CN106571909A - Data encryption method and device - Google Patents

Data encryption method and device Download PDF

Info

Publication number
CN106571909A
CN106571909A CN201610931122.1A CN201610931122A CN106571909A CN 106571909 A CN106571909 A CN 106571909A CN 201610931122 A CN201610931122 A CN 201610931122A CN 106571909 A CN106571909 A CN 106571909A
Authority
CN
China
Prior art keywords
data
user data
data set
coding
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610931122.1A
Other languages
Chinese (zh)
Inventor
张韬
刘江林
张弘
谢攀
邓鹏�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
China Unicom System Integration Ltd Corp
Original Assignee
China United Network Communications Group Co Ltd
China Unicom System Integration Ltd Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, China Unicom System Integration Ltd Corp filed Critical China United Network Communications Group Co Ltd
Priority to CN201610931122.1A priority Critical patent/CN106571909A/en
Publication of CN106571909A publication Critical patent/CN106571909A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data encryption method and device. The method includes acquiring the user data; grading the user data according to the business attribute of the user data; classifying the plurality of user data included in each data set according to the value attribute of the user data; and encrypting the plurality of user data included in each data set. The plurality of data sets are obtained by grading the user data, and taking each data set as a unit, the plurality of user data included in each data set is classified to obtain a first class of data and a second class of data, and the plurality of user data included in each data set is encrypted according to the value of the first class of data and the second class of data in each data set. Compared with the prior art, the identifiability and relevance of the user data can be prevented from being destroyed, and meanwhile, the processing efficiency and security of the user data are improved.

Description

Data ciphering method and device
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of data ciphering method and device.
Background technology
With the development of communication technology, user data has become the significant data in communication network.Due to network element and end Between end equipment, or interaction of user data is needed between network element and network element, therefore, in interaction, the safety of user data Property is more important.
In prior art, in order to reduce interaction in, the sensitivity of user data, by substituting, shuffling, block, empty The modes such as value insertion deletion are processed user data, but are substituted, shuffled, blocking, the mode meeting such as null value insertion deletion The recognizability and relatedness of destruction user data.In addition, prior art is also carried out using numerical transformation method to user data Process, but numerical transformation method needs tectonic transition function, and tectonic transition function is more difficult, and using numerical transformation side Information Security after method is processed user data is not high.
The content of the invention
The embodiment of the present invention provides a kind of data ciphering method and device, to improve the safety of user data.
The one side of the embodiment of the present invention is to provide a kind of data ciphering method, including:
Obtain user data;
According to the service attribute of the user data, staged care is carried out to the user data and obtains multiple data sets, Each data set includes multiple user data;
According to the value attribute of the user data, multiple user data that each data set includes are carried out at classification Reason obtains primary sources and secondary sources, and the value number of the primary sources is less than the value of the secondary sources Number;
According to the value of the value of primary sources and the secondary sources described in each data set, to each data The multiple user data concentrated are encrypted.
The other side of the embodiment of the present invention is to provide a kind of data encryption device, including:
Acquisition module, for obtaining user data;
Diversity module, for according to the service attribute of the user data, carrying out staged care to the user data and obtaining Much individual data sets, each data set includes multiple user data;
Sort module, for according to the value attribute of the user data, the multiple users included to each data set Data carry out classification and process to obtain primary sources and secondary sources, and the value number of the primary sources is less than described the The value number of two class data;
Encrypting module, for taking according to the value of primary sources described in each data set and the secondary sources Value, to each data set in multiple user data be encrypted.
Data ciphering method provided in an embodiment of the present invention and device, obtain many by carrying out staged care to user data Multiple user data that each data set includes in units of each data set, are carried out classification and process acquisition by individual data set Primary sources and secondary sources, according to the value of primary sources described in each data set and the secondary sources Value, to each data set in multiple user data be encrypted, compared to prior art, it is to avoid user data Recognizability and relatedness are destroyed, meanwhile, improve the safety of the treatment effeciency to user data and user data.
Description of the drawings
Fig. 1 is data ciphering method flow chart provided in an embodiment of the present invention;
The data ciphering method flow chart that Fig. 2 is provided for another embodiment of the present invention;
Fig. 3 is the structure chart of data encryption device provided in an embodiment of the present invention;
The structure chart of the data encryption device that Fig. 4 is provided for another embodiment of the present invention.
Specific embodiment
Fig. 1 is data ciphering method flow chart provided in an embodiment of the present invention.The embodiment of the present invention is directed in prior art, In in order to reduce interaction, the sensitivity of user data, by substituting, shuffling, block, the mode pair such as null value insertion deletion User data is processed, but is substituted, shuffled, blocking, the mode such as null value insertion deletion can destroy the recognizable of user data Property and relatedness.In addition, prior art is also processed user data using numerical transformation method, but numerical transformation method Tectonic transition function is needed, tectonic transition function is more difficult, and user data is processed using numerical transformation method Information Security afterwards is not high, there is provided data ciphering method, and specific data ciphering method step is as follows:
Step S101, acquisition user data.
The executive agent of the present embodiment can be terminal unit, or the network element in communication network, terminal unit or User data is previously stored with network element, or terminal unit or network element obtain user data from other equipment.User data can To include:User's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn net situation.
Step S102, according to the service attribute of the user data, the user data is carried out staged care obtain it is many Individual data set, each data set includes multiple user data.
According to user's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn the industry of net situation Business attribute, to user's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn net situation and be classified Process obtains multiple data sets, and for example, sex, age, internal rating are used as a data set, voice usage amount, surfing flow As a data set, in net duration, turn net situation as a data set.Specifically, by user's sex, age, Ke Huping Level, voice usage amount, surfing flow, in net duration, turn net situation as 7 two-level index, then 7 two-level index can be converged Always to 3 first class index, such as 3 first class index are respectively user identity feature, consumption, stability, then two-level index Sex, age, internal rating belong to first class index " user identity feature ", and two-level index voice usage amount, surfing flow belong to First class index " consumption ", in net duration, turns net situation and belongs to first class index " stability ".
Step S103, according to the value attribute of the user data, the multiple user data included to each data set Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind The value number of data.
With each first class index as unit, according to the value attribute or span of each two-level index in first class index, Multiple two-level index in first class index carry out classification and process acquisition primary sources and secondary sources, and for example, one-level refers to The value of " sex " has two kinds in mark " user identity feature ", and it is female that one kind is male one kind, i.e., " sex " has two kinds of values." year The value in age " is more than two kinds, can be the data of continuouss, accordingly, it would be desirable to the data of continuouss are carried out into discretization, for example, Using 18-30 year as one grade, 31-50 year as one grade, more than 51 years old used as one grade." internal rating " is divided into Gold Subscriber, silver Board user, domestic consumer, i.e., high, medium and low third gear.It can be seen that, " sex " is the data for judging class, and in this way man is female, " age " and " internal rating " belongs to the data of stepping class.In the present embodiment, class data are will determine that as primary sources, by stepping class data Used as secondary sources, and primary sources and secondary sources are all the divisions under two-level index.
Step S104, according to the value of the value of primary sources and the secondary sources described in each data set, Multiple user data in each data set are encrypted.
With each first class index as unit, for example, first class index " user identity feature " judges class data such as " sex " Value includes man, female, and the present embodiment can represent man, with 0 female is represented with 1, in addition, for other judge the data of class, for example Whether " group customer ", being represented with 1 is, represents no with 0, i.e., encoded with the judgement class data in 1 or 0 pair of first class index. For secondary sources are stepping class data, can be encoded using huffman coding mode, for example, " internal rating " stepping is High, medium and low third gear, the probability of high, medium and low appearance in counting user data, or estimate its probability according to data characteristicses Distribution, as probability parameter, obtains Huffman dictionary.It is assumed that the probability of high, medium and low appearance is 0.7,0.2,0.1, then The Huffman dictionary for arriving is [A 0;B 10;C 11].
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together When, improve the safety of the treatment effeciency to user data and user data.
The data ciphering method flow chart that Fig. 2 is provided for another embodiment of the present invention.On the basis of embodiment illustrated in fig. 1 On, the data ciphering method that the present embodiment is provided is comprised the following steps that:
Step S201, acquisition user data.
Step S202, according to the service attribute of the user data, the user data is carried out staged care obtain it is many Individual data set, each data set includes multiple user data.
In addition, using PCA or factor analyses, entering to multiple user data that the data set includes Row dimension-reduction treatment.
In actual applications, a general first class index (wherein judges that two grades of class refers to comprising the two-level index within 10 Within mark 3, within stepping class two-level index 6), this is determined by Data Dimensionality Reduction principle.Here it is desirable that basic Primary data information (pdi) amount is not lost, so it is difficult to the data of more higher-dimension are reduced to one-dimensional.If there is one-level in Index grading to refer to There is more two-level index situation in mark, can be processed using following two methods:A () carefully splits the first class index again Into multiple first class index;The redundant data very strong compared with multi-associativity is there may be in (b) first class index, it is possible to use main constituent Analytic process or factor analyses carry out dimensionality reduction operation to data, eliminate redundant data.
Step S203, according to the value attribute of the user data, the multiple user data included to each data set Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind The value number of data.
Whether step S204, the data judged in data set are primary sources, if then execution step S206, otherwise, Execution step S210.
Whether step S205, the data judged in data set are secondary sources, if then execution step S207, otherwise, Execution step S210.
Step S206, according to the value of primary sources described in each data set, the primary sources are compiled Code obtains first and encodes.
One first class index is to judge class generally at most containing 3 two-level index, it is possible to will determine that class index is constituted One group, one group of binary code less than 3 is produced, the binary code less than 3 is to judge class in a first class index First coding of two-level index.
Step S207, huffman coding is adopted, the secondary sources are carried out with coding obtain second to encode.
One first class index is stepping class generally at most containing 6 two-level index, and stepping class two-level index is constituted into one group, Its value produces a string of huffman codings, if so that stepping is 3 classes as an example, the digit of huffman coding is less than 12, obtains Second coding of stepping class two-level index in one first class index.
Step S208, by first code conversion be decimal number.
The first code conversion for judging class two-level index in each first class index for decimal number, make by the decimal number To judge the scoring Scorep of class two-level index.
Step S209, by second code conversion be decimal number.
It is decimal number to the second code conversion of the stepping class two-level index in each first class index, the decimal number is made For the scoring Scoref of stepping class two-level index, the codomain scope of Scoref is [0,8191], is at most 4 digits.
Step S210, according to the described first corresponding decimal number of coding and the corresponding decimal number of second coding, Determine the coding of the data set.
According to the scoring Scoref of the scoring Scorep and stepping class two-level index for judging class two-level index, synthesis is converted into Scoring, the present embodiment using comprehensive grading as data set coding, comprehensive grading (Score)=(Scoref mod 1000)+ (Scorep*0.1)+fix (Scoref/1000) * 0.01, wherein, mod is remainder function, and (Scoref mod 1000) is intercepted Rear three bit digital of Scoref, as the integer part of fraction Score;(Scorep*0.1) i.e. judgement class index score First decimals of the Scorep as Score;Fix is to zero bracket function, that is, to intercept the integer part of a numeral, removes little Fractional part.Fix (Scorep/1000) will Scorep thousands digit as Score second decimal.
Step S211, by next number according to collection in units of, circulation perform above-mentioned steps.
According to the coding of each data set, the coding of the user data is determined.
The coding of each data set can be obtained according to step S205- step S210, according to the coding of each data set, can be true Determine the coding of user data.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together When, improve the safety of the treatment effeciency to user data and user data.
Fig. 3 is the structure chart of data encryption device provided in an embodiment of the present invention.Data provided in an embodiment of the present invention add Close device can perform the handling process of data ciphering method embodiment offer, as shown in figure 3, data encryption device includes:Obtain Delivery block 31, diversity module 32, sort module 33, encrypting module 34, wherein, acquisition module 31, for obtaining user data;Point Level module 32, for according to the service attribute of the user data, carrying out staged care to the user data many numbers are obtained According to collection, each data set includes multiple user data;Sort module 33 is right for according to the value attribute of the user data Multiple user data that each data set includes carry out classifying processing and obtain primary sources and secondary sources, and described first Value number of the value number of class data less than the secondary sources;Encrypting module 34, for according in each data set The value of the value of the primary sources and the secondary sources, to each data set in multiple user data carry out plus Close process.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together When, improve the safety of the treatment effeciency to user data and user data.
The structure chart of the data encryption device that Fig. 4 is provided for another embodiment of the present invention, on the basis of Fig. 3, data add Close device also includes:Coding module 35, modular converter 36, determining module 37, dimension-reduction treatment module 38.
Coding module 35 is used for the value according to primary sources described in each data set, and the primary sources are entered Row coding obtains first and encodes;Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
It is decimal number that modular converter 36 is used for first code conversion;It is decimal scale by second code conversion Number;Determining module 37 is used for according to the corresponding decimal number of the described first coding and the corresponding decimal number of second coding, Determine the coding of the data set.
Determining module 37 is additionally operable to the coding according to each data set, determines the coding of the user data.
Dimension-reduction treatment module 38 is used for using PCA or factor analyses, and what the data set was included is more Individual user data carries out dimension-reduction treatment.
The method that data encryption device provided in an embodiment of the present invention can be provided specifically for performing above-mentioned Fig. 2 is implemented Example, here is omitted for concrete function.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together When, improve the safety of the treatment effeciency to user data and user data.
In sum, the embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each Data set is unit, multiple user data that each data set includes is carried out with classification and processes acquisition primary sources and second Class data, according to the value of the value of primary sources and the secondary sources described in each data set, to each data The multiple user data concentrated are encrypted, compared to prior art, it is to avoid the recognizability of user data and association Property it is destroyed, meanwhile, improve the safety of the treatment effeciency to user data and user data.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematic, for example, the division of the unit, and only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Close or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or discussed Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, device or unit or logical Letter connection, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit both can be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each The part steps of embodiment methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division be illustrated, in practical application, can as desired by above-mentioned functions distribute it is complete by different functional modules Into, will the internal structure of device be divided into different functional modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, be will not be described here.
Finally it should be noted that:Various embodiments above only to illustrate technical scheme, rather than a limitation;To the greatest extent Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to So the technical scheme described in foregoing embodiments can be modified, either which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, do not make the essence disengaging various embodiments of the present invention technology of appropriate technical solution The scope of scheme.

Claims (10)

1. a kind of data ciphering method, it is characterised in that include:
Obtain user data;
According to the service attribute of the user data, staged care is carried out to the user data and obtains multiple data sets, each Data set includes multiple user data;
According to the value attribute of the user data, multiple user data that each data set includes are carried out with classification process and is obtained Primary sources and secondary sources are obtained, the value number of the primary sources is individual less than the value of the secondary sources Number;
According to the value of the value of primary sources and the secondary sources described in each data set, in each data set Multiple user data be encrypted.
2. method according to claim 1, it is characterised in that it is described to each data set in multiple user data carry out Encryption, including:
According to the value of primary sources described in each data set, the primary sources are carried out with coding and obtains the first volume Code;
Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
3. method according to claim 1, it is characterised in that it is described to each data set in multiple user data carry out After encryption, also include:
It is decimal number by first code conversion;
It is decimal number by second code conversion;
According to the corresponding decimal number of the described first coding and the corresponding decimal number of second coding, the data set is determined Coding.
4. method according to claim 3, it is characterised in that after the coding of the determination data set, also include:
According to the coding of each data set, the coding of the user data is determined.
5. the method according to any one of claim 1-4, it is characterised in that described that the user data is carried out at classification Reason is obtained after multiple data sets, is also included:
Using PCA or factor analyses, multiple user data that the data set includes are carried out at dimensionality reduction Reason.
6. a kind of data encryption device, it is characterised in that include:
Acquisition module, for obtaining user data;
Diversity module, obtains many for according to the service attribute of the user data, carrying out staged care to the user data Individual data set, each data set includes multiple user data;
Sort module, for according to the value attribute of the user data, the multiple user data included to each data set Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind The value number of data;
Encrypting module, for according to the value of the value of primary sources and the secondary sources described in each data set, Multiple user data in each data set are encrypted.
7. data encryption device according to claim 6, it is characterised in that also include:
Coding module, for according to the value of primary sources described in each data set, compiling to the primary sources Code obtains first and encodes;Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
8. data encryption device according to claim 6, it is characterised in that also include:
Modular converter, for by first code conversion be decimal number;It is decimal number by second code conversion;
Determining module, for encoding corresponding decimal number according to the corresponding decimal number of the described first coding and described second, Determine the coding of the data set.
9. data encryption device according to claim 8, it is characterised in that the determining module is additionally operable to according to each number According to the coding of collection, the coding of the user data is determined.
10. the data encryption device according to any one of claim 6-9, it is characterised in that also include:
Dimension-reduction treatment module, for using PCA or factor analyses, the multiple use included to the data set User data carries out dimension-reduction treatment.
CN201610931122.1A 2016-10-31 2016-10-31 Data encryption method and device Pending CN106571909A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610931122.1A CN106571909A (en) 2016-10-31 2016-10-31 Data encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610931122.1A CN106571909A (en) 2016-10-31 2016-10-31 Data encryption method and device

Publications (1)

Publication Number Publication Date
CN106571909A true CN106571909A (en) 2017-04-19

Family

ID=58533743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610931122.1A Pending CN106571909A (en) 2016-10-31 2016-10-31 Data encryption method and device

Country Status (1)

Country Link
CN (1) CN106571909A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951452A (en) * 2019-02-26 2019-06-28 北京深思数盾科技股份有限公司 A kind of method and device handling cryptography task
CN112632054A (en) * 2020-12-30 2021-04-09 南京翼海云峰软件技术有限公司 Data set duplication removing method based on attribute encryption, storage medium and system
CN114422149A (en) * 2022-03-28 2022-04-29 苏州浪潮智能科技有限公司 Data encryption method, data decryption method, data encryption system, data decryption system, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012152845A1 (en) * 2011-05-10 2012-11-15 Nagravision S.A. Method for handling privacy data
CN102982077A (en) * 2012-10-30 2013-03-20 中国联合网络通信集团有限公司 User data processing method and device
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN105376051A (en) * 2014-08-29 2016-03-02 宇龙计算机通信科技(深圳)有限公司 Encryption method and apparatus, and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012152845A1 (en) * 2011-05-10 2012-11-15 Nagravision S.A. Method for handling privacy data
CN102982077A (en) * 2012-10-30 2013-03-20 中国联合网络通信集团有限公司 User data processing method and device
CN104079574A (en) * 2014-07-02 2014-10-01 南京邮电大学 User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
CN105376051A (en) * 2014-08-29 2016-03-02 宇龙计算机通信科技(深圳)有限公司 Encryption method and apparatus, and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
季一木等: "云环境下用户隐私属性及其分类研究", 《计算机应用研究》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951452A (en) * 2019-02-26 2019-06-28 北京深思数盾科技股份有限公司 A kind of method and device handling cryptography task
CN112632054A (en) * 2020-12-30 2021-04-09 南京翼海云峰软件技术有限公司 Data set duplication removing method based on attribute encryption, storage medium and system
CN114422149A (en) * 2022-03-28 2022-04-29 苏州浪潮智能科技有限公司 Data encryption method, data decryption method, data encryption system, data decryption system, and storage medium

Similar Documents

Publication Publication Date Title
CN109445834B (en) Program code similarity rapid comparison method based on abstract syntax tree
Xiang et al. A linguistic steganography based on word indexing compression and candidate selection
US20020073138A1 (en) De-identification and linkage of data records
US9619657B2 (en) Method and apparatus for storing redeem code, and method and apparatus for verifying redeem code
CN106909575B (en) Text clustering method and device
CN109408113A (en) A kind of code text processing method, system and terminal device
CN106571909A (en) Data encryption method and device
CN105279198A (en) Data table storage method, data table modification method, data table query method and data table statistical method
CN107291935A (en) The CPIR V arest neighbors privacy protection enquiring methods encoded based on Spark and Huffman
CN105940611B (en) Data condenser, data recovery apparatus, data recovery method, data condenser, data recovery apparatus, data recovery system, and data recovery method
CN109901978A (en) A kind of Hadoop log lossless compression method and system
CN110245520A (en) A kind of file enciphering method, file encryption device and terminal device
CN113688629A (en) Text deduplication method and device and storage medium
CN110957003B (en) Efficient gene comparison method for protecting user privacy
CN105988980A (en) Information processing apparatus, and data management method
Leung et al. Flexible compression of big data
CN116561813A (en) Safety management system applied to archive information
CN111553156A (en) Keyword extraction method, device and equipment
CN116522003A (en) Information recommendation method, device, equipment and medium based on embedded table compression
CN109831544A (en) A kind of coding and storing method and system applied to E-mail address
CN112365243B (en) Subject creation method and device and computer equipment
CN112989815A (en) Text similarity recognition method, device, equipment and medium based on information interaction
CN111552689B (en) Method, device and equipment for calculating deduplication index of fund audit
EP3696704B1 (en) Synthetic data generation apparatus, method for the same, and program
CN109117648B (en) Encryption method for floating point data of database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170419

RJ01 Rejection of invention patent application after publication