointly encrypting through the webpage end, the server of the service provider and a third party, and storing the encrypted information on the decentralized storage, so that the encryption safety is improved.

[ description of the drawings ]

In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.

FIG. 1 is a flow diagram of an encryption method according to an embodiment of the present invention;

FIG. 2 is a schematic diagram of an encryption process according to an embodiment of the present invention;

FIG. 3 is a schematic diagram of an encryption process according to an embodiment of the present invention;

FIG. 4 is a flow chart of a decryption method according to an embodiment of the present invention;

FIG. 5 is a schematic diagram of a decryption process according to an embodiment of the invention;

FIG. 6 is a schematic diagram of an encryption process according to an embodiment of the present invention;

FIG. 7 is a schematic diagram of an encryption process according to an embodiment of the present invention;

fig. 8 is a schematic diagram of an encryption process according to an embodiment of the present invention.

[ detailed description ] embodiments

For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.

It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.

One problem with current virtual currency digital wallet lockers is that if the lockers are lost, the cryptocurrency in the wallet is lost in the blockchain.

The embodiment of the invention provides a safe backup management mechanism of a virtual currency digital wallet lock, which aims to solve the problem of safe storage of a block chain lock.

31页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:网络接入控制方法及装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类