CN113268761A - Information encryption method and device, electronic equipment and computer readable medium - Google Patents

Information encryption method and device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN113268761A
CN113268761A CN202110816893.7A CN202110816893A CN113268761A CN 113268761 A CN113268761 A CN 113268761A CN 202110816893 A CN202110816893 A CN 202110816893A CN 113268761 A CN113268761 A CN 113268761A
Authority
CN
China
Prior art keywords
field
field information
clustering
file
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110816893.7A
Other languages
Chinese (zh)
Other versions
CN113268761B (en
Inventor
陈曦
燕鹏
张晓枫
王丽君
王娟
吴建海
任志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Siji Location Service Co ltd
Beijing Guodiantong Network Technology Co Ltd
Original Assignee
Beijing Guodiantong Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guodiantong Network Technology Co Ltd filed Critical Beijing Guodiantong Network Technology Co Ltd
Priority to CN202110816893.7A priority Critical patent/CN113268761B/en
Publication of CN113268761A publication Critical patent/CN113268761A/en
Application granted granted Critical
Publication of CN113268761B publication Critical patent/CN113268761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/906Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The embodiment of the disclosure discloses an information encryption method, an information encryption device, electronic equipment and a computer readable medium. One embodiment of the method comprises: in response to the detection of the information of the representation file selection request, acquiring a file set to be analyzed from a preset database; clustering each field information to be analyzed included in the file set to be analyzed to obtain a clustered field information set; selecting at least one piece of clustering field information from the clustering field information group set as a target clustering field information set; clustering the target clustering field information set to obtain a target clustering field information group set; determining a file to be analyzed corresponding to each target clustering field information group in a target clustering field information group set as a target file to obtain a target file group; and according to the replacing encryption field table, carrying out encryption processing on the target file group to obtain an encrypted target file group. The implementation mode avoids repeated screening of the bid documents and shortens the time for screening the documents.

