CN107682303B - System and method for encrypting and inquiring personal sensitive information - Google Patents
System and method for encrypting and inquiring personal sensitive information Download PDFInfo
- Publication number
- CN107682303B CN107682303B CN201610622747.XA CN201610622747A CN107682303B CN 107682303 B CN107682303 B CN 107682303B CN 201610622747 A CN201610622747 A CN 201610622747A CN 107682303 B CN107682303 B CN 107682303B
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- input
- module
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a personal sensitive information encryption query system and a method, wherein one or more personal sensitive information is processed by an irreversible encryption algorithm, the processed result is used for replacing the original sensitive information, when the data needs to be queried, different keys are used for encryption communication between an application and a user, after the application receives an encryption condition, the data input by the user is converted into encryption content which can be used for database matching according to an encryption and decryption rule, namely the input content of the user and the transmitted encrypted data cannot be directly matched with a database, and the risk of data leakage after the database is leaked is prevented. And comparing the result obtained by the application conversion with the processed personal sensitive information in the database, if the result is the same, indicating that the query is hit, otherwise, not finding the result, and even if the data processed by the irreversible algorithm is leaked, the original information before processing cannot be obtained, so that the sensitive data is available on the premise of ensuring the safety.
Description
Technical Field
The invention relates to the use and confidential processing of sensitive information, in particular to a system and a method for encrypting and inquiring personal sensitive information.
Background
At present, sensitive data stored in each system has more information, but cannot be directly taken for use, so as to avoid unnecessary risks caused by secret divulgence or violation of legal regulations, but the utilization value of the part of data is very high, how to reasonably utilize the sensitive data under the condition of avoiding the secret divulgence risk is very important and difficult, when the sensitive data is applied, which information exists in the sensitive data and whether the required sensitive information exists in a certain database or not are inevitably required to be known in advance, but in the current technology, the risk of secret divulgence is inevitably caused when the information is obtained, so that the application of the sensitive information is blocked.
For the above reasons, the present inventors have made intensive studies on the existing sensitive information query system and method, and have devised a personal sensitive information encryption query system and method capable of solving the above problems.
Disclosure of Invention
In order to overcome the problems, the inventor of the invention makes a keen study and designs a personal sensitive information encryption query system and a method, in the method, one or more personal sensitive information is processed by an irreversible encryption algorithm, the processed result is used for replacing the original sensitive information, when the data needs to be queried, different keys are firstly used for encryption communication between an application and a user, after the application receives an encryption condition, the data input by the user is converted into encryption content which can be used for database matching according to an encryption and decryption rule, namely the input content of the user and the transmitted encrypted data cannot be directly matched with the database, and the leakage risk of the data after the database is leaked is prevented. And comparing the result obtained by the application conversion with the processed personal sensitive information in the database, if the result is the same, indicating that the query is hit, otherwise, not finding the result, and even if the data processed by the irreversible algorithm is leaked, the original information before the processing cannot be obtained, so that the sensitive data is available on the premise of ensuring the safety, thereby completing the invention.
Specifically, the present invention aims to provide the following:
(1) a system for cryptographically querying personal sensitive information, the system comprising: a data application section 001, a communication section 002, an encrypted data section 003 and a sensitive data section 004,
wherein the data application section 001 includes:
an input module 011 for inputting information from the outside to the data application section 001, an
An input encryption module 012, configured to receive input information from the input module 011, encrypt the input information, and transmit the encrypted input information to the communication unit 002, and preferably, the input encryption module 012 is further configured to receive feedback information from the communication unit 002, decrypt the feedback information, and transmit the decrypted feedback information to the input module 011;
the communication unit 002 is configured to transmit the input information encrypted by the input encryption module 012 to the encrypted data unit 003, and transmit the feedback information from the encrypted data unit 003 to the input encryption module 012;
the sensitive data part 004 includes:
a sensitive information database 041 for receiving and storing sensitive information and passing said sensitive information to a one-way information encryption module 042, and
the unidirectional information encryption module 042 is used for receiving the sensitive information and performing unidirectional encryption processing on the received sensitive information to obtain irreversible encryption information;
the encrypted data section 003 includes:
a sensitive information encryption result library 031 for storing irreversible encryption information after one-way encryption processing by the one-way information encryption module 042, and
an access conversion module 032, configured to receive the input information encrypted by the input encryption module 012, and perform conversion processing on the input information, so that the input information after the conversion processing can be applied in the sensitive information encryption result library 031; preferably, the access converting module 032 is further configured to perform conversion processing on the feedback information obtained after the input information is applied in the sensitive information encryption result library 031, and convert the feedback information into a ciphertext that can be used by the data application section 001.
(2) The system for inquiring personal sensitive information through encryption according to the above item (1), wherein the input module 011 includes an input device and a display device, the input device is configured to enter input information into the data application section 001, and the display device is configured to display feedback information obtained from the sensitive information encryption result library 031.
(3) The system for inquiring personal sensitive information through encryption as described in (1) above, wherein the encryption method selected in the one-way information encryption module 042 is selected from one or more of MD5, SHA128, SHA256, and SHA 512.
(4) The system for inquiring personal sensitive information through encryption in the above (1), wherein the encryption method of the input encryption module 012 for encrypting the received input information is the same as the encryption method selected in the one-way information encryption module 042.
(5) The system for inquiring personal sensitive information by encryption as set forth in the above (1), wherein the input information inputted from the input module 011 to the data application section 001 is sensitive information.
(6) The system for inquiring personal sensitive information encryption according to the above (1), wherein the sensitive information encryption result library 031 is further configured to receive the input information converted and processed by the access conversion module 032, compare whether a character string of the input information is consistent with a certain irreversible encryption information stored inside the input information, and send a feedback information.
(7) The system for inquiring personal sensitive information through encryption as described in the above (6), wherein the feedback information includes at least two kinds of information, one of which is confirmation information sent when irreversible encryption information consistent with the character string of the input information is stored in the sensitive information encryption result library 031, and the other one of which is denial information sent when irreversible encryption information consistent with the character string of the input information is stored in the sensitive information encryption result library 031.
(8) A method for inquiring personal sensitive information in an encryption manner is characterized by comprising the following steps:
step (1): inputting information from the outside into the input encryption module 012 through the input module 011;
step (2): the input encryption module 012 receives the input information from the input module 011, encrypts the input information and transmits the encrypted input information to the communication unit 002;
and (3): the communication unit 002 transmits the encrypted input information from the input encryption module 012 to the encrypted data unit 003;
and (4): sensitive information is received and stored through the sensitive information database 041, and the sensitive information is transmitted to the one-way information encryption module 042;
and (5): receiving the sensitive information through a one-way information encryption module 042, and performing one-way encryption processing on the received sensitive information to obtain irreversible encrypted information;
and (6): irreversible encryption information which is subjected to one-way encryption processing by the one-way information encryption module 042 is stored by a sensitive information encryption result library 031;
and (7): receiving the input information encrypted by the input encryption module 012 through the access conversion module 032, and performing conversion processing on the input information, so that the input information after the conversion processing can be applied in the sensitive information encryption result library 031;
and (8): receiving the input information converted and processed by the access conversion module 032 through a sensitive information encryption result library 031, comparing whether the character string of the input information is consistent with certain irreversible encryption information stored in the input information, and sending feedback information;
and (9): the feedback information obtained after the input information is applied in the sensitive information encryption result library 031 is processed by the access conversion module 032, and the feedback information is converted into a ciphertext which can be used by the input encryption module 012;
step (10): the feedback information from the sensitive information encryption result library 031 is transmitted to the input encryption module 012 through the communication unit 002;
step (11): the input encryption module 012 receives the feedback information from the communication unit 002, decrypts the feedback information, and transmits the decrypted feedback information to the input module 011, thereby displaying the inquiry result.
(9) The personal sensitive information encryption query method according to the above (8), wherein the input information inputted from the input module 011 to the data application section 001 is personal sensitive information;
preferably, the encryption method of the input encryption module 012 for encrypting the received input information is the same as the encryption method selected in the one-way information encryption module 042.
(10) The method for inquiring personal sensitive information in an encryption manner according to the above item (8), wherein the feedback information includes at least two states, one of which is confirmation information sent when irreversible encryption information consistent with the character string of the input information is found in the sensitive information encryption result library 031, and the other one of which is denial information sent when irreversible encryption information consistent with the character string of the input information is not found in the sensitive information encryption result library 031.
The invention has the advantages that:
(1) according to the personal sensitive information encryption query system and the personal sensitive information encryption query method, the originally unavailable sensitive data is changed into the available sensitive data;
(2) according to the system and the method for encrypting and inquiring the personal sensitive information, the needed encryption algorithm is flexibly configured through the one-way information encryption processing module, and the universality is provided;
(3) according to the system and the method for inquiring the personal sensitive information in the encryption manner, the decryption and the transmission of the sensitive data are converted, and the system and the method are convenient for foreground reference.
Drawings
Fig. 1 shows a schematic overall structure of a preferred embodiment of the present invention.
The reference numbers illustrate:
001-data application part
011-input module
012-input encryption module
002-communication part
003-encrypted data part
031-sensitive information encryption result library
032-access conversion module
004-sensitive data section
041-sensitive information database
042 one-way information encryption module
Detailed Description
The invention is explained in more detail below with reference to the figures and examples. The features and advantages of the present invention will become more apparent from the description.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The term "sensitive information" as used herein refers to all information whose loss, misuse, or unauthorized exposure or modification by a person would be detrimental to the national benefits or enforcement of federal government programs or the privacy of individuals enjoyed by personal law; the sensitive information in the present invention is preferably sensitive information about an individual, i.e. personal sensitive information;
the irreversible encryption algorithm is characterized in that a secret key is not needed in the encryption process, the system directly processes the encryption algorithm into a ciphertext after inputting a plaintext, the encrypted data cannot be decrypted, and the data can be really decrypted only by re-inputting the plaintext and processing the plaintext again through the same irreversible encryption algorithm to obtain the same encrypted ciphertext which is re-identified by the system.
According to the present invention, there is provided a system for encrypted query of personal sensitive information, as shown in fig. 1, the system comprising: a data application section 001, a communication section 002, an encrypted data section 003 and a sensitive data section 004,
wherein the data application section 001 includes:
an input module 011 for inputting information, which is called input information, from the outside to the data application section 001; and
an input encryption module 012, configured to receive input information from the input module 011, encrypt the input information, and transmit the encrypted input information to the communication unit 002, and preferably, the input encryption module 012 is further configured to receive feedback information from the communication unit 002, decrypt the feedback information, and transmit the decrypted feedback information to the input module 011;
the communication unit 002 is configured to transmit the input information encrypted by the input encryption module 012 to the encrypted data unit 003, and transmit the feedback information from the encrypted data unit 003 to the input encryption module 012;
the sensitive data part 004 includes:
a sensitive information database 041 for receiving the sensitive information contained from various data sources, storing the sensitive information, and passing the sensitive information to a one-way information encryption module 042, and
the unidirectional information encryption module 042 is configured to receive the sensitive information to be encrypted in the sensitive information database 041, perform unidirectional encryption processing on the received sensitive information to obtain irreversible encrypted information, and transmit and store a processing result in the sensitive information encryption result database 031;
the encrypted data section 003 includes:
a sensitive information encryption result library 031 for storing irreversible encryption information after one-way encryption processing by the one-way information encryption module 042, and
an access conversion module 032, configured to receive input information encrypted by the input encryption module 012, and perform conversion processing on the input information, so that the input information after the conversion processing can be applied to a sensitive information encryption result library 031, where the application means that the input information of the user can be used to match data in the sensitive information encryption result library 031 after being converted; preferably, the access converting module 032 is further configured to perform conversion processing on the feedback information obtained after the input information is applied in the sensitive information encryption result library 031, and convert the feedback information into a ciphertext that can be used by the data application section 001; the conversion processing refers to converting the format of information storage, and the core content of the information is not influenced.
In a preferred embodiment, the input module 011 comprises an input device and a display device, the input device is used for inputting input information into the data application section 001, the display device is used for displaying feedback information obtained from the sensitive information encryption result library 031, the input device comprises a keyboard and an optional mouse, and the display device comprises a display or a network interface.
In a preferred embodiment, the encryption method selected in the unidirectional information encryption module 042 is selected from one or more of MD5, SHA128, SHA256, SHA 512; according to the sensitivity of the sensitive information and the service requirement, a specific one-way encryption algorithm is selected, and preferably SHA512 is selected in the invention.
In a preferred embodiment, the encryption method used by the input encryption module 012 to encrypt the received input information is the same as the encryption method used by the unidirectional information encryption module 042, so that the character strings of the same input information and the sensitive information after encryption are the same.
In a preferred embodiment, the input information inputted into the data application section 001 by the input module 011 is personal sensitive information such as name "zhang san", identification number "123456198001011122", and the like.
In a preferred embodiment, the sensitive information encryption result library 031 is further configured to receive the input information converted and processed by the access conversion module 032, compare whether the character string of the input information is consistent with a certain irreversible encryption information stored inside the character string, and send a feedback message.
In a preferred embodiment, the feedback information at least includes two kinds of status information, one of which is confirmation information sent when irreversible encryption information consistent with the character string of the input information is found to be stored in the sensitive information encryption result library 031, and the other one of which is denial information sent when irreversible encryption information consistent with the character string of the input information is not found to be stored in the sensitive information encryption result library 031.
In a preferred embodiment, the communication unit 002 includes a database communication module disposed in the data application unit 001 and an application communication module disposed in the encrypted data unit 003, and the two modules can communicate with each other, so that the communication between the data application unit 001 and the encrypted data unit 003 can be conveniently realized.
The invention provides a personal sensitive information encryption query method, which comprises the following steps:
step (1): inputting information from the outside into the input encryption module 012 through the input module 011;
step (2): the input encryption module 012 receives the input information from the input module 011, encrypts the input information and transmits the encrypted input information to the communication unit 002;
and (3): the communication unit 002 transmits the encrypted input information from the input encryption module 012 to the encrypted data unit 003;
and (4): sensitive information is received and stored through the sensitive information database 041, and the sensitive information is transmitted to the one-way information encryption module 042;
and (5): receiving the sensitive information through a one-way information encryption module 042, and performing one-way encryption processing on the received sensitive information to obtain irreversible encrypted information;
and (6): irreversible encryption information which is subjected to one-way encryption processing by the one-way information encryption module 042 is stored by a sensitive information encryption result library 031;
and (7): receiving the input information encrypted by the input encryption module 012 through the access conversion module 032, and performing conversion processing on the input information, so that the input information after the conversion processing can be applied in the sensitive information encryption result library 031;
and (8): receiving the input information converted and processed by the access conversion module 032 through a sensitive information encryption result library 031, comparing whether the character string of the input information is consistent with certain irreversible encryption information stored in the input information, and sending feedback information;
and (9): the feedback information obtained after the input information is applied in the sensitive information encryption result library 031 is processed by the access conversion module 032, and the feedback information is converted into a ciphertext which can be used by the input encryption module 012;
step (10): the feedback information from the sensitive information encryption result library 031 is transmitted to the input encryption module 012 through the communication unit 002;
step (11): the input encryption module 012 receives the feedback information from the communication unit 002, decrypts the feedback information, and transmits the decrypted feedback information to the input module 011, thereby displaying the inquiry result.
In a preferred embodiment, the input information inputted into the data application section 001 by the input module 011 is personal sensitive information;
preferably, the encryption method of the input encryption module 012 for encrypting the received input information is the same as the encryption method selected in the one-way information encryption module 042.
In a preferred embodiment, the feedback information at least includes two kinds of information, one of which is confirmation information sent when irreversible encryption information consistent with the character string of the input information is found in the sensitive information encryption result library 031, and the other one of which is denial information sent when irreversible encryption information consistent with the character string of the input information is not found in the sensitive information encryption result library 031.
The present invention has been described above in connection with preferred embodiments, but these embodiments are merely exemplary and merely illustrative. On the basis of the above, the invention can be subjected to various substitutions and modifications, and the substitutions and the modifications are all within the protection scope of the invention.
Claims (5)
1. A system for cryptographically querying personal sensitive information, the system comprising: a data application part (001), a communication part (002), an encrypted data part (003) and a sensitive data part (004),
wherein the data application section (001) includes:
an input module (011) for inputting information from the outside to the data application section (001), an
An input encryption module (012) for receiving input information from the input module (011), encrypting the input information and transmitting the encrypted input information to the communication unit (002), and the input encryption module (012) further receiving feedback information from the communication unit (002), decrypting the feedback information and transmitting the decrypted feedback information to the input module (011);
the communication part (002) is used for transmitting the input information which is encrypted and processed from the input encryption module (012) to the encryption data part (003) and transmitting the feedback information from the encryption data part (003) to the input encryption module (012);
the sensitive data section (004) comprises:
a sensitive information database (041) for receiving and storing sensitive information and passing said sensitive information to a one-way information encryption module (042), and
the unidirectional information encryption module (042) is used for receiving the sensitive information and performing unidirectional encryption processing on the received sensitive information to obtain irreversible encryption information;
the encrypted data section (003) includes:
a sensitive information encryption result library (031) for storing irreversible encryption information after one-way encryption processing by the one-way information encryption module (042), and
the access conversion module (032) is used for receiving the input information encrypted by the input encryption module (012) and performing conversion processing on the input information, so that the input information after the conversion processing can be applied to the sensitive information encryption result library (031); the access conversion module (032) is further configured to perform conversion processing on feedback information obtained after the input information is applied to a sensitive information encryption result library (031), and convert the feedback information into a ciphertext that can be used by a data application unit (001);
the user's input information and transmitted encryption data cannot be directly matched with the encryption information in the sensitive information encryption result library (031),
the communication part (002) comprises a database communication module arranged in the data application part (001) and an application communication module arranged in the encrypted data part (003), and the two modules can communicate information with each other;
the encryption method of the input encryption module (012) for encrypting the received input information is consistent with the encryption method selected in the unidirectional information encryption module (042);
the sensitive information encryption result library (031) is also used for receiving the input information which is converted and processed by the access conversion module (032), comparing whether the character string of the input information is consistent with certain irreversible encryption information stored in the input information, and sending feedback information.
2. The system according to claim 1, wherein the input module (011) comprises an input device for entering input information into the data application section (001) and a display device for displaying feedback information obtained from the sensitive information encryption result library (031).
3. The system for encrypted querying of personal sensitive information according to claim 1, wherein the encryption method selected from the one-way information encryption module (042) is one or more selected from MD5, SHA128, SHA256 and SHA 512.
4. The system for encrypted querying of personal sensitive information according to claim 1, wherein the input information inputted into the data application part (001) by the input module (011) is sensitive information.
5. The system according to claim 1, wherein the feedback information comprises at least two types of information, one of which is a confirmation information sent when the sensitive information encryption result library (031) is found to store irreversible encryption information consistent with the character string of the input information, and the other one of which is a non-confirmation information sent when the sensitive information encryption result library (031) is not found to store irreversible encryption information consistent with the character string of the input information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610622747.XA CN107682303B (en) | 2016-08-02 | 2016-08-02 | System and method for encrypting and inquiring personal sensitive information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610622747.XA CN107682303B (en) | 2016-08-02 | 2016-08-02 | System and method for encrypting and inquiring personal sensitive information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107682303A CN107682303A (en) | 2018-02-09 |
CN107682303B true CN107682303B (en) | 2020-11-10 |
Family
ID=61133947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610622747.XA Active CN107682303B (en) | 2016-08-02 | 2016-08-02 | System and method for encrypting and inquiring personal sensitive information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107682303B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210251A (en) * | 2019-06-17 | 2019-09-06 | 阿里巴巴集团控股有限公司 | Data query method, apparatus, equipment and computer readable storage medium |
CN110457945B (en) * | 2019-08-01 | 2021-03-02 | 卫盈联信息技术(深圳)有限公司 | List query method, query party device, service party device and storage medium |
CN112401477A (en) * | 2020-09-01 | 2021-02-26 | 深圳中时利和科技有限公司 | Electronic information intelligent management device based on computer and use method |
CN112765651B (en) * | 2021-01-05 | 2024-06-28 | 广州岸边网络科技有限公司 | Privacy risk investigation method based on user terminal |
CN116208408B (en) * | 2023-02-28 | 2024-07-09 | 深圳市雁联计算系统有限公司 | Full-link sensitive information protection method, system and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102368850A (en) * | 2011-10-13 | 2012-03-07 | 福州博远无线网络科技有限公司 | Method for carrying out encryption and decryption on video file on mobile phone |
CN103236933A (en) * | 2013-05-13 | 2013-08-07 | 陈勇 | Online real-name certification system for online medical system and certification method of online real-name certification system |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9087205B2 (en) * | 2013-10-11 | 2015-07-21 | Sap Se | Shared encrypted storage |
-
2016
- 2016-08-02 CN CN201610622747.XA patent/CN107682303B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102368850A (en) * | 2011-10-13 | 2012-03-07 | 福州博远无线网络科技有限公司 | Method for carrying out encryption and decryption on video file on mobile phone |
CN103236933A (en) * | 2013-05-13 | 2013-08-07 | 陈勇 | Online real-name certification system for online medical system and certification method of online real-name certification system |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN107682303A (en) | 2018-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682303B (en) | System and method for encrypting and inquiring personal sensitive information | |
CN103812854B (en) | Identity authentication system, device and method and identity authentication requesting device | |
CN107800537B (en) | Encryption database system and method based on quantum key distribution technology, storage method and query method | |
EP2290872B1 (en) | Device for generating a message authentication code for authenticating a message | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
CN107666386B (en) | Data secure transmission method and device | |
CN106506479B (en) | Method, system and the client of cipher authentication, server and smart machine | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
CN110855616B (en) | Digital key generation system | |
CN112653719A (en) | Automobile information safety storage method and device, electronic equipment and storage medium | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN103401834A (en) | File security method in limited area based on position information | |
CN104009842A (en) | Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking | |
CN103236934A (en) | Method for cloud storage security control | |
CN110572639A (en) | video encryption and decryption evaluation tool and method based on GB35114 standard | |
CN110519238A (en) | A kind of Internet of Things security system and communication means based on cryptographic technique | |
KR20200047992A (en) | Method for simultaneously processing encryption and de-identification of privacy information, server and cloud computing service server for the same | |
US20200092096A1 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
CN106797381A (en) | Certification rod | |
KR20130085537A (en) | System and method for accessing to encoded files | |
CN104717213A (en) | Encryption and decryption method and system for network data transmission | |
Barukab et al. | Secure communication using symmetric and asymmetric cryptographic techniques | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
KR20130038894A (en) | Data processing terminal, method of processing data therof, data processing system and method of processing data thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |