CN111859423A - Information security encryption method and device - Google Patents
Information security encryption method and device Download PDFInfo
- Publication number
- CN111859423A CN111859423A CN202010689995.2A CN202010689995A CN111859423A CN 111859423 A CN111859423 A CN 111859423A CN 202010689995 A CN202010689995 A CN 202010689995A CN 111859423 A CN111859423 A CN 111859423A
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- module
- decryption
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Document Processing Apparatus (AREA)
Abstract
An information security encryption method comprises the following steps: s1, constructing an encryption model according to the information encryption requirement; s2, receiving the data information, and judging whether the received data information accords with the preset security setting content according to the encryption model; s3, setting confusion rules and restoration rules, and carrying out confusion processing on the encrypted target text according to the confusion rules; s4, inputting decryption information by a user; s5, acquiring and verifying the decryption information of the user; the invention also provides an information security encryption device which comprises an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information input module, an identity verification module, a storage module, a decryption module and a display module. The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, and has good encryption effect and excellent safety performance.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an information security encryption method and device.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system of the information; the information security itself has a wide range, including how to prevent the leakage of business enterprise secrets, prevent the browsing of bad information by teenagers, the leakage of personal information, etc.; with the continuous development of the information society, the information security awareness of people is gradually strengthened, in order to protect the privacy and sensitive information of people, the related information text of a user needs to be encrypted, the existing information security encryption method and device are inconvenient to use, the encryption effect is not good, and the use effect needs to be improved.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an information security encryption method and device, which are simple to operate and convenient to use, can automatically identify text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, have good encryption effect, effectively prevent the encrypted information text from being cracked, and have excellent security performance.
(II) technical scheme
The invention provides an information security encryption method, which comprises the following steps:
S1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
s2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
And S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
Preferably, in S1, the predetermined security content included in the encryption model includes a phone number, a name, a keyword or a phrase.
Preferably, in S2, the user can select to encrypt or not encrypt the acquired information text according to his/her needs, i.e. the user adds the encrypted text by himself/herself.
Preferably, in S3, the confusion rule is to insert randomly acquired words between the characters of the encrypted information text.
Preferably, the obfuscation rule further comprises reversing the order of the characters of the encrypted information text.
Preferably, in S3, there are multiple confusion rules, and the reduction rule corresponds to the confusion rule one by one, and the specific use method is as follows:
the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
Preferably, in S4, the first decryption means is decryption by a password, and the second decryption means is decryption by fingerprint verification.
Preferably, the second decryption method comprises the following specific operation steps:
Acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image;
comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
Preferably, the recording mode of the decryption information in the second step is as follows:
acquiring a fingerprint image and identity information of a user;
carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size;
and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
The invention also provides an information security encryption device which is characterized by comprising an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information input module, an identity verification module, a storage module, a decryption module and a display module;
the encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement;
the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module;
The information input module is used for inputting information so as to facilitate the user to carry out related operations;
the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module;
the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information;
the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module;
the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module;
the storage module is used for storing the related information;
the decryption module is used for decrypting the encrypted information text;
and the display module is used for displaying the information.
The technical scheme of the invention has the following beneficial technical effects:
firstly, setting an information encryption requirement, and constructing an encryption model according to the information encryption requirement; then the user inputs decryption information, namely a decryption key of the encryption information is set, and the decryption information is stored for verifying the identity information of the user subsequently; then receiving data information, judging whether the received data information accords with preset secret setting contents or not according to an encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of an information text; then setting a confusion rule and a reduction rule, carrying out confusion processing on the encrypted target text according to the confusion rule, and presenting the encrypted information as a confusion text to realize secondary encryption of the information text; finally, acquiring and verifying the decryption information of the user;
The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, has a good encryption effect, effectively prevents the encrypted information text from being cracked, and has excellent safety performance.
Drawings
Fig. 1 is a flowchart of an information security encryption method according to the present invention.
Fig. 2 is a flowchart illustrating a second decryption method in the method and apparatus for information security encryption according to the present invention.
Fig. 3 is a flowchart of the second step of entering decrypted information in the method and apparatus for information security encryption according to the present invention.
Fig. 4 is a system block diagram of an information security encryption apparatus according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the information security encryption method provided by the present invention includes the following steps:
S1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
s2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
And S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
In an alternative embodiment, the predetermined security content included in the encryption model includes a phone number, a name, a keyword, or a phrase at S1.
In an alternative embodiment, in S2, the user may choose to encrypt or not encrypt the obtained information text according to his own needs, that is, the user adds the encrypted text by himself, which is convenient for use, and the user may encrypt the file by himself, which is helpful for use.
In an alternative embodiment, in S3, the confusion rule is to insert randomly acquired words between the characters of the encrypted message text, so that the text specific information is difficult to understand for irrelevant persons.
In an alternative embodiment, the obfuscation rule further includes reversing the character arrangement of the encrypted message text to make it more difficult for an unrelated person to understand the text message.
In an alternative embodiment, in S3, there are multiple obfuscating rules, and the restoring rule corresponds to the obfuscating rule one to one, and the specific usage method is as follows: the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
In an alternative embodiment, in S4, the first decryption mode is decryption by a password, and the second decryption mode is decryption by fingerprint verification.
In an alternative embodiment, the second decryption mode includes the following specific operation steps: acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image; comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
In an alternative embodiment, the entry manner of the decryption information of the second step is as follows: acquiring a fingerprint image and identity information of a user; carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size; and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
As shown in fig. 4, the present invention further provides an information security encryption apparatus, which is characterized in that the encryption apparatus includes an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information entry module, an identity verification module, a storage module, a decryption module, and a display module;
The encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement; the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module; the information input module is used for inputting information so as to facilitate the user to carry out related operations; the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module; the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information; the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module; the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module; the storage module is used for storing the related information; the decryption module is used for decrypting the encrypted information text; and the display module is used for displaying the information.
When the encryption model is used, firstly, the information encryption requirement is set, the encryption model is constructed according to the information encryption requirement, and the parameters of the encryption model can be changed and perfected according to the requirement of a user; then the user inputs decryption information, namely a decryption key of the encryption information is set, and the decryption information is stored for verifying the identity information of the user subsequently; the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
then receiving data information, judging whether the received data information accords with preset secret setting contents or not according to an encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of an information text; otherwise, encryption is not carried out; then setting a confusion rule and a reduction rule, carrying out confusion processing on the encrypted target text according to the confusion rule, and presenting the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
And finally, acquiring and verifying the decryption information of the user, displaying the target text if the user passes the authentication, and not displaying the target text if the user passes the authentication.
The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, has a good encryption effect, effectively prevents the encrypted information text from being cracked, and has excellent safety performance.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.
Claims (10)
1. An information security encryption method is characterized by comprising the following steps:
s1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
S2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
and S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
2. The method of claim 1, wherein in S1, the predetermined security content included in the encryption model includes phone number, name, keyword or phrase.
3. The method as claimed in claim 1, wherein in S2, the user can choose to encrypt or not encrypt the obtained message text according to his/her needs, i.e. the user adds the encrypted text by himself/herself.
4. A method as claimed in claim 1, wherein in S3, the confusion rule is to insert randomly acquired words between characters of the encrypted message text.
5. An information security encryption method according to claim 1, wherein the obfuscation rule further includes reversing the order of the characters of the encrypted information text.
6. The information security encryption method according to claim 1, wherein in S3, there are a plurality of obfuscation rules, and the recovery rule corresponds to the obfuscation rule one to one, and the specific usage method is as follows:
the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
7. The method according to claim 1, wherein in S4, the first decryption means is decryption by a password, and the second decryption means is decryption by fingerprint verification.
8. The information security encryption method according to claim 1, wherein the second decryption mode comprises the following specific operation steps:
acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image;
comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
9. An information security encryption method according to claim 1, wherein the second step of entering the decryption information is as follows:
acquiring a fingerprint image and identity information of a user;
carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size;
and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
10. The information security encryption method according to any one of claims 1 to 9, further providing an information security encryption device, wherein the encryption device comprises an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information entry module, an authentication module, a storage module, a decryption module and a display module;
The encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement;
the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module;
the information input module is used for inputting information so as to facilitate the user to carry out related operations;
the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module;
the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information;
the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module;
the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module;
the storage module is used for storing the related information;
the decryption module is used for decrypting the encrypted information text;
and the display module is used for displaying the information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010689995.2A CN111859423A (en) | 2020-07-17 | 2020-07-17 | Information security encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010689995.2A CN111859423A (en) | 2020-07-17 | 2020-07-17 | Information security encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111859423A true CN111859423A (en) | 2020-10-30 |
Family
ID=72984605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010689995.2A Pending CN111859423A (en) | 2020-07-17 | 2020-07-17 | Information security encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111859423A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116108466A (en) * | 2022-12-28 | 2023-05-12 | 南京邮电大学盐城大数据研究院有限公司 | Encryption method based on statistical language model |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104935429A (en) * | 2014-03-17 | 2015-09-23 | Tcl集团股份有限公司 | Data processing method and system employing multi-encryption technology |
CN105635100A (en) * | 2015-07-30 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption method, information decryption method and terminal |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
CN110636067A (en) * | 2019-09-24 | 2019-12-31 | 天津五八到家科技有限公司 | Data encryption method, data decryption method and device |
CN110929270A (en) * | 2019-10-29 | 2020-03-27 | 北京芯盾集团有限公司 | Information security encryption method and device |
US10607027B1 (en) * | 2018-12-05 | 2020-03-31 | Cyberark Software Ltd. | Secretless secure data distribution and recovery process |
-
2020
- 2020-07-17 CN CN202010689995.2A patent/CN111859423A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104935429A (en) * | 2014-03-17 | 2015-09-23 | Tcl集团股份有限公司 | Data processing method and system employing multi-encryption technology |
CN105635100A (en) * | 2015-07-30 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption method, information decryption method and terminal |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
US10607027B1 (en) * | 2018-12-05 | 2020-03-31 | Cyberark Software Ltd. | Secretless secure data distribution and recovery process |
CN110636067A (en) * | 2019-09-24 | 2019-12-31 | 天津五八到家科技有限公司 | Data encryption method, data decryption method and device |
CN110929270A (en) * | 2019-10-29 | 2020-03-27 | 北京芯盾集团有限公司 | Information security encryption method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116108466A (en) * | 2022-12-28 | 2023-05-12 | 南京邮电大学盐城大数据研究院有限公司 | Encryption method based on statistical language model |
CN116108466B (en) * | 2022-12-28 | 2023-10-13 | 南京邮电大学盐城大数据研究院有限公司 | Encryption method based on statistical language model |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7024562B1 (en) | Method for carrying out secure digital signature and a system therefor | |
CN101674575B (en) | Method for protecting security of mobile communication terminal data and device thereof | |
US20090083544A1 (en) | Security process for private data storage and sharing | |
CN105429761A (en) | Key generation method and device | |
CN111191289A (en) | Method for displaying and storing private data | |
CN109547215B (en) | Document information protection method based on mobile terminal fingerprint | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN105871892A (en) | File cloud storage security solution method and system | |
CN110771190A (en) | Controlling access to data | |
KR100954841B1 (en) | Method and Apparatus of managing unity data on mobile device and Recording medium using this | |
CN104537313B (en) | A kind of data guard method, terminal and server | |
CN115982761A (en) | Sensitive information processing method and device, electronic equipment and storage medium | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN111859423A (en) | Information security encryption method and device | |
CA2763860C (en) | System, architecture and method for secure encryption and decryption | |
KR20130085537A (en) | System and method for accessing to encoded files | |
Prabha et al. | A review of cyber security in cryptography: Services, attacks, and key approach | |
US20080126808A1 (en) | Encrypted dataset access by custodians | |
JP2008033805A (en) | Personal information protection system, personal information protection method and personal information protection program | |
KR101624394B1 (en) | Device for authenticating password and operating method thereof | |
US11671475B2 (en) | Verification of data recipient | |
JP2001005784A (en) | Device and method for collating password | |
KR20060098412A (en) | Timely variable password formation module and a floating password application method | |
CN106446713A (en) | Encryption method and system for database content | |
JPH09204401A (en) | Data base retrieval system and data base protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201030 |
|
RJ01 | Rejection of invention patent application after publication |