CN109787956B - Data table encryption method and device, computer equipment and storage medium - Google Patents

Data table encryption method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109787956B
CN109787956B CN201811527346.1A CN201811527346A CN109787956B CN 109787956 B CN109787956 B CN 109787956B CN 201811527346 A CN201811527346 A CN 201811527346A CN 109787956 B CN109787956 B CN 109787956B
Authority
CN
China
Prior art keywords
encrypted
field
encryption
data table
fields
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811527346.1A
Other languages
Chinese (zh)
Other versions
CN109787956A (en
Inventor
苏渊博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811527346.1A priority Critical patent/CN109787956B/en
Publication of CN109787956A publication Critical patent/CN109787956A/en
Application granted granted Critical
Publication of CN109787956B publication Critical patent/CN109787956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a data table encryption method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request; matching each initial field in the initial data table with a preset encryption field to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in the segmentation information; if the number of the fields to be encrypted is within a preset range, independently encrypting each field to be encrypted to generate a first encrypted field; encrypting the plurality of first encrypted fields as a whole to generate a second encrypted field; the second encrypted field and the unencrypted field are combined to generate a first encrypted data table. The data table encryption method is based on an information encryption technology, and can encrypt sensitive information of the data table returned to the terminal by the server so as to improve the safety of information transmission.

Description

Data table encryption method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for encrypting a data table, a computer device, and a storage medium.
Background
In the prior art, a terminal sends a data request to a server, and when the server receives the data request, the server usually returns the data to the terminal in an unencrypted manner. If the data sent by the server to the terminal is acquired by the third-party illegal user and is tampered, the third-party illegal user sends the tampered data to the terminal, so that the data received by the terminal is inconsistent with the requested data, information leakage is easily caused, and user experience is influenced.
Disclosure of Invention
The application provides a data table encryption method, a data table encryption device, computer equipment and a storage medium, so that the safety of information transmission is improved.
In a first aspect, the present application provides a data table encryption method, which includes:
receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number;
matching each initial field in the initial data table with a preset encrypted field to screen out a field to be encrypted and a field not to be encrypted, and storing sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in segmentation information, wherein the field to be encrypted is the same initial field as the preset encrypted field, and the field not to be encrypted is different from the preset encrypted field;
if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field, wherein the preset numerical range is a full-open interval, the upper limit value of the preset numerical range is the total number of the initial fields in the initial data table, and the lower limit value of the preset numerical range is one;
encrypting a plurality of the first encrypted fields as a whole to generate a second encrypted field;
combining the second encrypted field and the unencrypted field to generate a first encrypted data table.
In a second aspect, the present application provides a data table encryption apparatus, including:
a first obtaining unit, configured to receive a data request sent by a terminal, and obtain an initial data table corresponding to the data request, where the initial data table includes multiple initial fields that are ordered according to a certain sequence number;
the matching unit is used for matching each initial field in the initial data table with a preset encryption field so as to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in the segmentation information;
the first encryption unit is used for independently encrypting each field to be encrypted to generate a first encryption field if the number of the fields to be encrypted is within a preset numerical range;
a second encryption unit, configured to encrypt the plurality of first encrypted fields as a whole to generate a second encrypted field;
a first generating unit, configured to combine the second encrypted field and the unencrypted field to generate a first encrypted data table.
In a third aspect, the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the data table encryption method provided in any one of the present applications when executing the computer program.
In a fourth aspect, the present application further provides a storage medium, wherein the storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute any one of the data table encryption methods provided in the present application.
The application provides a data table encryption method, a data table encryption device, computer equipment and a storage medium, wherein the data table encryption method comprises the following steps: receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number; matching each initial field in the initial data table with a preset encryption field to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in segmentation information; if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field; encrypting a plurality of the first encrypted fields as a whole to generate a second encrypted field; combining the second encrypted field and the unencrypted field to generate a first encrypted data table. The data table encryption method can encrypt the sensitive information of the data table returned to the terminal by the server so as to improve the safety of information transmission.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data table encryption method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a data table encryption method according to another embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a data table encryption method according to yet another embodiment of the present application;
FIG. 4 is a schematic flow chart diagram illustrating a data table encryption method according to another embodiment of the present application;
FIG. 5 is a schematic flow chart diagram illustrating a data table encryption method according to another embodiment of the present application;
FIG. 6 is a schematic flow chart diagram illustrating a data table encryption method according to yet another embodiment of the present application;
FIG. 7 is a schematic block diagram of a data table encryption apparatus provided in an embodiment of the present application;
FIG. 8 is a schematic block diagram of a data table encryption apparatus according to yet another embodiment of the present application;
FIG. 9 is a schematic block diagram of a data table encryption apparatus according to yet another embodiment of the present application;
FIG. 10 is a schematic block diagram of a data table encryption apparatus according to yet another embodiment of the present application;
FIG. 11 is a block diagram illustrating an apparatus for encrypting a data table according to another embodiment of the present application;
FIG. 12 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application;
FIG. 13 is a schematic block diagram of a data table encryption apparatus according to yet another embodiment of the present application;
fig. 14 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic flow chart of a data table encryption method according to an embodiment of the present application. The data table encryption method is applied to the server. As shown in fig. 1, the data table encryption method includes the following steps S110 to S150.
S110, receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number.
The method comprises the steps that a user sends a data request to a server through a terminal, the server obtains the data request of the terminal, analyzes the data request, and searches resources on the server according to the data request to obtain an initial data table corresponding to the data request, for example, the user requests a contact list from the server through the terminal, the contact list is the initial data table, and the contact list comprises 4 initial fields of 'user ID', 'user name', 'mobile phone number' and 'mailbox'.
Referring to fig. 3, fig. 3 is a schematic flow chart of a data table encryption method according to another embodiment of the present application. In this embodiment, before the step S110, the data table encryption method further includes the following steps S110a and S110b.
S110a, generating a first user interface, wherein the first user interface comprises a plurality of first parameter input areas, each parameter input area is used for a user to input a keyword, and the keyword is used for determining an encryption field.
By generating the first user interface, a user can set a plurality of keywords on the first user interface conveniently, wherein each keyword is used for determining the encrypted field. For example, the user may set two keywords, i.e., "user name" and "mobile phone number", on the first user interface.
S110b, acquiring a plurality of keywords input by a user in the first user interface, and generating a preset encryption field according to the keywords.
For example, if the user inputs two keywords, namely "user name" and "mobile phone number" in the first user interface, the preset encryption fields are the "user name" field and the "mobile phone number" field.
Referring to fig. 4, fig. 4 is a schematic flowchart of a data table encryption method according to another embodiment of the present application. In this embodiment, before the step S110, the method includes a step S110c and a step S110d.
And S110c, generating a second user interface, wherein the second user interface comprises a plurality of second parameter input areas and third parameter input areas associated with the second parameter input areas, each second parameter input area is used for a user to input a keyword, the keyword is used for determining an encrypted field, each third parameter input area is used for the user to input an encryption index, and the encryption index is used for determining the encryption level of the field.
And generating a second user interface to facilitate the user to set a plurality of keywords on the second user interface, wherein each keyword is used for determining the encryption field, and an encryption index is set for each keyword. For example, the user may set two keywords, which are "user name" and "mobile phone number", respectively, on the second user interface, and correspondingly set the encryption indexes to be "1" and "2", respectively.
S110d, obtaining a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface, and generating a preset encryption index according to the plurality of keywords, wherein the plurality of keywords are associated with the plurality of encryption indexes.
For example, if the user inputs two keywords, which are "user name" and "mobile phone number" respectively, on the second user interface, the preset encryption fields are the "user name" field and the "mobile phone number" field, and the encryption indexes of the corresponding encryption fields are "1" and "2" respectively.
Referring to fig. 5, fig. 5 is a schematic flow chart of a data table encryption method according to another embodiment of the present application. In this embodiment, after the step S110d, the method further includes a step S110e and a step S110f.
And S110e, generating a third user interface, wherein the third user interface comprises a plurality of fourth parameter input areas and fifth parameter input areas associated with the fourth parameter input areas, each fourth parameter input area is used for a user to input encryption algorithm parameters, and each fifth parameter input area is used for the user to input security indexes.
In order to encrypt the corresponding field to be encrypted according to different encryption indexes, an encryption parameter mapping table can be set, wherein the encryption parameter mapping table comprises a plurality of encryption algorithm parameters and a security index corresponding to each encryption algorithm parameter. And generating a third user interface to facilitate the user to input a plurality of encryption algorithm parameters and the safety index on the third user interface.
S110f, acquiring a plurality of encryption algorithm parameters input by a user in the third user interface and a security index associated with each encryption algorithm parameter, and generating an encryption parameter mapping table according to the plurality of encryption algorithm parameters and the plurality of security indexes.
For example, the following encryption parameter mapping table is set:
encryption algorithm parameters: RSA algorithm parameter security index: 1
Encryption algorithm parameters: DSA algorithm parameter safety index: 2
Encryption algorithm parameters: ECC algorithm parameter safety index: 3
Encryption algorithm parameters: DES algorithm parameter security index: 4
S120, matching each initial field in the initial data table with a preset encrypted field to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in segmentation information, wherein the fields to be encrypted are the same initial fields as the preset encrypted fields, and the fields not to be encrypted are the initial fields different from the preset encrypted fields.
For example, for the contact list, the preset encryption fields including "user name" and "mobile phone number" are set, the "user name" field and the "mobile phone number" field are fields to be encrypted, and the "user ID" and "mailbox" are fields not to be encrypted. The sequence number corresponding to each initial field of the contact list is respectively as follows:
field sequence number: 1 field: "user ID"
Field sequence number: 2 field: user name "
Field sequence number: 3, field: 'Mobile phone number'
Field sequence number: 4 field: mail box "
And storing the serial numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in the segmented information so as to combine the encrypted fields and the fields not to be encrypted according to the segmented information after encrypting the fields to be encrypted to generate the encrypted fields, and generating the encrypted data table under the condition of not changing the serial numbers.
S130, if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field, wherein the preset numerical range is a full-open interval, the upper limit value of the preset numerical range is the total number of the initial fields in the initial data table, and the lower limit value of the preset numerical range is one.
For example, for the above contact list, it includes only 4 initial fields, since the preset encryption field is set as "user name" and "mobile phone number", the number of the fields to be encrypted is 2, and if the preset range is set as 1 to 4, that is, the number of the fields to be encrypted is smaller than the total number of the initial fields included in the initial data table and is greater than one, at this time, each field to be encrypted is encrypted separately, and a first encryption field is generated.
Referring to fig. 6, fig. 6 is a schematic flow chart of a data table encryption method according to another embodiment of the present application. In this embodiment, the step S130 includes sub-steps S131 to S132.
Referring to fig. 2, in this embodiment, before the step S130, the method includes S130a.
S130a, judging whether the number of the fields to be encrypted is within a preset numerical range.
By judging the number of fields to be encrypted, different encryption schemes can be selected. For example, if the number of the fields to be encrypted is within a preset value range, each field to be encrypted can be encrypted separately to generate a plurality of first encrypted fields, and then the plurality of first encrypted fields are used as a whole to be encrypted to generate a second encrypted field; if the number of the fields to be encrypted is not within the preset value range, for example, if the number of the fields to be encrypted is the total number of the initial fields in the initial data table, the initial data table is taken as a whole to be encrypted, and if the number of the fields to be encrypted is one, only the fields to be encrypted are encrypted. In this embodiment, if the step S130a is executed to determine that the number of the fields to be encrypted is within the preset value range, the step S131 is executed, otherwise, the step S130b is executed.
S131, if the number of the fields to be encrypted is within a preset numerical range, acquiring an encryption index matched with the fields to be encrypted, and acquiring a target encryption algorithm parameter from the encryption parameter mapping table, wherein a security index corresponding to the target encryption algorithm parameter is consistent with the encryption index.
For example, if the preset encryption fields include a "user name" field and a "mobile phone number" field, and the contact list includes a "user ID" field, a "user name" field, a "mobile phone number" field, and a "mailbox" field, the fields to be encrypted are the "user name" field and the "mobile phone number" field, the encryption index corresponding to the "user name" field is 1, and the encryption index corresponding to the "mobile phone number" field is 2, and according to the encryption parameter mapping table, the security index of the "RSA algorithm parameter" is 1, and the security index of the "DSA algorithm parameter" is 2, which correspond to the encryption indexes of the two fields to be encrypted.
S132, encrypting the field to be encrypted according to the target encryption algorithm parameter to generate a first encryption field.
For example, for the above contact list, the "user name" field is encrypted by the "RSA algorithm parameter" to generate the "user name" encrypted field; in addition, the 'mobile phone number' field is encrypted through the 'DSA algorithm parameter' to generate the 'mobile phone number' encrypted field.
S140, encrypting the plurality of first encryption fields as a whole to generate a second encryption field.
By re-encrypting a plurality of said first encrypted fields as a whole, the security of the encrypted fields can be further improved.
S150, combining the second encrypted field and the unencrypted field to generate a first encrypted data table.
By combining the second encrypted field and the unencrypted field, a first encrypted data table may be generated.
Referring to fig. 2, fig. 2 is a schematic flow chart of a data table encryption method according to another embodiment of the present application. As shown, the embodiment further includes steps S130b and S130c after step S130a.
S130b, judging whether the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table.
And executing the corresponding encryption method by judging whether the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table. For example, if the determination result is yes, that is, all the initial fields in the initial data table are to-be-encrypted fields, the initial data table may be encrypted as a whole. In the embodiment of the present invention, if the determination result of executing the step S130b is yes, the step S160 is executed, otherwise, the step S130c is executed.
And S160, if the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table, encrypting the initial data table as a whole to generate a second encrypted data table.
For example, if the preset encryption fields include "user ID", "user name", "mobile phone number" and "mailbox", and the preset range is set to 0 to 3, especially for the contact list, 4 fields included therein are all matched with the preset encryption fields, that is, 4 fields are all the fields to be encrypted, and since the number of the fields to be encrypted is 4 and is not within the preset range, the initial data table may be an integral body, and the initial data table is encrypted.
S130c, judging whether the number of the fields to be encrypted is equal to one.
And executing a corresponding encryption method by judging whether the number of the fields to be encrypted is equal to one. For example, if the determination result is yes, that is, only one field to be encrypted exists in the initial data table, only the field to be encrypted may be encrypted. In the embodiment of the present invention, if the determination result of executing the step S130c is yes, the step S170 is executed.
S170, if the number of the fields to be encrypted is equal to one, encrypting the fields to be encrypted to generate a third encrypted field.
When the number of the fields to be encrypted is only one, only the fields to be encrypted are encrypted, and then step S180 is performed.
S180, combining the third encrypted field and the unencrypted field according to the segmentation information to generate a third encrypted data table.
The third encrypted field and the unencrypted field may be combined to obtain a third encrypted data table based on the segmentation information.
The embodiment of the application also provides a data table encryption device, and the data table encryption device is used for executing any one of the data table encryption methods. Referring to fig. 7, fig. 7 is a schematic block diagram of a data table encryption apparatus according to an embodiment of the present application. As shown in fig. 7, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, and a first generating unit 250.
A first obtaining unit 210, configured to receive a data request sent by a terminal, and obtain an initial data table corresponding to the data request, where the initial data table includes a plurality of initial fields sorted according to a certain sequence number.
The matching unit 220 is configured to match each initial field in the initial data table with a preset encrypted field to screen out a field to be encrypted and a field not to be encrypted, and store sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information.
The first encrypting unit 230 is configured to encrypt each field to be encrypted separately to generate a first encrypted field if the number of the fields to be encrypted is within a preset value range, where the preset value range is a full-open interval, an upper limit of the preset value range is a total number of the initial fields in the initial data table, and a lower limit of the preset value range is one.
The second encryption unit 240 encrypts the plurality of first encrypted fields as a whole to generate a second encrypted field.
A first generating unit 250 for combining the encrypted field and the unencrypted field to generate a first encrypted data table.
Referring to fig. 8, fig. 8 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 8, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, a first generating unit 250, a first judging unit 230a, a second judging unit 230b, and a second generating unit 260. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, and the first generating unit 250 are already described in the above embodiments, and are not described herein again. Hereinafter, the first determining unit 230a, the second determining unit 230b, and the second generating unit 260 will be described.
The first judging unit 230a is provided with a first judging unit, and the encryption module is used for judging whether the number of the fields to be encrypted is within a preset numerical range.
The second determining unit 230b determines whether the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table.
A second generating unit 260, configured to encrypt the initial data table as a whole by using the initial data table if the number of the fields to be encrypted is not within a preset value range.
Referring to fig. 9, fig. 9 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 9, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, a first generating unit 250, a first judging unit 230a, a second judging unit 230b, a second generating unit 260, a third judging unit 230c, a third encryption unit 270, and a third generating unit 280. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, the first generating unit 250, the first judging unit 230a, the second judging unit 230b, and the second generating unit 260 are already described in the above embodiments, and are not described herein again. Hereinafter, the third judgment unit 230c, the third encryption unit 270, and the third generation unit 280 will be described.
A third determining unit 230c, configured to determine whether the number of the fields to be encrypted is equal to one.
A third encrypting unit 270, configured to encrypt the field to be encrypted to generate a third encrypted field if the number of the field to be encrypted is equal to one.
A third generating unit 280, configured to combine the third encrypted field and the unencrypted field according to the segmentation information to generate a third encrypted data table.
Referring to fig. 10, fig. 10 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 10, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, a first generating unit 250, a first interface generating unit 210a, and a second obtaining unit 210b. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, and the first generating unit 250 are already described in the above embodiments, and are not described herein again. Hereinafter, the first interface generating unit 210a and the second acquiring unit 210b are described.
The first interface generating unit 210a is configured to generate a first user interface, where the first user interface includes a plurality of first parameter input areas, each of the parameter input areas is used for a user to input a keyword, and the keyword is used to determine an encrypted field.
The second obtaining unit 210b is configured to obtain a plurality of keywords input by a user in the first user interface, and generate a preset encrypted field according to the plurality of keywords.
Referring to fig. 11, fig. 11 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 11, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, a first generating unit 250, a second interface generating unit 210c, and a third obtaining unit 210d. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, and the first generating unit 250 are already described in the above embodiments, and are not described herein again. The second interface generating unit 210c and the third acquiring unit 210d are described below.
The second interface generating unit 210c is configured to generate a second user interface, where the second user interface includes a plurality of second parameter input areas and third parameter input areas associated with each of the second parameter input areas, each of the second parameter input areas is used for a user to input a keyword, the keyword is used to determine an encrypted field, each of the third parameter input areas is used for a user to input an encryption index, and the encryption index is used to determine an encryption level of the field.
The third obtaining unit 210d is configured to obtain a plurality of keywords and a plurality of encryption indexes that are input by a user in the second user interface, and generate a preset encryption field according to the plurality of keywords, where the plurality of keywords are associated with the plurality of encryption indexes.
Referring to fig. 12, fig. 12 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 12, the data table encrypting apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encrypting unit 230, a second encrypting unit 240, a first generating unit 250, a second interface generating unit 210c, a third obtaining unit 210d, a third interface generating unit 210e, and a fourth obtaining unit 210f. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, the first generating unit 250, the second interface generating unit 210c, and the third obtaining unit 210d are already described in the above embodiments, and are not described herein again. Hereinafter, the third interface generating unit 210e and the fourth acquiring unit 210f are described.
The third interface generating unit 210e is configured to generate a third user interface, where the third user interface includes a plurality of fourth parameter input areas and a fifth parameter input area associated with each of the fourth parameter input areas, each of the fourth parameter input areas is used for a user to input an encryption algorithm parameter, and each of the fifth parameter input areas is used for a user to input a security index.
A fourth obtaining unit 210f, configured to obtain a plurality of encryption algorithm parameters and a security index associated with each of the encryption algorithm parameters, where the encryption algorithm parameters are input by a user in the third user interface, and generate an encryption parameter mapping table according to the plurality of encryption algorithm parameters and the plurality of security indexes.
Referring to fig. 13, fig. 13 is a schematic block diagram of a data table encryption apparatus according to another embodiment of the present application. As shown in fig. 13, the data table encryption apparatus 200 includes a first obtaining unit 210, a matching unit 220, a first encryption unit 230, a second encryption unit 240, and a first generating unit 250, wherein the preset first encryption unit 230 includes a fifth obtaining unit 231 and an encrypted field generating unit 232. The first obtaining unit 210, the matching unit 220, the first encrypting unit 230, the second encrypting unit 240, and the first generating unit 250 are already described in the above embodiments, and are not described herein again. Hereinafter, the fifth acquisition unit 231 and the encrypted field generation unit 232 are described.
A fifth obtaining unit 231, configured to obtain an encryption index matched with the field to be encrypted if the number of the field to be encrypted is within a preset value range, and obtain a target encryption algorithm parameter from the encryption parameter mapping table according to the obtained encryption index, where a security index corresponding to the target encryption algorithm parameter is consistent with the encryption index.
An encrypted field generating unit 232, configured to encrypt the field to be encrypted according to the target encryption algorithm parameter, so as to generate a first encrypted field.
The above-described data table encryption means may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 14.
Referring to fig. 14, fig. 14 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 300 may be a server.
Referring to fig. 14, the computer device 300 includes a processor 302, memory, and a network interface 305 connected by a system bus 301, where the memory may include a non-volatile storage medium 303 and an internal memory 304.
The nonvolatile storage medium 303 may store an operating system 3031 and a computer program 3032. The computer program 3032 includes program instructions that, when executed, cause the processor 302 to perform a data table encryption method.
The processor 302 is used to provide computing and control capabilities that support the operation of the overall computer device 300.
The internal memory 304 provides an environment for the execution of computer programs 3032 in the non-volatile storage medium 303, which computer programs 3032, when executed by the processor 302, cause the processor 302 to perform a data table encryption method.
The network interface 305 is used for network communication such as sending assigned tasks and the like. Those skilled in the art will appreciate that the configuration shown in fig. 14 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation of the computer apparatus 300 to which the present application is applied, and that a particular computer apparatus 300 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components. Wherein the processor 302 is configured to run a computer program 3032 stored in the memory to implement the following functions: receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number; matching each initial field in the initial data table with a preset encryption field to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in segmentation information; if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field, wherein the preset numerical range is a full-open interval, the upper limit value of the preset numerical range is the total number of the initial fields in the initial data table, and the lower limit value of the preset numerical range is one; encrypting a plurality of the first encrypted fields as a whole to generate a second encrypted field; combining the second encrypted field and the unencrypted field to generate a first encrypted data table.
In an embodiment, after performing matching of each initial field in the initial data table with a preset encrypted field to filter out a field to be encrypted and a field not to be encrypted, and saving sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the processor 302 further implements the following functions: and if the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table, encrypting the initial data table as a whole to generate a second encrypted data table.
In an embodiment, after performing matching of each initial field in the initial data table with a preset encrypted field to filter out a field to be encrypted and a field not to be encrypted, and saving sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the processor 302 further implements the following functions: if the number of the fields to be encrypted is equal to one, encrypting the fields to be encrypted to generate a third encrypted field; and combining the third encrypted field and the unencrypted field according to the segmentation information to generate a third encrypted data table.
In an embodiment, before executing a data request sent by a receiving terminal, and acquiring an initial data table corresponding to the data request, the processor 302 further implements the following functions: generating a first user interface, wherein the first user interface comprises a plurality of first parameter input areas, each parameter input area is used for a user to input a keyword, and the keyword is used for determining an encrypted field; and acquiring a plurality of keywords input by a user in the first user interface, and generating a preset encryption field according to the plurality of keywords.
In an embodiment, before executing a data request sent by a receiving terminal, and acquiring an initial data table corresponding to the data request, the processor 302 further implements the following functions: generating a second user interface, wherein the second user interface comprises a plurality of second parameter input areas and third parameter input areas associated with each second parameter input area, each second parameter input area is used for a user to input a keyword, the keyword is used for determining an encryption field, each third parameter input area is used for the user to input an encryption index, and the encryption index is used for determining the encryption level of the field; and acquiring a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface, and generating a preset encryption field according to the plurality of keywords, wherein the plurality of keywords are associated with the plurality of encryption indexes.
In an embodiment, after the processor 302 executes the following steps of acquiring a plurality of keywords and a plurality of encryption indexes input by the user in the second user interface and generating a preset encryption field according to the plurality of keywords, the following functions are further implemented: generating a third user interface, wherein the third user interface comprises a plurality of fourth parameter input areas and fifth parameter input areas associated with each fourth parameter input area, each fourth parameter input area is used for a user to input encryption algorithm parameters, and each fifth parameter input area is used for the user to input security indexes; and acquiring a plurality of encryption algorithm parameters input by a user in the third user interface and a security index associated with each encryption algorithm parameter, and generating an encryption parameter mapping table according to the plurality of encryption algorithm parameters and the plurality of security indexes.
In an embodiment, if the number of the fields to be encrypted is within the preset value range, the processor 302 individually encrypts each of the fields to be encrypted to generate a first encrypted field, and specifically implements the following functions: if the number of the fields to be encrypted is within a preset value range, acquiring an encryption index matched with the fields to be encrypted, and acquiring a target encryption algorithm parameter from the encryption parameter mapping table according to the acquired encryption index, wherein a security index corresponding to the target encryption algorithm parameter is consistent with the encryption index; and encrypting the field to be encrypted according to the target encryption algorithm parameter to generate a first encrypted field.
It should be understood that in the present embodiment, the Processor 302 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the present application, a storage medium is provided. The storage medium may be a computer-readable storage medium. The storage medium stores a computer program, wherein the computer program comprises program instructions. The program instructions, when executed by the processor, cause the processor to perform the following: receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number; matching each initial field in the initial data table with a preset encryption field to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in segmentation information; if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field, wherein the preset numerical range is a full-open interval, the upper limit value of the preset numerical range is the total number of the initial fields in the initial data table, and the lower limit value of the preset numerical range is one; encrypting a plurality of the first encrypted fields as a whole to generate a second encrypted field; combining the second encrypted field and the unencrypted field to generate a first encrypted data table.
In an embodiment, the program instruction is executed by the processor to match each initial field in the initial data table with a preset encrypted field to screen out a field to be encrypted and a field not to be encrypted, and after storing sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the following program is further executed: and if the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table, encrypting the initial data table as a whole to generate a second encrypted data table.
In an embodiment, the program instruction is executed by the processor to match each initial field in the initial data table with a preset encrypted field to screen out a field to be encrypted and a field not to be encrypted, and after storing sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the following program is further executed: if the number of the fields to be encrypted is equal to one, encrypting the fields to be encrypted to generate a third encrypted field; and combining the third encrypted field and the unencrypted field according to the segmentation information to generate a third encrypted data table.
In one embodiment, the program instructions are executed by the processor to receive a data request sent by the terminal, and before acquiring an initial data table corresponding to the data request, the following program is executed: generating a first user interface, wherein the first user interface comprises a plurality of first parameter input areas, each parameter input area is used for a user to input a keyword, and the keyword is used for determining an encrypted field; and acquiring a plurality of keywords input by a user in the first user interface, and generating a preset encryption field according to the plurality of keywords.
In one embodiment, the program instructions are executed by the processor to receive a data request sent by the terminal, and before acquiring an initial data table corresponding to the data request, the following program is executed: generating a second user interface, wherein the second user interface comprises a plurality of second parameter input areas and third parameter input areas associated with each second parameter input area, each second parameter input area is used for a user to input a keyword, the keyword is used for determining an encryption field, each third parameter input area is used for the user to input an encryption index, and the encryption index is used for determining the encryption level of the field; and acquiring a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface, and generating a preset encryption field according to the plurality of keywords, wherein the plurality of keywords are associated with the plurality of encryption indexes.
In an embodiment, the program instruction is executed by the processor to obtain a plurality of keywords and a plurality of encryption indexes input by the user on the second user interface, and after generating a preset encryption field according to the plurality of keywords, the following program is further executed: generating a third user interface, wherein the third user interface comprises a plurality of fourth parameter input areas and a fifth parameter input area associated with each fourth parameter input area, each fourth parameter input area is used for a user to input encryption algorithm parameters, and each fifth parameter input area is used for the user to input safety indexes; and acquiring a plurality of encryption algorithm parameters input by a user in the third user interface and a security index associated with each encryption algorithm parameter, and generating an encryption parameter mapping table according to the plurality of encryption algorithm parameters and the plurality of security indexes. In an embodiment, if the number of the fields to be encrypted is within a preset value range, the program instruction is executed by the processor to encrypt each of the fields to be encrypted separately to generate a first encrypted field, and the following program is specifically executed: if the number of the fields to be encrypted is within a preset value range, acquiring an encryption index matched with the fields to be encrypted, and acquiring a target encryption algorithm parameter from the encryption parameter mapping table according to the acquired encryption index, wherein a security index corresponding to the target encryption algorithm parameter is consistent with the encryption index; and encrypting the field to be encrypted according to the target encryption algorithm parameter to generate a first encrypted field.
The storage medium may be various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application. In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated in another system or some features may be omitted, or not implemented. The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the application can be combined, divided and deleted according to actual needs. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. A method for encrypting a data table, comprising:
generating a second user interface, wherein the second user interface comprises a plurality of second parameter input areas and third parameter input areas associated with each second parameter input area, each second parameter input area is used for a user to input a keyword, the keyword is used for determining an encrypted field, each third parameter input area is used for the user to input an encryption index, and the encryption index is used for determining the encryption level of the field;
acquiring a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface, and generating a preset encryption field according to the plurality of keywords, wherein the plurality of keywords are associated with the plurality of encryption indexes;
receiving a data request sent by a terminal, and acquiring an initial data table corresponding to the data request, wherein the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number;
matching each initial field in the initial data table with a preset encrypted field to screen out a field to be encrypted and a field not to be encrypted, and storing sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in segmentation information, wherein the field to be encrypted is the same initial field as the preset encrypted field, and the field not to be encrypted is different from the preset encrypted field;
if the number of the fields to be encrypted is within a preset numerical range, independently encrypting each field to be encrypted to generate a first encrypted field, wherein the preset numerical range is a full-open interval, the upper limit value of the preset numerical range is the total number of the initial fields in the initial data table, and the lower limit value of the preset numerical range is one;
encrypting a plurality of said first encrypted fields as a whole, to generate a second encrypted field;
combining the second encrypted field and the unencrypted field to generate a first encrypted data table.
2. The method for encrypting the data table according to claim 1, wherein after matching each initial field in the initial data table with a preset encryption field to screen out a field to be encrypted and a field not to be encrypted, and storing the sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the method further comprises
Comprises the following steps:
and if the number of the fields to be encrypted is equal to the total number of the initial fields in the initial data table, encrypting the initial data table as a whole to generate a second encrypted data table.
3. The data table encryption method according to claim 2, wherein after matching each initial field in the initial data table with a preset encryption field to filter out a field to be encrypted and a field not to be encrypted, and saving sequence numbers of the field to be encrypted and the field not to be encrypted in the initial data table in the segmentation information, the method further comprises:
if the number of the fields to be encrypted is equal to one, encrypting the fields to be encrypted to generate a third encrypted field;
and combining the third encrypted field and the unencrypted field according to the segmentation information to generate a third encrypted data table.
4. The data table encryption method according to claim 1, wherein before the receiving terminal obtains an initial data table corresponding to the data request in the data request, the method further comprises:
generating a first user interface, wherein the first user interface comprises a plurality of first parameter input areas, each first parameter input area is used for a user to input a keyword, and the keyword is used for determining an encryption field;
and acquiring a plurality of keywords input by a user in the first user interface, and generating a preset encryption field according to the plurality of keywords.
5. The data sheet encryption method of claim 1, wherein after obtaining a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface and generating a preset encryption field according to the plurality of keywords, the method further comprises:
generating a third user interface, wherein the third user interface comprises a plurality of fourth parameter input areas and fifth parameter input areas associated with each fourth parameter input area, each fourth parameter input area is used for a user to input encryption algorithm parameters, and each fifth parameter input area is used for the user to input security indexes;
and acquiring a plurality of encryption algorithm parameters input by a user in the third user interface and a security index associated with each encryption algorithm parameter, and generating an encryption parameter mapping table according to the plurality of encryption algorithm parameters and the plurality of security indexes.
6. The method of claim 5, wherein the separately encrypting each of the fields to be encrypted to generate the first encrypted field if the number of the fields to be encrypted is within a predetermined range of values comprises:
if the number of the fields to be encrypted is within a preset value range, acquiring an encryption index matched with the fields to be encrypted, and acquiring a target encryption algorithm parameter from the encryption parameter mapping table according to the acquired encryption index, wherein a security index corresponding to the target encryption algorithm parameter is consistent with the encryption index;
and encrypting the field to be encrypted according to the target encryption algorithm parameter to generate a first encrypted field.
7. A data table encryption apparatus, comprising:
a second interface generating unit, configured to generate a second user interface, where the second user interface includes a plurality of second parameter input areas and third parameter input areas associated with each of the second parameter input areas, each of the second parameter input areas is used for a user to input a keyword, the keyword is used to determine an encrypted field, each of the third parameter input areas is used for a user to input an encryption index, and the encryption index is used to determine an encryption level of the field;
the third acquisition unit is used for acquiring a plurality of keywords and a plurality of encryption indexes input by a user on the second user interface and generating a preset encryption field according to the plurality of keywords, wherein the plurality of keywords are associated with the plurality of encryption indexes;
the device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for receiving a data request sent by a terminal and acquiring an initial data table corresponding to the data request, and the initial data table comprises a plurality of initial fields which are sequenced according to a certain sequence number;
the matching unit is used for matching each initial field in the initial data table with a preset encryption field so as to screen out fields to be encrypted and fields not to be encrypted, and storing sequence numbers of the fields to be encrypted and the fields not to be encrypted in the initial data table in the segmentation information;
the first encryption unit is used for independently encrypting each field to be encrypted to generate a first encryption field if the number of the fields to be encrypted is within a preset numerical range;
a second encryption unit, configured to encrypt the plurality of first encrypted fields as a whole to generate a second encrypted field;
a first generating unit, configured to combine the second encrypted field and the unencrypted field to generate a first encrypted data table.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the data table encryption method according to any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, causes the processor to carry out the data table encryption method according to any one of claims 1-6.
CN201811527346.1A 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium Active CN109787956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811527346.1A CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811527346.1A CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109787956A CN109787956A (en) 2019-05-21
CN109787956B true CN109787956B (en) 2023-02-10

Family

ID=66496921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811527346.1A Active CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109787956B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351289B (en) * 2019-07-17 2021-09-14 宜人恒业科技发展(北京)有限公司 Data encryption method and device
CN112988709A (en) * 2021-03-15 2021-06-18 成都乐动信息技术有限公司 Data sorting method and device, electronic equipment and storage medium
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN114003953A (en) * 2021-10-29 2022-02-01 平安科技(深圳)有限公司 Data processing method, device and storage medium
CN114726596A (en) * 2022-03-25 2022-07-08 北京沃东天骏信息技术有限公司 Sensitive data processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180294951A1 (en) * 2017-04-07 2018-10-11 X-Logos, LLC Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server

Also Published As

Publication number Publication date
CN109787956A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
CN109787956B (en) Data table encryption method and device, computer equipment and storage medium
CN106529308B (en) data encryption method and device and mobile terminal
US11288371B2 (en) Blockchain-based data processing method, apparatus, and device
CN110138744B (en) Method, device and system for replacing communication number, computer equipment and storage medium
CN112513857A (en) Personalized cryptographic security access control in a trusted execution environment
EP3465530B1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
GB2547921A (en) Preventing misuse of code signing certificates
CN106992851B (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN111753320A (en) Data encryption method and device based on interceptor and computer equipment
CN108880806A (en) Encryption and decryption method, chip and readable storage medium storing program for executing
JP2018502524A (en) Encryption control for information, information analysis method, system and terminal
US20170099144A1 (en) Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system
WO2021114614A1 (en) Application program secure startup method and apparatus, computer device, and storage medium
CN111884986B (en) Data encryption processing method and device and storage medium
US11556630B2 (en) Private password constraint validation
CN107302521B (en) Method for sending and receiving user privacy data
CN114155639A (en) Access control method based on Internet of things, access control system and storage medium
CN112823503A (en) Data access method, data access device and mobile terminal
WO2021051591A1 (en) Secure keyboard realizing method and apparatus, and computer device and storage medium
CN111080857A (en) Vehicle digital key management and use method and device, mobile terminal and storage medium
CN115442032A (en) Data processing method, system on chip and readable storage medium
CN113301036A (en) Communication encryption method and device, equipment and storage medium
CN109711178B (en) Key value pair storage method, device, equipment and storage medium
US10216941B2 (en) Method of distributing application with security features and method of operating the application
US8862893B2 (en) Techniques for performing symmetric cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant