CN106790302A - Data ciphering method, data decryption method and system - Google Patents

Data ciphering method, data decryption method and system Download PDF

Info

Publication number
CN106790302A
CN106790302A CN201710174241.1A CN201710174241A CN106790302A CN 106790302 A CN106790302 A CN 106790302A CN 201710174241 A CN201710174241 A CN 201710174241A CN 106790302 A CN106790302 A CN 106790302A
Authority
CN
China
Prior art keywords
sub
code
compressed package
extension name
package files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710174241.1A
Other languages
Chinese (zh)
Other versions
CN106790302B (en
Inventor
张锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI UNIS STORAGE SYSTEM Co Ltd
Original Assignee
WUXI UNIS STORAGE SYSTEM Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI UNIS STORAGE SYSTEM Co Ltd filed Critical WUXI UNIS STORAGE SYSTEM Co Ltd
Priority to CN201710174241.1A priority Critical patent/CN106790302B/en
Publication of CN106790302A publication Critical patent/CN106790302A/en
Application granted granted Critical
Publication of CN106790302B publication Critical patent/CN106790302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a kind of data ciphering method, data decryption method and system, encryption method includes:The first control code in S1, the definition sequence of foundation user input, is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers by the extension name of original document;S2, perform complete S1 after, according to original document extension name type generation first reverse code;S3, by the compression of the first simulated papers and bundling into some first sub- compressed package files;The second control code in S4, the definition sequence of foundation user input, the number order to the extension name of some first sub- compressed package files is exchanged, to generate some second sub- compressed package files with new number order;S5, after performing and completing S4, according to the second control code, generation second reverses code;S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.The present invention can be encrypted to the data of user, and security is higher.

Description

Data ciphering method, data decryption method and system
Technical field
The invention belongs to encryption technology field, more specifically, it relates to a kind of data ciphering method, data decryption method And system.
Background technology
With continuing to develop for Internet technology, in the application process of internet, cloud storage technology has spread to people Daily life and work in the middle of.Such as conventional at present some cloud disks, it is passed the file of oneself by way of uploading To the database on backstage.User after cloud disk is signed in, can only could also get the data of oneself upload from database, its His user, when the account number cipher of the user is not grasped, is the file that cannot directly go to obtain the user;Thus, from certain journey For on degree, data are deposited into cloud disk, security is of a relatively high.But, this security is also relative, and it can Limited between users, but for the back-stage management personnel of cloud disk, it can be browsed by back-stage management software appoints The data of what user, if the data that user uploads are easy to by the back-stage management people of cloud disk not by any encryption Member's direct access.
The content of the invention
In view of the shortcomings of the prior art, first purpose of the invention is to provide a kind of data ciphering method, energy Enough data to user are encrypted, and security is higher.
To achieve the above object, the invention provides following technical scheme:
A kind of data ciphering method, including:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text The incoherent other types of extension name of part, to generate the first simulated papers;
S2, perform complete S1 after, according to original document extension name type generation first reverse code;
S3, by first simulated papers compression and bundling into some first sub- compressed package files;
The second control code in S4, the definition sequence of foundation user input, the extension to some first sub- compressed package files The number order of name is exchanged, to generate some second sub- compressed package files with new number order;
S5, after performing and completing S4, according to the second control code, generation second reverses code;
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
Preferably, also include:
S7, the first reverse code, the second reverse code are packaged as a text, and are deposited into default store path.
Preferably, in step s 4, Pre-Evaluation also is carried out to the second control code, including:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files;
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If both phases Together, then the second control code is changed according to default alteration ruler;
S43, re-execute S4.
Second object of the present invention is to provide a kind of data decryption method, can be no more than preset value to original document Final simulated papers be decrypted.
To achieve the above object, the invention provides following technical scheme:
A1, final simulated papers using the data ciphering method generation described in claim 1 are obtained, and if decompressed and be condensed to Dry second sub- compressed package files;
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files exchanges, with Some first sub- compressed package files of the generation with new number order;
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers;
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
Third object of the present invention is to provide a kind of data encryption system, and the data of user can be encrypted, And security is higher.
To achieve the above object, the invention provides following technical scheme:
A kind of data encryption system, it is characterized in that, including:
First extension name changes unit, the first control code in the definition sequence according to user input is configurable for, by original The extension name of beginning file is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for reversing code according to the extension name type generation first of original document;
First compressing file unit, is configurable for compressing first simulated papers and bundling compresses into some first sons APMB package;
Second extension name changes unit, the second control code in the definition sequence according to user input is configurable for, to institute The number order for stating the extension name of some first sub- compressed package files is exchanged, some with new number order to generate Second sub- compressed package files;
Second reverses code generation unit, is configurable for according to the second control code, and generation second reverses code;
Second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file, with Generate final simulated papers.
Preferably, also include:
Memory cell, is configurable for that the first reverse code, the second reverse code are packaged as a text, and are deposited into Default store path.
Preferably, also it is configurable for including Pre-Evaluation unit:
Before the second extension name modification unit is performed, extension name of the second control code of foundation to some first sub- compressed package files Number order carry out pre- modification;
Contrast the extension name of number order and some second sub- compressed package files of the extension name of some first sub- compressed package files Number order;If both are identical, the second control code is changed according to default alteration ruler, the second extension name is reinformed afterwards Modification unit is performed;If both are different, notify that the second extension name is directly performed.
Fourth object of the present invention is to provide a kind of data decryption system, can be final to what is produced by said apparatus Simulated papers are decrypted.
To achieve the above object, the invention provides following technical scheme:
A kind of data decryption system, including:
First decompression unit, is configurable for obtaining using the final of the data encryption system generation described in claim 5 Simulated papers, and decompressed and be condensed to some second sub- compressed package files;
First decryption unit, is configurable for reversing code, the extension to some second sub- compressed package files using second The number order of name is exchanged, to generate some first sub- compressed package files with new number order;
Second decompression unit, is configurable for decompressing some first sub- compressed package files, to obtain One simulated papers;
Second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is repaiied Change, to obtain original document.
Compared with prior art, the beneficial effects of the invention are as follows:
The first control code, the second control code included in definition sequence of the present invention based on user input, to the original of user File is extended the operations such as name modification, compression decomposition, ultimately generates the simulated papers with tight security;And then do not knowing On the premise of the definition sequence that user is input into, it is difficult to crack the final simulated papers.
When user needs to decrypt the definitive document, it is only necessary to be input into this definition sequence again, decryption system can basis This definition sequence is decrypted to final simulated papers.
Brief description of the drawings
Fig. 1 is the flow chart of data ciphering method in embodiment 1;
Fig. 2 is the flow chart of data decryption method in 2 in embodiment.
Specific embodiment
With reference to embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not It is only limitted to this.
Embodiment 1:
The present embodiment provides a kind of data ciphering method, as shown in figure 1, the method includes:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text The incoherent other types of extension name of part, to generate the first simulated papers.
Above-mentioned definition sequence contains two control codes, respectively the first control code, the second control code;Wherein, first Control code is made up of the numeral of some, for example " 313 ", its represent be numerous types extension name in certain type expansion Exhibition name, i.e., be numbered to each extension name in advance;Such as digital " 313 ", representative is " .jpg ", then by original document Extension name is revised as " .jpg ".
S2, perform complete S1 after, according to original document extension name type generation first reverse code.
After modification is completed, generation corresponding first can be pointed to according to the modification and reverse code, the first reverse code is original The extension of the numbering of the extension name of beginning file, such as original document is entitled " .txt ", and the numbering of " .txt " is " 241 ", then and One reverses code for " 241 ".Second control code will be illustrated in following S3.
S3, by first simulated papers compression and bundling into some first sub- compressed package files.
At present as conventional tool of compression, such as " WINRAR ", " good pressure " etc. are provided with the function, i.e., to certain text When part is compressed, the file bundling that will optionally be compressed is some sub- compressed package files;It is some after the completion of compression The extension name of individual sub- compressed package files is arranged in a certain order, for example " .z01 ", " .z02 ", " .z03 " ..., " .zip ", and each file filename all same, user decompression when, only all of sub- compressed package need to be placed on together One file.
In the present embodiment, the first simulated papers are compressed and divided using with method as above-mentioned enumerated software class Volume, but it should be recognized that after the completion of bundling, by the expansion of the first sub- compressed package files of last extension entitled " .zip " Exhibition name is remodified in sequence, and for example this document is the 5th file, then extend entitled " .z05 ".
The second control code in S4, the definition sequence of foundation user input, to some first sub- compressed package files The number order of extension name is exchanged, to generate some second sub- compressed package files with new number order.
Second control code is made up of some bit digitals, the first sub- compressed package that digit goes out depending on institute's bundling in step S2 The quantity of file;As a example by 5, then the quantity of the permutation and combination of numeral 1-5 is 120 to the present embodiment, then according to certain rule Rule, this 120 combinations are numbered respectively;In this way, the control code is 3 digits.According to the control code, to original some first sons The naming order of compressed package files is rearranged.
Before step S4 execution, Pre-Evaluation is also carried out to the second control code, the specific method of Pre-Evaluation includes:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files.
Above-mentioned pre- modification process is:First localling create the first authentic copy file of some first sub- compressed package files(Expand Exhibition name is constant, and filename unification changes), some first authentic copy files are modified according to the second control code then;Modification Triplicate file is generated afterwards.
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If two Person is identical, then change the second control code according to default alteration ruler.
The rule of modification is:Each bit digital to original second control code adds 1.
S43, re-execute S4.
S5, after performing and completing S4, according to the second control code, generation second reverses code.
After the completion of arrangement, generation second reverses code, such as be " 1,2,3,4,5 " before arranging, and its numbering is " 001 ";Arrangement Essence order afterwards is " 4,2,5,1,3 ", and its numbering is " 098 ";I.e. the second control code of user input is " 098 ", and second is inverse Transcoding is also " 098 ".
After generation second reverses code, the first reverse code, the second reverse code are packaged as a text, and be stored in To default store path.
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
The final simulated papers of generation, by user may finally upload to cloud disk or be deposited into other storage regions;It is above-mentioned First reverse code, second reverse code together constitute decruption key, by the decruption key, final simulated papers can be carried out Decryption.
Embodiment 2:
The present embodiment provides a kind of data decryption method, and it is corresponding with the data ciphering method in embodiment 1;Reference picture 2, the party Method includes:
A1, the final simulated papers generated by the data ciphering method in embodiment 1 are obtained, and decompressed and be condensed to some second Sub- compressed package files.
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files adjusts Change, to generate some first sub- compressed package files with new number order.
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers.
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
Embodiment 3:
The present embodiment provides a kind of data encryption system, for realizing the data ciphering method in embodiment 1;The system includes:
1st, the first extension name modification unit, is configurable for the first control code in the definition sequence according to user input, will The extension name of original document is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers.
The system is the special original document buffer area of user configuring one(The local storage region of PC), for right When original document is operated, original document is first backed up into the original document buffer area.
The first extension name amendment unit is configured with the first alteration ruler database, after user input defines sequence, the One extension name modification unit identifies the first control code from this definition sequence, then according to the first control code in the first modification rule Then matched in database, to match corresponding alteration ruler, the finally extension according to the alteration ruler to original document Name is modified.
2nd, first code generation unit is reversed, is configurable for being reversed according to the extension name type generation first of original document Code.
First reverse code generation unit is configured with Pre-Evaluation unit, and the Pre-Evaluation unit is configured in the second extension Before name modification unit is performed, the number order of the extension name of some first sub- compressed package files is carried out according to the second control code Pre- modification;And contrast the number order and some second sub- compressed package files of the extension name of some first sub- compressed package files The number order of extension name;If both are identical, the second control code is changed according to default alteration ruler, second is reinformed afterwards Extension name modification unit is performed;If both are different, notify that the second extension name is directly performed.
3rd, the first compressing file unit, is configurable for first simulated papers compression and bundling into some first Sub- compressed package files.
4th, the second extension name modification unit, is configurable for the second control in the definition sequence according to user input Code, the number order to the extension name of some first sub- compressed package files is exchanged, suitable with new numbering to generate Some second sub- compressed package files of sequence;
5th, second code generation unit is reversed, is configurable for according to the second control code, generation second reverses code;
6th, the second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file, To generate final simulated papers.
7th, memory cell, is configurable for for the first reverse code, the second reverse code being packaged as a text, and It is deposited into default store path.
The default store path be generally original document where store path, to facilitate user to search.
Embodiment 4:
The present embodiment provides a kind of data decryption system, and it is corresponding with the data encryption system in embodiment 3, for carrying out data Decryption, the system includes:
1st, the first decompression unit, is configurable for obtaining the final puppet using the data encryption system generation in embodiment 4 Dress file, and decompressed and be condensed to some second sub- compressed package files.
User needs to imported into the final simulated papers in the system, and after importing, the first decompression unit is immediately to it Decompressed, the file that solution is extruded is deposited into and is configured in local memory block.
2nd, the first decryption unit, is configurable for reversing code using second, to some second sub- compressed package files The number order of extension name exchanged, to generate some first sub- compressed package files with new number order.
User reverses code, the second text for reversing code to generate with before importing this by the importing interface of system configuration by first Presents;First decryption unit identifies the first reverse code from this article presents(Former positions are recognized according to predetermined rule Number), the second sub- compressed package files are operated again then.
3rd, the second decompression unit, is configurable for decompressing some first sub- compressed package files, with Obtain the first simulated papers;
4th, the second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is carried out Modification, to obtain original document.
After user imports text in importing interface before, the second decryption unit also can be identified therefrom simultaneously First reverses code(According to several digits after predetermined rule identification), the first simulated papers are operated again then.Operation is completed Afterwards, the store path of the original document of generation is identical with the first simulated papers, to facilitate user to search.

Claims (8)

1. a kind of data ciphering method, it is characterized in that, including:
The first control code in S1, the definition sequence of foundation user input, the extension name of original document is revised as and compression text The incoherent other types of extension name of part, to generate the first simulated papers;
S2, perform complete S1 after, according to original document extension name type generation first reverse code;
S3, by first simulated papers compression and bundling into some first sub- compressed package files;
The second control code in S4, the definition sequence of foundation user input, the extension to some first sub- compressed package files The number order of name is exchanged, to generate some second sub- compressed package files with new number order;
S5, after performing and completing S4, according to the second control code, generation second reverses code;
S6, some second sub- compressed package files are compressed into a file, to generate final simulated papers.
2. data ciphering method according to claim 1, it is characterized in that, also include:
S7, the first reverse code, the second reverse code are packaged as a text, and are deposited into default store path.
3. data ciphering method according to claim 1, it is characterized in that, in step s 4, also the second control code is carried out Pre-Evaluation, including:
S41, the second control code of foundation carry out pre- modification to the number order of the extension name of some first sub- compressed package files;
S42, the number order for contrasting some first sub- compressed package files preceding and pre- amended extension name of pre- modification;If both phases Together, then the second control code is changed according to default alteration ruler;
S43, re-execute S4.
4. a kind of data decryption method, it is characterized in that, including:
A1, final simulated papers using the data ciphering method generation described in claim 1 are obtained, and if decompressed and be condensed to Dry second sub- compressed package files;
A2, code is reversed using second, the number order to the extension name of some second sub- compressed package files exchanges, with Some first sub- compressed package files of the generation with new number order;
A3, some first sub- compressed package files are decompressed, to obtain the first simulated papers;
A4, using first reverse code, the extension name to first simulated papers is modified, to obtain original document.
5. a kind of data encryption system, it is characterized in that, including:
First extension name changes unit, the first control code in the definition sequence according to user input is configurable for, by original The extension name of beginning file is revised as other types of extension name incoherent with compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for reversing code according to the extension name type generation first of original document;
First compressing file unit, is configurable for compressing first simulated papers and bundling compresses into some first sons APMB package;
Second extension name changes unit, the second control code in the definition sequence according to user input is configurable for, to institute The number order for stating the extension name of some first sub- compressed package files is exchanged, some with new number order to generate Second sub- compressed package files;
Second reverses code generation unit, is configurable for according to the second control code, and generation second reverses code;
Second compressing file unit, is configurable for for some second sub- compressed package files being compressed into a file, with Generate final simulated papers.
6. data ciphering method according to claim 5, it is characterized in that, also include:
Memory cell, is configurable for that the first reverse code, the second reverse code are packaged as a text, and are deposited into Default store path.
7. data ciphering method according to claim 5, it is characterized in that, also including Pre-Evaluation unit, it is configurable for:
Before the second extension name modification unit is performed, extension name of the second control code of foundation to some first sub- compressed package files Number order carry out pre- modification;
Contrast the extension name of number order and some second sub- compressed package files of the extension name of some first sub- compressed package files Number order;If both are identical, the second control code is changed according to default alteration ruler, the second extension name is reinformed afterwards Modification unit is performed;If both are different, notify that the second extension name is directly performed.
8. a kind of data decryption system, it is characterized in that, including:
First decompression unit, is configurable for obtaining using the final of the data encryption system generation described in claim 5 Simulated papers, and decompressed and be condensed to some second sub- compressed package files;
First decryption unit, is configurable for reversing code, the extension to some second sub- compressed package files using second The number order of name is exchanged, to generate some first sub- compressed package files with new number order;
Second decompression unit, is configurable for decompressing some first sub- compressed package files, to obtain One simulated papers;
Second decryption unit, is configurable for reversing code using first, and the extension name to first simulated papers is repaiied Change, to obtain original document.
CN201710174241.1A 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system Active CN106790302B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710174241.1A CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710174241.1A CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Publications (2)

Publication Number Publication Date
CN106790302A true CN106790302A (en) 2017-05-31
CN106790302B CN106790302B (en) 2019-08-20

Family

ID=58967226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710174241.1A Active CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Country Status (1)

Country Link
CN (1) CN106790302B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763969A (en) * 2018-08-03 2018-11-06 深圳市销邦科技股份有限公司 A kind of method and system ensureing PSAM card data safeties

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280298A1 (en) * 2005-05-25 2006-12-14 Hauge Raymond C Rotation of keys during encryption/decryption
CN101056252A (en) * 2007-06-07 2007-10-17 中兴通讯股份有限公司 Transmission method of compression file
CN101655877A (en) * 2008-10-14 2010-02-24 北京大学 Method and device for packing and extracting files
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
CN103324623A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data batch operating method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280298A1 (en) * 2005-05-25 2006-12-14 Hauge Raymond C Rotation of keys during encryption/decryption
CN101056252A (en) * 2007-06-07 2007-10-17 中兴通讯股份有限公司 Transmission method of compression file
CN101655877A (en) * 2008-10-14 2010-02-24 北京大学 Method and device for packing and extracting files
CN103324623A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data batch operating method
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
曲国军等: "利用RAR压缩软件备份和恢复文件", 《电脑学习》 *
汤大立等: "WebGIS海量数据分卷压缩传输方法的设计与实现", 《计算机时代》 *
陈勇等: "基于压缩的代码保护的低开销策略", 《计算机科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763969A (en) * 2018-08-03 2018-11-06 深圳市销邦科技股份有限公司 A kind of method and system ensureing PSAM card data safeties

Also Published As

Publication number Publication date
CN106790302B (en) 2019-08-20

Similar Documents

Publication Publication Date Title
US9275250B2 (en) Searchable encryption processing system
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
US8533470B2 (en) Segmented mapping
KR970064059A (en) Data encryption method and device
CN107786331A (en) Data processing method, device, system and computer-readable recording medium
CN1941691B (en) Apparatus and method for generating data for detecting false alteration of encrypted data during processing
CN102811212A (en) Data encryption method with repetitive data deleting function and system thereof
CN107302706A (en) Image anti-stealing link method, device and electronic equipment
CN112491832B (en) File transmission method and device
CN106131049A (en) A kind of method of data transmission encryption and decryption
CN106844599B (en) A kind of personalized privacy information search method based on data mapping
CN113630250B (en) Model training method and system based on data encryption
CN106790302A (en) Data ciphering method, data decryption method and system
CN104794243B (en) Third party's cipher text retrieval method based on filename
CN104252604B (en) Database based building block system type dynamic encryption method
TWI664849B (en) Method, computer program product and processing system for generating secure alternative representation
CN104780038B (en) A kind of distributed collaboration encryption method and device
US20180019977A1 (en) Multi-layered data security
CN107577952A (en) A kind of generation method of examining report and generation system
JP4194481B2 (en) Secret information storage processing method, secret information storage device, secret information restoration processing method, and secret information restoration device
CN107580027A (en) A kind of cloud data processing stocking system
JP2013167865A (en) Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program
CN105263137A (en) Data encryption method and data encryption system
CN110795726A (en) Password protection method and system based on artificial neural network
US20190190709A1 (en) Searchable Symmetric Encryption System and Method of Processing Inverted Index

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant