CN110324349A - A kind of block chain big data security processing system and method - Google Patents

A kind of block chain big data security processing system and method Download PDF

Info

Publication number
CN110324349A
CN110324349A CN201910611767.0A CN201910611767A CN110324349A CN 110324349 A CN110324349 A CN 110324349A CN 201910611767 A CN201910611767 A CN 201910611767A CN 110324349 A CN110324349 A CN 110324349A
Authority
CN
China
Prior art keywords
data
word
dimensional code
block
association
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910611767.0A
Other languages
Chinese (zh)
Other versions
CN110324349B (en
Inventor
喻汝成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianju Dihe Suzhou Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010810909.9A priority Critical patent/CN111953689A/en
Priority to CN201910611767.0A priority patent/CN110324349B/en
Priority to CN202010811087.6A priority patent/CN111953690A/en
Priority to CN202010811120.5A priority patent/CN111953691A/en
Publication of CN110324349A publication Critical patent/CN110324349A/en
Application granted granted Critical
Publication of CN110324349B publication Critical patent/CN110324349B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A kind of block chain big data safe processing system of the present invention includes the node of multiple interconnections, the node includes obtaining module, private key generation module, two-dimensional code generation module, association word database, sending module, its be used for by first data encryption be the second Data Concurrent send to other nodes of block chain, wherein, receiving module, block chain database, control module.The two dimensional code of private key can be cracked the manner of decryption of encrypted first data by the present invention through the above way, and can make to store in block chain is encrypted data information, to guarantee the safety of user data and the safety of privacy.