Description

Information encryption method and device, electronic equipment and computer readable medium
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to an information encryption method, an information encryption device, electronic equipment and a computer readable medium.
Background
The document (engineering document) is a document required in the field of engineering construction and the like. (for example, the bidding document records all the conditions required for the construction unit to offer the bidding unit to participate in the bidding.) currently, the document is usually screened in the following way: and screening the files in a manual auditing mode.
However, the following technical problems are generally encountered with the above screening method:
firstly, the manual review has certain subjectivity, and when the selected files cannot meet the engineering construction requirements, the files need to be screened repeatedly, so that a large amount of time is consumed;
second, since the file is sensitive, the file is not encrypted, which may cause alteration or disclosure of the file information, thereby reducing the security and safety of the file.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose information encryption methods, apparatuses, electronic devices, and computer-readable media to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide an information encryption method, including: responding to the detected information of the representation file selection request, and acquiring a set of files to be analyzed from a preset database, wherein the files to be analyzed in the set of files to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications, and the field information to be analyzed in the field information groups to be analyzed comprises field names and field attribute values; according to the field names included in the file set to be analyzed, clustering each field information to be analyzed included in the file set to be analyzed to obtain a clustering field information set; selecting at least one clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table; clustering the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set; determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group; and according to a preset replacing encryption field table, carrying out encryption processing on the target file group to obtain an encrypted target file group.
In a second aspect, some embodiments of the present disclosure provide an information encryption apparatus, the apparatus including: the file analysis device comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is configured to respond to the detection of information representing a file selection request and acquire a set of files to be analyzed from a preset database, the files to be analyzed in the set of files to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications, and the field information to be analyzed in the field information groups to be analyzed comprises field names and field attribute values; the first clustering unit is configured to perform clustering processing on each field information to be analyzed included in the file set to be analyzed according to the field names included in the file set to be analyzed to obtain a clustering field information set; the selecting unit is configured to select at least one piece of clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table; the second clustering unit is configured to perform clustering processing on the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set; the determining unit is configured to determine a file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group; and the encryption unit is configured to encrypt the target file group according to a preset replacing encryption field table to obtain an encrypted target file group.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method described in any of the implementations of the first aspect.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium on which a computer program is stored, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect.
The above embodiments of the present disclosure have the following advantages: through the information encryption method of some embodiments of the present disclosure, the time for screening files is shortened, and particularly, a large amount of time is consumed because: the manual review has certain subjectivity, and when the selected files cannot meet the engineering construction requirements, the files need to be screened repeatedly, so that a large amount of time is consumed. Based on this, in the information encryption method of some embodiments of the present disclosure, first, in response to detecting information representing a file selection request, a set of files to be parsed is obtained from a preset database. The file to be analyzed in the file set to be analyzed comprises a file identifier and a field information group to be analyzed corresponding to the file identifier, and the field information to be analyzed in the field information group to be analyzed comprises a field name and a field attribute value. Therefore, data support is provided for subsequent file screening. Secondly, according to the field names included in the file set to be analyzed, clustering processing is carried out on each field information to be analyzed included in the file set to be analyzed, and a clustering field information group set is obtained. Therefore, the field information of the same type can be conveniently screened subsequently, and the screening time is preliminarily shortened. And then, selecting at least one piece of clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table. Therefore, the information table and the file identification table can be compared according to the preset fields, the clustering field information can be selected, and the subjectivity of manual examination is avoided. And then, according to the file identification corresponding to the target clustering field information in the target clustering field information set, clustering the target clustering field information set to obtain a target clustering field information set. And then, determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group. Therefore, the target file meeting the engineering construction requirements can be selected, repeated screening of the bid files is avoided, and the time for screening the files is shortened. And finally, according to a preset replacing encryption field table, encrypting the target file group to obtain an encrypted target file group. Therefore, the target file group is encrypted, and the safety of the target file group is improved.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
Fig. 1 is a schematic diagram of one application scenario of an information encryption method according to some embodiments of the present disclosure;
FIG. 2 is a flow diagram of some embodiments of an information encryption method according to the present disclosure;
FIG. 3 is a flow diagram of still further embodiments of information encryption methods according to the present disclosure;
FIG. 4 is a schematic block diagram of some embodiments of an information encryption apparatus according to the present disclosure;
FIG. 5 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of an information encryption method according to some embodiments of the present disclosure.
In the application scenario of fig. 1, first, the computing device 101 may obtain a set of files to be parsed 102 from a preset database in response to detecting information characterizing a file selection request. The file to be parsed in the file set 102 to be parsed includes a file identifier and a field information group to be parsed corresponding to the file identifier, and the field information to be parsed in the field information group to be parsed includes a field name and a field attribute value. Secondly, the computing device 101 may perform clustering processing on each to-be-analyzed field information included in the to-be-analyzed file set 102 according to the field names included in the to-be-analyzed file set 102, so as to obtain a clustered field information group set 103. Next, the computing device 101 may select at least one cluster field information from the cluster field information group 103 as a target cluster field information set 106 according to the preset field comparison information table 104 and the preset file identification table 105. Then, the computing device 101 may perform clustering processing on the target cluster field information set 106 according to the file identifier corresponding to the target cluster field information in the target cluster field information set 106, so as to obtain a target cluster field information group set 107. Then, the computing device 101 may determine the file to be parsed corresponding to each target cluster field information group in the target cluster field information group set 107 as a target file, so as to obtain a target file group 108. Finally, the computing device 101 may perform encryption processing on the target file group 108 according to a preset replacement encryption field table, so as to obtain an encrypted target file group 109.
The computing device 101 may be hardware or software. When the computing device is hardware, it may be implemented as a distributed cluster composed of multiple servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices enumerated above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of computing devices in FIG. 1 is merely illustrative. There may be any number of computing devices, as implementation needs dictate.
With continued reference to fig. 2, a flow 200 of some embodiments of an information encryption method according to the present disclosure is shown. The method may be performed by the computing device 101 of fig. 1. The information encryption method comprises the following steps:
step 201, in response to detecting information of a representation file selection request, obtaining a set of files to be analyzed from a preset database.
In some embodiments, an executing entity of the information encryption method (e.g., the computing device 101 shown in fig. 1) may obtain the set of files to be parsed from the preset database through a wired connection manner or a wireless connection manner in response to detecting the information characterizing the file selection request. The files to be analyzed in the file set to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications. The field information to be analyzed in the field information group to be analyzed comprises a field name and a field attribute value. Here, the preset database may refer to a local database. Here, the information characterizing the file selection request may refer to a file selection instruction acting on the set of files to be parsed. Here, the file identifier may be a user identifier characterizing the file to be parsed. Here, the field attribute value may refer to a numeric type of attribute value. Here, the field names in the field information group to be parsed may include, but are not limited to, at least one of: the number of engineers, the number of transport vehicles.
As an example, the set of files to be parsed may be:
[ AA users ] - { [ engineer number: 18 ]; [ number of transport vehicles: 12] };
[ BB Users ] - { [ Engineers quantity: 20 ]; [ number of transport vehicles: 8] };
[ CC Users ] - { [ Engineers quantity: 15 ]; [ number of transport vehicles: 9] };
[ DD user ] - { [ Engineer number: 22 ]; [ number of transport vehicles: 7]}.
Step 202, according to the field names included in the file set to be analyzed, clustering each field information to be analyzed included in the file set to be analyzed to obtain a cluster field information set.
In some embodiments, the execution subject may group the to-be-parsed field information included in each to-be-parsed field information included in the to-be-parsed file set into one type as a cluster field information group, so as to obtain a cluster field information group set. In practice, the execution main body may extract the to-be-analyzed field information with the same field name included in each to-be-analyzed field information included in the to-be-analyzed file set through a regular expression, and then group the extracted to-be-analyzed field information with the same field name into one type as a cluster field information group.
As an example, the field information to be parsed having the same field name "number of engineers" in the file set to be parsed illustrated in step 201 may be grouped into a category as a cluster field information group "[ number of engineers: 18 ]; [ number of engineers: 20 ]; [ number of engineers: 15 ]; [ number of engineers: 22]". The field information to be resolved with the same field name "number of transportation vehicles" in the file set to be resolved exemplified in step 201 may be grouped into a category as a cluster field information group "[ number of transportation vehicles: 12 ]; [ number of transport vehicles: 8 ]; [ number of transport vehicles: 9 ]; [ number of transport vehicles: 7]". Thus, a cluster field information group set is obtained:
{ [ number of engineers: 18 ]; [ number of engineers: 20 ]; [ number of engineers: 15 ]; [ number of engineers: 22] };
{ [ number of transport vehicles: 12 ]; [ number of transport vehicles: 8 ]; [ number of transport vehicles: 9 ]; [ number of transport vehicles: 7]}.
And 203, selecting at least one clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table.
In some embodiments, the execution subject may select at least one piece of cluster field information from the cluster field information group set as a target cluster field information set according to a preset field comparison information table and a preset file identification table. Here, the field comparison information in the field comparison information table includes a field comparison name and a field interception attribute value. Here, the field interception attribute value may refer to an attribute value of a numeric type. Here, the preset file identification table may be a preset table in which file identifications are stored.
In practice, the executing entity may select at least one cluster field information from the cluster field information group set as a target cluster field information set by the following steps:
first, selecting the cluster field information with the file identification corresponding to the cluster field information as the first cluster field information from the cluster field information group set, and obtaining a first cluster field information set. For example, the file identification table may be:
file identification
BB user
CC user
And secondly, executing the following processing steps for each first clustering field information in the first clustering field information set:
a first substep of determining whether or not a field attribute value included in the first cluster field information is greater than or equal to a field interception attribute value of field comparison information having a field name identical to a field name included in the first cluster field information. For example, the first cluster field information may be [ number of transport vehicles: 12]. The field comparison information table may be:
name of field comparison Field intercept attribute values
Number of engineering personnel 18
Number of transport vehicles 8
The field comparison information whose field name included in the field comparison information table is the same as the field name included in the first cluster field information may be [ number of transport vehicles: 8].
And a second sub-step of determining the first cluster field information as second cluster field information in response to determining that the first cluster field information is equal to or greater than the second cluster field information.
And thirdly, taking the determined second clustering field information as a target clustering field information set.
In some optional implementation manners of some embodiments, according to a preset field comparison information table and a preset file identification table, the executing entity may select at least one piece of cluster field information from the cluster field information group set as a target cluster field information set by:
step one, for each cluster field information group in the cluster field information group set, executing the following selection steps:
a first substep of selecting, from the field comparison information table, field comparison information including a field comparison name identical to a field name corresponding to the clustered field information group as target field comparison information. For example, the cluster field information set may be "{ [ number of transport vehicles: 12 ]; [ number of transport vehicles: 8 ]; [ number of transport vehicles: 9 ]; [ number of transport vehicles: 7]}". The field name corresponding to the cluster field information group is 'number of transport vehicles'. Thus, the field comparison information including the field comparison name identical to the field name "number of transport vehicles" can be selected as the target field comparison information from the above-described field comparison information table.
And a second substep of selecting the cluster field information with the field attribute value greater than or equal to the field interception attribute value included in the target field comparison information from the cluster field information group as alternative field information to obtain an alternative field information group.
And secondly, according to the file identification corresponding to the alternative field information in the selected alternative field information group, clustering each alternative field information included in the selected alternative field information group to obtain an alternative clustered field information group set. In practice, the execution subject may group the candidate field information with the same file identifier in the selected candidate field information group into one type as a candidate clustering field information group, so as to obtain a candidate clustering field information group set.
And thirdly, in response to the fact that the candidate cluster field information groups with the number of the candidate cluster field information included in the candidate cluster field information group being the same as the preset number exist in the candidate cluster field information group set, selecting the candidate cluster field information groups with the number of the candidate cluster field information included in the candidate cluster field information group being the same as the preset number from the candidate cluster field information group set as a first cluster field information group, and obtaining a first cluster field information group set. Here, the preset number may refer to the number of the field information to be parsed included in the field information group to be parsed. For example, the set of candidate cluster field information groups may be "{ [ number of engineers: 18 ]; [ number of transport vehicles: 12] }; { [ number of engineers: 20 ]; [ number of transport vehicles: 8] }; { [ number of engineers: 22]}". The preset number may be "2". Therefore, an alternative cluster field information group with the number of alternative cluster field information included in the alternative cluster field information group being the same as the preset number "2" can be selected from the alternative cluster field information group set as a first cluster field information group, and a first cluster field information group set "{ [ number of engineering staff: 18 ]; [ number of transport vehicles: 12] }; { [ number of engineers: 20 ]; [ number of transport vehicles: 8]}".
And fourthly, responding to the clustering field information corresponding to the file identification table in the clustering field information group set, and selecting the clustering field information corresponding to the file identification table from the clustering field information group set as second clustering field information to obtain a second clustering field information group. In practice, the execution subject may select, from the cluster field information group, cluster field information having a file identifier corresponding to the cluster field information and the same as the file identifier in the file identifier table as second cluster field information, to obtain a second cluster field information group.
And fifthly, combining each first clustering field information included by the first clustering field information group set and each second clustering field information included by the second clustering field information group to obtain a combined clustering field information set as a target clustering field information set. Here, the combining process may refer to a splicing process.
Therefore, comprehensive comparison of field names of the same type is achieved, the time for screening the files is shortened, and the efficiency of file screening is improved.
And 204, clustering the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information set.
In some embodiments, the executing entity may group, into one class, the target cluster field information having the same file identifier as the target cluster field information in the target cluster field information set, to obtain a target cluster field information group set.
Step 205, determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file, and obtaining a target file group.
In some embodiments, the executing entity may determine, as a target file, a file to be parsed corresponding to each target cluster field information group in the target cluster field information group set, to obtain a target file group.
And step 206, encrypting the target file group according to a preset replacing encryption field table to obtain an encrypted target file group.
In some embodiments, the execution main body may perform encryption processing on the target file group according to a preset replacement encryption field table to obtain an encrypted target file group. Here, the replacement encrypted field table may include field names and replacement field names corresponding to the field names. In practice, the execution main body may replace a field name included in each target file in the target file group with a replacement field name corresponding to the field name in the replacement encryption field table to generate a replaced target file, which is used as the encryption target file, so as to obtain the encryption target file group. Thereby, the encryption of the above-described target file group is completed.
The above embodiments of the present disclosure have the following advantages: through the information encryption method of some embodiments of the present disclosure, the time for screening files is shortened, and particularly, a large amount of time is consumed because: the manual review has certain subjectivity, and when the selected files cannot meet the engineering construction requirements, the files need to be screened repeatedly, so that a large amount of time is consumed. Based on this, in the information encryption method of some embodiments of the present disclosure, first, in response to detecting information representing a file selection request, a set of files to be parsed is obtained from a preset database. The file to be analyzed in the file set to be analyzed comprises a file identifier and a field information group to be analyzed corresponding to the file identifier, and the field information to be analyzed in the field information group to be analyzed comprises a field name and a field attribute value. Therefore, data support is provided for subsequent file screening. Secondly, according to the field names included in the file set to be analyzed, clustering processing is carried out on each field information to be analyzed included in the file set to be analyzed, and a clustering field information group set is obtained. Therefore, the field information of the same type can be conveniently screened subsequently, and the screening time is preliminarily shortened. And then, selecting at least one piece of clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table. Therefore, the information table and the file identification table can be compared according to the preset fields, the clustering field information can be selected, and the subjectivity of manual examination is avoided. And then, according to the file identification corresponding to the target clustering field information in the target clustering field information set, clustering the target clustering field information set to obtain a target clustering field information set. And then, determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group. Therefore, the target file meeting the engineering construction requirements can be selected, repeated screening of the bid files is avoided, and the time for screening the files is shortened. And finally, according to a preset replacing encryption field table, encrypting the target file group to obtain an encrypted target file group. Therefore, the target file group is encrypted, and the safety of the target file group is improved.
With further reference to fig. 3, a flow 300 of further embodiments of an information encryption method according to the present disclosure is shown. The method may be performed by the computing device 101 of fig. 1. The information encryption method comprises the following steps:
step 301, in response to detecting information of a representation file selection request, obtaining a set of files to be analyzed from a preset database.
Step 302, according to the field names included in the file set to be analyzed, clustering each field information to be analyzed included in the file set to be analyzed to obtain a cluster field information set.
And 303, selecting at least one piece of clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table.
And 304, clustering the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set.
Step 305, determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file, and obtaining a target file group.
In some embodiments, the specific implementation manner and technical effects of steps 301 and 305 may refer to steps 201 and 205 in those embodiments corresponding to fig. 2, which are not described herein again.
Step 306, according to the preset replacing encryption field table, executing the following encryption processing steps for each target file in the target file group: replacing each field name included in the target file with a replacement field name corresponding to the field name in the replacement encrypted field table; and performing discrete encryption processing on each field attribute value in the replaced target file.
In some embodiments, an execution subject of the information encryption method (for example, the computing device 101 shown in fig. 1) may perform the following encryption processing steps for each target file in the target file group according to a preset replacement encryption field table:
first, each field name included in the target file is replaced with a replacement field name corresponding to the field name in the replacement encrypted field table.
And secondly, performing discrete encryption processing on each field attribute value in the replaced target file. Here, the discrete encryption process may refer to discrete logarithm encryption.
Step 307, storing the encrypted target file group in a local database.
In some embodiments, the execution subject may store the encrypted target file group in a local database for subsequent invocation.
And 308, controlling the associated alarm equipment to alarm in response to the detection that the decryption request acting on the encrypted target file group fails and the number of times of the decryption request failure in the preset time length is greater than or equal to a preset threshold value.
In some embodiments, the execution subject may control an alarm device associated with the execution subject to perform an alarm operation in response to detecting that the decryption request applied to the encryption target file group fails and that the number of times of the decryption request failures within a preset time period is greater than or equal to a preset threshold. In practice, the execution main body may control the alarm device associated with the execution main body to perform alarm prompt tone reporting in response to detecting that the decryption request operation applied to the encryption target file group is unsuccessful and that the number of times of decryption request failures within a preset time period "1 minute" is greater than or equal to a preset threshold value "3 times".
The related content in step 306-308 serves as an inventive point of the present disclosure, thereby solving the technical problem mentioned in the background art that "because the file has sensitivity, the file is not encrypted, which may cause alteration or leakage of the bidding file information, and reduce the confidentiality and security of the file". Factors that reduce the confidentiality and security of a file tend to be as follows: because the file has sensitivity, the file is not encrypted, so that the file information can be changed or leaked, and the confidentiality and the safety of the file are reduced. If the factors are solved, the effect of improving the confidentiality and the safety of the file can be achieved. To achieve this effect, according to the present disclosure, first, each field name included in the target file is replaced with a replacement field name corresponding to the field name in the replacement encrypted field table. Thereby, encryption of the field name is completed. Then, discrete encryption processing is carried out on each field attribute value in the replaced target file. Thereby, encryption of the field value is completed. In addition, the field name and the field attribute value are encrypted in different modes, so that the confidentiality and the safety of the target file are greatly improved. And finally, controlling the associated alarm equipment to alarm in response to the detection that the decryption request acting on the encrypted target file group fails and the number of times of the decryption request failure in the preset time length is greater than or equal to a preset threshold value. Thereby, the possibility that the encryption target file group is cracked is reduced.
As can be seen from fig. 3, compared with the description of some embodiments corresponding to fig. 2, the process 300 of the information encryption method in some embodiments corresponding to fig. 3 first replaces each field name included in the target file with a replacement field name corresponding to the field name in the replacement encryption field table. Thereby, encryption of the field name is completed. Then, discrete encryption processing is carried out on each field attribute value in the replaced target file. Thereby, encryption of the field value is completed. In addition, the field name and the field attribute value are encrypted in different modes, so that the confidentiality and the safety of the target file are greatly improved. And finally, controlling the associated alarm equipment to alarm in response to the detection that the decryption request acting on the encrypted target file group fails and the number of times of the decryption request failure in the preset time length is greater than or equal to a preset threshold value. Thereby, the possibility that the encryption target file group is cracked is reduced.
With further reference to fig. 4, as an implementation of the methods shown in the above figures, the present disclosure provides some embodiments of an information encryption apparatus, which correspond to those of the method embodiments described above in fig. 2, and which may be applied in various electronic devices in particular.
As shown in fig. 4, the information encryption apparatus 400 of some embodiments includes: an acquisition unit 401, a first clustering unit 402, a selection unit 403, a second clustering unit 404, a determination unit 405, and an encryption unit 406. The obtaining unit 401 is configured to, in response to detecting information representing a file selection request, obtain a set of files to be parsed from a preset database, where a file to be parsed in the set of files to be parsed includes a file identifier and a field information group to be parsed corresponding to the file identifier, and the field information to be parsed in the field information group to be parsed includes a field name and a field attribute value; the first clustering unit 402 is configured to perform clustering processing on each to-be-analyzed field information included in the to-be-analyzed file set according to the field names included in the to-be-analyzed file set, so as to obtain a clustered field information set; the selecting unit 403 is configured to select at least one cluster field information from the cluster field information group set as a target cluster field information set according to a preset field comparison information table and a preset file identification table; the second clustering unit 404 is configured to perform clustering processing on the target clustering field information set according to a file identifier corresponding to target clustering field information in the target clustering field information set, so as to obtain a target clustering field information group set; the determining unit 405 is configured to determine a file to be parsed corresponding to each target cluster field information group in the target cluster field information group set as a target file, so as to obtain a target file group; the encryption unit 406 is configured to perform encryption processing on the target file group according to a preset replacement encryption field table, so as to obtain an encrypted target file group.
It will be understood that the elements described in the apparatus 400 correspond to various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 400 and the units included therein, and will not be described herein again.
Referring now to FIG. 5, a block diagram of an electronic device (e.g., computing device 101 of FIG. 1) 500 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 507 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 508 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 5 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program, when executed by the processing device 501, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the apparatus; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: responding to the detected information of the representation file selection request, and acquiring a set of files to be analyzed from a preset database, wherein the files to be analyzed in the set of files to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications, and the field information to be analyzed in the field information groups to be analyzed comprises field names and field attribute values; according to the field names included in the file set to be analyzed, clustering each field information to be analyzed included in the file set to be analyzed to obtain a clustering field information set; selecting at least one clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table; clustering the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set; determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group; and according to a preset replacing encryption field table, carrying out encryption processing on the target file group to obtain an encrypted target file group.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes an acquisition unit, a first clustering unit, a selection unit, a second clustering unit, a determination unit, and an encryption unit. The names of these units do not form a limitation on the unit itself in some cases, and for example, the encryption unit may also be described as "a unit that encrypts the target file group according to a preset replacement encryption field table to obtain an encrypted target file group".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (10)

1. An information encryption method comprising:
in response to the detection of information representing a file selection request, acquiring a set of files to be analyzed from a preset database, wherein the files to be analyzed in the set of files to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications, and the field information to be analyzed in the field information groups to be analyzed comprises field names and field attribute values;
according to the field names included in the file set to be analyzed, clustering information of all the fields to be analyzed included in the file set to be analyzed to obtain a cluster field information set;
selecting at least one clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table;
clustering the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set;
determining the file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group;
and according to a preset replacing encryption field table, encrypting the target file group to obtain an encrypted target file group.
2. The method according to claim 1, wherein the field comparison information in the field comparison information table comprises a field comparison name and a field interception attribute value; and
the selecting at least one cluster field information from the cluster field information group set as a target cluster field information set according to a preset field comparison information table and a preset file identification table comprises:
for each cluster field information group in the cluster field information group set, performing the following selection steps:
selecting field comparison information with the same field name as the field name corresponding to the cluster field information group from the field comparison information table as target field comparison information;
and selecting the cluster field information with the field attribute value greater than or equal to the field interception attribute value included in the target field comparison information from the cluster field information group as the alternative field information to obtain an alternative field information group.
3. The method according to claim 2, wherein the selecting at least one cluster field information from the cluster field information group set as a target cluster field information set according to a preset field comparison information table and a preset file identification table further comprises:
according to the file identification corresponding to the alternative field information in the selected alternative field information group, clustering each alternative field information included in the selected alternative field information group to obtain an alternative clustering field information group set;
and in response to the fact that the candidate cluster field information groups with the number of the candidate cluster field information included in the candidate cluster field information group being the same as the preset number exist in the candidate cluster field information group set, selecting the candidate cluster field information groups with the number of the candidate cluster field information included in the candidate cluster field information group being the same as the preset number from the candidate cluster field information group set as a first cluster field information group, and obtaining a first cluster field information group set.
4. The method according to claim 3, wherein the selecting at least one cluster field information from the cluster field information group set as a target cluster field information set according to a preset field comparison information table and a preset file identification table further comprises:
responding to the clustering field information set with clustering field information corresponding to the file identification table, and selecting the clustering field information corresponding to the file identification table from the clustering field information set as second clustering field information to obtain a second clustering field information set;
and combining each first clustering field information included in the first clustering field information group set and each second clustering field information included in the second clustering field information group to obtain a combined clustering field information set as a target clustering field information set.
5. The method of claim 1, wherein the replacement encrypted field table includes a field name and a replacement field name corresponding to the field name; and
the encrypting the target file group according to the preset replacing encryption field table comprises the following steps:
for each target file in the target file group, performing the following encryption processing steps:
replacing each field name included in the target file with a replacement field name corresponding to the field name in the replacement encryption field table;
and performing discrete encryption processing on each field attribute value in the replaced target file.
6. The method of claim 1, wherein the method further comprises:
and storing the encrypted target file group into a local database.
7. The method of claim 6, wherein the method further comprises:
and controlling the associated alarm equipment to perform alarm operation in response to the detection that the decryption request acting on the encrypted target file group fails and the number of times of the decryption request failure in the preset time length is greater than or equal to a preset threshold value.
8. An information encryption apparatus comprising:
the file analysis device comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is configured to respond to the detection of information representing a file selection request and acquire a set of files to be analyzed from a preset database, the files to be analyzed in the set of files to be analyzed comprise file identifications and field information groups to be analyzed corresponding to the file identifications, and the field information to be analyzed in the field information groups to be analyzed comprises field names and field attribute values;
the first clustering unit is configured to perform clustering processing on each field information to be analyzed included in the file set to be analyzed according to the field names included in the file set to be analyzed to obtain a clustering field information set;
the selecting unit is configured to select at least one piece of clustering field information from the clustering field information group set as a target clustering field information set according to a preset field comparison information table and a preset file identification table;
the second clustering unit is configured to cluster the target clustering field information set according to the file identification corresponding to the target clustering field information in the target clustering field information set to obtain a target clustering field information group set;
the determining unit is configured to determine a file to be analyzed corresponding to each target clustering field information group in the target clustering field information group set as a target file to obtain a target file group;
and the encryption unit is configured to encrypt the target file group according to a preset replacing encryption field table to obtain an encrypted target file group.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-7.
CN202110816893.7A 2021-07-20 2021-07-20 Information encryption method and device, electronic equipment and computer readable medium Active CN113268761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110816893.7A CN113268761B (en) 2021-07-20 2021-07-20 Information encryption method and device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110816893.7A CN113268761B (en) 2021-07-20 2021-07-20 Information encryption method and device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN113268761A true CN113268761A (en) 2021-08-17
CN113268761B CN113268761B (en) 2021-09-24

Family

ID=77236773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110816893.7A Active CN113268761B (en) 2021-07-20 2021-07-20 Information encryption method and device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN113268761B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189573A (en) * 2022-02-15 2022-03-15 中国汽车技术研究中心有限公司 CAN signal analysis method and system
CN114781351A (en) * 2022-04-07 2022-07-22 国网江苏省电力有限公司泰州供电分公司 Bidding file analysis method, device, equipment and medium based on electric power data
CN117151556A (en) * 2023-11-01 2023-12-01 南方电网科学研究院有限责任公司 Hardware comparison method and device for power equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100268714A1 (en) * 2007-12-21 2010-10-21 Korea Institute Of Science & Technology Infomation System and method for analysis of information
CN106295367A (en) * 2016-08-15 2017-01-04 北京奇虎科技有限公司 Data ciphering method and device
CN108924133A (en) * 2018-06-29 2018-11-30 北京明朝万达科技股份有限公司 A kind of network data leakage prevention method and system
CN109886047A (en) * 2019-03-21 2019-06-14 腾讯科技(深圳)有限公司 File encryption treating method and apparatus
CN110147655A (en) * 2019-03-28 2019-08-20 江苏通付盾信息安全技术有限公司 The security protection system and method for application program
CN111159386A (en) * 2019-11-26 2020-05-15 深圳壹账通智能科技有限公司 Data generation method and device, electronic equipment and storage medium
CN112733092A (en) * 2020-12-30 2021-04-30 五八有限公司 Information processing method and device
CN113032818A (en) * 2021-05-27 2021-06-25 北京国电通网络技术有限公司 Task encryption method and device, electronic equipment and computer readable medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100268714A1 (en) * 2007-12-21 2010-10-21 Korea Institute Of Science & Technology Infomation System and method for analysis of information
CN106295367A (en) * 2016-08-15 2017-01-04 北京奇虎科技有限公司 Data ciphering method and device
CN108924133A (en) * 2018-06-29 2018-11-30 北京明朝万达科技股份有限公司 A kind of network data leakage prevention method and system
CN109886047A (en) * 2019-03-21 2019-06-14 腾讯科技(深圳)有限公司 File encryption treating method and apparatus
CN110147655A (en) * 2019-03-28 2019-08-20 江苏通付盾信息安全技术有限公司 The security protection system and method for application program
CN111159386A (en) * 2019-11-26 2020-05-15 深圳壹账通智能科技有限公司 Data generation method and device, electronic equipment and storage medium
CN112733092A (en) * 2020-12-30 2021-04-30 五八有限公司 Information processing method and device
CN113032818A (en) * 2021-05-27 2021-06-25 北京国电通网络技术有限公司 Task encryption method and device, electronic equipment and computer readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邢晋搏: "文件加密算法及其在网络传输中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189573A (en) * 2022-02-15 2022-03-15 中国汽车技术研究中心有限公司 CAN signal analysis method and system
CN114781351A (en) * 2022-04-07 2022-07-22 国网江苏省电力有限公司泰州供电分公司 Bidding file analysis method, device, equipment and medium based on electric power data
CN114781351B (en) * 2022-04-07 2023-08-18 国网江苏省电力有限公司泰州供电分公司 Bid file analysis method, device, equipment and medium based on power data
CN117151556A (en) * 2023-11-01 2023-12-01 南方电网科学研究院有限责任公司 Hardware comparison method and device for power equipment
CN117151556B (en) * 2023-11-01 2024-01-30 南方电网科学研究院有限责任公司 Hardware comparison method and device for power equipment

Also Published As

Publication number Publication date
CN113268761B (en) 2021-09-24

Similar Documents

Publication Publication Date Title
CN113268761B (en) Information encryption method and device, electronic equipment and computer readable medium
WO2021203919A1 (en) Method and apparatus for evaluating joint training model
CN112491859B (en) Domain name certificate detection method, device, electronic equipment and computer readable medium
CN113032818B (en) Task encryption method and device, electronic equipment and computer readable medium
CN117156012B (en) Exception request data processing method, device, equipment and computer readable medium
CN114928574B (en) Information transmission method, apparatus, electronic device, and computer-readable medium
CN113190517B (en) Data integration method and device, electronic equipment and computer readable medium
CN116361121A (en) Abnormal interface alarm method, device, electronic equipment and computer readable medium
CN116150249A (en) Table data export method, apparatus, electronic device and computer readable medium
CN113761553A (en) Menu batch authorization method and device, electronic equipment and computer readable medium
CN111598544A (en) Method and apparatus for processing information
CN112579428A (en) Interface testing method and device, electronic equipment and storage medium
CN112579717B (en) Method and device for displaying user address on electronic map
CN115309612B (en) Method and device for monitoring data
CN112632542B (en) Application program detection file dynamic adjustment method and device, electronic equipment and medium
CN116702168B (en) Method, device, electronic equipment and computer readable medium for detecting supply end information
CN113077352B (en) Insurance service article recommending method based on user information and insurance related information
CN114356176A (en) Data acquisition method, data acquisition system, data acquisition equipment and data acquisition medium
CN111835846B (en) Information updating method and device and electronic equipment
CN117390658A (en) Data security engine, data security access system and access method
CN115952522A (en) System interaction method and device
CN111930704A (en) Service alarm equipment control method, device, equipment and computer readable medium
CN117807167A (en) Database table copying method, apparatus, electronic device and computer readable medium
CN117786187A (en) Metadata information processing method, apparatus, electronic device, and computer readable medium
CN113761567A (en) Data encryption method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231114

Address after: Building 4, Dongxu International Center, yard 2, sihezhuang Road, Fengtai District, Beijing 100070 (South Building of block a)

Patentee after: BEIJING GUODIANTONG NETWORK TECHNOLOGY Co.,Ltd.

Patentee after: State Grid Siji Location Service Co.,Ltd.

Address before: 100107 32-3-4108-4109, building 32, Chuangye Middle Road, Haidian District, Beijing

Patentee before: BEIJING GUODIANTONG NETWORK TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right