CN106790302A - Data ciphering method, data decryption method and system - Google Patents
Data ciphering method, data decryption method and system Download PDFInfo
- Publication number
- CN106790302A CN106790302A CN201710174241.1A CN201710174241A CN106790302A CN 106790302 A CN106790302 A CN 106790302A CN 201710174241 A CN201710174241 A CN 201710174241A CN 106790302 A CN106790302 A CN 106790302A
- Authority
- CN
- China
- Prior art keywords
- sub
- code
- compressed package
- extension name
- package files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a kind of data ciphering method, data decryption method and system, encryption method includes:The first control code in S1, the definition sequence of foundation user input, is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers by the extension name of original document;S2, perform complete S1 after, according to original document extension name type generation first reverse code;S3, by the compression of the first simulated papers and bundling into some first sub- compressed package files;The second control code in S4, the definition sequence of foundation user input, the number order to the extension name of some first sub- compressed package files is exchanged, to generate some second sub- compressed package files with new number order;S5, after performing and completing S4, according to the second control code, generation second reverses code;S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.The present invention can be encrypted to the data of user, and security is higher.
Description
Technical field
The invention belongs to encryption technology field, more specifically, it relates to a kind of data ciphering method, data decryption method
And system.
Background technology
With continuing to develop for Internet technology, in the application process of internet, cloud storage technology has spread to people
Daily life and work in the middle of.Such as conventional at present some cloud disks, it is passed the file of oneself by way of uploading
To the database on backstage.User after cloud disk is signed in, can only could also get the data of oneself upload from database, its
His user, when the account number cipher of the user is not grasped, is the file that cannot directly go to obtain the user;Thus, from certain journey
For on degree, data are deposited into cloud disk, security is of a relatively high.But, this security is also relative, and it can
Limited between users, but for the back-stage management personnel of cloud disk, it can be browsed by back-stage management software appoints
The data of what user, if the data that user uploads are easy to by the back-stage management people of cloud disk not by any encryption
Member's direct access.
The content of the invention
In view of the shortcomings of the prior art, first purpose of the invention is to provide a kind of data ciphering method, energy
Enough data to user are encrypted, and security is higher.
To achieve the above object, the invention provides following technical scheme:
A kind of data ciphering method, including:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text
The incoherent other types of extension name of part, to generate the first simulated papers;
S2, perform complete S1 after, according to original document extension name type generation first reverse code;
S3, by first simulated papers compression and bundling into some first sub- compressed package files;
The second control code in S4, the definition sequence of foundation user input, the extension to some first sub- compressed package files
The number order of name is exchanged, to generate some second sub- compressed package files with new number order;
S5, after performing and completing S4, according to the second control code, generation second reverses code;
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
Preferably, also include:
S7, the first reverse code, the second reverse code are packaged as a text, and are deposited into default store path.
Preferably, in step s 4, Pre-Evaluation also is carried out to the second control code, including:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files;
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If both phases
Together, then the second control code is changed according to default alteration ruler;
S43, re-execute S4.
Second object of the present invention is to provide a kind of data decryption method, can be no more than preset value to original document
Final simulated papers be decrypted.
To achieve the above object, the invention provides following technical scheme:
A1, final simulated papers using the data ciphering method generation described in claim 1 are obtained, and if decompressed and be condensed to
Dry second sub- compressed package files;
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files exchanges, with
Some first sub- compressed package files of the generation with new number order;
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers;
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
Third object of the present invention is to provide a kind of data encryption system, and the data of user can be encrypted,
And security is higher.
To achieve the above object, the invention provides following technical scheme:
A kind of data encryption system, it is characterized in that, including:
First extension name changes unit, the first control code in the definition sequence according to user input is configurable for, by original
The extension name of beginning file is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for reversing code according to the extension name type generation first of original document;
First compressing file unit, is configurable for compressing first simulated papers and bundling compresses into some first sons
APMB package;
Second extension name changes unit, the second control code in the definition sequence according to user input is configurable for, to institute
The number order for stating the extension name of some first sub- compressed package files is exchanged, some with new number order to generate
Second sub- compressed package files;
Second reverses code generation unit, is configurable for according to the second control code, and generation second reverses code;
Second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file, with
Generate final simulated papers.
Preferably, also include:
Memory cell, is configurable for that the first reverse code, the second reverse code are packaged as a text, and are deposited into
Default store path.
Preferably, also it is configurable for including Pre-Evaluation unit:
Before the second extension name modification unit is performed, extension name of the second control code of foundation to some first sub- compressed package files
Number order carry out pre- modification;
Contrast the extension name of number order and some second sub- compressed package files of the extension name of some first sub- compressed package files
Number order;If both are identical, the second control code is changed according to default alteration ruler, the second extension name is reinformed afterwards
Modification unit is performed;If both are different, notify that the second extension name is directly performed.
Fourth object of the present invention is to provide a kind of data decryption system, can be final to what is produced by said apparatus
Simulated papers are decrypted.
To achieve the above object, the invention provides following technical scheme:
A kind of data decryption system, including:
First decompression unit, is configurable for obtaining using the final of the data encryption system generation described in claim 5
Simulated papers, and decompressed and be condensed to some second sub- compressed package files;
First decryption unit, is configurable for reversing code, the extension to some second sub- compressed package files using second
The number order of name is exchanged, to generate some first sub- compressed package files with new number order;
Second decompression unit, is configurable for decompressing some first sub- compressed package files, to obtain
One simulated papers;
Second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is repaiied
Change, to obtain original document.
Compared with prior art, the beneficial effects of the invention are as follows:
The first control code, the second control code included in definition sequence of the present invention based on user input, to the original of user
File is extended the operations such as name modification, compression decomposition, ultimately generates the simulated papers with tight security;And then do not knowing
On the premise of the definition sequence that user is input into, it is difficult to crack the final simulated papers.
When user needs to decrypt the definitive document, it is only necessary to be input into this definition sequence again, decryption system can basis
This definition sequence is decrypted to final simulated papers.
Brief description of the drawings
Fig. 1 is the flow chart of data ciphering method in embodiment 1;
Fig. 2 is the flow chart of data decryption method in 2 in embodiment.
Specific embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not
It is only limitted to this.
Embodiment 1:
The present embodiment provides a kind of data ciphering method, as shown in figure 1, the method includes:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text
The incoherent other types of extension name of part, to generate the first simulated papers.
Above-mentioned definition sequence contains two control codes, respectively the first control code, the second control code;Wherein, first
Control code is made up of the numeral of some, for example " 313 ", its represent be numerous types extension name in certain type expansion
Exhibition name, i.e., be numbered to each extension name in advance;Such as digital " 313 ", representative is " .jpg ", then by original document
Extension name is revised as " .jpg ".
S2, perform complete S1 after, according to original document extension name type generation first reverse code.
After modification is completed, generation corresponding first can be pointed to according to the modification and reverse code, the first reverse code is original
The extension of the numbering of the extension name of beginning file, such as original document is entitled " .txt ", and the numbering of " .txt " is " 241 ", then and
One reverses code for " 241 ".Second control code will be illustrated in following S3.
S3, by first simulated papers compression and bundling into some first sub- compressed package files.
At present as conventional tool of compression, such as " WINRAR ", " good pressure " etc. are provided with the function, i.e., to certain text
When part is compressed, the file bundling that will optionally be compressed is some sub- compressed package files;It is some after the completion of compression
The extension name of individual sub- compressed package files is arranged in a certain order, for example " .z01 ", " .z02 ", " .z03 " ...,
" .zip ", and each file filename all same, user decompression when, only all of sub- compressed package need to be placed on together
One file.
In the present embodiment, the first simulated papers are compressed and divided using with method as above-mentioned enumerated software class
Volume, but it should be recognized that after the completion of bundling, by the expansion of the first sub- compressed package files of last extension entitled " .zip "
Exhibition name is remodified in sequence, and for example this document is the 5th file, then extend entitled " .z05 ".
The second control code in S4, the definition sequence of foundation user input, to some first sub- compressed package files
The number order of extension name is exchanged, to generate some second sub- compressed package files with new number order.
Second control code is made up of some bit digitals, the first sub- compressed package that digit goes out depending on institute's bundling in step S2
The quantity of file;As a example by 5, then the quantity of the permutation and combination of numeral 1-5 is 120 to the present embodiment, then according to certain rule
Rule, this 120 combinations are numbered respectively;In this way, the control code is 3 digits.According to the control code, to original some first sons
The naming order of compressed package files is rearranged.
Before step S4 execution, Pre-Evaluation is also carried out to the second control code, the specific method of Pre-Evaluation includes:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files.
Above-mentioned pre- modification process is:First localling create the first authentic copy file of some first sub- compressed package files(Expand
Exhibition name is constant, and filename unification changes), some first authentic copy files are modified according to the second control code then;Modification
Triplicate file is generated afterwards.
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If two
Person is identical, then change the second control code according to default alteration ruler.
The rule of modification is:Each bit digital to original second control code adds 1.
S43, re-execute S4.
S5, after performing and completing S4, according to the second control code, generation second reverses code.
After the completion of arrangement, generation second reverses code, such as be " 1,2,3,4,5 " before arranging, and its numbering is " 001 ";Arrangement
Essence order afterwards is " 4,2,5,1,3 ", and its numbering is " 098 ";I.e. the second control code of user input is " 098 ", and second is inverse
Transcoding is also " 098 ".
After generation second reverses code, the first reverse code, the second reverse code are packaged as a text, and be stored in
To default store path.
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
The final simulated papers of generation, by user may finally upload to cloud disk or be deposited into other storage regions;It is above-mentioned
First reverse code, second reverse code together constitute decruption key, by the decruption key, final simulated papers can be carried out
Decryption.
Embodiment 2:
The present embodiment provides a kind of data decryption method, and it is corresponding with the data ciphering method in embodiment 1;Reference picture 2, the party
Method includes:
A1, the final simulated papers generated by the data ciphering method in embodiment 1 are obtained, and decompressed and be condensed to some second
Sub- compressed package files.
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files adjusts
Change, to generate some first sub- compressed package files with new number order.
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers.
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
Embodiment 3:
The present embodiment provides a kind of data encryption system, for realizing the data ciphering method in embodiment 1;The system includes:
1st, the first extension name modification unit, is configurable for the first control code in the definition sequence according to user input, will
The extension name of original document is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers.
The system is the special original document buffer area of user configuring one(The local storage region of PC), for right
When original document is operated, original document is first backed up into the original document buffer area.
The first extension name amendment unit is configured with the first alteration ruler database, after user input defines sequence, the
One extension name modification unit identifies the first control code from this definition sequence, then according to the first control code in the first modification rule
Then matched in database, to match corresponding alteration ruler, the finally extension according to the alteration ruler to original document
Name is modified.
2nd, first code generation unit is reversed, is configurable for being reversed according to the extension name type generation first of original document
Code.
First reverse code generation unit is configured with Pre-Evaluation unit, and the Pre-Evaluation unit is configured in the second extension
Before name modification unit is performed, the number order of the extension name of some first sub- compressed package files is carried out according to the second control code
Pre- modification;And contrast the number order and some second sub- compressed package files of the extension name of some first sub- compressed package files
The number order of extension name;If both are identical, the second control code is changed according to default alteration ruler, second is reinformed afterwards
Extension name modification unit is performed;If both are different, notify that the second extension name is directly performed.
3rd, the first compressing file unit, is configurable for first simulated papers compression and bundling into some first
Sub- compressed package files.
4th, the second extension name modification unit, is configurable for the second control in the definition sequence according to user input
Code, the number order to the extension name of some first sub- compressed package files is exchanged, suitable with new numbering to generate
Some second sub- compressed package files of sequence;
5th, second code generation unit is reversed, is configurable for according to the second control code, generation second reverses code;
6th, the second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file,
To generate final simulated papers.
7th, memory cell, is configurable for for the first reverse code, the second reverse code being packaged as a text, and
It is deposited into default store path.
The default store path be generally original document where store path, to facilitate user to search.
Embodiment 4:
The present embodiment provides a kind of data decryption system, and it is corresponding with the data encryption system in embodiment 3, for carrying out data
Decryption, the system includes:
1st, the first decompression unit, is configurable for obtaining the final puppet using the data encryption system generation in embodiment 4
Dress file, and decompressed and be condensed to some second sub- compressed package files.
User needs to imported into the final simulated papers in the system, and after importing, the first decompression unit is immediately to it
Decompressed, the file that solution is extruded is deposited into and is configured in local memory block.
2nd, the first decryption unit, is configurable for reversing code using second, to some second sub- compressed package files
The number order of extension name exchanged, to generate some first sub- compressed package files with new number order.
User reverses code, the second text for reversing code to generate with before importing this by the importing interface of system configuration by first
Presents;First decryption unit identifies the first reverse code from this article presents(Former positions are recognized according to predetermined rule
Number), the second sub- compressed package files are operated again then.
3rd, the second decompression unit, is configurable for decompressing some first sub- compressed package files, with
Obtain the first simulated papers;
4th, the second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is carried out
Modification, to obtain original document.
After user imports text in importing interface before, the second decryption unit also can be identified therefrom simultaneously
First reverses code(According to several digits after predetermined rule identification), the first simulated papers are operated again then.Operation is completed
Afterwards, the store path of the original document of generation is identical with the first simulated papers, to facilitate user to search.
Claims (8)
1. a kind of data ciphering method, it is characterized in that, including:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text
The incoherent other types of extension name of part, to generate the first simulated papers;
S2, perform complete S1 after, according to original document extension name type generation first reverse code;
S3, by first simulated papers compression and bundling into some first sub- compressed package files;
The second control code in S4, the definition sequence of foundation user input, the extension to some first sub- compressed package files
The number order of name is exchanged, to generate some second sub- compressed package files with new number order;
S5, after performing and completing S4, according to the second control code, generation second reverses code;
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
2. data ciphering method according to claim 1, it is characterized in that, also include:
S7, the first reverse code, the second reverse code are packaged as a text, and are deposited into default store path.
3. data ciphering method according to claim 1, it is characterized in that, in step s 4, also the second control code is carried out
Pre-Evaluation, including:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files;
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If both phases
Together, then the second control code is changed according to default alteration ruler;
S43, re-execute S4.
4. a kind of data decryption method, it is characterized in that, including:
A1, final simulated papers using the data ciphering method generation described in claim 1 are obtained, and if decompressed and be condensed to
Dry second sub- compressed package files;
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files exchanges, with
Some first sub- compressed package files of the generation with new number order;
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers;
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
5. a kind of data encryption system, it is characterized in that, including:
First extension name changes unit, the first control code in the definition sequence according to user input is configurable for, by original
The extension name of beginning file is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for reversing code according to the extension name type generation first of original document;
First compressing file unit, is configurable for compressing first simulated papers and bundling compresses into some first sons
APMB package;
Second extension name changes unit, the second control code in the definition sequence according to user input is configurable for, to institute
The number order for stating the extension name of some first sub- compressed package files is exchanged, some with new number order to generate
Second sub- compressed package files;
Second reverses code generation unit, is configurable for according to the second control code, and generation second reverses code;
Second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file, with
Generate final simulated papers.
6. data ciphering method according to claim 5, it is characterized in that, also include:
Memory cell, is configurable for that the first reverse code, the second reverse code are packaged as a text, and are deposited into
Default store path.
7. data ciphering method according to claim 5, it is characterized in that, also including Pre-Evaluation unit, it is configurable for:
Before the second extension name modification unit is performed, extension name of the second control code of foundation to some first sub- compressed package files
Number order carry out pre- modification;
Contrast the extension name of number order and some second sub- compressed package files of the extension name of some first sub- compressed package files
Number order;If both are identical, the second control code is changed according to default alteration ruler, the second extension name is reinformed afterwards
Modification unit is performed;If both are different, notify that the second extension name is directly performed.
8. a kind of data decryption system, it is characterized in that, including:
First decompression unit, is configurable for obtaining using the final of the data encryption system generation described in claim 5
Simulated papers, and decompressed and be condensed to some second sub- compressed package files;
First decryption unit, is configurable for reversing code, the extension to some second sub- compressed package files using second
The number order of name is exchanged, to generate some first sub- compressed package files with new number order;
Second decompression unit, is configurable for decompressing some first sub- compressed package files, to obtain
One simulated papers;
Second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is repaiied
Change, to obtain original document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174241.1A CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174241.1A CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106790302A true CN106790302A (en) | 2017-05-31 |
CN106790302B CN106790302B (en) | 2019-08-20 |
Family
ID=58967226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710174241.1A Active CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790302B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763969A (en) * | 2018-08-03 | 2018-11-06 | 深圳市销邦科技股份有限公司 | A kind of method and system ensureing PSAM card data safeties |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280298A1 (en) * | 2005-05-25 | 2006-12-14 | Hauge Raymond C | Rotation of keys during encryption/decryption |
CN101056252A (en) * | 2007-06-07 | 2007-10-17 | 中兴通讯股份有限公司 | Transmission method of compression file |
CN101655877A (en) * | 2008-10-14 | 2010-02-24 | 北京大学 | Method and device for packing and extracting files |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103152327A (en) * | 2013-02-01 | 2013-06-12 | 北京奇虎科技有限公司 | Configuration method, client and system for plug-in unit compressing and uncompressing |
CN103324623A (en) * | 2012-03-21 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data batch operating method |
-
2017
- 2017-03-22 CN CN201710174241.1A patent/CN106790302B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280298A1 (en) * | 2005-05-25 | 2006-12-14 | Hauge Raymond C | Rotation of keys during encryption/decryption |
CN101056252A (en) * | 2007-06-07 | 2007-10-17 | 中兴通讯股份有限公司 | Transmission method of compression file |
CN101655877A (en) * | 2008-10-14 | 2010-02-24 | 北京大学 | Method and device for packing and extracting files |
CN103324623A (en) * | 2012-03-21 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data batch operating method |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103152327A (en) * | 2013-02-01 | 2013-06-12 | 北京奇虎科技有限公司 | Configuration method, client and system for plug-in unit compressing and uncompressing |
Non-Patent Citations (3)
Title |
---|
曲国军等: "利用RAR压缩软件备份和恢复文件", 《电脑学习》 * |
汤大立等: "WebGIS海量数据分卷压缩传输方法的设计与实现", 《计算机时代》 * |
陈勇等: "基于压缩的代码保护的低开销策略", 《计算机科学》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763969A (en) * | 2018-08-03 | 2018-11-06 | 深圳市销邦科技股份有限公司 | A kind of method and system ensureing PSAM card data safeties |
Also Published As
Publication number | Publication date |
---|---|
CN106790302B (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9275250B2 (en) | Searchable encryption processing system | |
CN103455764B (en) | A kind of file encryption based on file division folding and decryption system | |
US8533470B2 (en) | Segmented mapping | |
KR970064059A (en) | Data encryption method and device | |
CN107786331A (en) | Data processing method, device, system and computer-readable recording medium | |
CN1941691B (en) | Apparatus and method for generating data for detecting false alteration of encrypted data during processing | |
CN102811212A (en) | Data encryption method with repetitive data deleting function and system thereof | |
CN107302706A (en) | Image anti-stealing link method, device and electronic equipment | |
CN112491832B (en) | File transmission method and device | |
CN106131049A (en) | A kind of method of data transmission encryption and decryption | |
CN106844599B (en) | A kind of personalized privacy information search method based on data mapping | |
CN113630250B (en) | Model training method and system based on data encryption | |
CN106790302A (en) | Data ciphering method, data decryption method and system | |
CN104794243B (en) | Third party's cipher text retrieval method based on filename | |
CN104252604B (en) | Database based building block system type dynamic encryption method | |
TWI664849B (en) | Method, computer program product and processing system for generating secure alternative representation | |
CN104780038B (en) | A kind of distributed collaboration encryption method and device | |
US20180019977A1 (en) | Multi-layered data security | |
CN107577952A (en) | A kind of generation method of examining report and generation system | |
JP4194481B2 (en) | Secret information storage processing method, secret information storage device, secret information restoration processing method, and secret information restoration device | |
CN107580027A (en) | A kind of cloud data processing stocking system | |
JP2013167865A (en) | Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program | |
CN105263137A (en) | Data encryption method and data encryption system | |
CN110795726A (en) | Password protection method and system based on artificial neural network | |
US20190190709A1 (en) | Searchable Symmetric Encryption System and Method of Processing Inverted Index |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |