CN113595728B - Space-time data file transmission method, device, storage medium and system - Google Patents

Space-time data file transmission method, device, storage medium and system Download PDF

Info

Publication number
CN113595728B
CN113595728B CN202111125783.2A CN202111125783A CN113595728B CN 113595728 B CN113595728 B CN 113595728B CN 202111125783 A CN202111125783 A CN 202111125783A CN 113595728 B CN113595728 B CN 113595728B
Authority
CN
China
Prior art keywords
mapping
key
secret key
data file
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111125783.2A
Other languages
Chinese (zh)
Other versions
CN113595728A (en
Inventor
朱与墨
田鹏飞
吴丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yijing Zhilian (Suzhou) Technology Co.,Ltd.
Original Assignee
Yijing Zhilian Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yijing Zhilian Beijing Technology Co Ltd filed Critical Yijing Zhilian Beijing Technology Co Ltd
Priority to CN202111125783.2A priority Critical patent/CN113595728B/en
Publication of CN113595728A publication Critical patent/CN113595728A/en
Application granted granted Critical
Publication of CN113595728B publication Critical patent/CN113595728B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a space-time data file transmission method, which mainly comprises the following steps: acquiring a key table of an XXTEA algorithm; dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table; and correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end. And encrypting the space-time data file according to the calculation of the XXTEA algorithm through the mapping relation between the key characters of the XXTEA algorithm and the geographic codes, thereby improving the transmission safety of the space-time data file. The application also provides a device and a system for transmitting the spatio-temporal data file and a storage medium.

Description

Space-time data file transmission method, device, storage medium and system
Technical Field
The application provides a spatio-temporal data file transmission technology, and particularly relates to a spatio-temporal data file transmission method. The application also relates to a spatio-temporal data file transmission device, a storage medium and a spatio-temporal data file transmission system.
Background
At present, data encryption transmission is only encryption transmission of data, but with the development of various cracking technologies, the requirement of data security transmission cannot be met only through data encryption. In the prior art, various encryption and decryption data transmission methods are either simple or complex, wherein the simple encryption method cannot resist the decryption of an attacker, and the complex encryption method leads to a complex encryption and decryption process, so that the safety in the data transmission process cannot be guaranteed, or the complex encryption and decryption process slows down the data transmission speed.
Disclosure of Invention
The application provides a space-time data file transmission method which can solve the problem that a simple encryption method is unreliable in the data transmission process. The application also provides a spatio-temporal data file transmission device, a storage medium and a spatio-temporal data file transmission system.
The application provides a space-time data file transmission method, which comprises the following steps:
acquiring a key table of an XXTEA algorithm;
dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table;
and correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end.
Optionally, the calculating of the key character includes: a shift operation or an exclusive or operation.
Optionally, a password comparison table is generated according to the shift operation or the xor operation;
and the receiving end decrypts the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table.
Optionally, the second mapping between the key characters in the key table and the codes in the geocode table includes:
intercepting the last four-digit character of the code, and mapping the last four-digit character with the secret key character.
The present application further provides a spatiotemporal data file transmission device, comprising:
the acquisition module is used for acquiring a key table of an XXTEA algorithm;
the mapping module is used for dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table;
and the calculation module is used for correspondingly encrypting the plaintext containing the geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end.
Optionally, the calculating of the key character includes: a shift operation or an exclusive or operation.
Optionally, the computing module further includes:
the comparison table unit is used for generating a password comparison table according to the shift operation or the exclusive OR operation;
and the receiving end decrypts the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table.
Optionally, the second mapping between the key characters in the key table and the codes in the geocode table includes:
intercepting the last four-digit character of the code, and mapping the last four-digit character with the secret key character.
The present application also provides a storage medium comprising: a computer program for executing the above-described spatiotemporal data file transmission method is stored.
The present application further provides a system for transmitting spatiotemporal data files, comprising: the space-time data file transmission device executes the space-time data file transmission method.
The application has the advantages relative to the prior art:
the application provides a space-time data file transmission method, which comprises the following steps: acquiring a key table of an XXTEA algorithm; dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table; and correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end. According to the space-time data file transmission method and device, the secret key characters and the geographic coding mapping of the XXTEA algorithm are used, the space-time data file is correspondingly encrypted through calculation of the XXTEA algorithm, the space-time data file used for transmission is encrypted through a simple mode, and the transmission safety of the space-time data file is improved.
Drawings
FIG. 1 is a flow chart of spatiotemporal data file transmission in the present application.
Fig. 2 is a schematic diagram of a mapping of key characters and codes in the present application.
FIG. 3 is a schematic diagram of a spatiotemporal data file transfer device according to the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, but the present application may be implemented in many ways other than those described herein, and it will be apparent to those of ordinary skill in the art that the present application is not limited to the specific implementations disclosed below without departing from the spirit of the present application.
The application discloses a space-time data file transmission method, which mainly comprises the following steps: acquiring a key table of an XXTEA algorithm; dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table; and correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end. And encrypting the space-time data file according to the calculation of the XXTEA algorithm through the mapping relation between the key characters of the XXTEA algorithm and the geographic codes, thereby improving the transmission safety of the space-time data file.
FIG. 1 is a flow chart of spatiotemporal data file transmission in the present application.
Referring to fig. 1, S101 obtains a key table of the XXTEA algorithm.
The present application encrypts data primarily through the XXTEA algorithm, which is an improved version of the TEA algorithm.
The TEA algorithm was originally designed by DavidWheeler and roger needham, cambridge computer laboratories in 1994. The algorithm uses a 128-bit key table for encryption of 64-bit blocks of information, which requires 64 iterations. The algorithm uses a constant δ as a multiple, which is defined herein as δ = "(√ 5-1) 231", i.e., δ =0 × 9E3779B 9. The XXTEA algorithm is the latest variant of the TEA algorithm and was proposed in 1998.
In the present application, first, a key table of the XXTEA algorithm needs to be obtained.
S102 divides the key table into four sub-key tables, performs a first mapping between the sub-key tables and the geocode table, and performs a second mapping between key characters in the key table and codes in the geocode table.
After the key table is obtained, the key table is divided to form four sub-key tables, each sub-key table contains a certain number of key characters, for example, 128-bit key characters are divided into four groups to form four sub-key tables, and each sub-key character contains 32 bits.
The present application may also segment the key table as follows. Calculating a p value according to a key table division formula, wherein the key table division formula comprises:
p=[(s-4n)/5-0.5]
wherein, the [ ] number means that when the absolute value of the formula is less than 0.5, the whole is taken down; rounding up when the absolute value of the formula is greater than 0.5, and then adding the sign of the formula result. p is a classification parameter, s is the value of each bit in a 128-bit key table, 4n is the nearest integer to s, i.e.: when s-4 (n-1) > 4; 4 (n + 1) -s > 4.
And judging the size of p, if p = -1, classifying the size into a first sub-key table, if p = -0, classifying the size into a second sub-key table, if p =0, classifying the size into a third sub-key table, and if p =1, classifying the size into a fourth key table. And if the sub-key table reaches 32 bits, stopping adding new bits, and continuing adding 1 to the s and then performing the distribution.
After the step is executed, the spatiotemporal data file to be encrypted is obtained. The spatio-temporal data file has temporal and spatial attributes, and the codes of the temporal and spatial attributes are extracted to generate a geocode table.
Fig. 2 is a schematic diagram of a mapping of key characters and codes in the present application.
Referring to a in fig. 2, after four sub-key tables and geocode tables are obtained, a unique association relationship is established between each sub-key table and geocode table to form a mapping relationship, i.e., mapping for the first time is performed.
Referring to fig. 2 b, the key characters in the sub-key table are then associated with the codes in the geocode table to form a second mapping relationship, i.e., the second mapping is performed. Specifically, in the second mapping, the last four bits of the code are intercepted, and then the last four bits are mapped with the key character.
S103, correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end.
After the first mapping relationship and the second mapping relationship are established, the key characters and codes have unique corresponding relationships, and then the space-time data file can be encrypted according to an XXTEA algorithm.
In this application, the calculation of the XXTEA algorithm includes: a shift operation and an exclusive or operation. The shift operation is to shift to a certain direction, for example > >2, which may indicate to shift 2 bits to the right; <2 can mean a left shift by two bits. The exclusive-or operation can be expressed as: when the two elements are the same, the output is 1, and when the two elements are different, the output element is 0, for example, a ≧ a = 1; a ≦ b = 0.
And the XXTEA algorithm carries out displacement or XOR operation on the key characters, and the codes are correspondingly changed according to the corresponding relation between the key characters and the codes in the first mapping and the second mapping, so that the purpose of encrypting the space-time data file is achieved. Specifically, when the XXTEA algorithm calculates the key character, the geocoded spatiotemporal data is subjected to corresponding calculation operation according to a first mapping relationship and a second mapping relationship.
And finally, sending the encrypted spatiotemporal data file to a receiving end.
In the present application, a password comparison table is generated according to the shift operation or the xor operation, and the password comparison table records the rule of the shift operation or the xor operation. And the receiving end reversely calculates the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table so as to decrypt the plaintext.
The present application further provides a spatiotemporal data file transmission device, comprising: an acquisition module 201, a mapping module 202 and a calculation module 203.
FIG. 2 is a schematic diagram of a spatiotemporal data file transfer apparatus according to the present application.
Referring to fig. 2, an obtaining module 201 is used for obtaining a key table of the XXTEA algorithm.
The present application encrypts data primarily through the XXTEA algorithm, which is an improved version of the TEA algorithm.
The TEA algorithm was originally designed by DavidWheeler and roger needham, cambridge computer laboratories in 1994. The algorithm uses a 128-bit key table for encryption of 64-bit blocks of information, which requires 64 iterations. The algorithm uses a constant δ as a multiple, which is defined herein as δ = "(√ 5-1) 231", i.e., δ =0 × 9E3779B 9. The XXTEA algorithm is the latest variant of the TEA algorithm and was proposed in 1998.
In the present application, first, a key table of the XXTEA algorithm needs to be obtained.
The mapping module 202 is configured to divide the key table into four sub-key tables, perform first mapping on the sub-key tables and the geocode table, and perform second mapping on key characters in the key table and codes in the geocode table.
After the key table is obtained, the key table is divided to form four sub-key tables, each sub-key table contains a certain number of key characters, for example, 128-bit key characters are divided into four groups to form four sub-key tables, and each sub-key character contains 32 bits.
The present application may also segment the key table as follows. Calculating a p value according to a key table division formula, wherein the key table division formula comprises:
p=[(s-4n)/5-0.5]
wherein, the [ ] number means that when the absolute value of the formula is less than 0.5, the whole is taken down; rounding up when the absolute value of the formula is greater than 0.5, and then adding the sign of the formula result. p is a classification parameter, s is the value of each bit in a 128-bit key table, 4n is the nearest integer to s, i.e.: when s-4 (n-1) > 4; 4 (n + 1) -s > 4.
And judging the size of p, if p = -1, classifying the size into a first sub-key table, if p = -0, classifying the size into a second sub-key table, if p =0, classifying the size into a third sub-key table, and if p =1, classifying the size into a fourth key table. And if the sub-key table reaches 32 bits, stopping adding new bits, and continuing adding 1 to the s and then performing the distribution.
After the step is executed, the spatiotemporal data file to be encrypted is obtained. The spatio-temporal data file has temporal and spatial attributes, and the codes of the temporal and spatial attributes are extracted to generate a geocode table.
Fig. 2 is a schematic diagram of a mapping of key characters and codes in the present application.
Referring to a in fig. 2, after four sub-key tables and geocode tables are obtained, a unique association relationship is established between each sub-key table and geocode table to form a mapping relationship, i.e., mapping for the first time is performed.
Referring to fig. 2 b, the key characters in the sub-key table are then associated with the codes in the geocode table to form a second mapping relationship, i.e., the second mapping is performed. Specifically, in the second mapping, the last four bits of the code are intercepted, and then the last four bits are mapped with the key character.
A calculating module 203, configured to encrypt plaintext including geographic information correspondingly according to the first mapping, the second mapping, and the calculation of the key character by the XXTEA algorithm, and send the encrypted plaintext to a receiving end.
After the first mapping relationship and the second mapping relationship are established, the key characters and codes have unique corresponding relationships, and then the space-time data file can be encrypted according to an XXTEA algorithm.
In this application, the calculation of the XXTEA algorithm includes: a shift operation and an exclusive or operation. The shift operation is to shift to a certain direction, for example > >2, which may indicate to shift 2 bits to the right; <2 can mean a left shift by two bits. The exclusive-or operation can be expressed as: when the two elements are the same, the output is 1, and when the two elements are different, the output element is 0, for example, a ≧ a = 1; a ≦ b = 0.
And the XXTEA algorithm carries out displacement or XOR operation on the key characters, and the codes are correspondingly changed according to the corresponding relation between the key characters and the codes in the first mapping and the second mapping, so that the purpose of encrypting the space-time data file is achieved. Specifically, when the XXTEA algorithm calculates the key character, the geocoded spatiotemporal data is subjected to corresponding calculation operation according to a first mapping relationship and a second mapping relationship.
And finally, sending the encrypted spatiotemporal data file to a receiving end.
In the present application, a password comparison table is generated according to the shift operation or the xor operation, and the password comparison table records the rule of the shift operation or the xor operation. And the receiving end reversely calculates the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table so as to decrypt the plaintext.
The present application also provides a storage medium storing a computer program of a spatiotemporal data file transfer method.
The present application also provides a spatiotemporal data file transmission system comprising a spatiotemporal data file transmission apparatus which performs a spatiotemporal data transmission method.

Claims (10)

1. A method for transmitting spatio-temporal data files, comprising:
acquiring a key table of an XXTEA algorithm;
dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table;
and correspondingly encrypting the plaintext containing geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end.
2. The method of claim 1, wherein the computing the key characters comprises: a shift operation or an exclusive or operation.
3. The method for transmitting spatio-temporal data files according to claim 2, characterized in that a password look-up table is generated according to the shift operation or the exclusive or operation;
and the receiving end decrypts the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table.
4. The method for transmitting spatio-temporal data files according to claim 1, wherein said second mapping of key characters in the key table to codes in the geocode table comprises:
intercepting the last four-digit character of the code, and mapping the last four-digit character with the secret key character.
5. A spatiotemporal data file transfer apparatus, comprising:
the acquisition module is used for acquiring a key table of an XXTEA algorithm;
the mapping module is used for dividing the secret key table into four sub secret key tables, performing first mapping on the sub secret key tables and the geographic coding table, and performing second mapping on secret key characters in the secret key tables and codes in the geographic coding table;
and the calculation module is used for correspondingly encrypting the plaintext containing the geographic information according to the first mapping, the second mapping and the calculation of the XXTEA algorithm on the key characters, and sending the encrypted plaintext to a receiving end.
6. The apparatus for spatiotemporal data file transfer as defined in claim 5, wherein the computing of the key characters comprises: a shift operation or an exclusive or operation.
7. The spatiotemporal data file transmission device according to claim 6, wherein the computation module further comprises:
the comparison table unit is used for generating a password comparison table according to the shift operation or the exclusive OR operation;
and the receiving end decrypts the encrypted plaintext according to the XXYEA algorithm and the first mapping and the second mapping through the password comparison table.
8. The apparatus for transmitting spatiotemporal data files according to claim 5, wherein said second mapping of key characters in said key table to codes in said geocode table comprises:
intercepting the last four-digit character of the code, and mapping the last four-digit character with the secret key character.
9. A storage medium, comprising: a computer program for executing the method for transmitting spatiotemporal data files according to any one of claims 1 to 4 is stored.
10. A spatiotemporal data file transfer system, comprising: the transmission apparatus of spatio-temporal data file according to any one of claims 5 to 8, which performs the transmission method of spatio-temporal data file according to any one of claims 1 to 4.
CN202111125783.2A 2021-09-26 2021-09-26 Space-time data file transmission method, device, storage medium and system Active CN113595728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111125783.2A CN113595728B (en) 2021-09-26 2021-09-26 Space-time data file transmission method, device, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111125783.2A CN113595728B (en) 2021-09-26 2021-09-26 Space-time data file transmission method, device, storage medium and system

Publications (2)

Publication Number Publication Date
CN113595728A CN113595728A (en) 2021-11-02
CN113595728B true CN113595728B (en) 2021-11-30

Family

ID=78242267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111125783.2A Active CN113595728B (en) 2021-09-26 2021-09-26 Space-time data file transmission method, device, storage medium and system

Country Status (1)

Country Link
CN (1) CN113595728B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519038A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic Processing device and system of data
CN111917688A (en) * 2019-05-08 2020-11-10 北京奇虎科技有限公司 Method, device and system for transmitting encrypted data through cloud platform
CN112910861A (en) * 2021-01-19 2021-06-04 浙江大学 Group authentication and segmented authentication-based authentication method for terminal equipment of power internet of things

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238002A (en) * 2010-04-30 2011-11-09 国际商业机器公司 Dynamic encryption and decryption methods and equipment for network communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917688A (en) * 2019-05-08 2020-11-10 北京奇虎科技有限公司 Method, device and system for transmitting encrypted data through cloud platform
CN110519038A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic Processing device and system of data
CN112910861A (en) * 2021-01-19 2021-06-04 浙江大学 Group authentication and segmented authentication-based authentication method for terminal equipment of power internet of things

Also Published As

Publication number Publication date
CN113595728A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN102546600B (en) Deputy-based encryption, decryption method, network equipment, network device and system
CA2754268C (en) Split key secure access system
CN105245505A (en) Data transmitting method and device, data receiving method and device, and receiving-transmitting system
JP2020513183A (en) Data tokenization
EP0725511A2 (en) Method for data encryption/decryption using cipher block chaining (CBC) and message authetication codes (MAC)
CN101262341A (en) A mixed encryption method in session system
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
US8180048B2 (en) Method and system for computational transformation
US7894608B2 (en) Secure approach to send data from one system to another
CN110263570B (en) Gene data desensitization method for realizing efficient similarity query and access control
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN112738051A (en) Data information encryption method, system and computer readable storage medium
CN108063760B (en) Method and system for block encryption and method for block decryption
CN102394746B (en) Data transmission method of weighing system based on digital sensor
KR101575681B1 (en) Method of attribute-based encryption
CN113595728B (en) Space-time data file transmission method, device, storage medium and system
CN113746642B (en) Method and system for communication between computers
CN115118416A (en) Distributed database system based on privacy protection and confidentiality method
US20130058483A1 (en) Public key cryptosystem and technique
KR20090079028A (en) Methods and apparatuses for cipher indexing in order to effective search of ciphered-database
CN114374518A (en) PSI intersection information acquisition method and device with intersection counting function
US6798884B1 (en) Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
US20170126399A1 (en) Encryption apparatus, storage system, decryption apparatus, encryption method, decryption method, and computer readable medium
CN106357391B (en) Secure information decentralized encryption algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 1101, Floor 11, Office Building B, Suzhou Bay Central Plaza, 99 Youxiang Road, Wuzhong District, Suzhou, Jiangsu

Patentee after: Yijing Zhilian (Suzhou) Technology Co.,Ltd.

Address before: 3015, 3 / F, 6 Chuangye Road, Shangdi Information Industry base, Haidian District, Beijing 100085

Patentee before: Yijing Zhilian (Beijing) Technology Co.,Ltd.

CP03 Change of name, title or address