Description

A kind of block chain big data security processing system and method
Technical field
The present invention relates to a kind of block catenary systems, more particularly to a kind of block chain processing system for big data safety System.
Background technique
Traditional block chain technology is intended to decentralization, can not distort, data technique disclosed in data for one kind, and its The big data of storage not can guarantee big data privacy and big data safety then once being obtained by all nodes.Therefore at present urgently Need one kind that can guarantee the block chain processing system of big data personal secrets.
Summary of the invention
The technical problem to be solved in the present invention is to provide the block chain processing systems that one kind can guarantee big data personal secrets System.
A kind of block chain big data safe processing system of the present invention, the node including multiple interconnections, it is characterised in that: The node includes
Module is obtained, is used to obtain the first data;
Private key generation module is used to generate private key corresponding with first data;
Two-dimensional code generation module is used to convert two dimensional code for the private key;
Associate word database, is equipped with association corresponding with the first word word;
Sending module is used to be that the second Data Concurrent is sent to other nodes of block chain by first data encryption On, wherein the mode of encrypted primary data are as follows: the first data are split as at least two first words, and single by described first Word is padded to the blank position of the two dimensional code of private key generation, further according to association's word database by the black of the two dimensional code Association's word is filled up out in position;
Receiving module is used to receive second data;
Block chain database, is used to store the second data;
Control module when being used to receive the second data more than half node in block chain, then determines first number According to being transmitted.
A kind of block chain big data safe processing system of the present invention, wherein the sending module splits first data For the mode of at least two first words are as follows: according to the subject of the first data, predicate, object, attribute, the adverbial modifier, complement form First data are split as at least two first words.
A kind of block chain big data safe processing system of the present invention, wherein the sending module fills out first word The blank position for mending the two dimensional code generated to private key, fills out the darkened locations of the two dimensional code further according to association's word database Mend out the mode of association's word are as follows:
Two dimensional code is generated according to private key;
Obtain maximum white square area A: in the white area in the two dimensional code, from A=12、22、32....n2, The area A of the maximum white square that can be bonded three black blocks is attempted one by one;
Obtain maximum white square number B: according to the white area of the two dimensional code, mutually not with the maximum white square The white area of the two dimensional code is overlappingly filled, and obtains the number B of filling;
Detect the block number C of first data;
Be compared according to the block number C of first data with maximum white square number B, if number C be less than etc. In number B, then each block of the first data is successively filled in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively exist The 2 of the first data of filling in the maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively exist The 3 of the first data of filling in the maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then according to Secondary (N+1) that the first data are filled in the maximum white square2A block;
According to association's word database, split in the left side of the block of every row and/or right side filling with first data The relevant association's word of at least two first words out.
A kind of block chain big data safe processing system of the present invention, wherein association's word database is according to dictionary for translation In example sentence and obtain association's word before first word.
A kind of block chain big data safe processing system of the present invention, wherein association's word database is according to dictionary for translation In example sentence and obtain association's word after first word.
A kind of method of block chain big data safe processing system of the present invention, includes the following steps:
Step 1 obtains the first data;
Step 2 generates private key corresponding with first data;
The private key is converted two dimensional code by step 3;
First data encryption is that the second Data Concurrent is sent to other nodes of block chain by step 4, wherein is added The mode of close first data are as follows: the first data are split as at least two first words, and first word is padded to The blank position for the two dimensional code that private key generates, fills up out the darkened locations of the two dimensional code further according to association's word database Association's word;
When being more than that half node receives the second data in step 5, block chain, then determine that the first data transmission is complete At.
A kind of method of block chain big data safe processing system of the present invention, wherein the transmission mould in the step 4 First word is padded to the blank position of the two dimensional code of private key generation by block, further according to association's word database by institute The darkened locations for stating two dimensional code fill up out the mode of association's word are as follows:
Step 4.1 generates two dimensional code according to private key;
Step 4.2 obtains maximum white square area A: in the white area in the two dimensional code, from A=12、22、 32....n2, the area A of the maximum white square that can be bonded three black blocks is attempted one by one;
Step 4.3 obtains maximum white square number B: according to the white area of the two dimensional code, with the maximum white Square fills the white area of the two dimensional code without overlapping, and obtains the number B of filling;
The block number C of step 4.4, detection first data;
Step 4.5 is compared according to the block number C of first data with maximum white square number B, if number C is less than or equal to number B, then each block of the first data is successively filled in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively exist The 2 of the first data of filling in the maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively exist The 3 of the first data of filling in the maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then according to Secondary (N+1) that the first data are filled in the maximum white square2A block;
Step 4.6, according to association's word database, in the left side of the block of every row and/or right side filling and described first The relevant association's word of at least two first words that data are split out.
A kind of block chain big data safe processing system difference from prior art of the present invention is a kind of area of the present invention The two dimensional code of private key can be cracked encrypted first data by block chain big data safe processing system through the above way Manner of decryption, can make to store in block chain is encrypted data information, to guarantee the safety of user data, with And the safety of privacy, thus enable block chain this decentralization, the technology type that can not distort is incorporated in more areas, and Leaking data bring security risk is avoided, ensure that Information Security.In addition, the black portions of two dimensional code block association Word user can be allowed more intuitively to be decrypted after the first data, and two dimensional code is to be generated by preset algorithm according to private key , to further improve the safety of block chain.
A kind of block chain big data safe processing system of the invention is described further with reference to the accompanying drawing.
Detailed description of the invention
Fig. 1 is a kind of flow chart of block chain big data safe processing system;
Fig. 2 is the schematic diagram of the second data after conversion;
Fig. 3 is the schematic diagram of two dimensional code;
Fig. 4 is the schematic diagram of the first data restored according to two dimensional code.
Specific embodiment
As shown in Figure 1, a kind of block chain big data safe processing system of the present invention includes the node of multiple interconnections, Be characterized in that: the node includes
Module is obtained, is used to obtain the first data;
Private key generation module is used to generate private key corresponding with first data;
Two-dimensional code generation module is used to convert two dimensional code for the private key;
Associate word database, is equipped with association corresponding with the first word word;
Sending module is used to be that the second Data Concurrent is sent to other nodes of block chain by first data encryption On, wherein the mode of encrypted primary data are as follows: the first data are split as at least two first words, and single by described first Word is padded to the blank position of the two dimensional code of private key generation, further according to association's word database by the black of the two dimensional code Association's word is filled up out in position;
Receiving module is used to receive second data;
Block chain database, is used to store the second data;
Control module when being used to receive the second data more than half node in block chain, then determines first number According to being transmitted.
The two dimensional code of private key can be cracked the decryption side of encrypted first data by the present invention through the above way Formula, can make to store in block chain is encrypted data information, to guarantee the safety and privacy of user data Safety, thus enable block chain this decentralization, the technology type that can not distort is incorporated in more areas, and avoid number According to leakage bring security risk, Information Security ensure that.In addition, the black portions of two dimensional code can allow to block association's word User more intuitively decrypted after the first data, and two dimensional code be generated by preset algorithm according to private key, thus Further improve the safety of block chain.
Such as shown in Fig. 2,3,4, Fig. 2 is the second data that sending module is generated according to association glossary library, general user Even if coming into the open at one, seeing the second data in district center, the block chain database that can not distort, second can not be also understood The meaning that data represent.And only pass through two dimensional code when shown in Fig. 3 and second Data Matching two dimensional code occurs Block the meaning that just family can be used to learn the first data corresponding with the second data, i.e. text in Fig. 4.
Wherein, being split the vocabulary separated should mark with carriage return, punctuation mark, space symbol etc., to facilitate a combination thereof Return the first original data.
Wherein, the acquisition module can be keyboard or Touch Screen.
Wherein, private key generation module generates private key corresponding with first data, and the mode for generating private key can be system It automatically generates or people is manually entered private key.
Wherein, association's word database can be fraud information, i.e., fuzzy reading of the other users for the second data, To hide the first data to be expressed of the second data the true meaning, thus in a decentralization, openly, can not distort Block chain database in realize the data storage of an opposite secrecy.
Wherein, receiving module or user can identify according to image recognition software by the content for the text that two dimensional code is covering, And it is reduced to the first data.
Preferably, first data are split as the mode of at least two first words by the sending module are as follows: according to The subjects of first data, predicate, object, attribute, the adverbial modifier, complement form first data are split as at least two first Word.
The present invention can preferably cooperate association's word database through the above way and generate more associated association's list Word, the more difficult original word for telling association's word and the first data of user to read the second data.
Wherein, the first word can be a word, a word or a phrase.
First data are split as the mode of at least two first words by the sending module are as follows: according to the first data The form of every line code first data are split as at least two first words.
Preferably, first word is padded to the blank position of the two dimensional code of private key generation by the sending module, The darkened locations of the two dimensional code are filled up out to the mode of association's word further according to association's word database are as follows:
Two dimensional code is generated according to private key;
Obtain maximum white square area A: in the white area in the two dimensional code, from A=12、22、32....n2, The area A of the maximum white square that can be bonded three black blocks is attempted one by one;
Obtain maximum white square number B: according to the white area of the two dimensional code, mutually not with the maximum white square The white area of the two dimensional code is overlappingly filled, and obtains the number B of filling;
Detect the block number C of first data;
Be compared according to the block number C of first data with maximum white square number B, if number C be less than etc. In number B, then each block of the first data is successively filled in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively exist The 2 of the first data of filling in the maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively exist The 3 of the first data of filling in the maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then according to Secondary (N+1) that the first data are filled in the maximum white square2A block;
According to association's word database, split in the left side of the block of every row and/or right side filling with first data The relevant association's word of at least two first words out.
The present invention can be directed to each be put into the first of any block number by the two dimensional code of private key generation through the above way The problem of data are overflowed will not occur for data, and entire data is made to become more complete.That is, the white area when two dimensional code can not , can be direct square by the capacity of white area when accommodating the block of the first data, and continue to compare, until the first number can be accommodated According to block number, place into the first data, and association's word is arranged according to the typesetting of the first data, see entire second data Get up complete.
Wherein, association's word can be association's word in input method, can also be looked for according to the example sentence in dictionary for translation in institute State association's word before the first word.
Wherein, the block is not number of characters, and 1 block can are as follows: 1 Chinese character, 1 letter, a punctuation mark. 1 or 4 or 9 or ... N2A block configures in 1 maximum white square.
Wherein, the line number for associating word is identical as the line number of block of first data.
Wherein, block number C represents C block of number.
Wherein, the area of the maximum white blocks that can be bonded three black blocks is attempted one by one, that is, when white blocks area is When A, adjacent at least three black block, and when maximum white square area be greater than A when, can only two neighboring black block or It can not configure in white area, to find out the area of maximum white square.
Preferably, association's word database obtains before first word according to the example sentence in dictionary for translation Association's word.
Preferably, association's word database obtains after first word according to the example sentence in dictionary for translation Association's word.
Associate word database and association's word before first word is obtained according to the example sentence in dictionary for translation.
A kind of method of block chain big data safe processing system of the present invention, includes the following steps:
Step 1 obtains the first data;
Step 2 generates private key corresponding with first data;
The private key is converted two dimensional code by step 3;
First data encryption is that the second Data Concurrent is sent to other nodes of block chain by step 4, wherein is added The mode of close first data are as follows: the first data are split as at least two first words, and first word is padded to The blank position for the two dimensional code that private key generates, fills up out the darkened locations of the two dimensional code further according to association's word database Association's word;
When being more than that half node receives the second data in step 5, block chain, then determine that the first data transmission is complete At.
Preferably, first word is padded to the two dimension of private key generation by the sending module in the step 4 The darkened locations of the two dimensional code are filled up out association's word further according to association's word database by the blank position of code Mode are as follows:
Step 4.1 generates two dimensional code according to private key;
Step 4.2 obtains maximum white square area A: in the white area in the two dimensional code, from A=12、22、 32....n2, the area A of the maximum white square that can be bonded three black blocks is attempted one by one;
Step 4.3 obtains maximum white square number B: according to the white area of the two dimensional code, with the maximum white Square fills the white area of the two dimensional code without overlapping, and obtains the number B of filling;
The block number C of step 4.4, detection first data;
Step 4.5 is compared according to the block number C of first data with maximum white square number B, if number C is less than or equal to number B, then each block of the first data is successively filled in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively exist The 2 of the first data of filling in the maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively exist The 3 of the first data of filling in the maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then according to Secondary (N+1) that the first data are filled in the maximum white square2A block;
Step 4.6, according to association's word database, in the left side of the block of every row and/or right side filling and described first The relevant association's word of at least two first words that data are split out.
Embodiment described above only describe the preferred embodiments of the invention, not to model of the invention It encloses and is defined, without departing from the spirit of the design of the present invention, those of ordinary skill in the art are to technical side of the invention The various changes and improvements that case is made should all be fallen into the protection scope that claims of the present invention determines.

Claims (7)

1. a kind of block chain big data safe processing system, the node including multiple interconnections, it is characterised in that: the node Including
Module is obtained, is used to obtain the first data;
Private key generation module is used to generate private key corresponding with first data;
Two-dimensional code generation module is used to convert two dimensional code for the private key;
Associate word database, is equipped with association corresponding with the first word word;
Sending module is used to be that the second Data Concurrent is sent to other nodes of block chain by first data encryption, In, the mode of encrypted primary data are as follows: the first data are split as at least two first words, and first word is filled out The blank position for mending the two dimensional code generated to private key, fills out the darkened locations of the two dimensional code further according to association's word database Mend out association's word;
Receiving module is used to receive second data;
Block chain database, is used to store the second data;
Control module when being used to receive the second data more than half node in block chain, then determines that first data pass It is finished into.
2. a kind of block chain big data safe processing system according to claim 1, it is characterised in that: the sending module First data are split as to the mode of at least two first words are as follows: according to the subject of the first data, predicate, object, determine Language, the adverbial modifier, complement form first data are split as at least two first words.
3. a kind of block chain big data safe processing system according to claim 2, it is characterised in that: the sending module First word is padded to the blank position of the two dimensional code of private key generation, it will be described further according to association's word database The darkened locations of two dimensional code fill up out the mode of association's word are as follows:
Two dimensional code is generated according to private key;
Obtain maximum white square area A: in the white area in the two dimensional code, from A=12、22、32....n2, taste one by one Try the area A of the maximum white square that can be bonded three black blocks;
It obtains maximum white square number B: according to the white area of the two dimensional code, not being overlapped with the maximum white square The white area of the two dimensional code is filled on ground, and obtains the number B of filling;
Detect the block number C of first data;
It is compared according to the block number C of first data with maximum white square number B, if number C is less than or equal to a Number B then successively fills each block of the first data in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively described The 2 of the first data of filling in maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively described The 3 of the first data of filling in maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then successively in institute State (N+1) of the first data of filling in maximum white square2A block;
According to association's word database, split out in the left side of the block of every row and/or right side filling with first data The relevant association's word of at least two first words.
4. a kind of block chain big data safe processing system according to claim 3, it is characterised in that: association's word Database root obtains association's word before first word according to the example sentence in dictionary for translation.
5. a kind of block chain big data safe processing system according to claim 3, it is characterised in that: association's word Database root obtains association's word after first word according to the example sentence in dictionary for translation.
6. for a kind of method of block chain big data safe processing system described in claim 5, it is characterised in that including such as Lower step:
Step 1 obtains the first data;
Step 2 generates private key corresponding with first data;
The private key is converted two dimensional code by step 3;
First data encryption is that the second Data Concurrent is sent to other nodes of block chain by step 4, wherein encryption the The mode of one data are as follows: the first data are split as at least two first words, and first word is padded to private key The darkened locations of the two dimensional code are filled up out described further according to association's word database by the blank position of the two dimensional code of generation Associate word;
When being more than that half node receives the second data in step 5, block chain, then determine that the first data transmission is completed.
7. a kind of method of block chain big data safe processing system according to claim 6, it is characterised in that:
First word is padded to the space bit of the two dimensional code of private key generation by the sending module in the step 4 It sets, the darkened locations of the two dimensional code is filled up out to the mode of association's word further according to association's word database are as follows:
Step 4.1 generates two dimensional code according to private key;
Step 4.2 obtains maximum white square area A: in the white area in the two dimensional code, from A=12、22、 32....n2, the area A of the maximum white square that can be bonded three black blocks is attempted one by one;
Step 4.3 obtains maximum white square number B: according to the white area of the two dimensional code, with the maximum white square The white area of the two dimensional code is filled without overlapping, and obtains the number B of filling;
The block number C of step 4.4, detection first data;
Step 4.5 is compared according to the block number C of first data with maximum white square number B, if number C is small In being equal to number B, then each block of the first data is successively filled in the maximum white square,
If number C is greater than number B, by the number C and B2It is compared, if number C is less than or equal to B2, then successively described The 2 of the first data of filling in maximum white square2A block,
If number C is greater than number B2, then by the number C and B3It is compared, if number C is less than or equal to B3, then successively described The 3 of the first data of filling in maximum white square2A block ...
If number C is greater than number BN, then by the number C and BN+1It is compared, if number C is less than or equal to BN+1, then successively in institute State (N+1) of the first data of filling in maximum white square2A block;
Step 4.6, according to association's word database, in the left side of the block of every row and/or right side filling and first data The relevant association's word of at least two first words split out.
CN201910611767.0A 2019-07-08 2019-07-08 Block chain big data safety processing system Active CN110324349B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN202010810909.9A CN111953689A (en) 2019-07-08 2019-07-08 Block chain big data processing system
CN201910611767.0A CN110324349B (en) 2019-07-08 2019-07-08 Block chain big data safety processing system
CN202010811087.6A CN111953690A (en) 2019-07-08 2019-07-08 Block chain safety big data processing system
CN202010811120.5A CN111953691A (en) 2019-07-08 2019-07-08 Block chain big data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910611767.0A CN110324349B (en) 2019-07-08 2019-07-08 Block chain big data safety processing system

Related Child Applications (3)

Application Number Title Priority Date Filing Date
CN202010811087.6A Division CN111953690A (en) 2019-07-08 2019-07-08 Block chain safety big data processing system
CN202010811120.5A Division CN111953691A (en) 2019-07-08 2019-07-08 Block chain big data processing method
CN202010810909.9A Division CN111953689A (en) 2019-07-08 2019-07-08 Block chain big data processing system

Publications (2)

Publication Number Publication Date
CN110324349A true CN110324349A (en) 2019-10-11
CN110324349B CN110324349B (en) 2020-11-24

Family

ID=68121454

Family Applications (4)

Application Number Title Priority Date Filing Date
CN202010811120.5A Withdrawn CN111953691A (en) 2019-07-08 2019-07-08 Block chain big data processing method
CN201910611767.0A Active CN110324349B (en) 2019-07-08 2019-07-08 Block chain big data safety processing system
CN202010811087.6A Withdrawn CN111953690A (en) 2019-07-08 2019-07-08 Block chain safety big data processing system
CN202010810909.9A Withdrawn CN111953689A (en) 2019-07-08 2019-07-08 Block chain big data processing system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010811120.5A Withdrawn CN111953691A (en) 2019-07-08 2019-07-08 Block chain big data processing method

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN202010811087.6A Withdrawn CN111953690A (en) 2019-07-08 2019-07-08 Block chain safety big data processing system
CN202010810909.9A Withdrawn CN111953689A (en) 2019-07-08 2019-07-08 Block chain big data processing system

Country Status (1)

Country Link
CN (4) CN111953691A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990872A (en) * 2019-12-03 2020-04-10 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420295A (en) * 2008-12-01 2009-04-29 刘江海 Ciphering method for bit reassigning and mutual replacing on different positions of the same byte
CN102034127A (en) * 2009-09-28 2011-04-27 上海易悠通信息科技有限公司 Novel high-capacity two-dimensional barcode and system, encoding and decoding methods and applications thereof
CN103093411A (en) * 2013-01-10 2013-05-08 华南师范大学 Encryption-decryption method based on random binary image
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
JP2015212934A (en) * 2014-04-14 2015-11-26 株式会社テララコード研究所 Two-dimensional code, multi-valued two-dimensional code, and method of generating two-dimensional code
CN107423797A (en) * 2017-07-31 2017-12-01 成都新得利电子有限公司 A kind of security code information generating method
CN109379351A (en) * 2018-09-30 2019-02-22 武汉斗鱼网络科技有限公司 A kind of two dimensional code encryption method, storage medium, equipment and system
CN109657769A (en) * 2018-12-29 2019-04-19 安徽大学 A kind of two-dimensional barcode information hidden method run-length coding based
CN109711189A (en) * 2018-12-19 2019-05-03 上海晶赞融宣科技有限公司 Data desensitization method and device, storage medium, terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420295A (en) * 2008-12-01 2009-04-29 刘江海 Ciphering method for bit reassigning and mutual replacing on different positions of the same byte
CN102034127A (en) * 2009-09-28 2011-04-27 上海易悠通信息科技有限公司 Novel high-capacity two-dimensional barcode and system, encoding and decoding methods and applications thereof
CN103093411A (en) * 2013-01-10 2013-05-08 华南师范大学 Encryption-decryption method based on random binary image
JP2015212934A (en) * 2014-04-14 2015-11-26 株式会社テララコード研究所 Two-dimensional code, multi-valued two-dimensional code, and method of generating two-dimensional code
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information
CN107423797A (en) * 2017-07-31 2017-12-01 成都新得利电子有限公司 A kind of security code information generating method
CN109379351A (en) * 2018-09-30 2019-02-22 武汉斗鱼网络科技有限公司 A kind of two dimensional code encryption method, storage medium, equipment and system
CN109711189A (en) * 2018-12-19 2019-05-03 上海晶赞融宣科技有限公司 Data desensitization method and device, storage medium, terminal
CN109657769A (en) * 2018-12-29 2019-04-19 安徽大学 A kind of two-dimensional barcode information hidden method run-length coding based

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990872A (en) * 2019-12-03 2020-04-10 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain
CN110990872B (en) * 2019-12-03 2022-03-25 成都链鱼科技有限公司 Private key export two-dimensional code storage and scanning recovery method based on block chain

Also Published As

Publication number Publication date
CN111953691A (en) 2020-11-17
CN111953689A (en) 2020-11-17
CN111953690A (en) 2020-11-17
CN110324349B (en) 2020-11-24

Similar Documents

Publication Publication Date Title
Khadam et al. Digital watermarking technique for text document protection using data mining analysis
Chang et al. Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method
CN106161006B (en) Digital encryption algorithm
CN104038502B (en) A kind of verification method and system
CN101639826B (en) Text hidden method based on Chinese sentence pattern template transformation
Sharma et al. Analysis of different text steganography techniques: a survey
JP6518981B1 (en) Translation apparatus, control program for translation apparatus, and translation method using translation apparatus
Baawi et al. A comparative study on the advancement of text steganography techniques in digital media
US8166057B2 (en) Data providing apparatus, data providing method and program
CN110324349A (en) A kind of block chain big data security processing system and method
Li et al. Detection of generative linguistic steganography based on explicit and latent text word relation mining using deep learning
Kashid et al. Approach of a multilevel secret sharing scheme for extracted text data
Afanasyeva Analysis of aspects of messages hiding in text environments
JP7333933B2 (en) TRANSLATION DEVICE, CONTROL PROGRAM FOR TRANSLATION DEVICE, AND TRANSLATION METHOD USING TRANSLATION DEVICE
Panchal Differential privacy and natural language processing to generate contextually similar decoy messages in honey encryption scheme
Gelb et al. Methods of Decipherment1
Huang et al. A Homophone-based Chinese Text Steganography Scheme for Chatting Applications.
Ragasudha et al. Secure automatic question paper generation with the subjective answer evaluation system
CN108712424B (en) Method for encrypting text based on mapping control point result table
CN112329003A (en) Method and system for generating safe and easy-to-remember password
KR102375561B1 (en) Document file providing server supporting multi-language translation function and operating method thereof
JP2020123215A (en) Translation device, control program of translation device, and translation method using translation device
CN115987564B (en) Encryption method in data interaction process
Topkara New designs for improving the efficiency and resilience of natural language watermarking
KR20230122366A (en) Web standard type electronic document cabinet system using artificial intelligence and OCR

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201106

Address after: Room 307, Zijin Oriental Building, 288 Qiyue Street, Suzhou Industrial Park, Jiangsu Province

Applicant after: TIANJU DIHE (SUZHOU) DATA Co.,Ltd.

Address before: 100000 Beijing Fengtai District Fangguyuan District 2 1-710B

Applicant before: Yu Rucheng

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 307, Zijin Oriental building, No. 288, Qiyue street, Suzhou Industrial Park, Suzhou, Jiangsu 215000

Patentee after: Tianju DIHE (Suzhou) Technology Co.,Ltd.

Address before: Room 307, Zijin Oriental building, No. 288, Qiyue street, Suzhou Industrial Park, Suzhou, Jiangsu 215000

Patentee before: TIANJU DIHE (SUZHOU) DATA CO.,LTD.

CP01 Change in the name or title of a patent holder