CN105138585B - Data base encryption field portions matching inquiry method and system - Google Patents
Data base encryption field portions matching inquiry method and system Download PDFInfo
- Publication number
- CN105138585B CN105138585B CN201510463863.7A CN201510463863A CN105138585B CN 105138585 B CN105138585 B CN 105138585B CN 201510463863 A CN201510463863 A CN 201510463863A CN 105138585 B CN105138585 B CN 105138585B
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted
- logger
- data logger
- unique designation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24553—Query execution of query operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
Abstract
The invention discloses a kind of method and system of data base encryption field portions matching inquiry, wherein method includes:Create data logger;According to the data logger, encrypted indexes table is created to the encrypted fields;Program obtains field to be checked, and encrypts;The data matched completely are inquired by SQL statement in data logger, and are the first value by the data record matched completely;The field to be checked is subjected to SHA hash, corresponding data unique designation is inquired about in encrypted indexes table by SQL statement;According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are recorded as second value;Merge first value and second value.By the above-mentioned means, the present invention can only need the field can of partial match query to use encipherment scheme in the case where ensureing performance, security of system and ease for use are improved.
Description
Technical field
The present invention relates to field of database query technology, more particularly, to a kind of data base encryption field portions matching inquiry
Method and system.
Background technology
Field is encrypted in order to ensure database security for database at present, still, during partial match query, needs
Rear matched and searched is decrypted to every a data, when data volume is big, technical staff can be caused because query time is long
Encipherment scheme is yielded, or only allows Full Match Search.
Existing patent (application number:201410150462.1) disclose a kind of data encryption for database and retrieval side
Method, comprise the following steps:A) the constant situation of former data order is being kept to former data encryption first with One-way encryption algorithm
Under, generate non-decryption indexes head;B) the ciphertext data that can be decrypted to former data encryption generation are then further continued for;C) may be used
Index head and the ciphertext data that can be decrypted are combined in generation encrypted combination data Cun Chudao databases;The step a)
In One-way encryption algorithm be MD5, SHA or HMAC;AES in the step b) is symmetric key encryption algorithm.This is special
Profit is that solve the problems, such as matching completely.
The content of the invention
The technical problems to be solved by the invention are:Using partial match query, efficient data base querying mesh is realized
's.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of data base encryption field portion is provided
Divide the method for matching inquiry, including:
Create data logger;
According to the data logger, encrypted indexes table is created to the encrypted fields;
Program obtains field to be checked, and encrypts;
The data matched completely, and the data record that will be matched completely are inquired by SQL statement in data logger
For the first value;
The field to be checked is subjected to SHA hash, corresponding data is inquired about only in encrypted indexes table by SQL statement
One mark;
According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are remembered
Record as second value;
Merge first value and second value.
To solve the above problems, the present invention also provides a kind of system of data base encryption field portions matching inquiry, including:
Data logger module, for creating data logger;
Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;
Encrypting module is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and
It is the first value by the data record matched completely;
Hash module, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table
Inquire about corresponding data unique designation;
Second inquiry logging modle, for according to corresponding data unique designation, data to be inquired in data logger only
All data of one mark, and it is recorded as second value;
Merging module, for merging first value and second value.
The beneficial effects of the present invention are:It is different from prior art, the present invention is by creating data logger and correspondingly
Encrypted indexes table, in encrypted queries, Full Match Search and partial match query are realized by its unique numerical identification, entered
And final result is obtained, its strong operability, while efficiency high, encryption are good, and improve the security and ease for use of system.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the inventive method embodiment one;
Fig. 2 is the schematic flow sheet of the inventive method embodiment two;
Fig. 3 is the structured flowchart of present system embodiment three;
Fig. 4 is the structured flowchart of present system example IV.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached
Figure is explained.
The present invention provides a kind of method of data base encryption field portions matching inquiry, including:
Create data logger;
According to the data logger, encrypted indexes table is created to the encrypted fields;
Program obtains field to be checked, and encrypts;
The data matched completely, and the data record that will be matched completely are inquired by SQL statement in data logger
For the first value;
The field to be checked is subjected to SHA hash, corresponding data is inquired about only in encrypted indexes table by SQL statement
One mark;
According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are remembered
Record as second value;
Merge first value and second value.
Wherein, the step of establishment data logger is specially:
Establish data unique designation row and arranged with encrypted fields;
Merge the data unique designation row and arranged with encrypted fields, generate data logger.
Wherein, merge the data unique designation row and arranged with encrypted fields, after generating data logger, also wrapped
Include:Non-encrypted field row are established, and are merged into data logger.
Wherein, according to the data logger, after the step of encrypted fields establishment encrypted indexes table, also wrap
Include:
Data are inserted in the data logger and encrypted indexes table.
Wherein, it is specially the step of insertion data in the data logger and encrypted indexes table:
Initialize the data logger and encrypted indexes table;
The data being inserted into are split into N-1 character string of part matching from the beginning of its character, wherein, the character string
Length is 1~N-1, and N is the length of the data;
The N-1 character string is subjected to SHA hash, and encrypted;
Data, and data unique designation corresponding to generation are inserted in data logger;
According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
The present invention also provides a kind of system of data base encryption field portions matching inquiry, including:
Data logger module, for creating data logger;
Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;
Encrypting module is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and
It is the first value by the data record matched completely;
Hash module, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table
Inquire about corresponding data unique designation;
Second inquiry logging modle, for according to corresponding data unique designation, data to be inquired in data logger only
All data of one mark, and it is recorded as second value;
Merging module, for merging first value and second value.
Wherein, obtaining encrypting module also includes:
Column unit, for establishing data unique designation row and being arranged with encrypted fields;
Generation unit, for merging the data unique designation row and being arranged with encrypted fields, generate data logger.
Wherein, the column unit is additionally operable to establish non-encrypted field row, and is merged into data logger.
Wherein, in addition to Data insertion module, for inserting data in the data logger and encrypted indexes table.
Wherein, the Data insertion module also includes:
Unit initially is changed, for initializing the data logger and encrypted indexes table;
Split cells, for the data being inserted into be split into N-1 character string of part matching from the beginning of its character, its
In, the string length is 1~N-1, and N is the length of the data;
Ciphering unit is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;
Generation unit is inserted, for inserting data, and data unique designation corresponding to generation in data logger;
Character string inserts unit, for the data unique designation corresponding to, is hashed in encrypted indexes table described in insertion
N-1 character string.
Fig. 1 is refer to, the embodiment of the present invention one provides a kind of method of data base encryption field portions matching inquiry, including
Following steps:
S1:Create data logger;
S2:According to the data logger, encrypted indexes table is created to the encrypted fields;
S3:Program obtains field to be checked, and encrypts;
S4:The data matched completely are inquired by SQL statement in data logger, and the data matched completely are remembered
Record as the first value;
S5:The field to be checked is subjected to SHA hash, inquires about corresponding number in encrypted indexes table by SQL statement
According to unique designation;
S6:According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and
It is recorded as second value;
S7:Merge first value and second value.
Prior art is different from, the present invention looks into by creating data logger and corresponding encrypted indexes table in encryption
During inquiry, Full Match Search and partial match query are realized by its unique numerical identification, and then obtain final result, it is operated
Property is strong, while efficiency high, encryption are good, and improves the security and ease for use of system.
Wherein, as shown in Fig. 2 on the basis of embodiment one, the step S1 of the embodiment of the present invention two is specially:
S11:Establish data unique designation row and arranged with encrypted fields;
S12:Merge the data unique designation row and arranged with encrypted fields, generate data logger.
Wherein, after S12, in addition to step S13:Non-encrypted field row are established, and are merged into data logger.
Wherein non-encrypted field row may be considered in existing basic data, without that a part of content of encryption,
Such as in cell phone address book, under corresponding name, can only need to encrypt phone number, and to other information, as mailbox, other
IM numbers can not be encrypted.These can be merged into a data logger.It is mainly originally wherein there was only phone number
Invention needs encrypted query.In practical operation, user can encrypt a variety of data as needed, or even can encrypt the institute under name
There is communication information.
It should be appreciated that data logger can select to come in user's establishment or existing tables of data.
Such as cell phone address book, name, telephone number are encrypted, address list is exactly the data logger.Preferably, the present invention can
Database index is created to encrypted fields (name, number as described above), to facilitate follow-up lookup.
Wherein, after step S2, in addition to:
S21:Data are inserted in the data logger and encrypted indexes table.
Wherein, step S21 is specially:
S22:Initialize the data logger and encrypted indexes table;
S23:The data being inserted into are split into N-1 character string of part matching from the beginning of its character;Wherein, the word
Symbol string length is 1~N-1, and N is the length of the data;
S24:The N-1 character string is subjected to SHA hash, and encrypted;
S25:Data, and data unique designation corresponding to generation are inserted in data logger;
S26:According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
Specifically, according to corresponding to creating data logger during encrypted indexes table, it is necessary to create including encrypted indexes field
Row and two fields of corresponding data unique designation.Similarly, it is preferable that the present invention can be to data corresponding to the establishment of encrypted indexes field
Storehouse indexes, to facilitate follow-up lookup.
Before data are inserted, the data logger established and encrypted indexes table are first initialized.Due to being that part matching is looked into
Ask, therefore the N-1 character string that the data being inserted into will be split into part matching from the beginning of its character, wherein, the character
String length is 1~N-1, and N is the length of the data.These character strings form a combination, and carry out SHA hash and encryption.
Existing matched data word1 and pk2 completely, then be split into corresponding w, wo, wor, word such as in data logger
The combination of totally 4 character strings and p, pk totally 2 character strings.The method wherein encrypted can be taken well known in the prior art
AES, such as AES.
Data are inserted in data logger, and confirm generate data unique designation, then by data unique designation with it is above-mentioned
All combination S HA hash be inserted into encrypted indexes record sheet.
And in inquiry, after user inputs a character, program is encrypted, and is arrived first in data logger and is passed through
SQL statement inquires the content that matching completely needs to encrypt, and is matched completely according to inquiry content, due to being pre-created database
Index, required data can quickly directly be found according to index, without scanning all data.Database of the prior art
Sql server, mysql etc. support this function.It is result 1 (i.e. the first value) by the field record matched completely.
The character of input is subjected to SHA hash, is inquired about by SQL statement into encrypted indexes table, inquires SHA hash
The corresponding data unique designation of the record matched completely is kept in.By the above-mentioned data unique designation inquired into data logger
Inquire the consistent all data of data unique designation and keep in result 2 (i.e. second value).
The result inquired be result 1 and result it is 2-in-1 and overall result.
Prior art is different from, the present invention is used as data record by creating data logger or the existing tables of data of selection
Table, and encrypted indexes table and data directory corresponding to establishment, the inquiry respectively in two tables is realized by unique data token
And respective contact.In encrypted query, Full Match Search and partial match query are realized by its unique numerical identification, entered
And the two final result merged is obtained, thus its strong operability, while efficiency high, encryption are good, and improve the peace of system
Full property and ease for use.
The embodiment of the present invention three also provides a kind of system 100 of data base encryption field portions matching inquiry, including:
Data logger module 110, for creating data logger;
Encrypted indexes table module 120, for according to the data logger, encrypted indexes to be created to the encrypted fields
Table;
Encrypting module 130 is obtained, field to be checked is obtained for program, and encrypt;
First inquiry logging modle 140, for inquiring the number matched completely by SQL statement in data logger
According to, and be the first value by the data record matched completely;
Hash module 150, for the field to be checked to be carried out into SHA hash, by SQL statement in encrypted indexes table
Middle inquiry corresponding data unique designation;
Second inquiry logging modle 160, for according to corresponding data unique designation, data to be inquired in data logger
All data of unique designation, and it is recorded as second value;
Merging module 170, for merging first value and second value.
Wherein, encrypting module 130 is obtained described in the embodiment of the present invention four also includes:
Column unit 131, for establishing data unique designation row and being arranged with encrypted fields;
Generation unit 132, for merging the data unique designation row and being arranged with encrypted fields, generate data record
Table.
Wherein, the column unit 131 is additionally operable to establish non-encrypted field row, and is merged into data logger.
Wherein, the system 100 also includes Data insertion module 180, in the data logger and encrypted indexes
Data are inserted in table.
Wherein, the Data insertion module 180 also includes:
Unit 181 initially is changed, for initializing the data logger and encrypted indexes table;
Split cells 182, for the data being inserted into be split into N-1 character of part matching from the beginning of its character
String, wherein, the string length is 1~N-1, and N is the length of the data;
Ciphering unit 183 is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;
Generation unit 184 is inserted, for inserting data, and data unique designation corresponding to generation in data logger;
Character string inserts unit 185, for the data unique designation corresponding to, the hash insertion institute in encrypted indexes table
State N-1 character string.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include
In the scope of patent protection of the present invention.
Claims (6)
- A kind of 1. method of data base encryption field portions matching inquiry, it is characterised in that including:Create data logger;According to the data logger, encrypted indexes table is created to the encrypted fields;Program obtains field to be checked, and encrypts;Inquire the data matched completely by SQL statement in data logger, and be the by the data record matched completely One value;The field to be checked is subjected to SHA hash, corresponding data is inquired about in encrypted indexes table by SQL statement and uniquely marked Will;According to corresponding data unique designation, all data of data unique designation are inquired in data logger, and are recorded as Second value;Merge first value and second value;Wherein, according to the data logger, after the step of creating encrypted indexes table to the encrypted fields, in addition to: Data are inserted in the data logger and encrypted indexes table, are concretely comprised the following steps:Initialize the data logger and encryption rope Draw table;The data being inserted into are split into N-1 character string of part matching from the beginning of its character, wherein, the string length 1~N-1 is followed successively by, N is the length of the data;The N-1 character string is subjected to SHA hash, and encrypted;Data, and data unique designation corresponding to generation are inserted in data logger;According to corresponding data unique designation, hash inserts the N-1 character string in encrypted indexes table.
- 2. the method for data base encryption field portions matching inquiry according to claim 1, it is characterised in that create data note The step of record table is specially:Establish data unique designation row and arranged with encrypted fields;Merge the data unique designation row and arranged with encrypted fields, generate data logger.
- 3. the method for data base encryption field portions matching inquiry according to claim 2, it is characterised in that merge the number Arrange according to unique designation and arranged with encrypted fields, after generating data logger, in addition to:Non-encrypted field row are established, and are closed And arrive data logger.
- A kind of 4. system of data base encryption field portions matching inquiry, it is characterised in that including:Data logger module, for creating data logger;Encrypted indexes table module, for according to the data logger, encrypted indexes table to be created to the encrypted fields;Encrypting module is obtained, field to be checked is obtained for program, and encrypt;First inquiry logging modle, for the data matched completely to be inquired by SQL statement in data logger, and will be complete The data record matched entirely is the first value;Hash module, for the field to be checked to be carried out into SHA hash, inquired about by SQL statement in encrypted indexes table Corresponding data unique designation;Second inquiry logging modle, for according to corresponding data unique designation, in data logger inquiring data uniquely marks All data of will, and it is recorded as second value;Merging module, for merging first value and second value;Wherein, in addition to Data insertion module, for inserting data, the number in the data logger and encrypted indexes table Also include according to insertion module:Unit initially is changed, for initializing the data logger and encrypted indexes table;Split cells, for the data being inserted into be split into N-1 character string of part matching from the beginning of its character, wherein, The string length is followed successively by 1~N-1, and N is the length of the data;Ciphering unit is hashed, for the N-1 character string to be carried out into SHA hash, and is encrypted;Generation unit is inserted, for inserting data, and data unique designation corresponding to generation in data logger;Character string is inserted Unit, for the data unique designation corresponding to, hash inserts the N-1 character string in encrypted indexes table.
- 5. the system of data base encryption field portions matching inquiry according to claim 4, it is characterised in that obtain encryption mould Block also includes:Column unit, for establishing data unique designation row and being arranged with encrypted fields;Generation unit, for merging the data unique designation row and being arranged with encrypted fields, generate data logger.
- 6. the system of data base encryption field portions matching inquiry according to claim 5, it is characterised in that the column unit It is additionally operable to establish non-encrypted field row, and is merged into data logger.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510463863.7A CN105138585B (en) | 2015-07-31 | 2015-07-31 | Data base encryption field portions matching inquiry method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510463863.7A CN105138585B (en) | 2015-07-31 | 2015-07-31 | Data base encryption field portions matching inquiry method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105138585A CN105138585A (en) | 2015-12-09 |
CN105138585B true CN105138585B (en) | 2018-04-10 |
Family
ID=54723934
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510463863.7A Active CN105138585B (en) | 2015-07-31 | 2015-07-31 | Data base encryption field portions matching inquiry method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105138585B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106202386A (en) * | 2016-07-08 | 2016-12-07 | 唐博 | The method automatically analyzing database table relation |
CN106934298B (en) * | 2017-03-06 | 2019-12-31 | 戴林 | Transparent encryption system for universal database |
CN108664798B (en) * | 2017-03-31 | 2021-06-29 | 北京京东尚科信息技术有限公司 | Information encryption method and device |
CN109101837B (en) * | 2018-08-10 | 2020-09-15 | 苏州浪潮智能科技有限公司 | Data storage method and device |
US11239996B2 (en) | 2019-12-18 | 2022-02-01 | International Business Machines Corporation | Weighted partial matching under homomorphic encryption |
CN112583809B (en) * | 2020-12-09 | 2022-09-30 | 北京国研数通软件技术有限公司 | Data encryption and decryption method of non-immersion multiple encryption algorithms |
CN112861192B (en) * | 2021-02-25 | 2023-08-25 | 中冶南方连铸技术工程有限责任公司 | Equipment tracking method and system |
CN113076562A (en) * | 2021-05-08 | 2021-07-06 | 北京炼石网络技术有限公司 | Database encryption field fuzzy retrieval method based on GCM encryption mode |
CN116756760B (en) * | 2023-08-21 | 2023-12-12 | 合肥安永信息科技有限公司 | Searchable database encryption system and method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1347050A (en) * | 2000-09-27 | 2002-05-01 | 日本电气株式会社 | Encrypted file system, method for searching encrypted file, and computer readable medium |
CN101802836A (en) * | 2007-09-21 | 2010-08-11 | 爱立信电话股份有限公司 | Systems and methods for partial matching searches of encrypted retained data |
CN104106075A (en) * | 2011-11-24 | 2014-10-15 | 商业合伙有限公司 | Secure database searching |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7743069B2 (en) * | 2004-09-03 | 2010-06-22 | Sybase, Inc. | Database system providing SQL extensions for automated encryption and decryption of column data |
US20130238646A1 (en) * | 2012-03-06 | 2013-09-12 | Evrichart, Inc. | Partial-Match Searches of Encrypted Data Sets |
-
2015
- 2015-07-31 CN CN201510463863.7A patent/CN105138585B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1347050A (en) * | 2000-09-27 | 2002-05-01 | 日本电气株式会社 | Encrypted file system, method for searching encrypted file, and computer readable medium |
CN101802836A (en) * | 2007-09-21 | 2010-08-11 | 爱立信电话股份有限公司 | Systems and methods for partial matching searches of encrypted retained data |
CN104106075A (en) * | 2011-11-24 | 2014-10-15 | 商业合伙有限公司 | Secure database searching |
Also Published As
Publication number | Publication date |
---|---|
CN105138585A (en) | 2015-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105138585B (en) | Data base encryption field portions matching inquiry method and system | |
CN112800088B (en) | Database ciphertext retrieval system and method based on bidirectional security index | |
CN106815350B (en) | Dynamic ciphertext multi-keyword fuzzy search method in cloud environment | |
US10554385B2 (en) | Method for providing encrypted data in a database and method for searching on encrypted data | |
CN105681280B (en) | Encryption method can search for based on Chinese in a kind of cloud environment | |
CN103107889B (en) | A kind of cloud computing environment data encryption storage system and method that can search for | |
CN105610793B (en) | A kind of outsourcing data encryption storage and cryptogram search system and its application process | |
US9021259B2 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
US10984052B2 (en) | System and method for multiple-character wildcard search over encrypted data | |
CN108334612A (en) | A kind of nearly Chinese character full text fuzzy retrieval method of shape for ciphertext domain | |
CN101504668B (en) | Cryptograph index supported database transparent encryption method | |
CN110457915B (en) | Efficient searchable symmetric encryption method and system with forward and backward security | |
CN112800445B (en) | Boolean query method for forward and backward security and verifiability of ciphertext data | |
CN110166466B (en) | Multi-user searchable encryption method and system capable of efficiently updating permissions | |
US20150270958A1 (en) | Decryptable index generation method for range search, search method, and decryption method | |
Singh et al. | Database security using encryption | |
CN108416037B (en) | Central keyword ciphertext searching method based on two-stage index in cloud environment | |
CN114417073B (en) | Neighbor node query method and device of encryption graph and electronic equipment | |
CN113434739B (en) | Forward-safe multi-user dynamic symmetric encryption retrieval method in cloud environment | |
CN104794243B (en) | Third party's cipher text retrieval method based on filename | |
CN110765469A (en) | Efficient and robust dynamic searchable symmetric encryption method and system | |
CN110011959A (en) | Date storage method, data query method and system | |
CN106874379B (en) | Ciphertext cloud storage-oriented multi-dimensional interval retrieval method and system | |
CN112187449B (en) | Quantum database query method, encryption and decryption method and system | |
JP6493402B2 (en) | Addition device, deletion device, addition request device, data search system, data search method, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |