CN111859423A - Information security encryption method and device - Google Patents

Information security encryption method and device Download PDF

Info

Publication number
CN111859423A
CN111859423A CN202010689995.2A CN202010689995A CN111859423A CN 111859423 A CN111859423 A CN 111859423A CN 202010689995 A CN202010689995 A CN 202010689995A CN 111859423 A CN111859423 A CN 111859423A
Authority
CN
China
Prior art keywords
information
encryption
module
decryption
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010689995.2A
Other languages
Chinese (zh)
Inventor
姜雪军
刘鹏
谢士秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Guangpeng Information Technology Co ltd
Original Assignee
Shandong Guangpeng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Guangpeng Information Technology Co ltd filed Critical Shandong Guangpeng Information Technology Co ltd
Priority to CN202010689995.2A priority Critical patent/CN111859423A/en
Publication of CN111859423A publication Critical patent/CN111859423A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Document Processing Apparatus (AREA)

Abstract

An information security encryption method comprises the following steps: s1, constructing an encryption model according to the information encryption requirement; s2, receiving the data information, and judging whether the received data information accords with the preset security setting content according to the encryption model; s3, setting confusion rules and restoration rules, and carrying out confusion processing on the encrypted target text according to the confusion rules; s4, inputting decryption information by a user; s5, acquiring and verifying the decryption information of the user; the invention also provides an information security encryption device which comprises an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information input module, an identity verification module, a storage module, a decryption module and a display module. The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, and has good encryption effect and excellent safety performance.

Description

Information security encryption method and device
Technical Field
The invention relates to the technical field of information security, in particular to an information security encryption method and device.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system of the information; the information security itself has a wide range, including how to prevent the leakage of business enterprise secrets, prevent the browsing of bad information by teenagers, the leakage of personal information, etc.; with the continuous development of the information society, the information security awareness of people is gradually strengthened, in order to protect the privacy and sensitive information of people, the related information text of a user needs to be encrypted, the existing information security encryption method and device are inconvenient to use, the encryption effect is not good, and the use effect needs to be improved.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides an information security encryption method and device, which are simple to operate and convenient to use, can automatically identify text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, have good encryption effect, effectively prevent the encrypted information text from being cracked, and have excellent security performance.
(II) technical scheme
The invention provides an information security encryption method, which comprises the following steps:
S1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
s2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
And S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
Preferably, in S1, the predetermined security content included in the encryption model includes a phone number, a name, a keyword or a phrase.
Preferably, in S2, the user can select to encrypt or not encrypt the acquired information text according to his/her needs, i.e. the user adds the encrypted text by himself/herself.
Preferably, in S3, the confusion rule is to insert randomly acquired words between the characters of the encrypted information text.
Preferably, the obfuscation rule further comprises reversing the order of the characters of the encrypted information text.
Preferably, in S3, there are multiple confusion rules, and the reduction rule corresponds to the confusion rule one by one, and the specific use method is as follows:
the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
Preferably, in S4, the first decryption means is decryption by a password, and the second decryption means is decryption by fingerprint verification.
Preferably, the second decryption method comprises the following specific operation steps:
Acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image;
comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
Preferably, the recording mode of the decryption information in the second step is as follows:
acquiring a fingerprint image and identity information of a user;
carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size;
and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
The invention also provides an information security encryption device which is characterized by comprising an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information input module, an identity verification module, a storage module, a decryption module and a display module;
the encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement;
the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module;
The information input module is used for inputting information so as to facilitate the user to carry out related operations;
the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module;
the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information;
the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module;
the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module;
the storage module is used for storing the related information;
the decryption module is used for decrypting the encrypted information text;
and the display module is used for displaying the information.
The technical scheme of the invention has the following beneficial technical effects:
firstly, setting an information encryption requirement, and constructing an encryption model according to the information encryption requirement; then the user inputs decryption information, namely a decryption key of the encryption information is set, and the decryption information is stored for verifying the identity information of the user subsequently; then receiving data information, judging whether the received data information accords with preset secret setting contents or not according to an encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of an information text; then setting a confusion rule and a reduction rule, carrying out confusion processing on the encrypted target text according to the confusion rule, and presenting the encrypted information as a confusion text to realize secondary encryption of the information text; finally, acquiring and verifying the decryption information of the user;
The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, has a good encryption effect, effectively prevents the encrypted information text from being cracked, and has excellent safety performance.
Drawings
Fig. 1 is a flowchart of an information security encryption method according to the present invention.
Fig. 2 is a flowchart illustrating a second decryption method in the method and apparatus for information security encryption according to the present invention.
Fig. 3 is a flowchart of the second step of entering decrypted information in the method and apparatus for information security encryption according to the present invention.
Fig. 4 is a system block diagram of an information security encryption apparatus according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-3, the information security encryption method provided by the present invention includes the following steps:
S1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
s2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
And S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
In an alternative embodiment, the predetermined security content included in the encryption model includes a phone number, a name, a keyword, or a phrase at S1.
In an alternative embodiment, in S2, the user may choose to encrypt or not encrypt the obtained information text according to his own needs, that is, the user adds the encrypted text by himself, which is convenient for use, and the user may encrypt the file by himself, which is helpful for use.
In an alternative embodiment, in S3, the confusion rule is to insert randomly acquired words between the characters of the encrypted message text, so that the text specific information is difficult to understand for irrelevant persons.
In an alternative embodiment, the obfuscation rule further includes reversing the character arrangement of the encrypted message text to make it more difficult for an unrelated person to understand the text message.
In an alternative embodiment, in S3, there are multiple obfuscating rules, and the restoring rule corresponds to the obfuscating rule one to one, and the specific usage method is as follows: the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
In an alternative embodiment, in S4, the first decryption mode is decryption by a password, and the second decryption mode is decryption by fingerprint verification.
In an alternative embodiment, the second decryption mode includes the following specific operation steps: acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image; comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
In an alternative embodiment, the entry manner of the decryption information of the second step is as follows: acquiring a fingerprint image and identity information of a user; carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size; and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
As shown in fig. 4, the present invention further provides an information security encryption apparatus, which is characterized in that the encryption apparatus includes an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information entry module, an identity verification module, a storage module, a decryption module, and a display module;
The encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement; the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module; the information input module is used for inputting information so as to facilitate the user to carry out related operations; the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module; the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information; the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module; the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module; the storage module is used for storing the related information; the decryption module is used for decrypting the encrypted information text; and the display module is used for displaying the information.
When the encryption model is used, firstly, the information encryption requirement is set, the encryption model is constructed according to the information encryption requirement, and the parameters of the encryption model can be changed and perfected according to the requirement of a user; then the user inputs decryption information, namely a decryption key of the encryption information is set, and the decryption information is stored for verifying the identity information of the user subsequently; the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
then receiving data information, judging whether the received data information accords with preset secret setting contents or not according to an encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of an information text; otherwise, encryption is not carried out; then setting a confusion rule and a reduction rule, carrying out confusion processing on the encrypted target text according to the confusion rule, and presenting the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
And finally, acquiring and verifying the decryption information of the user, displaying the target text if the user passes the authentication, and not displaying the target text if the user passes the authentication.
The method is simple to operate and convenient to use, can automatically identify the text information and determine whether to encrypt the text information or not, can encrypt the information text for the second time, has a good encryption effect, effectively prevents the encrypted information text from being cracked, and has excellent safety performance.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. An information security encryption method is characterized by comprising the following steps:
s1, setting information encryption requirements, and constructing an encryption model according to the information encryption requirements, wherein parameters of the encryption model can be changed and perfected according to the requirements of a user;
S2, receiving data information, judging whether the received data information accords with preset secret setting contents or not according to the encryption model, and if the information accords with the preset secret setting contents, encrypting the information to realize the first encryption of the information text; otherwise, encryption is not carried out;
s3, setting confusion rules and restoration rules, carrying out confusion processing on the encrypted target text according to the confusion rules, and displaying the encrypted information as a confusion text to realize secondary encryption of the information text; when the user identity information is successfully verified, automatically restoring the confusion text into a target text according to a restoring rule and presenting the target text;
s4, the user inputs decryption information, namely, a decryption key of the encryption information is set, and the decryption information is stored for the subsequent verification of the identity information of the user;
the decryption step comprises two steps, and the corresponding decryption information comprises two times; the first step is used for unlocking the first encryption, the confusion text is presented at the moment, and the second step is used for unlocking the second encryption, so that the confusion text is restored into the target text and presented;
and S5, acquiring and verifying the decryption information of the user, and if the user passes the authentication, displaying the target text, otherwise, not displaying the target text.
2. The method of claim 1, wherein in S1, the predetermined security content included in the encryption model includes phone number, name, keyword or phrase.
3. The method as claimed in claim 1, wherein in S2, the user can choose to encrypt or not encrypt the obtained message text according to his/her needs, i.e. the user adds the encrypted text by himself/herself.
4. A method as claimed in claim 1, wherein in S3, the confusion rule is to insert randomly acquired words between characters of the encrypted message text.
5. An information security encryption method according to claim 1, wherein the obfuscation rule further includes reversing the order of the characters of the encrypted information text.
6. The information security encryption method according to claim 1, wherein in S3, there are a plurality of obfuscation rules, and the recovery rule corresponds to the obfuscation rule one to one, and the specific usage method is as follows:
the feature codes are added to the encrypted information text, and each feature code corresponds to one confusion rule and one reduction rule, so that a user can conveniently select a required confusion mode.
7. The method according to claim 1, wherein in S4, the first decryption means is decryption by a password, and the second decryption means is decryption by fingerprint verification.
8. The information security encryption method according to claim 1, wherein the second decryption mode comprises the following specific operation steps:
acquiring an input fingerprint image to be identified, and carrying out image processing on the input fingerprint image;
comparing the fingerprint image to be identified with the user fingerprint image in the fingerprint image database; if the fingerprint images are consistent, the verification is successful and the decryption is carried out, and if the fingerprint images are not consistent, the verification fails.
9. An information security encryption method according to claim 1, wherein the second step of entering the decryption information is as follows:
acquiring a fingerprint image and identity information of a user;
carrying out image processing on the fingerprint image to obtain a fingerprint image with a preset size;
and processing the identity information of the user and then embedding the processed identity information into a fingerprint image with a preset size to obtain second-step encryption information.
10. The information security encryption method according to any one of claims 1 to 9, further providing an information security encryption device, wherein the encryption device comprises an encryption model generation module, an information acquisition module, an information input module, an analysis and judgment module, an encryption module, a decryption information entry module, an authentication module, a storage module, a decryption module and a display module;
The encryption model generation module is used for generating an encryption model according to the preset encryption requirement of a user so as to judge whether the subsequent information meets the encryption requirement;
the information acquisition module is used for acquiring information and sending the acquired information text to the analysis and judgment module;
the information input module is used for inputting information so as to facilitate the user to carry out related operations;
the analysis and judgment module is used for analyzing and judging whether the acquired information meets the decryption requirement or not according to the encryption model and sending a judgment result to the encryption module;
the encryption module is used for encrypting the information text meeting the encryption requirement, and comprises primary encryption and secondary encryption so as to realize the protection of the user information;
the decryption information input module is used for inputting decryption information by a user and sending the decryption information to the storage module;
the identity authentication module is used for comparing authentication information of the operator with storage information of the user to judge the identity of the operator and sending the authentication information to the decryption module;
the storage module is used for storing the related information;
the decryption module is used for decrypting the encrypted information text;
and the display module is used for displaying the information.
CN202010689995.2A 2020-07-17 2020-07-17 Information security encryption method and device Pending CN111859423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010689995.2A CN111859423A (en) 2020-07-17 2020-07-17 Information security encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010689995.2A CN111859423A (en) 2020-07-17 2020-07-17 Information security encryption method and device

Publications (1)

Publication Number Publication Date
CN111859423A true CN111859423A (en) 2020-10-30

Family

ID=72984605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010689995.2A Pending CN111859423A (en) 2020-07-17 2020-07-17 Information security encryption method and device

Country Status (1)

Country Link
CN (1) CN111859423A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116108466A (en) * 2022-12-28 2023-05-12 南京邮电大学盐城大数据研究院有限公司 Encryption method based on statistical language model

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN105635100A (en) * 2015-07-30 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information decryption method and terminal
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
CN110636067A (en) * 2019-09-24 2019-12-31 天津五八到家科技有限公司 Data encryption method, data decryption method and device
CN110929270A (en) * 2019-10-29 2020-03-27 北京芯盾集团有限公司 Information security encryption method and device
US10607027B1 (en) * 2018-12-05 2020-03-31 Cyberark Software Ltd. Secretless secure data distribution and recovery process

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN105635100A (en) * 2015-07-30 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information decryption method and terminal
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
US10607027B1 (en) * 2018-12-05 2020-03-31 Cyberark Software Ltd. Secretless secure data distribution and recovery process
CN110636067A (en) * 2019-09-24 2019-12-31 天津五八到家科技有限公司 Data encryption method, data decryption method and device
CN110929270A (en) * 2019-10-29 2020-03-27 北京芯盾集团有限公司 Information security encryption method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116108466A (en) * 2022-12-28 2023-05-12 南京邮电大学盐城大数据研究院有限公司 Encryption method based on statistical language model
CN116108466B (en) * 2022-12-28 2023-10-13 南京邮电大学盐城大数据研究院有限公司 Encryption method based on statistical language model

Similar Documents

Publication Publication Date Title
US7024562B1 (en) Method for carrying out secure digital signature and a system therefor
CN101674575B (en) Method for protecting security of mobile communication terminal data and device thereof
US20090083544A1 (en) Security process for private data storage and sharing
CN105429761A (en) Key generation method and device
CN111191289A (en) Method for displaying and storing private data
CN109547215B (en) Document information protection method based on mobile terminal fingerprint
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN105871892A (en) File cloud storage security solution method and system
CN110771190A (en) Controlling access to data
KR100954841B1 (en) Method and Apparatus of managing unity data on mobile device and Recording medium using this
CN104537313B (en) A kind of data guard method, terminal and server
CN115982761A (en) Sensitive information processing method and device, electronic equipment and storage medium
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN111859423A (en) Information security encryption method and device
CA2763860C (en) System, architecture and method for secure encryption and decryption
KR20130085537A (en) System and method for accessing to encoded files
Prabha et al. A review of cyber security in cryptography: Services, attacks, and key approach
US20080126808A1 (en) Encrypted dataset access by custodians
JP2008033805A (en) Personal information protection system, personal information protection method and personal information protection program
KR101624394B1 (en) Device for authenticating password and operating method thereof
US11671475B2 (en) Verification of data recipient
JP2001005784A (en) Device and method for collating password
KR20060098412A (en) Timely variable password formation module and a floating password application method
CN106446713A (en) Encryption method and system for database content
JPH09204401A (en) Data base retrieval system and data base protection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030

RJ01 Rejection of invention patent application after publication