CN110348228A - A kind of private data storage method - Google Patents

A kind of private data storage method Download PDF

Info

Publication number
CN110348228A
CN110348228A CN201910429465.1A CN201910429465A CN110348228A CN 110348228 A CN110348228 A CN 110348228A CN 201910429465 A CN201910429465 A CN 201910429465A CN 110348228 A CN110348228 A CN 110348228A
Authority
CN
China
Prior art keywords
character
data
encryption
bait
bebinning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910429465.1A
Other languages
Chinese (zh)
Inventor
师迎春
王利良
徐枝林
于灏
许铁华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Safety Technology Service Co Ltd
Original Assignee
Safety Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Safety Technology Service Co Ltd filed Critical Safety Technology Service Co Ltd
Priority to CN201910429465.1A priority Critical patent/CN110348228A/en
Publication of CN110348228A publication Critical patent/CN110348228A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a kind of private data storage method of technical field of data storage is related to, solve the problems, such as that the protecting effect of important information is difficult to balance with data-handling efficiency.Its key points of the technical solution are that the following steps are included: what is stored required for input is stored data, being stored data includes private information data and general information data, encryption bebinning character is added before private information data, encryption final character is added after private information data, and generates the orderly character of unencryption;Identification is carried out to the encryption bebinning character in the orderly character of unencryption and encryption final character and the data between encryption bebinning character and encryption final character are encrypted, is generated and is encrypted orderly character and save.Reach and the data between encryption bebinning character and encryption final character have been encrypted, has reduced the data for needing to encrypt, can guarantee that private information data can be protected preferably, while reaching better data-handling efficiency.

Description

A kind of private data storage method
Technical field
The present invention relates to technical field of data storage, in particular to a kind of private data storage method.
Background technique
Data storage technology is usually applied in database, and some private enterprises, public institution etc. also may require that using number A part of important secret information is stored according to library, it is therefore desirable to which database has preferable safety, prevents information leakage. And in above-mentioned scene, in order to maintain secrecy to the data in database, usually all data are encrypted, but All data are encrypted, the efficiency of processing data can be largely effected on, it is therefore desirable to which one kind can be preferably to important Information is protected, while can also reach the scheme of preferable data-handling efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of private data storage methods, can provide a part of important information preferable Protection, while can also reach relatively good data-handling efficiency.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of private data storage method, comprising the following steps:
What is stored required for input is stored data, and the data that are stored include private information data and general information number According to, encryption bebinning character is added before the private information data, encryption final character is added after the private information data, And generate the orderly character of unencryption;
Encryption bebinning character in the orderly character of unencryption identify and to encryption banner word with encryption final character Data between symbol and encryption final character are encrypted, and are generated and are encrypted orderly character and save.
It is further: in the step of data between described pair of encryption bebinning character and encryption final character encrypt, Further comprising the steps of: the Encryption Algorithm encrypted to the private information data is SHA-256.
It is further: the storage required for the input be stored data step after, it is further comprising the steps of: to maintain secrecy Bait data character is added in information data, bait bebinning character is added before the bait data character, in the bait number According to addition bait final character after character.
It is further: bait bebinning character being added before the bait data character, adds after the bait data character It is further comprising the steps of after the step of entering bait final character: encryption final character to be added before bait bebinning character, in bait Encryption bebinning character is added after final character.
It is further: in the orderly character of unencryption encryption bebinning character and encryption final character carry out identification and to adding It is further comprising the steps of: to bait data after the step of data between close bebinning character and encryption final character are encrypted Character carries out secondary encryption.
It is further: further comprising the steps of: to described in described the step of carrying out secondary encryption to bait data character The Encryption Algorithm that bait data character is encrypted is SHA-1.
In conclusion the invention has the following advantages:
By being separately added into encryption bebinning character and encryption final character before and after private information data, required encryption is given Part provide label.In ciphering process, the data between encryption bebinning character and encryption final character are encrypted, so It generates afterwards and encrypts orderly character and save, to can guarantee that private information data can be protected preferably, simultaneously as subtracting Lack the data for needing to encrypt, therefore can also reach better data-handling efficiency.
SHA-256 algorithm comparison is difficult to be cracked (such as compared to common md5 encryption algorithm), therefore passes through SHA- 256 algorithm for encryption can make private information data obtain preferable safety.Simultaneously as only to a part being stored in data It is encrypted, therefore influence of the encryption process to data-handling efficiency is controlled effectively, ensures data-handling efficiency.
Bait data character is added in private information data, and is separately added into bait starting before and after bait data character Character and bait final character guarantee to protect so that can guarantee can reject bait data character in private information data after decryption The normal reading of confidential information data.While cracking difficulty of private information data is improved by bait data character, can also be incited somebody to action Private information data disconnects, to can also make one the indigestion after cracking even if private information data is successfully cracked and crack The information obtained afterwards further increases the safety of private information data.
By the way that encryption final character is added before bait bebinning character, encryption banner word is added after bait final character Symbol can directly reduce encryption amount so as to not need that bait data character is encrypted, and improve at data Manage speed.
By carrying out secondary encryption to bait data character, when only having cracked private information data without cracking bait When data character, whether complete and confidence level the size of the data not cracked cannot be directly directly determined during cracking. Play the role of fascination, therefore can also play the effect for improving private information data safety to a certain extent, and be lost Data processing speed it is relatively low, guarantee the efficiency of data processing.
It is SHA-1 by the Encryption Algorithm encrypted to bait data character, using different from private information data Algorithm, can be improved while cracking the difficulty of bait data character and private information data, to improve private information data Safety.
Detailed description of the invention
Fig. 1 is the flow diagram in embodiment 1;
Fig. 2 is the flow diagram in embodiment 2.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Embodiment 1:
A kind of private data storage method, as shown in Figure 1, comprising the following steps:
A. what is stored required for input is stored data, and being stored data includes private information data and general information number According to;
B. bait data character is added in private information data, bait bebinning character is added before bait data character, Bait final character is added after bait data character;
C. encryption final character is added before bait bebinning character, encryption bebinning character is added after bait final character;
D. encryption bebinning character is added before private information data, encryption final character is added after private information data, It is ranked up by the positive sequence of character ASCII character and generates the orderly character of unencryption;
E. identification is carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is originated Data between character and encryption final character are encrypted, and are generated and are encrypted orderly character and simultaneously save, to private information data into The Encryption Algorithm of row encryption is SHA-256;
F. terminate storage process.
The present embodiment have it is following a little:
By being separately added into encryption bebinning character and encryption final character before and after private information data, required encryption is given Part provide label.In ciphering process, the data between encryption bebinning character and encryption final character are encrypted, so It generates afterwards and encrypts orderly character and save, to can guarantee that private information data can be protected preferably, simultaneously as subtracting Lack the data for needing to encrypt, therefore can also reach better data-handling efficiency.
SHA-256 algorithm comparison is difficult to be cracked (such as compared to common md5 encryption algorithm), therefore passes through SHA- 256 algorithm for encryption can make private information data obtain preferable safety.Simultaneously as only to a part being stored in data It is encrypted, therefore influence of the encryption process to data-handling efficiency is controlled effectively, ensures data-handling efficiency.
Bait data character is added in private information data, and is separately added into bait starting before and after bait data character Character and bait final character guarantee to protect so that can guarantee can reject bait data character in private information data after decryption The normal reading of confidential information data.While cracking difficulty of private information data is improved by bait data character, can also be incited somebody to action Private information data disconnects, to can also make one the indigestion after cracking even if private information data is successfully cracked and crack The information obtained afterwards further increases the safety of private information data.
By the way that encryption final character is added before bait bebinning character, encryption banner word is added after bait final character Symbol can directly reduce encryption amount so as to not need that bait data character is encrypted, and improve at data Manage speed.
Embodiment 2:
A kind of private data storage method, as shown in Fig. 2, itself the difference from embodiment 1 is that: without being originated in bait The step of encryption final character is added before character, encryption bebinning character is added after bait final character.
In addition, further comprising the steps of:
Identification is being carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is being originated Before the step of data between character and encryption final character are encrypted, before bait bebinning character and before bait final character It is separately added into encryption final character, is separately added into after bait bebinning character and encryption banner word after bait final character Symbol;
Identification is being carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is being originated After the step of data between character and encryption final character are encrypted, bait bebinning character and bait final character are searched simultaneously Positioning, and position bait data character;
Secondary encryption is carried out to bait data character, the Encryption Algorithm encrypted to bait data character is SHA-1, It obtains secondary encryption data and saves.
The present embodiment has the advantage that
By being separately added into before bait bebinning character and encryption final character before bait final character, originated in bait It is separately added into after character and encryption bebinning character after bait final character, is adding bait bebinning character and bait final character Processing, and then convenient lookup bait bebinning character and bait final character after encryption are not encrypted during close.Bait starting Character and bait final character are used as using different character fields to be marked.
By carrying out secondary encryption to bait data character, when only having cracked private information data without cracking bait When data character, whether complete and confidence level the size of the data not cracked cannot be directly directly determined during cracking. Play the role of fascination, therefore can also play the effect for improving private information data safety to a certain extent, and be lost Data processing speed it is relatively low, guarantee the efficiency of data processing.
It is SHA-1 by the Encryption Algorithm encrypted to bait data character, using different from private information data Algorithm, can be improved while cracking the difficulty of bait data character and private information data, to improve private information data Safety.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this All by the protection of Patent Law in the scope of the claims of invention.

Claims (6)

1. a kind of private data storage method, it is characterised in that: the following steps are included:
What is stored required for input is stored data, and the data that are stored include private information data and general information data, Encryption bebinning character is added before the private information data, encryption final character is added after the private information data, and Generate the orderly character of unencryption;
To in the orderly character of unencryption encryption bebinning character and encryption final character carry out identification and to encryption bebinning character and Data between encryption final character are encrypted, and are generated and are encrypted orderly character and save.
2. private data storage method according to claim 1, it is characterised in that: described pair of encryption bebinning character and encryption It is further comprising the steps of in the step of data between final character are encrypted: the private information data is encrypted Encryption Algorithm be SHA-256.
3. private data storage method according to claim 1, it is characterised in that: the quilt of the storage required for the input It is further comprising the steps of after storing data step: bait data character to be added in private information data, in the bait data Bait bebinning character is added before character, bait final character is added after the bait data character.
4. private data storage method according to claim 3, it is characterised in that: be added before the bait data character Bait bebinning character, after the bait data character be added bait final character the step of after, it is further comprising the steps of: to lure Encryption final character is added before bait bebinning character, encryption bebinning character is added after bait final character.
5. private data storage method according to claim 3, it is characterised in that: to the encryption in the orderly character of unencryption Bebinning character and encryption final character carry out identification and add to the data between encryption bebinning character and encryption final character It is further comprising the steps of after close step: secondary encryption is carried out to bait data character.
6. private data storage method according to claim 5, it is characterised in that: described to carry out two to bait data character Further comprising the steps of in the step of secondary encryption: the Encryption Algorithm encrypted to the bait data character is SHA-1.
CN201910429465.1A 2019-05-22 2019-05-22 A kind of private data storage method Pending CN110348228A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910429465.1A CN110348228A (en) 2019-05-22 2019-05-22 A kind of private data storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910429465.1A CN110348228A (en) 2019-05-22 2019-05-22 A kind of private data storage method

Publications (1)

Publication Number Publication Date
CN110348228A true CN110348228A (en) 2019-10-18

Family

ID=68174624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910429465.1A Pending CN110348228A (en) 2019-05-22 2019-05-22 A kind of private data storage method

Country Status (1)

Country Link
CN (1) CN110348228A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6021203A (en) * 1996-12-11 2000-02-01 Microsoft Corporation Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
US20100150527A1 (en) * 2008-12-11 2010-06-17 Cable Television Laboratories, Inc. Segment boundary obfuscation
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN104732137A (en) * 2015-04-17 2015-06-24 南开大学 Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes
CN105005718A (en) * 2015-06-23 2015-10-28 电子科技大学 Method for implementing code obfuscation by Markov chain
CN106096397A (en) * 2016-05-26 2016-11-09 倪茂志 A kind of prevention method extorting software and system
CN108337233A (en) * 2017-12-26 2018-07-27 广东辰宜信息科技有限公司 It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN109271797A (en) * 2018-09-12 2019-01-25 郑州云海信息技术有限公司 A kind of method and system improving the safety of database sensitive information

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6021203A (en) * 1996-12-11 2000-02-01 Microsoft Corporation Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
US20100150527A1 (en) * 2008-12-11 2010-06-17 Cable Television Laboratories, Inc. Segment boundary obfuscation
CN102932349A (en) * 2012-10-31 2013-02-13 成都主导软件技术有限公司 Data transmission method, device and system
CN104732137A (en) * 2015-04-17 2015-06-24 南开大学 Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes
CN105005718A (en) * 2015-06-23 2015-10-28 电子科技大学 Method for implementing code obfuscation by Markov chain
CN106096397A (en) * 2016-05-26 2016-11-09 倪茂志 A kind of prevention method extorting software and system
CN108337233A (en) * 2017-12-26 2018-07-27 广东辰宜信息科技有限公司 It is a kind of to the encrypted method of content information, electronic equipment and storage medium
CN109150499A (en) * 2018-08-29 2019-01-04 深圳市迷你玩科技有限公司 Method, apparatus, computer equipment and the storage medium of dynamic encryption data
CN109271797A (en) * 2018-09-12 2019-01-25 郑州云海信息技术有限公司 A kind of method and system improving the safety of database sensitive information

Similar Documents

Publication Publication Date Title
CN105960775A (en) Pneumatic ore charging
CN103927357B (en) Data encryption and retrieval method for database
WO2017041603A1 (en) Data encryption method and apparatus, mobile terminal, and computer storage medium
CN106372519A (en) Information encryption method and device
CN108921696B (en) Intelligent contract calling and contract transaction verification method based on block chain
CN108768990A (en) It is a kind of that encryption method can search for based on block chain
CN107004083A (en) Device keyses are protected
CN104579689A (en) Soft secret key system and implementation method
CN113190584B (en) Concealed trace query method based on oblivious transmission protocol
CN105117635A (en) Local data security protection system and method
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
CN106778292B (en) A kind of quick restoring method of Word encrypted document
CN108667815A (en) Block chain secret key encipher-decipher method, device and terminal based on bio-identification
CN104901810A (en) Data encrypted storage method based on domestic cryptographic algorithm
WO2023142440A1 (en) Image encryption method and apparatus, image processing method and apparatus, and device and medium
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN103973646A (en) Method, client device and system for storing services by aid of public cloud
CN103973698A (en) User access right revoking method in cloud storage environment
CN115982761A (en) Sensitive information processing method and device, electronic equipment and storage medium
CN106446697A (en) Method and device for saving private data
CN112866216B (en) Method and system for encrypting file
CN103457721B (en) A kind of method and device of Mass production password
CN103379133A (en) Safe and reliable cloud storage system
CN108427889A (en) Document handling method and device
CN107332663A (en) Archive management method based on encryption technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191018

WD01 Invention patent application deemed withdrawn after publication