CN114707166A - Data storage and reading method, device, equipment and storage medium - Google Patents

Data storage and reading method, device, equipment and storage medium Download PDF

Info

Publication number
CN114707166A
CN114707166A CN202210372187.2A CN202210372187A CN114707166A CN 114707166 A CN114707166 A CN 114707166A CN 202210372187 A CN202210372187 A CN 202210372187A CN 114707166 A CN114707166 A CN 114707166A
Authority
CN
China
Prior art keywords
data
storage
stored
fragment group
code value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210372187.2A
Other languages
Chinese (zh)
Inventor
罗紫林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An International Smart City Technology Co Ltd
Original Assignee
Ping An International Smart City Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An International Smart City Technology Co Ltd filed Critical Ping An International Smart City Technology Co Ltd
Priority to CN202210372187.2A priority Critical patent/CN114707166A/en
Publication of CN114707166A publication Critical patent/CN114707166A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of big data, and discloses a data storage and reading method, a data storage and reading device, data storage and reading equipment and a storage medium. The method comprises the following steps: acquiring data to be stored and a corresponding user identifier, and segmenting the data to be stored to obtain a fragment group corresponding to the data to be stored; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier. The method and the device improve the safety degree of storage and management of the user privacy data.

Description

Data storage and reading method, device, equipment and storage medium
Technical Field
The present invention relates to the field of artificial intelligence, and in particular, to a data storage and reading method, apparatus, device, and storage medium.
Background
In the era of big data and cloud computing, people have more and more data, and with the increase of the demand for large-capacity storage and the rapid development of storage technology, data is often stored on a cloud storage server in order to facilitate data acquisition, data storage, mobile office work and the like. However, when the private data is stored in the third-party cloud storage server, if the data is not effectively encrypted for storage and supervised during storage, the stored private data of the user is likely to be leaked, and the security of the private data of the user is difficult to be ensured.
At present, the technology of safe storage of data is mainly that space is replaced by time, that is, before massive user data is stored in a specific database, a specific data encryption mode is adopted to perform complex encryption processing on the user data, the encrypted data is further stored, a corresponding data supervision mechanism is set, and if data are illegally acquired, cracking is performed and the massive data can be found out for a certain time to protect the safety of the data when the data are required by illegal personnel are acquired. However, the method also easily causes the problem of higher difficulty in supervision technologies such as monitoring and self-theft, namely, the security of the existing method for protecting the private data is lower.
Disclosure of Invention
The invention mainly aims to solve the problem that the existing protection method for private data is low in safety.
The first aspect of the present invention provides a data storage method, including: acquiring data to be stored and a corresponding user identifier, and segmenting the data to be stored to obtain a fragment group corresponding to the data to be stored; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
Optionally, in a first implementation manner of the first aspect of the present invention, the segmenting the data to be stored to obtain a fragment group corresponding to the data to be stored includes: extracting file format identifiers in the data to be stored, and determining a plurality of file formats contained in the data to be stored according to the file format identifiers; classifying the data to be stored according to the file format, and dividing the classified data to be stored into a plurality of data segments by adopting a preset division algorithm; and generating a fragment group corresponding to the data to be stored based on each data fragment.
Optionally, in a second implementation manner of the first aspect of the present invention, the randomly storing the fragment groups into a preset database includes: determining the security level of the fragment group, and selecting a fragment group combination corresponding to the security level and stored in history from a preset database; carrying out storage identification on each fragment group, and randomly splicing the identified fragment groups to the fragment group combination; and storing the fragment groups after the fragment groups are spliced into the database in a combined manner.
Optionally, in a third implementation manner of the first aspect of the present invention, the calculating, by using a preset dynamic hash algorithm, location information of each piece of data in the fragment group in the database includes: performing hash transformation on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group; identifying initial position information of each piece of data in the hash fragment group in the fragment group combination; and carrying out serialization processing on the initial position information to obtain the position information of each piece of data in the fragment group in the database.
Optionally, in a fourth implementation manner of the first aspect of the present invention, the user identifier includes a sending user identifier and a receiving user identifier, and encrypting the location information by using the user identifier to generate a corresponding storage code value combination and a storage identifier and push the storage code value combination and the storage identifier, including: connecting the sending user identification with the receiving user identification to obtain a connection identifier; encrypting the position information by adopting the connection identifier to generate a plurality of corresponding storage code values and storage identifications; selecting one of the plurality of storage code values as a selected code value, and selecting other storage code values except the selected code value from the plurality of storage code values as a defensive code value; and generating a storage code value combination based on the selected code value and the defensive code value, and pushing the storage code value combination and the storage identifier.
A second aspect of the present invention provides a data reading method, including: acquiring a data reading request, and extracting a storage identifier and an input storage code value input in the data reading request; inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group; if so, carrying out decryption and deserialization processing on the input stored code value to obtain position information corresponding to the target fragment group; and reading and combining all the data in the target fragment group according to the position information corresponding to the target fragment group to obtain response data corresponding to the data reading request.
A third aspect of the present invention provides a data storage apparatus comprising: the data storage device includes: the data segmentation module is used for acquiring data to be stored and corresponding user identification, and segmenting the data to be stored to obtain fragment groups corresponding to the data to be stored; the position calculation module is used for randomly storing the fragment group into a preset database and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and the data pushing module is used for encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
Optionally, in a first implementation manner of the third aspect of the present invention, the data partitioning module includes: the identification extraction unit is used for extracting file format identifications in the data to be stored and determining a plurality of file formats contained in the data to be stored according to the file format identifications; the data dividing unit is used for classifying the data to be stored according to the file format and dividing the classified data to be stored into a plurality of data segments by adopting a preset dividing algorithm; and generating a fragment group corresponding to the data to be stored based on each data fragment.
Optionally, in a second implementation manner of the third aspect of the present invention, the position calculating module includes: the grade selecting unit is used for determining the safety grade of the fragment group and selecting a fragment group combination corresponding to the safety grade and stored in history from a preset database; the fragment combination unit is used for carrying out storage identification on each fragment group and randomly splicing the identified fragment groups to the fragment group combination; and the fragment storage unit is used for storing the fragment groups after the fragment groups are spliced into the database in a combined manner.
Optionally, in a third implementation manner of the third aspect of the present invention, the position calculating module further includes: the hash transformation unit is used for carrying out hash transformation on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group; a position identification unit, configured to identify initial position information of each piece of data in the hash fragment group in the fragment group combination; and the serialization processing unit is used for carrying out serialization processing on the initial position information to obtain the position information of each piece of data in the fragment group in the database.
Optionally, in a fourth implementation manner of the third aspect of the present invention, the data pushing module includes: the identification connecting unit is used for connecting the sending user identification with the receiving user identification to obtain a connection identifier; the information encryption unit is used for encrypting the position information by adopting the connection identifier to generate a plurality of corresponding storage code values and storage identifiers; the code value selecting unit is used for selecting one of the plurality of storage code values as a selected code value and selecting other storage code values except the selected code value from the plurality of storage code values as defensive code values; and the information pushing unit is used for generating a storage code value combination based on the selected code value and the defensive code value and pushing the storage code value combination and the storage identifier.
A fourth aspect of the present invention provides a data reading apparatus comprising: the identification extraction module is used for acquiring a data reading request and extracting a storage identification and an input storage code value which are input in the data reading request; the fragment query module is used for querying a target fragment group associated with the input storage identifier in a preset database and judging whether the input storage code value is a selected code value corresponding to the target fragment group; the code value calculation module is used for carrying out decryption and deserialization processing on the input stored code value if the input stored code value is the target fragment group, so as to obtain position information corresponding to the target fragment group; and the data reading module is used for reading and combining all the data in the target fragment group according to the position information corresponding to the target fragment group to obtain response data corresponding to the data reading request.
A fifth aspect of the present invention provides a computer apparatus comprising: a memory and at least one processor, the memory having instructions stored therein; the at least one processor invokes the instructions in the memory to cause the data storage device to perform the steps of the data storage method described above.
A sixth aspect of the present invention provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the steps of the above-described data storage method.
According to the technical scheme, data to be stored and corresponding user identification are obtained, the data to be stored are segmented, and fragment groups corresponding to the data to be stored are obtained; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier. The data reading request is obtained, and the storage identification and the input storage code value input in the data reading request are extracted; inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group; if so, decrypting and deserializing the input stored code value to obtain position information corresponding to the target fragment group; and reading each piece of data in the target fragment group according to the position information corresponding to the target fragment group, and combining the data to obtain response data corresponding to the data reading request. Compared with the prior art, the data to be stored are subjected to data segmentation, the fragment group corresponding to the obtained data to be stored is stored in the preset database, and then hash transformation, position information calculation and encryption processing are carried out on the fragment group data, so that the corresponding storage code value combination and the storage identifier are generated and pushed. And generating a corresponding reading method through a storage method, and extracting data corresponding to the user request. The data to be stored is stored in a huge database in a hidden manner, so that the data is stored and read, and the safety of user data is ensured.
Drawings
FIG. 1 is a schematic diagram of a first embodiment of a data storage method according to an embodiment of the present invention;
FIG. 2 is a diagram of a second embodiment of a data storage method according to an embodiment of the present invention;
FIG. 3 is a diagram of a third embodiment of a data storage method according to an embodiment of the present invention;
FIG. 4 is a diagram of a fourth embodiment of a data storage method according to an embodiment of the present invention;
FIG. 5 is a diagram of an embodiment of a data reading method according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an embodiment of a data storage device in an embodiment of the invention;
FIG. 7 is a schematic diagram of another embodiment of a data storage device in an embodiment of the invention;
FIG. 8 is a schematic diagram of an embodiment of a data reading apparatus according to the present invention;
FIG. 9 is a diagram of an embodiment of a computer device in an embodiment of the invention.
Detailed Description
The embodiment of the invention provides a data storage and reading method, a data storage and reading device, data storage equipment and a data storage medium, wherein the method comprises the following steps: acquiring data to be stored and a corresponding user identifier, and segmenting the data to be stored to obtain a fragment group corresponding to the data to be stored; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier. The method and the device improve the safety degree of storage and management of the user privacy data.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and referring to fig. 1, a first embodiment of a data storage method in the embodiment of the present invention includes:
101. acquiring data to be stored and corresponding user identification, and segmenting the data to be stored to obtain fragment groups corresponding to the data to be stored;
it is to be understood that the execution subject of the present invention may be a data storage device, and may also be a terminal or a server, which is not limited herein. The embodiment of the present invention is described by taking a server as an execution subject.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
In this embodiment, the user identifier refers to identity characteristic information of a user, such as a self-set login name, identity card information, a certificate number, and the like used by the user to log in; the fragment group herein refers to a data fragment block set, for example, on a public server group, anyone has a right to read all data therein without any limitation, and the server stores a large amount of human books (or users upload or customize their own texts), and splits the stored mass data into random fragment blocks in any form, such as simple texts, phrases or sentences, according to a preset data splitting method, and further combines the fragment blocks into a cluster to obtain a fragment block group.
In practical application, a user initiates a corresponding data storage request in a corresponding login mode (such as a special application APP, a WeChat applet, a computer webpage and the like), fills and uploads corresponding information data according to a storage setting requirement, further analyzes and processes the data storage request, extracts data to be stored and a user identifier according to a preset data request format, and accordingly obtains the data to be stored of the user and the corresponding user identifier; and further, a preset data segmentation mode is adopted to segment the data to be stored, for example, by extracting file format identifiers in the data to be stored, determining a plurality of file formats contained in the data to be stored according to the file format identifiers, classifying the data to be stored according to the file formats, and segmenting the classified data to be stored into a plurality of data segments by adopting a preset segmentation algorithm, so as to obtain fragment groups corresponding to the data to be stored. Fragment block segmentation processing is carried out on the acquired data to be stored, so that fragment blocks corresponding to the data to be stored can be stored into fragment groups corresponding to the database, and safety storage of the data is achieved.
102. Randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
in this embodiment, the database refers to a database rented by a company or a self-built database, and a huge amount of data in the database is subjected to fragment block processing according to a preset fragment block processing method, so as to obtain a required database consisting of huge fragment blocks; the dynamic hash algorithm here means that the traditional hash table is mainly implemented by a zipper method and an open address hash method, and the open address hash method includes linear hash, quadratic hash, and the like. When the elements inserted into the hash table are continuously increased, the conventional hash table needs to perform capacity expansion and then remap the elements in the hash table to complete migration in order to ensure the lookup efficiency. The overhead of the work is often large, so that the dynamic hash algorithm can be applied in the scene, the fragment group obtained by processing is stored in the database, the preset dynamic hash algorithm polarity is used for initial encryption processing, and the position information of each fragment of the fragment group is calculated, so that the fragment group data of the user can be stored in the database, and the stored fragment group is marked with the position information.
In practical application, the storage grade required by a user is obtained by analyzing a user data storage request, so that the safety grade of the fragment group is determined, and the fragment group combination corresponding to the safety grade and stored in history is selected from a preset database; carrying out storage identification processing on each fragment group, and randomly splicing the identified fragment groups into fragment group combinations; combining and storing the fragment groups after the fragment groups are spliced into a database; further, performing hash transformation processing on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group; identifying initial position information of each piece of data in the hash fragment group in the fragment group combination; and carrying out serialization processing on the initial position information to obtain the position information of each piece of data in the fragment group in the database.
103. And encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
In this embodiment, the encryption refers to encryption processing of the position information jiongning using a corresponding encryption algorithm, where the encryption algorithm is an algorithm capable of obtaining numerous corresponding solutions through encryption processing; the storage code value combination refers to that an infinite number of storage solutions are obtained by encrypting the position information, and then the corresponding combination is selected as the storage code value combination, wherein the better storage code value combination selects one solution as a selected code value, and other rest solutions are used as defensive code values, so that the required storage code value combination is obtained by combination; the storage identifier here refers to a storage identifier composed of location information, user name information, and the like of the fragment group. The position information is encrypted by using the user identification, so that the hidden processing of the data to be stored by the user is realized, and the data can be safely stored in the database.
In practical application, identification information of corresponding users (namely a sending user and a receiving user) is obtained, and then the sending user identification and the receiving user identification are connected, so that a connection identifier is obtained; the position information is encrypted by adopting the connection identifier, wherein the encryption process can successfully decode an infinite number of keys (a plurality of functions such as solution equations, multiple linear equations or sin and cos have one key corresponding to numerous solutions), and the functions can be reversely calculated so as to generate a plurality of corresponding storage code values and storage identifiers; selecting one of the plurality of storage code values as a selected code value, and selecting other storage code values except the selected code value from the plurality of storage code values as a defensive code value; and generating a storage code value combination based on the selected code value and the defensive code value, and pushing the storage code value combination and the storage identifier.
In the embodiment of the invention, data to be stored and corresponding user identification are obtained, and the data to be stored is segmented to obtain fragment groups corresponding to the data to be stored; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier. Compared with the prior art, the data to be stored are subjected to data segmentation, the fragment group corresponding to the obtained data to be stored is stored in the preset database, and then hash transformation, position information calculation and encryption processing are carried out on the fragment group data, so that the corresponding storage code value combination and the storage identifier are generated and pushed. The data to be stored is stored in a huge database in a hidden mode, so that the data are stored, and the safety of user data is guaranteed.
Referring to fig. 2, a second embodiment of the data storage method according to the embodiment of the present invention includes:
201. extracting file format identifiers in the data to be stored, and determining a plurality of file formats contained in the data to be stored according to the file format identifiers;
in this embodiment, the file format identifier is a special encoding method for information used for storing information, and is used to identify the internally stored data. For example, some store pictures, some store programs, and some store text messages. Each type of information can be stored in a storage device in one or more file formats, each file format usually has one or more extensions for identification, but the extensions may not have any extension, the extensions can help an application program to identify the file format, and identification of each file format is obtained by identifying different file formats in advance. And by extracting the file format identifier of the data to be stored, the data to be stored is segmented by utilizing the file format identifier.
In practical application, a corresponding data storage request is initiated through a preset user data storage application mode, the data storage request is further analyzed, data to be stored and a corresponding user identifier are obtained, a file format identifier contained in the data to be stored is extracted, traversal processing is carried out on the data to be stored through identifier information in a preset file format identifier table, and therefore a corresponding file format identifier in the data to be stored is obtained; and traversing the data to be stored by utilizing the file format identifications so as to obtain a plurality of file formats contained in the data.
202. Classifying the data to be stored according to a file format, and dividing the classified data to be stored into a plurality of data segments by adopting a preset division algorithm;
in this embodiment, the segmentation algorithm means that a preset segmentation policy is used to segment data into required data blocks, and a preferred implementation manner here is to segment data in different file formats in the data to be stored according to corresponding file formats, so as to obtain the required data blocks. By segmenting the data to be stored according to the file format obtained by the processing, the data in different formats can be accurately segmented, and the segmented data has unique data blocks, so that the uniqueness of the data is ensured, and the mutual interference among different data is avoided.
In practical application, the file format obtained by the processing is utilized to classify and process the data to be stored according to the file format, for example, the file format comprises pictures, characters, tables and the like, and the data to be stored is classified according to the corresponding file format; and then the classified data to be stored is divided by adopting a preset division algorithm, and the data in different file formats is divided into a plurality of data fragments by utilizing the division mode of the corresponding file format according to the data in different file formats.
203. Generating fragment groups corresponding to the data to be stored based on the data fragments;
in this embodiment, the fragment group corresponding to the data to be stored is generated based on each data fragment obtained by the processing.
204. Randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
205. and encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage identifier.
In the embodiment of the invention, the file format identification in the data to be stored is extracted, and a plurality of file formats contained in the data to be stored are determined according to the file format identification; classifying the data to be stored according to a file format, and dividing the classified data to be stored into a plurality of data segments by adopting a preset division algorithm; and generating a fragment group corresponding to the data to be stored based on each data fragment. Compared with the prior art, the method and the device have the advantages that the file format of the data to be stored is identified and classified, and then the classified data to be stored is subjected to data segmentation processing by utilizing the preset segmentation algorithm, so that the required fragment group is obtained, the classification and segmentation processing of the data to be stored is realized, and the data fragment with unique identification is ensured.
Referring to fig. 3, a third embodiment of the data storage method according to the embodiment of the present invention includes:
301. acquiring data to be stored and corresponding user identification, and segmenting the data to be stored to obtain fragment groups corresponding to the data to be stored;
302. determining the security level of the fragment group, and selecting a fragment group combination corresponding to the security level and stored in history from a preset database;
in this embodiment, the security level here refers to a data storage level set in advance, and if the security is higher, the larger data fragment group is used for combined storage, so as to implement higher hidden storage, thereby determining to obtain the security level of the corresponding fragment group.
In practical application, the security level of the corresponding fragment group is obtained by obtaining the security level required by data storage of a user, and then the fragment group combination corresponding to the historical storage of the security level is selected from the preset database according to the security level.
303. Storing and identifying each fragment group, and randomly splicing the identified fragment groups into fragment group combinations;
in this embodiment, the storage identifier refers to that each data fragment in the fragment group after fragmentation processing of the data to be stored is identified according to a preset identification method, where a preferred implementation manner here is to implement identification processing of each data fragment by using a user identifier.
In practical application, the user identification is obtained through the processing, storage identification processing is carried out on each fragment in the fragment group, and the fragment group after identification is randomly spliced into the fragment group combination in the preset database.
304. Combining and storing the fragment groups after the fragment groups are spliced into a database;
in this embodiment, the fragment groups and the fragment groups after the splicing are stored in a preset database in a combined manner. And hidden storage of data into a huge database is realized.
305. Performing hash transformation on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group;
in this embodiment, the fragment group obtained by the combination is subjected to hash transformation on each piece of data in the fragment group by using a preset dynamic hash algorithm, and here, a preferred implementation manner is to transform each piece of fragment group data into a corresponding hash value by using a dynamic hash algorithm, so as to obtain a corresponding hash fragment group. Through Hash transformation processing, the corresponding data to be stored can be similar to the original fragment group data, and the safety of the data to be stored is improved.
306. Identifying initial position information of each piece of data in the hash fragment group in the fragment group combination;
in this embodiment, the hash fragment group is obtained according to the above processing, and the storage mark of each piece of data is subjected to mark identification, so as to identify and obtain the initial position information of each piece of data in the hash fragment group in the above fragment group combination.
307. Serializing the initial position information to obtain the position information of each piece of data in the fragment group in a database;
in the present embodiment, the serialization processing refers to data conversion processing of the initial position information, so as to enhance the security of the initial position information.
In practical applications, the initial position information obtained by the above processing is serialized, wherein a preferred implementation manner here is that a long string of position data in the initial position information set is formed into a set of numbers 11-22-33 through a certain connector, for example, json data is formed by thinking that [11,22,33] represents an array set, and then the character string is serialized into "[ 11,22,33 ]", so as to obtain the position information of each piece of data in the fragment group in the database.
308. And encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
In the embodiment of the invention, the security level of the fragment group is determined, and the fragment group combination corresponding to the security level and stored in history is selected from a preset database; storing identification on each fragment group, and randomly splicing the identified fragment groups to fragment group combinations; combining and storing the fragment groups after the fragment groups are spliced into a database; performing hash transformation on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group; identifying initial position information of each piece of data in the hash fragment group in the fragment group combination; and carrying out serialization processing on the initial position information to obtain the position information of each piece of data in the fragment group in the database. Compared with the prior art, the fragment groups to be stored are combined and stored into the preset database according to the corresponding safety levels, and then the stored fragment blocks are subjected to Hash transformation and position information serialization processing, so that the huge database with data storage is realized, the corresponding mark extraction is realized, and the data extraction is convenient.
Referring to fig. 4, a fourth embodiment of the data storage method according to the embodiment of the present invention includes:
401. acquiring data to be stored and corresponding user identification, and segmenting the data to be stored to obtain fragment groups corresponding to the data to be stored;
402. randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
403. connecting the sending user identification with the receiving user identification to obtain a connection identifier;
in this embodiment, the user identifier is obtained according to the above processing, where the user identifier includes a sending user identifier and a receiving user identifier, and the sending user identifier and the receiving user identifier are connected, and a preferred implementation manner here is to connect ids of the two sending user identifiers and the receiving user identifier into a long string through a certain character, so as to obtain the connection identifier.
404. Encrypting the position information by adopting the connection identifier to generate a plurality of corresponding storage code values and storage identifiers;
in this embodiment, the connection identifier obtained through the above processing is used to encrypt the location information, and a preferred implementation manner here is to use an RSA algorithm to disclose the product as an encryption key and encrypt the location information, so as to generate a plurality of corresponding storage code values and storage identifiers.
405. Selecting one of the plurality of storage code values as a selected code value, and selecting other storage code values except the selected code value from the plurality of storage code values as a defensive code value;
in this embodiment, according to the plurality of storage code values and the storage identifiers obtained by the above processing, one of the plurality of storage code values is selected as the selected code value, and other storage code values except the selected code value among the plurality of storage code values are selected as the defensive code value. The defensive code value satisfies that once a cracker triggers the defensive root, the selected root is invalid, and the selected root can be invalid after being used only once.
406. And generating a storage code value combination based on the selected code value and the defensive code value, and pushing the storage code value combination and the storage identifier.
In this embodiment, the selected code value and the defensive code value are obtained based on the above processing, a storage code value combination is generated, and then the storage code value combination and the storage identifier are pushed.
In the embodiment of the invention, a sending user identifier and a receiving user identifier are connected to obtain a connection identifier; encrypting the position information by adopting the connection identifier to generate a plurality of corresponding storage code values and storage identifiers; selecting one of the plurality of storage code values as a selected code value, and selecting other storage code values except the selected code value from the plurality of storage code values as a defensive code value; and generating a storage code value combination based on the selected code value and the defensive code value, and pushing the storage code value combination and the storage identifier. Compared with the prior art, the method and the device have the advantages that the connection identifier is generated by utilizing the user information, and then the connection identifier is utilized to encrypt the position information, so that the storage code value combination and the storage identifier are obtained to be pushed, encryption and pushing of the key position information are achieved, the corresponding storage extraction codes are placed to be cracked, and the safety of the data to be stored is improved.
Referring to fig. 5, an embodiment of a data reading method according to an embodiment of the invention includes:
501. acquiring a data reading request, and extracting a storage identifier and an input storage code value input in the data reading request;
in this embodiment, the data reading request of the user is obtained in a corresponding manner, and then the data reading request is analyzed and processed, so that the input storage identifier and the input storage code value in the data reading request are obtained.
502. Inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group;
in this embodiment, according to the input storage identifier and the input storage code value obtained through the processing, a target fragment group associated with the input storage identifier is queried in a preset database, and whether the input storage code value is a selected code value corresponding to the target fragment group is determined. And if the selected code value is judged, combining the fragments into the real file content. If the non-selected code value triggers some bait fragments in the process of taking fragments, once the bait fragments are triggered, a prompt is triggered to the client of the sender, and automatic all root invalidation can be configured.
503. If so, carrying out decryption and deserialization processing on the input stored code value to obtain position information corresponding to the target fragment group;
in this embodiment, if the input storage code value is the selected code value corresponding to the target fragment group, the input storage code value is decrypted by using the storage identifier and the input selected code value, and then the decrypted data is deserialized, so that the position information corresponding to the target fragment group is obtained.
504. And reading each piece of data in the target fragment group according to the position information corresponding to the target fragment group, and combining the data to obtain response data corresponding to the data reading request.
In this embodiment, according to the position information corresponding to the target fragment group obtained through the above processing, each piece of data corresponding to the position information in the target fragment group is extracted and combined, so as to obtain response data corresponding to the data reading request, and the response data is pushed to the user.
In the embodiment of the invention, a data reading request is obtained, and a storage identifier and an input storage code value which are input in the data reading request are extracted; inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group; if so, carrying out decryption and deserialization processing on the input stored code value to obtain position information corresponding to the target fragment group; and reading each piece of data in the target fragment group according to the position information corresponding to the target fragment group, and combining the data to obtain response data corresponding to the data reading request. Compared with the prior art, the method and the device have the advantages that the corresponding position information is inquired by utilizing the input storage identification and the input storage code value, and then all data are extracted through the position information, so that the response data corresponding to the data reading request is obtained. By judging the corresponding storage code value, the method prevents an illegal user from acquiring the storage data, and enhances the safety of the storage data.
With reference to fig. 6, a data storage device and a data reading device in an embodiment of the present invention are described, and an embodiment of a data storage device in an embodiment of the present invention includes:
the data segmentation module 601 is configured to obtain data to be stored and a corresponding user identifier, and segment the data to be stored to obtain a fragment group corresponding to the data to be stored;
a position calculating module 602, configured to randomly store the fragment group in a preset database, and calculate position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
and the data pushing module 603 is configured to encrypt the location information by using the user identifier, generate a corresponding storage code value combination and a storage identifier, and push the storage code value combination and the storage identifier.
In the embodiment of the invention, data to be stored and corresponding user identification are obtained, and the data to be stored is segmented to obtain fragment groups corresponding to the data to be stored; randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm; and encrypting the position information by adopting the user identifier to generate a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier. Compared with the prior art, the data to be stored are subjected to data segmentation, the fragment group corresponding to the obtained data to be stored is stored in the preset database, and then hash transformation, position information calculation and encryption processing are carried out on the fragment group data, so that the corresponding storage code value combination and the storage identifier are generated and pushed. The data to be stored is stored in a huge database in a hidden manner, so that the data is stored, and the safety of user data is ensured.
Referring to fig. 7, another embodiment of a data storage device according to the present invention includes:
the data segmentation module 601 is configured to obtain data to be stored and a corresponding user identifier, and segment the data to be stored to obtain a fragment group corresponding to the data to be stored;
a position calculating module 602, configured to randomly store the fragment group in a preset database, and calculate position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
and the data pushing module 603 is configured to encrypt the location information by using the user identifier, generate a corresponding storage code value combination and a storage identifier, and push the storage code value combination and the storage identifier.
Further, the data segmentation module 601 includes:
an identifier extracting unit 6011, configured to extract a file format identifier in the data to be stored, and determine, according to the file format identifier, a plurality of file formats included in the data to be stored; a data dividing unit 6012, configured to classify the data to be stored according to the file format, and divide the classified data to be stored into a plurality of data segments by using a preset division algorithm; and generating a fragment group corresponding to the data to be stored based on each data fragment.
Further, the position calculating module 602 includes:
a level selecting unit 6021, configured to determine a security level of the fragment group, and select a fragment group combination corresponding to the security level and stored in history from a preset database; a fragment combination unit 6022, configured to store and identify each fragment group, and randomly splice the identified fragment groups to the fragment group combination; the fragment storage unit 6023 is configured to store the combination of the fragments after the fragment groups are spliced into the database.
Further, the position calculating module 602 further includes: a hash transformation unit 6024, configured to perform hash transformation on each piece of data in the fragment group by using a preset dynamic hash algorithm to obtain a corresponding hash fragment group; a position identifying unit 6025 configured to identify initial position information of each piece of data in the hash fragment group in the fragment group combination; a serialization processing unit 6026, configured to perform serialization processing on the initial position information to obtain position information of each piece of data in the fragment group in the database.
Further, the data pushing module 603 includes: an identifier connection unit 6031, configured to connect the sending user identifier and the receiving user identifier to obtain a connection identifier; an information encrypting unit 6032 configured to encrypt the location information using the connection identifier to generate a plurality of corresponding storage code values and storage identifiers; a code value selecting unit 6033, configured to select one of the multiple storage code values as a selected code value, and select another storage code value of the multiple storage code values except the selected code value as a defensive code value; an information pushing unit 6034, configured to generate a storage code value combination based on the selected code value and the defensive code value, and push the storage code value combination and the storage identifier.
In the embodiment of the invention, data to be stored is subjected to fragmentation processing, fragment groups subjected to fragmentation processing are stored in fragment groups in a preset database, position information of the fragments is generated, encryption and serialization processing are carried out according to the position information, further encryption processing is carried out on the position information subjected to serialization processing, and a storage code value combination and a storage identifier are obtained and pushed. The data to be stored is searched in the data sea, and the data storage safety is replaced by using a huge data space by means of the data hidden in the vast data sea, so that the safety of the data stored by a user is improved.
Referring to fig. 8, an embodiment of a data reading apparatus according to the embodiment of the present invention includes:
an identifier extracting module 801, configured to obtain a data read request, and extract a storage identifier and an input storage code value that are input in the data read request;
a fragment query module 802, configured to query a preset database for a target fragment group associated with the input storage identifier, and determine whether the input storage code value is a selected code value corresponding to the target fragment group;
a code value calculation module 803, configured to decrypt and deserialize the input stored code value if the size of the target fragment group is smaller than the size of the target fragment group;
and the data reading module 804 is configured to read and combine each piece of data in the target fragment group according to the position information corresponding to the target fragment group, so as to obtain response data corresponding to the data reading request.
In the embodiment of the invention, a data reading request is acquired, and the input storage identification and the input storage code value in the data reading request are extracted; inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group; if so, decrypting and deserializing the input stored code value to obtain position information corresponding to the target fragment group; and reading each piece of data in the target fragment group according to the position information corresponding to the target fragment group, and combining the data to obtain response data corresponding to the data reading request. Compared with the prior art, the data reading method has the advantages that the storage identification and the storage code value are extracted from the data reading request, so that decryption and deserialization are carried out, response data are obtained through combination, the data are safely read, and the data stealing event is prevented.
Fig. 6 and fig. 7 describe the data storage device in the embodiment of the present invention in detail from the perspective of the modular functional entity, and fig. 8 describes the data reading device in the embodiment of the present invention in detail from the perspective of the modular functional entity, and the computer device in the embodiment of the present invention in detail from the perspective of the hardware processing.
Fig. 9 is a schematic structural diagram of a computer device 900, which may have large differences due to different configurations or performances, and may include one or more processors (CPUs) 910 (e.g., one or more processors) and a memory 920, and one or more storage media 930 (e.g., one or more mass storage devices) storing an application 933 or data 932, according to an embodiment of the present invention. Memory 920 and storage media 930 may be, among other things, transient storage or persistent storage. The program stored on storage medium 930 may include one or more modules (not shown), each of which may include a sequence of instructions operating on computer device 900. Still further, the processor 910 may be arranged to communicate with the storage medium 930 to execute a series of instruction operations in the storage medium 930 on the computer device 900.
The computer device 900 may also include one or more power supplies 940, one or more wired or wireless network interfaces 950, one or more input-output interfaces 960, and/or one or more operating systems 931, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, and so forth. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 9 does not constitute a limitation of computer devices, and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components.
The present invention also provides a computer device, which includes a memory and a processor, wherein the memory stores computer readable instructions, and the computer readable instructions, when executed by the processor, cause the processor to execute the steps of the data storage method in the above embodiments.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, and which may also be a volatile computer-readable storage medium, having stored therein instructions, which, when executed on a computer, cause the computer to perform the steps of the data storage and reading method.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a portable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A data storage method, characterized in that the data storage method comprises:
acquiring data to be stored and a corresponding user identifier, and segmenting the data to be stored to obtain a fragment group corresponding to the data to be stored;
randomly storing the fragment group into a preset database, and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
and encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
2. The data storage method according to claim 1, wherein the segmenting the data to be stored to obtain the fragment group corresponding to the data to be stored includes:
extracting file format identifications in the data to be stored, and determining a plurality of file formats contained in the data to be stored according to the file format identifications;
classifying the data to be stored according to the file format, and dividing the classified data to be stored into a plurality of data segments by adopting a preset division algorithm;
and generating a fragment group corresponding to the data to be stored based on each data fragment.
3. The data storage method of claim 1, wherein said randomly storing said fragment clusters into a preset database comprises:
determining the security level of the fragment group, and selecting a fragment group combination corresponding to the security level and stored in history from a preset database;
carrying out storage identification on each fragment group, and randomly splicing the identified fragment groups to the fragment group combination;
and storing the fragment groups after the fragment groups are spliced into the database in a combined manner.
4. The data storage method according to claim 3, wherein the calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm comprises:
performing hash transformation on each piece of data in the fragment group by adopting a preset dynamic hash algorithm to obtain a corresponding hash fragment group;
identifying initial position information of each piece of data in the hash fragment group in the fragment group combination;
and carrying out serialization processing on the initial position information to obtain the position information of each piece of data in the fragment group in the database.
5. The data storage method of claim 4, wherein the user identifier comprises a sending user identifier and a receiving user identifier, and the encrypting the location information by using the user identifier to generate a corresponding storage code value combination and a storage identifier and push the storage identifier comprises:
connecting the sending user identification with the receiving user identification to obtain a connection identifier;
encrypting the position information by adopting the connection identifier to generate a plurality of corresponding storage code values and storage identifications;
selecting one of the plurality of storage code values as a selected code value, and selecting other storage code values except the selected code value from the plurality of storage code values as a defensive code value;
and generating a storage code value combination based on the selected code value and the defensive code value, and pushing the storage code value combination and the storage identifier.
6. A data reading method, characterized in that the data reading method comprises:
acquiring a data reading request, and extracting a storage identifier and an input storage code value input in the data reading request;
inquiring a target fragment group associated with the input storage identifier in a preset database, and judging whether the input storage code value is a selected code value corresponding to the target fragment group;
if so, carrying out decryption and deserialization processing on the input stored code value to obtain position information corresponding to the target fragment group;
and reading and combining all the data in the target fragment group according to the position information corresponding to the target fragment group to obtain response data corresponding to the data reading request.
7. A data storage device, characterized in that the data storage device comprises:
the data segmentation module is used for acquiring data to be stored and corresponding user identification, and segmenting the data to be stored to obtain fragment groups corresponding to the data to be stored;
the position calculation module is used for randomly storing the fragment group into a preset database and calculating the position information of each piece of data in the fragment group in the database by using a preset dynamic hash algorithm;
and the data pushing module is used for encrypting the position information by adopting the user identifier, generating a corresponding storage code value combination and a storage identifier and pushing the storage code value combination and the storage identifier.
8. A data reading apparatus, characterized in that the data reading apparatus comprises:
the identification extraction module is used for acquiring a data reading request and extracting a storage identification and an input storage code value which are input in the data reading request;
the fragment query module is used for querying a target fragment group associated with the input storage identifier in a preset database and judging whether the input storage code value is a selected code value corresponding to the target fragment group;
the code value calculation module is used for carrying out decryption and deserialization processing on the input stored code value if the input stored code value is the target fragment group, so as to obtain position information corresponding to the target fragment group;
and the data reading module is used for reading and combining all the data in the target fragment group according to the position information corresponding to the target fragment group to obtain response data corresponding to the data reading request.
9. A computer device, characterized in that the computer device comprises: a memory and at least one processor, the memory having instructions stored therein;
the at least one processor invoking the instructions in the memory to cause the computer device to perform the steps of the data storage method of any one of claims 1-5;
or
The at least one processor invoking the instructions in the memory to cause the computer device to perform the steps of the data reading method of claim 6.
10. A computer-readable storage medium having instructions stored thereon, which when executed by a processor, perform the steps of the data storage method according to any one of claims 1-5;
or
Which when executed by a processor implement the steps of the data reading method as claimed in claim 6.
CN202210372187.2A 2022-04-11 2022-04-11 Data storage and reading method, device, equipment and storage medium Pending CN114707166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210372187.2A CN114707166A (en) 2022-04-11 2022-04-11 Data storage and reading method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210372187.2A CN114707166A (en) 2022-04-11 2022-04-11 Data storage and reading method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114707166A true CN114707166A (en) 2022-07-05

Family

ID=82172303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210372187.2A Pending CN114707166A (en) 2022-04-11 2022-04-11 Data storage and reading method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114707166A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115880789A (en) * 2023-02-08 2023-03-31 中昊芯英(杭州)科技有限公司 Face recognition method based on encryption, related device and storage medium
CN116707934A (en) * 2023-06-20 2023-09-05 甘肃省地震局(中国地震局兰州地震研究所) Data encryption transmission method based on wireless sensor network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115880789A (en) * 2023-02-08 2023-03-31 中昊芯英(杭州)科技有限公司 Face recognition method based on encryption, related device and storage medium
CN116707934A (en) * 2023-06-20 2023-09-05 甘肃省地震局(中国地震局兰州地震研究所) Data encryption transmission method based on wireless sensor network
CN116707934B (en) * 2023-06-20 2023-10-24 甘肃省地震局(中国地震局兰州地震研究所) Data encryption transmission method based on wireless sensor network

Similar Documents

Publication Publication Date Title
CN114707166A (en) Data storage and reading method, device, equipment and storage medium
KR20160144995A (en) Method and apparatus of detecting weak password
CN113259382B (en) Data transmission method, device, equipment and storage medium
CN114218322B (en) Data display method, device, equipment and medium based on ciphertext transmission
CN112286896B (en) Log file processing method and device, computer equipment and storage medium
CN112613051A (en) Data encryption storage method and device, computer equipment and storage medium
EP2779520A1 (en) A process for obtaining candidate data from a remote storage server for comparison to a data to be identified
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
Saravanan et al. Privacy Preserving using Enhanced Shadow Honeypot technique for Data Retrieval in Cloud Computing
KR20220092811A (en) Method and device for storing encrypted data
CN113810375B (en) Webshell detection method, device and equipment and readable storage medium
CN113642025A (en) Interface data processing method, device, equipment and storage medium
CN112436943B (en) Request deduplication method, device, equipment and storage medium based on big data
CN114626079A (en) File viewing method, device, equipment and storage medium based on user permission
CN104239753A (en) Tamper detection method for text documents in cloud storage environment
CN114372291A (en) Privacy joint reasoning method, device, equipment and storage medium
CN106612283B (en) Method and device for identifying source of downloaded file
CN116055067A (en) Weak password detection method, device, electronic equipment and medium
CN110968881A (en) System authentication and data encryption method based on artificial intelligence
CN115859273A (en) Method, device and equipment for detecting abnormal access of database and storage medium
CN111475690B (en) Character string matching method and device, data detection method and server
CN115526551A (en) Agricultural product traceability data processing method based on artificial intelligence and cloud platform
CN115567212A (en) File processing method and device, computer equipment and computer readable storage medium
Maheshwari et al. Character-based search with data confidentiality in the clouds
Leopard et al. Memory forensics and the Macintosh OS X operating system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination