CN116980192A - Chinese character data desensitizing method and device - Google Patents

Chinese character data desensitizing method and device Download PDF

Info

Publication number
CN116980192A
CN116980192A CN202310901430.XA CN202310901430A CN116980192A CN 116980192 A CN116980192 A CN 116980192A CN 202310901430 A CN202310901430 A CN 202310901430A CN 116980192 A CN116980192 A CN 116980192A
Authority
CN
China
Prior art keywords
chinese character
key
encryption key
digits
operation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310901430.XA
Other languages
Chinese (zh)
Inventor
宫婉钰
谷俊
裴洪斌
杨二狼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310901430.XA priority Critical patent/CN116980192A/en
Publication of CN116980192A publication Critical patent/CN116980192A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Abstract

The application provides a Chinese character data desensitization method and a device, which can be used in the financial field or other technical fields. The method comprises the following steps: acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized; generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different; encrypting each Chinese character in the Chinese character comparison table by using the encryption key to generate an encrypted Chinese character comparison table; encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data; searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table; decrypting the second encrypted data by using the decryption key to obtain a target Chinese character; and desensitizing the Chinese character to be desensitized by utilizing the target Chinese character.

Description

Chinese character data desensitizing method and device
Technical Field
The application relates to the technical field of data encryption, in particular to a Chinese character data desensitization method and device.
Background
In today's informative society, data security for individuals and businesses is becoming more and more important. With the rapid development of internet technology, security problems such as network attack and data leakage are increasingly prominent. In this context, how to secure personal privacy and enterprise data becomes an urgent issue to be solved. And the data encryption technology is one of the most effective technologies for guaranteeing data security at present. In order to strengthen personal privacy and confidentiality of enterprise data, research and development of safe and reliable data encryption technology are one of the problems to be solved in the present day.
With the continuous development of internet technology, a great amount of Chinese character data is accumulated, and the related fields including finance, medical treatment, government, education and the like are more and more extensive. However, such data may contain sensitive information about the user, such as name, identification number, telephone number, home address, etc. Desensitizing these sensitive data has become a necessary technique in order to preserve user privacy.
The existing Chinese character data desensitization method mainly comprises the following steps:
encryption: this method protects the privacy and security of data by encrypting the data using a password. But if the password is compromised, the data becomes vulnerable.
Data confusion: this approach protects the privacy and security of data by converting the data into an unreadable form. But this approach may affect the readability and accuracy of the data.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the application provides a Chinese character data desensitizing method and device, which can at least partially solve the problems in the prior art.
In one aspect, the present application provides a method for desensitizing Chinese character data, comprising:
acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized;
generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different;
encrypting each Chinese character in the Chinese character comparison table by using the encryption key to generate an encrypted Chinese character comparison table;
encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data;
searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table;
Decrypting the second encrypted data by using the decryption key to obtain a target Chinese character;
and desensitizing the Chinese character to be desensitized by utilizing the target Chinese character.
In some embodiments, generating the chinese character lookup table based on the desensitization request includes:
acquiring a preset Chinese character set according to the desensitization request;
and carrying out random pairwise combination on the Chinese characters in the Chinese character set to generate a Chinese character comparison table.
In some embodiments, the encrypting the chinese characters in the chinese character comparison table using the encryption key, generating the encrypted chinese character comparison table includes:
converting each Chinese character in the Chinese character comparison table into a corresponding ASCII code;
encrypting each ASCII code by using the encryption key to generate an encrypted Chinese character comparison table;
encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data, wherein the first encrypted data comprises the following steps:
converting the Chinese characters to be desensitized into corresponding ASCII codes;
and encrypting the ASCII code of the Chinese character by using the encryption key to obtain first encrypted data.
In some embodiments, decrypting the second encrypted data using the decryption key to obtain the target kanji includes:
Decrypting the second encrypted data by using the decryption key to obtain a target ASCII code;
and converting the target ASCII codes into corresponding target Chinese characters.
In some embodiments, generating the encryption key, decryption key, and the like, in accordance with the desensitization request includes:
generating a key factor according to the desensitization request;
and generating an encryption key and a decryption key according to the key factors.
In some embodiments, the generating a key factor from the desensitization request includes:
acquiring a time stamp of the current system time according to the desensitization request, wherein the desensitization request comprises a user-defined password of a user;
and generating a key factor according to the user-defined password and the timestamp.
In some embodiments, the generating an encryption key and a decryption key from the key factor comprises:
executing first operation on the first M-bit digital of the key factor to obtain a first operation result, wherein M is a positive integer;
performing a second operation on the M+1th bit to the N bit of the key factor to obtain a second operation result, wherein N is a positive integer and N is more than m+1;
executing third operation on the (n+1) -th bit to the K bit of the key factor to obtain a third operation result, wherein K is a positive integer and K is greater than N+1;
Executing a fourth operation on the (K+1) th bit to the last bit of the key factor to obtain a fourth operation result;
combining the first operation result, the second operation result, the third operation result and the fourth operation result to generate an encryption key;
generating the first M digits of the decryption key according to a first operation result in the encryption key;
generating an M+1st bit to N-th bit number of the decryption key according to a second operation result in the encryption key;
generating an (n+1) -th digit to a K-th digit of the decryption key according to a third operation result in the encryption key;
generating the (K+1) bit to the last digit of the decryption key according to the fourth operation result in the encryption key;
and combining the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to generate the decryption key.
In some embodiments, encrypting the ASCII code of the chinese character using the encryption key to obtain the first encrypted data includes:
encrypting the ASCII codes of the Chinese characters according to encryption rules corresponding to a first operation result, a second operation result, a third operation result and a fourth operation result in the encryption key to obtain first encrypted data;
The decrypting the second encrypted data with the decryption key to obtain the target ASCII code includes:
and decrypting the second encrypted data according to decryption rules respectively corresponding to the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to obtain a target ASCII code.
In a first aspect, the present application provides a device for desensitizing chinese character data, comprising:
the acquisition module is used for acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized;
the generation module is used for generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different;
the first encryption module is used for encrypting each Chinese character in the Chinese character comparison table by utilizing the encryption key to generate an encrypted Chinese character comparison table;
the second encryption module is used for encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data;
the searching module is used for searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table;
The decryption module is used for decrypting the second encrypted data by using the decryption key to obtain a target Chinese character;
and the desensitization module is used for desensitizing the Chinese characters to be desensitized by utilizing the target Chinese characters.
In some embodiments, the generation module is specifically configured to:
acquiring a preset Chinese character set according to the desensitization request;
and carrying out random pairwise combination on the Chinese characters in the Chinese character set to generate a Chinese character comparison table.
In some embodiments, the first encryption module is specifically configured to:
converting each Chinese character in the Chinese character comparison table into a corresponding ASCII code;
encrypting each ASCII code by using the encryption key to generate an encrypted Chinese character comparison table;
the second encryption module is specifically configured to:
converting the Chinese characters to be desensitized into corresponding ASCII codes;
and encrypting the ASCII code of the Chinese character by using the encryption key to obtain first encrypted data.
In some embodiments, the decryption module is specifically configured to:
decrypting the second encrypted data by using the decryption key to obtain a target ASCII code;
and converting the target ASCII codes into corresponding target Chinese characters.
In some embodiments, the generating module generates the encryption key, the decryption key, from the desensitization request, including:
Generating a key factor according to the desensitization request;
and generating an encryption key and a decryption key according to the key factors.
In some embodiments, the generating module generates the key factor from the desensitization request comprises:
acquiring a time stamp of the current system time according to the desensitization request, wherein the desensitization request comprises a user-defined password of a user;
and generating a key factor according to the user-defined password and the timestamp.
In some embodiments, the generating module generates the encryption key and the decryption key from the key factor comprises:
performing a first operation on the first M-bit digital of the key factor to obtain a first operation result;
performing a second operation on the M+1st bit to the N bit of the key factor to obtain a second operation result;
executing a third operation on the (n+1) -th bit to the K-th bit of the key factor to obtain a third operation result;
executing a fourth operation on the (K+1) th bit to the last bit of the key factor to obtain a fourth operation result;
combining the first operation result, the second operation result, the third operation result and the fourth operation result to generate an encryption key;
generating the first M digits of the decryption key according to a first operation result in the encryption key;
Generating an M+1st bit to N-th bit number of the decryption key according to a second operation result in the encryption key;
generating an (n+1) -th digit to a K-th digit of the decryption key according to a third operation result in the encryption key;
generating the (K+1) bit to the last digit of the decryption key according to the fourth operation result in the encryption key;
and combining the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to generate the decryption key.
In some embodiments, the second encrypting module encrypts the ASCII code of the chinese character using the encryption key, and obtaining the first encrypted data includes:
encrypting the ASCII codes of the Chinese characters according to encryption rules corresponding to a first operation result, a second operation result, a third operation result and a fourth operation result in the encryption key to obtain first encrypted data;
the decryption module decrypts the second encrypted data by using a decryption key, and the obtaining the target ASCII code includes:
and decrypting the second encrypted data according to decryption rules respectively corresponding to the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to obtain a target ASCII code.
The embodiment of the application also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of the Chinese character data desensitizing method in any embodiment when executing the program.
The embodiment of the present application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the kanji data desensitizing method described in any of the above embodiments.
According to the method and the device for desensitizing the Chinese character data, which are provided by the embodiment of the application, the key is dynamically generated based on the encryption mode of the dynamic key, so that the difficulty of key leakage is greatly improved, and the safety of the data is protected; in addition, by desensitizing the Chinese character data, the privacy of the user can be protected, and sensitive information is prevented from being revealed; moreover, the desensitization technology of Chinese characters is replaced by Chinese characters, so that the readability of data after desensitization is improved.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
Fig. 1 is a flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
FIG. 2 is a flow diagram of a desensitization request initiated by installing and configuring a desensitization tool in an embodiment of the application.
Fig. 3 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 4 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 5 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 6 is a schematic diagram of generating a key factor according to a user's custom password and the timestamp according to an embodiment of the present application.
Fig. 7 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 8 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 9 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
Fig. 10 is a partial flow chart of a method for desensitizing chinese character data according to an embodiment of the present application.
FIG. 11 is a flow chart of a method for security management of desensitizing tools according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of a device for desensitizing chinese character data according to an embodiment of the present application.
Fig. 13 is a schematic physical structure of an electronic device according to an embodiment of the application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings. The exemplary embodiments of the present application and their descriptions herein are for the purpose of explaining the present application, but are not to be construed as limiting the application. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be arbitrarily ordered with respect to each other.
The terms "first," "second," … …, and the like, as used herein, do not denote a particular order or sequence, nor are they intended to be limiting of the application, but rather are merely used to distinguish one element or operation from another in the same technical terms.
As used herein, the terms "comprising," "including," "having," "containing," and the like are intended to be inclusive and mean an inclusion, but not limited to.
As used herein, "and/or" includes any or all ordering of such things.
The execution main body of the Chinese character data desensitization method provided by the embodiment of the application comprises, but is not limited to, a computer.
Fig. 1 is a flow chart of a method for desensitizing chinese character data according to an embodiment of the present application, as shown in fig. 1, where the method for desensitizing chinese character data according to an embodiment of the present application includes:
s101, acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized;
s102, generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different;
s103, encrypting each Chinese character in the Chinese character comparison table by using the encryption key to generate an encrypted Chinese character comparison table;
s104, encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data;
s105, searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table;
s106, decrypting the second encrypted data by using the decryption key to obtain a target Chinese character;
s107, desensitizing the Chinese character to be desensitized by utilizing the target Chinese character.
Specifically, the user may install the kanji data desensitizing tool on a server or computer device that needs to have appropriate CPU, memory, storage capacity, and other specifications. The user may perform desensitization data, desensitization fields, configuration of custom passwords, etc. The tool generates a dynamic encryption key and a decryption key for encrypting and decrypting sensitive Chinese characters, namely the Chinese characters to be desensitized. The Chinese character data desensitizing tool also generates a random Chinese character comparison table, which is a mapping table for replacing the common Chinese characters with random characters. While the table is securely stored in the desensitizing tool.
The tool encrypts the chinese character lookup table using the dynamic encryption key, and the encrypted table is securely stored in the system database. And desensitizing the Chinese characters by using the encrypted Chinese character comparison table. The tool can replace the Chinese characters with the comparison Chinese characters according to the encrypted Chinese character comparison table generated in the step S103, and the process can ensure that the plaintext Chinese characters cannot appear in the tool.
According to the Chinese character data desensitization method provided by the embodiment of the application, the key is dynamically generated based on the encryption mode of the dynamic key, so that the difficulty of key leakage is greatly improved, and the safety of data is protected; in addition, by desensitizing the Chinese character data, the privacy of the user can be protected, and sensitive information is prevented from being revealed; moreover, the desensitization technology of Chinese characters is replaced by Chinese characters, so that the readability of data after desensitization is improved.
In addition, the chinese character desensitizing tool requires proper security management measures to ensure confidentiality, integrity and availability of data. This includes access control mechanisms, encryption of data in transmission and static storage, backup and restore procedures, and periodic auditing to ensure compliance with security policies and regulations.
FIG. 2 is a flow diagram of a desensitization request initiated by installing and configuring a desensitization tool in an embodiment of the application.
S201, checking the installation environment. Since the present tool requires a certain amount of processing power and memory space, it is necessary to confirm the hardware configuration of the computing device and the version of the operating tool, which must not be lower than the environment required by the present tool. Meanwhile, it is necessary to confirm that the Chinese character media such as database, text and the like are in the range supported by the tool.
S202, installing a desensitizing tool. The tool is installed according to specific installation instructions. During installation, attention is paid to selecting a proper installation directory and setting corresponding access rights. In the installation process, corresponding setting and configuration are required according to prompts so as to ensure the normal operation of software and equipment.
S203, configuring a desensitizing tool. After installation, corresponding configuration is needed, including network configuration of the computing device, partition and formatting of the memory medium, configuration of the dynamic password generator, and the like. In addition, the tool needs to be configured with the type of the Chinese character medium to be desensitized, the field to be desensitized, the range of the common Chinese characters, the validity period of the dynamic password and the like, and meanwhile, a user needs to input a 6-bit custom digital password for generating the dynamic key. During configuration, safety and reliability need to be paid attention to, and correctness and integrity of parameters are ensured.
S204, the user initiates a desensitization request. The user needs to use the login password to carry out identity verification, and only the authorized user can log in the tool. After logging in, the user clicks a start desensitization button to initiate a desensitization request.
In some embodiments, generating the chinese character map according to the desensitization request, as described in fig. 3, comprises:
s1021, acquiring a preset Chinese character set according to the desensitization request;
s1022, combining the Chinese characters in the Chinese character set in a random mode to generate a Chinese character comparison table.
Specifically, a range of Chinese characters that need to be generated in a lookup table, such as the modern Chinese commonly used word portion 2500 words, is first determined and formed into an array, such as "you I'm she he". Randomly scrambling the Chinese character sequence in the list. Random numbers within the length range are obtained and deduplicated, for example, using a Random class in java, and then an unordered array of Chinese characters, for example, "i you he her", is generated. Traversing the disturbed Chinese character list, and pairing each Chinese character with another random Chinese character. Starting from the 0 th bit of the Chinese character array, the even number bit and the following odd number bit are combined in pairs to form a Chinese character comparison table, such as the 0 th bit (I) -1 st bit (you), the 2 nd bit (he) -3 rd bit (she).
As shown in fig. 4, in some embodiments, generating the encryption key, the decryption key, and the decryption key according to the desensitization request includes:
s1023, generating a key factor according to the desensitization request;
s1024, an encryption key and a decryption key are generated according to the key factors.
Specifically, the desensitization tool dynamically generates a key factor each time a desensitization request is received, and then generates an encryption key and a decryption key according to the key factor, so that the passwords generated each time are random, and no correlation exists between the passwords generated each time.
As shown in fig. 5, in some embodiments, the generating the key factor from the desensitization request includes:
s10221, acquiring a time stamp of the current system time according to the desensitization request, wherein the desensitization request comprises a user-defined password of a user;
s10222, generating a key factor according to the user-defined password and the timestamp.
Specifically, the key factor may be generated after calculation according to the timestamp and a user-defined password set by the user, so as to ensure the security of the data. And the desensitization of the Chinese character data can be realized only by simple configuration and parameter setting in the operation flow, complicated technical support and personnel training are not needed, and the operation threshold is reduced.
The timestamp in this example is a 13-bit number accurate to milliseconds as part of the random number that generates the random key. The time stamp is combined with the custom password to generate a key factor. As shown in fig. 6, assuming that the time stamp is 1678452608154, the user-input custom password is 123456. Then, in an example of the present application, the specific process of generating the key factor according to the user's custom password and the timestamp is as follows:
(1) The first 10 bits of the time stamp are divided into a group of every 2 adjacent bits, the first 5 bits of the self-defined password are multiplied respectively, and the last 3 bits of the time stamp are multiplied with the 6 th bit of the self-defined password.
(2) The 2 nd bit of each set of calculated data is taken to make up a 6-bit key, here 653002, as shown in the following figure.
(3) The 6-bit digits of the key are multiplied by different coefficients, respectively. The coefficients from bit 1 to bit 6 are 7, 9, 6, 8, 5, 4, respectively.
(4) And adding the 6-bit number and the coefficient multiplication result, and dividing the obtained result by 10 and dividing the obtained result by 9 respectively, wherein the 2 bits are check bits of the key. For example, the complete key factor for this example is 65300235.
As shown in fig. 7, in some embodiments, the generating the encryption key and the decryption key from the key factor includes:
S10240, executing a first operation on the first M bit digital of the key factor to obtain a first operation result, wherein M is a positive integer;
s10241, performing a second operation on the M+1th bit to the N bit of the key factor to obtain a second operation result, wherein N is a positive integer and N is greater than m+1;
s10242, performing a third operation on the (n+1) -th bit to the (K) -th bit of the key factor to obtain a third operation result, wherein K is a positive integer and K is greater than N+1;
s10243, executing a fourth operation on the (K+1) th bit to the last bit of the key factor to obtain a fourth operation result;
s10244, combining the first operation result, the second operation result, the third operation result and the fourth operation result to generate an encryption key;
s10245, generating the first M digits of the decryption key according to a first operation result in the encryption key;
s10246, generating an M+1st bit to N bit number of the decryption key according to a second operation result in the encryption key;
s10247, generating an N+1st bit to K bit number of the decryption key according to a third operation result in the encryption key;
s10248, generating the numbers from the (K+1) th bit to the last bit of the decryption key according to the fourth operation result in the encryption key;
S10249, combining the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to generate the decryption key.
Specifically, taking the key factor 65300235 generated in the above embodiment as an example, a random encryption key and a random decryption key are generated.
Encryption key:
(1) 1, 2-bit flag calculation bit number: the first two bits of the key factor are divided by 4 to be remainder, and 0 is added to the remainder to form 2 bits, which are 1 st and 2 nd bits of the encryption key, in this example, 01.
(2) 3, 4 bits mark special symbols: the 3 and 4 bits of the key factor are divided by 13 to be remained, if the remainder is less than 2 bits, 0 is added to form 2 bits before the remainder, and the 2 bits are the 3 rd and 4 th bits of the encryption key, and the example is 04. The number of special symbols specified in the algorithm is 13, namely (+=.
(3) The 5 th bit flag adds or subtracts the calculated bits: the 5 th bit of the key factor is divided by 2, and if 0, a is output, and if 1, B is output, and the 5 th bit is the encryption key, in this example, a.
(4) Bit 6 tag offset: the 6 th bit of the key factor is left unchanged, and is 2 in this example, as the 6 th bit of the encryption key.
The full encryption key in this example is: 0104A2.
The decryption key is derived from the encryption key:
(1) The 1 and 2 bits represent the position relation between the special symbol and the calculated bit: if the first 2 bits of the encryption key are 00, the first 2 bits of the decryption key are 00, which means that the special symbol is at the last 1 bits of the calculation bits; if the first 2 bits of the encryption key are 03, the first 2 bits of the decryption key are 02, which means that the special symbol is the first 1 bits of the calculation bits; the first 2 bits of the encryption key are 01 or 02, and the first 2 bits of the decryption key are 01, indicating that the special symbol is located before and after the calculation bit, which is 01 in this example.
(2) The 3, 4 bits represent special symbols: the 3 and 4 bits of the encryption key are reserved, and the 3 and 4 bits of the decryption key are 04 in this example.
(3) Bit 5 represents adding or subtracting the calculated bits: if the 5 th bit of the encryption key is A, the 5 th bit of the decryption key is B; if the 5 th bit of the encryption key is B, the 5 th bit of the decryption key is a, in this example B.
(4) Bit 6 tag offset: bit 6 of the encryption key is reserved as bit 6 of the decryption key, in this example 2.
The full decryption key in this example is: 0104B2.
As shown in fig. 8, in some embodiments, the encrypting the chinese characters in the chinese character comparison table using the encryption key, the generating the encrypted chinese character comparison table includes:
S1031, converting each Chinese character in the Chinese character comparison table into a corresponding ASCII code;
s1032, encrypting each ASCII code by using the encryption key to generate an encrypted Chinese character comparison table.
Specifically, firstly, ASCII code conversion is carried out on Chinese characters in a Chinese character comparison table, for example, I-you are converted into 6211-4F 60. And then encrypting the Chinese character comparison table by using the dynamic encryption key. The 4-bit ASCII code is calculated using the encryption key, taking the example that the encryption key is 0104A2 in the above embodiment:
(1) "01" means that the 1 st bit of the ASCII code is taken, and the position in the computer program is calculated from 0, and the number of the taken calculation bit is "2" in this example.
(2) "04" indicates the 4 th special symbol, which starts from bit 0, and the 4 th special symbol is "$", and the calculated bit is isolated from the other by using the special symbol, that is, "6$2$11".
(3) "A" means adding the calculated bits, i.e., adding "2".
(4) "2" means that the offset of the calculated bit is 2, and the addition denoted by "a" is combined, that is, the calculated bit "2" is subjected to +2 processing, so that the encrypted character string is finally obtained as "6$4$11".
As in this example, the lookup table "I-you" is converted to "6$4$11-4$17$60", "4$16$d6-5$11$79".
(5) And performing persistent storage on the encrypted comparison table. The encrypted Chinese character comparison table is stored and can be stored in a database or placed under a safe catalog.
As shown in fig. 9, in some embodiments, encrypting the chinese character to be desensitized using the encryption key to obtain first encrypted data includes:
s1041, converting the Chinese characters to be desensitized into corresponding ASCII codes;
s1042, encrypting the ASCII code of the Chinese character by using the encryption key to obtain first encrypted data.
Specifically, firstly, the Chinese characters to be desensitized are subjected to ASCII code conversion, and are prepared for desensitization. For example, the Chinese character to be desensitized is I'm he' and is converted into ASCII code form 6211 d 6. Then, the ASCII code of the kanji to be desensitized is encrypted by the method of encrypting the ASCII code using the encryption key in step S1032 described above.
In some embodiments, encrypting the ASCII code of the chinese character using the encryption key to obtain the first encrypted data includes: and encrypting the ASCII code of the Chinese character according to encryption rules corresponding to the first operation result, the second operation result, the third operation result and the fourth operation result in the encryption key to obtain first encrypted data.
Specifically, in the same way as the method of encrypting ASCII code using encryption key in step S1032, the ASCII code of the chinese character to be desensitized is encrypted, for example, "6211 f60" in this example, and is converted into "6$4$ 11114$16$d6".
As shown in fig. 10, in some embodiments, decrypting the second encrypted data using the decryption key includes:
s1061, decrypting the second encrypted data by using a decryption key to obtain a target ASCII code;
s1062, converting the target ASCII code into a corresponding target Chinese character.
Specifically, the encrypted Chinese characters corresponding to the decryption key are decrypted to obtain corresponding Chinese character ASCII codes, and then the ASCII codes are converted into Chinese character plaintext.
In some embodiments, decrypting the second encrypted data using the decryption key to obtain the target ASCII code includes: and decrypting the second encrypted data according to decryption rules respectively corresponding to the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to obtain a target ASCII code.
Specifically, for example, the encrypted Chinese character "4$17$60$5$11$79" corresponding to the above embodiment has a decryption key of 0104B2:
(1) "01" means that special characters are before and after the calculation bit, and the special symbol is used as a separator to separate the encrypted Chinese character into 3 parts, and then the middle part (part 2) is the calculation bit. If the number is "00" or "02", the encrypted Chinese character is divided into 2 parts, which respectively indicate that the 1 st part and the 2 nd part are calculation bits.
(2) "04" means the 4 th special symbol, and the encrypted kanji character string is cut by using the special symbol as a separator.
(3) "B" means that the calculated bits are subtracted, in this case 17 and 11.
(4) "2" means that the calculated bit has an offset of 2, and the subtraction denoted by "B", i.e., the calculated bit "2" is processed by-2, and the resulting decrypted ASCII code is "4f60 5979".
Finally, ASCII codes are converted into Chinese characters. The decrypted chinese character ASCII is converted into a target chinese character, for example, "4f60 5979" in this example, to "you. To this end, "i am" in this example is desensitized, converting to "you she".
As shown in fig. 11, in some embodiments, security management is also performed on the desensitizing tool, and the method of security management is as follows:
s301, access control. Access control refers to control and restriction of access to tools and data. The password generator and the password memory in the method have strict access control mechanisms, and only personnel subjected to identity authentication and authorization can access and modify related data. Access control may be implemented by means of passwords, fingerprint recognition, face recognition, etc. to improve security.
S302, encryption algorithm security. The security of the encryption algorithm is a key to ensuring the security of data. The encryption algorithm used in the method can be sufficiently tested and verified, and can resist various attack means. In addition, the encryption algorithm has good expandability and flexibility, and is convenient to adjust and upgrade according to the needs.
S303, key management. Key management is the process of key generation and preservation. The key generator and the key memory in the method have strict key management mechanisms, and only authorized personnel can generate and store the key. The keys are of sufficient length and complexity to resist various key cracking means. Furthermore, the key should be replaced periodically and should be destroyed immediately when no use is required.
S304, memory medium security. Memory media are key links for data storage and transmission. The memory medium used in the method should have high-speed and reliable characteristics to ensure the safety and reliability of data. In addition, the memory medium should be sufficiently tested and verified to be able to resist various means of attack. During use, the memory medium needs to be checked and maintained regularly to maintain its good working state.
S305, data backup. Data backup is an important means for ensuring data security. The encrypted data in the method should be backed up periodically and stored in different locations to prevent data loss or corruption. The backup data should be encrypted and have a strict access control mechanism to ensure the security and reliability of the data.
S306, security audit. Security audit is the process of security inspection and assessment of tools and data. The key generator and the key memory in the method have strict audit mechanisms, and all access and operation records are recorded. The audit record should have integrity and traceability to facilitate the discovery and investigation of security events.
In a word, the security management of the method is all-round and multi-level, and the security and reliability of the data are ensured from various aspects such as hardware, software, algorithm and management.
The method for desensitizing the Chinese character data provided by the embodiment of the application adopts a dynamic password technology, passwords generated each time are random, and different passwords have no relevance, so that the high security of the desensitized data is ensured, meanwhile, the method can realize high-precision desensitization of the Chinese character based on various rules such as digital conversion, character set conversion and the like, and the availability and accuracy of the desensitized data are ensured. The method is suitable for desensitization of various Chinese character data, including text data, picture data, audio data and the like, and can meet the requirements of different data types and scenes. Meanwhile, the application has good compatibility with the existing data processing platform and database, can be seamlessly integrated with various data storage and processing systems, and improves the data desensitization efficiency and reliability.
The Chinese character data based on the dynamic key can perform desensitization and encryption storage to play a good role in protecting the data security. Conventional encryption methods require the data to be encrypted using a key, but once the key is compromised, the data is easily decrypted. The encryption mode based on the dynamic key is used for dynamically generating the key, and a random factor is added, so that the difficulty of key leakage is greatly improved, and the safety of data is protected. In addition, by desensitizing the Chinese character data, the privacy of the user can be protected, and sensitive information is prevented from being revealed. While encrypted storage may prevent data from being illegally accessed and tampered with. Therefore, the dynamic key-based Chinese character data desensitization and encryption storage scheme can effectively protect data security, improve the privacy and the integrity of data, and is a data security solution with high feasibility.
Fig. 12 is a schematic structural diagram of a device for desensitizing chinese character data according to an embodiment of the present application, as shown in fig. 12, where the device for desensitizing chinese character data according to an embodiment of the present application includes:
an obtaining module 41, configured to obtain a desensitization request, where the desensitization request includes a chinese character to be desensitized;
The generating module 42 is configured to generate an encryption key, a decryption key, and a chinese character comparison table according to the desensitization request, where the chinese character comparison table includes a mapping relationship between chinese characters, and the encryption key and the decryption key are different;
a first encryption module 43, configured to encrypt each chinese character in the chinese character comparison table by using the encryption key, and generate an encrypted chinese character comparison table;
a second encryption module 44, configured to encrypt the chinese character to be desensitized by using the encryption key, so as to obtain first encrypted data;
the searching module 45 is configured to search the encrypted chinese character comparison table for second encrypted data having a mapping relationship with the first encrypted data;
a decryption module 46, configured to decrypt the second encrypted data by using the decryption key to obtain a target kanji;
and the desensitization module 47 is used for desensitizing the Chinese characters to be desensitized by utilizing the target Chinese characters.
The Chinese character data desensitizing device provided by the embodiment of the application is based on the encryption mode of the dynamic key, the key is dynamically generated, the difficulty of key leakage is greatly improved, and the safety of data is protected; in addition, by desensitizing the Chinese character data, the privacy of the user can be protected, and sensitive information is prevented from being revealed; moreover, the desensitization technology of Chinese characters is replaced by Chinese characters, so that the readability of data after desensitization is improved.
In some embodiments, the generation module is specifically configured to:
acquiring a preset Chinese character set according to the desensitization request;
and carrying out random pairwise combination on the Chinese characters in the Chinese character set to generate a Chinese character comparison table.
In some embodiments, the first encryption module is specifically configured to:
converting each Chinese character in the Chinese character comparison table into a corresponding ASCII code;
encrypting each ASCII code by using the encryption key to generate an encrypted Chinese character comparison table;
the second encryption module is specifically configured to:
converting the Chinese characters to be desensitized into corresponding ASCII codes;
and encrypting the ASCII code of the Chinese character by using the encryption key to obtain first encrypted data.
In some embodiments, the decryption module is specifically configured to:
decrypting the second encrypted data by using the decryption key to obtain a target ASCII code;
and converting the target ASCII codes into corresponding target Chinese characters.
In some embodiments, the generating module generates the encryption key, the decryption key, from the desensitization request, including:
generating a key factor according to the desensitization request;
and generating an encryption key and a decryption key according to the key factors.
In some embodiments, the generating module generates the key factor from the desensitization request comprises:
acquiring a time stamp of the current system time according to the desensitization request, wherein the desensitization request comprises a user-defined password of a user;
and generating a key factor according to the user-defined password and the timestamp.
In some embodiments, the generating module generates the encryption key and the decryption key from the key factor comprises:
performing a first operation on the first M-bit digital of the key factor to obtain a first operation result;
performing a second operation on the M+1st bit to the N bit of the key factor to obtain a second operation result;
executing a third operation on the (n+1) -th bit to the K-th bit of the key factor to obtain a third operation result;
executing a fourth operation on the (K+1) th bit to the last bit of the key factor to obtain a fourth operation result;
combining the first operation result, the second operation result, the third operation result and the fourth operation result to generate an encryption key;
generating the first M digits of the decryption key according to a first operation result in the encryption key;
generating an M+1st bit to N-th bit number of the decryption key according to a second operation result in the encryption key;
Generating an (n+1) -th digit to a K-th digit of the decryption key according to a third operation result in the encryption key;
generating the (K+1) bit to the last digit of the decryption key according to the fourth operation result in the encryption key;
and combining the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to generate the decryption key.
In some embodiments, the second encrypting module encrypts the ASCII code of the chinese character using the encryption key, and obtaining the first encrypted data includes:
encrypting the ASCII codes of the Chinese characters according to encryption rules corresponding to a first operation result, a second operation result, a third operation result and a fourth operation result in the encryption key to obtain first encrypted data;
the decryption module decrypts the second encrypted data by using a decryption key, and the obtaining the target ASCII code includes:
and decrypting the second encrypted data according to decryption rules respectively corresponding to the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to obtain a target ASCII code.
The embodiment of the apparatus provided in the embodiment of the present application may be specifically used to execute the processing flow of the embodiment of the method, and the functions thereof are not described herein again, and may refer to the detailed description of the embodiment of the method.
It should be noted that, the method and the device for desensitizing the Chinese character data provided by the embodiment of the application can be used in the financial field and also can be used in any technical field except the financial field, and the application field of the method and the device for desensitizing the Chinese character data is not limited.
Fig. 13 is a schematic physical structure of an electronic device according to an embodiment of the present application, as shown in fig. 13, the electronic device may include: a processor (processor) 501, a communication interface (Communications Interface) 502, a memory (memory) 503 and a communication bus 504, wherein the processor 501, the communication interface 502, and the memory 503 communicate with each other via the communication bus 504. The processor 501 may invoke logic instructions in the memory 503 to perform the method described in any of the embodiments above.
Further, the logic instructions in the memory 503 described above may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present embodiments disclose a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, are capable of performing the methods provided by the method embodiments described above.
The present embodiment provides a computer-readable storage medium storing a computer program that causes the computer to execute the methods provided by the above-described method embodiments.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the description of the present specification, reference to the terms "one embodiment," "one particular embodiment," "some embodiments," "for example," "an example," "a particular example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the application, and is not meant to limit the scope of the application, but to limit the application to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the application are intended to be included within the scope of the application.

Claims (11)

1. A method for desensitizing chinese character data, comprising:
acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized;
generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different;
encrypting each Chinese character in the Chinese character comparison table by using the encryption key to generate an encrypted Chinese character comparison table;
encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data;
searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table;
Decrypting the second encrypted data by using the decryption key to obtain a target Chinese character;
and desensitizing the Chinese character to be desensitized by utilizing the target Chinese character.
2. The method of claim 1, wherein generating a chinese character map based on the desensitization request comprises:
acquiring a preset Chinese character set according to the desensitization request;
and carrying out random pairwise combination on the Chinese characters in the Chinese character set to generate a Chinese character comparison table.
3. The method of claim 1, wherein encrypting the chinese characters in the chinese character comparison table using the encryption key, generating an encrypted chinese character comparison table comprises:
converting each Chinese character in the Chinese character comparison table into a corresponding ASCII code;
encrypting each ASCII code by using the encryption key to generate an encrypted Chinese character comparison table;
encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data, wherein the first encrypted data comprises the following steps:
converting the Chinese characters to be desensitized into corresponding ASCII codes;
and encrypting the ASCII code of the Chinese character by using the encryption key to obtain first encrypted data.
4. The method of claim 3, wherein decrypting the second encrypted data using the decryption key to obtain the target kanji comprises:
Decrypting the second encrypted data by using the decryption key to obtain a target ASCII code;
and converting the target ASCII codes into corresponding target Chinese characters.
5. The method of claim 4, wherein generating an encryption key, a decryption key, based on the desensitization request comprises:
generating a key factor according to the desensitization request;
and generating an encryption key and a decryption key according to the key factors.
6. The method of claim 5, wherein generating a key factor based on the desensitization request comprises:
acquiring a time stamp of the current system time according to the desensitization request, wherein the desensitization request comprises a user-defined password of a user;
and generating a key factor according to the user-defined password and the timestamp.
7. The method of claim 5, wherein the generating an encryption key and a decryption key from the key factor comprises:
executing first operation on the first M-bit digital of the key factor to obtain a first operation result, wherein M is a positive integer;
performing a second operation on the M+1th bit to the N bit of the key factor to obtain a second operation result, wherein N is a positive integer and N is more than m+1;
Executing third operation on the (n+1) -th bit to the K bit of the key factor to obtain a third operation result, wherein K is a positive integer and K is greater than N+1;
executing a fourth operation on the (K+1) th bit to the last bit of the key factor to obtain a fourth operation result;
combining the first operation result, the second operation result, the third operation result and the fourth operation result to generate an encryption key;
generating the first M digits of the decryption key according to a first operation result in the encryption key;
generating an M+1st bit to N-th bit number of the decryption key according to a second operation result in the encryption key;
generating an (n+1) -th digit to a K-th digit of the decryption key according to a third operation result in the encryption key;
generating the (K+1) bit to the last digit of the decryption key according to the fourth operation result in the encryption key;
and combining the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to generate the decryption key.
8. The method of claim 7, wherein encrypting the ASCII code of the chinese character using the encryption key to obtain first encrypted data comprises:
Encrypting the ASCII codes of the Chinese characters according to encryption rules corresponding to a first operation result, a second operation result, a third operation result and a fourth operation result in the encryption key to obtain first encrypted data;
the decrypting the second encrypted data with the decryption key to obtain the target ASCII code includes:
and decrypting the second encrypted data according to decryption rules respectively corresponding to the first M digits, the M+1th digits to the N digits, the N+1th digits to the K digits and the K+1th digits to the last digits of the decryption key to obtain a target ASCII code.
9. A chinese character data desensitizing apparatus, comprising:
the acquisition module is used for acquiring a desensitization request, wherein the desensitization request comprises Chinese characters to be desensitized;
the generation module is used for generating an encryption key, a decryption key and a Chinese character comparison table according to the desensitization request, wherein the Chinese character comparison table comprises mapping relations between Chinese characters, and the encryption key and the decryption key are different;
the first encryption module is used for encrypting each Chinese character in the Chinese character comparison table by utilizing the encryption key to generate an encrypted Chinese character comparison table;
The second encryption module is used for encrypting the Chinese characters to be desensitized by using the encryption key to obtain first encrypted data;
the searching module is used for searching second encrypted data with a mapping relation with the first encrypted data in the encrypted Chinese character comparison table;
the decryption module is used for decrypting the second encrypted data by using the decryption key to obtain a target Chinese character;
and the desensitization module is used for desensitizing the Chinese characters to be desensitized by utilizing the target Chinese characters.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 8 when the computer program is executed by the processor.
11. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any one of claims 1 to 8.
CN202310901430.XA 2023-07-21 2023-07-21 Chinese character data desensitizing method and device Pending CN116980192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310901430.XA CN116980192A (en) 2023-07-21 2023-07-21 Chinese character data desensitizing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310901430.XA CN116980192A (en) 2023-07-21 2023-07-21 Chinese character data desensitizing method and device

Publications (1)

Publication Number Publication Date
CN116980192A true CN116980192A (en) 2023-10-31

Family

ID=88470652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310901430.XA Pending CN116980192A (en) 2023-07-21 2023-07-21 Chinese character data desensitizing method and device

Country Status (1)

Country Link
CN (1) CN116980192A (en)

Similar Documents

Publication Publication Date Title
US9489521B2 (en) Format preserving encryption methods for data strings with constraints
US8208627B2 (en) Format-preserving cryptographic systems
US9208491B2 (en) Format-preserving cryptographic systems
US8855296B2 (en) Data processing systems with format-preserving encryption and decryption engines
US8204213B2 (en) System and method for performing a similarity measure of anonymized data
US7864952B2 (en) Data processing systems with format-preserving encryption and decryption engines
US8661263B2 (en) Meta-complete data storage
US7694147B2 (en) Hashing method and system
US20130339252A1 (en) Format-preserving cryptographic systems
WO2009023422A1 (en) System and method for generating and displaying a keyboard comprising a random layout of keys
US20180373464A1 (en) Encrypted data storage and retrieval system
US7599492B1 (en) Fast cryptographic key recovery system and method
CN110768797A (en) Data desensitization method based on identity format reserved encryption
US10536276B2 (en) Associating identical fields encrypted with different keys
CN114942729A (en) Data safety storage and reading method for computer system
Reddy et al. Enhanced key establishment technique for secure data access in cloud
CN111159661A (en) Decompilation prevention method and device, electronic equipment and storage medium
GB2479074A (en) A key server selects policy rules to apply to a key request based on an identifier included in the request
CN116980192A (en) Chinese character data desensitizing method and device
US20090077377A1 (en) System and method of protecting content of an electronic file for sending and receiving
CN112615816A (en) Cloud document transmission encryption and decryption method
US20210111870A1 (en) Authorizing and validating removable storage for use with critical infrastrcture computing systems
CN112306582A (en) Configuration variable encryption and decryption method and device, computer equipment and readable storage medium
US20130036474A1 (en) Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval
Nasreen et al. Cloud forensics: A centralized cloud provenance investigation system using MECC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination