Search

CN-122020685-A - Data decryption method, device, electronic equipment, storage medium and program product

CN122020685ACN 122020685 ACN122020685 ACN 122020685ACN-122020685-A

Abstract

The invention discloses a data decryption method, a data decryption device, an electronic device, a storage medium and a program product. The method comprises the steps of determining a host program, detecting a task state through a detection program, determining decryption information corresponding to the host program under the condition that the task state indicates that the data migration task is successful, and obtaining decryption data based on the decryption information and the encryption data. The detection program is injected into the host program, so that the task state of the data migration task is detected, decryption information is acquired at the target client, the encrypted data is decrypted through the decryption information, the encrypted data in a ciphertext form is decrypted into decrypted data in a plaintext form, and the data migrated to the target client by the mobile terminal is ensured to be displayed in the plaintext form.

Inventors

  • XIE QINGQUAN
  • Zhu Huabai
  • WU XINGDE

Assignees

  • 苏州龙信信息科技有限公司

Dates

Publication Date
20260512
Application Date
20260121

Claims (11)

  1. 1.A data decryption method, applied to a target client, the method comprising: determining a host program, wherein the host program comprises a program corresponding to the target client; Detecting a task state through a detection program, wherein the task state comprises a state of a data migration task, the data migration task comprises a task of migrating target data generated when a mobile terminal runs into encrypted data in the target client, and the mobile terminal is connected with the target client; under the condition that the task state indicates that the data migration task is successfully migrated, determining decryption information corresponding to the host program, wherein the decryption information comprises information generated in the running process of the host program; and obtaining decryption data based on the decryption information and the encryption data.
  2. 2. The method of claim 1, wherein the detecting task status by the detection program comprises: determining a program identifier corresponding to the host program, wherein the program identifier comprises a unique identifier of the host program; and injecting a detection program at a position indicated by the program identifier, enabling the detection program to run in the host program, and detecting the task state through the detection program.
  3. 3. The method according to claim 2, wherein the detecting task state by the detection program includes: determining a task function related to a data migration task, and a function offset address of the task function, the function offset address indicating a location of the task function in the host program; determining an actual running address corresponding to the function offset address, and setting a springboard function corresponding to the task function at a position indicated by the actual running address, wherein the actual running address indicates the position of the springboard function in the detection program, and the task function is consistent with the function of the springboard function; acquiring the execution state of the springboard function in the detection program in the process of executing the data migration task; and determining the execution state as a task state of the data migration task.
  4. 4. The method of claim 1, wherein the detection program includes a springboard function corresponding to a task function, the task function including an information initialization function, a password determination function, and a migration function, the springboard function corresponding to the password determination function being a function of the host program for setting a database password related to the encrypted data, the determining decryption information corresponding to the host program comprising: under the condition that the task state is that initialization is completed, basic information corresponding to the target client side recorded by a springboard function corresponding to the information initialization function is obtained; Under the condition that the task state is that password acquisition is completed, determining a database password based on the entry parameters of the springboard function corresponding to the password determination function; and under the condition that the task state indicates that the data migration task is successfully migrated, determining the basic information and the database password as decryption information corresponding to the host program through a springboard function corresponding to the migration function.
  5. 5. The method of claim 1, wherein the obtaining decrypted data based on the decrypted information and the encrypted data comprises: Determining a data directory corresponding to the host program, wherein the data directory indicates a storage position of the host program; searching a target file in which the encrypted data is located in data contained in the host program according to the data catalog and basic information contained in the decryption information, wherein the target file comprises at least one page of target encrypted data; decrypting the target encrypted data according to the database password contained in the decryption information aiming at each page of target encrypted data to obtain target decrypted data; and combining target decryption data corresponding to each target encryption data to obtain decryption data.
  6. 6. The method according to claim 5, wherein decrypting the target encrypted data based on the database password included in the decryption information to obtain target decrypted data comprises: generating a decryption key and a verification key according to the database password contained in the decryption information; determining a first hash authentication code formed by the target encrypted data and a page number corresponding to the target encrypted data by taking the verification key as a parameter; determining a second hash authentication code contained in a page where the target encrypted data is located; And under the condition that the first hash authentication code is consistent with the second hash authentication code, decrypting the target encrypted data by taking a decryption vector contained in a page where the decryption key and the target encrypted data are located as parameters to obtain target decrypted data.
  7. 7. The method of claim 6, wherein generating the decryption key and the verification key based on the database password contained in the decryption information comprises: Determining encryption parameters, wherein the encryption parameters comprise parameters corresponding to the target file; Performing exclusive-or operation on the encryption parameters to obtain exclusive-or encryption parameters; Generating a decryption key by taking a database password and the encryption parameter contained in the decryption information as parameters; and generating a verification key by taking the decryption key and the exclusive or encryption parameter as parameters.
  8. 8. A data decryption apparatus, configured at a target client, comprising: The first determining module is used for determining a host program, wherein the host program comprises a program corresponding to the target client; The detection module is used for detecting task states through a detection program, wherein the task states comprise states of data migration tasks, the data migration tasks comprise tasks of migrating target data generated during running of a mobile terminal into encrypted data in the target client, and the mobile terminal is connected with the target client; the second determining module is used for determining decryption information corresponding to the host program when the task state indicates that the data migration task is successful, wherein the decryption information comprises information generated in the running process of the host program; And the decryption module is used for obtaining decryption data based on the decryption information and the encryption data.
  9. 9. An electronic device, the electronic device comprising: at least one processor, and A memory communicatively coupled to the at least one processor, wherein, The memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the data decryption method of any one of claims 1-7.
  10. 10. A computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, the computer instructions for causing a processor to perform the data decryption method of any one of claims 1-7.
  11. 11. A computer program product, characterized in that the computer program product comprises a computer program which, when executed by a processor, implements the data decryption method according to any one of claims 1-7.

Description

Data decryption method, device, electronic equipment, storage medium and program product Technical Field The present invention relates to the field of computer technologies, and in particular, to a data decryption method, apparatus, electronic device, storage medium, and program product. Background When data extraction is required for software, currently, the data extraction of mobile equipment is carried out by means of the tools such as backup and recovery, cloning, moving and the like of an operating system. Or by recording the data generated by the mobile device, but this method is time-consuming and labor-consuming, and difficult to extract rich text messages such as voice, video, etc. If some equipment space is insufficient or no backup tool is available, a backup function of the computer end corresponding to the software is generally considered, and the backup function can support the backup of data generated when the software is used on the mobile equipment to the computer end. But in the process of extraction, a backup key is required to be acquired, and the backup key is used for decrypting the backed-up data, so that the data can be conveniently and directly checked. However, the backup key is only stored in the server or the mobile device and cannot be acquired at the computer end, so that the data extracted at the computer end can only be checked in the software and cannot be checked in a plaintext form. Disclosure of Invention The invention provides a data decryption method, a device, electronic equipment, a storage medium and a program product, which are used for completing data migration of a mobile terminal and realizing data extraction and decryption at a computer terminal. According to an aspect of the present invention, there is provided a data decryption method applied to a target client, the method including: determining a host program, wherein the host program comprises a program corresponding to the target client; Detecting a task state through a detection program, wherein the task state comprises a state of a data migration task, the data migration task comprises a task of migrating target data generated when a mobile terminal runs into encrypted data in the target client, and the mobile terminal is connected with the target client; under the condition that the task state indicates that the data migration task is successfully migrated, determining decryption information corresponding to the host program, wherein the decryption information comprises information generated in the running process of the host program; and obtaining decryption data based on the decryption information and the encryption data. According to another aspect of the present invention, there is provided a data decryption apparatus configured at a target client, including: The first determining module is used for determining a host program, wherein the host program comprises a program corresponding to the target client; The detection module is used for detecting task states through a detection program, wherein the task states comprise states of data migration tasks, the data migration tasks comprise tasks of migrating target data generated during running of a mobile terminal into encrypted data in the target client, and the mobile terminal is connected with the target client; the second determining module is used for determining decryption information corresponding to the host program when the task state indicates that the data migration task is successful, wherein the decryption information comprises information generated in the running process of the host program; And the decryption module is used for obtaining decryption data based on the decryption information and the encryption data. According to another aspect of the present invention, there is provided an electronic apparatus including: at least one processor, and A memory communicatively coupled to the at least one processor, wherein, The memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the data decryption method according to any one of the embodiments of the present invention. According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to execute a data decryption method according to any one of the embodiments of the present invention. According to another aspect of the present invention, there is provided a computer program product comprising a computer program which, when executed by a processor, implements a data decryption method according to any of the embodiments of the present invention. The technical scheme of the embodiment of the invention comprises the steps of determining a host program, detecting a task state through a detection program, determining decryption information corresponding to the host program under the condition that the task state indicates that the data mig