CN105279440A - Photo file encryption method - Google Patents

Photo file encryption method Download PDF

Info

Publication number
CN105279440A
CN105279440A CN201510395915.1A CN201510395915A CN105279440A CN 105279440 A CN105279440 A CN 105279440A CN 201510395915 A CN201510395915 A CN 201510395915A CN 105279440 A CN105279440 A CN 105279440A
Authority
CN
China
Prior art keywords
binary data
data stream
binary
length
stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510395915.1A
Other languages
Chinese (zh)
Inventor
陈源
王会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Meibeike Technology Co Ltd
Original Assignee
Shenzhen Meibeike Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Meibeike Technology Co Ltd filed Critical Shenzhen Meibeike Technology Co Ltd
Priority to CN201510395915.1A priority Critical patent/CN105279440A/en
Publication of CN105279440A publication Critical patent/CN105279440A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention belongs to the technical field of data information processing, and particularly discloses a photo file encryption method. The method comprises an encryption step and a decryption step. The encryption step comprises: dynamically creating a new storage space buf for original photo file data, reading file data of a photo as a binary byte stream btyes through a system platform interface, and storing the file data in the storage space buf; splitting binary byte stream data and performing marking to generate binary data streams; performing combination splitting on the binary data streams to form total binary data streams of a photo file; and storing the total binary data streams of the photo file. The decryption step comprises: identifying each binary data stream in the total binary data streams; combining the binary data streams; and restoring the binary data streams of the photo file. Therefore, the method not only achieves the purpose of encrypting the photo file but also is simpler in operation principle and more convenient to use.

Description

Photo files encryption method
Technical field
The invention belongs to processing data information technical field, be specifically related to a kind of photo files encryption method.
Background technology
Current auto heterodyne become a kind of everybody go out the entertainment way such as to play, have a dinner party, and with camera function smart machine or there is storage picture function smart machine in can store everybody important private photos or some higher confidentiality minutes photos and the important photo about business information.And these smart machines are once lose or stolen photo files by intentionally personage with transmission modes such as bluetooths, photo files outflowed and is in unsafe condition, once be utilized will bring great difficulty to user by immoral person.Therefore, prior art proposes some methods be encrypted about comparison film file, although can ensure crypticity or the confidentiality of photo or picture file, their cipher mode is comparatively complicated, and uses also not very convenient.
Summary of the invention
For the deficiency that above-mentioned prior art exists, the object of this invention is to provide a kind of photo files encryption method simple to operate, easy to use.
Given this, the invention provides a kind of photo files encryption method, this encryption method comprises encrypting step S1 and decryption step S2, it is characterized in that, wherein said encrypting step S1 comprises:
S11, photo original Data Dynamic created one section of new storage space buf and be stored in storage space buf after binary word throttling btyes by a photo files digital independent by system platform interface;
S12, scale-of-two bytes of stream data split and identifies and generate binary data stream;
S13, binary data stream carried out total binary data stream that Combinatorial resolution forms photo files
Total binary data stream of S14, storage picture file;
Described decryption step S2 comprises:
S21, identify every section of binary data stream in total binary data stream;
S22, combination binary data stream;
The binary data stream of S23, reduction photo files.
As preferably, the concrete steps of described step S12 are:
S121, scale-of-two bytes of stream data is divided into some not equal portions at random, and is stored in a memory array queue successively;
S122, calculate the length of every section of binary word throttling, wherein with the length mark length record accounting for eight characters;
S123, the binary word throttling of fractionation put on successively the sequence number SerialNum that accounts for two characters and from binary one.
As preferred further, the concrete steps of described step S13 are:
S131, the sequence number mark of scale-of-two bytes of stream data split every section, length and this section of scale-of-two bytes of stream data are carried out integrating and are generated new binary data stream, and concrete Integrated Models is: newly binary data stream=sequence number identifies SerialNum+ length lenght+ binary word throttling btyes;
S132, new binary data flowed through the new binary data stream of randomly ordered composition one section and forms total binary data stream by multiple new binary data stream; Its component model is: the binary data stream of the binary data stream of total binary stream data=new+new+...
As preferably, the concrete steps of described step S21 are as follows:
S211, read the first two byte length of whole section of binary data data and sequence number ident value is SerialNum;
S212, by read deposit data in shaping array queue Serial [];
S213, continue to read the data of eight character lengths backward on the basis of step S211 and the length of this section of binary word throttling is length;
S214, continue to read the binary data stream that length is length backward on the basis of S212;
S215, being stored in by binary data stream in memory array queue buf [] and reading first paragraph binary data stream, wherein this binary data stream does not comprise sequence number mark SerialNum and length length;
S216, each total binary data stream all remove the binary data stream read, and repeat step S211 to step S215, until this section of binary data runs through.
As preferred further, the concrete steps of described step S22 are as follows:
S221, from shaping array queue Serial [] with binary chop search sequence number mark, wherein searching sequence number initial marking is 1;
S222, write down the sequence number at every turn found and be identified at index subscript index in Serial [];
S223, search target binary data stream manipulative indexing according to index from memory array queue buf [], and assignment gives the new storage space buf dynamically opened up;
S224, repeat above-mentioned steps S221 to S223, and by the binary data stream that at every turn finds all increment assignment to storage space buf.
As preferred further, described in described step S121, scale-of-two bytes of stream data is divided into some not equal portions at random, be wherein divided into decile is greater than 100 and is less than 500.
As preferably, described system platform interface is Andriod, IOS or Widows system platform APT interface.
The present invention compared with prior art has following beneficial effect: technical solution of the present invention is by splitting photo files data, and every segment data is identified, randomly ordered to the segment data of the photo split again, finally be combined into new picture data, thus not only reach the object of encryption photo files, but also make principle of operation simpler, use more convenient.
Accompanying drawing explanation
Fig. 1 is the basic flow sheet of method described in the embodiment of the present invention.
Fig. 2 is the particular flow sheet of step S12 described in Fig. 1.
Fig. 3 is the particular flow sheet of step S13 described in Fig. 1.
Fig. 4 is the particular flow sheet of step S21 described in Fig. 1.
Fig. 5 is the particular flow sheet of step S22 described in Fig. 1.
Embodiment
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail.
As shown in Figure 1, embodiments provide a kind of photo files encryption method, this encryption method comprises encrypting step S1 and decryption step S2.
Wherein said encrypting step S1 comprises:
S11, photo original Data Dynamic created one section of new storage space buf and be stored in storage space buf after binary word throttling btyes by a photo files digital independent by system platform interface;
S12, to split and identify generate binary data stream to scale-of-two bytes of stream data, wherein as shown in Figure 2, the concrete steps of described step S12 are:
S121, scale-of-two bytes of stream data is divided into some not equal portions at random, and is stored in a memory array queue successively;
S122, calculate the length of every section of binary word throttling, wherein with the length mark length record accounting for eight characters;
S123, the binary word throttling of fractionation put on successively the sequence number SerialNum that accounts for two characters and from binary one.
S13, binary data stream carried out total binary data stream that Combinatorial resolution forms photo files, wherein as shown in Figure 3, the concrete steps of described step S13 are:
S131, the sequence number mark of scale-of-two bytes of stream data split every section, length and this section of scale-of-two bytes of stream data are carried out integrating and are generated new binary data stream, and concrete Integrated Models is: newly binary data stream=sequence number identifies SerialNum+ length lenght+ binary word throttling btyes;
S132, new binary data flowed through the new binary data stream of randomly ordered composition one section and forms total binary data stream by multiple new binary data stream; Its component model is: the binary data stream of the binary data stream of total binary stream data=new+new+...
Total binary data stream of S14, storage picture file.
Described decryption step S2 comprises:
S21, identify every section of binary data stream in total binary data stream, wherein as shown in Figure 4, the concrete steps of described step S21 are as follows:
S211, read the first two byte length of whole section of binary data data and sequence number ident value is SerialNum;
S212, by read deposit data in shaping array queue Serial [];
S213, continue to read the data of eight character lengths backward on the basis of step S211 and the length of this section of binary word throttling is length;
S214, continue to read the binary data stream that length is length backward on the basis of S212;
S215, being stored in by binary data stream in memory array queue buf [] and reading first paragraph binary data stream, wherein this binary data stream does not comprise sequence number mark SerialNum and length length;
S216, each total binary data stream all remove the binary data stream read, and repeat step S211 to step S215, until this section of binary data runs through.
S22, combination binary data stream, wherein as shown in Figure 5, the concrete steps of described step S22 are as follows:
S221, from shaping array queue Serial [] with binary chop search sequence number mark, wherein searching sequence number initial marking is 1;
S222, write down the sequence number at every turn found and be identified at index subscript index in Serial [];
S223, search target binary data stream manipulative indexing according to index from memory array queue buf [], and assignment gives the new storage space buf dynamically opened up;
S224, repeat above-mentioned steps S221 to S223, and by the binary data stream that at every turn finds all increment assignment to storage space buf.
The binary data stream of S23, reduction photo files.
In embodiments of the present invention, described in described step S121, scale-of-two bytes of stream data is divided into some not equal portions at random, be wherein divided into decile is greater than 100 and is less than 500.
In embodiments of the present invention, described system platform interface is Andriod, IOS or Widows system platform APT interface.
The present invention by splitting photo files data, and identifies every segment data, more randomly ordered to the segment data of the photo split, and is finally combined into new picture data, reaches the object of encryption photo files.In order to better understand and describe the embodiment of the present invention, be described as follows:
Encrypting step:
1, photo original data are read
1) one section of new storage space buf is dynamically opened up; 2) use system platform api interface that photo files data are read binary word throttling bytes, and byte stream is stored in storage space buf;
2, split, and identification byte flow data
1) scale-of-two bytes of stream data in buf is divided into some not equal portions (be greater than 100 and be less than 500) at random, and is stored in a memory array queue successively; 2) calculate the length of every section of binary word throttling, record (length is long long type, accounts for 8 bytes) with length mark length; 3) sequence number SerialNum(sequence number being put in the binary word throttling of fractionation is successively shaping short type, accounts for 2 bytes), from 1.
3, the bytes of stream data after Combinatorial resolution
1) the sequence number mark of the bytes of stream data split every section, length and this section of scale-of-two bytes of stream data are integrated, and sequence number are identified before intubating length, length are inserted into the foremost of this section of binary word throttling; Model is as follows:
New binary data stream=sequence number mark (SerialNum)+length (lenght)+binary word throttling (btyes);
2) by all 1) the new binary data stream that generates, by randomly ordered, form one section of new binary data stream; Model is as follows:
Total binary stream data=new binary data stream (mark? )+new binary data stream (mark? )+
4, total binary data stream is stored, the picture data stream namely after encryption.
Decryption step:
1, every section of scale-of-two is identified
1) data (short type) of the first two byte length of whole section of binary data are read, i.e. sequence number ident value SerialNum; 2) by read deposit data in shaping array queue Serial []; 3) 1) basis on continue the data (long type) reading 8 byte lengths backward, i.e. the length length of this section of binary word throttling; 4) 2) basis on continue the binary data of spending length length backward; 5) binary data stream is stored in memory array queue buf [] and (does not comprise sequence number mark SerialNum and length length), by step 1)-5) after, first paragraph data stream reads.6) each total binary data stream all removes the data stream read, and repeats step 1-5, until this section of binary data runs through.
2, binary data stream is combined
1) from shaping array queue Serial [], sequence number mark is searched with binary chop, from searching sequence number mark 1; 2) found, write down the index subscript index of this sequence identifier in Serial []; 3) search target binary data stream manipulative indexing according to index from memory array queue buf [], and assignment gives the new storage space buf dynamically opened up; 4) repeat step 1) – 2), the binary data at every turn found all increment assignment to storage space buf.
3, a buf just photo files binary data reduced.
Above content is only preferred embodiment of the present invention, and for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, this description should not be construed as limitation of the present invention.

Claims (7)

1. a photo files encryption method, this encryption method comprises encrypting step S1 and decryption step S2, it is characterized in that, wherein said encrypting step S1 comprises:
S11, photo original Data Dynamic created one section of new storage space buf and be stored in storage space buf after binary word throttling btyes by a photo files digital independent by system platform interface;
S12, scale-of-two bytes of stream data split and identifies and generate binary data stream;
S13, binary data stream carried out total binary data stream that Combinatorial resolution forms photo files;
Total binary data stream of S14, storage picture file;
Described decryption step S2 comprises:
S21, identify every section of binary data stream in total binary data stream;
S22, combination binary data stream;
The binary data stream of S23, reduction photo files.
2. photo files encryption method according to claim 1, is characterized in that, the concrete steps of described step S12 are:
S121, scale-of-two bytes of stream data is divided into some not equal portions at random, and is stored in a memory array queue successively;
S122, calculate the length of every section of binary word throttling, wherein with the length mark length record accounting for eight characters;
S123, the binary word throttling of fractionation put on successively the sequence number SerialNum that accounts for two characters and from binary one.
3. photo files encryption method according to claim 2, is characterized in that, the concrete steps of described step S13 are:
S131, the sequence number mark of scale-of-two bytes of stream data split every section, length and this section of scale-of-two bytes of stream data are carried out integrating and are generated new binary data stream, and concrete Integrated Models is: newly binary data stream=sequence number identifies SerialNum+ length lenght+ binary word throttling btyes;
S132, new binary data flowed through the new binary data stream of randomly ordered composition one section and forms total binary data stream by multiple new binary data stream; Its component model is: the binary data stream of the binary data stream of total binary stream data=new+new+...
4. the photo files encryption method according to claim 1 or 2 or 2, it is characterized in that, the concrete steps of described step S21 are as follows:
S211, read the first two byte length of whole section of binary data data and sequence number ident value is SerialNum;
S212, by read deposit data in shaping array queue Serial [];
S213, continue to read the data of eight character lengths backward on the basis of step S211 and the length of this section of binary word throttling is length;
S214, continue to read the binary data stream that length is length backward on the basis of step S212;
S215, being stored in by binary data stream in memory array queue buf [] and reading first paragraph binary data stream, wherein this binary data stream does not comprise sequence number mark SerialNum and length length;
S216, each total binary data stream all remove the binary data stream read, and repeat step S211 to step S215, until this section of binary data runs through.
5. photo files encryption method according to claim 4, is characterized in that, the concrete steps of described step S22 are as follows:
S221, from shaping array queue Serial [] with binary chop search sequence number mark, wherein searching sequence number initial marking is 1;
S222, write down the sequence number at every turn found and be identified at index subscript index in Serial [];
S223, search target binary data stream manipulative indexing according to index from memory array queue buf [], and assignment gives the new storage space buf dynamically opened up;
S224, repeat above-mentioned steps S221 to S223, and by the binary data stream that at every turn finds all increment assignment to storage space buf.
6. photo files encryption method according to claim 2, is characterized in that, described in described step S121, scale-of-two bytes of stream data is divided into some not equal portions at random, be wherein divided into decile is greater than 100 and is less than 500.
7. photo files encryption method according to claim 1, is characterized in that, described system platform interface is Andriod, IOS or Widows system platform APT interface.
CN201510395915.1A 2015-07-06 2015-07-06 Photo file encryption method Pending CN105279440A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510395915.1A CN105279440A (en) 2015-07-06 2015-07-06 Photo file encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510395915.1A CN105279440A (en) 2015-07-06 2015-07-06 Photo file encryption method

Publications (1)

Publication Number Publication Date
CN105279440A true CN105279440A (en) 2016-01-27

Family

ID=55148434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510395915.1A Pending CN105279440A (en) 2015-07-06 2015-07-06 Photo file encryption method

Country Status (1)

Country Link
CN (1) CN105279440A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956492A (en) * 2016-06-23 2016-09-21 浪潮(北京)电子信息产业有限公司 File storage encryption method and apparatus
CN106650469A (en) * 2016-10-12 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Photo processing method and terminal device
CN107153794A (en) * 2016-03-03 2017-09-12 腾讯科技(深圳)有限公司 File encrypting method and device, file decryption method and apparatus
CN107577429A (en) * 2017-08-31 2018-01-12 郑州云海信息技术有限公司 A kind of data storage and restoration methods and device
CN107766491A (en) * 2017-10-18 2018-03-06 浪潮金融信息技术有限公司 File memory method and device, computer-readable recording medium, terminal
CN108875408A (en) * 2018-06-22 2018-11-23 南京擎天科技有限公司 A kind of file of Android platform quickly encrypts and decryption method
CN109525747A (en) * 2017-09-20 2019-03-26 阿里巴巴集团控股有限公司 Picture upload method, encipher-decipher method, device, system and electronic equipment
CN109688289A (en) * 2018-12-25 2019-04-26 秒针信息技术有限公司 A kind of transmission of image encryption, image decryption method and device
CN110188554A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and functional transformation
CN113452743A (en) * 2021-03-05 2021-09-28 浙江华云信息科技有限公司 MQTT protocol and COAP protocol fusion algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633086A (en) * 2005-01-26 2005-06-29 北京大学 Online backup method based on data block redundancy and virtualized storage
CN101639828A (en) * 2009-09-11 2010-02-03 北京交通大学 Method for hiding and extracting watermark based on XML electronic document
CN103346998A (en) * 2013-05-18 2013-10-09 北京凯锐立德科技有限公司 File breaking encryption-based file security protection method
US20140143540A1 (en) * 2012-11-20 2014-05-22 Cloudioh Inc. Method and Apparatus for Splitting and Encrypting Files in Computer Device
CN103986763A (en) * 2014-05-13 2014-08-13 中国科学院地理科学与资源研究所 Vector data stream transmission method and system oriented to Web visualization
CN104615791A (en) * 2015-03-09 2015-05-13 浪潮集团有限公司 Three-dimensional code generating and parsing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633086A (en) * 2005-01-26 2005-06-29 北京大学 Online backup method based on data block redundancy and virtualized storage
CN101639828A (en) * 2009-09-11 2010-02-03 北京交通大学 Method for hiding and extracting watermark based on XML electronic document
US20140143540A1 (en) * 2012-11-20 2014-05-22 Cloudioh Inc. Method and Apparatus for Splitting and Encrypting Files in Computer Device
CN103346998A (en) * 2013-05-18 2013-10-09 北京凯锐立德科技有限公司 File breaking encryption-based file security protection method
CN103986763A (en) * 2014-05-13 2014-08-13 中国科学院地理科学与资源研究所 Vector data stream transmission method and system oriented to Web visualization
CN104615791A (en) * 2015-03-09 2015-05-13 浪潮集团有限公司 Three-dimensional code generating and parsing method and device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107153794B (en) * 2016-03-03 2020-07-21 腾讯科技(深圳)有限公司 File encryption method and device and file decryption method and device
CN107153794A (en) * 2016-03-03 2017-09-12 腾讯科技(深圳)有限公司 File encrypting method and device, file decryption method and apparatus
US11238165B2 (en) 2016-03-03 2022-02-01 Tencent Technology (Shenzhen) Company Limited File encryption method, file decryption method, electronic device, and storage medium
CN105956492A (en) * 2016-06-23 2016-09-21 浪潮(北京)电子信息产业有限公司 File storage encryption method and apparatus
CN105956492B (en) * 2016-06-23 2019-01-25 浪潮(北京)电子信息产业有限公司 A kind of file storage encryption method and device
CN106650469A (en) * 2016-10-12 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Photo processing method and terminal device
CN106650469B (en) * 2016-10-12 2021-05-18 宇龙计算机通信科技(深圳)有限公司 Photo processing method and terminal equipment
CN107577429A (en) * 2017-08-31 2018-01-12 郑州云海信息技术有限公司 A kind of data storage and restoration methods and device
CN109525747A (en) * 2017-09-20 2019-03-26 阿里巴巴集团控股有限公司 Picture upload method, encipher-decipher method, device, system and electronic equipment
CN107766491A (en) * 2017-10-18 2018-03-06 浪潮金融信息技术有限公司 File memory method and device, computer-readable recording medium, terminal
CN108875408A (en) * 2018-06-22 2018-11-23 南京擎天科技有限公司 A kind of file of Android platform quickly encrypts and decryption method
CN109688289A (en) * 2018-12-25 2019-04-26 秒针信息技术有限公司 A kind of transmission of image encryption, image decryption method and device
CN110188554A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and functional transformation
CN113452743A (en) * 2021-03-05 2021-09-28 浙江华云信息科技有限公司 MQTT protocol and COAP protocol fusion algorithm

Similar Documents

Publication Publication Date Title
CN105279440A (en) Photo file encryption method
Joshi et al. A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image
CN109597822B (en) User data storage and query method and user data processing device
CN109522328B (en) Data processing method and device, medium and terminal thereof
CN109032803B (en) Data processing method and device and client
CN103167172A (en) Integration method and system for variety of chat records
CN105224257A (en) The disposal route of large files and system in a kind of cloud storage system
CN108255915B (en) File management method and device and machine-readable storage medium
CN103577516A (en) Method and device for displaying contents
CN103049491A (en) Method and device for managing picture file
CN110263505B (en) Picture processing method and device based on block chain
CN102576373A (en) Content management device, method of content management, content management program and integrated circuit
CN103460707A (en) Multimedia content editing server, multimedia content editing method, program, and integrated circuit
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
CN104811458A (en) Method and device for displaying information
CN109145053B (en) Data processing method and device, client and server
CN105279198A (en) Data table storage method, data table modification method, data table query method and data table statistical method
CN108009049A (en) The offline restoration methods of MYISAM storage engines deletion records, storage medium
CN118296575A (en) Database watermark embedding method, device, equipment and medium
CN101576919A (en) Mark generating method and device
CN111898157B (en) Unintentional storage access method for machine learning multisource training set
CN104021178A (en) Multimedia information filtering method and device
CN107291712B (en) Data generation method and device
CN109446827A (en) Data encryption/decryption method and system
CN114153838A (en) Encryption storage and query method for member information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160127