CN115550066A - Data element security encryption calculation method and device and electronic equipment - Google Patents

Data element security encryption calculation method and device and electronic equipment Download PDF

Info

Publication number
CN115550066A
CN115550066A CN202211495726.8A CN202211495726A CN115550066A CN 115550066 A CN115550066 A CN 115550066A CN 202211495726 A CN202211495726 A CN 202211495726A CN 115550066 A CN115550066 A CN 115550066A
Authority
CN
China
Prior art keywords
data
calculation
encryption
calculation process
data element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211495726.8A
Other languages
Chinese (zh)
Other versions
CN115550066B (en
Inventor
陆志鹏
国丽
刘国栋
朱立锋
杜树峰
郑曦
周崇毅
赵健
温彦龙
乔亲旺
范国浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA ELECTRONIC INFORMATION INDUSTRY GROUP Co
Original Assignee
CHINA ELECTRONIC INFORMATION INDUSTRY GROUP Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA ELECTRONIC INFORMATION INDUSTRY GROUP Co filed Critical CHINA ELECTRONIC INFORMATION INDUSTRY GROUP Co
Priority to CN202211495726.8A priority Critical patent/CN115550066B/en
Publication of CN115550066A publication Critical patent/CN115550066A/en
Application granted granted Critical
Publication of CN115550066B publication Critical patent/CN115550066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data element security encryption calculation method and a device, wherein the method comprises the following steps: acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state; and performing encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured security rule occurs in the encryption calculation process, the current encryption calculation process is rejected. The invention utilizes the pre-configured safety rules to process the calculation process of the data elements and the non-element data, the whole encryption calculation process can be finished off line without networking, the safety of the method execution main body system is improved, the risky calculation process is initiatively rejected, the operation which possibly causes the reverse operation is avoided, the data encryption mode is irregularly modified on the data elements, the possibility of being cracked is reduced, and the data storage safety is improved.

Description

Data element security encryption calculation method and device and electronic equipment
Technical Field
The invention relates to the technical field of secure encryption algorithms, in particular to a data element secure encryption calculation method and device and electronic equipment.
Background
In the prior art, most of computing applications related to security encryption are secure multi-party computing, and the computing process of the secure multi-party computing needs to be networked to be carried out, but after the networking, the risk of being attacked exists.
Further, in the current encryption calculation method, the calculation is usually performed by n-times calculation according to a mathematical method of an n-element n-times equation set, and the calculation process is likely to bypass the encryption algorithm by the original data, thereby causing a secret leakage effect.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: in view of the fact that computing needs to be performed through networking in the security encryption computing method in the prior art and the risk that the security encryption method is cracked is high, the invention provides a data element security encryption computing method and device and electronic equipment.
The technical scheme adopted by the invention is that the data element security encryption calculation method comprises the following steps:
acquiring at least one data element and non-element calculation data, wherein the data element and non-element calculation data are used for encryption calculation in an off-line state;
and carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In one embodiment, the step of obtaining at least one data element and non-element calculation data is preceded by the method further comprising:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
In one embodiment, the performing encryption calculation by using the non-component calculation data and the data component and outputting a calculation result, wherein when a state that does not comply with a pre-configured security rule occurs in the encryption calculation process, rejecting the current encryption calculation process comprises:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
obtaining the identification data subsets of the data elements and the calculation algorithm process which participate in the calculation each time in the encryption calculation process, wherein each identification data subset is calculated and recorded as a call by the different encryption calculation process,
rejecting the current cryptographic computation process when the number of uses of the subset of identification data is greater than or equal to the number of data elements in the current subset of identification data and the computation algorithm is different from a previous computation algorithm process.
In one embodiment, the method further comprises: and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
Another aspect of the present invention also provides a secure encryption computing apparatus for data elements, including:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In one embodiment, the obtaining unit is further configured to:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
In one embodiment, the secure computing unit is further configured to:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
In one embodiment, the apparatus is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
Another aspect of the present invention also provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the data element secure encryption calculation method as described in any one of the above.
Another aspect of the present invention also provides a computer storage medium having a computer program stored thereon, which when executed by a processor implements the steps of the data element secure encryption calculation method as described in any one of the above.
By adopting the technical scheme, the invention at least has the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by irregularly changing the data encryption mode of the data element.
Drawings
FIG. 1 is a flow diagram of a method for secure cryptographic computation of data elements in accordance with an embodiment of the present invention;
FIG. 2 is another flow diagram of a method for secure cryptographic computation of data elements in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a data element secure encryption computing device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the intended purpose, the present invention will be described in detail with reference to the accompanying drawings and preferred embodiments.
It will be understood that the terms "comprises," "comprising," "includes," "including," "has," "including," and/or "including," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Moreover, when a statement such as "at least one of" appears after a list of listed features, the entirety of the listed features is modified rather than modifying individual elements in the list. Furthermore, the use of "may" mean "one or more embodiments of the application" when describing embodiments of the application. Also, the term "exemplary" is intended to refer to examples or illustrations.
As used herein, the terms "substantially," "about," and the like are used as terms of table approximation and not as terms of table degree, and are intended to account for inherent deviations in measured or calculated values that will be recognized by those of ordinary skill in the art.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The description of the method flow in the present specification and the steps of the flow chart in the drawings of the present specification are not necessarily strictly performed by the step numbers, and the execution order of the method steps may be changed. Moreover, certain steps may be omitted, multiple steps may be combined into one step execution, and/or a step may be broken down into multiple step executions.
A first embodiment of the present invention provides a secure encryption calculation method for data elements, as shown in fig. 1, including the following specific steps:
step S1, acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state;
and S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
Referring to fig. 2, the method provided in this embodiment will be described in detail in steps.
Step S1, at least one data element and non-element calculation data are obtained, and the data element and the non-element calculation data are used for encryption calculation in an off-line state.
In this embodiment, the element data included in the data element may be stored in the corresponding execution main device in an asymmetric encryption manner, so as to improve the security of the data element.
Further, a key for decrypting the corresponding data element may be generated based on the configuration information of the data element. The configuration information may include, for example: the authorization code of the data element application side, the valid lifetime of the data element, and the like, it can be understood that the configuration information may be adjusted according to actual needs, and this is not limited herein.
Preferably, the component data in the data component may be subjected to the re-encryption process aperiodically. The specific way of encryption processing can be to encrypt the data element according to an encryption method common in the art, so as to reduce the possibility of data being cracked and increase the security of data storage.
Further, in the method provided by this embodiment, the non-component data needs to be imported into the execution body of the method, so as to complete the subsequent encryption calculation process.
And S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In this embodiment, the security rule may specifically include:
(1) Rejecting the current encryption calculation process when unauthorized data in the data element and non-element data are included in the current encryption calculation process;
(2) Refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
(3) In the process of obtaining the encryption calculation, identification data subsets and calculation algorithm processes of data elements participating in the calculation each time, each identification data subset is calculated and recorded as being called once by different encryption calculation processes, and when the number of use times of the identification data subsets is larger than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
That is, when the security rule of any one of the three above items is triggered in the specific calculation process of the encryption calculation, the current calculation process is initiatively rejected. By means of the handling of the active rejection operations that may lead to being operated backwards can be avoided.
It should be noted that, different permissions are granted to the data element and the non-element data in a pre-configured link between the execution of the above steps, and in the rule (1), because the permissions corresponding to the data are different, there may be a process that the data with unauthorized or insufficient permission participates in the encryption calculation, so in the rule, when the data with unauthorized or insufficient permission participates in the encryption calculation, the calculation process is rejected.
For example, the algorithm model of the encryption algorithm provided by the present embodiment may be:
if A is the data full set, and the number of elements in the set is more than 3.
A={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n }
Wherein A ', A' 'is a proper subset of the A set, namely A', A '' epsilon A.
A’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-1 }
A’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-2 }
If F (a) ≠ ∅, F (a') =0,F (C) U A ') =0, i.e. F (a'), F (C) U A') no longer takes part in the calculation.
If F (a) = ∅, then F (a ') =0,F (a ") =0, i.e., F (a'), F (a") is no longer involved in the calculation.
By analogy, if A' is taken as the complete set
A '', A '' 'is a proper subset of the set of A', i.e., A '' 'is E.A'.
A’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-2 }
A’’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-3 }
Similarly, the algorithm model further comprises:
if F (A ') ≠ ∅, F (A') =0,F (C) U A '') =0, namely F (A ''), F (C) U A ") is no longer involved in the calculation.
If F (a ') = ∅, then F (a ") =0,F (a ' ' ') =0, i.e. F (a"), F (a ' ' ') are no longer involved in the calculation.
It is understood that the above algorithm model is only an example of the present embodiment, and does not limit the scope of the present invention.
It should be noted that, in this embodiment, the configuration of the data element, the importing process of the non-element data, and the subsequent encryption calculation process based on the security rule are all performed offline without networking, and the security of the method provided in this embodiment may be improved.
In this embodiment, the encryption calculation process may also be recorded in a system log, and subsequently, the system log may be utilized to determine the security risk in the encryption calculation process.
Compared with the prior art, the method provided by the embodiment has at least the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by carrying out irregular data encryption on the data elements.
A second embodiment of the present invention, which corresponds to the first embodiment, is a secure encryption computing apparatus for data elements, as shown in fig. 3, and includes the following components:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In this embodiment, the obtaining unit is further configured to:
storing element data included in the data element in an asymmetric encryption manner; generating a key for decrypting the corresponding data element according to the configuration information of the data element; the component data in the data component is subjected to a re-encryption process on an irregular basis.
In this embodiment, the secure computing unit is further configured to:
rejecting a current encryption calculation process when unauthorized data in data element and non-element data is included in the current encryption calculation process;
rejecting the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
in the encryption calculation process, identification data subsets and calculation algorithm processes of data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by different encryption calculation processes, and when the number of use times of the identification data subsets is larger than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
In this embodiment, the data element secure encryption computing device is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
A third embodiment of the present invention, an electronic device, can be understood as a physical device with reference to fig. 4, and includes a processor and a memory storing instructions executable by the processor, and when the instructions are executed by the processor, the following operations are performed:
step S1, acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state;
and S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In the fourth embodiment of the present invention, the flow of the data element security encryption calculation method in this embodiment is the same as that in the first, second, or third embodiments, but the difference is that in terms of engineering implementation, this embodiment can be implemented by software plus a necessary general hardware platform, and certainly, the present embodiment can also be implemented by hardware, but the former is a better implementation in many cases. With this understanding in mind, the method of the present invention may be embodied in the form of a computer software product stored on a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and including instructions for causing a device (e.g., a network device such as a base station) to perform the method of the present invention.
In summary, compared to the prior art, the present invention has at least the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by irregularly changing the data encryption mode of the data element.
While the present invention has been described in connection with the preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A secure cryptographic calculation method for data elements, comprising:
acquiring at least one data element and non-element calculation data, wherein the data element and non-element calculation data are used for encryption calculation in an off-line state;
and carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
2. The method of secure cryptographic computation of a data element of claim 1, wherein the step of obtaining at least one data element and non-element computation data is preceded by the method further comprising:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
3. The method for secure cryptographic calculation of data elements according to claim 1, wherein said cryptographic calculation using said non-component calculation data and data components and outputting a calculation result, wherein, when a state of non-compliance with a pre-configured security rule occurs during the cryptographic calculation, rejecting a current cryptographic calculation process comprises:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
4. The method for secure cryptographic computation of a data element of claim 1, the method further comprising: and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
5. A secure cryptographic computing device for data elements, comprising:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
6. The data element secure cryptographic computing device of claim 5, wherein the obtaining unit is further configured to:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
7. The data element secure cryptographic computing device of claim 5, wherein the secure computing unit is further configured to:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
rejecting the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
8. The data element secure cryptographic computing device of claim 5, wherein the device is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
9. An electronic device, characterized in that the electronic device comprises: memory, processor and computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the data element secure cryptographic calculation method of any one of claims 1 to 4.
10. A computer storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the data element secure cryptographic calculation method of any one of claims 1 to 4.
CN202211495726.8A 2022-11-28 2022-11-28 Data element security encryption calculation method and device and electronic equipment Active CN115550066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211495726.8A CN115550066B (en) 2022-11-28 2022-11-28 Data element security encryption calculation method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211495726.8A CN115550066B (en) 2022-11-28 2022-11-28 Data element security encryption calculation method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN115550066A true CN115550066A (en) 2022-12-30
CN115550066B CN115550066B (en) 2023-04-04

Family

ID=84721916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211495726.8A Active CN115550066B (en) 2022-11-28 2022-11-28 Data element security encryption calculation method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115550066B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609640A (en) * 2004-10-25 2012-07-25 安全第一公司 Secure data parser method and system
US20200396210A1 (en) * 2019-06-11 2020-12-17 Bank Of America Corporation Data security tool

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609640A (en) * 2004-10-25 2012-07-25 安全第一公司 Secure data parser method and system
US20200396210A1 (en) * 2019-06-11 2020-12-17 Bank Of America Corporation Data security tool

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田洪迅等: "缺失故障数据元件的可靠性评估方法研究" *

Also Published As

Publication number Publication date
CN115550066B (en) 2023-04-04

Similar Documents

Publication Publication Date Title
KR20210138714A (en) Encryption and Decryption of Information
CN110740128B (en) Offline data encryption method and device
US20170149565A9 (en) Format-preserving cryptographic systems
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN104281794A (en) Password storing and verifying method and password storing and verifying device
Zhao et al. Iris template protection based on local ranking
CN110750810A (en) Data desensitization method and device, computer equipment and storage medium
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
FR3027753A1 (en) METHOD FOR AUTHENTICATING A USER HAVING A BIOMETRIC CERTIFICATE
CN110365626B (en) User login security authentication method for anti-collision library, terminal equipment and storage medium
CN111859435B (en) Data security processing method and device
CN110162995B (en) Method and device for evaluating data contribution degree
CN115550066B (en) Data element security encryption calculation method and device and electronic equipment
CN105590044A (en) Information authentication method and apparatus
CN108334786A (en) A kind of data ciphering method
CN112182555A (en) Weak password detection method, device, electronic apparatus, storage medium, and program
CN113055159B (en) Data desensitization method and device
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
CN116361774A (en) Password cracking method and device
CN115186876A (en) Method and device for protecting data privacy of two-party joint training service prediction model
CN115085974A (en) Flow confusion method and device
CN114374521A (en) Private data protection method, electronic equipment and storage medium
CN114329614A (en) Data desensitization method and system based on character string confusion
Gorbenko et al. Analysis of Potential Post-Quantum Schemes of Hash-Based Digital Signatur
CN112926065A (en) Customizable encryption and decryption device, encryption and decryption method and storage equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant