CN110321718A - Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium - Google Patents
Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium Download PDFInfo
- Publication number
- CN110321718A CN110321718A CN201810282251.1A CN201810282251A CN110321718A CN 110321718 A CN110321718 A CN 110321718A CN 201810282251 A CN201810282251 A CN 201810282251A CN 110321718 A CN110321718 A CN 110321718A
- Authority
- CN
- China
- Prior art keywords
- data
- ciphertext
- encryption
- encrypted
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000006073 displacement reaction Methods 0.000 claims description 6
- 230000009471 action Effects 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 4
- 239000000543 intermediate Substances 0.000 description 8
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to field of information security technology, it is related to a kind of data redundancy encryption method and the recognition methods of redundancy encryption data, equipment and storage medium.Data ciphering method of the invention, comprises the following steps: obtaining be-encrypted data;Obtain identification code;Identification code is encrypted, ciphertext is obtained;Ciphertext is added in the redundant data bits of be-encrypted data, encryption data is obtained.In addition, additionally providing the data obtained to above-mentioned encryption method carries out knowledge method for distinguishing.Piracy can be effectively prevented in the data encryption and recognition methods provided through the invention;Evidence obtaining and right-safeguarding after also data being facilitated to be stolen simultaneously;In addition, data encryption position of the invention is located in the invalid bit of data, data precision is not influenced.
Description
Technical field
The invention belongs to field of information security technology, it is related to a kind of data redundancy encryption method and data identification method, sets
Standby and storage medium.
Background technique
Data encryption is currently a kind of most reliable method that computer system protects information.It utilizes password skill
Art encrypts information, realizes information hiding, to play the role of protecting information security.
In the prior art, the source that can not track be-encrypted data causes to collect evidence after data are stolen difficult, once data quilt
After stealing, data owner is difficult to prove the source of data of being stolen.
Summary of the invention
It is an object of the invention to overcome the shortcomings of existing technologies and provide a kind of encryption of data redundancy and recognition methods,
Equipment and storage medium.
To achieve the above object, the invention adopts the following technical scheme:
A kind of data redundancy encryption method, suitable for calculate equipment in execute, comprise the following steps:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
When the be-encrypted data includes character string, non-numeric data is converted to by number by ASCII character.
The identification code be with mark action number combination or random number, preferably Bank Account Number, the date of birth,
Identification card number or taxpayer identification number etc..
The generation step of the random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) by each digit of be-encrypted data number carry out arithmetic, using the absolute value of operation result as from
The acknowledged sequence number of random number is selected in machine Number Sequence;It is obtained being used as identification code from random number sequence according to random number acknowledged sequence number
Random number.
The cipher mode is displacement encryption or timestamp encryption etc..
The redundant data bits are the data bit not having an impact to the precision of be-encrypted data.
In step (4), when ciphertext length be more than be-encrypted data redundant data bits length when, when ciphertext length be more than to
When the length of encryption data redundant data bits, the continuous ciphertext that interception is less than or equal to redundancy bit length from ciphertext is placed on redundancy
In position, it is preferable that digit M >=2 of ciphertext after interception.
The present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein one or more of programs are stored in the memory and are configured as by one
A or multiple processors execute, and one or more programs include the instruction for above-mentioned data redundancy encryption method.
The present invention also provides a kind of computer readable storage medium for storing one or more programs, described one or more
A program includes instruction, and described instruction is suitable for being loaded by memory and executing above-mentioned data redundancy encryption method.
The present invention also provides a kind of redundancy encryption data recognition methods, suitable for executing in calculating equipment, include following step
It is rapid:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits
Word, the then data obtained in step (3) are the data based on identification code encryption.
It preferably,, will be superfluous when the data length in redundant data bits is greater than the digit of ciphertext in the step (4)
0 data bit removal is initiated in remaining data bit.
The present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein one or more of programs are stored in the memory and are configured as by one
A or multiple processors execute, and one or more programs include the finger for above-mentioned redundancy encryption data recognition methods
It enables.
The present invention also provides a kind of computer readable storage medium for storing one or more programs, described one or more
A program includes instruction, and described instruction is suitable for being loaded by memory and being executed above-mentioned redundancy encryption data identification decryption method.
The invention has the following advantages:
On the one hand data can effectively be encrypted using data ciphering method provided by the invention, prevent piracy;Separately
On the one hand when the present invention encrypts data, data encryption position is located in the invalid bit of data, does not influence data precision.
In addition, the data identification method provided through the invention can determine data source, facilitate proof and right-safeguarding.
Detailed description of the invention
Fig. 1 is the flow chart of data redundancy encryption method in a preferred embodiment of the invention.
Fig. 2 is redundant digit schematic diagram in a preferred embodiment of the invention,
(a) redundant digit of single-precision number evidence;
(b) redundant digit of double precision datum.
Fig. 3 is in a preferred embodiment of the invention in redundant digit ciphertext point of addition schematic diagram,
(a) it is added to preceding in redundant digit to the continuous ciphertext of interception;
(b) it is added to rear in redundant digit to the continuous ciphertext of interception;
One of (c) the continuous ciphertext of taken intermediate is added in redundant digit;
(d) two be added to the continuous ciphertext of taken intermediate in redundant digit;
(e) three be added to the continuous ciphertext of taken intermediate in redundant digit;
One of (f) whole ciphertexts sequence is added in redundant digit;
(g) two be added to whole ciphertext sequences in redundant digit;
(h) three be added to whole ciphertext sequences in redundant digit;
One of (i) the continuous ciphertext of taken intermediate is added in redundant digit;
(j) two be added to the continuous ciphertext of taken intermediate in redundant digit.
Fig. 4 is the flow chart of redundancy encryption data recognition methods in the embodiment of the present invention one preferably.
Specific embodiment
The present invention is further illustrated below in conjunction with drawings and examples.
Embodiment 1
Referring to Fig.1, a kind of data redundancy encryption method, suitable for calculate equipment in execute, comprise the following steps:
Obtain be-encrypted data 101;
In a preferred embodiment of the invention, when be-encrypted data includes non-numeric data, standard can be passed through
Non-numeric data is converted to numerical data by ASCII character, is then encrypted again;It will be understood by those skilled in the art that
Data to be encrypted can be individual data, or part or total data in several data or database.
Obtain identification code 102;
Wherein identification code is number combination or random number with mark action.Wherein, the random number in the present embodiment is
Pseudo random number or quasi-random numbers.Therefore the present invention can be obtained by combination random seed and the method for generating random number, reproduction
Random number, thus be used as identification code of the invention.
In a preferred embodiment of the invention, identification code can be Bank Account Number, date of birth, identification card number or receive
Tax people's identification code etc.;Those skilled in the art is it is to be understood that the type of above-mentioned identification code is only used as exemplary reality
Example is applied, is not intended to limit the scope of protection of the present invention;
In a preferred embodiment of the invention, the generation step of random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) by each digit of be-encrypted data number carry out arithmetic, using the absolute value of operation result as from
The acknowledged sequence number of random number is selected in machine Number Sequence;It is obtained being used as identification code from random number sequence according to random number acknowledged sequence number
Random number.
The generation step of random number is now further illustrated in one exemplary embodiment, such as: by be-encrypted data
12.34 as random number seed;It, (should be with after generating random number sequence according to random number seed 12.34 by randomizer
Machine Number Sequence includes several random numbers, and each random number, which marks, serial number);By the number in each digit of be-encrypted data
The number that word carries out in arithmetic, such as 12.34 in each digit respectively is 1,2,3,4, this number is carried out any
Combined addition subtraction multiplication and division arithmetic, such as (1+2+3) × 4=24, using the absolute value of arithmetic result as from random number
The serial number of random number is selected in sequence, it may be assumed that take in random number sequence the 24th to be used as identification code.It is further preferred that if random
In Number Sequence the sum of random number be less than arithmetic result absolute value, arithmetic can be re-started, until can from
Until determining random number is obtained in machine Number Sequence as identification code.
Identification code is encrypted, ciphertext 103 is obtained;
In the embodiment of the present invention preferably, cipher mode is displacement encryption or timestamp encryption etc.;
Ciphertext is added in the redundant data bits of be-encrypted data, encryption data 104 is obtained;Wherein, redundant data bits
The data bit (as shown in Figure 2) not had an impact for the precision to be-encrypted data.Such as:
For single float (32) type data, 7 effective digitals can only be provided, at most retain 6 after decimal point
Position, then for 12.34, the redundant digit behind precision position is 3-4 totally 2 data bit (Fig. 2 (a)) after decimal point;
For double double (64) type data, 15 effective digitals can be provided, for 12.34, Ke Yishe
Determine after decimal point the 3rd to play after decimal point the 12nd to be redundant digit, referring to fig. 2 (b).
In a preferred embodiment of the invention, when ciphertext length is more than the length of be-encrypted data redundant data bits
When, the continuous ciphertext that interception is less than or equal to redundancy bit length is placed in redundant digit, it is further preferred that interception in the present embodiment
Digit M >=2 of ciphertext afterwards.Interception way is that front end continuously intercepts, intermediate continuous interception or rear end continuously intercept, and makes the close of interception
Text keeps continuous.
Be-encrypted data is used as in an illustrative embodiment of the invention, such as by data 12.34;With the birth of user
Date is identification code, is encrypted to birthdate, and the cipher mode of selection is displacement encryption, which is only used for
Illustrate the present invention rather than limit the scope of protection of the present invention, obtains ciphertext 11009527.
For single data (no more than 7 and behind decimal point, number is no more than 6 to effective digital), significant figure
Redundant digit after word 12.34 up to 2, i.e., 3-4 after decimal point, and the length of ciphertext exceeds the length of maximum redundancy position
Degree;Therefore, it is necessary to continuously be intercepted ciphertext;Preferably, the mode of interception is to intercept continuous two digits in ciphertext front end
Obtaining 11 is the ciphertext (such as Fig. 3 (a)) for being added to redundant digit, and finally obtained encryption data is 12.3411;Or after ciphertext
It is the ciphertext (such as Fig. 3 (b)) for being added to redundant digit that end interception, which connects two digits to obtain 27, and finally obtained encryption data is
12.3427;Or 2 bit digitals of arbitrary continuation are taken to be used as ciphertext (such as Fig. 3 (c~e) of addition redundant digit in the middle section of ciphertext
It is shown), such as 10,95,52 can be intercepted and be used as the ciphertext that redundant digit is added.It should be noted that for from ciphertext
The continuous number 00 of 11009527 taken intermediates is unsuitable for being inserted into redundant digit because not having obvious identification characteristics;And for from
The continuous number 09 of ciphertext taken intermediate, because then the level of encryption of ciphertext is weaker comprising one 0.
For double data, redundant digit up to 11 after effective digital, i.e., 3-13 after decimal point;For
Be-encrypted data 12.34 can by 3-6 after decimal point as ciphertext start bit place complete sequence ciphertext (such as Fig. 3 (f)~
(h) shown in), wherein there are three types of the embodiments of encrypted test mode: for example, available encryption data 12.3411009527, or
12.34011009527 or 12.340011009527, if the redundant digit that ciphertext is added is had vacant position with precision position, in vacancy
It is upper to mend 0.Two~seven bit digitals that arbitrary continuation can also be intercepted from the ciphertext 11009527 obtained are added to number to be encrypted
According to redundant digit in, such as shown in Fig. 3 (i) and (j), intercepted from ciphertext 11,009,527 three continuous numbers 110 be added to it is superfluous
Yu Weizhong obtains encrypted data 12.34110,12.34000110.
Embodiment 2
The embodiment of the present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, the storage of wherein one or more programs in the memory and be configured as by one or
Multiple processors execute, and one or more programs include the instruction for data redundancy encryption method, and this method includes following step
It is rapid:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
Depending on desired configuration, processor can be any kind of processing, including but not limited to: microprocessor (μ
P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor may include such as level-one
Cache, processor core and the register of one or more rank of cache and second level cache etc.
Depending on desired configuration, memory can be any type of memory, including but not limited to: volatile storage
Device (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.
Embodiment 3
The present invention also provides a kind of computer readable storage medium for storing one or more programs, wherein one or more
Program includes instruction, and described instruction is suitable for being loaded by memory and being executed the data redundancy encryption method, and this method includes such as
Lower step:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
Embodiment 4
As shown in figure 4, a kind of redundancy encryption data recognition methods, suitable for being executed in calculating equipment, comprise the following steps:
Obtain identification code 201;
Wherein identification code is the number combination with mark action, in an illustrative embodiment of the invention, identification code
It can be Bank Account Number, date of birth, identification card number or taxpayer identification number etc.;Those skilled in the art should be appreciated that
, the type of above-mentioned identification code is only used as exemplary embodiment, is not intended to limit the scope of protection of the present invention;
Identification code is encrypted, ciphertext 202 is obtained;
In the present embodiment preferably, cipher mode is displacement encryption or timestamp encryption etc.;
In an illustrative embodiment of the invention, using the birthdate of user as identification code, to birthdate into
Row encryption, the cipher mode of selection are displacement encryption, which is merely to illustrate the present invention rather than limits the present invention
Protection scope, obtain ciphertext 11009527.
Obtain data 203;It will be understood by those skilled in the art that data to be encrypted can be individual data,
It can be part or total data in several data or database;
The redundant data bits 204 of data intercept;
According to the precision of data, the subsequent data in data precision position are intercepted, obtain redundant data bits;For example, right
Data bit after double data 12.3411009527,12.340011009527, interception decimal point 2 obtains
11009527,0011009527;Because 0011009527 data bits is more than the digit of ciphertext, before 0011009527
0 removal obtain 11009527.For single data 12.3411,12.3427, obtained after effective digital 12.34 is truncated
11,27 be the number in redundant data bits.
Ciphertext and the number in redundant data bits are compared, whether confirmation ciphertext number includes the suitable of redundant data bits
Ordinal number word 205:
If ciphertext includes the sequence number in redundant data bits, the data obtained in step 201 are to be added based on identification code
Close data;
If the sequence number of ciphertext number and redundant data bits mismatches, the data obtained in step 201 are not based on
Identify the data of code encryption.
Embodiment 5
The embodiment of the present invention also provides a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, the storage of wherein one or more programs in the memory and be configured as by one or
Multiple processors execute, and one or more programs include the instruction for redundancy encryption data recognition methods, and this method includes such as
Lower step:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits
Word, the then data obtained in step (3) are the data based on identification code encryption.
Depending on desired configuration, processor can be any kind of processing, including but not limited to: microprocessor (μ
P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor may include such as level-one
Cache, processor core and the register of one or more rank of cache and second level cache etc.
Depending on desired configuration, memory can be any type of memory, including but not limited to: volatile storage
Device (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.
Embodiment 6
The present invention also provides a kind of computer readable storage medium for storing one or more programs, wherein one or more
Program includes instruction, and described instruction is suitable for being loaded by memory and executing the redundancy encryption data recognition methods, this method packet
Include following steps:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the ordinal number in redundant data bits
Word, the then data obtained in step (3) are the data based on identification code encryption.
Piracy can be effectively prevented in the data encryption and recognition methods provided through the invention;Also facilitate data stolen simultaneously
Evidence obtaining and right-safeguarding after taking;In addition, data encryption position of the invention is located in the invalid bit of data, data precision is not influenced.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
As used in this, unless specifically stated, come using ordinal number " first ", " second ", " third " etc.
Description plain objects, which are merely representative of, is related to the different instances of similar object, and is not intended to imply that the object being described in this way must
Must have the time it is upper, spatially, sequence aspect or given sequence in any other manner.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
It should be appreciated that various technologies described herein are realized together in combination with hardware or software or their combination.From
And some aspects or part of the process and apparatus of the present invention or the process and apparatus of the present invention can take the tangible matchmaker of insertion
It is situated between, such as the program code in floppy disk, CD-ROM, hard disk drive or other any machine readable storage mediums (refers to
Enable) form, wherein when program is loaded into the machine of such as computer etc, and when being executed by the machine, which becomes real
Trample equipment of the invention.
By way of example and not limitation, computer-readable medium includes computer storage media and communication media.It calculates
Machine storage medium stores the information such as computer readable instructions, data structure, program module or other data.Communication media one
As with the modulated message signals such as carrier wave or other transmission mechanisms embody computer readable instructions, data structure, program
Module or other data, and including any information transmitting medium.Above any combination is also included within computer-readable
Within the scope of medium.
This hair can be understood and applied the above description of the embodiments is intended to facilitate those skilled in the art
It is bright.Person skilled in the art obviously easily can make various modifications to these embodiments, and described herein
General Principle is applied in other embodiments without having to go through creative labor.Therefore, the present invention is not limited to implementations here
Example, those skilled in the art's announcement according to the present invention, improvement and modification made without departing from the scope of the present invention all should be
Within protection scope of the present invention.
Claims (10)
1. a kind of data redundancy encryption method, suitable for being executed in calculating equipment, it is characterised in that: comprise the following steps:
(1) be-encrypted data is obtained;
(2) identification code is obtained;
(3) identification code is encrypted, obtains ciphertext;
(4) ciphertext is added in the redundant data bits of be-encrypted data, obtains encryption data.
2. data redundancy encryption method according to claim 1, it is characterised in that: in step (1), when described to be encrypted
When data include non-numeric data, non-numeric data is converted to by number by ASCII character;
Or the identification code is number combination or random number with mark action;
Preferably, the random number is pseudo random number or quasi-random numbers.
3. data redundancy encryption method according to claim 1 or 2, it is characterised in that: the generation step of random number are as follows:
(a) input be-encrypted data is as random number seed;
(b) by randomizer, random number sequence is generated according to random number seed;
(c) number in each digit of be-encrypted data is subjected to arithmetic, using the absolute value of operation result as from random number
The acknowledged sequence number of random number is selected in sequence;According to random number acknowledged sequence number obtain from random number sequence as identification code with
Machine number.
4. data redundancy encryption method according to claim 1, it is characterised in that: the cipher mode is displacement encryption
Or timestamp encryption;
Or the redundant data bits are the data bit not having an impact to the precision of be-encrypted data.
5. data redundancy encryption method according to claim 1, it is characterised in that: in step (4), when ciphertext length is more than
When the length of be-encrypted data redundant data bits, the continuous ciphertext that interception is less than or equal to redundancy bit length from ciphertext is placed on superfluous
Yu Weizhong.
6. a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein the storage of one or more of programs in the memory and be configured as by one or
Multiple processors execute, and one or more programs include superfluous for the data any in the claims 1-5
The instruction of remaining encryption method.
7. a kind of computer readable storage medium for storing one or more programs, one or more programs include referring to
It enables, described instruction is suitable for being loaded by memory and being executed any data redundancy encryption method in the claims 1-5.
8. a kind of redundancy encryption data recognition methods, suitable for being executed in calculating equipment, it is characterised in that: comprise the following steps:
(1) identification code is obtained;
(2) identification code is encrypted, obtains ciphertext;
(3) data are obtained;
(4) redundant data bits are intercepted;
(5) ciphertext and the number in redundant data bits are compared, if ciphertext includes the sequence number in redundant data bits,
The data obtained in step (3) are the data based on identification code encryption.
Preferably, in the step (4), when the data length in redundant data bits is greater than the digit of ciphertext, by redundant digit
It is removed according to the data bit for being initiated with 0 on position.
9. a kind of calculating equipment, comprising:
One or more processors;
Memory;And
One or more programs, wherein the storage of one or more of programs in the memory and be configured as by one or
Multiple processors execute, and one or more programs include the finger for the data identification method described in claim 8
It enables.
10. a kind of computer readable storage medium for storing one or more programs, one or more programs include referring to
It enables, described instruction is suitable for being loaded as memory and executing data identification method described in the claims 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810282251.1A CN110321718A (en) | 2018-03-29 | 2018-03-29 | Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810282251.1A CN110321718A (en) | 2018-03-29 | 2018-03-29 | Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110321718A true CN110321718A (en) | 2019-10-11 |
Family
ID=68112028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810282251.1A Pending CN110321718A (en) | 2018-03-29 | 2018-03-29 | Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110321718A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101008972A (en) * | 2006-01-27 | 2007-08-01 | 北京飞天诚信科技有限公司 | Security control methods for date transmission process of software protection device and device thereof |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
CN105703902A (en) * | 2016-01-12 | 2016-06-22 | 汉柏科技有限公司 | Random number generating method and device used for network device |
CN105786974A (en) * | 2016-01-30 | 2016-07-20 | 郑州大学西亚斯国际学院 | Computer data storage query system |
US9641321B1 (en) * | 2014-11-05 | 2017-05-02 | Dark Signal Research, Llc | Method and apparatus for the virtualization of cryptographic resources |
CN106790038A (en) * | 2016-12-16 | 2017-05-31 | 湖南国科微电子股份有限公司 | The safe transmission method of Big Dipper chip data, device and terminal |
-
2018
- 2018-03-29 CN CN201810282251.1A patent/CN110321718A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101008972A (en) * | 2006-01-27 | 2007-08-01 | 北京飞天诚信科技有限公司 | Security control methods for date transmission process of software protection device and device thereof |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
US9641321B1 (en) * | 2014-11-05 | 2017-05-02 | Dark Signal Research, Llc | Method and apparatus for the virtualization of cryptographic resources |
CN105703902A (en) * | 2016-01-12 | 2016-06-22 | 汉柏科技有限公司 | Random number generating method and device used for network device |
CN105786974A (en) * | 2016-01-30 | 2016-07-20 | 郑州大学西亚斯国际学院 | Computer data storage query system |
CN106790038A (en) * | 2016-12-16 | 2017-05-31 | 湖南国科微电子股份有限公司 | The safe transmission method of Big Dipper chip data, device and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4731841A (en) | Field initialized authentication system for protective security of electronic information networks | |
EP2301185B1 (en) | Format-preserving cryptographic systems | |
US5020105A (en) | Field initialized authentication system for protective security of electronic information networks | |
CN106776904B (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
EP3134994B1 (en) | Method of obfuscating data | |
US20130339252A1 (en) | Format-preserving cryptographic systems | |
CN104811298B (en) | One kind realizes encrypted method and device | |
CN109493875B (en) | Audio watermark adding and extracting method and terminal equipment | |
CN104272319B (en) | method for protecting data | |
CN112133396B (en) | Medical data sharing method and device, electronic equipment and medium | |
EP2564346B1 (en) | Protecting the information encoded in a bloom filter using encoded bits of data | |
CN108352981A (en) | It is arranged to calculate the encrypted encryption device of object block | |
EP3637674A1 (en) | Computer system, secret information verification method, and computer | |
CN108868367B (en) | Intelligent lock device | |
CN103778590A (en) | Method and device for utilizing digital image to store and transmit information | |
CN110175475B (en) | Smart card data processing method and device and computer readable storage medium | |
CN110084599A (en) | Cipher key processing method, device, equipment and storage medium | |
JP2021507615A (en) | Homomorphic encryption for password authentication | |
CN112446987A (en) | Door lock password management system, gateway equipment and door lock | |
CN111475690B (en) | Character string matching method and device, data detection method and server | |
CN116318617A (en) | Medical rescue material charity donation method based on RFID and blockchain | |
US8280061B2 (en) | Methods and systems for storing and retrieving encrypted data | |
CN113343255A (en) | Data interaction method based on privacy protection | |
CN110321718A (en) | Data redundancy encryption and the recognition methods of redundancy encryption data, equipment and storage medium | |
CN115001700A (en) | Ecological environment supervision method and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191011 |
|
RJ01 | Rejection of invention patent application after publication |