CN110162988A - A kind of sensitive data encryption method based on operation system - Google Patents

A kind of sensitive data encryption method based on operation system Download PDF

Info

Publication number
CN110162988A
CN110162988A CN201910431509.4A CN201910431509A CN110162988A CN 110162988 A CN110162988 A CN 110162988A CN 201910431509 A CN201910431509 A CN 201910431509A CN 110162988 A CN110162988 A CN 110162988A
Authority
CN
China
Prior art keywords
key
encryption
operation system
decryption
sensitive data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910431509.4A
Other languages
Chinese (zh)
Inventor
代豪
蒙孝宗
韩宏华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mifu (shenzhen) Network Technology Co Ltd
Original Assignee
Mifu (shenzhen) Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mifu (shenzhen) Network Technology Co Ltd filed Critical Mifu (shenzhen) Network Technology Co Ltd
Priority to CN201910431509.4A priority Critical patent/CN110162988A/en
Publication of CN110162988A publication Critical patent/CN110162988A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The sensitive data encryption method based on operation system that the invention discloses a kind of, include: step S1: administrator generates key picture and cipher key configuration file cipher text using encryption and decryption tool, and the key picture and the cipher key configuration file cipher text are injected or are distributed in each operation system;Step S2: when operation system starts, the key picture is loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool, obtains key;Step S3: encryption and decryption library described in operation system obtains cipher key configuration file using cipher key configuration file cipher text described in the key-parsing;Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file, obtains sensitive data ciphertext;Step S5: the sensitive data ciphertext is stored in database profession.Encryption method of the present invention, safety is higher, is not easy to crack leakage;By completing encryption and decryption in operation system, it not only can reduce the calculation amount of database, also facilitate Data Migration.

Description

A kind of sensitive data encryption method based on operation system
Technical field
The present invention relates to encryption technology fields, and in particular to a kind of sensitive data encryption method based on operation system.
Background technique
Each operation system would generally rely on or manage very more systematic parameter configurations, wherein may include connection number According to the user name in library, password, the key of symmetrical encryption and decryption, various hash algorithms obscure code, it is various access it is third-party log in/ Password etc., if these important configuration parameter leakages, can greatly weaken the safety of system processing business.
At the same time, the database under production environment is often the data assets of company's very core, usual in store use Many sensitive informations at family, such as cell-phone number, name, identification card number, address, gender, occupation, mailbox and the bank's card number of user Etc..If not doing reliable encryption storage to these sensitive informations, dragged caused by library or other modes once meeting with hacker Database leakage, then can bring very big risk of loss to user and corporate business.
Summary of the invention
The sensitive data encryption method based on operation system that the purpose of the present invention is to provide a kind of, to ensure user's sensitivity Data and the higher encryption reliability of system configuration parameter, ensure the safe operation of business.
To realize the above goal of the invention, the technical solution adopted is that:
A kind of sensitive data encryption method based on operation system, comprising the following steps:
Step S1: administrator generates key picture 1 and cipher key configuration file cipher text 1 using encryption and decryption tool, and by the key Picture 1 and the cipher key configuration file cipher text 1 injection are distributed in each operation system;
Step S2: it when operation system starts, loads and parses described close using encryption and decryption library corresponding with the encryption and decryption tool Key picture 1 obtains key 1;
Step S3: encryption and decryption library described in operation system parses the cipher key configuration file cipher text 1 using the key 1, obtains close Key configuration file 1;
Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file 1, obtains quick Feel data ciphertext 1;
Step S5: the sensitive data ciphertext 1 is stored in database profession.
Further, further includes:
The encryption and decryption tool is distributed to each operation system developer by administrator, and developer passes through the encryption and decryption tool System configuration parameter is encrypted;
When operation system starts, the system configuration parameter encrypted using 1 Dui of the key is decrypted.
Further, the cipher key configuration file 1 includes algorithm mark and key version identifier, and algorithm mark corresponds to plus solution Close algorithm, key version identifier correspond to encryption and decryption key, and the operation system passes through the enciphering and deciphering algorithm and the encryption and decryption Key pair sensitive data is encrypted or is decrypted.
Further, the cipher key configuration file 1 further includes code table, and the code table is for encrypting phone number.
Further, the code table is to be filled in by 0 ~ 9 random digit and unique structure of arrays.
Further, the method and step encrypted using code table to phone number is as follows:
Step (1): 10 code tables of design;
Step (2): the code table of relationship maps is selected according to the mantissa of phone number;
Step (3): retaining 3 invariant positions before phone number, from the 4th to 10, carries out number transformation according to code table;
Step (4): it according in the step (3) transformed phone number, using N place value to 11-N-1 modulus, is taken Mould result m, calculates Y=N+m, then exchanges the number of Y in phone number numbers and its end.
Further, further includes: enciphering and deciphering algorithm and/or encryption and decryption key step are updated, specific as follows:
1) administrator generates key picture 2 and cipher key configuration file cipher text 2, the key picture 2 using the encryption and decryption tool It can be identical or different with the key picture 1;By the key picture 2 and the cipher key configuration file cipher text 2 injection or divide It is sent in each operation system;
2) restart operation system, the key picture 2 loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool, Key 2 is obtained, the key 2 can be identical or different with the key 1;
3) encryption and decryption library described in operation system parses the cipher key configuration file cipher text 2 using the key 2, obtains cipher key configuration File 2, the cipher key configuration file 2 include the algorithm mark of update and/or the key version identifier of update, and foundation is described more New algorithm mark can get the enciphering and deciphering algorithm updated, can get update plus solution according to the key version identifier of the update Key;
4) encryption and decryption library described in operation system is by the enciphering and deciphering algorithm of the update and/or the encryption and decryption key pair of update new Sensitive data is encrypted, and new sensitive data ciphertext 2 is obtained;
5) the new sensitive data ciphertext 2 is stored in database profession.
Further, further includes: use the enciphering and deciphering algorithm of the update and/or old quick of encryption and decryption key pair of update Sense data are encrypted, and the old sensitive data is the data obtained after the sensitive data ciphertext 1 is decrypted.
Further, the sensitive data includes: name, identification card number, address, occupation, mailbox, bank's card number and mobile phone Number.
Further, the encryption and decryption tool is one of AES, DES, 3DES.
A kind of sensitive data encryption method based on operation system of the invention, has the advantages that
(1) a kind of sensitive data encryption method based on operation system of the invention, realizes sensitive data by customized mode And system configuration parameter encryption, safety is higher, is not easy to crack leakage.
(2) a kind of sensitive data encryption method based on operation system of the invention is added by completing in operation system Decryption, not only can reduce the calculation amount of database, and facilitate Data Migration.
(3) a kind of sensitive data encryption method based on operation system of the invention passes through setting key picture and key Configuration file ciphertext is sent to each operation system, and system obtains enciphering and deciphering algorithm and encryption and decryption key by decryption oprerations, thus It avoids encryption and decryption key directly to expose, the safety of encryption has been significantly greatly increased.
(4) encryption method of the invention is used, can facilitate and update enciphering and deciphering algorithm and/or encryption and decryption key, reduce close The risk of loss of key leakage.
Detailed description of the invention
Fig. 1 is a kind of sensitive data encryption method flow chart based on operation system of the present invention.
Fig. 2 is that sensitive data encryption of the present invention updates flow chart.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The sensitive data encryption method based on operation system that the purpose of the present invention is to provide a kind of, to ensure user's sensitivity Data and the higher encryption reliability of system configuration parameter, ensure the safe operation of business.The present invention described in detail below A kind of sensitive data encryption method based on operation system principle and embodiment, make those skilled in the art not need to create The property made labour is appreciated that technology contents of the invention.
Fig. 1 is a kind of sensitive data encryption method flow chart based on operation system of the present invention.Administrator uses first to be added Decoding tool generates key picture 1 and cipher key configuration file cipher text 1, and key picture 1 and cipher key configuration file cipher text 1 are injected Or it is distributed in each operation system, such as in operation system A and B;Specifically, encryption and decryption tool can be symmetrical encryption and decryption tool One of AES, DES, 3DES.
Operation system integrates key picture 1 and cipher key configuration file cipher text 1 in the root of project.It is opened in operation system When dynamic, operation system loads using corresponding encryption and decryption library and parses key picture 1, obtains key 1, the encryption and decryption library and generation Key picture and the encryption and decryption tool of cipher key configuration file cipher text are corresponding, and in project development, previously-introduced operation system is made For basic library.The encryption and decryption library parses cipher key configuration file cipher text 1 using key 1, obtains cipher key configuration file 1.Specifically, close Key configuration file 1 includes algorithm mark and key version identifier, can get corresponding enciphering and deciphering algorithm according to algorithm mark, according to Key version identifier obtains corresponding encryption and decryption key, the corresponding encryption and decryption library of operation system by corresponding enciphering and deciphering algorithm and Encryption and decryption key pair sensitive data is encrypted, and after the completion of encryption, the sensitive data ciphertext 1 encrypted is saved in database In.Sensitive data can be with are as follows: name, identification card number, address, occupation, mailbox, bank's card number and cell-phone number etc..For example, it is a certain live Sensitive data encrypted ciphertext format in location is as follows:
{AA}nvLuVQUC1z9UmRVLIxYYyA7Lau1BdDC6TKdQuxypXso=
AA in { AA } respectively represents algorithm mark and key version identifier.
When operation system needs inquire the address from database, the address letter of the encryption is obtained from database first Breath, then finds out the address of the corresponding enciphering and deciphering algorithm of A and the corresponding encryption and decryption key pair encryption of A from cipher key configuration file 1 After information is decrypted, the certificate address information is obtained.Above-mentioned algorithm mark A and key version identifier A is customized mode, safety Property is higher, is not easy to crack leakage.When needed, it can also be changed to other enciphering and deciphering algorithms and/or encryption and decryption key, such as { AB }, { CB } etc..Above-mentioned encryption and decryption processes are completed in operation system, compared to completing encryption and decryption in the database Mode, not only can reduce the calculation amount of database, and facilitate Data Migration.This is because if using built in database Encryption and decryption function encrypted, when migrating data, due to different databases, its encryption and decryption function is different, or Because version difference, encryption and decryption function may also be different, the variation of encryption and decryption function caused by above-mentioned factor can make same database It is inconsistent at data deciphering, so that traffic affecting runs well, therefore inconvenience is brought to Data Migration.
If desired system configuration parameter is encrypted, to enhance the safety of system business processing, administrator can be preparatory The above-mentioned encryption and decryption tool for being used to generate key picture and cipher key configuration file cipher text is distributed to each operation system developer, Developer encrypts system configuration parameter by the encryption and decryption tool.Operation system on startup, passes through parsing key Picture 1 obtains key 1, and the system configuration parameter then encrypted using 1 Dui of key is decrypted.
Nowadays, the more and more unique authentications applied to user identity of phone number, therefore, in many applied fields Scape is particularly important the encryption of phone number this sensitive information.Further, cipher key configuration file further includes code table, The code table is to be filled in by 0 ~ 9 random digit and unique structure of arrays, for encrypting to phone number.Use code table pair The method that phone number is encrypted is as follows:
Step (1): 10 code tables of design, each number of 0-9 respectively correspond a code table.
Step (2): selecting the code table of relationship maps according to the mantissa of phone number, for example, mobile phone mantissa is 8 selections 8 Corresponding code table.
Step (3): code table encryption.Retain 3 invariant positions before phone number, from the 4th to 10, according to code table progress number Code digital conversion.The method for carrying out number transformation according to code table are as follows: since the 4th, with phone number current location Number finds corresponding transformed value (index of code table is started counting from 0) as index in code table, for example, it is assumed that the 4th Number is 7, then indexes the 7th since 0 in code table, find corresponding number and converted;Assuming that the 5th number is 6, then the 6th is indexed since 0 in code table, corresponding number is found and is converted;And so on, after finally being changed Encrypted number.
Step (4): mantissa is hidden.Specific method: pass through in step (3) transformed encrypted number, using N place value pair 11-N-1 modulus obtains modulus result m, then calculates Y=N+m, then exchanges Y of the encrypted number with mantissa, N's Value range are as follows: 3 < N < 11.
Such as: phone number: 18076385668, it is assumed that its corresponding code table of mantissa 8 are as follows: [3,9,1,0,4,5,2,8,6, It 7], is (3 invariant position, the 4th to 10 foundation code tables are converted before phone number) after step (3) transformation: 180 82065228;Mantissa's exchange (it is now assumed that N=4, modulus 8%(11-4-1) is carried out through step (4) again, is computed: m=2, then Y=4 + 2=6, the 6th is exchanged with mantissa), after mantissa exchanges are as follows: 180 82865220.Entire ciphering process is as shown in the table:
Length 0 1 2 3 4 5 6 7 8 9 10
Phone number 1 8 0 7 6 3 8 5 6 6 8
8 directories 3 9 1 0 4 5 2 8 6 7
Code table encryption 1 8 0 8 2 0 6 5 2 2 8
Hide mantissa 1 8 0 8 2 8 6 5 2 2 0
Finally, increase algorithm and code table revision identification information before the phone number after transformed, such as:
{ AA } 18082865220, wherein AA respectively represents algorithm mark and code table version identifier.
Algorithm mark and code table version identifier be it is customized, may be updated as different versions as needed.
After being encrypted by the above method to phone number, obtaining encrypted ciphertext will still appear as cell-phone number Code, further increases the security reliability of encryption at the phenomenon that concealing encryption well.
In practical applications, key will be usually stored in each encrypting and deciphering system, therefore can also have the risk of leakage, When key is revealed, to consider that enciphering and deciphering algorithm and/or encryption and decryption key can be replaced, with loss of reducing risks.
In the present embodiment, the step of updating enciphering and deciphering algorithm and/or encryption and decryption key, specific as follows:
1) administrator generates key picture 2 using above-mentioned encryption and decryption tool and cipher key configuration file cipher text 2, cipher key configuration file are close Text 2 includes the enciphering and deciphering algorithm of update and/or the encryption and decryption key of update;Key picture 2 and key picture 1 can it is identical or It is different;By key picture 2 and the injection of cipher key configuration file cipher text 2 or it is distributed in each operation system;
2) operation system restarts, and use encryption and decryption corresponding with encryption and decryption tool library loads and parse key picture 2, obtains Key 2 is taken, key 2 can be identical or different with key 1;
3) the corresponding encryption and decryption library of operation system parses cipher key configuration file cipher text 2 using key 2, obtains cipher key configuration file 2, Cipher key configuration file 2 includes the algorithm mark of update and/or the key version identifier of update, and identifying according to the algorithm updated can The enciphering and deciphering algorithm updated is obtained, the encryption and decryption key updated is obtained according to the key version identifier of update;
4) the corresponding encryption and decryption library of operation system passes through new quick of the encryption and decryption key pair of the enciphering and deciphering algorithm and/or update that update Sense data are encrypted, and new sensitive data ciphertext 2 is obtained;
5) new sensitive data ciphertext 2 is stored in database profession.
Fig. 2 is that sensitive data encryption of the present invention updates flow chart.
After system reboot obtains cipher key configuration file 2, it is quick that database administrator using encryption and decryption tool completes old encryption Feel data (sensitive data ciphertext 1) cutover operation (i.e. data reparation), i.e., it is first close using legacy version enciphering and deciphering algorithm and encryption and decryption Operation is decrypted to old sensitive data in key (enciphering and deciphering algorithm and encryption and decryption key before not updating), then using more New enciphering and deciphering algorithm/update encryption and decryption key (new version) carries out re-encrypted to old sensitive data.Whole old adds After the completion of close sensitive data cutover is repaired, legacy version enciphering and deciphering algorithm and encryption and decryption key are removed from configuration file.
New business datum uses new version enciphering and deciphering algorithm/encryption and decryption key handling.It is excellent when carrying out service inquiry It is first inquired using the enciphering and deciphering algorithm of update and/or the encryption and decryption key of update, if inquiry no data, is added using old edition Decipherment algorithm and encryption and decryption key are inquired.Old edition enciphering and deciphering algorithm and encryption and decryption key in configuration file after removing, then The query performance of resettable data base.
By above scheme it is found that the sensitive data encryption method of the invention based on operation system, passes through customized mode Realize sensitive data and system configuration parameter encryption, cryptographic security is higher, is not easy to crack leakage;By complete in operation system It is operated at encryption and decryption, not only can reduce the calculation amount of database, also facilitate Data Migration.
A kind of sensitive data encryption method based on operation system of the invention passes through setting key picture and cipher key configuration File cipher text is sent to each operation system, and system needs to obtain enciphering and deciphering algorithm and encryption and decryption key by decryption oprerations first, from And avoid key and directly expose, the safety of encryption has been significantly greatly increased.Using encryption method of the invention to phone number into Row encryption, has good crypticity, more secure and reliable.
Using encryption method of the invention, it can facilitate and update enciphering and deciphering algorithm and/or encryption and decryption key, be let out in key When dew, can more scaling method and/or key in time, to reduce risk of loss.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.All within the spirits and principles of the present invention, it is made it is any modification, equally replace It changes and improves, should be included within the scope of the present invention.

Claims (10)

1. a kind of sensitive data encryption method based on operation system, which comprises the following steps:
Step S1: administrator generates key picture 1 and cipher key configuration file cipher text 1 using encryption and decryption tool, and by the key Picture 1 and the cipher key configuration file cipher text 1 injection are distributed in each operation system;
Step S2: it when operation system starts, loads and parses described close using encryption and decryption library corresponding with the encryption and decryption tool Key picture 1 obtains key 1;
Step S3: encryption and decryption library described in operation system parses the cipher key configuration file cipher text 1 using the key 1, obtains close Key configuration file 1;
Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file 1, obtains quick Feel data ciphertext 1;
Step S5: the sensitive data ciphertext 1 is stored in database profession.
2. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that further include:
The encryption and decryption tool is distributed to each operation system developer by administrator, and developer passes through the encryption and decryption tool System configuration parameter is encrypted;
When operation system starts, the system configuration parameter encrypted using 1 Dui of the key is decrypted.
3. the sensitive data encryption method according to claim 1 or 2 based on operation system, which is characterized in that described close Key configuration file 1 includes algorithm mark and key version identifier, and algorithm identifies corresponding enciphering and deciphering algorithm, and key version identifier is corresponding Encryption and decryption key, the operation system by the enciphering and deciphering algorithm and the encryption and decryption key pair sensitive data carry out encryption or Decryption.
4. the sensitive data encryption method according to claim 3 based on operation system, which is characterized in that the key is matched Setting file 1 further includes code table, and the code table is for encrypting phone number.
5. the sensitive data encryption method according to claim 4 based on operation system, which is characterized in that the code table is It is filled in by 0 ~ 9 random digit and unique structure of arrays.
6. the sensitive data encryption method according to claim 4 or 5 based on operation system, which is characterized in that use code The method and step that table encrypts phone number is as follows:
Step (1): 10 code tables of design;
Step (2): the code table of relationship maps is selected according to the mantissa of phone number;
Step (3): retaining 3 invariant positions before phone number, from the 4th to 10, carries out number transformation according to code table;
Step (4): it according in the step (3) transformed phone number, using N place value to 11-N-1 modulus, is taken Mould result m, calculates Y=N+m, then exchanges the number of Y in phone number numbers and its end.
7. the sensitive data encryption method according to claim 3 based on operation system, which is characterized in that further include: more New enciphering and deciphering algorithm and/or encryption and decryption key step, specific as follows:
1) administrator generates key picture 2 and cipher key configuration file cipher text 2, the key picture 2 using the encryption and decryption tool It can be identical or different with the key picture 1;By the key picture 2 and the cipher key configuration file cipher text 2 injection or divide It is sent in each operation system;
2) restart operation system, the key picture 2 loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool, Key 2 is obtained, the key 2 can be identical or different with the key 1;
3) encryption and decryption library described in operation system parses the cipher key configuration file cipher text 2 using the key 2, obtains cipher key configuration File 2, the cipher key configuration file 2 include the algorithm mark of update and/or the key version identifier of update, and foundation is described more New algorithm mark can get the enciphering and deciphering algorithm updated, can get update plus solution according to the key version identifier of the update Key;
4) encryption and decryption library described in operation system is by the enciphering and deciphering algorithm of the update and/or the encryption and decryption key pair of update new Sensitive data is encrypted, and new sensitive data ciphertext 2 is obtained;
5) the new sensitive data ciphertext 2 is stored in database profession.
8. the sensitive data encryption method according to claim 7 based on operation system, which is characterized in that further include: make It is encrypted with the old sensitive data of the encryption and decryption key pair of the enciphering and deciphering algorithm of the update and/or update, it is described old quick Sense data are the data obtained after the sensitive data ciphertext 1 is decrypted.
9. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that the sensitivity number According to including: name, identification card number, address, occupation, mailbox, bank's card number and cell-phone number.
10. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that described plus solution Close tool is one of AES, DES, 3DES.
CN201910431509.4A 2019-05-22 2019-05-22 A kind of sensitive data encryption method based on operation system Pending CN110162988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910431509.4A CN110162988A (en) 2019-05-22 2019-05-22 A kind of sensitive data encryption method based on operation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910431509.4A CN110162988A (en) 2019-05-22 2019-05-22 A kind of sensitive data encryption method based on operation system

Publications (1)

Publication Number Publication Date
CN110162988A true CN110162988A (en) 2019-08-23

Family

ID=67632119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910431509.4A Pending CN110162988A (en) 2019-05-22 2019-05-22 A kind of sensitive data encryption method based on operation system

Country Status (1)

Country Link
CN (1) CN110162988A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625844A (en) * 2020-04-17 2020-09-04 国家电网有限公司客户服务中心 Survey data security encryption method and device, electronic equipment and storage medium
CN113037486A (en) * 2021-05-24 2021-06-25 国网浙江省电力有限公司杭州供电公司 Power distribution automation information encryption method based on quantum reinforcement
CN116933285A (en) * 2023-07-19 2023-10-24 贝壳找房(北京)科技有限公司 Upgrading method, equipment, medium and computer program product for data encryption
CN117201021A (en) * 2023-11-08 2023-12-08 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN104219044A (en) * 2014-09-22 2014-12-17 杭州华澜微科技有限公司 Key secret method for encrypting storing device
CN104244235A (en) * 2013-06-20 2014-12-24 中国移动通信集团安徽有限公司 Method and system for encryption and decryption of sensitive information of telecommunication call bill
CN105005743A (en) * 2015-06-11 2015-10-28 深圳市华傲数据技术有限公司 Telephone number whitening and reverse whitening methods
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN108270739A (en) * 2016-12-30 2018-07-10 华为技术有限公司 A kind of method and device of managing encrypted information
CN108833099A (en) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 Key generation method, device, key recovery method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN104244235A (en) * 2013-06-20 2014-12-24 中国移动通信集团安徽有限公司 Method and system for encryption and decryption of sensitive information of telecommunication call bill
CN104219044A (en) * 2014-09-22 2014-12-17 杭州华澜微科技有限公司 Key secret method for encrypting storing device
CN105005743A (en) * 2015-06-11 2015-10-28 深圳市华傲数据技术有限公司 Telephone number whitening and reverse whitening methods
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN108270739A (en) * 2016-12-30 2018-07-10 华为技术有限公司 A kind of method and device of managing encrypted information
CN108833099A (en) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 Key generation method, device, key recovery method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625844A (en) * 2020-04-17 2020-09-04 国家电网有限公司客户服务中心 Survey data security encryption method and device, electronic equipment and storage medium
CN113037486A (en) * 2021-05-24 2021-06-25 国网浙江省电力有限公司杭州供电公司 Power distribution automation information encryption method based on quantum reinforcement
CN113037486B (en) * 2021-05-24 2021-08-03 国网浙江省电力有限公司杭州供电公司 Power distribution automation information encryption method based on quantum reinforcement
CN116933285A (en) * 2023-07-19 2023-10-24 贝壳找房(北京)科技有限公司 Upgrading method, equipment, medium and computer program product for data encryption
CN117201021A (en) * 2023-11-08 2023-12-08 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system
CN117201021B (en) * 2023-11-08 2024-02-23 中孚信息股份有限公司 Key dynamic switching method, system, device and medium for main service system

Similar Documents

Publication Publication Date Title
US9489521B2 (en) Format preserving encryption methods for data strings with constraints
CN110162988A (en) A kind of sensitive data encryption method based on operation system
EP2778951B1 (en) Database encryption system, method and program
US9208491B2 (en) Format-preserving cryptographic systems
Yiu et al. Enabling search services on outsourced private spatial data
US8208627B2 (en) Format-preserving cryptographic systems
US11488134B2 (en) Format-preserving cryptographic systems
US20130262863A1 (en) Searchable encryption processing system
JP2008517354A (en) A computer with a method of building an encrypted database index for database table search
US20100262836A1 (en) Privacy and confidentiality preserving mapping repository for mapping reuse
CN107040520B (en) Cloud computing data sharing system and method
CN104636444A (en) Database encryption and decryption method and device
CN111091381B (en) Hardware wallet and management method thereof
CN113904832B (en) Data encryption method, device, equipment and storage medium
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
US9436849B2 (en) Systems and methods for trading of text based data representation
US20200327239A1 (en) Encrypting/Decrypting Method for Multi-Digit Number and Encrypting/Decrypting Server
US20230144072A1 (en) Data storage server and client devices for securely storing data
CN116132065A (en) Key determination method, device, computer equipment and storage medium
CN112929169B (en) Key negotiation method and system
TWM591647U (en) Data management system capable of securely accessing and deleting data
CN112800033B (en) Data operation request processing method and device, computer equipment and storage medium
CN113434535B (en) Data processing method, communication system, device, product and storage medium
CN113836571B (en) Medical data possession terminal position matching method and system based on cloud and blockchain
CN117971798A (en) Data isolation method, system and equipment for multi-technology fusion of SaaS software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190823

WD01 Invention patent application deemed withdrawn after publication