CN107026872B - Method for preventing user personal information from being decoded - Google Patents

Method for preventing user personal information from being decoded Download PDF

Info

Publication number
CN107026872B
CN107026872B CN201710347266.7A CN201710347266A CN107026872B CN 107026872 B CN107026872 B CN 107026872B CN 201710347266 A CN201710347266 A CN 201710347266A CN 107026872 B CN107026872 B CN 107026872B
Authority
CN
China
Prior art keywords
operational amplifier
coupled
user information
personal
transistor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710347266.7A
Other languages
Chinese (zh)
Other versions
CN107026872A (en
Inventor
邹麟
陈成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Hengsheng Smart Technology Co ltd
Original Assignee
Ningbo Chaoyongdao Investment Partnership LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Chaoyongdao Investment Partnership LP filed Critical Ningbo Chaoyongdao Investment Partnership LP
Priority to CN201710347266.7A priority Critical patent/CN107026872B/en
Publication of CN107026872A publication Critical patent/CN107026872A/en
Application granted granted Critical
Publication of CN107026872B publication Critical patent/CN107026872B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A method of preventing personal information of a user from being deciphered, comprising: inputting personal user information through the energy-saving monitoring switch; carrying out information security verification on the input personal user information; carrying out integrity verification on the personal user information after the security verification; carrying out anti-deciphering pre-operation on the personal user information subjected to integrity verification; performing anti-deciphering operation on the personal user information subjected to integrity verification; selecting a data storage mode; and storing the personal user information subjected to the deciphering prevention operation into a local or remote storage according to the storage mode. The method can obviously improve the difficulty of decoding the personal information of the user and reduce the decoding probability; the space of a carrier storing the personal information of the user is not excessively occupied, and the subsequent information access speed of a user personal information operator with proper authority is improved; meanwhile, the whole circuit is more compact, the occupied physical space is smaller, and the power consumption of the whole system can be effectively reduced.

Description

Method for preventing user personal information from being decoded
Technical Field
The present invention relates generally to the field of electrical digital data processing, and more particularly to a method for preventing the deciphering of a user's personal information.
Background
With the rapid development of industry and informatization, data has become a center of information nowadays, and various types of data are spread all over the world, including communication data, business data, administrative data, military data, and the like. Such large-scale, high-speed transmission, diversification, and wide-distribution storage of complex data sets have different values for different operators. Among these data, the personal information of the user has specificity, and the information object thereof is peripheral information related to the personal of the user in a specific scene, wherein, both information which can be disclosed or is desired to be disclosed is included, such as that a star wants to achieve the promotion of popularity through the disclosure and diffusion of the personal information; but also includes information which can be publicly kept secret, such as information for setting open accessible personal micro blogs, log records and the like; in particular, information that the user himself is sensitive and unwilling to disclose is included, which includes personal privacy data, personal communication data, personal identification data, personal belonging information data, etc. that are managed and used.
With diversification and increasing convenience of storage media, information which is sensitive and unwilling to be disclosed by a user person is often stored on a personal portable terminal or encrypted in a public network space, and the like. However, the storage is involved, and higher requirements are necessarily put on the security and integrity protection of data. Since unauthorized persons or organizations can pretend to be valid users to gain access to important resources or gain authority by cracking public network spaces, thereby posing a threat to users' personal information. In recent years, events causing loss and disoperation to users due to deciphered personal information of the users are not a group, for example, orders of millions of hotel customers, user names, identity cards, mobile phone numbers, room numbers, house types, house opening time, house returning time, home addresses, four last digits of credit cards, credit card expiration dates, mails and a great deal of sensitive information are leaked from a plurality of famous chain hotels in China due to security holes. In addition, the mail and password information of time warner are stolen; the credit-integrity life insurance company leaks sensitive information such as tens of thousands of customer bank card numbers, passwords, address of an issuer, identity cards and the like; multiple iOS applications in the apple application store are under attack; the MongoDB database causes the leakage of important information of 5800 ten thousand business users due to the lack of effective safety protection measures, including information such as names, IP addresses, mail account numbers, professions, vehicle data, dates of birth, and the like. The deciphering party deciphers and steals personal information such as client names, birthdays, email addresses, medical insurance numbers and the like through a means, and great risks and losses are brought to users.
Although the management party of the personal information of the user tries various means to prevent the personal information, the vulnerability still exists and the security is not high. Such as by timing detection to attack the carrier storing the user's personal information, but there are also vulnerabilities and deficiencies. The iron tapping needs to be hard per se, and also needs to start with the theme of effective anti-deciphering of the personal data of the user, so that the difficulty of deciphering the personal information of the user is obviously improved, and the deciphering probability is reduced; the space of a carrier storing the personal information of the user is not excessively occupied, and the subsequent information access speed of a user personal information operator with proper authority is improved; compared with the prior art, the circuit has the advantages that an additional detection circuit is not needed, and a power circuit, a clock circuit, a driving circuit and grounding layout wiring required by the detection circuit are not needed, so that the whole circuit is more compact, the occupied physical space is smaller, and the power consumption is lower.
Disclosure of Invention
One of the objectives of the present invention is to provide a method for preventing the personal information of the user from being decoded, which can significantly improve the difficulty of decoding the personal information of the user and reduce the decoding probability; the space of a carrier storing the personal information of the user is not excessively occupied, and the subsequent information access speed of a user personal information operator with proper authority is improved; meanwhile, the whole circuit is more compact, the occupied physical space is smaller, and the power consumption of the whole system can be effectively reduced.
The technical scheme adopted by the invention to solve the technical problems is as follows: a method of preventing personal information of a user from being deciphered, comprising: in step S1, personal user information is input through the energy saving monitoring switch; in step S2, information security verification is performed on the input personal user information; in step S3, performing integrity verification on the security-verified individual user information; in step S4, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification; in step S5, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification; in step S6, a data storage method is selected; and in step S7, storing the personal user information after the anti-deciphering prediction operation in a local or remote storage according to the storage mode.
According to another aspect of the present invention, the inputting of the individual user information through the energy saving monitoring switch in step S1 includes: inputting the personal user information into an energy-saving monitoring switch, and transmitting a control signal through monitoring and judging so as to monitor, detect and input the personal user information; wherein the energy saving monitoring switch comprises: the personal user information input is coupled with a first resistor and a fourth resistor, the other end of the first resistor is coupled with a second resistor, a third resistor, a first electrode of a third transistor and a second electrode of a fourth transistor, wherein the other end of the second resistor is coupled with a negative input end of a first operational amplifier, the other end of the third resistor is coupled with a positive output end of the first operational amplifier, the second electrode of the third transistor is coupled with a positive power supply end of the first operational amplifier, the first electrode of the fourth transistor is coupled with a negative power supply end of the first operational amplifier, the positive input end of the first operational amplifier is coupled with a first fixed voltage, the difference between the first fixed voltage and the negative power supply end of the first operational amplifier is less than half of the difference between the positive power supply end of the first operational amplifier and the negative power supply end of the first operational amplifier, the other end of the fourth resistor is coupled with a fifth resistor, a sixth resistor, the other end of the sixth resistor is coupled with a seventh resistor, and the second resistor, An eighth resistor, a first pole of the first transistor, a second pole of the second transistor, another end of the seventh resistor being coupled to the negative input terminal of the second operational amplifier, another end of the eighth resistor being coupled to the negative output terminal of the second operational amplifier, a second pole of the first transistor being coupled to the positive power supply terminal of the second operational amplifier, a first pole of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, a positive input terminal of the second operational amplifier being coupled to a second fixed voltage, the difference between the second fixed voltage and the negative power supply terminal being less than half the difference between the positive power supply terminal and the negative power supply terminal of the second operational amplifier, another end of the fifth resistor, another end of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, an output terminal of the first operational amplifier being coupled to a control terminal of the fifth transistor, a first terminal of the fifth transistor being coupled to the personal user information input, a second terminal of the fifth transistor being coupled to the personal user information input for verification use, the output end of the second operational amplifier is coupled to the control end of a sixth transistor, the first end of the sixth transistor is coupled to the personal user information input, the second end of the sixth transistor is coupled to the personal user information input for verification use, the output ends of the first operational amplifier and the second operational amplifier are output through an OR logic gate, and the output is coupled to an enabling signal of the anti-decoding party so as to enable the starting and the preparation of the anti-decoding party, the control party and the storage provider party.
According to another aspect of the present invention, the first poles of the first to fourth transistors may be positive input electrodes, and the second poles of the first to fourth transistors may be negative input electrodes. The first to fourth transistors may be two-terminal semiconductor devices, or the first to fourth transistors may be three-terminal semiconductor devices in which both terminals are shorted. The fifth transistor is an N-type semiconductor transistor, and the sixth transistor is a P-type semiconductor transistor. The positive power supply end of the first operational amplifier is coupled with the positive power supply end of the second operational amplifier, and the negative power supply end of the first operational amplifier is coupled with the negative power supply end of the second operational amplifier; the first fixed voltage and the second fixed voltage are in integral multiple relation with each other.
According to another aspect of the present invention, in step S4, the performing a deciphering prevention operation on the personal user information for integrity verification includes: the personal user information after the verification is processed by matrixing, the anti-decoding party divides the personal user information into a matrix of U × V according to the input bits, the element is Mi, and the matrix is marked as Matr, namely, Matr ═ M1, M2, … …, Mn ], where n ═ U × V, and U and V are both positive integers.
According to another aspect of the present invention, in step S5, the operation of preventing the integrity of the integrity-verified individual user information from being deciphered further comprises:
generating a key sequence Kij line by line, wherein i belongs to [1, V ], j belongs to [1, U ], and Kij in the sequence is:
Figure BDA0001296845260000021
and storing the Kij in the sequence;
performing exclusive-or operation on the key sequence Kij and each row to obtain a new sequence Matr '═ M1', M2 ', … …, Mn' ], and associating and storing the array and the Kij correspondingly, wherein max (x) represents taking the maximum value;
after calculating a U × V matrix, adding a flag value to the area of the associative memory, where the flag value is: mar is mod (T, n), wherein T is the number of elements of a preset ideal matrix and is a constant value;
and then, the operation is continuously executed for the next U × V matrix until the personal information of the user is completely input.
According to another aspect of the present invention, the selecting a data storage manner in step S6 includes: selecting local storage or adding remote storage, and then selecting direct storage or redundant storage;
if the local storage is selected, further determining whether the direct storage or the redundant storage is selected, if the direct storage is selected, storing the operated data in a local storage provider, if the direct storage is selected, further performing a storage redundant operation, and storing the redundant data in a specific area, wherein the specific area can be arranged in the vicinity of the area where the direct storage is located, or the specific area can be arranged in a dedicated redundant area of the storage provider; if the remote store is selected for addition, a similar operation is performed.
According to another aspect of the present invention, in step S7, the personal user information after the anti-deciphering prediction operation is stored in a local or remote storage according to the storage mode; wherein the remote storage in the storage provider can further process the data, including: and generating a first scrambling key, encrypting the personal user information by using the scrambling key, storing the personal user information in the first area, adding a cyclic redundancy check code in the area adjacent to the first area, and closing a key channel of the storage medium.
Drawings
Embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
fig. 1 illustrates a flowchart of a method of preventing a user's personal information from being deciphered, according to an exemplary embodiment of the present invention.
Detailed Description
In the following description, reference is made to the accompanying drawings that show, by way of illustration, several specific embodiments. It will be understood that: other embodiments are contemplated and may be made without departing from the scope or spirit of the present disclosure. The following detailed description is, therefore, not to be taken in a limiting sense.
Fig. 1 illustrates a flowchart of a method of preventing a user's personal information from being deciphered, according to an exemplary embodiment of the present invention.
In step S1, personal user information is input through the energy saving monitoring switch;
in step S2, information security verification is performed on the input personal user information;
in step S3, performing integrity verification on the security-verified individual user information;
in step S4, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification;
in step S5, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification;
in step S6, a data storage method is selected;
in step S7, the personal user information after the deciphering prevention operation is stored in a local or remote storage according to the storage mode.
Specifically, the input of the individual user information through the energy saving monitoring switch in step S1 may include, but is not limited to:
the personal user information is input to the energy-saving monitoring switch, and the monitoring and judgment are carried out to transmit the control signal so as to monitor, detect and input the personal user information.
Preferably, the power saving monitoring switch includes: the personal user information input is coupled with a first resistor and a fourth resistor, the other end of the first resistor is coupled with a second resistor, a third resistor, a first electrode of a third transistor and a second electrode of a fourth transistor, wherein the other end of the second resistor is coupled with a negative input end of a first operational amplifier, the other end of the third resistor is coupled with a positive output end of the first operational amplifier, the second electrode of the third transistor is coupled with a positive power supply end of the first operational amplifier, the first electrode of the fourth transistor is coupled with a negative power supply end of the first operational amplifier, the positive input end of the first operational amplifier is coupled with a first fixed voltage, the difference between the first fixed voltage and the negative power supply end of the first operational amplifier is less than half of the difference between the positive power supply end of the first operational amplifier and the negative power supply end of the first operational amplifier, the other end of the fourth resistor is coupled with a fifth resistor, a sixth resistor, the other end of the sixth resistor is coupled with a seventh resistor, and the second resistor, An eighth resistor, a first pole of the first transistor, a second pole of the second transistor, another end of the seventh resistor being coupled to the negative input terminal of the second operational amplifier, another end of the eighth resistor being coupled to the negative output terminal of the second operational amplifier, a second pole of the first transistor being coupled to the positive power supply terminal of the second operational amplifier, a first pole of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, a positive input terminal of the second operational amplifier being coupled to a second fixed voltage, the difference between the second fixed voltage and the negative power supply terminal being less than half the difference between the positive power supply terminal and the negative power supply terminal of the second operational amplifier, another end of the fifth resistor, another end of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, an output terminal of the first operational amplifier being coupled to a control terminal of the fifth transistor, a first terminal of the fifth transistor being coupled to the personal user information input, a second terminal of the fifth transistor being coupled to the personal user information input for verification use, the output end of the second operational amplifier is coupled to the control end of a sixth transistor, the first end of the sixth transistor is coupled to the personal user information input, the second end of the sixth transistor is coupled to the personal user information input for verification use, the output ends of the first operational amplifier and the second operational amplifier are output through an OR logic gate, and the output is coupled to an enabling signal of the anti-decoding party so as to enable the starting and the preparation of the anti-decoding party, the control party and the storage provider party.
Preferably, the first poles of the first to fourth transistors may be positive input electrodes, and the second poles of the first to fourth transistors may be negative input electrodes. More preferably, the first to fourth transistors may be two-terminal semiconductor devices, or the first to fourth transistors may be three-terminal semiconductor devices in which both ends are shorted.
Preferably, the ratio of the fourth resistance to the sixth resistance is not less than 9, preferably 14 or 19.
Preferably, the fifth transistor is an N-type semiconductor transistor, and the sixth transistor is a P-type semiconductor transistor.
Preferably, the positive power supply terminal of the first operational amplifier is coupled to the positive power supply terminal of the second operational amplifier, and the negative power supply terminal of the first operational amplifier is coupled to the negative power supply terminal of the second operational amplifier. The first fixed voltage and the second fixed voltage are in integral multiple relation with each other.
Through the operation of the step 1, the anti-deciphering party, the control party and the storage provider can enter a low power consumption state before and after data input through the monitoring, detection and input of the energy-saving monitoring switch with low power consumption, and only when the output ends of the first operational amplifier and the second operational amplifier are enabled through the output of the OR logic gate, the working state is entered, so that the power consumption of the whole system can be effectively reduced.
In step S2, the input personal user information is subjected to information security verification so that the user personal information itself does not affect the storage provider. Only the individual user information, which is verified by security, may proceed to step S2, otherwise, the process terminates.
In step S3, integrity verification is performed on the security-verified personal user information to ensure the integrity of the personal information of the user, so that subsequent data processing is more accurate and necessary, and if this step is lacked, loss of data due to channel reasons or external interference may result. Only the individual user information that passes the integrity verification may proceed to step S4, otherwise it terminates at this step.
In step S4, the operation of performing the deciphering prevention prediction on the personal user information subjected to the integrity verification includes: the personal user information after the verification is subjected to matrixing, that is, the anti-decoding party divides the personal user information into a matrix of U × V according to the input bits, the element is Mi, and marks the matrix as Matr, that is, Matr ═ M1, M2, … …, Mn ], where n ═ U × V, and U and V are both positive integers.
In step S5, the operation of anti-deciphering the individual user information for integrity verification further includes:
generating a key sequence Kij line by line, wherein i belongs to [1, V ], j belongs to [1, U ], and Kij in the sequence is:
Figure BDA0001296845260000041
and storing the Kij in the sequence;
exclusive-or operation is carried out on the key sequence Kij and each row to obtain a new sequence Matr '═ M1', M2 ', … …, Mn' ], the array and the Kij are stored in an associated mode, and max (×) represents that the maximum value is taken;
after calculating a U × V matrix, adding a flag value to the area of the associative memory, where the flag value is: mar is mod (T, n), wherein T is the number of elements of a preset ideal matrix and is a constant value;
and then, the operation is continuously executed for the next U × V matrix until the personal information of the user is completely input.
In step S6, the selecting the data storage method includes: selecting local storage or adding remote storage, and then selecting direct storage or redundant storage.
Preferably, if the local storage is selected, it is further determined whether the direct storage or the redundant storage, if the direct storage is selected, the data after the operation is stored in the local storage provider, if the direct storage is selected, the storage redundant operation is also performed, and the redundant data is stored in a specific area, which may be provided in the vicinity of the area where the aforementioned direct storage is located, or alternatively, the specific area may be provided in a dedicated redundant area of the storage provider. If the remote store is selected for addition, a similar operation is performed.
In step S7, the personal user information after the deciphering prevention operation is stored in a local or remote storage according to the storage mode.
And executing the storage operation according to the judgment of the previous step. Optionally, in this step, the remote storage in the storage provider may further process the data, including: and generating a first scrambling key, encrypting the personal user information by using the scrambling key, storing the personal user information in the first area, adding a cyclic redundancy check code in the area adjacent to the first area, and closing a key channel of the storage medium.
In summary, in the technical scheme of the present invention, by using a method for preventing the personal information of the user from being decoded, the power loss can be reduced, the power quality can be improved, the voltage imbalance can be reduced, the charging power offset can be reduced, the stability of the charging power grid can be further maintained, the utilization rate of the distributed power grid can be maximized, the power loss can be reduced, and the safety and the economy of the operation of the distributed power grid can be ensured.
It will be understood that: the examples and embodiments of the invention may be implemented in hardware, software, or a combination of hardware and software. As mentioned above, any body performing such a method may be stored in the form of volatile or non-volatile storage, for example a storage device like a ROM, whether erasable or rewritable or not, or in the form of memory, such as for example a RAM, a memory chip, a device or an integrated circuit or on an optically or magnetically readable medium such as for example a CD, a DVD, a disk or a tape. It will be understood that: storage devices and storage media are examples of machine-readable storage suitable for storing one or more programs that, when executed, implement examples of the present invention. Examples of the present invention may be conveyed electronically via any medium, such as a communications signal carried by a wired or wireless coupling, and the examples contain the same where appropriate.
It should be noted that: because the invention solves the technical problems that the difficulty of decoding the personal information of the user can be obviously improved and the decoding probability is reduced, the technical means which can be understood by technicians in the technical field of computers according to the teaching of the specification after reading the specification is adopted, the difficulty of decoding the personal information of the user can be obviously improved and the decoding probability is reduced; the space of a carrier storing the personal information of the user is not excessively occupied, and the subsequent information access speed of a user personal information operator with proper authority is improved; meanwhile, the whole circuit is more compact, the occupied physical space is smaller, and the power consumption of the whole system can be effectively reduced. Furthermore, the solution claimed in the appended claims has utility since it can be manufactured or used in industry.
The above description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Unless expressly stated otherwise, each feature disclosed is one example only of a generic series of equivalent or similar features. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (3)

1. A method of preventing personal information of a user from being deciphered, comprising:
in step S1, personal user information is input through the energy saving monitoring switch;
in step S2, information security verification is performed on the input personal user information;
in step S3, performing integrity verification on the security-verified individual user information;
in step S4, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification;
in step S5, a deciphering prevention operation is performed on the personal user information subjected to the integrity verification;
in step S6, a data storage method is selected; and
in step S7, storing the personal user information after the deciphering prevention operation in a local or remote storage according to the storage mode;
wherein the inputting of the individual user information through the energy saving monitoring switch in step S1 includes: inputting the personal user information into an energy-saving monitoring switch, and transmitting a control signal through monitoring and judging so as to monitor, detect and input the personal user information;
wherein the energy saving monitoring switch comprises: the personal user information input is coupled with a first resistor and a fourth resistor, the other end of the first resistor is coupled with a second resistor, a third resistor, a first electrode of a third transistor and a second electrode of a fourth transistor, wherein the other end of the second resistor is coupled with a negative input end of a first operational amplifier, the other end of the third resistor is coupled with a positive output end of the first operational amplifier, the second electrode of the third transistor is coupled with a positive power supply end of the first operational amplifier, the first electrode of the fourth transistor is coupled with a negative power supply end of the first operational amplifier, the positive input end of the first operational amplifier is coupled with a first fixed voltage, the difference between the first fixed voltage and the negative power supply end of the first operational amplifier is less than half of the difference between the positive power supply end of the first operational amplifier and the negative power supply end of the first operational amplifier, the other end of the fourth resistor is coupled with a fifth resistor, a sixth resistor, the other end of the sixth resistor is coupled with a seventh resistor, and the second resistor, An eighth resistor, a first pole of the first transistor, a second pole of the second transistor, another end of the seventh resistor being coupled to the negative input terminal of the second operational amplifier, another end of the eighth resistor being coupled to the negative output terminal of the second operational amplifier, a second pole of the first transistor being coupled to the positive power supply terminal of the second operational amplifier, a first pole of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, a positive input terminal of the second operational amplifier being coupled to a second fixed voltage, the difference between the second fixed voltage and the negative power supply terminal being less than half the difference between the positive power supply terminal and the negative power supply terminal of the second operational amplifier, another end of the fifth resistor, another end of the second transistor being coupled to the negative power supply terminal of the second operational amplifier, an output terminal of the first operational amplifier being coupled to a control terminal of the fifth transistor, a first terminal of the fifth transistor being coupled to the personal user information input, a second terminal of the fifth transistor being coupled to the personal user information input for verification use, the output end of the second operational amplifier is coupled to the control end of a sixth transistor, the first end of the sixth transistor is coupled to the personal user information input, and the second end of the sixth transistor is coupled to the personal user information input for verification use, wherein the output ends of the first operational amplifier and the second operational amplifier are output through an OR logic gate, and the output is coupled to an enabling signal of the anti-decoding party so as to enable the starting and the preparation of the anti-decoding party, the control party and the storage provider;
wherein the first electrodes of the first to fourth transistors are one of positive input electrodes and negative input electrodes; the first to fourth transistors may be one of two-terminal or three-terminal semiconductor devices; the ratio of the fourth resistor to the sixth resistor is not less than 9; the fifth transistor is an N-type semiconductor transistor, and the sixth transistor is a P-type semiconductor transistor; the positive power supply end of the first operational amplifier is coupled with the positive power supply end of the second operational amplifier, and the negative power supply end of the first operational amplifier is coupled with the negative power supply end of the second operational amplifier;
through the operation of the step 1, the anti-deciphering party, the control party and the storage provider can enter a low power consumption state before and after data input through the monitoring, detection and input of the low power consumption energy-saving monitoring switch, and only enter a working state when the output ends of the first operational amplifier and the second operational amplifier are enabled through the output of the OR logic gate, so that the power consumption of the whole system can be effectively reduced;
in step S2, information security verification is performed on the input personal user information so that the user personal information itself does not affect the storage provider; only the personal user information passing the security verification can enter the step S2, otherwise, the step is terminated;
in step S3, integrity verification is performed on the security-verified personal user information to ensure the integrity of the personal information of the user, so that the subsequent data processing is more accurate and necessary, and if this step is lacked, loss of data due to channel reasons or external interference may result; step S4 may be entered only if the individual user information passes the integrity verification, otherwise, this step is terminated;
in step S4, the operation of performing the anti-deciphering prediction on the personal user information subjected to the integrity verification includes: performing matrixing processing on the personal user information after the verification, dividing the personal user information into a matrix of U × V by a decoding prevention party according to input bits, wherein an element is Mi, and marking the matrix as Matr, namely Matr ═ M1, M2, … …, Mn ], wherein n ═ U × V, and U and V are positive integers;
wherein in step S5, the operation of anti-deciphering the personal user information for integrity verification further comprises:
generating a key sequence Kij line by line, wherein i belongs to [1, V ], j belongs to [1, U ], and Kij in the sequence is:
Figure FDA0002757343500000021
and storing the Kij in the sequence;
performing exclusive-or operation on the key sequence Kij and each row to obtain a new sequence Matr '═ M1', M2 ', … …, Mn' ], and associating and storing the sequence and the Kij correspondingly, wherein max (x) represents that the maximum value is taken;
after calculating a U × V matrix, adding a flag value to the area of the associative memory, where the flag value is: mar is mod (T, n), wherein T is the number of elements of a preset ideal matrix and is a constant value;
and then, the operation is continuously executed for the next U × V matrix until the personal information of the user is completely input.
2. The method for preventing personal information of a user from being deciphered as claimed in claim 1, wherein the selecting the data storage manner in step S6 comprises: selecting local storage or adding remote storage, and then selecting direct storage or redundant storage;
if the local storage is selected, further determining whether the direct storage or the redundant storage is selected, if the direct storage is selected, storing the operated data in a local storage provider, if the direct storage is selected, further performing a storage redundant operation, and storing the redundant data in a specific area, wherein the specific area can be arranged in the vicinity of the area where the direct storage is located, or the specific area can be arranged in a dedicated redundant area of the storage provider; if the remote store is selected for addition, a similar operation is performed.
3. The method for preventing personal information of a user from being deciphered as claimed in claim 2, wherein in step S7, the personal information of the user after the deciphering prevention operation is stored in a local or remote storage according to a storage manner;
wherein the remote storage in the storage provider can further process the data, including: and generating a first scrambling key, encrypting the personal user information by using the scrambling key, storing the personal user information in the first area, adding a cyclic redundancy check code in the area adjacent to the first area, and closing a key channel of the storage medium.
CN201710347266.7A 2017-05-17 2017-05-17 Method for preventing user personal information from being decoded Active CN107026872B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710347266.7A CN107026872B (en) 2017-05-17 2017-05-17 Method for preventing user personal information from being decoded

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710347266.7A CN107026872B (en) 2017-05-17 2017-05-17 Method for preventing user personal information from being decoded

Publications (2)

Publication Number Publication Date
CN107026872A CN107026872A (en) 2017-08-08
CN107026872B true CN107026872B (en) 2021-02-12

Family

ID=59528825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710347266.7A Active CN107026872B (en) 2017-05-17 2017-05-17 Method for preventing user personal information from being decoded

Country Status (1)

Country Link
CN (1) CN107026872B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445707A (en) * 2002-03-15 2003-10-01 松下电器产业株式会社 Service submitting system for supplying service to user equipment from service submitting equipment
EP2168304A1 (en) * 2007-07-13 2010-03-31 Viaccess Verification of mac code without disclosure
CN104539417A (en) * 2015-01-12 2015-04-22 浪潮(北京)电子信息产业有限公司 Encryption device based on stream ciphers
CN106446697A (en) * 2016-07-26 2017-02-22 邬超 Method and device for saving private data
CN106611135A (en) * 2016-06-21 2017-05-03 四川用联信息技术有限公司 Storage data integrity verification and recovery method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445707A (en) * 2002-03-15 2003-10-01 松下电器产业株式会社 Service submitting system for supplying service to user equipment from service submitting equipment
EP2168304A1 (en) * 2007-07-13 2010-03-31 Viaccess Verification of mac code without disclosure
CN104539417A (en) * 2015-01-12 2015-04-22 浪潮(北京)电子信息产业有限公司 Encryption device based on stream ciphers
CN106611135A (en) * 2016-06-21 2017-05-03 四川用联信息技术有限公司 Storage data integrity verification and recovery method
CN106446697A (en) * 2016-07-26 2017-02-22 邬超 Method and device for saving private data

Also Published As

Publication number Publication date
CN107026872A (en) 2017-08-08

Similar Documents

Publication Publication Date Title
CN107819583B (en) Techniques for preventing misuse of keys
JP6592621B2 (en) Authentication network
CN108632028B (en) Authentication network
Chanda Password security: an analysis of password strengths and vulnerabilities
CN101542496B (en) Authentication with physical unclonable functions
CN101149768B (en) Special processor software encryption and decryption method
CN107609418A (en) Desensitization method, device, storage device and the computer equipment of text data
US20150163065A1 (en) Identity authentication method and apparatus and server
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN107241184B (en) Personal password generation and management method based on improved AES
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN107623675A (en) Network, electronic installation and its checking step of electronic installation
Stapleton et al. Tokenization and other methods of security for cardholder data
CN104318286A (en) NFC label data management method and system and terminal
Yin et al. Protecting private data by honey encryption
Prada-Delgado et al. Physical unclonable keys for smart lock systems using Bluetooth Low Energy
CN110365468A (en) Anonymization processing method, device, equipment and storage medium
CN107733936B (en) Encryption method for mobile data
KR20140026316A (en) Apparatus and method for processing authentication information
Gayathri et al. Hybrid cryptography for random-key generation based on ECC algorithm
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN101127062A (en) Binding function implement method for electronic key and computer
CN104252604B (en) Database based building block system type dynamic encryption method
CN107153793B (en) Important data storage anti-deciphering method
Cambou Password manager combining hashing functions and ternary PUFs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210127

Address after: Room 2033, 267 Cihu people's house, Cicheng Town, Jiangbei District, Ningbo City, Zhejiang Province 315000

Applicant after: Ningbo chaoyongdao investment partnership (L.P.)

Address before: 610000 No. 6, D District, Tianfu Software Park, 599 Century City South Road, Chengdu High-tech Zone, Sichuan, China.

Applicant before: CHENGDU LINCHENG TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240520

Address after: Room 6-35, No. 58 Rainbow North Road, Yinzhou District, Ningbo City, Zhejiang Province, 315100

Patentee after: Zhejiang Hengsheng Smart Technology Co.,Ltd.

Country or region after: China

Address before: Room 2033, 267 Cihu people's house, Cicheng Town, Jiangbei District, Ningbo City, Zhejiang Province 315000

Patentee before: Ningbo chaoyongdao investment partnership (L.P.)

Country or region before: China

TR01 Transfer of patent right