CN109787956A - Tables of data encryption method, device, computer equipment and storage medium - Google Patents
Tables of data encryption method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109787956A CN109787956A CN201811527346.1A CN201811527346A CN109787956A CN 109787956 A CN109787956 A CN 109787956A CN 201811527346 A CN201811527346 A CN 201811527346A CN 109787956 A CN109787956 A CN 109787956A
- Authority
- CN
- China
- Prior art keywords
- encrypted
- encryption
- field
- fields
- data table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The embodiment of the present application discloses a kind of tables of data encryption method, device, computer equipment and storage medium.This method comprises: receiving the request of data that terminal is sent, primary data table corresponding with request of data is obtained;Each initial field in primary data table is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and the serial number of field to be encrypted and non-encrypted fields in primary data table is stored in segment information;If the number of field to be encrypted is within a preset range, each field to be encrypted is individually encrypted, to generate the first encrypted fields;Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;Second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.The tables of data encryption method is based on information encryption, and the sensitive information for the tables of data that terminal can be back to server encrypts, to improve the safety of information transmission.
Description
Technical field
This application involves field of computer technology more particularly to a kind of tables of data encryption method, device, computer equipment and
Storage medium.
Background technique
In the prior art, terminal to server send request of data, server when receiving request of data, usually with
Data are back to terminal by the mode not encrypted.If server is obtained to data transmitted by terminal by third party illegal user
It takes, and is distorted, the data after distorting are sent to terminal by third party illegal user, and which results in received by terminal
Data and requested data are inconsistent, are easy to cause information-leakage, affect user experience.
Summary of the invention
This application provides a kind of tables of data encryption method, device, computer equipment and storage mediums, to improve information biography
Defeated safety.
In a first aspect, this application provides a kind of tables of data encryption methods comprising:
The request of data that terminal is sent is received, primary data table corresponding with the request of data is obtained, it is described initial
Tables of data includes multiple initial fields being ranked up by certain serial number;
Each initial field in the primary data table is matched with predetermined encryption field, it is to be encrypted to filter out
Field and non-encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in
In segment information, wherein the field to be encrypted is initial field identical with the predetermined encryption field, the not encrypted word
The different initial field of predetermined encryption field described in Duan Weiyu;
If the number of the field to be encrypted within the scope of default value, individually adds each field to be encrypted
It is close, to generate the first encrypted fields, wherein the default value range be a standard-sized sheet section, the default value range it is upper
Limit value is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one;
Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;
Second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.
Second aspect, this application provides a kind of tables of data encryption devices comprising:
First acquisition unit obtains corresponding with the request of data first for receiving the request of data of terminal transmission
Beginning tables of data, the primary data table include multiple initial fields being ranked up by certain serial number;
Matching unit, for each initial field in the primary data table to be matched with predetermined encryption field,
To filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and the not encrypted fields in primary data table
In serial number be stored in segment information;
First encryption unit, if the number for the field to be encrypted within the scope of default value, to it is each it is described to
Encrypted fields are individually encrypted, to generate the first encrypted fields;
Second encryption unit is encrypted for being integral multiple first encrypted fields, to generate second
Encrypted fields;
First generation unit is added for being combined second encrypted fields and non-encrypted fields with generating first
Ciphertext data table.
The third aspect, the application provide a kind of computer equipment again, including memory, processor and are stored in described deposit
On reservoir and the computer program that can run on the processor, the processor realize this when executing the computer program
The described in any item tables of data encryption methods provided are provided.
Fourth aspect, present invention also provides a kind of storage mediums, wherein the storage medium is stored with computer program,
The computer program makes the processor execute described in any item tables of data provided by the present application when being executed by a processor
Encryption method.
The application provides a kind of tables of data encryption method, device, computer equipment and storage medium, wherein the data
Table encryption method includes: the request of data for receiving terminal and sending, and obtains primary data table corresponding with the request of data, institute
Stating primary data table includes multiple initial fields being ranked up by certain serial number;It will be each initial in the primary data table
Field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted
It is stored in segment information with serial number of the not encrypted fields in primary data table;If the number of the field to be encrypted exists
Within the scope of default value, each field to be encrypted is individually encrypted, to generate the first encrypted fields;It will be multiple described
First encrypted fields, which are integral, to be encrypted, to generate the second encrypted fields;By second encrypted fields and do not encrypt
Field is combined, to generate the first encryption data table.The tables of data encryption method can return to the data of terminal to server
The sensitive information of table is encrypted, to improve the safety of information transmission.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of schematic flow diagram of tables of data encryption method provided by the embodiments of the present application;
Fig. 2 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 3 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 4 is a kind of schematic flow diagram for tables of data encryption method that the another embodiment of the application provides;
Fig. 5 is a kind of schematic flow diagram for tables of data encryption method that another embodiment of the application provides;
Fig. 6 is a kind of schematic flow diagram for tables of data encryption method that the application another embodiment provides;
Fig. 7 is a kind of schematic block diagram of tables of data encryption device provided by the embodiments of the present application;
Fig. 8 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Fig. 9 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 10 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 11 is a kind of schematic block diagram for tables of data encryption device that the another embodiment of the application provides;
Figure 12 is a kind of schematic block diagram for tables of data encryption device that another embodiment of the application provides;
Figure 13 is a kind of schematic block diagram for tables of data encryption device that the application another embodiment provides;
Figure 14 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of tables of data encryption method provided by the embodiments of the present application.The number
It is applied in server according to table encryption method.As shown in Figure 1, the tables of data encryption method includes the following steps S110~S150.
S110, the request of data that terminal is sent is received, obtains primary data table corresponding with the request of data, it is described
Primary data table includes multiple initial fields being ranked up by certain serial number.
User sends request of data by terminal to server, and server obtains the request of data of terminal, to the data
Request is parsed, and is searched according to the request of data the resource on server, to obtain and the request of data
Corresponding primary data table, the primary data table include multiple initial fields, and for example, user is asked by terminal to server
A contacts list is sought, which is primary data table, which includes " User ID ", " user's surname
Name ", " cell-phone number " and " mailbox " this 4 initial fields.
Referring to Fig. 3, Fig. 3 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this
In embodiment, before the step S110, the further comprising the steps of S110a and step S110b of tables of data encryption method.
S110a, the first user interface is generated, first user interface includes multiple first parameters input area, Mei Yisuo
Parameter input area is stated for inputting a keyword for user, the keyword is for determining encrypted fields.
By generating the first user interface, in order to which multiple keywords are arranged in user in the first user interface, wherein every
One keyword is for determining encrypted fields.For example, two keywords can be arranged in first user interface in user, respectively
For " address name " and " cell-phone number ".
S110b, multiple keywords that user is inputted in first user interface are obtained, according to multiple keywords
Generate predetermined encryption field.
For example, if user inputs two keywords, respectively " address name " and " cell-phone number " in the first user interface, then
The predetermined encryption field is " address name " field and " cell-phone number " field.
Referring to Fig. 4, Fig. 4 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this
In embodiment, before the step S110, the method includes the steps S110c and step S110d.
S110c, generate second user interface, the second user interface include multiple second parameters input area and with it is each
Second parameter input area associated third parameter input area, each second parameter input area are used to input for user
One keyword, for determining encrypted fields, each third parameter input area is used to input for user and encrypt the keyword
Index, the encryption exponent are used to determine the encryption level of field.
By generating second user interface, in order to which multiple keywords are arranged in user on second user interface, wherein every
An encryption exponent is arranged for determining encrypted fields, and for each keyword in one keyword.For example, user can be described second
In user interface, two keywords, respectively " address name " and " cell-phone number ", and corresponding setting encryption exponent point are set
It Wei " 1 " and " 2 ".
S110d, multiple keywords and multiple encryption exponents that user is inputted at the second user interface are obtained, according to
Multiple keywords generate predetermined encryption index, wherein multiple keywords are associated with multiple encryption exponents.
For example, if user inputs two keywords, respectively " address name " and " cell-phone number " at second user interface, then
The predetermined encryption field as " address name " field and " cell-phone number " field, and the encryption exponent of corresponding encrypted fields
Respectively " 1 " and " 2 ".
Referring to Fig. 5, Fig. 5 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this
In embodiment, after the step S110d, the method also includes step S110e and step S110f.
S110e, generate third user interface, the third user interface include multiple 4th parameter input areas and with it is each
The associated 5th parameter input area in 4th parameter input area, each 4th parameter input area are used to input for user
Encryption Algorithm parameter, each 5th parameter input area are used to input safety index for user.
In order to realize according to different encryption exponents, corresponding field to be encrypted is encrypted, a settable encryption parameter
Mapping table, the encryption parameter mapping table include multiple Encryption Algorithm parameters and safety corresponding with each Encryption Algorithm parameter
Index.By generate third user interface, in order to user inputted in third user interface multiple Encryption Algorithm parameters and
Safety index.
S110f, obtain multiple Encryption Algorithm parameters that user is inputted in the third user interface and with it is each described
The associated safety index of Encryption Algorithm parameter generates and adds according to multiple Encryption Algorithm parameters and multiple safety indexes
Close parameter mapping table.
For example, following encryption parameter mapping table is set:
Encryption Algorithm parameter: RSA Algorithm parameter safety index: 1
Encryption Algorithm parameter: DSA algorithm parameter safety index: 2
Encryption Algorithm parameter: ECC algorithm parameter safety index: 3
Encryption Algorithm parameter: DES algorithm parameter safety index: 4
S120, each initial field in the primary data table is matched with predetermined encryption field, to filter out
Field and non-encrypted fields to be encrypted, and the serial number by the field to be encrypted and the not encrypted fields in primary data table
Be stored in segment information, wherein the field to be encrypted be initial field identical with the predetermined encryption field, it is described not
Encrypted fields be and the different initial field of predetermined encryption field.
For example, for contacts list, it includes " address name " and " cell-phone number " that predetermined encryption field, which is arranged, then " user
Name " field and " cell-phone number " field are field to be encrypted, and " User ID " and " mailbox " as not encrypted fields.The connection
Serial number corresponding to each initial field of list is respectively as follows:
Field serial number: 1 field: " User ID "
Field serial number: 2 fields: " address name "
Field serial number: 3 fields: " cell-phone number "
Field serial number: 4 fields: " mailbox "
The serial number of field to be encrypted and non-encrypted fields in primary data table is stored in segment information, in order to right
After field to be encrypted carries out encryption generation encrypted fields, encrypted fields and non-encrypted fields can be subjected to group according to segment information
It closes, in the case where not changing serial number, generates encryption data table.
If the number of S130, the field to be encrypted is within the scope of default value, independent to each field to be encrypted
It is encrypted, to generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the default value model
The upper limit value enclosed is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one.
For example, for above-mentioned contacts list, 4 initial fields are only included, because setting predetermined encryption field to " to use
Family name " and " cell-phone number ", then the number of field to be encrypted is 2, and if set 1 to 4 for the preset range, i.e., it is to be encrypted
The number of field is less than the total number for the initial field that primary data table is included, and is greater than one, at this point, to each described to be added
Close field is individually encrypted, and the first encrypted fields are generated.
Referring to Fig. 6, Fig. 6 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.At this
In embodiment, the step S130 includes sub-step S131~S132.
Referring to fig. 2, in this embodiment, before the step S130, the method includes S130a.
S130a, judge the number of the field to be encrypted whether within the scope of default value.
Number by treating encrypted fields is judged, different encipherment schemes may be selected.For example, if field to be encrypted
Number within the scope of default value, then each field to be encrypted can individually be encrypted, generate multiple first encrypted fields,
Then multiple first encrypted fields are integral and it is encrypted, generate the second encrypted fields;And if to be encrypted
The number of field is not within the scope of default value, for example, if the number of the field to be encrypted is in the primary data table
The sum of initial field is then integral with the primary data table, is encrypted to it, and if the number of the field to be encrypted
Mesh is one, then only encrypts to the field to be encrypted.In the present embodiment, judge to obtain institute if executing the step S130a
The number of field to be encrypted is stated within the scope of default value, thens follow the steps S131, it is no to then follow the steps S130b.
If the number of S131, the field to be encrypted within the scope of default value, obtains and the field phase to be encrypted
The encryption exponent matched obtains target Encryption Algorithm parameter from the encryption parameter mapping table, wherein encrypts and calculates with the target
The corresponding safety index of method parameter is consistent with the encryption exponent.
For example, include " address name " field and " cell-phone number " field for predetermined encryption field, wrapped in contacts list
" User ID " field, " address name " field, " cell-phone number " field and " mailbox " field are included, then field to be encrypted is " to use
Family name " field and " cell-phone number " field, encryption exponent corresponding with " address name " field are 1, and with " cell-phone number " word
The corresponding encryption exponent of section is 2, according to encryption parameter mapping table, would know that the safety index of " RSA Algorithm parameter " is 1, and
The safety index of " DSA algorithm parameter " is 2, the two safety indexes are corresponding with the encryption exponent of two fields to be encrypted.
S132, the field to be encrypted is encrypted according to the target Encryption Algorithm parameter, generates the first encrypted word
Section.
For example, for above-mentioned contacts list, i.e., " address name " field is added by " RSA Algorithm parameter "
It is close, generate " address name " encrypted fields;In addition, being encrypted by " DSA algorithm parameter " to " cell-phone number " field, generate
" cell-phone number " encrypted fields.
S140, it multiple first encrypted fields is integral encrypts, to generate the second encrypted fields.
It is encrypted again by being integral to multiple first encrypted fields, can further improve encrypted fields
Safety.
S150, second encrypted fields and non-encrypted fields are combined, to generate the first encryption data table.
By being combined the second encrypted fields and non-encrypted fields, the first encryption data table is produced.
Referring to Fig. 2, Fig. 2 is the schematic flow diagram for the tables of data encryption method that another embodiment of the application provides.Such as figure
Shown, the embodiment further includes step S130b and S130c after step S130a.
S130b, judge the total of the initial field whether number of the field to be encrypted is equal in the primary data table
Number.
By judging the sum of initial field that whether number of the field to be encrypted is equal in the primary data table,
Corresponding encryption method can be performed.For example, if the determination result is YES, i.e., all initial fields in the described primary data table are
Field to be encrypted, then can the primary data table be integral, it is encrypted.In embodiments of the present invention, if executing
The judging result of the step S130b be it is yes, then follow the steps S160, it is no to then follow the steps S130c.
If the number of S160, the field to be encrypted is equal to the sum of the initial field in the primary data table, by institute
It states primary data table and is integral and encrypted, to generate the second encryption data table.
For example, if setting predetermined encryption field includes " User ID ", " address name ", " cell-phone number " and " mailbox ", and it is pre-
If range is set as 0 to 3, especially to the contacts list, 4 fields for being included with predetermined encryption fields match, i.e., 4
A field is field to be encrypted, not within a preset range, then can the primary data because the number of field to be encrypted is 4
Table is integral, and is encrypted to the primary data table.
S130c, judge whether the number of the field to be encrypted is equal to one.
By judging whether the number of the field to be encrypted is equal to one, corresponding encryption method can be performed.For example, if sentencing
Disconnected result be it is yes, i.e., only exist a field to be encrypted in the described primary data table, then the field to be encrypted can be added
It is close.In embodiments of the present invention, if the judging result for executing the step S130c be it is yes, then follow the steps S170.
If the number of S170, the field to be encrypted is equal to one, the field to be encrypted is encrypted, to generate third
Encrypted fields.
When the number of the field to be encrypted only one when, only the field to be encrypted is encrypted, then execute step
Rapid S180.
S180, the third encrypted fields and the not encrypted fields are combined according to the segment information, with life
At third encryption data table.
According to segment information, the third encrypted fields and non-encrypted fields can be combined, to obtain third encryption
Tables of data.
The embodiment of the present application also provides a kind of tables of data encryption device, and the tables of data encryption device is for executing aforementioned
One item data table encryption method.Fig. 7 is referred to, Fig. 7 is the schematic frame of tables of data encryption device provided by the embodiments of the present application
Figure.As shown in fig. 7, the tables of data encryption device 200 includes first acquisition unit 210, the encryption list of matching unit 220, first
First 230, second encryption unit 240 and the first generation unit 250.
First acquisition unit 210 obtains corresponding with the request of data for receiving the request of data of terminal transmission
Primary data table, the primary data table include multiple initial fields being ranked up by certain serial number.
Matching unit 220, for by the primary data table each initial field and predetermined encryption field carry out
Match, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and the not encrypted fields in initial number
It is stored in segment information according to the serial number in table.
First encryption unit 230, if the number for the field to be encrypted within the scope of default value, to each described
Field to be encrypted is individually encrypted, to generate the first encrypted fields, wherein and the default value range is a standard-sized sheet section,
The upper limit value of the default value range is the sum of the initial field in the primary data table, the default value range
Lower limit value is one.
Multiple first encrypted fields are integral and encrypt by the second encryption unit 240, are added with generating second
Close field.
First generation unit 250, for being combined the encrypted fields and non-encrypted fields, to generate the first encryption
Tables of data.
Fig. 8 is referred to, Fig. 8 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides.Such as Fig. 8
Shown, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the
Two encryption units 240, the first generation unit 250, the first judging unit 230a, second judgment unit 230b and second generate single
Member 260.Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and
One generation unit 250, has been described, details are not described herein again in the above-described embodiments.Hereinafter, to the first judging unit 230a,
Two judging unit 230b and the second generation unit 260 are described.
First judging unit 230a, for judging the number of the field to be encrypted whether within the scope of default value.
It is first in the primary data table to judge whether the number of the field to be encrypted is equal to by second judgment unit 230b
The sum of beginning field.
Second generation unit 260, if the number for the field to be encrypted not within the scope of default value, with it is described just
Beginning tables of data, which is integral, encrypts it.
Fig. 9 is referred to, Fig. 9 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides.Such as Fig. 9
Shown, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit 230, the
Two encryption units 240, the first generation unit 250, the first judging unit 230a, second judgment unit 230b, the second generation unit
260, third judging unit 230c, third encryption unit 270 and third generation unit 280.Wherein, first acquisition unit 210,
Matching unit 220, the first encryption unit 230, the second encryption unit 240, the first generation unit 250, the first judging unit 230a,
Second judgment unit 230b, the second generation unit 260, have been described, details are not described herein again in the above-described embodiments.Hereinafter, right
Third judging unit 230c, third encryption unit 270 and third generation unit 280 are described.
Third judging unit 230c, for judging whether the number of the field to be encrypted is equal to one.
Third encryption unit 270 carries out the field to be encrypted if the number for the field to be encrypted is equal to one
Encryption, to generate third encrypted fields.
Third generation unit 280 is used for according to the segment information to the third encrypted fields and the not encrypted word
Section is combined, to generate third encryption data table.
0, Figure 10 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as
Shown in Figure 10, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit
230, the second encryption unit 240, the first generation unit 250, the first interface generation unit 210a and second acquisition unit 210b.
Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and first generate
Unit 250, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to the first interface generation unit 210a and second
Acquiring unit 210b is described.
First interface generation unit 210a, for generating the first user interface, first user interface includes multiple the
One parameter input area, each parameter input area are used to input a keyword for user, and the keyword is for determining encryption
Field.
Second acquisition unit 210b, the multiple keywords inputted for obtaining user in first user interface, root
Predetermined encryption field is generated according to multiple keywords.
1, Figure 11 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as
Shown in Figure 11, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit
230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c and third acquiring unit 210d.
Wherein, first acquisition unit 210, matching unit 220, the first encryption unit 230, the second encryption unit 240 and first generate
Unit 250, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to second contact surface generation unit 210c and third
Acquiring unit 210d is described.
Second contact surface generation unit 210c, for generating second user interface, the second user interface includes multiple
Two parameter input areas and with each associated third parameter in second parameter input area input area, each second parameter
Input area is used to input a keyword for user, and the keyword is for determining encrypted fields, each third parameter input
Area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field.
Third acquiring unit 210d, multiple keywords inputted at the second user interface for obtaining user and more
A encryption exponent generates predetermined encryption fields according to multiple keywords, wherein multiple keywords and it is multiple described plus
Close correlation of indices connection.
2, Figure 12 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as
Shown in Figure 12, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit
230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c, third acquiring unit 210d,
Three interface generation unit 210e and the 4th acquiring unit 210f.Wherein, first acquisition unit 210, matching unit 220, first
Encryption unit 230, the second encryption unit 240, the first generation unit 250, second contact surface generation unit 210c and third obtain
Unit 210d, has been described in the above-described embodiments, and details are not described herein again.Hereinafter, to third interface generation unit 210e and
Four acquiring unit 210f are described.
Third interface generation unit 210e, for generating third user interface, the third user interface includes multiple
Four parameter input areas and the 5th parameter input area associated with each 4th parameter input area, each 4th parameter
Input area is used to input Encryption Algorithm parameter for user, and each 5th parameter input area is used to refer to safely for user's input
Number.
4th acquiring unit 210f, the multiple Encryption Algorithm ginseng inputted for obtaining user in the third user interface
Number and safety index associated with each Encryption Algorithm parameter, according to multiple Encryption Algorithm parameters and multiple described
Safety index generates encryption parameter mapping table.
3, Figure 13 is the schematic block diagram for the tables of data encryption device that another embodiment of the application provides referring to Figure 1.Such as
Shown in Figure 13, the tables of data encryption device 200 includes first acquisition unit 210, matching unit 220, the first encryption unit
230, the second encryption unit 240, the first generation unit 250, wherein default first encryption unit 230 includes the 5th acquisition
Unit 231 and encrypted fields generation unit 232.Wherein, first acquisition unit 210, matching unit 220, the first encryption unit
230, the second encryption unit 240 and the first generation unit 250, have been described, details are not described herein again in the above-described embodiments.With
Under, the 5th acquiring unit 231 and encrypted fields generation unit 232 are described.
5th acquiring unit 231, if the number for the field to be encrypted within the scope of default value, obtain with it is described
The encryption exponent that field to be encrypted matches obtains target from the encryption parameter mapping table according to acquired encryption exponent
Encryption Algorithm parameter, wherein safety index corresponding with the target Encryption Algorithm parameter and the encryption exponent are consistent.
Encrypted fields generation unit 232, for being carried out according to the target Encryption Algorithm parameter to the field to be encrypted
Encryption, to generate the first encrypted fields.
Above-mentioned tables of data encryption device can be implemented as a kind of form of computer program, which can be such as
It is run in computer equipment shown in Figure 14.
Figure 14 is please referred to, Figure 14 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.The calculating
300 equipment of machine equipment can be server.
Refering to fig. 14, which includes processor 302, memory and the net connected by system bus 301
Network interface 305, wherein memory may include non-volatile memory medium 303 and built-in storage 304.
The non-volatile memory medium 303 can storage program area 3031 and computer program 3032.The computer program
3032 include program instruction, which is performed, and processor 302 may make to execute a kind of tables of data encryption method.
The processor 302 supports the operation of entire computer equipment 300 for providing calculating and control ability.
The built-in storage 304 provides environment for the operation of the computer program 3032 in non-volatile memory medium 303, should
When computer program 3032 is executed by processor 302, processor 302 may make to execute a kind of tables of data encryption method.
The network interface 305 such as sends the task dispatching of distribution for carrying out network communication.Those skilled in the art can manage
It solves, structure shown in Figure 14, only the block diagram of part-structure relevant to application scheme, is not constituted to the application side
The restriction for the computer equipment 300 that case is applied thereon, specific computer equipment 300 may include more than as shown in the figure
Or less component, perhaps combine certain components or with different component layouts.Wherein, the processor 302 is for transporting
Row computer program 3032 stored in memory, to implement function such as: receive the request of data that terminal is sent, obtain with
The corresponding primary data table of the request of data, the primary data table include it is multiple be ranked up by certain serial number it is initial
Field;Each initial field in the primary data table is matched with predetermined encryption field, to filter out word to be encrypted
Section and not encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in point
In segment information;If the number of the field to be encrypted within the scope of default value, individually carries out each field to be encrypted
Encryption, to generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the default value range
Upper limit value is the sum of the initial field in the primary data table, and the lower limit value of the default value range is one;It will be multiple
First encrypted fields, which are integral, to be encrypted, to generate the second encrypted fields;By second encrypted fields and institute
It states not encrypted fields to be combined, to generate the first encryption data table.
In one embodiment, processor 302 adds each initial field in the primary data table with default in execution
Close field is matched, and to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described is not encrypted
Field also implements function such as after the serial number in primary data table is stored in segment information: if the field to be encrypted
Number be equal to the primary data table in initial field sum, the primary data table is integral and is added
It is close, to generate the second encryption data table.
In one embodiment, processor 302 adds each initial field in the primary data table with default in execution
Close field is matched, and to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described is not encrypted
Field also implements function such as after the serial number in primary data table is stored in segment information: if the field to be encrypted
Number be equal to one, the field to be encrypted is encrypted, to generate third encrypted fields;According to the segment information to institute
It states third encrypted fields and the not encrypted fields is combined, to generate third encryption data table.
In one embodiment, processor 302 is executing the request of data for receiving terminal and sending, and obtains and the request of data
It before corresponding primary data table, also implements function such as: generating the first user interface, first user interface includes more
A first parameter input area, each parameter input area are used to input a keyword for user, and the keyword is for determining
Encrypted fields;Multiple keywords that user is inputted in first user interface are obtained, are generated according to multiple keywords
Predetermined encryption field.
In one embodiment, processor 302 is executing the request of data for receiving terminal and sending, and obtains and the request of data
It before corresponding primary data table, also implements function such as: generating second user interface, the second user interface includes more
A second parameter input area and with each associated third parameter in second parameter input area input area, each described second
Parameter input area is used to input a keyword for user, and the keyword is for determining encrypted fields, each third parameter
Input area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field;User is obtained in institute
The multiple keywords and multiple encryption exponents that second user interface is inputted are stated, generate predetermined encryption according to multiple keywords
Field, wherein multiple keywords and multiple encryption exponents are associated.
In one embodiment, processor 302 is executing the multiple passes for obtaining user and being inputted at the second user interface
Keyword and multiple encryption exponents also implement function such as after generating predetermined encryption field according to multiple keywords: generating
Third user interface, the third user interface include multiple 4th parameter input areas and with each 4th parameter input area
Associated 5th parameter input area, each 4th parameter input area is used to input Encryption Algorithm parameter for user, each
The 5th parameter input area is used to input safety index for user;Acquisition user is inputted more in the third user interface
A Encryption Algorithm parameter and safety index associated with each Encryption Algorithm parameter, join according to multiple Encryption Algorithm
Several and multiple safety indexes generate encryption parameter mapping table.
In one embodiment, if processor 302 in the number for executing the field to be encrypted within the scope of default value, it is right
Each field to be encrypted is individually encrypted, and to generate the first encrypted fields, is implemented as follows function: if described to be added
The number of close field obtains the encryption exponent to match with the field to be encrypted, according to acquired within the scope of default value
Encryption exponent target Encryption Algorithm parameter is obtained from the encryption parameter mapping table, wherein with the target Encryption Algorithm
The corresponding safety index of parameter is consistent with the encryption exponent;According to the target Encryption Algorithm parameter to the word to be encrypted
Duan Jinhang encryption, to generate the first encrypted fields.
It should be appreciated that in the embodiment of the present application, processor 302 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or
Person's processor is also possible to any conventional processor etc..
A kind of storage medium is provided in another embodiment of the application.The storage medium can be computer-readable storage
Medium.The storage medium is stored with computer program, and wherein computer program includes program instruction.The program instruction is by processor
So that processor is executed following procedure when execution: receiving the request of data that terminal is sent, obtains corresponding with the request of data
Primary data table, the primary data table include multiple initial fields being ranked up by certain serial number;By the primary data
Each initial field in table is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will
The serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in segment information;If described to be added
The number of close field individually encrypts each field to be encrypted within the scope of default value, to generate the first encryption
Field, wherein the default value range is a standard-sized sheet section, and the upper limit value of the default value range is the primary data
The sum of initial field in table, the lower limit value of the default value range are one;Using multiple first encrypted fields as
One entirety is encrypted, to generate the second encrypted fields;Second encrypted fields and the not encrypted fields are combined,
To generate the first encryption data table.
In one embodiment, the program instruction be executed by processor by the primary data table each initial field with
Predetermined encryption field is matched, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described
Encrypted fields do not execute following procedure also: if described to be added after the serial number in primary data table is stored in segment information
The number of close field be equal to the primary data table in initial field sum, by the primary data table be integral into
Row encryption, to generate the second encryption data table.
In one embodiment, the program instruction be executed by processor by the primary data table each initial field with
Predetermined encryption field is matched, to filter out field and non-encrypted fields to be encrypted, and by the field to be encrypted and described
Encrypted fields do not execute following procedure also: if described to be added after the serial number in primary data table is stored in segment information
The number of close field is equal to one, encrypts to the field to be encrypted, to generate third encrypted fields;Believed according to the segmentation
Breath is combined the third encrypted fields and the not encrypted fields, to generate third encryption data table.
In one embodiment, the program instruction be executed by processor receive terminal send request of data, obtain with it is described
Before the corresponding primary data table of request of data, following procedure is also executed: generating the first user interface, first user circle
Face includes multiple first parameters input area, and each parameter input area is used to input a keyword, the keyword for user
For determining encrypted fields;Multiple keywords that user is inputted in first user interface are obtained, according to multiple passes
Keyword generates predetermined encryption field.
In one embodiment, the program instruction be executed by processor receive terminal send request of data, obtain with it is described
Before the corresponding primary data table of request of data, following procedure is also executed: generating second user interface, second user circle
Face include multiple second parameters input area and with each associated third parameter in second parameter input area input area, it is each
Second parameter input area is used to input a keyword for user, and the keyword is each described for determining encrypted fields
Third parameter input area is used to input encryption exponent for user, and the encryption exponent is used to determine the encryption level of field;It obtains
The multiple keywords and multiple encryption exponents that user is inputted at the second user interface are generated according to multiple keywords
Predetermined encryption field, wherein multiple keywords and multiple encryption exponents are associated.
In one embodiment, which, which is executed by processor, obtains what user was inputted at the second user interface
Multiple keywords and multiple encryption exponents also execute following journey after generating predetermined encryption field according to multiple keywords
Sequence: generating third user interface, and the third user interface includes multiple 4th parameter input areas and joins with each described 4th
The number associated 5th parameter input area in input area, each 4th parameter input area are used to input Encryption Algorithm ginseng for user
Number, each 5th parameter input area are used to input safety index for user;User is obtained in the third user interface institute
Multiple Encryption Algorithm parameters of input and safety index associated with each Encryption Algorithm parameter, according to multiple described plus
Close algorithm parameter and multiple safety indexes generate encryption parameter mapping table.In one embodiment, the program instruction is processed
If device executes the number of the field to be encrypted within the scope of default value, each field to be encrypted is individually added
It is close, to generate the first encrypted fields, specifically execute following procedure: if the number of the field to be encrypted is in default value range
It is interior, the encryption exponent to match with the field to be encrypted is obtained, is reflected according to acquired encryption exponent from the encryption parameter
Target Encryption Algorithm parameter is obtained in firing table, wherein safety index corresponding with the target Encryption Algorithm parameter and described
Encryption exponent is consistent;The field to be encrypted is encrypted according to the target Encryption Algorithm parameter, to generate the first encryption
Field.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), magnetic disk or
The various media that can store program code such as person's CD.Those of ordinary skill in the art may be aware that in conjunction with institute herein
Each exemplary unit and algorithm steps of disclosed embodiment description, can be with electronic hardware, computer software or the two
In conjunction with realizing, in order to clearly illustrate the interchangeability of hardware and software, in the above description according to function generality
Ground describes each exemplary composition and step.These functions are implemented in hardware or software actually, depend on technical side
The specific application and design constraint of case.Professional technician can carry out each specific application to come using distinct methods real
Existing described function, but this realization is it is not considered that exceed scope of the present application.In several implementations provided herein
In example, it should be understood that disclosed device and method may be implemented in other ways.For example, dress described above
It is only schematical to set embodiment.For example, the division of each unit, only a kind of logical function partition, in actual implementation
There may be another division manner.Such as multiple units or components can be combined or can be integrated into another system or one
A little features can be ignored, or not execute.Step in the embodiment of the present application method can according to actual needs the adjustment of carry out sequence,
Merge and deletes.Unit in the embodiment of the present application device can be combined, divided and deleted according to actual needs.In addition,
Each functional unit in each embodiment of the application can integrate in one processing unit, and it is independent to be also possible to each unit
It is physically present, is also possible to two or more units and is integrated in one unit.Above-mentioned integrated unit can both use
Formal implementation of hardware can also be realized in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product,
It can store in one storage medium.Based on this understanding, the technical solution of the application is substantially in other words to existing skill
The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, terminal or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection scope subject to.
Claims (10)
1. a kind of tables of data encryption method characterized by comprising
The request of data that terminal is sent is received, primary data table corresponding with the request of data, the primary data are obtained
Table includes multiple initial fields being ranked up by certain serial number;
Each initial field in the primary data table is matched with predetermined encryption field, to filter out field to be encrypted
Not encrypted fields, and the serial number of the field to be encrypted and the not encrypted fields in primary data table is stored in segmentation
In information, wherein, the field to be encrypted is initial field identical with the predetermined encryption field, and the not encrypted fields are
With the different initial field of predetermined encryption field;
If the number of the field to be encrypted within the scope of default value, individually encrypts each field to be encrypted,
To generate the first encrypted fields, wherein the default value range is a standard-sized sheet section, the upper limit value of the default value range
For the sum of the initial field in the primary data table, the lower limit value of the default value range is one;
Multiple first encrypted fields are integral and are encrypted, to generate the second encrypted fields;
Second encrypted fields and the not encrypted fields are combined, to generate the first encryption data table.
2. tables of data encryption method according to claim 1, which is characterized in that it is described will be in the primary data table
Each initial field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will it is described to
After the serial number in primary data table is stored in segment information, the method is also wrapped for encrypted fields and the not encrypted fields
It includes:
If the number of the field to be encrypted is equal to the sum of the initial field in the primary data table, by the primary data
Table, which is integral, to be encrypted, to generate the second encryption data table.
3. tables of data encryption method according to claim 2, which is characterized in that it is described will be in the primary data table
Each initial field is matched with predetermined encryption field, to filter out field and non-encrypted fields to be encrypted, and will it is described to
After the serial number in primary data table is stored in segment information, the method is also wrapped for encrypted fields and the not encrypted fields
It includes:
If the number of the field to be encrypted is equal to one, the field to be encrypted is encrypted, to generate third encrypted fields;
The third encrypted fields and the not encrypted fields are combined according to the segment information, to generate third encryption
Tables of data.
4. tables of data encryption method according to claim 1, which is characterized in that asked in the data that the reception terminal is sent
It asks, before obtaining primary data table corresponding with the request of data, the method also includes:
The first user interface is generated, first user interface includes multiple first parameters input area, each parameter input
Area is used to input a keyword for user, and the keyword is for determining encrypted fields;
Multiple keywords that user is inputted in first user interface are obtained, generate default add according to multiple keywords
Close field.
5. tables of data encryption method according to claim 1, which is characterized in that asked in the data that the reception terminal is sent
It asks, before obtaining primary data table corresponding with the request of data, the method also includes:
Second user interface is generated, the second user interface includes multiple second parameters input area and joins with each described second
The number associated third parameter in input area input area, each second parameter input area are used to input a keyword for user,
For determining encrypted fields, each third parameter input area is used to input encryption exponent for user the keyword, described
Encryption exponent is used to determine the encryption level of field;
The multiple keywords and multiple encryption exponents that user is inputted at the second user interface are obtained, according to multiple passes
Keyword generates predetermined encryption field, wherein, multiple keywords are associated with multiple encryption exponents.
6. tables of data encryption method according to claim 5, which is characterized in that used in the acquisition user described second
The multiple keywords and multiple encryption exponents that family interface is inputted, according to multiple keywords generate predetermined encryption fields it
Afterwards, the method also includes:
Third user interface is generated, the third user interface includes multiple 4th parameter input areas and joins with each described 4th
The number associated 5th parameter input area in input area, each 4th parameter input area are used to input Encryption Algorithm ginseng for user
Number, each 5th parameter input area are used to input safety index for user;
Obtain the multiple Encryption Algorithm parameters and join with each Encryption Algorithm that user is inputted in the third user interface
The associated safety index of number generates encryption parameter mapping according to multiple Encryption Algorithm parameters and multiple safety indexes
Table.
7. tables of data encryption method according to claim 6, which is characterized in that if the number of the field to be encrypted
Within the scope of default value, each field to be encrypted is individually encrypted, includes: to generate the first encrypted fields
Refer to if the number of the field to be encrypted within the scope of default value, obtains the encryption to match with the field to be encrypted
Number, target Encryption Algorithm parameter is obtained from the encryption parameter mapping table according to acquired encryption exponent, wherein with it is described
The corresponding safety index of target Encryption Algorithm parameter is consistent with the encryption exponent;
The field to be encrypted is encrypted according to the target Encryption Algorithm parameter, to generate the first encrypted fields.
8. a kind of tables of data encryption device characterized by comprising
First acquisition unit obtains initial number corresponding with the request of data for receiving the request of data of terminal transmission
According to table, the primary data table includes multiple initial fields being ranked up by certain serial number;
Matching unit, for matching each initial field in the primary data table with predetermined encryption field, with sieve
Field and non-encrypted fields to be encrypted are selected, and by the field to be encrypted and the not encrypted fields in primary data table
Serial number is stored in segment information;
First encryption unit, if the number for the field to be encrypted within the scope of default value, to each described to be encrypted
Field is individually encrypted, to generate the first encrypted fields;
Second encryption unit is encrypted for being integral multiple first encrypted fields, to generate the second encryption
Field;
First generation unit is added for being combined second encrypted fields and the not encrypted fields with generating first
Ciphertext data table.
9. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program
Any one of tables of data encryption method.
10. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the meter
Calculation machine program executes the processor such as tables of data of any of claims 1-7 encryption
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811527346.1A CN109787956B (en) | 2018-12-13 | 2018-12-13 | Data table encryption method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811527346.1A CN109787956B (en) | 2018-12-13 | 2018-12-13 | Data table encryption method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109787956A true CN109787956A (en) | 2019-05-21 |
CN109787956B CN109787956B (en) | 2023-02-10 |
Family
ID=66496921
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811527346.1A Active CN109787956B (en) | 2018-12-13 | 2018-12-13 | Data table encryption method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109787956B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351289A (en) * | 2019-07-17 | 2019-10-18 | 宜人恒业科技发展(北京)有限公司 | The method and device of data encryption |
CN112988709A (en) * | 2021-03-15 | 2021-06-18 | 成都乐动信息技术有限公司 | Data sorting method and device, electronic equipment and storage medium |
CN113573306A (en) * | 2021-04-29 | 2021-10-29 | 中国南方电网有限责任公司 | 5G-fused heterogeneous networking gateway encryption method and system |
CN114726596A (en) * | 2022-03-25 | 2022-07-08 | 北京沃东天骏信息技术有限公司 | Sensitive data processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594548A (en) * | 2012-03-22 | 2012-07-18 | 山东泰信电子有限公司 | Method capable of achieving data sectional encryption and decryption |
CN105635131A (en) * | 2015-12-25 | 2016-06-01 | 东软集团股份有限公司 | Data transmission method and device and server |
CN106874781A (en) * | 2015-12-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of tables of data encryption method and server |
US20180294951A1 (en) * | 2017-04-07 | 2018-10-11 | X-Logos, LLC | Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra |
-
2018
- 2018-12-13 CN CN201811527346.1A patent/CN109787956B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594548A (en) * | 2012-03-22 | 2012-07-18 | 山东泰信电子有限公司 | Method capable of achieving data sectional encryption and decryption |
CN106874781A (en) * | 2015-12-11 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of tables of data encryption method and server |
CN105635131A (en) * | 2015-12-25 | 2016-06-01 | 东软集团股份有限公司 | Data transmission method and device and server |
US20180294951A1 (en) * | 2017-04-07 | 2018-10-11 | X-Logos, LLC | Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351289A (en) * | 2019-07-17 | 2019-10-18 | 宜人恒业科技发展(北京)有限公司 | The method and device of data encryption |
CN110351289B (en) * | 2019-07-17 | 2021-09-14 | 宜人恒业科技发展(北京)有限公司 | Data encryption method and device |
CN112988709A (en) * | 2021-03-15 | 2021-06-18 | 成都乐动信息技术有限公司 | Data sorting method and device, electronic equipment and storage medium |
CN113573306A (en) * | 2021-04-29 | 2021-10-29 | 中国南方电网有限责任公司 | 5G-fused heterogeneous networking gateway encryption method and system |
CN114726596A (en) * | 2022-03-25 | 2022-07-08 | 北京沃东天骏信息技术有限公司 | Sensitive data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109787956B (en) | 2023-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109787956A (en) | Tables of data encryption method, device, computer equipment and storage medium | |
US11799666B2 (en) | Systems and methods authenticating a digitally signed assertion using verified evaluators | |
Wang et al. | Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing | |
EP3198781B1 (en) | Techniques for distributing secret shares | |
US9160742B1 (en) | Localized risk analytics for user authentication | |
JP6800147B2 (en) | Methods, devices, terminals and servers for verifying the security of service operations | |
WO2021222398A1 (en) | Systems and methods for cryptographic authorization of wireless communications | |
CN104025498B (en) | Methods and apparatus for sharing real-time user context information | |
CN105450650B (en) | A kind of safe mobile e health records access control system | |
EP2819351B1 (en) | Information processing method, apparatus, and system | |
CN104798081B (en) | Control the access to the clinical data analyzed by remote computing resource | |
CN108920714B (en) | Association rule mining method and system for privacy protection in distributed environment | |
WO2020223588A1 (en) | Systems and methods authenticating a digitally signed assertion using verified evaluators | |
CN107302521B (en) | Method for sending and receiving user privacy data | |
US9537831B2 (en) | Reaching anonymization service levels through added transactions | |
Fotiou et al. | A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing | |
CN111131127B (en) | Communication method based on live broadcast platform and related device | |
CN111739595B (en) | Medical big data sharing analysis method and device | |
Sauzet et al. | Estimating dichotomised outcomes in two groups with unequal variances: a distributional approach | |
EP3158445B1 (en) | Data verification in a distributed data processing system | |
CN108848094A (en) | Data security validation method, device, system, computer equipment and storage medium | |
KR20220059509A (en) | System and method for distributed storage of transactions | |
CN109783674A (en) | Image identification method, device, system, computer equipment and storage medium | |
CN106547626B (en) | Method for balancing server in peer-to-peer architecture and server | |
KR20160129930A (en) | Game Server for being Loaded Game Resources, Game Method using the same and Game Developing System including the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |