CN107885864A - A kind of encryption data querying method, system, device and readable storage medium storing program for executing - Google Patents
A kind of encryption data querying method, system, device and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN107885864A CN107885864A CN201711174479.0A CN201711174479A CN107885864A CN 107885864 A CN107885864 A CN 107885864A CN 201711174479 A CN201711174479 A CN 201711174479A CN 107885864 A CN107885864 A CN 107885864A
- Authority
- CN
- China
- Prior art keywords
- data
- target
- value
- storage value
- checked
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Abstract
The invention discloses a kind of encryption data querying method, the unique mark of target data can be utilized, the position of target storage value is determined with the corresponding relation of unique mark and target storage value positional information, so as to get target storage value, then decryption target storage is worth in plain text, and data to be checked are finally determined in plaintext.It can be seen that, in this programme, it can be matched using the unique identification information of target data, so that it is determined that the ciphertext to the target storage value where data to be checked, only need to decrypt target storage value so as to inquire about in the whole flow process of data to be checked, no longer need all to decrypt all data, then match the current specific position of data to be checked again wherein.Reduced while the computing resource for saving decryption time-consuming.
Description
Technical field
The present invention relates to data computer data security arts, more specifically to a kind of encryption data querying method,
System, device and computer-readable recording medium.
Background technology
At present, due to each system safety requirements, most application system starts related application data being encrypted.But
It is if it is desired to when finding the target data of needs in a large amount of encryption datas, then needs all to decrypt all encryption datas, obtain
Go to match after to the plaintext of all encryption datas, it is determined that the data being currently needed for, it is clear that decryption total data wastes largely
Time and computing resource.
Therefore, how data to be checked are simply inquired in the data encrypted, is those skilled in the art's needs
Solve the problems, such as.
The content of the invention
It is an object of the invention to provide a kind of encryption data querying method, simply to be inquired about in the data encrypted
To data to be checked.
To achieve the above object, the embodiments of the invention provide following technical scheme:
A kind of encryption data querying method, including:
Determine the unique identification information of target data;
The storage position of target storage value corresponding with the unique identification information is searched using the corresponding relation pre-saved
Confidence ceases;The corresponding relation that pre-saves is the storage position of each unique identification information and each storage value pre-saved
The corresponding relation of confidence breath;The target storage value includes the secret value with the data to be checked of the target data association;
The target storage value is determined using the storage location information of the target storage value;
Decrypt the target storage and be worth to target in plain text, and data to be checked are obtained in the target plaintext.
Wherein, the unique identification information is the hash values of the target data.
Wherein, the hash values that the target data is calculated using SHA1 algorithms for the unique mark,
Or, the hash values that the target data is calculated using SHA256 algorithms.
Wherein, the storage value is stored in database, then the storage location information is storage value ID.
Wherein, the corresponding relation is pre-stored in memory cache.
In order to solve the above technical problems, present invention also offers a kind of encryption data inquiry system, including:
Determining module, for determining the unique identification information of target data;
Searching modul, deposited for searching target corresponding with the unique identification information using the corresponding relation pre-saved
The storage location information of Stored Value;The corresponding relation pre-saved is each unique identification information pre-saved with each depositing
The corresponding relation of the storage location information of Stored Value;The target storage value includes the data to be checked with the target data association
Secret value;
Acquisition module, for determining the target storage value using the storage location information of the target storage value;
Deciphering module, target is worth in plain text for decrypting the target storage, and obtains and treat in the target plaintext
Inquire about data.
Wherein, the unique identification information is the hash values of the target data.
Wherein, the corresponding relation is pre-stored in memory cache.
In order to solve the above technical problems, present invention also offers a kind of encryption data inquiry unit, including:
Memory, for storing computer program;
Processor, the step of realizing the encryption data querying method during for performing the computer program.
It is described computer-readable to deposit in order to solve the above technical problems, the present invention provides a kind of computer-readable recording medium
Computer program is stored with storage media, the computer program realizes the encryption data querying method when being executed by processor
The step of.
By above scheme, a kind of encryption data querying method provided in an embodiment of the present invention, it is first determined target
The unique identification information of data;Target storage corresponding with the unique identification information is searched using the corresponding relation pre-saved
The storage location information of value;The corresponding relation pre-saved is each unique identification information and each storage pre-saved
The corresponding relation of the storage location information of value;The target storage value includes and the data to be checked of the target data association
Secret value;The target storage value is determined using the storage location information of the target storage value;Decrypt the target storage value
Obtain target in plain text, and data to be checked are obtained in the target plaintext.
As can be seen here, a kind of encryption data querying method provided in an embodiment of the present invention, target data can be utilized only
One mark, the position of target storage value is determined with the corresponding relation of unique mark and target storage value positional information, so as to obtain
To target storage value, then decrypt target storage and be worth in plain text, data to be checked are finally determined in plaintext.It can be seen that we
In case, it can be matched using the unique identification information of target data, so that it is determined that being deposited to the target where data to be checked
The ciphertext of Stored Value, only need to decrypt target storage value so as to inquire about in the whole flow process of data to be checked, it is no longer necessary to
All data are all decrypted, then match the current specific position of data to be checked again wherein.Save the meter of decryption
Reduced while calculating resource time-consuming.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of encryption data querying method flow chart disclosed in the embodiment of the present invention;
Fig. 2 is data encryption stage signaling diagram in a kind of encryption data querying method disclosed in the embodiment of the present invention;
Fig. 3 is data query stage signaling diagram in a kind of encryption data querying method disclosed in the embodiment of the present invention;
Fig. 4 is a kind of encryption data inquiry system structural representation disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of encryption data querying method, simply to be inquired in the data encrypted
Data to be checked.
Referring to Fig. 1, a kind of encryption data querying method provided in an embodiment of the present invention, specifically include:
S101, determine the unique identification information of target data.
Specifically, for data encryption when, the processing of unique mark has been done to target data, has obtained corresponding each target
The unique identification information of data, such as hash processing is carried out to target data, obtain its hash value.
It should be noted that target data is the data for inquiring about data to be checked, target data and data to be checked
For the data of association.For example, there is multigroup sensitive information for needing to encrypt, every group of data are name, correspond to the body of this name
Part card number etc., it is assumed that need to inquire about corresponding name using identification card number during inquiry, then can be using identification card number as target
Data, calculate the unique identification information of each identification card number.The quantity of target data and data to be checked is with content according to tool
Depending on body situation, do not limit here.
In inquiry, first have to determine the unique identification information of target data, so as to follow-up inquiry.Such as determine above-mentioned
The good unique identification information of identity card.
S102, depositing for target storage value corresponding with the unique identification information is searched using the corresponding relation pre-saved
Store up positional information;The corresponding relation that pre-saves is each unique identification information for pre-saving and each storage value is deposited
Store up the corresponding relation of positional information;The target storage value includes the encryption with the data to be checked of the target data association
Value.
Specifically, in data encryption, the unique identification information of each target data and depositing for each storage value are saved
Store up the corresponding relation of positional information.Storage value can be understood as a packet, can include data to be checked, target data with
And the secret value of other data related to data to be checked, after target data corresponding to data to be checked is determined, it is determined that
This target data unique identification information, then can is found in this corresponding relation corresponds to this unique identification information
The storage location of target storage value, that is, have found the position of the secret value of data to be checked.
S103, the target storage value is determined using the storage location information of the target storage value.
Specifically, it is determined that after the storage location information of target storage value, you can determine target storage value, i.e., including to be checked
Ask one or more data of data encryption value.
S104, decrypt the target storage and be worth to target in plain text, and data to be checked are obtained in the target plaintext.
Specifically, it is decrypted after obtaining target storage value, you can obtain including the plaintext of data to be checked, so as to bright
Data to be checked are got in text.
As can be seen here, a kind of encryption data querying method provided in an embodiment of the present invention, target data can be utilized only
One mark, the position of target storage value is determined with the corresponding relation of unique mark and target storage value positional information, so as to obtain
To target storage value, then decrypt target storage and be worth in plain text, data to be checked are finally determined in plaintext.It can be seen that we
In case, it can be matched using the unique identification information of target data, so that it is determined that being deposited to the target where data to be checked
The ciphertext of Stored Value, only need to decrypt target storage value so as to inquire about in the whole flow process of data to be checked, it is no longer necessary to
All data are all decrypted, then match the current specific position of data to be checked again wherein.Save the meter of decryption
Reduced while calculating resource time-consuming.
The embodiment of the present invention provides a kind of specific encryption data querying method, is different from above-described embodiment, and the present invention is real
Apply example and specifically defined and explanation has been done to unique identification information in above-described embodiment, other step contents and above-described embodiment are big
Cause identical, specifically may be referred to above-described embodiment, here is omitted.
Specifically, the unique identification information is the hash values of the target data.
It should be noted that the identification information of target data can be hash values, when to data encryption, can utilize such as
SHA1, SHA256 etc. hash algorithm are calculated target data, obtain its hash value.
The embodiment of the present invention provides a kind of specific encryption data querying method, is different from above-described embodiment, and the present invention is real
Apply example and specifically defined with illustrating, other step contents and above-described embodiment substantially phase have been done to storage value in above-described embodiment
Together, above-described embodiment is specifically may be referred to, here is omitted.
Specifically, the storage value is stored in database, then the storage location information is storage value ID.
In this programme, storage value is that the secret value for the one or more data for including data to be checked can be stored in number
According in storehouse, the positional information of corresponding storage value can be ID of the storage value in database.Then corresponding relation can be storage value
ID and target data unique identification information corresponding relation, find storage value using storage value ID cans in database, enter
And obtain the secret value of data to be checked therein.
The embodiment of the present invention provides a kind of specific encryption data querying method, and difference and above-described embodiment, the present invention are real
Apply example and further restriction and explanation have been done to corresponding relation in above-described embodiment, other step contents and above-described embodiment are substantially
It is identical, above-described embodiment is specifically may be referred to, here is omitted.
Specifically, the corresponding relation is pre-stored in internal memory.
Can be with rapidly locating, due to memory cache by the corresponding relation of memory cache positional information and target data
Access speed be that can find the encryption data of data to be checked between 10 to 50 times of hard disk IO speed faster.
A kind of specific encryption data querying method provided in an embodiment of the present invention is introduced below.Referring to Fig. 2 with
A kind of Fig. 3, specific encryption data querying method provided in an embodiment of the present invention, is specifically included:
Ciphering process:
The first step, application system generate a source data, such as telephone number:1388888666, Xiao Li, address
XXXXXX;
Second step, because above-mentioned source data is sensitive data, it need to be encrypted, hash processing is carried out to it first,
Such as HASH processing costs is carried out to the number and is:
93bd763a0abb8dedccb5e0d7a5a640b7a0c15bed;
3rd step, AES encrypted source data is called, for example, telephone number 1388888666, obtains secret value;
U2FsdGVkX1803gjwaQSaULF/LUZ8vR4JeyWrJo3ZSyE=;
4th step, secret value and HASH values are stored in database;
5th step, ID the and HASH values of storage value are stored in memory cache, cache pool can be previously generated, by database
ID the and hash values of middle storage value are stored in cache pool.
Query process:
The first step, using input inquiry data 1388888666 during encryption data, HASH values are obtained by HASH processing:
93bd763a0abb8dedccb5e0d7a5a640b7a0c15bed;
Second step, search memory cache and find ID;
3rd step, encryption data corresponding to being found in database is found according to ID and is decrypted, after decryption bright
The associated data of correlation is obtained in text.
A kind of encryption data inquiry system provided in an embodiment of the present invention is introduced below, one kind described below adds
Ciphertext data inquiry system can be with cross-referenced with a kind of above-described encryption data querying method.
Referring to Fig. 4, a kind of encryption data inquiry system provided in an embodiment of the present invention, specifically include:
Determining module 201, for determining the unique identification information of target data.
Specifically, for data encryption when, the processing of unique mark has been done to target data, has obtained corresponding each target
The unique identification information of data, such as hash processing is carried out to target data, obtain its hash value.
It should be noted that target data is the data for inquiring about data to be checked, target data and data to be checked
For the data of association.For example, there is multigroup sensitive information for needing to encrypt, every group of data are name, correspond to the body of this name
Part card number etc., it is assumed that need to inquire about corresponding name using identification card number during inquiry, then can be using identification card number as target
Data, calculate the unique identification information of each identification card number.The quantity of target data and data to be checked is with content according to tool
Depending on body situation, do not limit here.
In inquiry, determining module 201 first has to determine the unique identification information of target data, so as to follow-up inquiry.
Such as determine the good unique identification information of above-mentioned identity card.
Searching modul 202, for searching mesh corresponding with the unique identification information using the corresponding relation pre-saved
Mark the storage location information of storage value;The corresponding relation that pre-saves be each unique identification information for pre-saving with it is every
The corresponding relation of the storage location information of individual storage value;The target storage value includes to be checked with the target data association
The secret value of data.
Specifically, in data encryption, the unique identification information of each target data and depositing for each storage value are saved
Store up the corresponding relation of positional information.Storage value can be understood as a packet, can include data to be checked, target data with
And the secret value of other data related to data to be checked, after target data corresponding to data to be checked is determined, it is determined that
This target data unique identification information, then the can of searching modul 202 is found in this corresponding relation corresponds to this only
The storage location of the target storage value of one identification information, that is, have found the position of the secret value of data to be checked.
Acquisition module 203, for determining the target storage value using the storage location information of the target storage value.
Specifically, it is determined that after the storage location information of target storage value, acquisition module 203 can determine that target stores
Value, that is, include one or more data of data encryption value to be checked.
Deciphering module 204, target is worth in plain text for decrypting the target storage, and is obtained in the target plaintext
Data to be checked.
Specifically, deciphering module 204 is decrypted to it after obtaining target storage value, you can is obtained bright comprising data to be checked
Text, so as to get data to be checked in plaintext.
As can be seen here, a kind of encryption data inquiry system provided in an embodiment of the present invention, searching modul 202 can utilize mesh
The unique mark of data is marked, the position of target storage value is determined with the corresponding relation of unique mark and target storage value positional information
Put, acquisition module 203 is so as to get target storage value, and then deciphering module 204 is decrypted target storage and is worth in plain text, finally
Data to be checked are determined in plaintext.It can be seen that in this programme, can be matched using the unique identification information of target data,
So that it is determined that to the ciphertext of the target storage value where data to be checked, only needed so as to inquire about in the whole flow process of data to be checked
Target storage value is decrypted, it is no longer necessary to all data are all decrypted, then match current data to be checked again
Specific position is wherein.Reduced while the computing resource for saving decryption time-consuming.
The embodiment of the present invention provides a kind of specific encryption data inquiry system, is different from above-described embodiment, and the present invention is real
Apply example and specifically defined and explanation has been done to unique identification information in above-described embodiment, other module contents and above-described embodiment are big
Cause identical, specifically may be referred to above-described embodiment, here is omitted.
Specifically, the unique identification information is the hash values of the target data.
It should be noted that the identification information of target data can be hash values, when to data encryption, can utilize such as
SHA1, SHA256 etc. hash algorithm are calculated target data, obtain its hash value.
The embodiment of the present invention provides a kind of specific encryption data inquiry system, is different from above-described embodiment, and the present invention is real
Apply example and specifically defined with illustrating, other module contents and above-described embodiment substantially phase have been done to storage value in above-described embodiment
Together, above-described embodiment is specifically may be referred to, here is omitted.
Specifically, the storage value is stored in database, then the storage location information is storage value ID.
In this programme, storage value is that the secret value for the one or more data for including data to be checked can be stored in number
According in storehouse, the positional information of corresponding storage value can be ID of the storage value in database.Then corresponding relation can be storage value
ID and target data unique identification information corresponding relation, find storage value using storage value ID cans in database, enter
And obtain the secret value of data to be checked therein.
The embodiment of the present invention provides a kind of specific encryption data inquiry system, and difference and above-described embodiment, the present invention are real
Apply example and further restriction and explanation have been done to corresponding relation in above-described embodiment, other step contents and above-described embodiment are substantially
It is identical, above-described embodiment is specifically may be referred to, here is omitted.
Specifically, the corresponding relation is pre-stored in internal memory.
Can be with rapidly locating, due to memory cache by the corresponding relation of memory cache positional information and target data
Access speed be that can find the encryption data of data to be checked between 10 to 50 times of hard disk IO speed faster.
A kind of encryption data inquiry unit provided in an embodiment of the present invention is introduced below, one kind described below adds
Ciphertext data inquiry unit can be with cross-referenced with above-described one zhang red encryption data querying method.
A kind of encryption data inquiry unit, is specifically included:
Memory, for storing computer program;
Processor, the encryption data issuer as described in above-mentioned any embodiment is realized during for performing the computer program
The step of method.
A kind of computer-readable recording medium provided in an embodiment of the present invention is introduced below, one kind described below
Computer-readable recording medium can be with cross-referenced with above-described one zhang red encryption data querying method.
Specifically, computer program is stored with a kind of computer-readable recording medium provided in an embodiment of the present invention, institute
State the step of encryption data querying method described in any of the above-described embodiment is realized when computer program is executed by processor.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other
The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (10)
- A kind of 1. encryption data querying method, it is characterised in that including:Determine the unique identification information of target data;The storage location that target storage value corresponding with the unique identification information is searched using the corresponding relation pre-saved is believed Breath;The corresponding relation that pre-saves is the storage location letter of each unique identification information and each storage value pre-saved The corresponding relation of breath;The target storage value includes the secret value with the data to be checked of the target data association;The target storage value is determined using the storage location information of the target storage value;Decrypt the target storage and be worth to target in plain text, and data to be checked are obtained in the target plaintext.
- 2. according to the method for claim 1, it is characterised in that the unique identification information is the hash of the target data Value.
- 3. according to the method for claim 2, it is characterised in that the unique mark is using SHA1 algorithms to the mesh The hash values that mark data are calculated, or, the hash that the target data is calculated using SHA256 algorithms Value.
- 4. according to the method for claim 1, it is characterised in that the storage value is stored in database, then the storage Positional information is storage value ID.
- 5. method as claimed in any of claims 1 to 4, it is characterised in that the corresponding relation is pre-stored in In memory cache.
- A kind of 6. encryption data inquiry system, it is characterised in that including:Determining module, for determining the unique identification information of target data;Searching modul, for searching target storage value corresponding with the unique identification information using the corresponding relation pre-saved Storage location information;The corresponding relation pre-saved is each unique identification information and each storage value pre-saved Storage location information corresponding relation;The target storage value include with the data to be checked of the target data association plus Close value;Acquisition module, for determining the target storage value using the storage location information of the target storage value;Deciphering module, target is worth in plain text for decrypting the target storage, and obtained in the target plaintext to be checked Data.
- 7. system according to claim 6, it is characterised in that the unique identification information is the hash of the target data Value.
- 8. the system according to claim 6 or 7, it is characterised in that the corresponding relation is pre-stored in memory cache.
- A kind of 9. encryption data inquiry unit, it is characterised in that including:Memory, for storing computer program;Processor, the encryption data issuer as described in any one of claim 1 to 5 is realized during for performing the computer program The step of method.
- 10. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the encryption data querying method as described in any one of claim 1 to 5 is realized when the computer program is executed by processor The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711174479.0A CN107885864A (en) | 2017-11-22 | 2017-11-22 | A kind of encryption data querying method, system, device and readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711174479.0A CN107885864A (en) | 2017-11-22 | 2017-11-22 | A kind of encryption data querying method, system, device and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107885864A true CN107885864A (en) | 2018-04-06 |
Family
ID=61778119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711174479.0A Pending CN107885864A (en) | 2017-11-22 | 2017-11-22 | A kind of encryption data querying method, system, device and readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107885864A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040790A (en) * | 2018-06-28 | 2018-12-18 | 苏州科达科技股份有限公司 | Data encryption/decryption method, device and electronic equipment |
CN109872282A (en) * | 2019-01-16 | 2019-06-11 | 众安信息技术服务有限公司 | A kind of image desensitization method based on computer vision and system |
CN110618999A (en) * | 2019-08-01 | 2019-12-27 | 平安科技(深圳)有限公司 | Data query method and device, computer storage medium and electronic equipment |
CN111008325A (en) * | 2020-03-10 | 2020-04-14 | 支付宝(杭州)信息技术有限公司 | Data query method, device, electronic equipment and system |
CN111523132A (en) * | 2020-04-21 | 2020-08-11 | 国网电子商务有限公司 | Data storage and transmission method and device based on identification technology |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102842009A (en) * | 2011-06-20 | 2012-12-26 | 瑞萨电子株式会社 | Semiconductor device |
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
-
2017
- 2017-11-22 CN CN201711174479.0A patent/CN107885864A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102842009A (en) * | 2011-06-20 | 2012-12-26 | 瑞萨电子株式会社 | Semiconductor device |
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040790A (en) * | 2018-06-28 | 2018-12-18 | 苏州科达科技股份有限公司 | Data encryption/decryption method, device and electronic equipment |
CN109040790B (en) * | 2018-06-28 | 2020-12-22 | 苏州科达科技股份有限公司 | Data encryption and decryption method and device and electronic equipment |
CN109872282A (en) * | 2019-01-16 | 2019-06-11 | 众安信息技术服务有限公司 | A kind of image desensitization method based on computer vision and system |
CN110618999A (en) * | 2019-08-01 | 2019-12-27 | 平安科技(深圳)有限公司 | Data query method and device, computer storage medium and electronic equipment |
CN111008325A (en) * | 2020-03-10 | 2020-04-14 | 支付宝(杭州)信息技术有限公司 | Data query method, device, electronic equipment and system |
CN111523132A (en) * | 2020-04-21 | 2020-08-11 | 国网电子商务有限公司 | Data storage and transmission method and device based on identification technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107885864A (en) | A kind of encryption data querying method, system, device and readable storage medium storing program for executing | |
CN109033855B (en) | Data transmission method and device based on block chain and storage medium | |
CN105577379A (en) | Information processing method and apparatus thereof | |
EP3780484B1 (en) | Cryptographic operation and working key creation method and cryptographic service platform and device | |
US11042652B2 (en) | Techniques for multi-domain memory encryption | |
CN109034796A (en) | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain | |
CN108768990A (en) | It is a kind of that encryption method can search for based on block chain | |
CN103324671A (en) | Information memorization and management method and device based on Webkit browser | |
CN104657670A (en) | Data encryption based safety use method of configuration file | |
CN103279694B (en) | A kind of loading, guard method and device of file system | |
CN114327261B (en) | Data file storage method and data security agent | |
CN100596058C (en) | System and method for managing credible calculating platform key authorization data | |
CN114386058A (en) | Model file encryption and decryption method and device | |
CN105791244A (en) | Method, boundary router and system for controlling inter-domain routing change | |
CN104023009A (en) | Web system license verification mechansim | |
CN113722741A (en) | Data encryption method and device and data decryption method and device | |
CN105119917B (en) | Strengthen the method and system of Information Security | |
Han | Message encryption methods for DDS security performance improvement | |
Kim et al. | Single tag sharing scheme for multiple-object RFID applications | |
CN110737913A (en) | Safety desensitization method and device based on time and date data and computer equipment | |
US20230169186A1 (en) | Method to secure computer code | |
CN115329359A (en) | Secret query method and system | |
US11856085B2 (en) | Information management system and method for the same | |
CN103699855A (en) | Data processing method and data processing device | |
CN104866740A (en) | Static analysis preventing method and device for files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |