CN106790302B - Data ciphering method, data decryption method and system - Google Patents

Data ciphering method, data decryption method and system Download PDF

Info

Publication number
CN106790302B
CN106790302B CN201710174241.1A CN201710174241A CN106790302B CN 106790302 B CN106790302 B CN 106790302B CN 201710174241 A CN201710174241 A CN 201710174241A CN 106790302 B CN106790302 B CN 106790302B
Authority
CN
China
Prior art keywords
sub
several
compressed package
code
extension name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710174241.1A
Other languages
Chinese (zh)
Other versions
CN106790302A (en
Inventor
张锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI UNIS STORAGE SYSTEM Co Ltd
Original Assignee
WUXI UNIS STORAGE SYSTEM Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI UNIS STORAGE SYSTEM Co Ltd filed Critical WUXI UNIS STORAGE SYSTEM Co Ltd
Priority to CN201710174241.1A priority Critical patent/CN106790302B/en
Publication of CN106790302A publication Critical patent/CN106790302A/en
Application granted granted Critical
Publication of CN106790302B publication Critical patent/CN106790302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data ciphering method, data decryption method and systems, encryption method includes: S1, according to the first control code in the definition sequence of user's input, by the extension name of original document be revised as with the incoherent other types of extension name of compressed file, to generate the first simulated papers;S2, extension name type generation the first reverse code after executing completion S1, according to original document;S3, by the first simulated papers compression and bundling at the several first sub- compressed package files;The second control code in S4, the definition sequence inputted according to user, exchanges the number order of the extension name of the several first sub- compressed package files, to generate several second sub- compressed package files with new number order;S5, after executing and completing S4, according to the second control code, generate second and reverse code;S6, the several second sub- compressed package files are compressed into a file, to generate final simulated papers.The present invention can encrypt the data of user, and safety is higher.

Description

Data ciphering method, data decryption method and system
Technical field
The invention belongs to encryption technology fields, more specifically, it relates to a kind of data ciphering method, data decryption method And system.
Background technique
With the continuous development of Internet technology, in the application process of internet, cloud storage technology has spread to people Daily life and work in.Such as currently used some cloud disks are passed the file of oneself by way of upload To the database on backstage.User also can only could get the data of oneself upload after logging on to cloud disk from database, His user is the file that can not directly go to obtain the user when not grasping the account number cipher of the user;Thus, from certain journey For on degree, data are deposited into cloud disk, safety is relatively high.But this safety is also only opposite, it can It is limited between users, but for the backstage manager of cloud disk, can be browsed and be appointed by back-stage management software The data of what user are easy to if the data that user uploads do not pass through any encryption by the back-stage management people of cloud disk Member directly acquires.
Summary of the invention
In view of the deficienciess of the prior art, the first purpose of this invention is to provide a kind of data ciphering method, energy It is enough that the data of user are encrypted, and safety is higher.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data ciphering method, comprising:
The first control code in S1, the definition sequence inputted according to user, the extension name of original document is revised as and is pressed The incoherent other types of extension name of contracting file, to generate the first simulated papers;
S2, extension name type generation the first reverse code after executing completion S1, according to original document;
S3, by first simulated papers compression and bundling at the several first sub- compressed package files;
The second control code in S4, the definition sequence inputted according to user, to several first sub- compressed package files The number order of extension name is exchanged, to generate several second sub- compressed package files with new number order;
S5, after executing and completing S4, according to the second control code, generate second and reverse code;
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
Preferably, further includes:
S7, the first reverse code, the second reverse code are packaged as a text file, and are deposited into preset storage road Diameter.
Preferably, in step s 4, Pre-Evaluation also is carried out to the second control code, comprising:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code;
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If two Person is identical, then modifies the second control code according to preset alteration ruler;
S43, S4 is re-executed.
Second object of the present invention is to provide a kind of data decryption method, can be no more than preset value to original document Final simulated papers be decrypted.
To achieve the above object, the present invention provides the following technical scheme that
A1, the final simulated papers generated using data ciphering method described in claim 1 are obtained, and is decompressed For the several second sub- compressed package files;
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is adjusted It changes, to generate several first sub- compressed package files with new number order;
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers;
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
Third object of the present invention is to provide a kind of data encryption system, can encrypt to the data of user, And safety is higher.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data encryption system, characterized in that include:
First extension name modifies unit, the first control code being configurable in the definition sequence according to user's input, By the extension name of original document be revised as with the incoherent other types of extension name of compressed file, with generate first camouflage text Part;
First reverses code generation unit, is configurable for generating the first reverse according to the extension name type of original document Code;
First compressing file unit is configurable for compressing first simulated papers and bundling is at several first sons Compressed package files;
Second extension name modifies unit, the second control code being configurable in the definition sequence according to user's input, The number order of the extension name of several first sub- compressed package files is exchanged, there is new number order to generate Several second sub- compressed package files;
Second reverses code generation unit, is configurable for generating second according to the second control code and reversing code;
Second compressing file unit is configurable for several second sub- compressed package files being compressed into a text Part, to generate final simulated papers.
Preferably, further includes:
Storage unit is configurable for that the first reverse code, the second reverse code are packaged as a text file, and are deposited Enter to preset store path.
Preferably, further include Pre-Evaluation unit, be configurable for:
Expansion before the second extension name modification unit executes, according to the second control code to the several first sub- compressed package files The number order of exhibition name is modified in advance;
Compare the number order of the extension name of the several first sub- compressed package files and the expansion of the several second sub- compressed package files Open up the number order of name;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms the second expansion later Name modification unit is opened up to execute;If the two is different, the second extension name is notified directly to execute.
Fourth object of the present invention is to provide a kind of data decryption system, can be final to being generated by above-mentioned apparatus Simulated papers are decrypted.
To achieve the above object, the present invention provides the following technical scheme that
A kind of data decryption system, comprising:
First decompression unit is configurable for what acquisition was generated using data encryption system described in claim 5 Final simulated papers, and decompressed and be condensed to the several second sub- compressed package files;
First decryption unit is configurable for reversing code using second, to several second sub- compressed package files The number order of extension name is exchanged, to generate several first sub- compressed package files with new number order;
Second decompression unit is configurable for unziping it several first sub- compressed package files, to obtain Take the first simulated papers;
Second decryption unit is configurable for reversing code using first, to the extension name of first simulated papers into Row modification, to obtain original document.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is based on the first control codes, the second control code included in the definition sequence of user's input, to user's The operations such as original document is extended name modification, compression is decomposed, ultimately generate the simulated papers with tight security;And then Under the premise of not knowing the definition sequence that user is inputted, it is difficult to crack the final simulated papers.
When user needs to decrypt the definitive document, it is only necessary to input this definition sequence again, decryption system can basis Final simulated papers are decrypted in this definition sequence.
Detailed description of the invention
Fig. 1 is the flow chart of data ciphering method in embodiment 1;
Fig. 2 is the flow chart of data decryption method in 2 in embodiment.
Specific embodiment
Below with reference to examples and drawings, the present invention is described in further detail, but embodiments of the present invention are not It is only limitted to this.
Embodiment 1:
The present embodiment provides a kind of data ciphering methods, as shown in Figure 1, this method comprises:
The first control code in S1, the definition sequence inputted according to user, the extension name of original document is revised as and is pressed The incoherent other types of extension name of contracting file, to generate the first simulated papers.
Above-mentioned definition sequence contains two control codes, respectively the first control code, the second control code;Wherein, first Control code is made of several numbers, such as " 313 ", and what is represented is the expansion of some type in the extension name of numerous types Name is opened up, i.e., each extension name is numbered in advance;Such as it is digital " 313 ", representative is " .jpg ", then by original document Extension name is revised as " .jpg ".
S2, extension name type generation the first reverse code after executing completion S1, according to original document.
After completing to modify, it can be directed toward generation corresponding first according to the modification and reverse code, which is original The number of the extension name of beginning file, such as the extension of original document are entitled " .txt ", and the number of " .txt " is " 241 ", then and One reverses code for " 241 ".Second control code will be illustrated in following S3.
S3, by first simulated papers compression and bundling at the several first sub- compressed package files.
At present as common tool of compression, such as " WINRAR ", " good pressure " etc., it is provided with the function, i.e., to some text It is optionally several sub- compressed package files by compressed file bundling when part is compressed;It is several after the completion of compression The extension name of a sub- compressed package files arranges in a certain order, for example, " .z01 ", " .z02 ", " .z03 " ..., " .zip ", and the filename of each file is all the same, and all sub- compressed packages need to be only placed on together by user in decompression One file.
In the present embodiment, the first simulated papers are compressed and divided using with method as above-mentioned enumerated software class Volume, but it should be recognized that after the completion of bundling, by the expansion of the first sub- compressed package files of the last one extension entitled " .zip " Exhibition name is remodified in sequence, such as this document is the 5th file, then extends entitled " .z05 ".
The second control code in S4, the definition sequence inputted according to user, to several first sub- compressed package files The number order of extension name is exchanged, to generate several second sub- compressed package files with new number order.
Second control code is made of several bit digitals, and digit depends on the first sub- compressed package that institute's bundling goes out in step S2 The quantity of file;The present embodiment is for 5, then the quantity of the permutation and combination of number 1-5 is 120, then according to certain rule Rule, this 120 combinations are numbered respectively;In this way, the control code is 3 digits.According to the control code, to original several first sons The naming order of compressed package files is rearranged.
Before step S4 execution, Pre-Evaluation also is carried out to the second control code, the specific method of Pre-Evaluation includes:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code.
Above-mentioned pre- modification process are as follows: first (expand in the first authentic copy file for localling create the several first sub- compressed package files It is constant to open up name, filename is unified to be changed), then modify according to the second control code to several first authentic copy files;Modification Triplicate file is generated afterwards.
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If two Person is identical, then modifies the second control code according to preset alteration ruler.
The rule of modification are as follows: 1 is added to each bit digital of original second control code.
S43, S4 is re-executed.
S5, after executing and completing S4, according to the second control code, generate second and reverse code.
After the completion of arrangement, generates second and reverse code, such as it is " 1,2,3,4,5 " that arrangement is preceding, number is " 001 ";Arrangement Essence sequence afterwards is " 4,2,5,1,3 ", and number is " 098 ";That is the second control code of user's input is " 098 ", and second is inverse Transcoding is also " 098 ".
After generation second reverses code, the first reverse code, the second reverse code are packaged as a text file, and be stored in To preset store path.
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
The final simulated papers generated, cloud disk may finally be uploaded to by user or is deposited into other storage regions;It is above-mentioned First reverse code, second reverse code together constitute decruption key, by the decruption key, final simulated papers can be carried out Decryption.
Embodiment 2:
The present embodiment provides a kind of data decryption methods, corresponding with the data ciphering method in embodiment 1;Reference Fig. 2, This method comprises:
A1, obtain by embodiment 1 data ciphering method generate final simulated papers, and decompressed be condensed to it is several Second sub- compressed package files.
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is adjusted It changes, to generate several first sub- compressed package files with new number order.
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers.
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
Embodiment 3:
The present embodiment provides a kind of data encryption systems, for realizing the data ciphering method in embodiment 1;The system packet It includes:
1, the first extension name modifies unit, the first control being configurable in the definition sequence according to user's input Code, by the extension name of original document be revised as with the incoherent other types of extension name of compressed file, with generate first camouflage File.
This system is user configuration one dedicated original document buffer area (local storage region of PC machine), for right When original document is operated, original document is first backed up into the original document buffer area.
First extension name modifies unit and is configured with the first alteration ruler database, after user, which inputs, defines sequence, the One extension name modification unit identifies the first control code from this definition sequence, is then advised according to the first control code in the first modification Then matched in database, to match corresponding alteration ruler, the finally extension according to the alteration ruler to original document Name is modified.
2, first code generation unit is reversed, is configurable for generating the first reverse according to the extension name type of original document Code.
First reverses code generation unit to be configured with Pre-Evaluation unit, which is configured in the second extension Before name modification unit executes, carried out according to number order of second control code to the extension name of the several first sub- compressed package files Pre- modification;And compare the number order and the several second sub- compressed package files of the extension name of several first sub- compressed package files The number order of extension name;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms second later Extension name is modified unit and is executed;If the two is different, the second extension name is notified directly to execute.
3, the first compressing file unit is configurable for compressing first simulated papers and bundling is at several first Sub- compressed package files.
4, the second extension name modifies unit, the second control being configurable in the definition sequence according to user's input Code, exchanges the number order of the extension name of several first sub- compressed package files, has new number suitable to generate Several second sub- compressed package files of sequence;
5, second code generation unit is reversed, is configurable for generating second according to the second control code and reversing code;
6, the second compressing file unit is configurable for several second sub- compressed package files being compressed into a text Part, to generate final simulated papers.
7, storage unit is configurable for the first reverse code, the second reverse code being packaged as a text file, and It is deposited into preset store path.
The preset store path is generally the store path where original document, to facilitate user to search.
Embodiment 4:
The present embodiment provides a kind of data decryption systems, corresponding with the data encryption system in embodiment 3, for carrying out The decryption of data, the system include:
1, the first decompression unit is configurable for obtaining using the data encryption system generation in embodiment 4 most Whole simulated papers, and decompressed and be condensed to the several second sub- compressed package files.
User needs for the final simulated papers to imported into this system, and after importing, the first decompression unit is immediately to it It is decompressed, the file for solving extrusion, which is deposited into, to be configured in local memory block.
2, the first decryption unit is configurable for reversing code using second, to several second sub- compressed package files The number order of extension name exchanged, to generate several first sub- compressed package files with new number order.
The text that user reverses code, the second reverse code to generate before importing this by the importing interface of system configuration by first This document;First decryption unit identifies that the first reverse code (identifies former positions according to scheduled rule from this article this document Number), then the second sub- compressed package files are operated again.
3, the second decompression unit is configurable for unziping it several first sub- compressed package files, with Obtain the first simulated papers;
4, the second decryption unit is configurable for reversing code using first, to the extension name of first simulated papers It modifies, to obtain original document.
After user imports text file in importing interface before, the second decryption unit also can be identified therefrom simultaneously First reverses code (according to several digits after scheduled rule identification), then operates again to the first simulated papers.Operation is completed Afterwards, the store path of the original document of generation is identical as the first simulated papers, to facilitate user to search.

Claims (8)

1. a kind of data ciphering method, characterized in that include:
The extension name of original document is revised as and compresses text by the first control code in S1, the definition sequence inputted according to user The incoherent other types of extension name of part, to generate the first simulated papers;
S2, extension name type generation the first reverse code after executing completion S1, according to original document;
S3, by first simulated papers compression and bundling at the several first sub- compressed package files;
The second control code in S4, the definition sequence inputted according to user, the extension to several first sub- compressed package files The number order of name is exchanged, to generate several second sub- compressed package files with new number order;
S5, after executing and completing S4, according to the second control code, generate second and reverse code;
S6, several second sub- compressed package files are compressed into a file, to generate final simulated papers.
2. data ciphering method according to claim 1, characterized in that further include:
S7, the first reverse code, the second reverse code are packaged as a text file, and are deposited into preset store path.
3. data ciphering method according to claim 1, characterized in that in step s 4, also carried out to the second control code Pre-Evaluation, comprising:
S41, the number order of the extension name of the several first sub- compressed package files is modified in advance according to the second control code;
S42, several first sub- compressed package files of comparison modify the number order of preceding and pre- modified extension name in advance;If the two phase Together, then the second control code is modified according to preset alteration ruler;
S43, S4 is re-executed.
4. a kind of data decryption method, characterized in that include:
A1, the final simulated papers generated using data ciphering method described in claim 1 are obtained, and if being decompressed and being condensed to Dry second sub- compressed package files;
A2, code is reversed using second, the number order of the extension name of several second sub- compressed package files is exchanged, with Generate several first sub- compressed package files with new number order;
A3, several first sub- compressed package files are unziped it, to obtain the first simulated papers;
A4, code is reversed using first, modified to the extension name of first simulated papers, to obtain original document.
5. a kind of data encryption system, characterized in that include:
First extension name modifies unit, the first control code being configurable in the definition sequence according to user's input, will be former The extension name of beginning file be revised as with the incoherent other types of extension name of compressed file, to generate the first simulated papers;
First reverses code generation unit, is configurable for generating the first reverse code according to the extension name type of original document;
First compressing file unit is configurable for compressing first simulated papers and bundling is compressed at several first sons APMB package;
Second extension name modifies unit, the second control code being configurable in the definition sequence according to user's input, to institute The number order for stating the extension name of the several first sub- compressed package files is exchanged, and has the several of new number order to generate Second sub- compressed package files;
Second reverses code generation unit, is configurable for generating second according to the second control code and reversing code;
Second compressing file unit is configurable for several second sub- compressed package files being compressed into a file, with Generate final simulated papers.
6. data encryption system according to claim 5, characterized in that further include:
Storage unit is configurable for that the first reverse code, the second reverse code are packaged as a text file, and are deposited into Preset store path.
7. data encryption system according to claim 5, characterized in that further include Pre-Evaluation unit, be configurable for:
Before the second extension name modification unit executes, according to the second control code to the extension name of the several first sub- compressed package files Number order modified in advance;
Compare the number order of the extension name of the several first sub- compressed package files and the extension name of the several second sub- compressed package files Number order;If the two is identical, the second control code is modified according to preset alteration ruler, reinforms the second extension name later Unit is modified to execute;If the two is different, the second extension name is notified directly to execute.
8. a kind of data decryption system, characterized in that include:
First decompression unit is configurable for acquisition using the final of the generation of data encryption system described in claim 5 Simulated papers, and decompressed and be condensed to the several second sub- compressed package files;
First decryption unit is configurable for reversing code, the extension to several second sub- compressed package files using second The number order of name is exchanged, to generate several first sub- compressed package files with new number order;
Second decompression unit is configurable for unziping it several first sub- compressed package files, to obtain One simulated papers;
Second decryption unit is configurable for reversing code using first, repair to the extension name of first simulated papers Change, to obtain original document.
CN201710174241.1A 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system Active CN106790302B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710174241.1A CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710174241.1A CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Publications (2)

Publication Number Publication Date
CN106790302A CN106790302A (en) 2017-05-31
CN106790302B true CN106790302B (en) 2019-08-20

Family

ID=58967226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710174241.1A Active CN106790302B (en) 2017-03-22 2017-03-22 Data ciphering method, data decryption method and system

Country Status (1)

Country Link
CN (1) CN106790302B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763969A (en) * 2018-08-03 2018-11-06 深圳市销邦科技股份有限公司 A kind of method and system ensureing PSAM card data safeties

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056252A (en) * 2007-06-07 2007-10-17 中兴通讯股份有限公司 Transmission method of compression file
CN101655877A (en) * 2008-10-14 2010-02-24 北京大学 Method and device for packing and extracting files
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing
CN103324623A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data batch operating method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8189786B2 (en) * 2005-05-25 2012-05-29 Zenith Electronics Llc Encryption system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056252A (en) * 2007-06-07 2007-10-17 中兴通讯股份有限公司 Transmission method of compression file
CN101655877A (en) * 2008-10-14 2010-02-24 北京大学 Method and device for packing and extracting files
CN103324623A (en) * 2012-03-21 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data batch operating method
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103152327A (en) * 2013-02-01 2013-06-12 北京奇虎科技有限公司 Configuration method, client and system for plug-in unit compressing and uncompressing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WebGIS海量数据分卷压缩传输方法的设计与实现;汤大立等;《计算机时代》;20090615(第6期);全文
利用RAR压缩软件备份和恢复文件;曲国军等;《电脑学习》;19970630;全文
基于压缩的代码保护的低开销策略;陈勇等;《计算机科学》;20111130;第38卷(第11期);全文

Also Published As

Publication number Publication date
CN106790302A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
CN106612320B (en) A kind of De-weight method of encryption data in cloud storage
TWI719635B (en) Safe feature engineering method and device
US8533470B2 (en) Segmented mapping
US9021259B2 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
CN112800088A (en) Database ciphertext retrieval system and method based on bidirectional security index
US20130080765A1 (en) Secure cloud storage and synchronization systems and methods
TW201812638A (en) Storage design method of blockchain encrypted radio frequency chip
US9147079B2 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
US20220358227A1 (en) Linking encrypted datasets using common identifiers
CN111079162B (en) Data encryption method, data decryption method and data encryption system based on block chain
CN107408135A (en) For carrying out the database server and client of query processing to encryption data
US20110289310A1 (en) Cloud computing appliance
JP6137173B2 (en) Encrypted database system, client terminal and database server, combining method and program
CN102724044A (en) Electronic evidence verification and preservation method
US9825761B2 (en) Systems and methods improving cryptosystems with biometrics
CN111242611B (en) Method and system for recovering digital wallet key
CN113742764B (en) Trusted data secure storage method, retrieval method and equipment based on block chain
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN106790302B (en) Data ciphering method, data decryption method and system
JP2003163662A (en) Paperless record in aircraft maintenance
CN111147502A (en) Block chain file storage system and method thereof
CN102821110B (en) A kind of password method for retrieving for audio/video storage device
CN104252604B (en) Database based building block system type dynamic encryption method
CN116910820A (en) Data report processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant