CN109815715A - A kind of data ciphering method and relevant apparatus - Google Patents

A kind of data ciphering method and relevant apparatus Download PDF

Info

Publication number
CN109815715A
CN109815715A CN201910007689.3A CN201910007689A CN109815715A CN 109815715 A CN109815715 A CN 109815715A CN 201910007689 A CN201910007689 A CN 201910007689A CN 109815715 A CN109815715 A CN 109815715A
Authority
CN
China
Prior art keywords
data
preset rules
encryption
key
initial data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910007689.3A
Other languages
Chinese (zh)
Inventor
丁磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910007689.3A priority Critical patent/CN109815715A/en
Publication of CN109815715A publication Critical patent/CN109815715A/en
Priority to PCT/CN2019/117545 priority patent/WO2020140616A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

This application involves information encryption and decryption, a kind of data ciphering method and relevant apparatus are disclosed, comprising: when receiving encrypted instruction, send key request to cipher key service center;It receives the key request for the key request that the cipher key service center is sent to respond, wherein the key request response includes encryption key;Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.Implement the embodiment of the present invention, is beneficial to prevent leaking data.

Description

A kind of data ciphering method and relevant apparatus
Technical field
The present invention relates to field of computer technology more particularly to a kind of data ciphering methods and relevant apparatus.
Background technique
With the high speed development of Internet enterprises, while the data that enterprise operation system generates are more and more, enterprise Requirement to data storage is higher and higher.Therefore, in order to guarantee the stability of data and the agility of network processes speed, mesh Before, most of networks have been transitioned into distributed and collaborative network computing model by traditional centralized network computation model.Point Cloth and collaborative network computing model not only ensure that performance and capacity can be expanded simultaneously, and system scale has very strong stretch Contracting also improves the reliability, availability and access efficiency of system.
It promotes and applies however as distributed cloud storage system, when by data distribution to multiple servers, how to guarantee The safety of data, increasingly by the concern of user.In traditional technical solution, storage volume usually is opened in client When, then carry out the read-write of data.However, as long as storage volume can be opened, no matter anyone, can obtain in storage volume not plus Close data.Therefore, if encountering the case where system is by hacker attacks, storage volume may be opened, so as to cause number According to leakage.
Summary of the invention
The embodiment of the invention discloses a kind of data ciphering method and relevant apparatus, implement the embodiment of the present invention, are conducive to Prevent leaking data.
First aspect of the embodiment of the present invention provides a kind of data ciphering method, comprising:
When receiving encrypted instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein described close Key request response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein The initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Second aspect of the embodiment of the present invention provides a kind of data encryption device, comprising:
Sending module, for sending key request to cipher key service center when receiving encrypted instruction;
Receiving module is rung for receiving the key request for the key request that the cipher key service center is sent It answers, wherein the key request response includes encryption key;
Encrypting module, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, to be added Ciphertext data, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
The third aspect of the embodiment of the present invention provides a kind of electronic equipment of data encryption, including processor, memory, logical Believe interface and one or more programs, wherein one or more of programs are stored in the memory, and are matched It sets and is executed by the processor, to execute the part for including any data ciphering method recorded in above method embodiment Or Overall Steps.
Fourth aspect of the embodiment of the present invention provides a kind of computer storage medium, and the computer readable storage medium is used In storage computer program, the storage computer program is executed by the processor, to realize including above method embodiment Some or all of any data ciphering method of middle record step.
As can be seen that, when receiving encrypted instruction, client sends key to cipher key service center in above-mentioned technical proposal Request sends encryption key to client when cipher key service center, which carries out authentication to client, to be passed through.It is then determined The severity level of initial data obtains original number in turn with the matched Data Identification of severity level of initial data to generate According to secret grade.Then, client chosen from encryption algorithm database with the matched N number of Encryption Algorithm of secret grade, into And initial data is encrypted according to encryption key and N number of Encryption Algorithm, to obtain encryption data.By client according to Secret grade selectively encrypts initial data using N number of Encryption Algorithm, provides multilayer for significant data and protects machine System, prevents leaking data, promotes the security performance of data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Wherein:
Fig. 1-a is a kind of flow diagram of data ciphering method provided in an embodiment of the present invention;
Fig. 1-b is a kind of configuration diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of data encryption device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Term " includes " in description and claims of this specification and above-mentioned attached drawing and " having " and they appoint What is deformed, it is intended that is covered and non-exclusive is included.Such as contain the process, method, system, production of a series of steps or units Product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or Optionally further comprising the other step or units intrinsic for these process, methods, product or equipment.
One embodiment of the method for data encryption of the present invention.Wherein, a kind of data ciphering method, comprising: add receiving When close instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein described close Key request response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein The initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Firstly, being a kind of data ciphering method that one embodiment of the present of invention provides referring to Fig. 1-a and Fig. 1-b, Fig. 1-a Flow diagram.Scheme shown in Fig. 1-a can carry out specific embodiment in the system of the framework shown in Fig. 1-b.Wherein, such as Fig. 1- Shown in a, a kind of data ciphering method that one embodiment of the present of invention provides may include:
101, when receiving encrypted instruction, client sends key request to cipher key service center.
102, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
103, client encrypts initial data according to the encryption key and N number of Encryption Algorithm, to be encrypted Data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
Referring to fig. 2, Fig. 2 is the process signal for another data ciphering method that another embodiment of the invention provides Figure.Wherein, as shown in Fig. 2, another data ciphering method that another embodiment of the invention provides may include:
201, when receiving encrypted instruction, client sends key request to cipher key service center.
Optionally, in a kind of possible embodiment of the invention, the key request carries the body of the client Part authentication information, wherein the authentication information of the client carries out the client for the cipher key service center Authentication, when the authentication passes through, the cipher key service center construction communication channel, to pass through the communication channel The key request response is sent to the client.
202, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
203, M preset rules are arranged in client.
Wherein, M is positive integer.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, preset rules for example may include regular expression.
204, client uses the M preset rules to detect with the determination initial data initial data Meet K preset rules in the M preset rules.
Wherein, K is positive integer, M >=K.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, in a first aspect, in one possible embodiment of the invention, the initial data includes video counts According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data K preset rules in preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q number Corresponding with i-th of picture frame in the L picture frame according to i-th of data set of concentration, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with determination the Q Data set has the K preset rules met in the M preset rules altogether.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, Q for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, it is based in a first aspect, in one possible embodiment of the invention, the use M is default Each data set that rule concentrates the Q data, which is detected, meets altogether the M with the determination Q data set in advance If the K preset rules in rule, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q number According to concentration, only one data set meets the K preset rules in the M preset rules, then the Q data set one Meet the K preset rules altogether;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q The R data that a data are concentrated are filled with E preset rules in the foot M preset rules, S that the Q data are concentrated Data set meets F preset rules in the M preset rules, then the Q data set meets altogether the K default rule Then, wherein K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any in the F preset rules One.
Wherein, R for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, S for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, E for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, F for example can be equal to 1,2,3,5,6,11,13,20 or other values.
205, client determines the severity level of the initial data.
Wherein, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules.
Optionally, in one possible embodiment of the invention, the severity level of the determination initial data, In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set and the Q data The number that collection meets preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the weight of the video data Want rank, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K When, the preset ratio is equal to (K-Q)/K.
206, client generates the matched Data Identification of severity level with the initial data.
Wherein, the Data Identification is for identifying the initial data.
207, client obtains and the matched secret grade J of the Data Identification from secret grade database.
Wherein, J is positive integer.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
208, client is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database.
Wherein, N=J.
209, client encrypts initial data according to the encryption key and N number of Encryption Algorithm, to be encrypted Data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
Optionally, in one possible embodiment of the invention, described according to the encryption key and N number of Encryption Algorithm Initial data is encrypted, to obtain encryption data, comprising:
The L picture frame is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain L encryption figure As frame;
The L encrypted image frame is synthesized, to form enciphered video data.
Referring to Fig. 3, Fig. 3 is the process signal for another data ciphering method that another embodiment of the invention provides Figure.Wherein, as shown in figure 3, another data ciphering method that another embodiment of the invention provides may include:
301, when receiving encrypted instruction, client sends key request to cipher key service center.
Optionally, in a kind of possible embodiment of the invention, the key request carries the body of the client Part authentication information, wherein the authentication information of the client carries out the client for the cipher key service center Authentication, when the authentication passes through, the cipher key service center construction communication channel, to pass through the communication channel The key request response is sent to the client.
302, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
303, M preset rules are arranged in client.
Wherein, M is positive integer.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, preset rules for example may include regular expression.
304, client uses the M preset rules to detect with the determination initial data initial data Meet K preset rules in the M preset rules.
Wherein, K is positive integer, M >=K.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, in a first aspect, in one possible embodiment of the invention, the initial data includes video counts According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data K preset rules in preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q number Corresponding with i-th of picture frame in the L picture frame according to i-th of data set of concentration, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with determination the Q Data set has the K preset rules met in the M preset rules altogether.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, Q for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, it is based in a first aspect, in one possible embodiment of the invention, the use M is default Each data set that rule concentrates the Q data, which is detected, meets altogether the M with the determination Q data set in advance If the K preset rules in rule, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q number According to concentration, only one data set meets the K preset rules in the M preset rules, then the Q data set one Meet the K preset rules altogether;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q The R data that a data are concentrated are filled with E preset rules in the foot M preset rules, S that the Q data are concentrated Data set meets F preset rules in the M preset rules, then the Q data set meets altogether the K default rule Then, wherein K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any in the F preset rules One.
Wherein, R for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, S for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, E for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, F for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, second aspect, in one possible embodiment of the invention, the initial data include number of files According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data K preset rules in preset rules, comprising:
The document data is parsed, to obtain T field, wherein T is positive integer;
The T field is compared with H preset field, to obtain comparing successful G critical field, wherein H It is positive integer, T < H, G≤T with G;
The data of each critical field in the G critical field are extracted, to obtain G data set, wherein the G I-th of data set that a data are concentrated is corresponding with i-th of critical field in the G critical field;
The each data set for using the M preset rules to concentrate the G data is detected with determination the G Data set has the K preset rules met in the M preset rules altogether.
305, client determines the severity level of the initial data.
Wherein, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules.
Optionally, in one possible embodiment of the invention, the severity level of the determination initial data, In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set and the Q data The number that collection meets preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the weight of the video data Want rank, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K When, the preset ratio is equal to (K-Q)/K.
306, client generates the matched Data Identification of severity level with the initial data.
Wherein, the Data Identification is for identifying the initial data.
307, client obtains and the matched secret grade J of the Data Identification from secret grade database.
Wherein, J is positive integer.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
308, client is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database.
Wherein, N=J.
309, client encrypts the L picture frame according to the encryption key and N number of Encryption Algorithm, to obtain L encrypted image frame.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, the initial data includes video data.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
310, client synthesizes the L encrypted image frame, to form enciphered video data.
Referring to fig. 4, Fig. 4 is a kind of schematic diagram for data encryption device that one embodiment of the present of invention provides.Wherein, such as Shown in Fig. 4, a kind of data encryption device 400 that one embodiment of the present of invention provides may include:
Sending module 401, for sending key request to cipher key service center when receiving encrypted instruction.
Receiving module 402, the key request for the key request sent for receiving the cipher key service center Response.
Wherein, the key request response includes encryption key.
Encrypting module 403, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, with To encryption data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
The embodiment of the present invention also provides a kind of electronic equipment of data encryption, which is characterized in that including processor, storage Device, communication interface and one or more programs, wherein one or more of programs are stored in the memory, and And be configured to be executed by the processor, it include any data ciphering method recorded in above method embodiment to execute Some or all of step.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey Sequence, to realize including some or all of any data ciphering method recorded in above method embodiment step.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple module or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method of data encryption characterized by comprising
When receiving encrypted instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein the key is asked Asking response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein described Initial data is obtained from the storage volume of the client by the client, and N is positive integer.
2. the method according to claim 1, wherein the key request carries the authentication of the client Information, wherein the authentication information of the client carries out identity to the client for the cipher key service center and recognizes Card, when the authentication passes through, the cipher key service center construction communication channel, with by the communication channel to described Client sends the key request response.
3. the method according to claim 1, wherein described according to the encryption key and N number of Encryption Algorithm Initial data is encrypted, before obtaining encryption data, comprising:
M preset rules are set, wherein M is positive integer;
It uses the M preset rules to detect the initial data and meets the M in advance with the determination initial data If K preset rules in rule, wherein K is positive integer, M >=K;
Determine the severity level of the initial data, wherein the severity level of the initial data and the initial data meet The number of preset rules is directly proportional;
Generate the matched Data Identification of severity level with the initial data, wherein the Data Identification is described for identifying Initial data;
It is obtained and the matched secret grade J of the Data Identification from secret grade database, wherein J is positive integer;
It is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database, wherein N=J.
4. described to use institute according to the method described in claim 3, it is characterized in that, the initial data includes video data It states M preset rules and is detected the K met in the M preset rules with the determination initial data to the initial data A preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q data set In i-th of data set it is corresponding with i-th of picture frame in the L picture frame, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with the determination Q data Collection meets altogether the K preset rules in the M preset rules.
5. the method according to claim 3 or 4, which is characterized in that the severity level of the determination initial data, In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set is filled with the Q data The number of sufficient preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the importance level of the video data Not, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K, institute Preset ratio is stated equal to (K-Q)/K.
6. according to the method described in claim 4, it is characterized in that, described use the M preset rules to the Q data The each data set concentrated is detected the K for having altogether and meeting in the M preset rules with the determination Q data set Preset rules, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q data set In only one data set meet the K preset rules in the M preset rules, then the Q data set is full altogether The foot K preset rules;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q number E preset rules in the foot M preset rules, the S data that the Q data are concentrated are filled with according to R data of concentration Collection meets F preset rules in the M preset rules, then the Q data set meets the K preset rules altogether, Wherein, K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any one in the F preset rules It is a.
7. method according to claim 1 or 6, which is characterized in that described according to the encryption key and N number of Encryption Algorithm Initial data is encrypted, to obtain encryption data, comprising:
The L picture frame is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain L encrypted image frame;
The L encrypted image frame is synthesized, to form enciphered video data.
8. a kind of data encryption device characterized by comprising
Sending module, for sending key request to cipher key service center when receiving encrypted instruction;
Receiving module is responded for receiving the key request for the key request that the cipher key service center is sent, In, the key request response includes encryption key;
Encrypting module, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, to obtain encryption number According to, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
9. a kind of electronic equipment of data encryption, which is characterized in that including processor, memory, communication interface and one or Multiple programs, wherein one or more of programs are stored in the memory, and are configured to be held by the processor Row, to execute the instruction such as the step in any one of claim 1-7 method.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer Program, the storage computer program is executed by the processor, to realize the method according to claim 1 to 7.
CN201910007689.3A 2019-01-04 2019-01-04 A kind of data ciphering method and relevant apparatus Pending CN109815715A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910007689.3A CN109815715A (en) 2019-01-04 2019-01-04 A kind of data ciphering method and relevant apparatus
PCT/CN2019/117545 WO2020140616A1 (en) 2019-01-04 2019-11-12 Data encryption method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910007689.3A CN109815715A (en) 2019-01-04 2019-01-04 A kind of data ciphering method and relevant apparatus

Publications (1)

Publication Number Publication Date
CN109815715A true CN109815715A (en) 2019-05-28

Family

ID=66603930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910007689.3A Pending CN109815715A (en) 2019-01-04 2019-01-04 A kind of data ciphering method and relevant apparatus

Country Status (2)

Country Link
CN (1) CN109815715A (en)
WO (1) WO2020140616A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111126604A (en) * 2019-12-31 2020-05-08 北京奇艺世纪科技有限公司 Model training method, device, server and storage medium
WO2020140616A1 (en) * 2019-01-04 2020-07-09 平安科技(深圳)有限公司 Data encryption method and related device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
CN106372519A (en) * 2016-08-30 2017-02-01 江苏博智软件科技有限公司 Information encryption method and device
US20170124336A1 (en) * 2015-11-03 2017-05-04 Palo Alto Research Center Incorporated Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization
CN106650482A (en) * 2015-11-04 2017-05-10 阿里巴巴集团控股有限公司 Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN108520183A (en) * 2018-04-13 2018-09-11 杭州橙鹰数据技术有限公司 A kind of date storage method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483383B (en) * 2016-06-07 2021-10-15 腾讯科技(深圳)有限公司 Data processing method, terminal, background server and storage medium
KR101987025B1 (en) * 2017-05-31 2019-06-10 삼성에스디에스 주식회사 Method for processing encryption and Apparatus thereof
CN109815715A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of data ciphering method and relevant apparatus

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
US20170124336A1 (en) * 2015-11-03 2017-05-04 Palo Alto Research Center Incorporated Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization
CN106650482A (en) * 2015-11-04 2017-05-10 阿里巴巴集团控股有限公司 Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN106372519A (en) * 2016-08-30 2017-02-01 江苏博智软件科技有限公司 Information encryption method and device
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN107508796A (en) * 2017-07-28 2017-12-22 北京明朝万达科技股份有限公司 A kind of data communications method and device
CN108520183A (en) * 2018-04-13 2018-09-11 杭州橙鹰数据技术有限公司 A kind of date storage method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020140616A1 (en) * 2019-01-04 2020-07-09 平安科技(深圳)有限公司 Data encryption method and related device
CN111126604A (en) * 2019-12-31 2020-05-08 北京奇艺世纪科技有限公司 Model training method, device, server and storage medium
CN111126604B (en) * 2019-12-31 2024-02-02 北京奇艺世纪科技有限公司 Model training method, device, server and storage medium

Also Published As

Publication number Publication date
WO2020140616A1 (en) 2020-07-09

Similar Documents

Publication Publication Date Title
US20210409191A1 (en) Secure Machine Learning Analytics Using Homomorphic Encryption
CN112950367B (en) Method and device for generating and executing intelligent contract transaction
US10693657B2 (en) Method and apparatus for verifying processed data
Xiang et al. Privacy-preserving face recognition with outsourced computation
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
CN106713508B (en) A kind of data access method and system based on Cloud Server
CN110086817B (en) Reliable user service system and method
CN113179158B (en) Multi-party combined data processing method and device for controlling bandwidth
Han et al. Verifiable and privacy preserving federated learning without fully trusted centers
CN111741268B (en) Video transmission method, device, server, equipment and medium
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
CN110737915A (en) Anti-quantum-computation anonymous identity recognition method and system based on alliance chain and implicit certificate
JP2008042590A (en) Recipient device, sender device, encryption communication system and program
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
CN115664629A (en) Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform
CN109815715A (en) A kind of data ciphering method and relevant apparatus
CN113807534B (en) Model parameter training method and device of federal learning model and electronic equipment
CN115022012B (en) Data transmission method, device, system, equipment and storage medium
CN113254989B (en) Fusion method and device of target data and server
CN109218016B (en) Data transmission method and device, server, computer equipment and storage medium
Li et al. Efficient and traceable data sharing for the Internet of Things in smart cities
Ogiela et al. Security and privacy in distributed information management
CN115001719B (en) Private data processing system, method, device, computer equipment and storage medium
Choudhury et al. Cryptanalysis of ‘A novel user-participating authentication scheme’
Sain et al. An improved two factor user authentication framework based on captcha and visual secret sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination