CN110321718A - Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium - Google Patents

Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium Download PDF

Info

Publication number
CN110321718A
CN110321718A CN201810282251.1A CN201810282251A CN110321718A CN 110321718 A CN110321718 A CN 110321718A CN 201810282251 A CN201810282251 A CN 201810282251A CN 110321718 A CN110321718 A CN 110321718A
Authority
CN
China
Prior art keywords
data
ciphertext
encryption
encrypted
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810282251.1A
Other languages
Chinese (zh)
Inventor
李贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lianxin Medical Technology Co Ltd
Original Assignee
Beijing Lianxin Medical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lianxin Medical Technology Co Ltd filed Critical Beijing Lianxin Medical Technology Co Ltd
Priority to CN201810282251.1A priority Critical patent/CN110321718A/en
Publication of CN110321718A publication Critical patent/CN110321718A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to field of information security technology, it is related to a kind of data redundancy encryption method and the recognition methods of redundancy encryption data, equipment and storage medium.Data ciphering method of the invention, comprises the following steps: obtaining be-encrypted data;Obtain identification code;Identification code is encrypted, ciphertext is obtained;Ciphertext is added in the redundant data bits of be-encrypted data, encryption data is obtained.In addition, additionally providing the data obtained to above-mentioned encryption method carries out knowledge method for distinguishing.Piracy can be effectively prevented in the data encryption and recognition methods provided through the invention;Evidence obtaining and right-safeguarding after also data being facilitated to be stolen simultaneously;In addition, data encryption position of the invention is located in the invalid bit of data, data precision is not influenced.

Description

Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium
Technical field
The invention belongs to field of information security technology, it is related to a kind of data redundancy encryption method and data identification method, sets Standby and storage medium.
Background technique
Data encryption is currently a kind of most reliable method that computer system protects information.It utilizes password skill Art encrypts information, realizes information hiding, to play the role of protecting information security.
In the prior art, the source that can not track be-encrypted data causes to collect evidence after data are stolen difficult, once data quilt After stealing, data owner is difficult to prove the source of data of being stolen.
Summary of the invention
It is an object of the invention to overcome the shortcomings of existing technologies and provide a kind of encryption of data redundancy and recognition methods, Equipment and storage medium.
To achieve the above object, the invention adopts the following technical scheme:
A kind of data redundancy encryption method, suitable for calculate equipment in execute, comprise the following steps:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
When the be-encrypted data includes character string, non-numeric data is converted to by number by ASCII character.
The identification code be with mark action number combination or random number, preferably Bank Account Number, the date of birth, Identification card number or taxpayer identification number etc..
The generation step of the random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) by each digit of be-encrypted data number carry out arithmetic, using the absolute value of operation result as from The acknowledged sequence number of random number is selected in machine Number Sequence;It is obtained being used as identification code from random number sequence according to random number acknowledged sequence number Random number.
The cipher mode is displacement encryption or timestamp encryption etc..
The redundant data bits are the data bit not having an impact to the precision of be-encrypted data.
In step (4), when ciphertext length be more than be-encrypted data redundant data bits length when, when ciphertext length be more than to When the length of encryption data redundant data bits, the continuous ciphertext that interception is less than or equal to redundancy bit length from ciphertext is placed on redundancy In position, it is preferable that digit M >=2 of ciphertext after interception.
The present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein one or more of programs are stored in the memory and are configured as by one A or multiple processors execute, and one or more programs include the instruction for above-mentioned data redundancy encryption method.
The present invention also provides a kind of computer readable storage medium for storing one or more programs, described one or more A program includes instruction, and described instruction is suitable for being loaded by memory and executing above-mentioned data redundancy encryption method.
The present invention also provides a kind of redundancy encryption data recognition methods, suitable for executing in calculating equipment, include following step It is rapid:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits Word, the then data obtained in step (3) are the data based on identification code encryption.
It preferably,, will be superfluous when the data length in redundant data bits is greater than the digit of ciphertext in the step (4) 0 data bit removal is initiated in remaining data bit.
The present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein one or more of programs are stored in the memory and are configured as by one A or multiple processors execute, and one or more programs include the finger for above-mentioned redundancy encryption data recognition methods It enables.
The present invention also provides a kind of computer readable storage medium for storing one or more programs, described one or more A program includes instruction, and described instruction is suitable for being loaded by memory and being executed above-mentioned redundancy encryption data identification decryption method.
The invention has the following advantages:
On the one hand data can effectively be encrypted using data ciphering method provided by the invention, prevent piracy;Separately On the one hand when the present invention encrypts data, data encryption position is located in the invalid bit of data, does not influence data precision.
In addition, the data identification method provided through the invention can determine data source, facilitate proof and right-safeguarding.
Detailed description of the invention
Fig. 1 is the flow chart of data redundancy encryption method in a preferred embodiment of the invention.
Fig. 2 is redundant digit schematic diagram in a preferred embodiment of the invention,
(a) redundant digit of single-precision number evidence;
(b) redundant digit of double precision datum.
Fig. 3 is in a preferred embodiment of the invention in redundant digit ciphertext point of addition schematic diagram,
(a) it is added to preceding in redundant digit to the continuous ciphertext of interception;
(b) it is added to rear in redundant digit to the continuous ciphertext of interception;
One of (c) the continuous ciphertext of taken intermediate is added in redundant digit;
(d) two be added to the continuous ciphertext of taken intermediate in redundant digit;
(e) three be added to the continuous ciphertext of taken intermediate in redundant digit;
One of (f) whole ciphertexts sequence is added in redundant digit;
(g) two be added to whole ciphertext sequences in redundant digit;
(h) three be added to whole ciphertext sequences in redundant digit;
One of (i) the continuous ciphertext of taken intermediate is added in redundant digit;
(j) two be added to the continuous ciphertext of taken intermediate in redundant digit.
Fig. 4 is the flow chart of redundancy encryption data recognition methods in the embodiment of the present invention one preferably.
Specific embodiment
The present invention is further illustrated below in conjunction with drawings and examples.
Embodiment 1
Referring to Fig.1, a kind of data redundancy encryption method, suitable for calculate equipment in execute, comprise the following steps:
Obtain be-encrypted data 101;
In a preferred embodiment of the invention, when be-encrypted data includes non-numeric data, standard can be passed through Non-numeric data is converted to numerical data by ASCII character, is then encrypted again;It will be understood by those skilled in the art that Data to be encrypted can be individual data, or part or total data in several data or database.
Obtain identification code 102;
Wherein identification code is number combination or random number with mark action.Wherein, the random number in the present embodiment is Pseudo random number or quasi-random numbers.Therefore the present invention can be obtained by combination random seed and the method for generating random number, reproduction Random number, thus be used as identification code of the invention.
In a preferred embodiment of the invention, identification code can be Bank Account Number, date of birth, identification card number or receive Tax people's identification code etc.;Those skilled in the art is it is to be understood that the type of above-mentioned identification code is only used as exemplary reality Example is applied, is not intended to limit the scope of protection of the present invention;
In a preferred embodiment of the invention, the generation step of random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) by each digit of be-encrypted data number carry out arithmetic, using the absolute value of operation result as from The acknowledged sequence number of random number is selected in machine Number Sequence;It is obtained being used as identification code from random number sequence according to random number acknowledged sequence number Random number.
The generation step of random number is now further illustrated in one exemplary embodiment, such as: by be-encrypted data 12.34 as random number seed;It, (should be with after generating random number sequence according to random number seed 12.34 by randomizer Machine Number Sequence includes several random numbers, and each random number, which marks, serial number);By the number in each digit of be-encrypted data The number that word carries out in arithmetic, such as 12.34 in each digit respectively is 1,2,3,4, this number is carried out any Combined addition subtraction multiplication and division arithmetic, such as (1+2+3) × 4=24, using the absolute value of arithmetic result as from random number The serial number of random number is selected in sequence, it may be assumed that take in random number sequence the 24th to be used as identification code.It is further preferred that if random In Number Sequence the sum of random number be less than arithmetic result absolute value, arithmetic can be re-started, until can from Until determining random number is obtained in machine Number Sequence as identification code.
Identification code is encrypted, ciphertext 103 is obtained;
In the embodiment of the present invention preferably, cipher mode is displacement encryption or timestamp encryption etc.;
Ciphertext is added in the redundant data bits of be-encrypted data, encryption data 104 is obtained;Wherein, redundant data bits The data bit (as shown in Figure 2) not had an impact for the precision to be-encrypted data.Such as:
For single float (32) type data, 7 effective digitals can only be provided, at most retain 6 after decimal point Position, then for 12.34, the redundant digit behind precision position is 3-4 totally 2 data bit (Fig. 2 (a)) after decimal point;
For double double (64) type data, 15 effective digitals can be provided, for 12.34, Ke Yishe Determine after decimal point the 3rd to play after decimal point the 12nd to be redundant digit, referring to fig. 2 (b).
In a preferred embodiment of the invention, when ciphertext length is more than the length of be-encrypted data redundant data bits When, the continuous ciphertext that interception is less than or equal to redundancy bit length is placed in redundant digit, it is further preferred that interception in the present embodiment Digit M >=2 of ciphertext afterwards.Interception way is that front end continuously intercepts, intermediate continuous interception or rear end continuously intercept, and makes the close of interception Text keeps continuous.
Be-encrypted data is used as in an illustrative embodiment of the invention, such as by data 12.34;With the birth of user Date is identification code, is encrypted to birthdate, and the cipher mode of selection is displacement encryption, which is only used for Illustrate the present invention rather than limit the scope of protection of the present invention, obtains ciphertext 11009527.
For single data (no more than 7 and behind decimal point, number is no more than 6 to effective digital), significant figure Redundant digit after word 12.34 up to 2, i.e., 3-4 after decimal point, and the length of ciphertext exceeds the length of maximum redundancy position Degree;Therefore, it is necessary to continuously be intercepted ciphertext;Preferably, the mode of interception is to intercept continuous two digits in ciphertext front end Obtaining 11 is the ciphertext (such as Fig. 3 (a)) for being added to redundant digit, and finally obtained encryption data is 12.3411;Or after ciphertext It is the ciphertext (such as Fig. 3 (b)) for being added to redundant digit that end interception, which connects two digits to obtain 27, and finally obtained encryption data is 12.3427;Or 2 bit digitals of arbitrary continuation are taken to be used as ciphertext (such as Fig. 3 (c~e) of addition redundant digit in the middle section of ciphertext It is shown), such as 10,95,52 can be intercepted and be used as the ciphertext that redundant digit is added.It should be noted that for from ciphertext The continuous number 00 of 11009527 taken intermediates is unsuitable for being inserted into redundant digit because not having obvious identification characteristics;And for from The continuous number 09 of ciphertext taken intermediate, because then the level of encryption of ciphertext is weaker comprising one 0.
For double data, redundant digit up to 11 after effective digital, i.e., 3-13 after decimal point;For Be-encrypted data 12.34 can by 3-6 after decimal point as ciphertext start bit place complete sequence ciphertext (such as Fig. 3 (f)~ (h) shown in), wherein there are three types of the embodiments of encrypted test mode: for example, available encryption data 12.3411009527, or 12.34011009527 or 12.340011009527, if the redundant digit that ciphertext is added is had vacant position with precision position, in vacancy It is upper to mend 0.Two~seven bit digitals that arbitrary continuation can also be intercepted from the ciphertext 11009527 obtained are added to number to be encrypted According to redundant digit in, such as shown in Fig. 3 (i) and (j), intercepted from ciphertext 11,009,527 three continuous numbers 110 be added to it is superfluous Yu Weizhong obtains encrypted data 12.34110,12.34000110.
Embodiment 2
The embodiment of the present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, the storage of wherein one or more programs in the memory and be configured as by one or Multiple processors execute, and one or more programs include the instruction for data redundancy encryption method, and this method includes following step It is rapid:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
Depending on desired configuration, processor can be any kind of processing, including but not limited to: microprocessor (μ P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor may include such as level-one Cache, processor core and the register of one or more rank of cache and second level cache etc.
Depending on desired configuration, memory can be any type of memory, including but not limited to: volatile storage Device (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.
Embodiment 3
The present invention also provides a kind of computer readable storage medium for storing one or more programs, wherein one or more Program includes instruction, and described instruction is suitable for being loaded by memory and being executed the data redundancy encryption method, and this method includes such as Lower step:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
Embodiment 4
As shown in figure 4, a kind of redundancy encryption data recognition methods, suitable for being executed in calculating equipment, comprise the following steps:
Obtain identification code 201;
Wherein identification code is the number combination with mark action, in an illustrative embodiment of the invention, identification code It can be Bank Account Number, date of birth, identification card number or taxpayer identification number etc.;Those skilled in the art should be appreciated that , the type of above-mentioned identification code is only used as exemplary embodiment, is not intended to limit the scope of protection of the present invention;
Identification code is encrypted, ciphertext 202 is obtained;
In the present embodiment preferably, cipher mode is displacement encryption or timestamp encryption etc.;
In an illustrative embodiment of the invention, using the birthdate of user as identification code, to birthdate into Row encryption, the cipher mode of selection are displacement encryption, which is merely to illustrate the present invention rather than limits the present invention Protection scope, obtain ciphertext 11009527.
Obtain data 203;It will be understood by those skilled in the art that data to be encrypted can be individual data, It can be part or total data in several data or database;
The redundant data bits 204 of data intercept;
According to the precision of data, the subsequent data in data precision position are intercepted, obtain redundant data bits;For example, right Data bit after double data 12.3411009527,12.340011009527, interception decimal point 2 obtains 11009527,0011009527;Because 0011009527 data bits is more than the digit of ciphertext, before 0011009527 0 removal obtain 11009527.For single data 12.3411,12.3427, obtained after effective digital 12.34 is truncated 11,27 be the number in redundant data bits.
Ciphertext and the number in redundant data bits are compared, whether confirmation ciphertext number includes the suitable of redundant data bits Ordinal number word 205:
If ciphertext includes the sequence number in redundant data bits, the data obtained in step 201 are to be added based on identification code Close data;
If the sequence number of ciphertext number and redundant data bits mismatches, the data obtained in step 201 are not based on Identify the data of code encryption.
Embodiment 5
The embodiment of the present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, the storage of wherein one or more programs in the memory and be configured as by one or Multiple processors execute, and one or more programs include the instruction for redundancy encryption data recognition methods, and this method includes such as Lower step:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits Word, the then data obtained in step (3) are the data based on identification code encryption.
Depending on desired configuration, processor can be any kind of processing, including but not limited to: microprocessor (μ P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor may include such as level-one Cache, processor core and the register of one or more rank of cache and second level cache etc.
Depending on desired configuration, memory can be any type of memory, including but not limited to: volatile storage Device (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.
Embodiment 6
The present invention also provides a kind of computer readable storage medium for storing one or more programs, wherein one or more Program includes instruction, and described instruction is suitable for being loaded by memory and executing the redundancy encryption data recognition methods, this method packet Include following steps:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits Word, the then data obtained in step (3) are the data based on identification code encryption.
Piracy can be effectively prevented in the data encryption and recognition methods provided through the invention;Also facilitate data stolen simultaneously Evidence obtaining and right-safeguarding after taking;In addition, data encryption position of the invention is located in the invalid bit of data, data precision is not influenced.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
As used in this, unless specifically stated, come using ordinal number " first ", " second ", " third " etc. Description plain objects, which are merely representative of, is related to the different instances of similar object, and is not intended to imply that the object being described in this way must Must have the time it is upper, spatially, sequence aspect or given sequence in any other manner.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
It should be appreciated that various technologies described herein are realized together in combination with hardware or software or their combination.From And some aspects or part of the process and apparatus of the present invention or the process and apparatus of the present invention can take the tangible matchmaker of insertion It is situated between, such as the program code in floppy disk, CD-ROM, hard disk drive or other any machine readable storage mediums (refers to Enable) form, wherein when program is loaded into the machine of such as computer etc, and when being executed by the machine, which becomes real Trample equipment of the invention.
By way of example and not limitation, computer-readable medium includes computer storage media and communication media.It calculates Machine storage medium stores the information such as computer readable instructions, data structure, program module or other data.Communication media one As with the modulated message signals such as carrier wave or other transmission mechanisms embody computer readable instructions, data structure, program Module or other data, and including any information transmitting medium.Above any combination is also included within computer-readable Within the scope of medium.
This hair can be understood and applied the above description of the embodiments is intended to facilitate those skilled in the art It is bright.Person skilled in the art obviously easily can make various modifications to these embodiments, and described herein General Principle is applied in other embodiments without having to go through creative labor.Therefore, the present invention is not limited to implementations here Example, those skilled in the art's announcement according to the present invention, improvement and modification made without departing from the scope of the present invention all should be Within protection scope of the present invention.

Claims (10)

1. a kind of data redundancy encryption method, suitable for being executed in calculating equipment, it is characterised in that: comprise the following steps:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
2. data redundancy encryption method according to claim 1, it is characterised in that: in step (1), when described to be encrypted When data include non-numeric data, non-numeric data is converted to by number by ASCII character;
Or the identification code is number combination or random number with mark action;
Preferably, the random number is pseudo random number or quasi-random numbers.
3. data redundancy encryption method according to claim 1 or 2, it is characterised in that: the generation step of random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) number in each digit of be-encrypted data is subjected to arithmetic, using the absolute value of operation result as from random number The acknowledged sequence number of random number is selected in sequence;According to random number acknowledged sequence number obtain from random number sequence as identification code with Machine number.
4. data redundancy encryption method according to claim 1, it is characterised in that: the cipher mode is displacement encryption Or timestamp encryption;
Or the redundant data bits are the data bit not having an impact to the precision of be-encrypted data.
5. data redundancy encryption method according to claim 1, it is characterised in that: in step (4), when ciphertext length is more than When the length of be-encrypted data redundant data bits, the continuous ciphertext that interception is less than or equal to redundancy bit length from ciphertext is placed on superfluous Yu Weizhong.
6. a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein the storage of one or more of programs in the memory and be configured as by one or Multiple processors execute, and one or more programs include superfluous for the data any in the claims 1-5 The instruction of remaining encryption method.
7. a kind of computer readable storage medium for storing one or more programs, one or more programs include referring to It enables, described instruction is suitable for being loaded by memory and being executed any data redundancy encryption method in the claims 1-5.
8. a kind of redundancy encryption data recognition methods, suitable for being executed in calculating equipment, it is characterised in that: comprise the following steps:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the sequence number in redundant data bits, The data obtained in step (3) are the data based on identification code encryption.
Preferably, in the step (4), when the data length in redundant data bits is greater than the digit of ciphertext, by redundant digit It is removed according to the data bit for being initiated with 0 on position.
9. a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein the storage of one or more of programs in the memory and be configured as by one or Multiple processors execute, and one or more programs include the finger for the data identification method described in claim 8 It enables.
10. a kind of computer readable storage medium for storing one or more programs, one or more programs include referring to It enables, described instruction is suitable for being loaded as memory and executing data identification method described in the claims 8.
CN201810282251.1A 2018-03-29 2018-03-29 Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium Pending CN110321718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810282251.1A CN110321718A (en) 2018-03-29 2018-03-29 Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810282251.1A CN110321718A (en) 2018-03-29 2018-03-29 Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110321718A true CN110321718A (en) 2019-10-11

Family

ID=68112028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810282251.1A Pending CN110321718A (en) 2018-03-29 2018-03-29 Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110321718A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
CN105703902A (en) * 2016-01-12 2016-06-22 汉柏科技有限公司 Random number generating method and device used for network device
CN105786974A (en) * 2016-01-30 2016-07-20 郑州大学西亚斯国际学院 Computer data storage query system
US9641321B1 (en) * 2014-11-05 2017-05-02 Dark Signal Research, Llc Method and apparatus for the virtualization of cryptographic resources
CN106790038A (en) * 2016-12-16 2017-05-31 湖南国科微电子股份有限公司 The safe transmission method of Big Dipper chip data, device and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN101499116A (en) * 2009-03-11 2009-08-05 宇龙计算机通信科技(深圳)有限公司 Information hiding method, system and electronic equipment
US9641321B1 (en) * 2014-11-05 2017-05-02 Dark Signal Research, Llc Method and apparatus for the virtualization of cryptographic resources
CN105703902A (en) * 2016-01-12 2016-06-22 汉柏科技有限公司 Random number generating method and device used for network device
CN105786974A (en) * 2016-01-30 2016-07-20 郑州大学西亚斯国际学院 Computer data storage query system
CN106790038A (en) * 2016-12-16 2017-05-31 湖南国科微电子股份有限公司 The safe transmission method of Big Dipper chip data, device and terminal

Similar Documents

Publication Publication Date Title
US4731841A (en) Field initialized authentication system for protective security of electronic information networks
EP2301185B1 (en) Format-preserving cryptographic systems
US5020105A (en) Field initialized authentication system for protective security of electronic information networks
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
EP3134994B1 (en) Method of obfuscating data
US20130339252A1 (en) Format-preserving cryptographic systems
CN104811298B (en) One kind realizes encrypted method and device
CN109493875B (en) Audio watermark adding and extracting method and terminal equipment
CN104272319B (en) method for protecting data
CN112133396B (en) Medical data sharing method and device, electronic equipment and medium
EP2564346B1 (en) Protecting the information encoded in a bloom filter using encoded bits of data
CN108352981A (en) It is arranged to calculate the encrypted encryption device of object block
EP3637674A1 (en) Computer system, secret information verification method, and computer
CN108868367B (en) Intelligent lock device
CN103778590A (en) Method and device for utilizing digital image to store and transmit information
CN110175475B (en) Smart card data processing method and device and computer readable storage medium
CN110084599A (en) Cipher key processing method, device, equipment and storage medium
JP2021507615A (en) Homomorphic encryption for password authentication
CN112446987A (en) Door lock password management system, gateway equipment and door lock
CN111475690B (en) Character string matching method and device, data detection method and server
CN116318617A (en) Medical rescue material charity donation method based on RFID and blockchain
US8280061B2 (en) Methods and systems for storing and retrieving encrypted data
CN113343255A (en) Data interaction method based on privacy protection
CN110321718A (en) Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium
CN115001700A (en) Ecological environment supervision method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011

RJ01 Rejection of invention patent application after publication