CN109271797A - A kind of method and system improving the safety of database sensitive information - Google Patents

A kind of method and system improving the safety of database sensitive information Download PDF

Info

Publication number
CN109271797A
CN109271797A CN201811062011.7A CN201811062011A CN109271797A CN 109271797 A CN109271797 A CN 109271797A CN 201811062011 A CN201811062011 A CN 201811062011A CN 109271797 A CN109271797 A CN 109271797A
Authority
CN
China
Prior art keywords
collected works
sensitive information
character
complete
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811062011.7A
Other languages
Chinese (zh)
Other versions
CN109271797B (en
Inventor
徐潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811062011.7A priority Critical patent/CN109271797B/en
Publication of CN109271797A publication Critical patent/CN109271797A/en
Application granted granted Critical
Publication of CN109271797B publication Critical patent/CN109271797B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a kind of method and system for improving the safety of database sensitive information, method is the following steps are included: extract all characters for including in application scenarios, character complete or collected works are generated, and are resequenced to the character in character complete or collected works, orderly character complete or collected works are generated;Orderly character complete or collected works are encrypted, is generated and is encrypted orderly character complete or collected works and save;Sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, generate scrambled sensitive information and is saved.System includes character complete or collected works generation module, the first encrypting module, coding module, the second encrypting module and memory module, realizes efficiency compared with prior art, when the present invention encrypts sensitive information and preferably balances with safety.

Description

A kind of method and system improving the safety of database sensitive information
Technical field
The present invention relates to technical field of information encryption, specifically a kind of side for improving the safety of database sensitive information Method and system.
Background technique
In daily life, it needs to encrypt many information, personal information, such as cell-phone number, identification card number, qq Number, the password that is commonly used;The content of instructions query in operating system, for example check open port, mainframe network with confidence Breath, installation service, the plan target for checking host;Middleware information, such as Apache, niginx, tomcat, iis etc. are intermediate The version of part, startup file, installation directory, configuration file;The version number information of database, such as user (), databases The contents such as (), load_file (), intooutfile (), the information that needs mentioned above encrypt are known as sensitive information.
Currently, often being faced in the storage to sensitive information in some mini engineerings or the application scenarios of project Two implacable contradictions, that is, the safety of the efficiency and information of storage system maintenance.If selecting the simplest common Encryption Algorithm, can store in the case where not wasting the too many calculation resources of system and using sensitive information, but sensitive information It is easy to be cracked and face biggish security risk;If select too complex Encryption Algorithm, although safety obtained it is bright Aobvious raising, but the computing resource of mini engineering or project is often limited, can make the effect for storing and using sensitive information Rate is very low, or even influences user experience.
Summary of the invention
A kind of method and system of raising local data base storage sensitive information safety are provided in the embodiment of the present invention, To solve the problems, such as that the efficiency to sensitive information storage system maintenance in the prior art and information security cannot combine.
One aspect of the present invention proposes a kind of method for improving the safety of database sensitive information, comprising the following steps:
S1 extracts all characters for including in application scenarios, generates character complete or collected works, and carry out to the character in character complete or collected works Rearrangement, generates orderly character complete or collected works;
S2 encrypts orderly character complete or collected works, generates and encrypts orderly character complete or collected works and save;
S3, obtains sensitive information from orderly character complete or collected works, and sensitive information is successively encoded and encrypted, and generates encryption Coding sensitive information simultaneously saves.
Optionally, it resequences according to the positive sequence of character ASCII character or backward to the character in character complete or collected works.
Optionally, the Encryption Algorithm that encryption uses is carried out to orderly character complete or collected works to calculate for SHA-384 algorithm or SHA-512 Method.
Optionally, the detailed process orderly character complete or collected works encrypted using SHA-512 algorithm are as follows:
Binary form is converted by all characters for including in orderly character complete or collected works;
Filling message-length is calculated, filling message disappears for saving all characters and word length for including in orderly character complete or collected works Breath, word length message first adds one " 1 ", then after add several " 0 ", add one 128 message again after filling message Length meets the integral multiple that filling message-length is 1024 plus the total message-length obtained after 128 message-lengths;
Initialize Hash buffer area, the integer of setting 8 64;
Total message-length is divided into several groups with 1024 for one group, uses 8 64 integers and wheel letter of initialization Number carries out loop computation, obtains 512 orderly character complete or collected works of encryption, will encrypt orderly character complete or collected works and be saved in database.
Optionally, detailed process sensitive information encoded are as follows:
By each character of sensitive information, according to its serial number in orderly character complete or collected works, successively replace with orderly The character of the inverted order number of putting in order in character complete or collected works generates coding sensitive information.
Optionally, the algorithm encrypted to coding sensitive information is MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 Any algorithm in algorithm or DES algorithm.
Optionally, detailed process coding sensitive information encrypted using MD5 algorithm are as follows:
All characters that sensitive information includes will be encoded and turn to binary form;
Filling message-length is calculated, filling message is used to save all characters that coding sensitive information includes and word length disappears Breath, word length message first adds one " 1 ", then after add several " 0 ", it is long to add one 64 message again after filling message Degree meets the integral multiple that filling message-length is 512 plus the total message-length obtained after 64 message-lengths;
Hash buffer area is initialized, 4 initial values and 4 auxiliary functions are set;
Total message-length is divided into several groups with 512 for one group, then is divided into 16 groups, every group 32 for 512 of each group 4 auxiliary functions are carried out cycle calculations by variable of 4 initial values, 4 32 constants are finally exported, by this 4 32 by position Scrambled sensitive information is generated after the constant cascade of position, scrambled sensitive information is saved in database.
On the other hand, the invention proposes a kind of systems for improving the safety of database sensitive information, including character complete or collected works Generation module, the first encrypting module, coding module, the second encrypting module and memory module;
Character complete or collected works' generation module generates character complete or collected works, and to word for extracting all characters for including in application scenarios Character in symbol complete or collected works is resequenced, and orderly character complete or collected works are generated;
First encrypting module generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module generates coding sensitive information for encoding to sensitive information;
Second encrypting module encrypts coding sensitive information, generates scrambled sensitive information;
Memory module is stored for that will encrypt orderly character complete or collected works and scrambled sensitive information.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned A technical solution in technical solution have the following advantages that or the utility model has the advantages that
1, character complete or collected works in application scenarios are ranked up, the order of character complete or collected works is customized by developer, guarantees information Safety;Orderly character complete or collected works are subjected to cryptographic calculation, the safety of information is further ensured that, sensitive information is encoded and is added It is close, the safety of enhancement information again, and repeatedly the raising of safety does not occupy a large amount of system operations ability, while real It is now efficiently and safe.
2, quick to encoding using any algorithm of MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm Sense information is encrypted, and the calculation amount for encoding and encrypting all very littles will not waste the too many calculation resources of system, and sensitive information quilt The risk cracked greatly reduced.
3, orderly character complete or collected works are encrypted using SHA-384 algorithm or SHA-512 algorithm, SHA-384 algorithm or SHA-512 algorithm is a kind of higher algorithm of safety, and the orderly character complete or collected works of the encryption comprising sensitive information only need once to add Close operation, therefore systematic entirety energy is not influenced.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the method for the invention embodiment;
Fig. 2 is the structural schematic diagram of system embodiment of the present invention.
Specific embodiment
In order to clarify the technical characteristics of the invention, below by specific embodiment, and its attached drawing is combined, to this hair It is bright to be described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Referring to Fig. 1, the method for improving the safety of database sensitive information, comprising the following steps:
S1 extracts all characters for including in application scenarios, generates character complete or collected works, and carry out to the character in character complete or collected works Rearrangement, generates orderly character complete or collected works;
S2 encrypts orderly character complete or collected works, generates and encrypts orderly character complete or collected works and save;
S3, obtains sensitive information from orderly character complete or collected works, and sensitive information is successively encoded and encrypted, and generates encryption Coding sensitive information simultaneously saves.
In step S1, all characters for including in application scenarios are extracted, generate character complete or collected works, and to the word in character complete or collected works Symbol is resequenced, and the detailed process of orderly character complete or collected works is generated are as follows:
S11 extracts all characters used in application scenarios, generates character complete or collected works;
S12 resequences to the character in character complete or collected works by the positive sequence or backward of character ASCII character, and generation has Sequence character complete or collected works.
Application scenarios refer to some mini engineerings or project.
The positive sequence of ASCII character, which refers to, to be ranked up in ASCII character standard scale according to ascending sequence, ASCII character Backward refer to and be ranked up in ASCII character standard scale according to descending sequence.
In step S2, orderly character complete or collected works are encrypted, generate the detailed process for encrypting orderly character complete or collected works and saving Are as follows:
Encrypt the Encryption Algorithm used to orderly character complete or collected works as SHA-384 algorithm or SHA-512 algorithm.
Illustrate the detailed process of step S2 by taking SHA-512 algorithm as an example:
All characters that orderly character complete or collected works include are turned to binary form by S21;
S22 calculates filling message-length, makes to fill message-length except 1024 take the remainder equal to 896, filling message is for protecting Have all characters and word length message that sequence character complete or collected works include, word length message is first added one " 1 ", then after add several " 0 " then adds one 128 message-lengths again after filling message, and it is complete that this 128 message is used to store orderly character The length value of all characters of collection, meeting filling message-length plus the total message-length obtained after 128 message-lengths is 1024 integral multiple;
S23, initializes Hash buffer area, and Hash buffer area is by 8 64 register groups at and will be at the beginning of 8 registers Beginning turns to 8 64 integers;
Total message-length is divided into several groups with 1024 for one group by S24, using initialization 8 64 integers and Round function carries out loop computation, obtains 512 orderly character complete or collected works of encryption;
S25 will encrypt orderly character complete or collected works and be saved in local data base.
If the maximum length of all characters of the orderly character complete or collected works in step S21 is L1, then L1It must satisfy L1<2128
In step S3, sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, it is raw At scrambled sensitive information and the detailed process of preservation are as follows:
S31 obtains sensitive information from orderly character complete or collected works, and sensitive information is encoded using replacement coding rule, Generate coding sensitive information;
S32 will encode sensitive information and use MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm Any algorithm carries out encryption and generates scrambled sensitive information and save.
In step S31, sensitive information is used into the process that encodes of replacement coding rule are as follows: by each of sensitive information A character successively replaces with the inverted order number of putting in order in orderly character complete or collected works according to its serial number in orderly character complete or collected works Character.If serial number of some character in orderly character complete or collected works of sensitive information is the 5th character, then by sensitive information The character replace with 5th character reciprocal.
In step S32, by taking MD5 algorithm as an example, encryption is carried out to coding sensitive information using MD5 algorithm and generates scrambled The detailed process of sensitive information are as follows:
S321 will encode all characters that sensitive information includes and turn to binary form;
S322 calculates filling message-length, makes to fill message-length except 512 take the remainder equal to 448, filling message is for protecting Deposit coding sensitive information all characters for including and word length message, word length message first added one " 1 ", then after add several " 0 ", then adds one 64 message-lengths again after filling message, this 64 message is used to store coding sensitive information The length value for all characters for including, meeting filling message-length plus the total message-length obtained after 64 message-lengths is 512 integral multiple;
S323 initializes Hash buffer area, 4 initial values and 4 auxiliary functions is arranged;
Total message-length is divided into several groups with 512 for one group, then is divided into 16 groups for 512 of each group by S324, often 4 auxiliary functions using 4 initial values are that variable carries out cycle calculations by group 32, finally 4 32 constants of output, by this 4 Scrambled sensitive information is generated after a 32 constants cascade;
Scrambled sensitive information is saved in local data base by S325.
If the maximum length of all characters of the coding sensitive information in step S321 is L2, then L2It must satisfy L2<264
There are Access, MySQL, SQLServer, Oracle, SQLite etc. in frequently-used data library, and wherein small server is local Common server is mainly MySQL or Access.
Referring to fig. 2, system of the present invention include character complete or collected works generation module 1, the first encrypting module 2, coding module 3, Second encrypting module 4 and memory module 5;
Character complete or collected works generation module 1 generates character complete or collected works, and right for extracting all characters for including in application scenarios Character in character complete or collected works is resequenced, and orderly character complete or collected works are generated;
First encrypting module 2 generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module 3 generates coding sensitive information for encoding to sensitive information;
Second encrypting module 4 encrypts coding sensitive information, generates scrambled sensitive information;
Memory module 5 is stored for that will encrypt orderly character complete or collected works and scrambled sensitive information.
The above is the preferred embodiment of the present invention, for those skilled in the art, Without departing from the principles of the invention, several improvements and modifications can also be made, these improvements and modifications are also regarded as this hair Bright protection scope.

Claims (8)

1. a kind of method for improving the safety of database sensitive information, characterized in that the following steps are included:
All characters for including in application scenarios are extracted, generate character complete or collected works, and arranged again the character in character complete or collected works Sequence generates orderly character complete or collected works;
Orderly character complete or collected works are encrypted, is generated and is encrypted orderly character complete or collected works and save;
Sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, it is quick to generate scrambled Sense information simultaneously saves.
2. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that according to character The positive sequence or backward of ASCII character resequence to the character in character complete or collected works.
3. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that ordered word Symbol complete or collected works encrypt the Encryption Algorithm used as SHA-384 algorithm or SHA-512 algorithm.
4. a kind of method for improving the safety of database sensitive information according to claim 3, characterized in that utilize SHA- The detailed process that 512 algorithms encrypt orderly character complete or collected works are as follows:
Binary form is converted by all characters for including in orderly character complete or collected works;
Filling message-length is calculated, filling message is used to save all characters for including in orderly character complete or collected works and word length message, Word length message is first added one " 1 ", then after add several " 0 ", it is long to add one 128 message again after filling message Degree meets the integral multiple that filling message-length is 1024 plus the total message-length obtained after 128 message-lengths;
Initialize Hash buffer area, the integer of setting 8 64;
Total message-length is divided into several groups with 1024 for one group, using initialization 8 64 integers and round function into Row loop computation obtains 512 orderly character complete or collected works of encryption, will encrypt orderly character complete or collected works and be saved in database.
5. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that believe sensitivity Cease the detailed process encoded are as follows:
Each character of sensitive information is successively replaced with into orderly character according to its serial number in orderly character complete or collected works The character of the inverted order number of putting in order in complete or collected works generates coding sensitive information.
6. a kind of method for improving the safety of database sensitive information according to claim 5, characterized in that quick to encoding The algorithm that sense information is encrypted is any calculation in MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm Method.
7. a kind of method for improving the safety of database sensitive information according to claim 6, characterized in that utilize MD5 The detailed process that algorithm encrypts coding sensitive information are as follows:
All characters that sensitive information includes will be encoded and turn to binary form;
Filling message-length is calculated, filling message is used to save all characters and word length message that coding sensitive information includes, word Long message is first added one " 1 ", then after add several " 0 ", add one 64 message-lengths again after filling message, it is full The integral multiple that foot filling message-length is 512 plus the total message-length obtained after 64 message-lengths;
Hash buffer area is initialized, 4 initial values and 4 auxiliary functions are set;
Total message-length is one group with 512 and is divided into several groups, then is divided into 16 groups for 512 of each group, it every group 32, will 4 auxiliary functions carry out cycle calculations by variable of 4 initial values, finally export 4 32 constants, by this 4 32 Scrambled sensitive information is generated after constant cascade, scrambled sensitive information is saved in database.
8. a kind of system for improving the safety of database sensitive information, characterized in that add including character complete or collected works generation module, first Close module, coding module, the second encrypting module and memory module;
Character complete or collected works' generation module generates character complete or collected works, and complete to character for extracting all characters for including in application scenarios The character of concentration is resequenced, and orderly character complete or collected works are generated;
First encrypting module generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module generates coding sensitive information for encoding to sensitive information;Second encrypting module, it is sensitive to coding Information is encrypted, and scrambled sensitive information is generated;Memory module, it is quick for orderly character complete or collected works and scrambled will to be encrypted Sense information is stored.
CN201811062011.7A 2018-09-12 2018-09-12 Method and system for improving security of database sensitive information Active CN109271797B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811062011.7A CN109271797B (en) 2018-09-12 2018-09-12 Method and system for improving security of database sensitive information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811062011.7A CN109271797B (en) 2018-09-12 2018-09-12 Method and system for improving security of database sensitive information

Publications (2)

Publication Number Publication Date
CN109271797A true CN109271797A (en) 2019-01-25
CN109271797B CN109271797B (en) 2022-02-18

Family

ID=65188602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811062011.7A Active CN109271797B (en) 2018-09-12 2018-09-12 Method and system for improving security of database sensitive information

Country Status (1)

Country Link
CN (1) CN109271797B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN114124358A (en) * 2021-11-24 2022-03-01 中国银行股份有限公司 Ciphertext generating method, device, server and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235622A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Transfer device for sensitive material such as a cryptographic key
CN101996298A (en) * 2009-08-14 2011-03-30 鸿富锦精密工业(深圳)有限公司 Encrypting method and decrypting method corresponding to same
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN104244235A (en) * 2013-06-20 2014-12-24 中国移动通信集团安徽有限公司 Method and system for encryption and decryption of sensitive information of telecommunication call bill
CN104992119A (en) * 2015-07-17 2015-10-21 上海众人网络安全技术有限公司 Sensitive information anti-interception safety transmission method and system
CN107147616A (en) * 2017-03-31 2017-09-08 武汉斗鱼网络科技有限公司 Data ciphering method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235622A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Transfer device for sensitive material such as a cryptographic key
CN101996298A (en) * 2009-08-14 2011-03-30 鸿富锦精密工业(深圳)有限公司 Encrypting method and decrypting method corresponding to same
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN104244235A (en) * 2013-06-20 2014-12-24 中国移动通信集团安徽有限公司 Method and system for encryption and decryption of sensitive information of telecommunication call bill
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN104992119A (en) * 2015-07-17 2015-10-21 上海众人网络安全技术有限公司 Sensitive information anti-interception safety transmission method and system
CN107147616A (en) * 2017-03-31 2017-09-08 武汉斗鱼网络科技有限公司 Data ciphering method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348228A (en) * 2019-05-22 2019-10-18 嘉兴天盾安全技术服务有限公司 A kind of private data storage method
CN114124358A (en) * 2021-11-24 2022-03-01 中国银行股份有限公司 Ciphertext generating method, device, server and medium
CN114124358B (en) * 2021-11-24 2023-12-22 中国银行股份有限公司 Ciphertext generating method, ciphertext generating device, server and medium

Also Published As

Publication number Publication date
CN109271797B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN110222048B (en) Sequence generation method, device, computer equipment and storage medium
CN111373378B (en) Data security for error correction code based shared blockchain data storage
CN111656343A (en) Error correction coding based shared blockchain data storage in trusted execution environments
CN109815051A (en) The data processing method and system of block chain
CN106776111A (en) A kind of recovered cloud storage system based on LRC correcting and eleting codes
CN109271797A (en) A kind of method and system improving the safety of database sensitive information
CN111221780B (en) Server file safe storage method based on block chain
KR20140011534A (en) Generating and verifying the alternative data in a specified format
CN110705976A (en) Intelligent medical settlement method and system based on big data, electronic equipment and storage medium
US11586588B2 (en) System and methods for bandwidth-efficient cryptographic data transfer
Apostal et al. Password recovery using MPI and CUDA
CN109831479A (en) The data processing method and system of block chain
CN115147111A (en) Key generation method and device, electronic device and storage medium
CN111241578A (en) Desensitization method and desensitization system for Vertica
CN111859424B (en) Data encryption method, system, terminal and storage medium of physical management platform
CN105933120A (en) Spark platform-based password hash value recovery method and device
Torvi et al. An unique data security using text steganography
CN114401116B (en) Trusted data transmission method based on HK-Means and security detection
US20220129421A1 (en) System and methods for bandwidth-efficient encoding of genomic data
CN103986718A (en) Method for improving transmission safety and reading efficiency of HDFS files
CN114928363A (en) Data processing method, data processing device, computer equipment and storage medium
CN102946311A (en) Key dispersed method for enhancing safety of symmetric key system
CN115935299A (en) Authorization control method, device, computer equipment and storage medium
CN116880778B (en) User privacy protection method based on regenerative coding and distributed storage
Yu et al. Password Cracking of PDF 2.0 documents on GPU

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant