CN114861204A - Big data information safe storage encryption system - Google Patents

Big data information safe storage encryption system Download PDF

Info

Publication number
CN114861204A
CN114861204A CN202210489096.7A CN202210489096A CN114861204A CN 114861204 A CN114861204 A CN 114861204A CN 202210489096 A CN202210489096 A CN 202210489096A CN 114861204 A CN114861204 A CN 114861204A
Authority
CN
China
Prior art keywords
information
encryption
group
target information
segments
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210489096.7A
Other languages
Chinese (zh)
Other versions
CN114861204B (en
Inventor
孙鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hanbo Network Technology Co ltd
Original Assignee
Guangzhou Shuangzhi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shuangzhi Network Technology Co ltd filed Critical Guangzhou Shuangzhi Network Technology Co ltd
Priority to CN202210489096.7A priority Critical patent/CN114861204B/en
Publication of CN114861204A publication Critical patent/CN114861204A/en
Application granted granted Critical
Publication of CN114861204B publication Critical patent/CN114861204B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention discloses a big data information safe storage encryption system, which receives an identifier group, a limit value and a group number value transmitted by a front-end module through a processor, carries out primary encryption processing on target information according to the identifier group, the limit value and the group number value, and divides the target information into a group of short sentences from one character to the character with the limit value corresponding to the number of characters by utilizing related data in the target information; then synchronously distinguishing the sequence between the front group and the rear group by using the identifier; when in decryption, the identifier groups are pre-stored in advance, the first step of large distinction is carried out according to the sequence, and then the decryption is completed according to the number of characters in each short sentence from small to large; the invention is simple, effective and easy to use.

Description

Big data information safe storage encryption system
Technical Field
The invention belongs to the field of information encryption and storage, relates to an information combination encryption technology, and particularly relates to a big data information security storage encryption system.
Background
The patent with publication number CN113449338A discloses a block chain-based information encryption storage method and system, the method includes: the first terminal receives login information and sends the login information to the cloud server for verification, if the verification is passed, sensitive information input by a user is encrypted to obtain encrypted sensitive information, the encrypted sensitive information is sent to the cloud server, the cloud server uploads the encrypted sensitive information to the block chain network for segmented storage, the second terminal receives the login information of the user and sends the login information to the cloud server for verification, if the verification is passed, an information acquisition request is generated and sent to the cloud server, the cloud server acquires the encrypted information corresponding to the information acquisition request and feeds the encrypted information back to the second terminal, and the second terminal decrypts the encrypted information according to the login information of the user to obtain decrypted sensitive information. The invention belongs to the technical field of block chain encryption, and can encrypt and upload sensitive information to a block chain network for segmented storage, thereby avoiding leakage of user sensitive information and improving the safety of storing the user sensitive information.
However, for information encryption, how to better utilize the information itself to encrypt the information is convenient to ensure information security, and an effective mode is lacked; based on this, a solution is provided.
Disclosure of Invention
The invention aims to provide a big data information secure storage encryption system.
The purpose of the invention can be realized by the following technical scheme:
a big data information secure storage encryption system comprises a processor, a storage distribution unit and a storage library;
the processor is used for receiving the identifier group, the limit value and the group number transmitted by the front-end module, and carrying out preliminary encryption processing on the target information according to the identifier group, the limit value and the group number, wherein the specific encryption mode is as follows:
s01: acquiring target information;
s02: then, a cutoff value J is set, and J is made to be 1;
s03: then, marking the first J characters in all the characters of the target information as a fine segment;
s04: then, automatically adding one to the J value, judging the relation between the J and the limit value, stopping the operation when the J is larger than the limit value, and otherwise, entering the step S05;
s05: automatically acquiring J characters from the rest target information in sequence to form a next subsection;
s06: thereafter repeating steps S04-S06 until a stop operation signal is generated;
s07: when the stop operation signal is generated, the J value is enabled to be 1 again, and operations are repeated in the manner of the steps S03-S07 in sequence according to the sequence of the obtained fine segments in the target information until the target information is divided into a plurality of fine segments, and the terminal segment is calibrated; obtaining a fine subsection and an end point section;
s08: then, according to the original sequence in the target information, all the fine segments of a first group of fine segments from one character to a limit value character are marked as a single group, the rest groups are marked as single groups, and the single groups are marked as Di, i, 1, and group values;
s09: acquiring all the single packets Di, and allocating an identifier to each single packet;
s010: after assigning an identifier to each single packet;
s011: selecting a single packet, placing a corresponding identifier at the tail end of all the subdivided segments, combining to obtain all the new subdivided segments, and marking the new subdivided segments as encrypted segments;
s012: then, inverting all the encryption sections to obtain a recombined end section and an encryption section;
s013: marking the recombined end section and the recombined encryption section as encryption completion information;
the processor is used for transmitting the encryption completion information to the storage library through the storage distribution unit, and the storage library receives the encryption completion information transmitted by the storage distribution unit and stores the encryption completion information in real time.
Further, the front module comprises an information acquisition unit and an information analysis unit;
the information acquisition unit is used for acquiring target information to be stored and transmitting the target information to the information analysis unit, the information analysis unit is used for carrying out basic analysis on the target information, and the specific mode of the basic analysis is as follows:
the method comprises the following steps: acquiring all target information;
step two: then acquiring the total number of characters in the target information, and marking the total number of characters as Zf;
step three: dividing the target information into a plurality of single-item segments, wherein each single-item segment is distinguished by punctuation marks, and each punctuation mark appears to be a single-item segment;
marking the number of characters corresponding to the single-item segment with the largest number of characters as a limit value;
step four: then, automatically accumulating all numerical values from one to the limit value by taking the limit value as an upper limit, and marking the obtained sum value as a single-segment value; dividing the total number Zf of the characters by a single-segment value, and if the total number Zf of the characters can be divided completely, marking the corresponding structure as a group numerical value;
if the integer can not be removed, automatically rounding the result and then adding one to obtain a value which is marked as a group numerical value;
the information analysis unit is used for transmitting the target information, the limit value and the group value to the processor, and the processor receives the information transmitted by the information analysis unit to the target information, the limit value and the group value.
Further, the front module also comprises an attribute analysis unit; the information acquisition unit is further used for transmitting the target information to the attribute analysis unit, the attribute analysis unit is used for carrying out attribute analysis on the target information, and the specific mode of the attribute analysis is as follows:
s1: acquiring all characters in target information, including punctuation marks;
s2: randomly selecting a plurality of symbols different from all characters, marking the symbols as identifiers, and forming an identifier group by all the identifiers; here, it is ensured that the number of identifiers in the identifier group exceeds the group value;
s3: obtaining all identifier groups;
the attribute analysis unit is used for transmitting the identifier group to the processor; the processor receives the transmission of the attribute analysis unit to the set of identifiers.
Further, the process of marking the end segment in step S07 is: and when the last section of the target information is reached, automatically adding a final symbol on the last fine section, and marking the final fine section as a final section, wherein the final symbol is a preset symbol for the manager.
Further, the specific manner of the flipping processing in step S012 is:
s0121: arranging all the encrypted segments according to the sequence of the original target information;
s0122: then, sequentially selecting all the encrypted segments according to the sequence of the corresponding character numbers from small to large;
s0123: ordering the first quantity of the number of characters without any treatment;
s0124: then selecting the encryption segment with the second ordered number of characters, listing all the encryption segments corresponding to the second ordered number separately from the target information according to the original sequence, and exchanging the positions of the encryption segments with the first order and the encryption segments with the second order; then, exchanging the second and last but one positions until all the positions of all the encryption sections corresponding to the second sequencing are completely exchanged;
s0125: selecting the fourth encryption segment with the quantity of the selected character number, exchanging the positions according to the mode of the step S0124, and then exchanging the corresponding encryption segments every other name according to the mode of the step S0124 until all the encryption segments are processed;
s0126: the end segment is randomly inserted into all encrypted segments.
Further, the identifier assignment manner in step S09 is determined as follows:
after the i values in the single groups Di are sequentially arranged from small to large, the sequence of the identifiers in the identifier group also has a sequence corresponding to the i values of the single groups from large to small, namely the identifier group is the front end of the identifier group which ensures that the identifier of D1 is positioned at the front end of D2 and is also positioned at the front end of all the other Di, i is 2. The identifier selected at D2 is then also ordered before the identifiers selected at D i in the identifier group, where i is 3.
Further, the processor drives the display unit to display "this encryption step is completed" while transmitting the encryption completion information to the repository.
Further, the device also comprises a data modification unit;
the data modification unit is in communication connection with the processor and is used for recording all preset numerical values.
The invention has the beneficial effects that:
the invention receives the identifier group, the limit value and the group number value transmitted by the front module through the processor, carries out preliminary encryption processing on target information according to the identifier group, the limit value and the group number value, and divides the target information into a group of short sentences from one character to the character with the limit value corresponding to the number of characters by utilizing related data in the target information; then synchronously distinguishing the sequence between the front group and the rear group by using the identifier;
when in decryption, the identifier groups are pre-stored in advance, the first step of large distinction is carried out according to the sequence, and then the decryption is completed according to the number of characters in each short sentence from small to large; the invention is simple, effective and easy to use.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, a big data information secure storage encryption system includes an information acquisition unit, an information analysis unit, an attribute analysis unit, a processor, a data modification unit, a display unit, a storage allocation unit, and a repository;
the information acquisition unit is used for acquiring target information to be stored and transmitting the target information to the information analysis unit, the information analysis unit is used for carrying out basic analysis on the target information, and the specific mode of the basic analysis is as follows:
the method comprises the following steps: acquiring all target information;
step two: then acquiring the total number of characters in the target information, and marking the total number of characters as Zf;
step three: dividing the target information into a plurality of single-item segments, wherein each single-item segment is distinguished by punctuation marks, and each punctuation mark appears to be a single-item segment;
marking the number of characters corresponding to the single-item segment with the largest number of characters as a limit value;
step four: then, automatically accumulating all numerical values from one to the limit value by taking the limit value as an upper limit, and marking the obtained sum value as a single-segment value; dividing the total number Zf of the characters by a single-segment value, and if the total number Zf of the characters can be divided completely, marking the corresponding structure as a group numerical value;
if the integer division cannot be carried out, automatically rounding the result and then adding one to obtain a value which is marked as a group numerical value;
the information analysis unit is used for transmitting the target information, the limit value and the group value to the processor, and the processor receives the information transmitted by the information analysis unit to the target information, the limit value and the group value;
the information acquisition unit is further used for transmitting the target information to the attribute analysis unit, the attribute analysis unit is used for carrying out attribute analysis on the target information, and the specific mode of the attribute analysis is as follows:
s1: acquiring all characters in target information, including punctuation marks;
s2: randomly selecting a plurality of symbols different from all characters, marking the symbols as identifiers, and forming an identifier group by all the identifiers; here, it is ensured that the number of identifiers in the identifier group exceeds the group value;
s3: obtaining all identifier groups;
the attribute analysis unit is used for transmitting the identifier group to the processor; the processor receives the transmission of the attribute analysis unit to the identifier group;
the processor is used for carrying out preliminary encryption processing on the target information according to the identifier group, the limit value and the group number, and the specific encryption mode is as follows:
s01: acquiring target information;
s02: then, a cutoff value J is set, and J is made to be 1;
s03: then, marking the first J characters in all the characters of the target information as a fine segment;
s04: then, automatically adding one to the J value, judging the relation between the J and the limit value, stopping the operation when the J is larger than the limit value, and otherwise, entering the step S05;
s05: automatically acquiring J characters from the rest target information in sequence to form a next subsection;
s06: thereafter repeating steps S04-S06 until a stop operation signal is generated;
s07: when the stop operation signal is generated, the J value is reset to 1, and operations are repeated in the manner of steps S03-S07 in sequence according to the sequence of the obtained fine segments in the target information until the target information is divided into a plurality of fine segments; when the last section of the target information is reached, namely when the number of times of repeating the corresponding group of numerical values is reached, the character numbers of the last two fine segments do not always accord with the rule, and the character number of the last fine segment is possibly far less than that of other fine segments in the process of the same group, so that the last fine segment is added with an end point symbol which is marked as an end point section, and the end point symbol is a preset symbol of a manager; obtaining a fine subsection and an end point section;
s08: then, according to the original sequence in the target information, all the fine segments of a first group of fine segments from one character to a limit value character are marked as a single group, the rest groups are marked as single groups, and the single groups are marked as Di, i, 1, and group values;
s09: acquiring all the single packets Di, and allocating an identifier to each single packet, wherein the identifier allocation mode is determined as follows:
after the i values in the single groups Di are sequentially arranged from small to large, the sequence of the identifiers in the identifier group also has a sequence corresponding to the i values of the single groups from large to small, namely the identifier group is the front end of the identifier group which ensures that the identifier of D1 is positioned at the front end of D2 and is also positioned at the front end of all the other Di, i is 2. The identifier selected by D2 is also ordered before the identifiers selected by other D i in the identifier group, where i is 3.. group number;
s010: after assigning an identifier to each single packet;
s011: selecting a single packet, placing a corresponding identifier at the tail end of all the subdivided segments, combining to obtain all the new subdivided segments, and marking the new subdivided segments as encrypted segments;
s012: then, the reversal processing is performed on all the encrypted segments, and there are two ways for the reversal processing, which is a specific way in this embodiment:
s0121: arranging all the encrypted segments according to the sequence of the original target information;
s0122: then, sequentially selecting all the encrypted segments according to the sequence of the corresponding character numbers from small to large;
s0123: ordering the first quantity of the number of characters without any treatment;
s0124: then selecting the encryption segment with the second ordered number of characters, listing all the encryption segments corresponding to the second ordered number separately from the target information according to the original sequence, and exchanging the positions of the encryption segments with the first order and the encryption segments with the second order; then, exchanging the second and last but one positions until all the positions of all the encryption sections corresponding to the second sequencing are completely exchanged;
s0125: selecting the fourth encryption segment with the quantity of the selected character number, exchanging the positions according to the mode of the step S0124, and then exchanging the corresponding encryption segments every other name according to the mode of the step S0124 until all the encryption segments are processed;
s0126: randomly inserting the end segment into all the encrypted segments;
s013: marking the recombined end section and the recombined encryption section as encryption completion information;
the processor is used for transmitting the encryption completion information to the storage library through the storage distribution unit, and the storage library receives the encryption completion information transmitted by the storage distribution unit and stores the encryption completion information in real time. The processor transmits the encryption completion information to the storage library and simultaneously drives the display unit to display that the encryption step is completed;
the data modification unit is in communication connection with the processor and is used for inputting all preset numerical values;
of course, as another embodiment of the present invention, on the basis of the foregoing embodiment, the following manner may also be adopted in the reversal processing of the present application:
randomly mixing all the encryption sections and the end sections at will to ensure that the encryption sections and the end sections which are in the correct sequence do not exceed the position X1 according to target information, wherein X1 is a preset value; when X1 is exceeded, the process is randomized again until the condition is satisfied.
The decryption of the invention is simple, and the original target information can be recovered only by arranging the preliminary sequence according to the sequence of the identifiers in the identifier group, then sequencing all the encrypted segments in the same group from small to large according to the number of characters, and placing the terminal segment at the end.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. A big data information secure storage encryption system is characterized by comprising:
a processor: the method receives an identifier group, a limit value and a group number transmitted by a front-end module, and performs primary encryption processing on target information according to the identifier group, the limit value and the group number, wherein the specific encryption mode is as follows:
s01: acquiring target information;
s02: then, a cutoff value J is set, and J is made to be 1;
s03: then, marking the first J characters in all the characters of the target information as a fine segment;
s04: then, automatically adding one to the J value, judging the relation between the J and the limit value, stopping the operation when the J is larger than the limit value, and otherwise, entering the step S05;
s05: automatically acquiring J characters from the rest target information in sequence to form a next subsection;
s06: thereafter repeating steps S04-S06 until a stop operation signal is generated;
s07: when the stop operation signal is generated, the J value is enabled to be 1 again, and operations are repeated in the manner of the steps S03-S07 in sequence according to the sequence of the obtained fine segments in the target information until the target information is divided into a plurality of fine segments, and the terminal segment is calibrated; obtaining a fine subsection and an end point section;
s08: then, according to the original sequence in the target information, all the fine segments of a first group of fine segments from one character to a limit value character are marked as a single group, the rest groups are marked as single groups, and the single groups are marked as Di, i, 1, and group values;
s09: acquiring all the single packets Di, and allocating an identifier to each single packet;
s010: after assigning an identifier to each single packet;
s011: selecting a single packet, placing a corresponding identifier at the tail end of all the subdivided segments, combining to obtain all the new subdivided segments, and marking the new subdivided segments as encrypted segments;
s012: then, inverting all the encryption sections to obtain a recombined end section and an encryption section;
s013: marking the recombined end section and the recombined encryption section as encryption completion information;
the processor is used for transmitting the encryption completion information to the storage library through the storage distribution unit, and the storage library receives the encryption completion information transmitted by the storage distribution unit and stores the encryption completion information in real time.
2. The big data information secure storage encryption system according to claim 1, wherein the front-end module comprises an information acquisition unit and an information analysis unit;
the information acquisition unit is used for acquiring target information to be stored and transmitting the target information to the information analysis unit, the information analysis unit is used for carrying out basic analysis on the target information, and the specific mode of the basic analysis is as follows:
the method comprises the following steps: acquiring all target information;
step two: then acquiring the total number of characters in the target information, and marking the total number of characters as Zf;
step three: dividing the target information into a plurality of single-item segments, wherein each single-item segment is distinguished by punctuation marks, and each punctuation mark appears to be a single-item segment;
marking the number of characters corresponding to the single-item segment with the largest number of characters as a limit value;
step four: then, automatically accumulating all numerical values from one to the limit value by taking the limit value as an upper limit, and marking the obtained sum value as a single-segment value; dividing the total number Zf of the characters by a single-segment value, and if the total number Zf of the characters can be divided in an integer mode, marking the corresponding structure as a group numerical value;
if the integer division cannot be carried out, automatically rounding the result and then adding one to obtain a value which is marked as a group numerical value;
the information analysis unit is used for transmitting the target information, the limit value and the group value to the processor, and the processor receives the information transmitted by the information analysis unit to the target information, the limit value and the group value.
3. The big data information secure storage encryption system according to claim 2, wherein the front-end module further comprises an attribute analysis unit; the information acquisition unit is further used for transmitting the target information to the attribute analysis unit, the attribute analysis unit is used for carrying out attribute analysis on the target information, and the specific mode of the attribute analysis is as follows:
s1: acquiring all characters in target information, including punctuation marks;
s2: randomly selecting a plurality of symbols different from all characters, marking the symbols as identifiers, and forming an identifier group by all the identifiers; here, it is ensured that the number of identifiers in the identifier group exceeds the group value;
s3: obtaining all identifier groups;
the attribute analysis unit is used for transmitting the identifier group to the processor; the processor receives the transmission of the attribute analysis unit to the set of identifiers.
4. The system for securely storing and encrypting big data information according to claim 1, wherein the process of marking the end segment in step S07 is: and when the last section of the target information is reached, automatically adding a final symbol on the last fine section, and marking the final fine section as a final section, wherein the final symbol is a preset symbol for the manager.
5. The big data information secure storage encryption system according to claim 1, wherein the reversal processing in step S012 is specifically as follows:
s0121: arranging all the encrypted segments according to the sequence of the original target information;
s0122: then, sequentially selecting all the encrypted segments according to the sequence of the corresponding character numbers from small to large;
s0123: ordering the first quantity of the number of characters without any treatment;
s0124: then selecting the encryption segment with the second ordered number of characters, listing all the encryption segments corresponding to the second ordered number separately from the target information according to the original sequence, and exchanging the positions of the encryption segments with the first order and the encryption segments with the second order; then, the second and last-but-one positions are exchanged until the exchange of all the positions of all the encrypted sections corresponding to the second sequencing is completed;
s0125: selecting the fourth encryption segment with the quantity of the selected character number, exchanging the positions according to the mode of the step S0124, and then exchanging the corresponding encryption segments every other name according to the mode of the step S0124 until all the encryption segments are processed;
s0126: the end segment is randomly inserted into all encrypted segments.
6. The system for securely storing and encrypting the big data information according to claim 1, wherein the identifier allocation manner in step S09 is determined as follows:
after the i values in the single groups Di are sequentially arranged from small to large, the sequence of the identifiers in the identifier group also has a sequence corresponding to the i values of the single groups from large to small, namely the identifier group is the front end of the identifier group which ensures that the identifier of D1 is positioned at the front end of D2 and is also positioned at the front end of all the other Di, i is 2. The identifier selected by D2 may also be ordered before the identifiers selected by other Di in the identifier group, where i is 3.
7. The system for securely storing and encrypting the big data information as claimed in claim 1, wherein the processor drives the display unit to display "this encryption step is completed" while transmitting the encryption completion information to the repository.
8. The big data information secure storage encryption system according to claim 1, further comprising a data modification unit;
the data modification unit is in communication connection with the processor and is used for recording all preset numerical values.
CN202210489096.7A 2022-05-06 2022-05-06 Big data information safe storage encryption system Active CN114861204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210489096.7A CN114861204B (en) 2022-05-06 2022-05-06 Big data information safe storage encryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210489096.7A CN114861204B (en) 2022-05-06 2022-05-06 Big data information safe storage encryption system

Publications (2)

Publication Number Publication Date
CN114861204A true CN114861204A (en) 2022-08-05
CN114861204B CN114861204B (en) 2023-09-22

Family

ID=82635732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210489096.7A Active CN114861204B (en) 2022-05-06 2022-05-06 Big data information safe storage encryption system

Country Status (1)

Country Link
CN (1) CN114861204B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116150789A (en) * 2023-02-22 2023-05-23 济南博远特医疗器械销售有限责任公司 Health management platform based on big data
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100226496A1 (en) * 2009-03-04 2010-09-09 Koichiro Akiyama Encryption apparatus, decryption apparatus, key generation apparatus, and storage medium
CN104660590A (en) * 2015-01-31 2015-05-27 宁波工程学院 Cloud storage scheme for file encryption security
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN113378202A (en) * 2021-06-29 2021-09-10 湖南盈聚信息技术有限公司 Multi-dimensional data security storage system based on big data
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100226496A1 (en) * 2009-03-04 2010-09-09 Koichiro Akiyama Encryption apparatus, decryption apparatus, key generation apparatus, and storage medium
CN104660590A (en) * 2015-01-31 2015-05-27 宁波工程学院 Cloud storage scheme for file encryption security
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN113378202A (en) * 2021-06-29 2021-09-10 湖南盈聚信息技术有限公司 Multi-dimensional data security storage system based on big data
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116150789A (en) * 2023-02-22 2023-05-23 济南博远特医疗器械销售有限责任公司 Health management platform based on big data
CN116150789B (en) * 2023-02-22 2024-04-09 北京光大怡科科技有限公司 Health management platform based on big data
CN116776346A (en) * 2023-06-08 2023-09-19 南京师范大学常州创新发展研究院 Data security management system
CN116776346B (en) * 2023-06-08 2024-03-05 南京师范大学常州创新发展研究院 Data security management system

Also Published As

Publication number Publication date
CN114861204B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
CN114861204B (en) Big data information safe storage encryption system
CN106603233B (en) Encryption and decryption method for remote bid opening type bidding system
CN112751852A (en) Data transmission method and related equipment
US8577022B2 (en) Data processing apparatus
CN109561106B (en) Ship communication message real-time analysis and filtering method
CN109033849A (en) The encryption method and device encrypted to deposit data of magnetic disk array
CN110266653B (en) Authentication method, system and terminal equipment
CN101939751A (en) Process distribution system, authentication server, distribution server, and process distribution method
CN108965324A (en) A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN113541945A (en) Electronic information encryption transmission system
CN114422143A (en) Artificial intelligence based dynamic data encryption method, device, equipment and medium
CN111581614B (en) Intensive website-based big data analysis platform
CN116866062A (en) Method, device, equipment and medium for transmitting encrypted message
CN107395350B (en) Method and system for generating key and key handle and intelligent key safety equipment
CN111490880B (en) File receiving method and device
CN114629701A (en) Information display system based on information encryption
CN107786308A (en) Data transmission method and terminal device
CN114221783A (en) Data selective encryption and decryption system
CN108306726B (en) Secret key obtaining method and system
CN113434474B (en) Flow auditing method, equipment and storage medium based on federal learning
CN113810363B (en) Message encryption and decryption method and electronic equipment
CN116528225A (en) Data security management method, system and device for WAPI terminal access network
CN117319075A (en) Data encryption transmission system
CN114845302B (en) Near field encryption communication method and system based on Internet of things
CN113486398B (en) Information comparison method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230829

Address after: 1711, 17th Floor, Building 10, Yard 1, Jinfang Road, Chaoyang District, Beijing, 100012

Applicant after: Beijing Hanbo Network Technology Co.,Ltd.

Address before: 1520, No. 68, hanxingzhi street, Zhongcun street, Panyu District, Guangzhou, Guangdong 511400

Applicant before: GUANGZHOU SHUANGZHI NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant