CN106790302B - Data ciphering method, data decryption method and system - Google Patents
Data ciphering method, data decryption method and system Download PDFInfo
- Publication number
- CN106790302B CN106790302B CN201710174241.1A CN201710174241A CN106790302B CN 106790302 B CN106790302 B CN 106790302B CN 201710174241 A CN201710174241 A CN 201710174241A CN 106790302 B CN106790302 B CN 106790302B
- Authority
- CN
- China
- Prior art keywords
- sub
- several
- compressed package
- code
- extension name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data ciphering method, data decryption method and systems, encryption method includes: S1, according to the first control code in the definition sequence of user's input, by the extension name of original document be revised as with the incoherent other types of extension name of compressed file, to generate the first simulated papers;S2, extension name type generation the first reverse code after executing completion S1, according to original document;S3, by the first simulated papers compression and bundling at the several first sub- compressed package files;The second control code in S4, the definition sequence inputted according to user, exchanges the number order of the extension name of the several first sub- compressed package files, to generate several second sub- compressed package files with new number order;S5, after executing and completing S4, according to the second control code, generate second and reverse code;S6, the several second sub- compressed package files are compressed into a file, to generate final simulated papers.The present invention can encrypt the data of user, and safety is higher.
Description
Technical field
The invention belongs to encryption technology fields, more specifically, it relates to a kind of data ciphering method, data decryption method
And system.
Background technique
With the continuous development of Internet technology, in the application process of internet, cloud storage technology has spread to people
Daily life and work in.Such as currently used some cloud disks are passed the file of oneself by way of upload
To the database on backstage.User also can only could get the data of oneself upload after logging on to cloud disk from database,
His user is the file that can not directly go to obtain the user when not grasping the account number cipher of the user;Thus, from certain journey
For on degree, data are deposited into cloud disk, safety is relatively high.But this safety is also only opposite, it can
It is limited between users, but for the backstage manager of cloud disk, can be browsed and be appointed by back-stage management software
The data of what user are easy to if the data that user uploads do not pass through any encryption by the back-stage management people of cloud disk
Member directly acquires.
Summary of the invention
In view of the deficienciess of the prior art, the first purpose of this invention is to provide a kind of data ciphering method, energy
It is enough that the data of user are encrypted, and safety is higher.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data ciphering method, comprising:
The first control code in S1, the definition sequence inputted according to user, the extension name of original document is revised as and is pressed
The incoherent other types of extension name of contracting file, to generate the first simulated papers;
S2, extension name type generation the first reverse code after executing completion S1, according to original document;
S3, by first simulated papers compression and bundling at the several first sub- compressed package files;
The second control code in S4, the definition sequence inputted according to user, to several first sub- compressed package files
The number order of extension name is exchanged, to generate several second sub- compressed package files with new number order;
S5, after executing and completing S4, according to the second control code, generate second and reverse code;
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
Preferably, further includes:
S7, the first reverse code, the second reverse code are packaged as a text file, and are deposited into preset storage road
Diameter.
Preferably, in step s 4, Pre-Evaluation also is carried out to the second control code, comprising:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code;
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If two
Person is identical, then modifies the second control code according to preset alteration ruler;
S43, S4 is re-executed.
Second object of the present invention is to provide a kind of data decryption method, can be no more than preset value to original document
Final simulated papers be decrypted.
To achieve the above object, the present invention provides the following technical scheme that
A1, the final simulated papers generated using data ciphering method described in claim 1 are obtained, and is decompressed
For the several second sub- compressed package files;
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is adjusted
It changes, to generate several first sub- compressed package files with new number order;
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers;
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
Third object of the present invention is to provide a kind of data encryption system, can encrypt to the data of user,
And safety is higher.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data encryption system, characterized in that include:
First extension name modifies unit, the first control code being configurable in the definition sequence according to user's input,
By the extension name of original document be revised as with the incoherent other types of extension name of compressed file, with generate first camouflage text
Part;
First reverses code generation unit, is configurable for generating the first reverse according to the extension name type of original document
Code;
First compressing file unit is configurable for compressing first simulated papers and bundling is at several first sons
Compressed package files;
Second extension name modifies unit, the second control code being configurable in the definition sequence according to user's input,
The number order of the extension name of several first sub- compressed package files is exchanged, there is new number order to generate
Several second sub- compressed package files;
Second reverses code generation unit, is configurable for generating second according to the second control code and reversing code;
Second compressing file unit is configurable for several second sub- compressed package files being compressed into a text
Part, to generate final simulated papers.
Preferably, further includes:
Storage unit is configurable for that the first reverse code, the second reverse code are packaged as a text file, and are deposited
Enter to preset store path.
Preferably, further include Pre-Evaluation unit, be configurable for:
Expansion before the second extension name modification unit executes, according to the second control code to the several first sub- compressed package files
The number order of exhibition name is modified in advance;
Compare the number order of the extension name of the several first sub- compressed package files and the expansion of the several second sub- compressed package files
Open up the number order of name;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms the second expansion later
Name modification unit is opened up to execute;If the two is different, the second extension name is notified directly to execute.
Fourth object of the present invention is to provide a kind of data decryption system, can be final to being generated by above-mentioned apparatus
Simulated papers are decrypted.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data decryption system, comprising:
First decompression unit is configurable for what acquisition was generated using data encryption system described in claim 5
Final simulated papers, and decompressed and be condensed to the several second sub- compressed package files;
First decryption unit is configurable for reversing code using second, to several second sub- compressed package files
The number order of extension name is exchanged, to generate several first sub- compressed package files with new number order;
Second decompression unit is configurable for unziping it several first sub- compressed package files, to obtain
Take the first simulated papers;
Second decryption unit is configurable for reversing code using first, to the extension name of first simulated papers into
Row modification, to obtain original document.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is based on the first control codes, the second control code included in the definition sequence of user's input, to user's
The operations such as original document is extended name modification, compression is decomposed, ultimately generate the simulated papers with tight security;And then
Under the premise of not knowing the definition sequence that user is inputted, it is difficult to crack the final simulated papers.
When user needs to decrypt the definitive document, it is only necessary to input this definition sequence again, decryption system can basis
Final simulated papers are decrypted in this definition sequence.
Detailed description of the invention
Fig. 1 is the flow chart of data ciphering method in embodiment 1;
Fig. 2 is the flow chart of data decryption method in 2 in embodiment.
Specific embodiment
Below with reference to examples and drawings, the present invention is described in further detail, but embodiments of the present invention are not
It is only limitted to this.
Embodiment 1:
The present embodiment provides a kind of data ciphering methods, as shown in Figure 1, this method comprises:
The first control code in S1, the definition sequence inputted according to user, the extension name of original document is revised as and is pressed
The incoherent other types of extension name of contracting file, to generate the first simulated papers.
Above-mentioned definition sequence contains two control codes, respectively the first control code, the second control code;Wherein, first
Control code is made of several numbers, such as " 313 ", and what is represented is the expansion of some type in the extension name of numerous types
Name is opened up, i.e., each extension name is numbered in advance;Such as it is digital " 313 ", representative is " .jpg ", then by original document
Extension name is revised as " .jpg ".
S2, extension name type generation the first reverse code after executing completion S1, according to original document.
After completing to modify, it can be directed toward generation corresponding first according to the modification and reverse code, which is original
The number of the extension name of beginning file, such as the extension of original document are entitled " .txt ", and the number of " .txt " is " 241 ", then and
One reverses code for " 241 ".Second control code will be illustrated in following S3.
S3, by first simulated papers compression and bundling at the several first sub- compressed package files.
At present as common tool of compression, such as " WINRAR ", " good pressure " etc., it is provided with the function, i.e., to some text
It is optionally several sub- compressed package files by compressed file bundling when part is compressed;It is several after the completion of compression
The extension name of a sub- compressed package files arranges in a certain order, for example, " .z01 ", " .z02 ", " .z03 " ...,
" .zip ", and the filename of each file is all the same, and all sub- compressed packages need to be only placed on together by user in decompression
One file.
In the present embodiment, the first simulated papers are compressed and divided using with method as above-mentioned enumerated software class
Volume, but it should be recognized that after the completion of bundling, by the expansion of the first sub- compressed package files of the last one extension entitled " .zip "
Exhibition name is remodified in sequence, such as this document is the 5th file, then extends entitled " .z05 ".
The second control code in S4, the definition sequence inputted according to user, to several first sub- compressed package files
The number order of extension name is exchanged, to generate several second sub- compressed package files with new number order.
Second control code is made of several bit digitals, and digit depends on the first sub- compressed package that institute's bundling goes out in step S2
The quantity of file;The present embodiment is for 5, then the quantity of the permutation and combination of number 1-5 is 120, then according to certain rule
Rule, this 120 combinations are numbered respectively;In this way, the control code is 3 digits.According to the control code, to original several first sons
The naming order of compressed package files is rearranged.
Before step S4 execution, Pre-Evaluation also is carried out to the second control code, the specific method of Pre-Evaluation includes:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code.
Above-mentioned pre- modification process are as follows: first (expand in the first authentic copy file for localling create the several first sub- compressed package files
It is constant to open up name, filename is unified to be changed), then modify according to the second control code to several first authentic copy files;Modification
Triplicate file is generated afterwards.
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If two
Person is identical, then modifies the second control code according to preset alteration ruler.
The rule of modification are as follows: 1 is added to each bit digital of original second control code.
S43, S4 is re-executed.
S5, after executing and completing S4, according to the second control code, generate second and reverse code.
After the completion of arrangement, generates second and reverse code, such as it is " 1,2,3,4,5 " that arrangement is preceding, number is " 001 ";Arrangement
Essence sequence afterwards is " 4,2,5,1,3 ", and number is " 098 ";That is the second control code of user's input is " 098 ", and second is inverse
Transcoding is also " 098 ".
After generation second reverses code, the first reverse code, the second reverse code are packaged as a text file, and be stored in
To preset store path.
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
The final simulated papers generated, cloud disk may finally be uploaded to by user or is deposited into other storage regions;It is above-mentioned
First reverse code, second reverse code together constitute decruption key, by the decruption key, final simulated papers can be carried out
Decryption.
Embodiment 2:
The present embodiment provides a kind of data decryption methods, corresponding with the data ciphering method in embodiment 1;Reference Fig. 2,
This method comprises:
A1, obtain by embodiment 1 data ciphering method generate final simulated papers, and decompressed be condensed to it is several
Second sub- compressed package files.
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is adjusted
It changes, to generate several first sub- compressed package files with new number order.
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers.
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
Embodiment 3:
The present embodiment provides a kind of data encryption systems, for realizing the data ciphering method in embodiment 1;The system packet
It includes:
1, the first extension name modifies unit, the first control being configurable in the definition sequence according to user's input
Code, by the extension name of original document be revised as with the incoherent other types of extension name of compressed file, with generate first camouflage
File.
This system is user configuration one dedicated original document buffer area (local storage region of PC machine), for right
When original document is operated, original document is first backed up into the original document buffer area.
First extension name modifies unit and is configured with the first alteration ruler database, after user, which inputs, defines sequence, the
One extension name modification unit identifies the first control code from this definition sequence, is then advised according to the first control code in the first modification
Then matched in database, to match corresponding alteration ruler, the finally extension according to the alteration ruler to original document
Name is modified.
2, first code generation unit is reversed, is configurable for generating the first reverse according to the extension name type of original document
Code.
First reverses code generation unit to be configured with Pre-Evaluation unit, which is configured in the second extension
Before name modification unit executes, carried out according to number order of second control code to the extension name of the several first sub- compressed package files
Pre- modification;And compare the number order and the several second sub- compressed package files of the extension name of several first sub- compressed package files
The number order of extension name;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms second later
Extension name is modified unit and is executed;If the two is different, the second extension name is notified directly to execute.
3, the first compressing file unit is configurable for compressing first simulated papers and bundling is at several first
Sub- compressed package files.
4, the second extension name modifies unit, the second control being configurable in the definition sequence according to user's input
Code, exchanges the number order of the extension name of several first sub- compressed package files, has new number suitable to generate
Several second sub- compressed package files of sequence;
5, second code generation unit is reversed, is configurable for generating second according to the second control code and reversing code;
6, the second compressing file unit is configurable for several second sub- compressed package files being compressed into a text
Part, to generate final simulated papers.
7, storage unit is configurable for the first reverse code, the second reverse code being packaged as a text file, and
It is deposited into preset store path.
The preset store path is generally the store path where original document, to facilitate user to search.
Embodiment 4:
The present embodiment provides a kind of data decryption systems, corresponding with the data encryption system in embodiment 3, for carrying out
The decryption of data, the system include:
1, the first decompression unit is configurable for obtaining using the data encryption system generation in embodiment 4 most
Whole simulated papers, and decompressed and be condensed to the several second sub- compressed package files.
User needs for the final simulated papers to imported into this system, and after importing, the first decompression unit is immediately to it
It is decompressed, the file for solving extrusion, which is deposited into, to be configured in local memory block.
2, the first decryption unit is configurable for reversing code using second, to several second sub- compressed package files
The number order of extension name exchanged, to generate several first sub- compressed package files with new number order.
The text that user reverses code, the second reverse code to generate before importing this by the importing interface of system configuration by first
This document;First decryption unit identifies that the first reverse code (identifies former positions according to scheduled rule from this article this document
Number), then the second sub- compressed package files are operated again.
3, the second decompression unit is configurable for unziping it several first sub- compressed package files, with
Obtain the first simulated papers;
4, the second decryption unit is configurable for reversing code using first, to the extension name of first simulated papers
It modifies, to obtain original document.
After user imports text file in importing interface before, the second decryption unit also can be identified therefrom simultaneously
First reverses code (according to several digits after scheduled rule identification), then operates again to the first simulated papers.Operation is completed
Afterwards, the store path of the original document of generation is identical as the first simulated papers, to facilitate user to search.
Claims (8)
1. a kind of data ciphering method, characterized in that include:
The extension name of original document is revised as and compresses text by the first control code in S1, the definition sequence inputted according to user
The incoherent other types of extension name of part, to generate the first simulated papers;
S2, extension name type generation the first reverse code after executing completion S1, according to original document;
S3, by first simulated papers compression and bundling at the several first sub- compressed package files;
The second control code in S4, the definition sequence inputted according to user, the extension to several first sub- compressed package files
The number order of name is exchanged, to generate several second sub- compressed package files with new number order;
S5, after executing and completing S4, according to the second control code, generate second and reverse code;
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
2. data ciphering method according to claim 1, characterized in that further include:
S7, the first reverse code, the second reverse code are packaged as a text file, and are deposited into preset store path.
3. data ciphering method according to claim 1, characterized in that in step s 4, also carried out to the second control code
Pre-Evaluation, comprising:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code;
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If the two phase
Together, then the second control code is modified according to preset alteration ruler;
S43, S4 is re-executed.
4. a kind of data decryption method, characterized in that include:
A1, the final simulated papers generated using data ciphering method described in claim 1 are obtained, and if being decompressed and being condensed to
Dry second sub- compressed package files;
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is exchanged, with
Generate several first sub- compressed package files with new number order;
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers;
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
5. a kind of data encryption system, characterized in that include:
First extension name modifies unit, the first control code being configurable in the definition sequence according to user's input, will be former
The extension name of beginning file be revised as with the incoherent other types of extension name of compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for generating the first reverse code according to the extension name type of original document;
First compressing file unit is configurable for compressing first simulated papers and bundling is compressed at several first sons
APMB package;
Second extension name modifies unit, the second control code being configurable in the definition sequence according to user's input, to institute
The number order for stating the extension name of the several first sub- compressed package files is exchanged, and has the several of new number order to generate
Second sub- compressed package files;
Second reverses code generation unit, is configurable for generating second according to the second control code and reversing code;
Second compressing file unit is configurable for several second sub- compressed package files being compressed into a file, with
Generate final simulated papers.
6. data encryption system according to claim 5, characterized in that further include:
Storage unit is configurable for that the first reverse code, the second reverse code are packaged as a text file, and are deposited into
Preset store path.
7. data encryption system according to claim 5, characterized in that further include Pre-Evaluation unit, be configurable for:
Before the second extension name modification unit executes, according to the second control code to the extension name of the several first sub- compressed package files
Number order modified in advance;
Compare the number order of the extension name of the several first sub- compressed package files and the extension name of the several second sub- compressed package files
Number order;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms the second extension name later
Unit is modified to execute;If the two is different, the second extension name is notified directly to execute.
8. a kind of data decryption system, characterized in that include:
First decompression unit is configurable for acquisition using the final of the generation of data encryption system described in claim 5
Simulated papers, and decompressed and be condensed to the several second sub- compressed package files;
First decryption unit is configurable for reversing code, the extension to several second sub- compressed package files using second
The number order of name is exchanged, to generate several first sub- compressed package files with new number order;
Second decompression unit is configurable for unziping it several first sub- compressed package files, to obtain
One simulated papers;
Second decryption unit is configurable for reversing code using first, repair to the extension name of first simulated papers
Change, to obtain original document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174241.1A CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174241.1A CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106790302A CN106790302A (en) | 2017-05-31 |
CN106790302B true CN106790302B (en) | 2019-08-20 |
Family
ID=58967226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710174241.1A Active CN106790302B (en) | 2017-03-22 | 2017-03-22 | Data ciphering method, data decryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790302B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763969A (en) * | 2018-08-03 | 2018-11-06 | 深圳市销邦科技股份有限公司 | A kind of method and system ensureing PSAM card data safeties |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056252A (en) * | 2007-06-07 | 2007-10-17 | 中兴通讯股份有限公司 | Transmission method of compression file |
CN101655877A (en) * | 2008-10-14 | 2010-02-24 | 北京大学 | Method and device for packing and extracting files |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103152327A (en) * | 2013-02-01 | 2013-06-12 | 北京奇虎科技有限公司 | Configuration method, client and system for plug-in unit compressing and uncompressing |
CN103324623A (en) * | 2012-03-21 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data batch operating method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8189786B2 (en) * | 2005-05-25 | 2012-05-29 | Zenith Electronics Llc | Encryption system |
-
2017
- 2017-03-22 CN CN201710174241.1A patent/CN106790302B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056252A (en) * | 2007-06-07 | 2007-10-17 | 中兴通讯股份有限公司 | Transmission method of compression file |
CN101655877A (en) * | 2008-10-14 | 2010-02-24 | 北京大学 | Method and device for packing and extracting files |
CN103324623A (en) * | 2012-03-21 | 2013-09-25 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and data batch operating method |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103152327A (en) * | 2013-02-01 | 2013-06-12 | 北京奇虎科技有限公司 | Configuration method, client and system for plug-in unit compressing and uncompressing |
Non-Patent Citations (3)
Title |
---|
WebGIS海量数据分卷压缩传输方法的设计与实现;汤大立等;《计算机时代》;20090615(第6期);全文 |
利用RAR压缩软件备份和恢复文件;曲国军等;《电脑学习》;19970630;全文 |
基于压缩的代码保护的低开销策略;陈勇等;《计算机科学》;20111130;第38卷(第11期);全文 |
Also Published As
Publication number | Publication date |
---|---|
CN106790302A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103455764B (en) | A kind of file encryption based on file division folding and decryption system | |
CN106612320B (en) | A kind of De-weight method of encryption data in cloud storage | |
TWI719635B (en) | Safe feature engineering method and device | |
US8533470B2 (en) | Segmented mapping | |
US9021259B2 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
CN112800088A (en) | Database ciphertext retrieval system and method based on bidirectional security index | |
US20130080765A1 (en) | Secure cloud storage and synchronization systems and methods | |
TW201812638A (en) | Storage design method of blockchain encrypted radio frequency chip | |
US9147079B2 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
US20220358227A1 (en) | Linking encrypted datasets using common identifiers | |
CN111079162B (en) | Data encryption method, data decryption method and data encryption system based on block chain | |
CN107408135A (en) | For carrying out the database server and client of query processing to encryption data | |
US20110289310A1 (en) | Cloud computing appliance | |
JP6137173B2 (en) | Encrypted database system, client terminal and database server, combining method and program | |
CN102724044A (en) | Electronic evidence verification and preservation method | |
US9825761B2 (en) | Systems and methods improving cryptosystems with biometrics | |
CN111242611B (en) | Method and system for recovering digital wallet key | |
CN113742764B (en) | Trusted data secure storage method, retrieval method and equipment based on block chain | |
CN102833077A (en) | Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card | |
CN106790302B (en) | Data ciphering method, data decryption method and system | |
JP2003163662A (en) | Paperless record in aircraft maintenance | |
CN111147502A (en) | Block chain file storage system and method thereof | |
CN102821110B (en) | A kind of password method for retrieving for audio/video storage device | |
CN104252604B (en) | Database based building block system type dynamic encryption method | |
CN116910820A (en) | Data report processing method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |