CN109271797A - A kind of method and system improving the safety of database sensitive information - Google Patents
A kind of method and system improving the safety of database sensitive information Download PDFInfo
- Publication number
- CN109271797A CN109271797A CN201811062011.7A CN201811062011A CN109271797A CN 109271797 A CN109271797 A CN 109271797A CN 201811062011 A CN201811062011 A CN 201811062011A CN 109271797 A CN109271797 A CN 109271797A
- Authority
- CN
- China
- Prior art keywords
- collected works
- sensitive information
- character
- complete
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Abstract
The invention discloses a kind of method and system for improving the safety of database sensitive information, method is the following steps are included: extract all characters for including in application scenarios, character complete or collected works are generated, and are resequenced to the character in character complete or collected works, orderly character complete or collected works are generated;Orderly character complete or collected works are encrypted, is generated and is encrypted orderly character complete or collected works and save;Sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, generate scrambled sensitive information and is saved.System includes character complete or collected works generation module, the first encrypting module, coding module, the second encrypting module and memory module, realizes efficiency compared with prior art, when the present invention encrypts sensitive information and preferably balances with safety.
Description
Technical field
The present invention relates to technical field of information encryption, specifically a kind of side for improving the safety of database sensitive information
Method and system.
Background technique
In daily life, it needs to encrypt many information, personal information, such as cell-phone number, identification card number, qq
Number, the password that is commonly used;The content of instructions query in operating system, for example check open port, mainframe network with confidence
Breath, installation service, the plan target for checking host;Middleware information, such as Apache, niginx, tomcat, iis etc. are intermediate
The version of part, startup file, installation directory, configuration file;The version number information of database, such as user (), databases
The contents such as (), load_file (), intooutfile (), the information that needs mentioned above encrypt are known as sensitive information.
Currently, often being faced in the storage to sensitive information in some mini engineerings or the application scenarios of project
Two implacable contradictions, that is, the safety of the efficiency and information of storage system maintenance.If selecting the simplest common
Encryption Algorithm, can store in the case where not wasting the too many calculation resources of system and using sensitive information, but sensitive information
It is easy to be cracked and face biggish security risk;If select too complex Encryption Algorithm, although safety obtained it is bright
Aobvious raising, but the computing resource of mini engineering or project is often limited, can make the effect for storing and using sensitive information
Rate is very low, or even influences user experience.
Summary of the invention
A kind of method and system of raising local data base storage sensitive information safety are provided in the embodiment of the present invention,
To solve the problems, such as that the efficiency to sensitive information storage system maintenance in the prior art and information security cannot combine.
One aspect of the present invention proposes a kind of method for improving the safety of database sensitive information, comprising the following steps:
S1 extracts all characters for including in application scenarios, generates character complete or collected works, and carry out to the character in character complete or collected works
Rearrangement, generates orderly character complete or collected works;
S2 encrypts orderly character complete or collected works, generates and encrypts orderly character complete or collected works and save;
S3, obtains sensitive information from orderly character complete or collected works, and sensitive information is successively encoded and encrypted, and generates encryption
Coding sensitive information simultaneously saves.
Optionally, it resequences according to the positive sequence of character ASCII character or backward to the character in character complete or collected works.
Optionally, the Encryption Algorithm that encryption uses is carried out to orderly character complete or collected works to calculate for SHA-384 algorithm or SHA-512
Method.
Optionally, the detailed process orderly character complete or collected works encrypted using SHA-512 algorithm are as follows:
Binary form is converted by all characters for including in orderly character complete or collected works;
Filling message-length is calculated, filling message disappears for saving all characters and word length for including in orderly character complete or collected works
Breath, word length message first adds one " 1 ", then after add several " 0 ", add one 128 message again after filling message
Length meets the integral multiple that filling message-length is 1024 plus the total message-length obtained after 128 message-lengths;
Initialize Hash buffer area, the integer of setting 8 64;
Total message-length is divided into several groups with 1024 for one group, uses 8 64 integers and wheel letter of initialization
Number carries out loop computation, obtains 512 orderly character complete or collected works of encryption, will encrypt orderly character complete or collected works and be saved in database.
Optionally, detailed process sensitive information encoded are as follows:
By each character of sensitive information, according to its serial number in orderly character complete or collected works, successively replace with orderly
The character of the inverted order number of putting in order in character complete or collected works generates coding sensitive information.
Optionally, the algorithm encrypted to coding sensitive information is MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1
Any algorithm in algorithm or DES algorithm.
Optionally, detailed process coding sensitive information encrypted using MD5 algorithm are as follows:
All characters that sensitive information includes will be encoded and turn to binary form;
Filling message-length is calculated, filling message is used to save all characters that coding sensitive information includes and word length disappears
Breath, word length message first adds one " 1 ", then after add several " 0 ", it is long to add one 64 message again after filling message
Degree meets the integral multiple that filling message-length is 512 plus the total message-length obtained after 64 message-lengths;
Hash buffer area is initialized, 4 initial values and 4 auxiliary functions are set;
Total message-length is divided into several groups with 512 for one group, then is divided into 16 groups, every group 32 for 512 of each group
4 auxiliary functions are carried out cycle calculations by variable of 4 initial values, 4 32 constants are finally exported, by this 4 32 by position
Scrambled sensitive information is generated after the constant cascade of position, scrambled sensitive information is saved in database.
On the other hand, the invention proposes a kind of systems for improving the safety of database sensitive information, including character complete or collected works
Generation module, the first encrypting module, coding module, the second encrypting module and memory module;
Character complete or collected works' generation module generates character complete or collected works, and to word for extracting all characters for including in application scenarios
Character in symbol complete or collected works is resequenced, and orderly character complete or collected works are generated;
First encrypting module generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module generates coding sensitive information for encoding to sensitive information;
Second encrypting module encrypts coding sensitive information, generates scrambled sensitive information;
Memory module is stored for that will encrypt orderly character complete or collected works and scrambled sensitive information.
The effect provided in summary of the invention is only the effect of embodiment, rather than invents all whole effects, above-mentioned
A technical solution in technical solution have the following advantages that or the utility model has the advantages that
1, character complete or collected works in application scenarios are ranked up, the order of character complete or collected works is customized by developer, guarantees information
Safety;Orderly character complete or collected works are subjected to cryptographic calculation, the safety of information is further ensured that, sensitive information is encoded and is added
It is close, the safety of enhancement information again, and repeatedly the raising of safety does not occupy a large amount of system operations ability, while real
It is now efficiently and safe.
2, quick to encoding using any algorithm of MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm
Sense information is encrypted, and the calculation amount for encoding and encrypting all very littles will not waste the too many calculation resources of system, and sensitive information quilt
The risk cracked greatly reduced.
3, orderly character complete or collected works are encrypted using SHA-384 algorithm or SHA-512 algorithm, SHA-384 algorithm or
SHA-512 algorithm is a kind of higher algorithm of safety, and the orderly character complete or collected works of the encryption comprising sensitive information only need once to add
Close operation, therefore systematic entirety energy is not influenced.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the method for the invention embodiment;
Fig. 2 is the structural schematic diagram of system embodiment of the present invention.
Specific embodiment
In order to clarify the technical characteristics of the invention, below by specific embodiment, and its attached drawing is combined, to this hair
It is bright to be described in detail.Following disclosure provides many different embodiments or example is used to realize different knots of the invention
Structure.In order to simplify disclosure of the invention, hereinafter the component of specific examples and setting are described.In addition, the present invention can be with
Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated
Relationship between various embodiments and/or setting is discussed.It should be noted that illustrated component is not necessarily to scale in the accompanying drawings
It draws.Present invention omits the descriptions to known assemblies and treatment technology and process to avoid the present invention is unnecessarily limiting.
Referring to Fig. 1, the method for improving the safety of database sensitive information, comprising the following steps:
S1 extracts all characters for including in application scenarios, generates character complete or collected works, and carry out to the character in character complete or collected works
Rearrangement, generates orderly character complete or collected works;
S2 encrypts orderly character complete or collected works, generates and encrypts orderly character complete or collected works and save;
S3, obtains sensitive information from orderly character complete or collected works, and sensitive information is successively encoded and encrypted, and generates encryption
Coding sensitive information simultaneously saves.
In step S1, all characters for including in application scenarios are extracted, generate character complete or collected works, and to the word in character complete or collected works
Symbol is resequenced, and the detailed process of orderly character complete or collected works is generated are as follows:
S11 extracts all characters used in application scenarios, generates character complete or collected works;
S12 resequences to the character in character complete or collected works by the positive sequence or backward of character ASCII character, and generation has
Sequence character complete or collected works.
Application scenarios refer to some mini engineerings or project.
The positive sequence of ASCII character, which refers to, to be ranked up in ASCII character standard scale according to ascending sequence, ASCII character
Backward refer to and be ranked up in ASCII character standard scale according to descending sequence.
In step S2, orderly character complete or collected works are encrypted, generate the detailed process for encrypting orderly character complete or collected works and saving
Are as follows:
Encrypt the Encryption Algorithm used to orderly character complete or collected works as SHA-384 algorithm or SHA-512 algorithm.
Illustrate the detailed process of step S2 by taking SHA-512 algorithm as an example:
All characters that orderly character complete or collected works include are turned to binary form by S21;
S22 calculates filling message-length, makes to fill message-length except 1024 take the remainder equal to 896, filling message is for protecting
Have all characters and word length message that sequence character complete or collected works include, word length message is first added one " 1 ", then after add several
" 0 " then adds one 128 message-lengths again after filling message, and it is complete that this 128 message is used to store orderly character
The length value of all characters of collection, meeting filling message-length plus the total message-length obtained after 128 message-lengths is
1024 integral multiple;
S23, initializes Hash buffer area, and Hash buffer area is by 8 64 register groups at and will be at the beginning of 8 registers
Beginning turns to 8 64 integers;
Total message-length is divided into several groups with 1024 for one group by S24, using initialization 8 64 integers and
Round function carries out loop computation, obtains 512 orderly character complete or collected works of encryption;
S25 will encrypt orderly character complete or collected works and be saved in local data base.
If the maximum length of all characters of the orderly character complete or collected works in step S21 is L1, then L1It must satisfy L1<2128。
In step S3, sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, it is raw
At scrambled sensitive information and the detailed process of preservation are as follows:
S31 obtains sensitive information from orderly character complete or collected works, and sensitive information is encoded using replacement coding rule,
Generate coding sensitive information;
S32 will encode sensitive information and use MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm
Any algorithm carries out encryption and generates scrambled sensitive information and save.
In step S31, sensitive information is used into the process that encodes of replacement coding rule are as follows: by each of sensitive information
A character successively replaces with the inverted order number of putting in order in orderly character complete or collected works according to its serial number in orderly character complete or collected works
Character.If serial number of some character in orderly character complete or collected works of sensitive information is the 5th character, then by sensitive information
The character replace with 5th character reciprocal.
In step S32, by taking MD5 algorithm as an example, encryption is carried out to coding sensitive information using MD5 algorithm and generates scrambled
The detailed process of sensitive information are as follows:
S321 will encode all characters that sensitive information includes and turn to binary form;
S322 calculates filling message-length, makes to fill message-length except 512 take the remainder equal to 448, filling message is for protecting
Deposit coding sensitive information all characters for including and word length message, word length message first added one " 1 ", then after add several
" 0 ", then adds one 64 message-lengths again after filling message, this 64 message is used to store coding sensitive information
The length value for all characters for including, meeting filling message-length plus the total message-length obtained after 64 message-lengths is
512 integral multiple;
S323 initializes Hash buffer area, 4 initial values and 4 auxiliary functions is arranged;
Total message-length is divided into several groups with 512 for one group, then is divided into 16 groups for 512 of each group by S324, often
4 auxiliary functions using 4 initial values are that variable carries out cycle calculations by group 32, finally 4 32 constants of output, by this 4
Scrambled sensitive information is generated after a 32 constants cascade;
Scrambled sensitive information is saved in local data base by S325.
If the maximum length of all characters of the coding sensitive information in step S321 is L2, then L2It must satisfy L2<264。
There are Access, MySQL, SQLServer, Oracle, SQLite etc. in frequently-used data library, and wherein small server is local
Common server is mainly MySQL or Access.
Referring to fig. 2, system of the present invention include character complete or collected works generation module 1, the first encrypting module 2, coding module 3,
Second encrypting module 4 and memory module 5;
Character complete or collected works generation module 1 generates character complete or collected works, and right for extracting all characters for including in application scenarios
Character in character complete or collected works is resequenced, and orderly character complete or collected works are generated;
First encrypting module 2 generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module 3 generates coding sensitive information for encoding to sensitive information;
Second encrypting module 4 encrypts coding sensitive information, generates scrambled sensitive information;
Memory module 5 is stored for that will encrypt orderly character complete or collected works and scrambled sensitive information.
The above is the preferred embodiment of the present invention, for those skilled in the art,
Without departing from the principles of the invention, several improvements and modifications can also be made, these improvements and modifications are also regarded as this hair
Bright protection scope.
Claims (8)
1. a kind of method for improving the safety of database sensitive information, characterized in that the following steps are included:
All characters for including in application scenarios are extracted, generate character complete or collected works, and arranged again the character in character complete or collected works
Sequence generates orderly character complete or collected works;
Orderly character complete or collected works are encrypted, is generated and is encrypted orderly character complete or collected works and save;
Sensitive information is obtained from orderly character complete or collected works, sensitive information is successively encoded and encrypted, it is quick to generate scrambled
Sense information simultaneously saves.
2. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that according to character
The positive sequence or backward of ASCII character resequence to the character in character complete or collected works.
3. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that ordered word
Symbol complete or collected works encrypt the Encryption Algorithm used as SHA-384 algorithm or SHA-512 algorithm.
4. a kind of method for improving the safety of database sensitive information according to claim 3, characterized in that utilize SHA-
The detailed process that 512 algorithms encrypt orderly character complete or collected works are as follows:
Binary form is converted by all characters for including in orderly character complete or collected works;
Filling message-length is calculated, filling message is used to save all characters for including in orderly character complete or collected works and word length message,
Word length message is first added one " 1 ", then after add several " 0 ", it is long to add one 128 message again after filling message
Degree meets the integral multiple that filling message-length is 1024 plus the total message-length obtained after 128 message-lengths;
Initialize Hash buffer area, the integer of setting 8 64;
Total message-length is divided into several groups with 1024 for one group, using initialization 8 64 integers and round function into
Row loop computation obtains 512 orderly character complete or collected works of encryption, will encrypt orderly character complete or collected works and be saved in database.
5. a kind of method for improving the safety of database sensitive information according to claim 1, characterized in that believe sensitivity
Cease the detailed process encoded are as follows:
Each character of sensitive information is successively replaced with into orderly character according to its serial number in orderly character complete or collected works
The character of the inverted order number of putting in order in complete or collected works generates coding sensitive information.
6. a kind of method for improving the safety of database sensitive information according to claim 5, characterized in that quick to encoding
The algorithm that sense information is encrypted is any calculation in MD4 algorithm, MD5 algorithm, SHA-0 algorithm, SHA-1 algorithm or DES algorithm
Method.
7. a kind of method for improving the safety of database sensitive information according to claim 6, characterized in that utilize MD5
The detailed process that algorithm encrypts coding sensitive information are as follows:
All characters that sensitive information includes will be encoded and turn to binary form;
Filling message-length is calculated, filling message is used to save all characters and word length message that coding sensitive information includes, word
Long message is first added one " 1 ", then after add several " 0 ", add one 64 message-lengths again after filling message, it is full
The integral multiple that foot filling message-length is 512 plus the total message-length obtained after 64 message-lengths;
Hash buffer area is initialized, 4 initial values and 4 auxiliary functions are set;
Total message-length is one group with 512 and is divided into several groups, then is divided into 16 groups for 512 of each group, it every group 32, will
4 auxiliary functions carry out cycle calculations by variable of 4 initial values, finally export 4 32 constants, by this 4 32
Scrambled sensitive information is generated after constant cascade, scrambled sensitive information is saved in database.
8. a kind of system for improving the safety of database sensitive information, characterized in that add including character complete or collected works generation module, first
Close module, coding module, the second encrypting module and memory module;
Character complete or collected works' generation module generates character complete or collected works, and complete to character for extracting all characters for including in application scenarios
The character of concentration is resequenced, and orderly character complete or collected works are generated;
First encrypting module generates for encrypting to orderly character complete or collected works and encrypts orderly character complete or collected works;
Coding module generates coding sensitive information for encoding to sensitive information;Second encrypting module, it is sensitive to coding
Information is encrypted, and scrambled sensitive information is generated;Memory module, it is quick for orderly character complete or collected works and scrambled will to be encrypted
Sense information is stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811062011.7A CN109271797B (en) | 2018-09-12 | 2018-09-12 | Method and system for improving security of database sensitive information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811062011.7A CN109271797B (en) | 2018-09-12 | 2018-09-12 | Method and system for improving security of database sensitive information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109271797A true CN109271797A (en) | 2019-01-25 |
CN109271797B CN109271797B (en) | 2022-02-18 |
Family
ID=65188602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811062011.7A Active CN109271797B (en) | 2018-09-12 | 2018-09-12 | Method and system for improving security of database sensitive information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109271797B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN114124358A (en) * | 2021-11-24 | 2022-03-01 | 中国银行股份有限公司 | Ciphertext generating method, device, server and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100235622A1 (en) * | 2009-03-13 | 2010-09-16 | Assa Abloy Ab | Transfer device for sensitive material such as a cryptographic key |
CN101996298A (en) * | 2009-08-14 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Encrypting method and decrypting method corresponding to same |
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN104244235A (en) * | 2013-06-20 | 2014-12-24 | 中国移动通信集团安徽有限公司 | Method and system for encryption and decryption of sensitive information of telecommunication call bill |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN107147616A (en) * | 2017-03-31 | 2017-09-08 | 武汉斗鱼网络科技有限公司 | Data ciphering method and device |
-
2018
- 2018-09-12 CN CN201811062011.7A patent/CN109271797B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100235622A1 (en) * | 2009-03-13 | 2010-09-16 | Assa Abloy Ab | Transfer device for sensitive material such as a cryptographic key |
CN101996298A (en) * | 2009-08-14 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Encrypting method and decrypting method corresponding to same |
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
CN104244235A (en) * | 2013-06-20 | 2014-12-24 | 中国移动通信集团安徽有限公司 | Method and system for encryption and decryption of sensitive information of telecommunication call bill |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN107147616A (en) * | 2017-03-31 | 2017-09-08 | 武汉斗鱼网络科技有限公司 | Data ciphering method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110348228A (en) * | 2019-05-22 | 2019-10-18 | 嘉兴天盾安全技术服务有限公司 | A kind of private data storage method |
CN114124358A (en) * | 2021-11-24 | 2022-03-01 | 中国银行股份有限公司 | Ciphertext generating method, device, server and medium |
CN114124358B (en) * | 2021-11-24 | 2023-12-22 | 中国银行股份有限公司 | Ciphertext generating method, ciphertext generating device, server and medium |
Also Published As
Publication number | Publication date |
---|---|
CN109271797B (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110222048B (en) | Sequence generation method, device, computer equipment and storage medium | |
CN111373378B (en) | Data security for error correction code based shared blockchain data storage | |
CN111656343A (en) | Error correction coding based shared blockchain data storage in trusted execution environments | |
CN109815051A (en) | The data processing method and system of block chain | |
CN106776111A (en) | A kind of recovered cloud storage system based on LRC correcting and eleting codes | |
CN109271797A (en) | A kind of method and system improving the safety of database sensitive information | |
CN111221780B (en) | Server file safe storage method based on block chain | |
KR20140011534A (en) | Generating and verifying the alternative data in a specified format | |
CN110705976A (en) | Intelligent medical settlement method and system based on big data, electronic equipment and storage medium | |
US11586588B2 (en) | System and methods for bandwidth-efficient cryptographic data transfer | |
Apostal et al. | Password recovery using MPI and CUDA | |
CN109831479A (en) | The data processing method and system of block chain | |
CN115147111A (en) | Key generation method and device, electronic device and storage medium | |
CN111241578A (en) | Desensitization method and desensitization system for Vertica | |
CN111859424B (en) | Data encryption method, system, terminal and storage medium of physical management platform | |
CN105933120A (en) | Spark platform-based password hash value recovery method and device | |
Torvi et al. | An unique data security using text steganography | |
CN114401116B (en) | Trusted data transmission method based on HK-Means and security detection | |
US20220129421A1 (en) | System and methods for bandwidth-efficient encoding of genomic data | |
CN103986718A (en) | Method for improving transmission safety and reading efficiency of HDFS files | |
CN114928363A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN102946311A (en) | Key dispersed method for enhancing safety of symmetric key system | |
CN115935299A (en) | Authorization control method, device, computer equipment and storage medium | |
CN116880778B (en) | User privacy protection method based on regenerative coding and distributed storage | |
Yu et al. | Password Cracking of PDF 2.0 documents on GPU |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |