CN106485155A - A kind of encryption method annotated based on field and equipment - Google Patents
A kind of encryption method annotated based on field and equipment Download PDFInfo
- Publication number
- CN106485155A CN106485155A CN201510524699.6A CN201510524699A CN106485155A CN 106485155 A CN106485155 A CN 106485155A CN 201510524699 A CN201510524699 A CN 201510524699A CN 106485155 A CN106485155 A CN 106485155A
- Authority
- CN
- China
- Prior art keywords
- field
- content
- server
- corresponding content
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of encryption method annotated based on field, methods described includes:The corresponding annotation information of arbitrary field for building table statement of the raw data table of user in server acquisition database;Whether the server judges the corresponding content of the field comprising sensitive information according to the annotation information;After judging the corresponding content of the field comprising sensitive information, the server generates encryption and indicates;The server is indicated to be encrypted the corresponding content of the field according to the encryption, the application need not require the normalization of field name and the regularity of field corresponding content it may determine that going out the corresponding content of the field with the presence or absence of sensitive information, alleviate the work load of the person that builds table, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of encryption method annotated based on field
And equipment.
Background technology
Under big data background, Ge great Internet firm all knows mass data, these data often by with
To analyze user preference, distribution etc., the operation to product and popularization play the role of and its important.But
Exchange in data, shared during, the privacy-sensitive information of user can be let out, therefore use
The sensitive traffic data of the privacy-sensitive information at family and company need the protection for improving badly.Difference to be removed
Privacy-sensitive information in data, it is important to privacy-sensitive information to be determined and its privacy-sensitive information
Type, to take corresponding data ciphering method.
The method that commonly uses in the prior art has two kinds, and a kind of is to recognize word according to the field name of tables of data
Recognizing privacy-sensitive information, such as " id " refers generally to major key to section content, and " age " refers generally to the age.
Another kind is some data of sampling, recognizes privacy-sensitive information according to the form of content.
During the application is realized, it is found by the applicant that at least there is problems with prior art:
First kind of way excessively depends on the specification that user field is named, and field name needs to give expression to which
The relevant information of content, and the title of field is typically only data, letter and underscore, this undoubtedly increases
Add and built table person must bear;Another way excessively depends on the regularity of content, and this mode can be known
Do not go out the data with universal law such as mailbox, telephone number, identification card number, if generally not advising
The data of rule, this mode are just helpless, and such as turnover field, its content can be
Arbitrary floating number, is difficult to out with the presence or absence of privacy-sensitive information according only to content.
Content of the invention
The purpose of the application is to provide a kind of encryption method annotated based on field and equipment, by obtaining
In database, the corresponding annotation information of arbitrary field for building table statement of the raw data table of user, judges
Whether sensitive information is included, and then the corresponding content of the field is carried out in the corresponding content of the field
Encryption, the application need not require that the normalization of field name and the regularity of field corresponding content can just be sentenced
Break and the corresponding content of the field with the presence or absence of sensitive information, the work load of the person that builds table is alleviated, also
Field corresponding content can be recognized accurately with the presence or absence of sensitive information.
The technical scheme of the application is as follows:
A kind of encryption method annotated based on field, methods described are included:
The corresponding note of arbitrary field for building table statement of the raw data table of user in server acquisition database
Release information;
Whether the server judges the corresponding content of the field comprising sensitive letter according to the annotation information
Breath;
After judging the corresponding content of the field comprising sensitive information, the server generates encryption and refers to
Show;
The server is indicated to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The server is indicated to be encrypted the corresponding content of the field according to the encryption, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information
Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus
Close.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters
Method.
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered
After row encryption, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement
The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described
Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
A kind of server, the server include:
Acquisition module, the arbitrary field for building table statement for obtaining raw data table in database are corresponding
Annotation information;
Whether judge module, for judging the corresponding content of the field comprising quick according to the annotation information
Sense information;
Indicating module, for judging the corresponding content of the field comprising sensitive letter in the judge module
Generate encryption to indicate after breath;
Encrypting module, for indicating to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The encrypting module specifically for:
Indicate to determine according to the encryption and the corresponding content of the field is encrypted;
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters
Method.
The acquisition module is additionally operable to:
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered
After row encryption, other for obtaining raw data table in database build the corresponding annotation information of field of table statement,
So that the server judges whether to institute according to other corresponding annotation information of field for building table statement described
State the corresponding content of field that other build table statement to be encrypted.
The application is corresponded to by the arbitrary field for building table statement for obtaining the raw data table of user in database
Annotation information, whether judge in the corresponding content of the field comprising sensitive information, and then to described
The corresponding content of field is encrypted, and the application need not require that the normalization of field name is corresponding with field interior
The regularity of appearance whether there is sensitive information it may determine that going out the corresponding content of the field, alleviates and builds
The work load of table person, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Description of the drawings
In order to be illustrated more clearly that the application or technical scheme of the prior art, below will to the application or
Needed for description of the prior art, accompanying drawing to be used is briefly described, it should be apparent that, in describing below
Accompanying drawing be only some embodiments of the present application, for those of ordinary skill in the art, do not paying
On the premise of going out creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of encryption method flow chart annotated based on field in the embodiment of the present application;
Fig. 2 is a kind of structural representation of the server in the embodiment of the present application.
Specific embodiment
Below in conjunction with the accompanying drawing in the application, the technical scheme in the application is carried out clear, complete
Description, it is clear that described embodiment is a part of embodiment of the application, rather than whole enforcement
Example.Based on the other embodiment that the embodiment in the application, those of ordinary skill in the art are obtained, all belong to
Scope in the application protection.
In order to solve the problems, such as sensitive information leakage, present applicant proposes a kind of encryption annotated based on field
Method is used for solving the problem, as shown in figure 1, the method comprising the steps of:
Step 101, server obtain arbitrary field for building table statement of the raw data table of user in database
Corresponding annotation information.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
Specifically, described building in table statement at least includes:Field, data type, annotation information and content.
The field that builds in table statement is that data type is used for retouching for distinguishing different table statement of building
The type of field corresponding content is stated, is not only in the annotation information concrete to the corresponding field for building table statement
Description, the type of the field corresponding content, the annotation can also be obtained according to the annotation information
The detailed description of the corresponding all the elements information of field is contained in information.
To build table statement " user_id (Identity, identity number) BIGINT COMMENT'
As a example by member numeral ID' " and " reg_phone STRING COMMENT' landline telephone ' ", user_id
It is all the field of building table statement with reg_phone, corresponding table statement can be built to which according to the two fields
Make a distinction, by taking the corresponding data type of user_id and annotation information as an example, BIGINT represents field pair
The data type of content is answered, COMMENT' member's numeral ID' is annotation information, in the annotation information
Member numeral ID represent the purposes of the field be for describing member ID, and also can basis
The annotation information obtains which kind of data type is the corresponding content of the field be, such as:Digital ID represents institute
The data type for stating the corresponding content of field is numeral, therefore, it can according to the above-mentioned note that builds in table statement
The information of releasing is determined with the presence or absence of sensitive information in the corresponding content of field, due to the above-mentioned word that builds in table statement
Section belongs to the name of specification, can determine and whether there is in the corresponding content of the field from the field
Sensitive information, when table statement is built for " u_id BIGINT COMMENT' member numeral ID' ", u_id
For the field for building table statement, although can be made a distinction to building table statement according to the field, but from
What the purposes that the field cannot be obtained in the field is, i.e., cannot show which kind of the field corresponds to
Content, also cannot just judge with the presence or absence of sensitive information in the corresponding content of the field, and from the word
Section corresponding annotation information " member numeral ID " can determine that the purposes of the field be to member ID
Description, i.e., the corresponding content of described field is member ID, and can also be obtained according to the annotation information
The data type of the corresponding content of the field is numeral, i.e., the corresponding content of described field is the one of member
Group ID numeral.
According to the annotation information, step 102, the server judge whether the corresponding content of the field wraps
Containing sensitive information, after judging the corresponding content of the field comprising sensitive information, then execution step 103;
After judging the corresponding content of the field not comprising sensitive information, then terminate this ciphering process.
Specifically, the corresponding word of the annotation information can be obtained according to the corresponding annotation information of the field
The purposes of section, i.e., can obtain, according to the annotation information, the description that the field is to which kind of information of user,
So that ID is as sensitive information as an example, corresponding table statement of building is for " user_id BIGINT COMMENT
' member numeral ID' ", the annotation information in the sentence is:Member numeral ID, the annotation information are described
The purposes of corresponding field, i.e. user_id are description IDs, and the field that builds in table statement is corresponded to
Content be ID, therefore, whether the server includes in the corresponding content of field is judged
During the sensitive information of user, the corresponding annotation information of the field can be obtained, be corresponded to according to the field
Annotation information can determine the corresponding content of the field with the presence or absence of sensitive information.
The sensitive information can include:The contact method of user, mailbox, birthday, address, identity card
Etc. information.
Step 103, the server generate encryption and indicate.
Step 104, the server according to described encryption indicate the corresponding content of the field is carried out plus
Close.
The server is indicated to be encrypted the corresponding content of the field according to the encryption, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information
Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus
Close.
Specifically, if there is sensitive information, i.e., indicate to determine according to the encryption and the field is corresponded to
Content be encrypted after, as the corresponding AES of different types of content is distinct, for example:
To numeral and word when being encrypted corresponding AES be different, therefore, institute is also predefined
The data type of sensitive information is stated, to determine corresponding AES, due to permissible according to annotation information
The corresponding type of content is obtained, therefore, also continues to be identified determining content according to the annotation information
Corresponding data type, after the type for determining the corresponding content of the field, is also predefined the class
The corresponding AES of type is being encrypted to the corresponding content of the field.
The full content of sensitive information can be carried out when the sensitive information to user is encrypted protection plus
Close, but the partial content of sensitive information can also be encrypted, and both approaches can act as protecting
The purpose of shield user's privacy-sensitive.
Wherein, the AES is that corresponding for the field part or all of content is replaced with predetermined word
The algorithm of symbol, so that sensitive information is telephone number as an example, the telephone number for replacing with preset characters can be
159********, or 1593228****, or 159****3211 etc..
When being encrypted to sensitive information, the part or all of content in sensitive information can be replaced with
Preset characters, part or all of content that will be in sensitive information replace with other guide, make the sensitivity
Information is an information different from former sensitive information when showing, or the information of artificial None- identified,
The purpose of the application be in order to former sensitive information to be substituted for the letter of an other information or user's None- identified
Breath, therefore all technical schemes that can reach above-mentioned purpose belong to the protection domain of the application.
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered
After row encryption, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement
The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described
Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
After judging the corresponding content of one field of user with the presence or absence of sensitive information, in addition it is also necessary to judge institute
The corresponding content of other fields of user is stated with the presence or absence of sensitive information, until the sensitivity letter to the user
Breath is just permissible after being all encrypted.
By the corresponding annotation of the arbitrary field for building table statement for obtaining the raw data table of user in database
Whether information, judge comprising sensitive information in the corresponding content of the field, and then to the field pair
The content that answers is encrypted, and the application need not require the normalization of field name and the rule of field corresponding content
Rule property it may determine that go out the corresponding content of the field with the presence or absence of sensitive information, alleviate build table person's
Work load, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Conceived based on the application same with said method, the application also proposed a kind of server, such as Fig. 2
Described, the server includes:
Acquisition module 21, the arbitrary field for building table statement for obtaining raw data table in database are corresponded to
Annotation information;
According to the annotation information, judge module 22, for judging whether the corresponding content of the field includes
Sensitive information;
Indicating module 23, for judging the corresponding content of the field comprising sensitivity in the judge module
Generate encryption to indicate after information;
Encrypting module 24, for indicating to be encrypted the corresponding content of the field according to the encryption.
The annotation information is the explanation of the field purposes for building table statement to correspondence.
The encrypting module specifically for:
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
The AES is the calculation that corresponding for the field part or all of content is replaced with preset characters
Method.
The acquisition module is additionally operable to:
By the corresponding annotation of the arbitrary field for building table statement for obtaining the raw data table of user in database
Whether information, judge comprising sensitive information in the corresponding content of the field, and then to the field pair
The content that answers is encrypted, and the application need not require the normalization of field name and the rule of field corresponding content
Rule property it may determine that go out the corresponding content of the field with the presence or absence of sensitive information, alleviate build table person's
Work load, moreover it is possible to field corresponding content is recognized accurately with the presence or absence of sensitive information.
Number of the application by data group in staqtistical data base and the attribute to the data group are carried out
The first ratio that the sequence number produced by sequence is generated is determined in sequence with the number, is set in basis in advance
Carrying out branch mailbox to data, the application can be in the case of without branch mailbox software, no for fixed depth threshold
With the data derived in database, it is possible to directly the data in database are directly carried out with branch mailbox, improve
The efficiency of branch mailbox, it is ensured that the correctness of branch mailbox result.
Through the above description of the embodiments, those skilled in the art can be understood that this Shen
Please add the mode of required general hardware platform by software to realize, naturally it is also possible to by hardware,
But the former is more preferably embodiment in many cases.Based on such understanding, the technical scheme of the application
The part for substantially in other words prior art being contributed can be embodied in the form of software product,
The computer software product is stored in a storage medium, is used so that a station terminal including some instructions
It is each that equipment (can be mobile phone, personal computer, server, or network equipment etc.) executes the application
Method described in individual embodiment.
The above is only the preferred embodiment of the application, it is noted that for the general of the art
For logical technical staff, on the premise of without departing from the application principle, some improvement and profit can also be made
Decorations, these improvements and modifications should also regard the protection domain of the application.
It will be appreciated by those skilled in the art that the module in device in embodiment can be described according to embodiment
Carry out being distributed in the device of embodiment, it is also possible to carry out that respective change is disposed other than the present embodiment one
In individual or multiple devices.The module of above-described embodiment can be integrated in one, it is also possible to be deployed separately;Can
To merge into a module, it is also possible to be further split into multiple submodule.Above-mentioned the embodiment of the present application sequence
Number for illustration only, do not represent the quality of embodiment.
The several specific embodiments for being only the application disclosed above, but, the application is not limited to this,
The changes that any person skilled in the art can think of should all fall into the protection domain of the application.
Claims (10)
1. a kind of based on field annotate encryption method, it is characterised in that methods described includes:
The corresponding note of arbitrary field for building table statement of the raw data table of user in server acquisition database
Release information;
Whether the server judges the corresponding content of the field comprising sensitive letter according to the annotation information
Breath;
After judging the corresponding content of the field comprising sensitive information, the server generates encryption and refers to
Show;
The server is indicated to be encrypted the corresponding content of the field according to the encryption.
2. method as claimed in claim 1, it is characterised in that the annotation information is to build predicative to correspondence
The explanation of the field purposes of sentence.
3. method as claimed in claim 1, it is characterised in that the server is indicated according to the encryption
The corresponding content of the field is encrypted, specially:
The server indicates to determine according to the encryption and the corresponding content of the field is encrypted;
The server is identified determining the content of the annotation information corresponding field to the annotation information
Type;
The server determines the corresponding AES of the content according to the type of the content;
The server carried out according to the AES part or all of content corresponding to the field plus
Close.
4. method as claimed in claim 3, it is characterised in that the AES be by the field pair
The part or all of content that answers replaces with the algorithm of preset characters.
5. method as claimed in claim 1, it is characterised in that if the corresponding content of the field is not wrapped
Containing sensitive information, or after being encrypted to the corresponding content of the field, methods described also includes:
The server obtains the field pair that other of user's raw data table described in database build table statement
The annotation information that answers, so that the server is believed according to other corresponding annotations of field for building table statement described
Breath judges whether to be encrypted other corresponding contents of field for building table statement described.
6. a kind of server, it is characterised in that the server includes:
Acquisition module, the arbitrary field for building table statement for obtaining raw data table in database are corresponding
Annotation information;
Whether judge module, for judging the corresponding content of the field comprising quick according to the annotation information
Sense information;
Indicating module, for judging the corresponding content of the field comprising sensitive letter in the judge module
Generate encryption to indicate after breath;
Encrypting module, for indicating to be encrypted the corresponding content of the field according to the encryption.
7. server as claimed in claim 6, it is characterised in that the annotation information is to build table to correspondence
The explanation of the field purposes of sentence.
8. server as claimed in claim 6, it is characterised in that the encrypting module specifically for:
Indicate to determine according to the encryption and the corresponding content of the field is encrypted;
The type of the content for the annotation information being identified determine the annotation information corresponding field;
Type according to the content determines the corresponding AES of the content;
It is encrypted according to the AES part or all of content corresponding to the field.
9. server as claimed in claim 8, it is characterised in that the AES be by the field
Corresponding part or all of content replaces with the algorithm of preset characters.
10. server as claimed in claim 6, it is characterised in that the acquisition module is additionally operable to:
If the corresponding content of the field does not include sensitive information, or the corresponding content of the field is entered
After row encryption, other for obtaining raw data table in database build the corresponding annotation information of field of table statement,
So that the server judges whether to institute according to other corresponding annotation information of field for building table statement described
State the corresponding content of field that other build table statement to be encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510524699.6A CN106485155A (en) | 2015-08-24 | 2015-08-24 | A kind of encryption method annotated based on field and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510524699.6A CN106485155A (en) | 2015-08-24 | 2015-08-24 | A kind of encryption method annotated based on field and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106485155A true CN106485155A (en) | 2017-03-08 |
Family
ID=58234456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510524699.6A Pending CN106485155A (en) | 2015-08-24 | 2015-08-24 | A kind of encryption method annotated based on field and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106485155A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537062A (en) * | 2018-04-24 | 2018-09-14 | 山东华软金盾软件股份有限公司 | A kind of method of database data dynamic encryption |
CN108595971A (en) * | 2018-04-25 | 2018-09-28 | 杭州闪捷信息科技股份有限公司 | A kind of database adaptive refinement method |
CN109101837A (en) * | 2018-08-10 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of date storage method and device |
CN109788145A (en) * | 2018-11-15 | 2019-05-21 | 西安天钥科技有限公司 | Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium |
CN110990877A (en) * | 2019-12-13 | 2020-04-10 | 中电健康云科技有限公司 | Medical image file segmentation encryption and decryption system and method based on greenplus |
CN111212033A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Page display method and device based on combined web crawler defense technology and electronic equipment |
CN111382121A (en) * | 2020-03-04 | 2020-07-07 | 深圳乐信软件技术有限公司 | Information management system and storage medium |
WO2021099960A1 (en) * | 2019-11-20 | 2021-05-27 | International Business Machines Corporation | Smart data protection |
CN113127874A (en) * | 2021-05-18 | 2021-07-16 | 中国银行股份有限公司 | Method and device for processing intranet sensitive information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046748A1 (en) * | 2005-07-22 | 2008-02-21 | Yukio Fujimoto | Data Management Apparatus, Data Management Method, Data Processing Method,and Program |
CN101263500A (en) * | 2005-09-12 | 2008-09-10 | 诺基亚公司 | Data access control |
CN104063334A (en) * | 2014-07-11 | 2014-09-24 | 中国人民公安大学 | Encryption method and system based on data attributions |
CN104601325A (en) * | 2013-10-31 | 2015-05-06 | 华为技术有限公司 | Data encryption method, device, equipment and system and data decryption method, device, equipment and system |
-
2015
- 2015-08-24 CN CN201510524699.6A patent/CN106485155A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080046748A1 (en) * | 2005-07-22 | 2008-02-21 | Yukio Fujimoto | Data Management Apparatus, Data Management Method, Data Processing Method,and Program |
CN101263500A (en) * | 2005-09-12 | 2008-09-10 | 诺基亚公司 | Data access control |
CN104601325A (en) * | 2013-10-31 | 2015-05-06 | 华为技术有限公司 | Data encryption method, device, equipment and system and data decryption method, device, equipment and system |
CN104063334A (en) * | 2014-07-11 | 2014-09-24 | 中国人民公安大学 | Encryption method and system based on data attributions |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537062B (en) * | 2018-04-24 | 2022-03-22 | 山东华软金盾软件股份有限公司 | Dynamic encryption method for database data |
CN108537062A (en) * | 2018-04-24 | 2018-09-14 | 山东华软金盾软件股份有限公司 | A kind of method of database data dynamic encryption |
CN108595971A (en) * | 2018-04-25 | 2018-09-28 | 杭州闪捷信息科技股份有限公司 | A kind of database adaptive refinement method |
CN109101837A (en) * | 2018-08-10 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of date storage method and device |
CN109101837B (en) * | 2018-08-10 | 2020-09-15 | 苏州浪潮智能科技有限公司 | Data storage method and device |
CN109788145A (en) * | 2018-11-15 | 2019-05-21 | 西安天钥科技有限公司 | Method of calling, the server that desensitizes, equipment of attending a banquet and computer readable storage medium |
WO2021099960A1 (en) * | 2019-11-20 | 2021-05-27 | International Business Machines Corporation | Smart data protection |
US11520905B2 (en) | 2019-11-20 | 2022-12-06 | Kyndryl, Inc. | Smart data protection |
CN110990877A (en) * | 2019-12-13 | 2020-04-10 | 中电健康云科技有限公司 | Medical image file segmentation encryption and decryption system and method based on greenplus |
CN111212033A (en) * | 2019-12-16 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Page display method and device based on combined web crawler defense technology and electronic equipment |
CN111382121A (en) * | 2020-03-04 | 2020-07-07 | 深圳乐信软件技术有限公司 | Information management system and storage medium |
CN111382121B (en) * | 2020-03-04 | 2023-08-25 | 深圳乐信软件技术有限公司 | Information management system and storage medium |
CN113127874A (en) * | 2021-05-18 | 2021-07-16 | 中国银行股份有限公司 | Method and device for processing intranet sensitive information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106485155A (en) | A kind of encryption method annotated based on field and equipment | |
US8862460B2 (en) | System, method, and program for processing text using object coreference technology | |
US9626622B2 (en) | Training a question/answer system using answer keys based on forum content | |
US20170116474A1 (en) | Enhanced Interpretation of Character Arrangements | |
US8254698B2 (en) | Methods for document-to-template matching for data-leak prevention | |
CN108090351B (en) | Method and apparatus for processing request message | |
CN107665306B (en) | A kind of method, apparatus, client and the server of the injection of detection illegal file | |
CN103383638A (en) | Voice entry of sensitive information | |
US11556812B2 (en) | Method and device for acquiring data model in knowledge graph, and medium | |
CN106559555A (en) | A kind of construction method of address list, device | |
Zinovatna et al. | Reusing knowledge on delivering privacy and transparency together | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
CN107622208A (en) | Note encryption and decryption method and related product | |
CN107644106A (en) | The internuncial method of automatic mining business, terminal device and storage medium | |
US10430454B2 (en) | Systems and methods for culling search results in electronic discovery | |
CN116055067B (en) | Weak password detection method, device, electronic equipment and medium | |
CN109726398B (en) | Entity identification and attribute judgment method, system, equipment and medium | |
CN111027065B (en) | Leucavirus identification method and device, electronic equipment and storage medium | |
CN105354506B (en) | The method and apparatus of hidden file | |
CN111221690A (en) | Model determination method and device for integrated circuit design and terminal | |
CN106559554A (en) | A kind of communication processing method, device | |
Shezan et al. | NL2GDPR: Automatically develop GDPR compliant Android application features from natural language | |
CN110069604A (en) | Text search method, apparatus and computer readable storage medium | |
US11436286B1 (en) | System and method for using deconstructed document sections to generate report data structures | |
CN109543150A (en) | A kind for the treatment of method and apparatus of court's trial notes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170308 |