CN106571909A - Data encryption method and device - Google Patents
Data encryption method and device Download PDFInfo
- Publication number
- CN106571909A CN106571909A CN201610931122.1A CN201610931122A CN106571909A CN 106571909 A CN106571909 A CN 106571909A CN 201610931122 A CN201610931122 A CN 201610931122A CN 106571909 A CN106571909 A CN 106571909A
- Authority
- CN
- China
- Prior art keywords
- data
- user data
- data set
- coding
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000008569 process Effects 0.000 claims description 19
- 238000006243 chemical reaction Methods 0.000 claims description 10
- 238000004458 analytical method Methods 0.000 claims description 5
- 230000009467 reduction Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 abstract description 3
- 230000006870 function Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 5
- 238000011426 transformation method Methods 0.000 description 5
- 238000012217 deletion Methods 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000007704 transition Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 230000002844 continuous effect Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data encryption method and device. The method includes acquiring the user data; grading the user data according to the business attribute of the user data; classifying the plurality of user data included in each data set according to the value attribute of the user data; and encrypting the plurality of user data included in each data set. The plurality of data sets are obtained by grading the user data, and taking each data set as a unit, the plurality of user data included in each data set is classified to obtain a first class of data and a second class of data, and the plurality of user data included in each data set is encrypted according to the value of the first class of data and the second class of data in each data set. Compared with the prior art, the identifiability and relevance of the user data can be prevented from being destroyed, and meanwhile, the processing efficiency and security of the user data are improved.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of data ciphering method and device.
Background technology
With the development of communication technology, user data has become the significant data in communication network.Due to network element and end
Between end equipment, or interaction of user data is needed between network element and network element, therefore, in interaction, the safety of user data
Property is more important.
In prior art, in order to reduce interaction in, the sensitivity of user data, by substituting, shuffling, block, empty
The modes such as value insertion deletion are processed user data, but are substituted, shuffled, blocking, the mode meeting such as null value insertion deletion
The recognizability and relatedness of destruction user data.In addition, prior art is also carried out using numerical transformation method to user data
Process, but numerical transformation method needs tectonic transition function, and tectonic transition function is more difficult, and using numerical transformation side
Information Security after method is processed user data is not high.
The content of the invention
The embodiment of the present invention provides a kind of data ciphering method and device, to improve the safety of user data.
The one side of the embodiment of the present invention is to provide a kind of data ciphering method, including:
Obtain user data;
According to the service attribute of the user data, staged care is carried out to the user data and obtains multiple data sets,
Each data set includes multiple user data;
According to the value attribute of the user data, multiple user data that each data set includes are carried out at classification
Reason obtains primary sources and secondary sources, and the value number of the primary sources is less than the value of the secondary sources
Number;
According to the value of the value of primary sources and the secondary sources described in each data set, to each data
The multiple user data concentrated are encrypted.
The other side of the embodiment of the present invention is to provide a kind of data encryption device, including:
Acquisition module, for obtaining user data;
Diversity module, for according to the service attribute of the user data, carrying out staged care to the user data and obtaining
Much individual data sets, each data set includes multiple user data;
Sort module, for according to the value attribute of the user data, the multiple users included to each data set
Data carry out classification and process to obtain primary sources and secondary sources, and the value number of the primary sources is less than described the
The value number of two class data;
Encrypting module, for taking according to the value of primary sources described in each data set and the secondary sources
Value, to each data set in multiple user data be encrypted.
Data ciphering method provided in an embodiment of the present invention and device, obtain many by carrying out staged care to user data
Multiple user data that each data set includes in units of each data set, are carried out classification and process acquisition by individual data set
Primary sources and secondary sources, according to the value of primary sources described in each data set and the secondary sources
Value, to each data set in multiple user data be encrypted, compared to prior art, it is to avoid user data
Recognizability and relatedness are destroyed, meanwhile, improve the safety of the treatment effeciency to user data and user data.
Description of the drawings
Fig. 1 is data ciphering method flow chart provided in an embodiment of the present invention;
The data ciphering method flow chart that Fig. 2 is provided for another embodiment of the present invention;
Fig. 3 is the structure chart of data encryption device provided in an embodiment of the present invention;
The structure chart of the data encryption device that Fig. 4 is provided for another embodiment of the present invention.
Specific embodiment
Fig. 1 is data ciphering method flow chart provided in an embodiment of the present invention.The embodiment of the present invention is directed in prior art,
In in order to reduce interaction, the sensitivity of user data, by substituting, shuffling, block, the mode pair such as null value insertion deletion
User data is processed, but is substituted, shuffled, blocking, the mode such as null value insertion deletion can destroy the recognizable of user data
Property and relatedness.In addition, prior art is also processed user data using numerical transformation method, but numerical transformation method
Tectonic transition function is needed, tectonic transition function is more difficult, and user data is processed using numerical transformation method
Information Security afterwards is not high, there is provided data ciphering method, and specific data ciphering method step is as follows:
Step S101, acquisition user data.
The executive agent of the present embodiment can be terminal unit, or the network element in communication network, terminal unit or
User data is previously stored with network element, or terminal unit or network element obtain user data from other equipment.User data can
To include:User's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn net situation.
Step S102, according to the service attribute of the user data, the user data is carried out staged care obtain it is many
Individual data set, each data set includes multiple user data.
According to user's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn the industry of net situation
Business attribute, to user's sex, the age, internal rating, voice usage amount, surfing flow, in net duration, turn net situation and be classified
Process obtains multiple data sets, and for example, sex, age, internal rating are used as a data set, voice usage amount, surfing flow
As a data set, in net duration, turn net situation as a data set.Specifically, by user's sex, age, Ke Huping
Level, voice usage amount, surfing flow, in net duration, turn net situation as 7 two-level index, then 7 two-level index can be converged
Always to 3 first class index, such as 3 first class index are respectively user identity feature, consumption, stability, then two-level index
Sex, age, internal rating belong to first class index " user identity feature ", and two-level index voice usage amount, surfing flow belong to
First class index " consumption ", in net duration, turns net situation and belongs to first class index " stability ".
Step S103, according to the value attribute of the user data, the multiple user data included to each data set
Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind
The value number of data.
With each first class index as unit, according to the value attribute or span of each two-level index in first class index,
Multiple two-level index in first class index carry out classification and process acquisition primary sources and secondary sources, and for example, one-level refers to
The value of " sex " has two kinds in mark " user identity feature ", and it is female that one kind is male one kind, i.e., " sex " has two kinds of values." year
The value in age " is more than two kinds, can be the data of continuouss, accordingly, it would be desirable to the data of continuouss are carried out into discretization, for example,
Using 18-30 year as one grade, 31-50 year as one grade, more than 51 years old used as one grade." internal rating " is divided into Gold Subscriber, silver
Board user, domestic consumer, i.e., high, medium and low third gear.It can be seen that, " sex " is the data for judging class, and in this way man is female, " age " and
" internal rating " belongs to the data of stepping class.In the present embodiment, class data are will determine that as primary sources, by stepping class data
Used as secondary sources, and primary sources and secondary sources are all the divisions under two-level index.
Step S104, according to the value of the value of primary sources and the secondary sources described in each data set,
Multiple user data in each data set are encrypted.
With each first class index as unit, for example, first class index " user identity feature " judges class data such as " sex "
Value includes man, female, and the present embodiment can represent man, with 0 female is represented with 1, in addition, for other judge the data of class, for example
Whether " group customer ", being represented with 1 is, represents no with 0, i.e., encoded with the judgement class data in 1 or 0 pair of first class index.
For secondary sources are stepping class data, can be encoded using huffman coding mode, for example, " internal rating " stepping is
High, medium and low third gear, the probability of high, medium and low appearance in counting user data, or estimate its probability according to data characteristicses
Distribution, as probability parameter, obtains Huffman dictionary.It is assumed that the probability of high, medium and low appearance is 0.7,0.2,0.1, then
The Huffman dictionary for arriving is [A 0;B 10;C 11].
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list
Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position
According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple
User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together
When, improve the safety of the treatment effeciency to user data and user data.
The data ciphering method flow chart that Fig. 2 is provided for another embodiment of the present invention.On the basis of embodiment illustrated in fig. 1
On, the data ciphering method that the present embodiment is provided is comprised the following steps that:
Step S201, acquisition user data.
Step S202, according to the service attribute of the user data, the user data is carried out staged care obtain it is many
Individual data set, each data set includes multiple user data.
In addition, using PCA or factor analyses, entering to multiple user data that the data set includes
Row dimension-reduction treatment.
In actual applications, a general first class index (wherein judges that two grades of class refers to comprising the two-level index within 10
Within mark 3, within stepping class two-level index 6), this is determined by Data Dimensionality Reduction principle.Here it is desirable that basic
Primary data information (pdi) amount is not lost, so it is difficult to the data of more higher-dimension are reduced to one-dimensional.If there is one-level in Index grading to refer to
There is more two-level index situation in mark, can be processed using following two methods:A () carefully splits the first class index again
Into multiple first class index;The redundant data very strong compared with multi-associativity is there may be in (b) first class index, it is possible to use main constituent
Analytic process or factor analyses carry out dimensionality reduction operation to data, eliminate redundant data.
Step S203, according to the value attribute of the user data, the multiple user data included to each data set
Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind
The value number of data.
Whether step S204, the data judged in data set are primary sources, if then execution step S206, otherwise,
Execution step S210.
Whether step S205, the data judged in data set are secondary sources, if then execution step S207, otherwise,
Execution step S210.
Step S206, according to the value of primary sources described in each data set, the primary sources are compiled
Code obtains first and encodes.
One first class index is to judge class generally at most containing 3 two-level index, it is possible to will determine that class index is constituted
One group, one group of binary code less than 3 is produced, the binary code less than 3 is to judge class in a first class index
First coding of two-level index.
Step S207, huffman coding is adopted, the secondary sources are carried out with coding obtain second to encode.
One first class index is stepping class generally at most containing 6 two-level index, and stepping class two-level index is constituted into one group,
Its value produces a string of huffman codings, if so that stepping is 3 classes as an example, the digit of huffman coding is less than 12, obtains
Second coding of stepping class two-level index in one first class index.
Step S208, by first code conversion be decimal number.
The first code conversion for judging class two-level index in each first class index for decimal number, make by the decimal number
To judge the scoring Scorep of class two-level index.
Step S209, by second code conversion be decimal number.
It is decimal number to the second code conversion of the stepping class two-level index in each first class index, the decimal number is made
For the scoring Scoref of stepping class two-level index, the codomain scope of Scoref is [0,8191], is at most 4 digits.
Step S210, according to the described first corresponding decimal number of coding and the corresponding decimal number of second coding,
Determine the coding of the data set.
According to the scoring Scoref of the scoring Scorep and stepping class two-level index for judging class two-level index, synthesis is converted into
Scoring, the present embodiment using comprehensive grading as data set coding, comprehensive grading (Score)=(Scoref mod 1000)+
(Scorep*0.1)+fix (Scoref/1000) * 0.01, wherein, mod is remainder function, and (Scoref mod 1000) is intercepted
Rear three bit digital of Scoref, as the integer part of fraction Score;(Scorep*0.1) i.e. judgement class index score
First decimals of the Scorep as Score;Fix is to zero bracket function, that is, to intercept the integer part of a numeral, removes little
Fractional part.Fix (Scorep/1000) will Scorep thousands digit as Score second decimal.
Step S211, by next number according to collection in units of, circulation perform above-mentioned steps.
According to the coding of each data set, the coding of the user data is determined.
The coding of each data set can be obtained according to step S205- step S210, according to the coding of each data set, can be true
Determine the coding of user data.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list
Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position
According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple
User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together
When, improve the safety of the treatment effeciency to user data and user data.
Fig. 3 is the structure chart of data encryption device provided in an embodiment of the present invention.Data provided in an embodiment of the present invention add
Close device can perform the handling process of data ciphering method embodiment offer, as shown in figure 3, data encryption device includes:Obtain
Delivery block 31, diversity module 32, sort module 33, encrypting module 34, wherein, acquisition module 31, for obtaining user data;Point
Level module 32, for according to the service attribute of the user data, carrying out staged care to the user data many numbers are obtained
According to collection, each data set includes multiple user data;Sort module 33 is right for according to the value attribute of the user data
Multiple user data that each data set includes carry out classifying processing and obtain primary sources and secondary sources, and described first
Value number of the value number of class data less than the secondary sources;Encrypting module 34, for according in each data set
The value of the value of the primary sources and the secondary sources, to each data set in multiple user data carry out plus
Close process.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list
Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position
According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple
User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together
When, improve the safety of the treatment effeciency to user data and user data.
The structure chart of the data encryption device that Fig. 4 is provided for another embodiment of the present invention, on the basis of Fig. 3, data add
Close device also includes:Coding module 35, modular converter 36, determining module 37, dimension-reduction treatment module 38.
Coding module 35 is used for the value according to primary sources described in each data set, and the primary sources are entered
Row coding obtains first and encodes;Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
It is decimal number that modular converter 36 is used for first code conversion;It is decimal scale by second code conversion
Number;Determining module 37 is used for according to the corresponding decimal number of the described first coding and the corresponding decimal number of second coding,
Determine the coding of the data set.
Determining module 37 is additionally operable to the coding according to each data set, determines the coding of the user data.
Dimension-reduction treatment module 38 is used for using PCA or factor analyses, and what the data set was included is more
Individual user data carries out dimension-reduction treatment.
The method that data encryption device provided in an embodiment of the present invention can be provided specifically for performing above-mentioned Fig. 2 is implemented
Example, here is omitted for concrete function.
The embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each data set as list
Multiple user data that each data set includes are carried out classification and process acquisition primary sources and secondary sources, root by position
According to the value of the value of primary sources and the secondary sources described in each data set, to each data set in it is multiple
User data is encrypted, compared to prior art, it is to avoid the recognizability and relatedness of user data is destroyed, together
When, improve the safety of the treatment effeciency to user data and user data.
In sum, the embodiment of the present invention obtains multiple data sets by carrying out staged care to user data, with each
Data set is unit, multiple user data that each data set includes is carried out with classification and processes acquisition primary sources and second
Class data, according to the value of the value of primary sources and the secondary sources described in each data set, to each data
The multiple user data concentrated are encrypted, compared to prior art, it is to avoid the recognizability of user data and association
Property it is destroyed, meanwhile, improve the safety of the treatment effeciency to user data and user data.
In several embodiments provided by the present invention, it should be understood that disclosed apparatus and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematic, for example, the division of the unit, and only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Close or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, device or unit or logical
Letter connection, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each
The part steps of embodiment methods described.And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division be illustrated, in practical application, can as desired by above-mentioned functions distribute it is complete by different functional modules
Into, will the internal structure of device be divided into different functional modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, be will not be described here.
Finally it should be noted that:Various embodiments above only to illustrate technical scheme, rather than a limitation;To the greatest extent
Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to
So the technical scheme described in foregoing embodiments can be modified, either which part or all technical characteristic are entered
Row equivalent;And these modifications or replacement, do not make the essence disengaging various embodiments of the present invention technology of appropriate technical solution
The scope of scheme.
Claims (10)
1. a kind of data ciphering method, it is characterised in that include:
Obtain user data;
According to the service attribute of the user data, staged care is carried out to the user data and obtains multiple data sets, each
Data set includes multiple user data;
According to the value attribute of the user data, multiple user data that each data set includes are carried out with classification process and is obtained
Primary sources and secondary sources are obtained, the value number of the primary sources is individual less than the value of the secondary sources
Number;
According to the value of the value of primary sources and the secondary sources described in each data set, in each data set
Multiple user data be encrypted.
2. method according to claim 1, it is characterised in that it is described to each data set in multiple user data carry out
Encryption, including:
According to the value of primary sources described in each data set, the primary sources are carried out with coding and obtains the first volume
Code;
Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
3. method according to claim 1, it is characterised in that it is described to each data set in multiple user data carry out
After encryption, also include:
It is decimal number by first code conversion;
It is decimal number by second code conversion;
According to the corresponding decimal number of the described first coding and the corresponding decimal number of second coding, the data set is determined
Coding.
4. method according to claim 3, it is characterised in that after the coding of the determination data set, also include:
According to the coding of each data set, the coding of the user data is determined.
5. the method according to any one of claim 1-4, it is characterised in that described that the user data is carried out at classification
Reason is obtained after multiple data sets, is also included:
Using PCA or factor analyses, multiple user data that the data set includes are carried out at dimensionality reduction
Reason.
6. a kind of data encryption device, it is characterised in that include:
Acquisition module, for obtaining user data;
Diversity module, obtains many for according to the service attribute of the user data, carrying out staged care to the user data
Individual data set, each data set includes multiple user data;
Sort module, for according to the value attribute of the user data, the multiple user data included to each data set
Carry out classification and process acquisition primary sources and secondary sources, the value number of the primary sources is less than the Equations of The Second Kind
The value number of data;
Encrypting module, for according to the value of the value of primary sources and the secondary sources described in each data set,
Multiple user data in each data set are encrypted.
7. data encryption device according to claim 6, it is characterised in that also include:
Coding module, for according to the value of primary sources described in each data set, compiling to the primary sources
Code obtains first and encodes;Using huffman coding, the secondary sources are carried out with coding and obtains the second coding.
8. data encryption device according to claim 6, it is characterised in that also include:
Modular converter, for by first code conversion be decimal number;It is decimal number by second code conversion;
Determining module, for encoding corresponding decimal number according to the corresponding decimal number of the described first coding and described second,
Determine the coding of the data set.
9. data encryption device according to claim 8, it is characterised in that the determining module is additionally operable to according to each number
According to the coding of collection, the coding of the user data is determined.
10. the data encryption device according to any one of claim 6-9, it is characterised in that also include:
Dimension-reduction treatment module, for using PCA or factor analyses, the multiple use included to the data set
User data carries out dimension-reduction treatment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610931122.1A CN106571909A (en) | 2016-10-31 | 2016-10-31 | Data encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610931122.1A CN106571909A (en) | 2016-10-31 | 2016-10-31 | Data encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106571909A true CN106571909A (en) | 2017-04-19 |
Family
ID=58533743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610931122.1A Pending CN106571909A (en) | 2016-10-31 | 2016-10-31 | Data encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106571909A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951452A (en) * | 2019-02-26 | 2019-06-28 | 北京深思数盾科技股份有限公司 | A kind of method and device handling cryptography task |
CN112632054A (en) * | 2020-12-30 | 2021-04-09 | 南京翼海云峰软件技术有限公司 | Data set duplication removing method based on attribute encryption, storage medium and system |
CN114422149A (en) * | 2022-03-28 | 2022-04-29 | 苏州浪潮智能科技有限公司 | Data encryption method, data decryption method, data encryption system, data decryption system, and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012152845A1 (en) * | 2011-05-10 | 2012-11-15 | Nagravision S.A. | Method for handling privacy data |
CN102982077A (en) * | 2012-10-30 | 2013-03-20 | 中国联合网络通信集团有限公司 | User data processing method and device |
CN104079574A (en) * | 2014-07-02 | 2014-10-01 | 南京邮电大学 | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment |
CN105376051A (en) * | 2014-08-29 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | Encryption method and apparatus, and terminal |
-
2016
- 2016-10-31 CN CN201610931122.1A patent/CN106571909A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012152845A1 (en) * | 2011-05-10 | 2012-11-15 | Nagravision S.A. | Method for handling privacy data |
CN102982077A (en) * | 2012-10-30 | 2013-03-20 | 中国联合网络通信集团有限公司 | User data processing method and device |
CN104079574A (en) * | 2014-07-02 | 2014-10-01 | 南京邮电大学 | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment |
CN105376051A (en) * | 2014-08-29 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | Encryption method and apparatus, and terminal |
Non-Patent Citations (1)
Title |
---|
季一木等: "云环境下用户隐私属性及其分类研究", 《计算机应用研究》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951452A (en) * | 2019-02-26 | 2019-06-28 | 北京深思数盾科技股份有限公司 | A kind of method and device handling cryptography task |
CN112632054A (en) * | 2020-12-30 | 2021-04-09 | 南京翼海云峰软件技术有限公司 | Data set duplication removing method based on attribute encryption, storage medium and system |
CN114422149A (en) * | 2022-03-28 | 2022-04-29 | 苏州浪潮智能科技有限公司 | Data encryption method, data decryption method, data encryption system, data decryption system, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109445834B (en) | Program code similarity rapid comparison method based on abstract syntax tree | |
Xiang et al. | A linguistic steganography based on word indexing compression and candidate selection | |
US20020073138A1 (en) | De-identification and linkage of data records | |
US9619657B2 (en) | Method and apparatus for storing redeem code, and method and apparatus for verifying redeem code | |
CN106909575B (en) | Text clustering method and device | |
CN109408113A (en) | A kind of code text processing method, system and terminal device | |
CN106571909A (en) | Data encryption method and device | |
CN105279198A (en) | Data table storage method, data table modification method, data table query method and data table statistical method | |
CN107291935A (en) | The CPIR V arest neighbors privacy protection enquiring methods encoded based on Spark and Huffman | |
CN105940611B (en) | Data condenser, data recovery apparatus, data recovery method, data condenser, data recovery apparatus, data recovery system, and data recovery method | |
CN109901978A (en) | A kind of Hadoop log lossless compression method and system | |
CN110245520A (en) | A kind of file enciphering method, file encryption device and terminal device | |
CN113688629A (en) | Text deduplication method and device and storage medium | |
CN110957003B (en) | Efficient gene comparison method for protecting user privacy | |
CN105988980A (en) | Information processing apparatus, and data management method | |
Leung et al. | Flexible compression of big data | |
CN116561813A (en) | Safety management system applied to archive information | |
CN111553156A (en) | Keyword extraction method, device and equipment | |
CN116522003A (en) | Information recommendation method, device, equipment and medium based on embedded table compression | |
CN109831544A (en) | A kind of coding and storing method and system applied to E-mail address | |
CN112365243B (en) | Subject creation method and device and computer equipment | |
CN112989815A (en) | Text similarity recognition method, device, equipment and medium based on information interaction | |
CN111552689B (en) | Method, device and equipment for calculating deduplication index of fund audit | |
EP3696704B1 (en) | Synthetic data generation apparatus, method for the same, and program | |
CN109117648B (en) | Encryption method for floating point data of database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170419 |
|
RJ01 | Rejection of invention patent application after publication |