CN110348228A - A kind of private data storage method - Google Patents
A kind of private data storage method Download PDFInfo
- Publication number
- CN110348228A CN110348228A CN201910429465.1A CN201910429465A CN110348228A CN 110348228 A CN110348228 A CN 110348228A CN 201910429465 A CN201910429465 A CN 201910429465A CN 110348228 A CN110348228 A CN 110348228A
- Authority
- CN
- China
- Prior art keywords
- character
- data
- encryption
- bait
- bebinning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of private data storage method of technical field of data storage is related to, solve the problems, such as that the protecting effect of important information is difficult to balance with data-handling efficiency.Its key points of the technical solution are that the following steps are included: what is stored required for input is stored data, being stored data includes private information data and general information data, encryption bebinning character is added before private information data, encryption final character is added after private information data, and generates the orderly character of unencryption;Identification is carried out to the encryption bebinning character in the orderly character of unencryption and encryption final character and the data between encryption bebinning character and encryption final character are encrypted, is generated and is encrypted orderly character and save.Reach and the data between encryption bebinning character and encryption final character have been encrypted, has reduced the data for needing to encrypt, can guarantee that private information data can be protected preferably, while reaching better data-handling efficiency.
Description
Technical field
The present invention relates to technical field of data storage, in particular to a kind of private data storage method.
Background technique
Data storage technology is usually applied in database, and some private enterprises, public institution etc. also may require that using number
A part of important secret information is stored according to library, it is therefore desirable to which database has preferable safety, prevents information leakage.
And in above-mentioned scene, in order to maintain secrecy to the data in database, usually all data are encrypted, but
All data are encrypted, the efficiency of processing data can be largely effected on, it is therefore desirable to which one kind can be preferably to important
Information is protected, while can also reach the scheme of preferable data-handling efficiency.
Summary of the invention
The purpose of the present invention is to provide a kind of private data storage methods, can provide a part of important information preferable
Protection, while can also reach relatively good data-handling efficiency.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of private data storage method, comprising the following steps:
What is stored required for input is stored data, and the data that are stored include private information data and general information number
According to, encryption bebinning character is added before the private information data, encryption final character is added after the private information data,
And generate the orderly character of unencryption;
Encryption bebinning character in the orderly character of unencryption identify and to encryption banner word with encryption final character
Data between symbol and encryption final character are encrypted, and are generated and are encrypted orderly character and save.
It is further: in the step of data between described pair of encryption bebinning character and encryption final character encrypt,
Further comprising the steps of: the Encryption Algorithm encrypted to the private information data is SHA-256.
It is further: the storage required for the input be stored data step after, it is further comprising the steps of: to maintain secrecy
Bait data character is added in information data, bait bebinning character is added before the bait data character, in the bait number
According to addition bait final character after character.
It is further: bait bebinning character being added before the bait data character, adds after the bait data character
It is further comprising the steps of after the step of entering bait final character: encryption final character to be added before bait bebinning character, in bait
Encryption bebinning character is added after final character.
It is further: in the orderly character of unencryption encryption bebinning character and encryption final character carry out identification and to adding
It is further comprising the steps of: to bait data after the step of data between close bebinning character and encryption final character are encrypted
Character carries out secondary encryption.
It is further: further comprising the steps of: to described in described the step of carrying out secondary encryption to bait data character
The Encryption Algorithm that bait data character is encrypted is SHA-1.
In conclusion the invention has the following advantages:
By being separately added into encryption bebinning character and encryption final character before and after private information data, required encryption is given
Part provide label.In ciphering process, the data between encryption bebinning character and encryption final character are encrypted, so
It generates afterwards and encrypts orderly character and save, to can guarantee that private information data can be protected preferably, simultaneously as subtracting
Lack the data for needing to encrypt, therefore can also reach better data-handling efficiency.
SHA-256 algorithm comparison is difficult to be cracked (such as compared to common md5 encryption algorithm), therefore passes through SHA-
256 algorithm for encryption can make private information data obtain preferable safety.Simultaneously as only to a part being stored in data
It is encrypted, therefore influence of the encryption process to data-handling efficiency is controlled effectively, ensures data-handling efficiency.
Bait data character is added in private information data, and is separately added into bait starting before and after bait data character
Character and bait final character guarantee to protect so that can guarantee can reject bait data character in private information data after decryption
The normal reading of confidential information data.While cracking difficulty of private information data is improved by bait data character, can also be incited somebody to action
Private information data disconnects, to can also make one the indigestion after cracking even if private information data is successfully cracked and crack
The information obtained afterwards further increases the safety of private information data.
By the way that encryption final character is added before bait bebinning character, encryption banner word is added after bait final character
Symbol can directly reduce encryption amount so as to not need that bait data character is encrypted, and improve at data
Manage speed.
By carrying out secondary encryption to bait data character, when only having cracked private information data without cracking bait
When data character, whether complete and confidence level the size of the data not cracked cannot be directly directly determined during cracking.
Play the role of fascination, therefore can also play the effect for improving private information data safety to a certain extent, and be lost
Data processing speed it is relatively low, guarantee the efficiency of data processing.
It is SHA-1 by the Encryption Algorithm encrypted to bait data character, using different from private information data
Algorithm, can be improved while cracking the difficulty of bait data character and private information data, to improve private information data
Safety.
Detailed description of the invention
Fig. 1 is the flow diagram in embodiment 1;
Fig. 2 is the flow diagram in embodiment 2.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
Embodiment 1:
A kind of private data storage method, as shown in Figure 1, comprising the following steps:
A. what is stored required for input is stored data, and being stored data includes private information data and general information number
According to;
B. bait data character is added in private information data, bait bebinning character is added before bait data character,
Bait final character is added after bait data character;
C. encryption final character is added before bait bebinning character, encryption bebinning character is added after bait final character;
D. encryption bebinning character is added before private information data, encryption final character is added after private information data,
It is ranked up by the positive sequence of character ASCII character and generates the orderly character of unencryption;
E. identification is carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is originated
Data between character and encryption final character are encrypted, and are generated and are encrypted orderly character and simultaneously save, to private information data into
The Encryption Algorithm of row encryption is SHA-256;
F. terminate storage process.
The present embodiment have it is following a little:
By being separately added into encryption bebinning character and encryption final character before and after private information data, required encryption is given
Part provide label.In ciphering process, the data between encryption bebinning character and encryption final character are encrypted, so
It generates afterwards and encrypts orderly character and save, to can guarantee that private information data can be protected preferably, simultaneously as subtracting
Lack the data for needing to encrypt, therefore can also reach better data-handling efficiency.
SHA-256 algorithm comparison is difficult to be cracked (such as compared to common md5 encryption algorithm), therefore passes through SHA-
256 algorithm for encryption can make private information data obtain preferable safety.Simultaneously as only to a part being stored in data
It is encrypted, therefore influence of the encryption process to data-handling efficiency is controlled effectively, ensures data-handling efficiency.
Bait data character is added in private information data, and is separately added into bait starting before and after bait data character
Character and bait final character guarantee to protect so that can guarantee can reject bait data character in private information data after decryption
The normal reading of confidential information data.While cracking difficulty of private information data is improved by bait data character, can also be incited somebody to action
Private information data disconnects, to can also make one the indigestion after cracking even if private information data is successfully cracked and crack
The information obtained afterwards further increases the safety of private information data.
By the way that encryption final character is added before bait bebinning character, encryption banner word is added after bait final character
Symbol can directly reduce encryption amount so as to not need that bait data character is encrypted, and improve at data
Manage speed.
Embodiment 2:
A kind of private data storage method, as shown in Fig. 2, itself the difference from embodiment 1 is that: without being originated in bait
The step of encryption final character is added before character, encryption bebinning character is added after bait final character.
In addition, further comprising the steps of:
Identification is being carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is being originated
Before the step of data between character and encryption final character are encrypted, before bait bebinning character and before bait final character
It is separately added into encryption final character, is separately added into after bait bebinning character and encryption banner word after bait final character
Symbol;
Identification is being carried out with encryption final character to the encryption bebinning character in the orderly character of unencryption and encryption is being originated
After the step of data between character and encryption final character are encrypted, bait bebinning character and bait final character are searched simultaneously
Positioning, and position bait data character;
Secondary encryption is carried out to bait data character, the Encryption Algorithm encrypted to bait data character is SHA-1,
It obtains secondary encryption data and saves.
The present embodiment has the advantage that
By being separately added into before bait bebinning character and encryption final character before bait final character, originated in bait
It is separately added into after character and encryption bebinning character after bait final character, is adding bait bebinning character and bait final character
Processing, and then convenient lookup bait bebinning character and bait final character after encryption are not encrypted during close.Bait starting
Character and bait final character are used as using different character fields to be marked.
By carrying out secondary encryption to bait data character, when only having cracked private information data without cracking bait
When data character, whether complete and confidence level the size of the data not cracked cannot be directly directly determined during cracking.
Play the role of fascination, therefore can also play the effect for improving private information data safety to a certain extent, and be lost
Data processing speed it is relatively low, guarantee the efficiency of data processing.
It is SHA-1 by the Encryption Algorithm encrypted to bait data character, using different from private information data
Algorithm, can be improved while cracking the difficulty of bait data character and private information data, to improve private information data
Safety.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art
Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this
All by the protection of Patent Law in the scope of the claims of invention.
Claims (6)
1. a kind of private data storage method, it is characterised in that: the following steps are included:
What is stored required for input is stored data, and the data that are stored include private information data and general information data,
Encryption bebinning character is added before the private information data, encryption final character is added after the private information data, and
Generate the orderly character of unencryption;
To in the orderly character of unencryption encryption bebinning character and encryption final character carry out identification and to encryption bebinning character and
Data between encryption final character are encrypted, and are generated and are encrypted orderly character and save.
2. private data storage method according to claim 1, it is characterised in that: described pair of encryption bebinning character and encryption
It is further comprising the steps of in the step of data between final character are encrypted: the private information data is encrypted
Encryption Algorithm be SHA-256.
3. private data storage method according to claim 1, it is characterised in that: the quilt of the storage required for the input
It is further comprising the steps of after storing data step: bait data character to be added in private information data, in the bait data
Bait bebinning character is added before character, bait final character is added after the bait data character.
4. private data storage method according to claim 3, it is characterised in that: be added before the bait data character
Bait bebinning character, after the bait data character be added bait final character the step of after, it is further comprising the steps of: to lure
Encryption final character is added before bait bebinning character, encryption bebinning character is added after bait final character.
5. private data storage method according to claim 3, it is characterised in that: to the encryption in the orderly character of unencryption
Bebinning character and encryption final character carry out identification and add to the data between encryption bebinning character and encryption final character
It is further comprising the steps of after close step: secondary encryption is carried out to bait data character.
6. private data storage method according to claim 5, it is characterised in that: described to carry out two to bait data character
Further comprising the steps of in the step of secondary encryption: the Encryption Algorithm encrypted to the bait data character is SHA-1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429465.1A CN110348228A (en) | 2019-05-22 | 2019-05-22 | A kind of private data storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429465.1A CN110348228A (en) | 2019-05-22 | 2019-05-22 | A kind of private data storage method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110348228A true CN110348228A (en) | 2019-10-18 |
Family
ID=68174624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910429465.1A Pending CN110348228A (en) | 2019-05-22 | 2019-05-22 | A kind of private data storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110348228A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6021203A (en) * | 1996-12-11 | 2000-02-01 | Microsoft Corporation | Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security |
US20100150527A1 (en) * | 2008-12-11 | 2010-06-17 | Cable Television Laboratories, Inc. | Segment boundary obfuscation |
CN102932349A (en) * | 2012-10-31 | 2013-02-13 | 成都主导软件技术有限公司 | Data transmission method, device and system |
CN104732137A (en) * | 2015-04-17 | 2015-06-24 | 南开大学 | Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes |
CN105005718A (en) * | 2015-06-23 | 2015-10-28 | 电子科技大学 | Method for implementing code obfuscation by Markov chain |
CN106096397A (en) * | 2016-05-26 | 2016-11-09 | 倪茂志 | A kind of prevention method extorting software and system |
CN108337233A (en) * | 2017-12-26 | 2018-07-27 | 广东辰宜信息科技有限公司 | It is a kind of to the encrypted method of content information, electronic equipment and storage medium |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
CN109271797A (en) * | 2018-09-12 | 2019-01-25 | 郑州云海信息技术有限公司 | A kind of method and system improving the safety of database sensitive information |
-
2019
- 2019-05-22 CN CN201910429465.1A patent/CN110348228A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6021203A (en) * | 1996-12-11 | 2000-02-01 | Microsoft Corporation | Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security |
US20100150527A1 (en) * | 2008-12-11 | 2010-06-17 | Cable Television Laboratories, Inc. | Segment boundary obfuscation |
CN102932349A (en) * | 2012-10-31 | 2013-02-13 | 成都主导软件技术有限公司 | Data transmission method, device and system |
CN104732137A (en) * | 2015-04-17 | 2015-06-24 | 南开大学 | Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes |
CN105005718A (en) * | 2015-06-23 | 2015-10-28 | 电子科技大学 | Method for implementing code obfuscation by Markov chain |
CN106096397A (en) * | 2016-05-26 | 2016-11-09 | 倪茂志 | A kind of prevention method extorting software and system |
CN108337233A (en) * | 2017-12-26 | 2018-07-27 | 广东辰宜信息科技有限公司 | It is a kind of to the encrypted method of content information, electronic equipment and storage medium |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
CN109271797A (en) * | 2018-09-12 | 2019-01-25 | 郑州云海信息技术有限公司 | A kind of method and system improving the safety of database sensitive information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105960775A (en) | Pneumatic ore charging | |
CN103927357B (en) | Data encryption and retrieval method for database | |
WO2017041603A1 (en) | Data encryption method and apparatus, mobile terminal, and computer storage medium | |
CN102664928A (en) | Data secure access method used for cloud storage and user terminal system | |
CN106372519A (en) | Information encryption method and device | |
CN108921696B (en) | Intelligent contract calling and contract transaction verification method based on block chain | |
CN113190584B (en) | Concealed trace query method based on oblivious transmission protocol | |
CN107609418A (en) | Desensitization method, device, storage device and the computer equipment of text data | |
CN108768990A (en) | It is a kind of that encryption method can search for based on block chain | |
CN105468940B (en) | Method for protecting software and device | |
CN107004083A (en) | Device keyses are protected | |
CN105117635A (en) | Local data security protection system and method | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
CN106778292B (en) | A kind of quick restoring method of Word encrypted document | |
CN104901810A (en) | Data encryption storage method based on domestic cryptographic algorithm | |
CN106446697A (en) | Method and device for saving private data | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN103973646A (en) | Method, client device and system for storing services by aid of public cloud | |
CN103973698A (en) | User access right revoking method in cloud storage environment | |
CN112866216B (en) | Method and system for encrypting file | |
CN111935163B (en) | Data joint processing method and device for protecting privacy | |
CN103379133A (en) | Safe and reliable cloud storage system | |
CN108574578A (en) | A kind of black box data protection system and method | |
CN107332663A (en) | Archive management method based on encryption technology | |
CN110348228A (en) | A kind of private data storage method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191018 |
|
WD01 | Invention patent application deemed withdrawn after publication |