Method and device for adding and deciphering webpage enciphered data

A technology of encrypting data and symmetric encryption algorithm, applied in the network field, can solve the problems of affecting the loading speed of web pages, wasting system resources, reducing the user experience, etc., to achieve the effect of simple and convenient encryption and decryption, and improve the user experience

Active Publication Date: 2012-09-19
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by this application is to provide a method for adding and decrypting encrypted webpage data and a device for adding and decrypting webpage, so as to solve the problem that existing webpage security schemes not only waste system resources, but also affect the loading speed of webpages and reduce user problems with user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for adding and deciphering webpage enciphered data
  • Method and device for adding and deciphering webpage enciphered data
  • Method and device for adding and deciphering webpage enciphered data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] refer to figure 1 , shows a flow chart of steps of a method for adding encrypted webpage data according to Embodiment 1 of the present application.

[0023] The adding method of the webpage encryption data of the present embodiment comprises the following steps:

[0024] Step S102: Use an asymmetric encryption algorithm to encrypt the text content of the webpage to generate binary encrypted data.

[0025] An asymmetric encryption algorithm means that the key used for encryption is different from the key used for decryption, and the key for decryption cannot be derived from the encrypted key. Asymmetric encryption algorithm requires two keys: public key (publickey) and private key (privatekey). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used to decrypt it; if the data is encrypted with the private key, only the corresponding public key can be used to decrypt the data. decrypt. ...

Embodiment 2

[0034] refer to figure 2 , shows a flow chart of steps of a method for adding encrypted webpage data according to Embodiment 2 of the present application.

[0035] When encrypting webpages, you can place the webpages to be encrypted on one or several fixed domain names F according to your needs, and then use the RSA algorithm to generate a pair of keys, namely the public key PKey (publickey) and the private key PrKey(privatekey). Then, integrate the verification logic into a browser such as 360 Secure Browser, where the verification logic uses Pkey, the release logic uses PrKey, and the format of the domain name F, key, and custom encryption are all pre-defined.

[0036] The adding method of the webpage encryption data of the present embodiment comprises the following steps:

[0037] Step S202: Obtain the hash value B of the text content A (character string) of the webpage to be published.

[0038] In this step, the text content of the webpage, such as the text content A o...

Embodiment 3

[0069] refer to image 3 , which shows a flowchart of steps of a method for decrypting encrypted webpage data according to Embodiment 3 of the present application.

[0070] The method for decrypting encrypted webpage data in this embodiment corresponds to the aforementioned method for adding encrypted webpage data, and is used to decrypt a webpage encrypted by using the aforementioned method for adding encrypted webpage data.

[0071] The decryption method of the webpage encrypted data of the present embodiment comprises the following steps:

[0072] Step S302: Obtain plain text string data in the form of comments in the hypertext markup language of the webpage.

[0073] Wherein, the plaintext character string data is the character string data obtained by converting the binary encrypted data generated by encrypting the original text content of the webpage with an asymmetric encryption algorithm.

[0074] Step S304: Convert plaintext character string data into binary data.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for adding and deciphering webpage enciphered data, wherein the adding method for the webpage enciphered data comprises the following steps: enciphering text contents of a webpage to generate enciphered data; converting the enciphered data to plaintext character string data; and adding the plaintext character string data in hypertext markup language codes of the webpage in a note form. According to the method and the device, system resources are saved, webpage loading speed is not affected, and the user experience is improved.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a method and device for adding and decrypting encrypted data on webpages. Background technique [0002] At present, with the application of Internet technology more and more widely, many of people's daily work and entertainment are carried out on the Internet. People browse the web through web browsers, obtain useful information and data, and conduct online contact and communication. [0003] The transmission of existing network data and information follows the HTTP (Hypertext Transfer Protocol) protocol. The HTTP protocol is a communication protocol that allows the transfer of Hypertext Markup Language (HTML) documents from a web server to a web browser. Among them, HTML is a markup language used to create documents. These documents contain links to related information. Users can click a link to access other documents, images or multimedia objects, and obtain additi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 宗小斌任寰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products