CN109787956A - Tables of data encryption method, device, computer equipment and storage medium - Google Patents

Tables of data encryption method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109787956A
CN109787956A CN201811527346.1A CN201811527346A CN109787956A CN 109787956 A CN109787956 A CN 109787956A CN 201811527346 A CN201811527346 A CN 201811527346A CN 109787956 A CN109787956 A CN 109787956A
Authority
CN
China
Prior art keywords
encrypted
encryption
field
fields
data table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811527346.1A
Other languages
Chinese (zh)
Other versions
CN109787956B (en
Inventor
苏渊博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811527346.1A priority Critical patent/CN109787956B/en
Publication of CN109787956A publication Critical patent/CN109787956A/en
Application granted granted Critical
Publication of CN109787956B publication Critical patent/CN109787956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present application discloses a kind of tables of data encryption method, device, computer equipment and storage medium.This method comprises: receiving the request of data that terminal is sent, primary data table corresponding with request of data is obtained;Each initial field in primary data table is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and the serial number of field to be encrypted and non-encrypted fields in primary data table is stored in segment information;If the number of field to be encrypted is within a preset range, each field to be encrypted is individually encrypted, to generate the first encrypted fields;Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;Second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.The tables of data encryption method is based on information encryption, and the sensitive information for the tables of data that terminal can be back to server encrypts, to improve the safety of information transmission.

Description

Tables of data encryption method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology more particularly to a kind of tables of data encryption method, device, computer equipment and Storage medium.
Background technique
In the prior art, terminal to server send request of data, server when receiving request of data, usually with Data are back to terminal by the mode not encrypted.If server is obtained to data transmitted by terminal by third party illegal user It takes, and is distorted, the data after distorting are sent to terminal by third party illegal user, and which results in received by terminal Data and requested data are inconsistent, are easy to cause information-leakage, affect user experience.
Summary of the invention
This application provides a kind of tables of data encryption method, device, computer equipment and storage mediums, to improve information biography Defeated safety.
In a first aspect, this application provides a kind of tables of data encryption methods comprising:
The request of data that terminal is sent is received, primary data table corresponding with the request of data is obtained, it is described initial Tables of data includes multiple initial fields being ranked up by certain serial number;
Each initial field in the primary data table is matched with predetermined encryption field, it is to be encrypted to filter out Field and non-encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in In segment information, wherein the field to be encrypted is initial field identical with the predetermined encryption field, the not encrypted word The different initial field of predetermined encryption field described in Duan Weiyu;
If the number of the field to be encrypted within the scope of default value, individually adds each field to be encrypted It is close, to generate the first encrypted fields, wherein the default value range be a standard-sized sheet section, the default value range it is upper Limit value is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one;
Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;
Second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.
Second aspect, this application provides a kind of tables of data encryption devices comprising:
First acquisition unit obtains corresponding with the request of data first for receiving the request of data of terminal transmission Beginning tables of data, the primary data table include multiple initial fields being ranked up by certain serial number;
Matching unit, for each initial field in the primary data table to be matched with predetermined encryption field, To filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and the not encrypted fields in primary data table In serial number be stored in segment information;
First encryption unit, if the number for the field to be encrypted within the scope of default value, to it is each it is described to Encrypted fields are individually encrypted, to generate the first encrypted fields;
Second encryption unit is encrypted for being integral multiple first encrypted fields, to generate second Encrypted fields;
First generation unit is added for being combined second encrypted fields and non-encrypted fields with generating first Ciphertext data table.
The third aspect, the application provide a kind of computer equipment again, including memory, processor and are stored in described deposit On reservoir and the computer program that can run on the processor, the processor realize this when executing the computer program The described in any item tables of data encryption methods provided are provided.
Fourth aspect, present invention also provides a kind of storage mediums, wherein the storage medium is stored with computer program, The computer program makes the processor execute described in any item tables of data provided by the present application when being executed by a processor Encryption method.
The application provides a kind of tables of data encryption method, device, computer equipment and storage medium, wherein the data Table encryption method includes: the request of data for receiving terminal and sending, and obtains primary data table corresponding with the request of data, institute Stating primary data table includes multiple initial fields being ranked up by certain serial number;It will be each initial in the primary data table Field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted It is stored in segment information with serial number of the not encrypted fields in primary data table;If the number of the field to be encrypted exists Within the scope of default value, each field to be encrypted is individually encrypted, to generate the first encrypted fields;It will be multiple described First encrypted fields, which are integral, to be encrypted, to generate the second encrypted fields;By second encrypted fields and do not encrypt Field is combined, to generate the first encryption data table.The tables of data encryption method can return to the data of terminal to server The sensitive information of table is encrypted, to improve the safety of information transmission.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of schematic flow diagram of tables of data encryption method provided by the embodiments of the present application;
Fig. 2 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 3 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 4 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 5 is a kind of schematic flow diagram for tables of data encryption method that another embodiment of the application provides;
Fig. 6 is a kind of schematic flow diagram for tables of data encryption method that the application another embodiment provides;
Fig. 7 is a kind of schematic block diagram of tables of data encryption device provided by the embodiments of the present application;
Fig. 8 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Fig. 9 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 10 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 11 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 12 is a kind of schematic block diagram for tables of data encryption device that another embodiment of the application provides;
Figure 13 is a kind of schematic block diagram for tables of data encryption device that the application another embodiment provides;
Figure 14 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of tables of data encryption method provided by the embodiments of the present application.The number It is applied in server according to table encryption method.As shown in Figure 1, the tables of data encryption method includes the following steps S110~S150.
S110, the request of data that terminal is sent is received, obtains primary data table corresponding with the request of data, it is described Primary data table includes multiple initial fields being ranked up by certain serial number.
User sends request of data by terminal to server, and server obtains the request of data of terminal, to the data Request is parsed, and is searched according to the request of data the resource on server, to obtain and the request of data Corresponding primary data table, the primary data table include multiple initial fields, and for example, user is asked by terminal to server A contacts list is sought, which is primary data table, which includes " User ID ", " user's surname Name ", " cell-phone number " and " mailbox " this 4 initial fields.
Referring to Fig. 3, Fig. 3 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this In embodiment, before the step S110, the further comprising the steps of S110a and step S110b of tables of data encryption method.
S110a, the first user interface is generated, first user interface includes multiple first parameters input area, Mei Yisuo Parameter input area is stated for inputting a keyword for user, the keyword is for determining encrypted fields.
By generating the first user interface, in order to which multiple keywords are arranged in user in the first user interface, wherein every One keyword is for determining encrypted fields.For example, two keywords can be arranged in first user interface in user, respectively For " address name " and " cell-phone number ".
S110b, multiple keywords that user is inputted in first user interface are obtained, according to multiple keywords Generate predetermined encryption field.
For example, if user inputs two keywords, respectively " address name " and " cell-phone number " in the first user interface, then The predetermined encryption field is " address name " field and " cell-phone number " field.
Referring to Fig. 4, Fig. 4 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this In embodiment, before the step S110, the method includes the steps S110c and step S110d.
S110c, generate second user interface, the second user interface include multiple second parameters input area and with it is each Second parameter input area associated third parameter input area, each second parameter input area are used to input for user One keyword, for determining encrypted fields, each third parameter input area is used to input for user and encrypt the keyword Index, the encryption exponent are used to determine the encryption level of field.
By generating second user interface, in order to which multiple keywords are arranged in user on second user interface, wherein every An encryption exponent is arranged for determining encrypted fields, and for each keyword in one keyword.For example, user can be described second In user interface, two keywords, respectively " address name " and " cell-phone number ", and corresponding setting encryption exponent point are set It Wei " 1 " and " 2 ".
S110d, multiple keywords and multiple encryption exponents that user is inputted at the second user interface are obtained, according to Multiple keywords generate predetermined encryption index, wherein multiple keywords are associated with multiple encryption exponents.
For example, if user inputs two keywords, respectively " address name " and " cell-phone number " at second user interface, then The predetermined encryption field as " address name " field and " cell-phone number " field, and the encryption exponent of corresponding encrypted fields Respectively " 1 " and " 2 ".
Referring to Fig. 5, Fig. 5 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this In embodiment, after the step S110d, the method also includes step S110e and step S110f.
S110e, generate third user interface, the third user interface include multiple 4th parameter input areas and with it is each The associated 5th parameter input area in 4th parameter input area, each 4th parameter input area are used to input for user Encryption Algorithm parameter, each 5th parameter input area are used to input safety index for user.
In order to realize according to different encryption exponents, corresponding field to be encrypted is encrypted, a settable encryption parameter Mapping table, the encryption parameter mapping table include multiple Encryption Algorithm parameters and safety corresponding with each Encryption Algorithm parameter Index.By generate third user interface, in order to user inputted in third user interface multiple Encryption Algorithm parameters and Safety index.
S110f, obtain multiple Encryption Algorithm parameters that user is inputted in the third user interface and with it is each described The associated safety index of Encryption Algorithm parameter generates and adds according to multiple Encryption Algorithm parameters and multiple safety indexes Close parameter mapping table.
For example, following encryption parameter mapping table is set:
Encryption Algorithm parameter: RSA Algorithm parameter safety index: 1
Encryption Algorithm parameter: DSA algorithm parameter safety index: 2
Encryption Algorithm parameter: ECC algorithm parameter safety index: 3
Encryption Algorithm parameter: DES algorithm parameter safety index: 4
S120, each initial field in the primary data table is matched with predetermined encryption field, to filter out Field and non-encrypted fields to be encrypted, and the serial number by the field to be encrypted and the not encrypted fields in primary data table Be stored in segment information, wherein the field to be encrypted be initial field identical with the predetermined encryption field, it is described not Encrypted fields be and the different initial field of predetermined encryption field.
For example, for contacts list, it includes " address name " and " cell-phone number " that predetermined encryption field, which is arranged, then " user Name " field and " cell-phone number " field are field to be encrypted, and " User ID " and " mailbox " as not encrypted fields.The connection Serial number corresponding to each initial field of list is respectively as follows:
Field serial number: 1 field: " User ID "
Field serial number: 2 fields: " address name "
Field serial number: 3 fields: " cell-phone number "
Field serial number: 4 fields: " mailbox "
The serial number of field to be encrypted and non-encrypted fields in primary data table is stored in segment information, in order to right After field to be encrypted carries out encryption generation encrypted fields, encrypted fields and non-encrypted fields can be subjected to group according to segment information It closes, in the case where not changing serial number, generates encryption data table.
If the number of S130, the field to be encrypted is within the scope of default value, independent to each field to be encrypted It is encrypted, to generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the default value model The upper limit value enclosed is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one.
For example, for above-mentioned contacts list, 4 initial fields are only included, because setting predetermined encryption field to " to use Family name " and " cell-phone number ", then the number of field to be encrypted is 2, and if set 1 to 4 for the preset range, i.e., it is to be encrypted The number of field is less than the total number for the initial field that primary data table is included, and is greater than one, at this point, to each described to be added Close field is individually encrypted, and the first encrypted fields are generated.
Referring to Fig. 6, Fig. 6 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this In embodiment, the step S130 includes sub-step S131~S132.
Referring to fig. 2, in this embodiment, before the step S130, the method includes S130a.
S130a, judge the number of the field to be encrypted whether within the scope of default value.
Number by treating encrypted fields is judged, different encipherment schemes may be selected.For example, if field to be encrypted Number within the scope of default value, then each field to be encrypted can individually be encrypted, generate multiple first encrypted fields, Then multiple first encrypted fields are integral and it is encrypted, generate the second encrypted fields;And if to be encrypted The number of field is not within the scope of default value, for example, if the number of the field to be encrypted is in the primary data table The sum of initial field is then integral with the primary data table, is encrypted to it, and if the number of the field to be encrypted Mesh is one, then only encrypts to the field to be encrypted.In the present embodiment, judge to obtain institute if executing the step S130a The number of field to be encrypted is stated within the scope of default value, thens follow the steps S131, it is no to then follow the steps S130b.
If the number of S131, the field to be encrypted within the scope of default value, obtains and the field phase to be encrypted The encryption exponent matched obtains target Encryption Algorithm parameter from the encryption parameter mapping table, wherein encrypts and calculates with the target The corresponding safety index of method parameter is consistent with the encryption exponent.
For example, include " address name " field and " cell-phone number " field for predetermined encryption field, wrapped in contacts list " User ID " field, " address name " field, " cell-phone number " field and " mailbox " field are included, then field to be encrypted is " to use Family name " field and " cell-phone number " field, encryption exponent corresponding with " address name " field are 1, and with " cell-phone number " word The corresponding encryption exponent of section is 2, according to encryption parameter mapping table, would know that the safety index of " RSA Algorithm parameter " is 1, and The safety index of " DSA algorithm parameter " is 2, the two safety indexes are corresponding with the encryption exponent of two fields to be encrypted.
S132, the field to be encrypted is encrypted according to the target Encryption Algorithm parameter, generates the first encrypted word Section.
For example, for above-mentioned contacts list, i.e., " address name " field is added by " RSA Algorithm parameter " It is close, generate " address name " encrypted fields;In addition, being encrypted by " DSA algorithm parameter " to " cell-phone number " field, generate " cell-phone number " encrypted fields.
S140, it multiple first encrypted fields is integral encrypts, to generate the second encrypted fields.
It is encrypted again by being integral to multiple first encrypted fields, can further improve encrypted fields Safety.
S150, second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.
By being combined the second encrypted fields and non-encrypted fields, the first encryption data table is produced.
Referring to Fig. 2, Fig. 2 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.Such as figure Shown, the embodiment further includes step S130b and S130c after step S130a.
S130b, judge the total of the initial field whether number of the field to be encrypted is equal in the primary data table Number.
By judging the sum of initial field that whether number of the field to be encrypted is equal in the primary data table, Corresponding encryption method can be performed.For example, if the determination result is YES, i.e., all initial fields in the described primary data table are Field to be encrypted, then can the primary data table be integral, it is encrypted.In embodiments of the present invention, if executing The judging result of the step S130b be it is yes, then follow the steps S160, it is no to then follow the steps S130c.
If the number of S160, the field to be encrypted is equal to the sum of the initial field in the primary data table, by institute It states primary data table and is integral and encrypted, to generate the second encryption data table.
For example, if setting predetermined encryption field includes " User ID ", " address name ", " cell-phone number " and " mailbox ", and it is pre- If range is set as 0 to 3, especially to the contacts list, 4 fields for being included with predetermined encryption fields match, i.e., 4 A field is field to be encrypted, not within a preset range, then can the primary data because the number of field to be encrypted is 4 Table is integral, and is encrypted to the primary data table.
S130c, judge whether the number of the field to be encrypted is equal to one.
By judging whether the number of the field to be encrypted is equal to one, corresponding encryption method can be performed.For example, if sentencing Disconnected result be it is yes, i.e., only exist a field to be encrypted in the described primary data table, then the field to be encrypted can be added It is close.In embodiments of the present invention, if the judging result for executing the step S130c be it is yes, then follow the steps S170.
If the number of S170, the field to be encrypted is equal to one, the field to be encrypted is encrypted, to generate third Encrypted fields.
When the number of the field to be encrypted only one when, only the field to be encrypted is encrypted, then execute step Rapid S180.
S180, the third encrypted fields and the not encrypted fields are combined according to the segment information, with life At third encryption data table.
According to segment information, the third encrypted fields and non-encrypted fields can be combined, to obtain third encryption Tables of data.
The embodiment of the present application also provides a kind of tables of data encryption device, and the tables of data encryption device is for executing aforementioned One item data table encryption method.Fig. 7 is referred to, Fig. 7 is the schematic frame of tables of data encryption device provided by the embodiments of the present application Figure.As shown in fig. 7, the tables of data encryption device 200 includes first acquisition unit 210, the encryption list of matching unit 220, first First 230, second encryption unit 240 and the first generation unit 250.
First acquisition unit 210 obtains corresponding with the request of data for receiving the request of data of terminal transmission Primary data table, the primary data table include multiple initial fields being ranked up by certain serial number.
Matching unit 220, for by the primary data table each initial field and predetermined encryption field carry out Match, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and the not encrypted fields in initial number It is stored in segment information according to the serial number in table.
First encryption unit 230, if the number for the field to be encrypted within the scope of default value, to each described Field to be encrypted is individually encrypted, to generate the first encrypted fields, wherein and the default value range is a standard-sized sheet section, The upper limit value of the default value range is the sum of the initial field in the primary data table, the default value range Lower limit value is one.
Multiple first encrypted fields are integral and encrypt by the second encryption unit 240, are added with generating second Close field.
First generation unit 250, for being combined the encrypted fields and non-encrypted fields, to generate the first encryption Tables of data.
Fig. 8 is referred to, Fig. 8 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides.Such as Fig. 8 Shown, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the Two encryption units 240, the first generation unit 250, the first judging unit 230a, second judgment unit 230b and second generate single Member 260.Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and One generation unit 250, has been described, details are not described herein again in the above-described embodiments.Hereinafter, to the first judging unit 230a, Two judging unit 230b and the second generation unit 260 are described.
First judging unit 230a, for judging the number of the field to be encrypted whether within the scope of default value.
It is first in the primary data table to judge whether the number of the field to be encrypted is equal to by second judgment unit 230b The sum of beginning field.
Second generation unit 260, if the number for the field to be encrypted not within the scope of default value, with it is described just Beginning tables of data, which is integral, encrypts it.
Fig. 9 is referred to, Fig. 9 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides.Such as Fig. 9 Shown, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the Two encryption units 240, the first generation unit 250, the first judging unit 230a, second judgment unit 230b, the second generation unit 260, third judging unit 230c, third encryption unit 270 and third generation unit 280.Wherein, first acquisition unit 210, Matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, the first judging unit 230a, Second judgment unit 230b, the second generation unit 260, have been described, details are not described herein again in the above-described embodiments.Hereinafter, right Third judging unit 230c, third encryption unit 270 and third generation unit 280 are described.
Third judging unit 230c, for judging whether the number of the field to be encrypted is equal to one.
Third encryption unit 270 carries out the field to be encrypted if the number for the field to be encrypted is equal to one Encryption, to generate third encrypted fields.
Third generation unit 280 is used for according to the segment information to the third encrypted fields and the not encrypted word Section is combined, to generate third encryption data table.
0, Figure 10 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as Shown in Figure 10, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, the first interface generation unit 210a and second acquisition unit 210b. Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and first generate Unit 250, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to the first interface generation unit 210a and second Acquiring unit 210b is described.
First interface generation unit 210a, for generating the first user interface, first user interface includes multiple the One parameter input area, each parameter input area are used to input a keyword for user, and the keyword is for determining encryption Field.
Second acquisition unit 210b, the multiple keywords inputted for obtaining user in first user interface, root Predetermined encryption field is generated according to multiple keywords.
1, Figure 11 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as Shown in Figure 11, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c and third acquiring unit 210d. Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and first generate Unit 250, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to second contact surface generation unit 210c and third Acquiring unit 210d is described.
Second contact surface generation unit 210c, for generating second user interface, the second user interface includes multiple Two parameter input areas and with each associated third parameter in second parameter input area input area, each second parameter Input area is used to input a keyword for user, and the keyword is for determining encrypted fields, each third parameter input Area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field.
Third acquiring unit 210d, multiple keywords inputted at the second user interface for obtaining user and more A encryption exponent generates predetermined encryption fields according to multiple keywords, wherein multiple keywords and it is multiple described plus Close correlation of indices connection.
2, Figure 12 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as Shown in Figure 12, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c, third acquiring unit 210d, Three interface generation unit 210e and the 4th acquiring unit 210f.Wherein, first acquisition unit 210, matching unit 220, first Encryption unit 230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c and third obtain Unit 210d, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to third interface generation unit 210e and Four acquiring unit 210f are described.
Third interface generation unit 210e, for generating third user interface, the third user interface includes multiple Four parameter input areas and the 5th parameter input area associated with each 4th parameter input area, each 4th parameter Input area is used to input Encryption Algorithm parameter for user, and each 5th parameter input area is used to refer to safely for user's input Number.
4th acquiring unit 210f, the multiple Encryption Algorithm ginseng inputted for obtaining user in the third user interface Number and safety index associated with each Encryption Algorithm parameter, according to multiple Encryption Algorithm parameters and multiple described Safety index generates encryption parameter mapping table.
3, Figure 13 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as Shown in Figure 13, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, wherein default first encryption unit 230 includes the 5th acquisition Unit 231 and encrypted fields generation unit 232.Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and the first generation unit 250, have been described, details are not described herein again in the above-described embodiments.With Under, the 5th acquiring unit 231 and encrypted fields generation unit 232 are described.
5th acquiring unit 231, if the number for the field to be encrypted within the scope of default value, obtain with it is described The encryption exponent that field to be encrypted matches obtains target from the encryption parameter mapping table according to acquired encryption exponent Encryption Algorithm parameter, wherein safety index corresponding with the target Encryption Algorithm parameter and the encryption exponent are consistent.
Encrypted fields generation unit 232, for being carried out according to the target Encryption Algorithm parameter to the field to be encrypted Encryption, to generate the first encrypted fields.
Above-mentioned tables of data encryption device can be implemented as a kind of form of computer program, which can be such as It is run in computer equipment shown in Figure 14.
Figure 14 is please referred to, Figure 14 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.The calculating 300 equipment of machine equipment can be server.
Refering to fig. 14, which includes processor 302, memory and the net connected by system bus 301 Network interface 305, wherein memory may include non-volatile memory medium 303 and built-in storage 304.
The non-volatile memory medium 303 can storage program area 3031 and computer program 3032.The computer program 3032 include program instruction, which is performed, and processor 302 may make to execute a kind of tables of data encryption method.
The processor 302 supports the operation of entire computer equipment 300 for providing calculating and control ability.
The built-in storage 304 provides environment for the operation of the computer program 3032 in non-volatile memory medium 303, should When computer program 3032 is executed by processor 302, processor 302 may make to execute a kind of tables of data encryption method.
The network interface 305 such as sends the task dispatching of distribution for carrying out network communication.Those skilled in the art can manage It solves, structure shown in Figure 14, only the block diagram of part-structure relevant to application scheme, is not constituted to the application side The restriction for the computer equipment 300 that case is applied thereon, specific computer equipment 300 may include more than as shown in the figure Or less component, perhaps combine certain components or with different component layouts.Wherein, the processor 302 is for transporting Row computer program 3032 stored in memory, to implement function such as: receive the request of data that terminal is sent, obtain with The corresponding primary data table of the request of data, the primary data table include it is multiple be ranked up by certain serial number it is initial Field;Each initial field in the primary data table is matched with predetermined encryption field, to filter out word to be encrypted Section and not encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in point In segment information;If the number of the field to be encrypted within the scope of default value, individually carries out each field to be encrypted Encryption, to generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the default value range Upper limit value is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one;It will be multiple First encrypted fields, which are integral, to be encrypted, to generate the second encrypted fields;By second encrypted fields and institute It states not encrypted fields to be combined, to generate the first encryption data table.
In one embodiment, processor 302 adds each initial field in the primary data table with default in execution Close field is matched, and to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described is not encrypted Field also implements function such as after the serial number in primary data table is stored in segment information: if the field to be encrypted Number be equal to the primary data table in initial field sum, the primary data table is integral and is added It is close, to generate the second encryption data table.
In one embodiment, processor 302 adds each initial field in the primary data table with default in execution Close field is matched, and to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described is not encrypted Field also implements function such as after the serial number in primary data table is stored in segment information: if the field to be encrypted Number be equal to one, the field to be encrypted is encrypted, to generate third encrypted fields;According to the segment information to institute It states third encrypted fields and the not encrypted fields is combined, to generate third encryption data table.
In one embodiment, processor 302 is executing the request of data for receiving terminal and sending, and obtains and the request of data It before corresponding primary data table, also implements function such as: generating the first user interface, first user interface includes more A first parameter input area, each parameter input area are used to input a keyword for user, and the keyword is for determining Encrypted fields;Multiple keywords that user is inputted in first user interface are obtained, are generated according to multiple keywords Predetermined encryption field.
In one embodiment, processor 302 is executing the request of data for receiving terminal and sending, and obtains and the request of data It before corresponding primary data table, also implements function such as: generating second user interface, the second user interface includes more A second parameter input area and with each associated third parameter in second parameter input area input area, each described second Parameter input area is used to input a keyword for user, and the keyword is for determining encrypted fields, each third parameter Input area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field;User is obtained in institute The multiple keywords and multiple encryption exponents that second user interface is inputted are stated, generate predetermined encryption according to multiple keywords Field, wherein multiple keywords and multiple encryption exponents are associated.
In one embodiment, processor 302 is executing the multiple passes for obtaining user and being inputted at the second user interface Keyword and multiple encryption exponents also implement function such as after generating predetermined encryption field according to multiple keywords: generating Third user interface, the third user interface include multiple 4th parameter input areas and with each 4th parameter input area Associated 5th parameter input area, each 4th parameter input area is used to input Encryption Algorithm parameter for user, each The 5th parameter input area is used to input safety index for user;Acquisition user is inputted more in the third user interface A Encryption Algorithm parameter and safety index associated with each Encryption Algorithm parameter, join according to multiple Encryption Algorithm Several and multiple safety indexes generate encryption parameter mapping table.
In one embodiment, if processor 302 in the number for executing the field to be encrypted within the scope of default value, it is right Each field to be encrypted is individually encrypted, and to generate the first encrypted fields, is implemented as follows function: if described to be added The number of close field obtains the encryption exponent to match with the field to be encrypted, according to acquired within the scope of default value Encryption exponent target Encryption Algorithm parameter is obtained from the encryption parameter mapping table, wherein with the target Encryption Algorithm The corresponding safety index of parameter is consistent with the encryption exponent;According to the target Encryption Algorithm parameter to the word to be encrypted Duan Jinhang encryption, to generate the first encrypted fields.
It should be appreciated that in the embodiment of the present application, processor 302 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or Person's processor is also possible to any conventional processor etc..
A kind of storage medium is provided in another embodiment of the application.The storage medium can be computer-readable storage Medium.The storage medium is stored with computer program, and wherein computer program includes program instruction.The program instruction is by processor So that processor is executed following procedure when execution: receiving the request of data that terminal is sent, obtains corresponding with the request of data Primary data table, the primary data table include multiple initial fields being ranked up by certain serial number;By the primary data Each initial field in table is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will The serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in segment information;If described to be added The number of close field individually encrypts each field to be encrypted within the scope of default value, to generate the first encryption Field, wherein the default value range is a standard-sized sheet section, and the upper limit value of the default value range is the primary data The sum of initial field in table, the lower limit value of the default value range are one;Using multiple first encrypted fields as One entirety is encrypted, to generate the second encrypted fields;Second encrypted fields and the not encrypted fields are combined, To generate the first encryption data table.
In one embodiment, the program instruction be executed by processor by the primary data table each initial field with Predetermined encryption field is matched, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described Encrypted fields do not execute following procedure also: if described to be added after the serial number in primary data table is stored in segment information The number of close field be equal to the primary data table in initial field sum, by the primary data table be integral into Row encryption, to generate the second encryption data table.
In one embodiment, the program instruction be executed by processor by the primary data table each initial field with Predetermined encryption field is matched, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described Encrypted fields do not execute following procedure also: if described to be added after the serial number in primary data table is stored in segment information The number of close field is equal to one, encrypts to the field to be encrypted, to generate third encrypted fields;Believed according to the segmentation Breath is combined the third encrypted fields and the not encrypted fields, to generate third encryption data table.
In one embodiment, the program instruction be executed by processor receive terminal send request of data, obtain with it is described Before the corresponding primary data table of request of data, following procedure is also executed: generating the first user interface, first user circle Face includes multiple first parameters input area, and each parameter input area is used to input a keyword, the keyword for user For determining encrypted fields;Multiple keywords that user is inputted in first user interface are obtained, according to multiple passes Keyword generates predetermined encryption field.
In one embodiment, the program instruction be executed by processor receive terminal send request of data, obtain with it is described Before the corresponding primary data table of request of data, following procedure is also executed: generating second user interface, second user circle Face include multiple second parameters input area and with each associated third parameter in second parameter input area input area, it is each Second parameter input area is used to input a keyword for user, and the keyword is each described for determining encrypted fields Third parameter input area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field;It obtains The multiple keywords and multiple encryption exponents that user is inputted at the second user interface are generated according to multiple keywords Predetermined encryption field, wherein multiple keywords and multiple encryption exponents are associated.
In one embodiment, which, which is executed by processor, obtains what user was inputted at the second user interface Multiple keywords and multiple encryption exponents also execute following journey after generating predetermined encryption field according to multiple keywords Sequence: generating third user interface, and the third user interface includes multiple 4th parameter input areas and joins with each described 4th The number associated 5th parameter input area in input area, each 4th parameter input area are used to input Encryption Algorithm ginseng for user Number, each 5th parameter input area are used to input safety index for user;User is obtained in the third user interface institute Multiple Encryption Algorithm parameters of input and safety index associated with each Encryption Algorithm parameter, according to multiple described plus Close algorithm parameter and multiple safety indexes generate encryption parameter mapping table.In one embodiment, the program instruction is processed If device executes the number of the field to be encrypted within the scope of default value, each field to be encrypted is individually added It is close, to generate the first encrypted fields, specifically execute following procedure: if the number of the field to be encrypted is in default value range It is interior, the encryption exponent to match with the field to be encrypted is obtained, is reflected according to acquired encryption exponent from the encryption parameter Target Encryption Algorithm parameter is obtained in firing table, wherein safety index corresponding with the target Encryption Algorithm parameter and described Encryption exponent is consistent;The field to be encrypted is encrypted according to the target Encryption Algorithm parameter, to generate the first encryption Field.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), magnetic disk or The various media that can store program code such as person's CD.Those of ordinary skill in the art may be aware that in conjunction with institute herein Each exemplary unit and algorithm steps of disclosed embodiment description, can be with electronic hardware, computer software or the two In conjunction with realizing, in order to clearly illustrate the interchangeability of hardware and software, in the above description according to function generality Ground describes each exemplary composition and step.These functions are implemented in hardware or software actually, depend on technical side The specific application and design constraint of case.Professional technician can carry out each specific application to come using distinct methods real Existing described function, but this realization is it is not considered that exceed scope of the present application.In several implementations provided herein In example, it should be understood that disclosed device and method may be implemented in other ways.For example, dress described above It is only schematical to set embodiment.For example, the division of each unit, only a kind of logical function partition, in actual implementation There may be another division manner.Such as multiple units or components can be combined or can be integrated into another system or one A little features can be ignored, or not execute.Step in the embodiment of the present application method can according to actual needs the adjustment of carry out sequence, Merge and deletes.Unit in the embodiment of the present application device can be combined, divided and deleted according to actual needs.In addition, Each functional unit in each embodiment of the application can integrate in one processing unit, and it is independent to be also possible to each unit It is physically present, is also possible to two or more units and is integrated in one unit.Above-mentioned integrated unit can both use Formal implementation of hardware can also be realized in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product, It can store in one storage medium.Based on this understanding, the technical solution of the application is substantially in other words to existing skill The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, terminal or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of tables of data encryption method characterized by comprising
The request of data that terminal is sent is received, primary data table corresponding with the request of data, the primary data are obtained Table includes multiple initial fields being ranked up by certain serial number;
Each initial field in the primary data table is matched with predetermined encryption field, to filter out field to be encrypted Not encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in segmentation In information, wherein, the field to be encrypted is initial field identical with the predetermined encryption field, and the not encrypted fields are With the different initial field of predetermined encryption field;
If the number of the field to be encrypted within the scope of default value, individually encrypts each field to be encrypted, To generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the upper limit value of the default value range For the sum of the initial field in the primary data table, the lower limit value of the default value range is one;
Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;
Second encrypted fields and the not encrypted fields are combined, to generate the first encryption data table.
2. tables of data encryption method according to claim 1, which is characterized in that it is described will be in the primary data table Each initial field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will it is described to After the serial number in primary data table is stored in segment information, the method is also wrapped for encrypted fields and the not encrypted fields It includes:
If the number of the field to be encrypted is equal to the sum of the initial field in the primary data table, by the primary data Table, which is integral, to be encrypted, to generate the second encryption data table.
3. tables of data encryption method according to claim 2, which is characterized in that it is described will be in the primary data table Each initial field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will it is described to After the serial number in primary data table is stored in segment information, the method is also wrapped for encrypted fields and the not encrypted fields It includes:
If the number of the field to be encrypted is equal to one, the field to be encrypted is encrypted, to generate third encrypted fields;
The third encrypted fields and the not encrypted fields are combined according to the segment information, to generate third encryption Tables of data.
4. tables of data encryption method according to claim 1, which is characterized in that asked in the data that the reception terminal is sent It asks, before obtaining primary data table corresponding with the request of data, the method also includes:
The first user interface is generated, first user interface includes multiple first parameters input area, each parameter input Area is used to input a keyword for user, and the keyword is for determining encrypted fields;
Multiple keywords that user is inputted in first user interface are obtained, generate default add according to multiple keywords Close field.
5. tables of data encryption method according to claim 1, which is characterized in that asked in the data that the reception terminal is sent It asks, before obtaining primary data table corresponding with the request of data, the method also includes:
Second user interface is generated, the second user interface includes multiple second parameters input area and joins with each described second The number associated third parameter in input area input area, each second parameter input area are used to input a keyword for user, For determining encrypted fields, each third parameter input area is used to input encryption exponent for user the keyword, described Encryption exponent is used to determine the encryption level of field;
The multiple keywords and multiple encryption exponents that user is inputted at the second user interface are obtained, according to multiple passes Keyword generates predetermined encryption field, wherein, multiple keywords are associated with multiple encryption exponents.
6. tables of data encryption method according to claim 5, which is characterized in that used in the acquisition user described second The multiple keywords and multiple encryption exponents that family interface is inputted, according to multiple keywords generate predetermined encryption fields it Afterwards, the method also includes:
Third user interface is generated, the third user interface includes multiple 4th parameter input areas and joins with each described 4th The number associated 5th parameter input area in input area, each 4th parameter input area are used to input Encryption Algorithm ginseng for user Number, each 5th parameter input area are used to input safety index for user;
Obtain the multiple Encryption Algorithm parameters and join with each Encryption Algorithm that user is inputted in the third user interface The associated safety index of number generates encryption parameter mapping according to multiple Encryption Algorithm parameters and multiple safety indexes Table.
7. tables of data encryption method according to claim 6, which is characterized in that if the number of the field to be encrypted Within the scope of default value, each field to be encrypted is individually encrypted, includes: to generate the first encrypted fields
Refer to if the number of the field to be encrypted within the scope of default value, obtains the encryption to match with the field to be encrypted Number, target Encryption Algorithm parameter is obtained from the encryption parameter mapping table according to acquired encryption exponent, wherein with it is described The corresponding safety index of target Encryption Algorithm parameter is consistent with the encryption exponent;
The field to be encrypted is encrypted according to the target Encryption Algorithm parameter, to generate the first encrypted fields.
8. a kind of tables of data encryption device characterized by comprising
First acquisition unit obtains initial number corresponding with the request of data for receiving the request of data of terminal transmission According to table, the primary data table includes multiple initial fields being ranked up by certain serial number;
Matching unit, for matching each initial field in the primary data table with predetermined encryption field, with sieve Field and non-encrypted fields to be encrypted are selected, and by the field to be encrypted and the not encrypted fields in primary data table Serial number is stored in segment information;
First encryption unit, if the number for the field to be encrypted within the scope of default value, to each described to be encrypted Field is individually encrypted, to generate the first encrypted fields;
Second encryption unit is encrypted for being integral multiple first encrypted fields, to generate the second encryption Field;
First generation unit is added for being combined second encrypted fields and the not encrypted fields with generating first Ciphertext data table.
9. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program Any one of tables of data encryption method.
10. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the meter Calculation machine program executes the processor such as tables of data of any of claims 1-7 encryption Method.
CN201811527346.1A 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium Active CN109787956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811527346.1A CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811527346.1A CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109787956A true CN109787956A (en) 2019-05-21
CN109787956B CN109787956B (en) 2023-02-10

Family

ID=66496921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811527346.1A Active CN109787956B (en) 2018-12-13 2018-12-13 Data table encryption method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109787956B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN112988709A (en) * 2021-03-15 2021-06-18 成都乐动信息技术有限公司 Data sorting method and device, electronic equipment and storage medium
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN114726596A (en) * 2022-03-25 2022-07-08 北京沃东天骏信息技术有限公司 Sensitive data processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server
US20180294951A1 (en) * 2017-04-07 2018-10-11 X-Logos, LLC Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594548A (en) * 2012-03-22 2012-07-18 山东泰信电子有限公司 Method capable of achieving data sectional encryption and decryption
CN106874781A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 A kind of tables of data encryption method and server
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server
US20180294951A1 (en) * 2017-04-07 2018-10-11 X-Logos, LLC Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351289A (en) * 2019-07-17 2019-10-18 宜人恒业科技发展(北京)有限公司 The method and device of data encryption
CN110351289B (en) * 2019-07-17 2021-09-14 宜人恒业科技发展(北京)有限公司 Data encryption method and device
CN112988709A (en) * 2021-03-15 2021-06-18 成都乐动信息技术有限公司 Data sorting method and device, electronic equipment and storage medium
CN113573306A (en) * 2021-04-29 2021-10-29 中国南方电网有限责任公司 5G-fused heterogeneous networking gateway encryption method and system
CN114726596A (en) * 2022-03-25 2022-07-08 北京沃东天骏信息技术有限公司 Sensitive data processing method and device

Also Published As

Publication number Publication date
CN109787956B (en) 2023-02-10

Similar Documents

Publication Publication Date Title
CN109787956A (en) Tables of data encryption method, device, computer equipment and storage medium
US11799666B2 (en) Systems and methods authenticating a digitally signed assertion using verified evaluators
Wang et al. Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing
EP3198781B1 (en) Techniques for distributing secret shares
US9160742B1 (en) Localized risk analytics for user authentication
JP6800147B2 (en) Methods, devices, terminals and servers for verifying the security of service operations
WO2021222398A1 (en) Systems and methods for cryptographic authorization of wireless communications
CN104025498B (en) Methods and apparatus for sharing real-time user context information
CN105450650B (en) A kind of safe mobile e health records access control system
EP2819351B1 (en) Information processing method, apparatus, and system
CN104798081B (en) Control the access to the clinical data analyzed by remote computing resource
CN108920714B (en) Association rule mining method and system for privacy protection in distributed environment
WO2020223588A1 (en) Systems and methods authenticating a digitally signed assertion using verified evaluators
CN107302521B (en) Method for sending and receiving user privacy data
US9537831B2 (en) Reaching anonymization service levels through added transactions
Fotiou et al. A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing
CN111131127B (en) Communication method based on live broadcast platform and related device
CN111739595B (en) Medical big data sharing analysis method and device
Sauzet et al. Estimating dichotomised outcomes in two groups with unequal variances: a distributional approach
EP3158445B1 (en) Data verification in a distributed data processing system
CN108848094A (en) Data security validation method, device, system, computer equipment and storage medium
KR20220059509A (en) System and method for distributed storage of transactions
CN109783674A (en) Image identification method, device, system, computer equipment and storage medium
CN106547626B (en) Method for balancing server in peer-to-peer architecture and server
KR20160129930A (en) Game Server for being Loaded Game Resources, Game Method using the same and Game Developing System including the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant