CN110162988A - A kind of sensitive data encryption method based on operation system - Google Patents
A kind of sensitive data encryption method based on operation system Download PDFInfo
- Publication number
- CN110162988A CN110162988A CN201910431509.4A CN201910431509A CN110162988A CN 110162988 A CN110162988 A CN 110162988A CN 201910431509 A CN201910431509 A CN 201910431509A CN 110162988 A CN110162988 A CN 110162988A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- operation system
- decryption
- sensitive data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The sensitive data encryption method based on operation system that the invention discloses a kind of, include: step S1: administrator generates key picture and cipher key configuration file cipher text using encryption and decryption tool, and the key picture and the cipher key configuration file cipher text are injected or are distributed in each operation system;Step S2: when operation system starts, the key picture is loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool, obtains key;Step S3: encryption and decryption library described in operation system obtains cipher key configuration file using cipher key configuration file cipher text described in the key-parsing;Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file, obtains sensitive data ciphertext;Step S5: the sensitive data ciphertext is stored in database profession.Encryption method of the present invention, safety is higher, is not easy to crack leakage;By completing encryption and decryption in operation system, it not only can reduce the calculation amount of database, also facilitate Data Migration.
Description
Technical field
The present invention relates to encryption technology fields, and in particular to a kind of sensitive data encryption method based on operation system.
Background technique
Each operation system would generally rely on or manage very more systematic parameter configurations, wherein may include connection number
According to the user name in library, password, the key of symmetrical encryption and decryption, various hash algorithms obscure code, it is various access it is third-party log in/
Password etc., if these important configuration parameter leakages, can greatly weaken the safety of system processing business.
At the same time, the database under production environment is often the data assets of company's very core, usual in store use
Many sensitive informations at family, such as cell-phone number, name, identification card number, address, gender, occupation, mailbox and the bank's card number of user
Etc..If not doing reliable encryption storage to these sensitive informations, dragged caused by library or other modes once meeting with hacker
Database leakage, then can bring very big risk of loss to user and corporate business.
Summary of the invention
The sensitive data encryption method based on operation system that the purpose of the present invention is to provide a kind of, to ensure user's sensitivity
Data and the higher encryption reliability of system configuration parameter, ensure the safe operation of business.
To realize the above goal of the invention, the technical solution adopted is that:
A kind of sensitive data encryption method based on operation system, comprising the following steps:
Step S1: administrator generates key picture 1 and cipher key configuration file cipher text 1 using encryption and decryption tool, and by the key
Picture 1 and the cipher key configuration file cipher text 1 injection are distributed in each operation system;
Step S2: it when operation system starts, loads and parses described close using encryption and decryption library corresponding with the encryption and decryption tool
Key picture 1 obtains key 1;
Step S3: encryption and decryption library described in operation system parses the cipher key configuration file cipher text 1 using the key 1, obtains close
Key configuration file 1;
Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file 1, obtains quick
Feel data ciphertext 1;
Step S5: the sensitive data ciphertext 1 is stored in database profession.
Further, further includes:
The encryption and decryption tool is distributed to each operation system developer by administrator, and developer passes through the encryption and decryption tool
System configuration parameter is encrypted;
When operation system starts, the system configuration parameter encrypted using 1 Dui of the key is decrypted.
Further, the cipher key configuration file 1 includes algorithm mark and key version identifier, and algorithm mark corresponds to plus solution
Close algorithm, key version identifier correspond to encryption and decryption key, and the operation system passes through the enciphering and deciphering algorithm and the encryption and decryption
Key pair sensitive data is encrypted or is decrypted.
Further, the cipher key configuration file 1 further includes code table, and the code table is for encrypting phone number.
Further, the code table is to be filled in by 0 ~ 9 random digit and unique structure of arrays.
Further, the method and step encrypted using code table to phone number is as follows:
Step (1): 10 code tables of design;
Step (2): the code table of relationship maps is selected according to the mantissa of phone number;
Step (3): retaining 3 invariant positions before phone number, from the 4th to 10, carries out number transformation according to code table;
Step (4): it according in the step (3) transformed phone number, using N place value to 11-N-1 modulus, is taken
Mould result m, calculates Y=N+m, then exchanges the number of Y in phone number numbers and its end.
Further, further includes: enciphering and deciphering algorithm and/or encryption and decryption key step are updated, specific as follows:
1) administrator generates key picture 2 and cipher key configuration file cipher text 2, the key picture 2 using the encryption and decryption tool
It can be identical or different with the key picture 1;By the key picture 2 and the cipher key configuration file cipher text 2 injection or divide
It is sent in each operation system;
2) restart operation system, the key picture 2 loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool,
Key 2 is obtained, the key 2 can be identical or different with the key 1;
3) encryption and decryption library described in operation system parses the cipher key configuration file cipher text 2 using the key 2, obtains cipher key configuration
File 2, the cipher key configuration file 2 include the algorithm mark of update and/or the key version identifier of update, and foundation is described more
New algorithm mark can get the enciphering and deciphering algorithm updated, can get update plus solution according to the key version identifier of the update
Key;
4) encryption and decryption library described in operation system is by the enciphering and deciphering algorithm of the update and/or the encryption and decryption key pair of update new
Sensitive data is encrypted, and new sensitive data ciphertext 2 is obtained;
5) the new sensitive data ciphertext 2 is stored in database profession.
Further, further includes: use the enciphering and deciphering algorithm of the update and/or old quick of encryption and decryption key pair of update
Sense data are encrypted, and the old sensitive data is the data obtained after the sensitive data ciphertext 1 is decrypted.
Further, the sensitive data includes: name, identification card number, address, occupation, mailbox, bank's card number and mobile phone
Number.
Further, the encryption and decryption tool is one of AES, DES, 3DES.
A kind of sensitive data encryption method based on operation system of the invention, has the advantages that
(1) a kind of sensitive data encryption method based on operation system of the invention, realizes sensitive data by customized mode
And system configuration parameter encryption, safety is higher, is not easy to crack leakage.
(2) a kind of sensitive data encryption method based on operation system of the invention is added by completing in operation system
Decryption, not only can reduce the calculation amount of database, and facilitate Data Migration.
(3) a kind of sensitive data encryption method based on operation system of the invention passes through setting key picture and key
Configuration file ciphertext is sent to each operation system, and system obtains enciphering and deciphering algorithm and encryption and decryption key by decryption oprerations, thus
It avoids encryption and decryption key directly to expose, the safety of encryption has been significantly greatly increased.
(4) encryption method of the invention is used, can facilitate and update enciphering and deciphering algorithm and/or encryption and decryption key, reduce close
The risk of loss of key leakage.
Detailed description of the invention
Fig. 1 is a kind of sensitive data encryption method flow chart based on operation system of the present invention.
Fig. 2 is that sensitive data encryption of the present invention updates flow chart.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The sensitive data encryption method based on operation system that the purpose of the present invention is to provide a kind of, to ensure user's sensitivity
Data and the higher encryption reliability of system configuration parameter, ensure the safe operation of business.The present invention described in detail below
A kind of sensitive data encryption method based on operation system principle and embodiment, make those skilled in the art not need to create
The property made labour is appreciated that technology contents of the invention.
Fig. 1 is a kind of sensitive data encryption method flow chart based on operation system of the present invention.Administrator uses first to be added
Decoding tool generates key picture 1 and cipher key configuration file cipher text 1, and key picture 1 and cipher key configuration file cipher text 1 are injected
Or it is distributed in each operation system, such as in operation system A and B;Specifically, encryption and decryption tool can be symmetrical encryption and decryption tool
One of AES, DES, 3DES.
Operation system integrates key picture 1 and cipher key configuration file cipher text 1 in the root of project.It is opened in operation system
When dynamic, operation system loads using corresponding encryption and decryption library and parses key picture 1, obtains key 1, the encryption and decryption library and generation
Key picture and the encryption and decryption tool of cipher key configuration file cipher text are corresponding, and in project development, previously-introduced operation system is made
For basic library.The encryption and decryption library parses cipher key configuration file cipher text 1 using key 1, obtains cipher key configuration file 1.Specifically, close
Key configuration file 1 includes algorithm mark and key version identifier, can get corresponding enciphering and deciphering algorithm according to algorithm mark, according to
Key version identifier obtains corresponding encryption and decryption key, the corresponding encryption and decryption library of operation system by corresponding enciphering and deciphering algorithm and
Encryption and decryption key pair sensitive data is encrypted, and after the completion of encryption, the sensitive data ciphertext 1 encrypted is saved in database
In.Sensitive data can be with are as follows: name, identification card number, address, occupation, mailbox, bank's card number and cell-phone number etc..For example, it is a certain live
Sensitive data encrypted ciphertext format in location is as follows:
{AA}nvLuVQUC1z9UmRVLIxYYyA7Lau1BdDC6TKdQuxypXso=
AA in { AA } respectively represents algorithm mark and key version identifier.
When operation system needs inquire the address from database, the address letter of the encryption is obtained from database first
Breath, then finds out the address of the corresponding enciphering and deciphering algorithm of A and the corresponding encryption and decryption key pair encryption of A from cipher key configuration file 1
After information is decrypted, the certificate address information is obtained.Above-mentioned algorithm mark A and key version identifier A is customized mode, safety
Property is higher, is not easy to crack leakage.When needed, it can also be changed to other enciphering and deciphering algorithms and/or encryption and decryption key, such as
{ AB }, { CB } etc..Above-mentioned encryption and decryption processes are completed in operation system, compared to completing encryption and decryption in the database
Mode, not only can reduce the calculation amount of database, and facilitate Data Migration.This is because if using built in database
Encryption and decryption function encrypted, when migrating data, due to different databases, its encryption and decryption function is different, or
Because version difference, encryption and decryption function may also be different, the variation of encryption and decryption function caused by above-mentioned factor can make same database
It is inconsistent at data deciphering, so that traffic affecting runs well, therefore inconvenience is brought to Data Migration.
If desired system configuration parameter is encrypted, to enhance the safety of system business processing, administrator can be preparatory
The above-mentioned encryption and decryption tool for being used to generate key picture and cipher key configuration file cipher text is distributed to each operation system developer,
Developer encrypts system configuration parameter by the encryption and decryption tool.Operation system on startup, passes through parsing key
Picture 1 obtains key 1, and the system configuration parameter then encrypted using 1 Dui of key is decrypted.
Nowadays, the more and more unique authentications applied to user identity of phone number, therefore, in many applied fields
Scape is particularly important the encryption of phone number this sensitive information.Further, cipher key configuration file further includes code table,
The code table is to be filled in by 0 ~ 9 random digit and unique structure of arrays, for encrypting to phone number.Use code table pair
The method that phone number is encrypted is as follows:
Step (1): 10 code tables of design, each number of 0-9 respectively correspond a code table.
Step (2): selecting the code table of relationship maps according to the mantissa of phone number, for example, mobile phone mantissa is 8 selections 8
Corresponding code table.
Step (3): code table encryption.Retain 3 invariant positions before phone number, from the 4th to 10, according to code table progress number
Code digital conversion.The method for carrying out number transformation according to code table are as follows: since the 4th, with phone number current location
Number finds corresponding transformed value (index of code table is started counting from 0) as index in code table, for example, it is assumed that the 4th
Number is 7, then indexes the 7th since 0 in code table, find corresponding number and converted;Assuming that the 5th number is
6, then the 6th is indexed since 0 in code table, corresponding number is found and is converted;And so on, after finally being changed
Encrypted number.
Step (4): mantissa is hidden.Specific method: pass through in step (3) transformed encrypted number, using N place value pair
11-N-1 modulus obtains modulus result m, then calculates Y=N+m, then exchanges Y of the encrypted number with mantissa, N's
Value range are as follows: 3 < N < 11.
Such as: phone number: 18076385668, it is assumed that its corresponding code table of mantissa 8 are as follows: [3,9,1,0,4,5,2,8,6,
It 7], is (3 invariant position, the 4th to 10 foundation code tables are converted before phone number) after step (3) transformation: 180
82065228;Mantissa's exchange (it is now assumed that N=4, modulus 8%(11-4-1) is carried out through step (4) again, is computed: m=2, then Y=4
+ 2=6, the 6th is exchanged with mantissa), after mantissa exchanges are as follows: 180 82865220.Entire ciphering process is as shown in the table:
Length | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
Phone number | 1 | 8 | 0 | 7 | 6 | 3 | 8 | 5 | 6 | 6 | 8 |
8 directories | 3 | 9 | 1 | 0 | 4 | 5 | 2 | 8 | 6 | 7 | |
Code table encryption | 1 | 8 | 0 | 8 | 2 | 0 | 6 | 5 | 2 | 2 | 8 |
Hide mantissa | 1 | 8 | 0 | 8 | 2 | 8 | 6 | 5 | 2 | 2 | 0 |
Finally, increase algorithm and code table revision identification information before the phone number after transformed, such as:
{ AA } 18082865220, wherein AA respectively represents algorithm mark and code table version identifier.
Algorithm mark and code table version identifier be it is customized, may be updated as different versions as needed.
After being encrypted by the above method to phone number, obtaining encrypted ciphertext will still appear as cell-phone number
Code, further increases the security reliability of encryption at the phenomenon that concealing encryption well.
In practical applications, key will be usually stored in each encrypting and deciphering system, therefore can also have the risk of leakage,
When key is revealed, to consider that enciphering and deciphering algorithm and/or encryption and decryption key can be replaced, with loss of reducing risks.
In the present embodiment, the step of updating enciphering and deciphering algorithm and/or encryption and decryption key, specific as follows:
1) administrator generates key picture 2 using above-mentioned encryption and decryption tool and cipher key configuration file cipher text 2, cipher key configuration file are close
Text 2 includes the enciphering and deciphering algorithm of update and/or the encryption and decryption key of update;Key picture 2 and key picture 1 can it is identical or
It is different;By key picture 2 and the injection of cipher key configuration file cipher text 2 or it is distributed in each operation system;
2) operation system restarts, and use encryption and decryption corresponding with encryption and decryption tool library loads and parse key picture 2, obtains
Key 2 is taken, key 2 can be identical or different with key 1;
3) the corresponding encryption and decryption library of operation system parses cipher key configuration file cipher text 2 using key 2, obtains cipher key configuration file 2,
Cipher key configuration file 2 includes the algorithm mark of update and/or the key version identifier of update, and identifying according to the algorithm updated can
The enciphering and deciphering algorithm updated is obtained, the encryption and decryption key updated is obtained according to the key version identifier of update;
4) the corresponding encryption and decryption library of operation system passes through new quick of the encryption and decryption key pair of the enciphering and deciphering algorithm and/or update that update
Sense data are encrypted, and new sensitive data ciphertext 2 is obtained;
5) new sensitive data ciphertext 2 is stored in database profession.
Fig. 2 is that sensitive data encryption of the present invention updates flow chart.
After system reboot obtains cipher key configuration file 2, it is quick that database administrator using encryption and decryption tool completes old encryption
Feel data (sensitive data ciphertext 1) cutover operation (i.e. data reparation), i.e., it is first close using legacy version enciphering and deciphering algorithm and encryption and decryption
Operation is decrypted to old sensitive data in key (enciphering and deciphering algorithm and encryption and decryption key before not updating), then using more
New enciphering and deciphering algorithm/update encryption and decryption key (new version) carries out re-encrypted to old sensitive data.Whole old adds
After the completion of close sensitive data cutover is repaired, legacy version enciphering and deciphering algorithm and encryption and decryption key are removed from configuration file.
New business datum uses new version enciphering and deciphering algorithm/encryption and decryption key handling.It is excellent when carrying out service inquiry
It is first inquired using the enciphering and deciphering algorithm of update and/or the encryption and decryption key of update, if inquiry no data, is added using old edition
Decipherment algorithm and encryption and decryption key are inquired.Old edition enciphering and deciphering algorithm and encryption and decryption key in configuration file after removing, then
The query performance of resettable data base.
By above scheme it is found that the sensitive data encryption method of the invention based on operation system, passes through customized mode
Realize sensitive data and system configuration parameter encryption, cryptographic security is higher, is not easy to crack leakage;By complete in operation system
It is operated at encryption and decryption, not only can reduce the calculation amount of database, also facilitate Data Migration.
A kind of sensitive data encryption method based on operation system of the invention passes through setting key picture and cipher key configuration
File cipher text is sent to each operation system, and system needs to obtain enciphering and deciphering algorithm and encryption and decryption key by decryption oprerations first, from
And avoid key and directly expose, the safety of encryption has been significantly greatly increased.Using encryption method of the invention to phone number into
Row encryption, has good crypticity, more secure and reliable.
Using encryption method of the invention, it can facilitate and update enciphering and deciphering algorithm and/or encryption and decryption key, be let out in key
When dew, can more scaling method and/or key in time, to reduce risk of loss.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses
Mode, however the present invention is not limited thereto.All within the spirits and principles of the present invention, it is made it is any modification, equally replace
It changes and improves, should be included within the scope of the present invention.
Claims (10)
1. a kind of sensitive data encryption method based on operation system, which comprises the following steps:
Step S1: administrator generates key picture 1 and cipher key configuration file cipher text 1 using encryption and decryption tool, and by the key
Picture 1 and the cipher key configuration file cipher text 1 injection are distributed in each operation system;
Step S2: it when operation system starts, loads and parses described close using encryption and decryption library corresponding with the encryption and decryption tool
Key picture 1 obtains key 1;
Step S3: encryption and decryption library described in operation system parses the cipher key configuration file cipher text 1 using the key 1, obtains close
Key configuration file 1;
Step S4: encryption and decryption library described in operation system encrypts sensitive data using the cipher key configuration file 1, obtains quick
Feel data ciphertext 1;
Step S5: the sensitive data ciphertext 1 is stored in database profession.
2. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that further include:
The encryption and decryption tool is distributed to each operation system developer by administrator, and developer passes through the encryption and decryption tool
System configuration parameter is encrypted;
When operation system starts, the system configuration parameter encrypted using 1 Dui of the key is decrypted.
3. the sensitive data encryption method according to claim 1 or 2 based on operation system, which is characterized in that described close
Key configuration file 1 includes algorithm mark and key version identifier, and algorithm identifies corresponding enciphering and deciphering algorithm, and key version identifier is corresponding
Encryption and decryption key, the operation system by the enciphering and deciphering algorithm and the encryption and decryption key pair sensitive data carry out encryption or
Decryption.
4. the sensitive data encryption method according to claim 3 based on operation system, which is characterized in that the key is matched
Setting file 1 further includes code table, and the code table is for encrypting phone number.
5. the sensitive data encryption method according to claim 4 based on operation system, which is characterized in that the code table is
It is filled in by 0 ~ 9 random digit and unique structure of arrays.
6. the sensitive data encryption method according to claim 4 or 5 based on operation system, which is characterized in that use code
The method and step that table encrypts phone number is as follows:
Step (1): 10 code tables of design;
Step (2): the code table of relationship maps is selected according to the mantissa of phone number;
Step (3): retaining 3 invariant positions before phone number, from the 4th to 10, carries out number transformation according to code table;
Step (4): it according in the step (3) transformed phone number, using N place value to 11-N-1 modulus, is taken
Mould result m, calculates Y=N+m, then exchanges the number of Y in phone number numbers and its end.
7. the sensitive data encryption method according to claim 3 based on operation system, which is characterized in that further include: more
New enciphering and deciphering algorithm and/or encryption and decryption key step, specific as follows:
1) administrator generates key picture 2 and cipher key configuration file cipher text 2, the key picture 2 using the encryption and decryption tool
It can be identical or different with the key picture 1;By the key picture 2 and the cipher key configuration file cipher text 2 injection or divide
It is sent in each operation system;
2) restart operation system, the key picture 2 loaded and parsed using encryption and decryption library corresponding with the encryption and decryption tool,
Key 2 is obtained, the key 2 can be identical or different with the key 1;
3) encryption and decryption library described in operation system parses the cipher key configuration file cipher text 2 using the key 2, obtains cipher key configuration
File 2, the cipher key configuration file 2 include the algorithm mark of update and/or the key version identifier of update, and foundation is described more
New algorithm mark can get the enciphering and deciphering algorithm updated, can get update plus solution according to the key version identifier of the update
Key;
4) encryption and decryption library described in operation system is by the enciphering and deciphering algorithm of the update and/or the encryption and decryption key pair of update new
Sensitive data is encrypted, and new sensitive data ciphertext 2 is obtained;
5) the new sensitive data ciphertext 2 is stored in database profession.
8. the sensitive data encryption method according to claim 7 based on operation system, which is characterized in that further include: make
It is encrypted with the old sensitive data of the encryption and decryption key pair of the enciphering and deciphering algorithm of the update and/or update, it is described old quick
Sense data are the data obtained after the sensitive data ciphertext 1 is decrypted.
9. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that the sensitivity number
According to including: name, identification card number, address, occupation, mailbox, bank's card number and cell-phone number.
10. the sensitive data encryption method according to claim 1 based on operation system, which is characterized in that described plus solution
Close tool is one of AES, DES, 3DES.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431509.4A CN110162988A (en) | 2019-05-22 | 2019-05-22 | A kind of sensitive data encryption method based on operation system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431509.4A CN110162988A (en) | 2019-05-22 | 2019-05-22 | A kind of sensitive data encryption method based on operation system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110162988A true CN110162988A (en) | 2019-08-23 |
Family
ID=67632119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910431509.4A Pending CN110162988A (en) | 2019-05-22 | 2019-05-22 | A kind of sensitive data encryption method based on operation system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110162988A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625844A (en) * | 2020-04-17 | 2020-09-04 | 国家电网有限公司客户服务中心 | Survey data security encryption method and device, electronic equipment and storage medium |
CN113037486A (en) * | 2021-05-24 | 2021-06-25 | 国网浙江省电力有限公司杭州供电公司 | Power distribution automation information encryption method based on quantum reinforcement |
CN116933285A (en) * | 2023-07-19 | 2023-10-24 | 贝壳找房(北京)科技有限公司 | Upgrading method, equipment, medium and computer program product for data encryption |
CN117201021A (en) * | 2023-11-08 | 2023-12-08 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN104219044A (en) * | 2014-09-22 | 2014-12-17 | 杭州华澜微科技有限公司 | Key secret method for encrypting storing device |
CN104244235A (en) * | 2013-06-20 | 2014-12-24 | 中国移动通信集团安徽有限公司 | Method and system for encryption and decryption of sensitive information of telecommunication call bill |
CN105005743A (en) * | 2015-06-11 | 2015-10-28 | 深圳市华傲数据技术有限公司 | Telephone number whitening and reverse whitening methods |
CN106888183A (en) * | 2015-12-15 | 2017-06-23 | 阿里巴巴集团控股有限公司 | Data encryption, decryption, the method and apparatus and system of key request treatment |
CN108270739A (en) * | 2016-12-30 | 2018-07-10 | 华为技术有限公司 | A kind of method and device of managing encrypted information |
CN108833099A (en) * | 2018-07-27 | 2018-11-16 | 深圳市新名泽科技有限公司 | Key generation method, device, key recovery method and device |
-
2019
- 2019-05-22 CN CN201910431509.4A patent/CN110162988A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236929A (en) * | 2013-04-26 | 2013-08-07 | 天地融科技股份有限公司 | Information processing method and encryption device |
CN104244235A (en) * | 2013-06-20 | 2014-12-24 | 中国移动通信集团安徽有限公司 | Method and system for encryption and decryption of sensitive information of telecommunication call bill |
CN104219044A (en) * | 2014-09-22 | 2014-12-17 | 杭州华澜微科技有限公司 | Key secret method for encrypting storing device |
CN105005743A (en) * | 2015-06-11 | 2015-10-28 | 深圳市华傲数据技术有限公司 | Telephone number whitening and reverse whitening methods |
CN106888183A (en) * | 2015-12-15 | 2017-06-23 | 阿里巴巴集团控股有限公司 | Data encryption, decryption, the method and apparatus and system of key request treatment |
CN108270739A (en) * | 2016-12-30 | 2018-07-10 | 华为技术有限公司 | A kind of method and device of managing encrypted information |
CN108833099A (en) * | 2018-07-27 | 2018-11-16 | 深圳市新名泽科技有限公司 | Key generation method, device, key recovery method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625844A (en) * | 2020-04-17 | 2020-09-04 | 国家电网有限公司客户服务中心 | Survey data security encryption method and device, electronic equipment and storage medium |
CN113037486A (en) * | 2021-05-24 | 2021-06-25 | 国网浙江省电力有限公司杭州供电公司 | Power distribution automation information encryption method based on quantum reinforcement |
CN113037486B (en) * | 2021-05-24 | 2021-08-03 | 国网浙江省电力有限公司杭州供电公司 | Power distribution automation information encryption method based on quantum reinforcement |
CN116933285A (en) * | 2023-07-19 | 2023-10-24 | 贝壳找房(北京)科技有限公司 | Upgrading method, equipment, medium and computer program product for data encryption |
CN117201021A (en) * | 2023-11-08 | 2023-12-08 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
CN117201021B (en) * | 2023-11-08 | 2024-02-23 | 中孚信息股份有限公司 | Key dynamic switching method, system, device and medium for main service system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9489521B2 (en) | Format preserving encryption methods for data strings with constraints | |
CN110162988A (en) | A kind of sensitive data encryption method based on operation system | |
EP2778951B1 (en) | Database encryption system, method and program | |
US9208491B2 (en) | Format-preserving cryptographic systems | |
Yiu et al. | Enabling search services on outsourced private spatial data | |
US8208627B2 (en) | Format-preserving cryptographic systems | |
US11488134B2 (en) | Format-preserving cryptographic systems | |
US20130262863A1 (en) | Searchable encryption processing system | |
JP2008517354A (en) | A computer with a method of building an encrypted database index for database table search | |
US20100262836A1 (en) | Privacy and confidentiality preserving mapping repository for mapping reuse | |
CN107040520B (en) | Cloud computing data sharing system and method | |
CN104636444A (en) | Database encryption and decryption method and device | |
CN111091381B (en) | Hardware wallet and management method thereof | |
CN113904832B (en) | Data encryption method, device, equipment and storage medium | |
CN108170753A (en) | A kind of method of Key-Value data base encryptions and Safety query in shared cloud | |
US9436849B2 (en) | Systems and methods for trading of text based data representation | |
US20200327239A1 (en) | Encrypting/Decrypting Method for Multi-Digit Number and Encrypting/Decrypting Server | |
US20230144072A1 (en) | Data storage server and client devices for securely storing data | |
CN116132065A (en) | Key determination method, device, computer equipment and storage medium | |
CN112929169B (en) | Key negotiation method and system | |
TWM591647U (en) | Data management system capable of securely accessing and deleting data | |
CN112800033B (en) | Data operation request processing method and device, computer equipment and storage medium | |
CN113434535B (en) | Data processing method, communication system, device, product and storage medium | |
CN113836571B (en) | Medical data possession terminal position matching method and system based on cloud and blockchain | |
CN117971798A (en) | Data isolation method, system and equipment for multi-technology fusion of SaaS software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190823 |
|
WD01 | Invention patent application deemed withdrawn after publication |