CN115550066A - Data element security encryption calculation method and device and electronic equipment - Google Patents
Data element security encryption calculation method and device and electronic equipment Download PDFInfo
- Publication number
- CN115550066A CN115550066A CN202211495726.8A CN202211495726A CN115550066A CN 115550066 A CN115550066 A CN 115550066A CN 202211495726 A CN202211495726 A CN 202211495726A CN 115550066 A CN115550066 A CN 115550066A
- Authority
- CN
- China
- Prior art keywords
- data
- calculation
- encryption
- calculation process
- data element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data element security encryption calculation method and a device, wherein the method comprises the following steps: acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state; and performing encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured security rule occurs in the encryption calculation process, the current encryption calculation process is rejected. The invention utilizes the pre-configured safety rules to process the calculation process of the data elements and the non-element data, the whole encryption calculation process can be finished off line without networking, the safety of the method execution main body system is improved, the risky calculation process is initiatively rejected, the operation which possibly causes the reverse operation is avoided, the data encryption mode is irregularly modified on the data elements, the possibility of being cracked is reduced, and the data storage safety is improved.
Description
Technical Field
The invention relates to the technical field of secure encryption algorithms, in particular to a data element secure encryption calculation method and device and electronic equipment.
Background
In the prior art, most of computing applications related to security encryption are secure multi-party computing, and the computing process of the secure multi-party computing needs to be networked to be carried out, but after the networking, the risk of being attacked exists.
Further, in the current encryption calculation method, the calculation is usually performed by n-times calculation according to a mathematical method of an n-element n-times equation set, and the calculation process is likely to bypass the encryption algorithm by the original data, thereby causing a secret leakage effect.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: in view of the fact that computing needs to be performed through networking in the security encryption computing method in the prior art and the risk that the security encryption method is cracked is high, the invention provides a data element security encryption computing method and device and electronic equipment.
The technical scheme adopted by the invention is that the data element security encryption calculation method comprises the following steps:
acquiring at least one data element and non-element calculation data, wherein the data element and non-element calculation data are used for encryption calculation in an off-line state;
and carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In one embodiment, the step of obtaining at least one data element and non-element calculation data is preceded by the method further comprising:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
In one embodiment, the performing encryption calculation by using the non-component calculation data and the data component and outputting a calculation result, wherein when a state that does not comply with a pre-configured security rule occurs in the encryption calculation process, rejecting the current encryption calculation process comprises:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
obtaining the identification data subsets of the data elements and the calculation algorithm process which participate in the calculation each time in the encryption calculation process, wherein each identification data subset is calculated and recorded as a call by the different encryption calculation process,
rejecting the current cryptographic computation process when the number of uses of the subset of identification data is greater than or equal to the number of data elements in the current subset of identification data and the computation algorithm is different from a previous computation algorithm process.
In one embodiment, the method further comprises: and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
Another aspect of the present invention also provides a secure encryption computing apparatus for data elements, including:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In one embodiment, the obtaining unit is further configured to:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
In one embodiment, the secure computing unit is further configured to:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
In one embodiment, the apparatus is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
Another aspect of the present invention also provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the data element secure encryption calculation method as described in any one of the above.
Another aspect of the present invention also provides a computer storage medium having a computer program stored thereon, which when executed by a processor implements the steps of the data element secure encryption calculation method as described in any one of the above.
By adopting the technical scheme, the invention at least has the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by irregularly changing the data encryption mode of the data element.
Drawings
FIG. 1 is a flow diagram of a method for secure cryptographic computation of data elements in accordance with an embodiment of the present invention;
FIG. 2 is another flow diagram of a method for secure cryptographic computation of data elements in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a data element secure encryption computing device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the intended purpose, the present invention will be described in detail with reference to the accompanying drawings and preferred embodiments.
It will be understood that the terms "comprises," "comprising," "includes," "including," "has," "including," and/or "including," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Moreover, when a statement such as "at least one of" appears after a list of listed features, the entirety of the listed features is modified rather than modifying individual elements in the list. Furthermore, the use of "may" mean "one or more embodiments of the application" when describing embodiments of the application. Also, the term "exemplary" is intended to refer to examples or illustrations.
As used herein, the terms "substantially," "about," and the like are used as terms of table approximation and not as terms of table degree, and are intended to account for inherent deviations in measured or calculated values that will be recognized by those of ordinary skill in the art.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The description of the method flow in the present specification and the steps of the flow chart in the drawings of the present specification are not necessarily strictly performed by the step numbers, and the execution order of the method steps may be changed. Moreover, certain steps may be omitted, multiple steps may be combined into one step execution, and/or a step may be broken down into multiple step executions.
A first embodiment of the present invention provides a secure encryption calculation method for data elements, as shown in fig. 1, including the following specific steps:
step S1, acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state;
and S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
Referring to fig. 2, the method provided in this embodiment will be described in detail in steps.
Step S1, at least one data element and non-element calculation data are obtained, and the data element and the non-element calculation data are used for encryption calculation in an off-line state.
In this embodiment, the element data included in the data element may be stored in the corresponding execution main device in an asymmetric encryption manner, so as to improve the security of the data element.
Further, a key for decrypting the corresponding data element may be generated based on the configuration information of the data element. The configuration information may include, for example: the authorization code of the data element application side, the valid lifetime of the data element, and the like, it can be understood that the configuration information may be adjusted according to actual needs, and this is not limited herein.
Preferably, the component data in the data component may be subjected to the re-encryption process aperiodically. The specific way of encryption processing can be to encrypt the data element according to an encryption method common in the art, so as to reduce the possibility of data being cracked and increase the security of data storage.
Further, in the method provided by this embodiment, the non-component data needs to be imported into the execution body of the method, so as to complete the subsequent encryption calculation process.
And S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In this embodiment, the security rule may specifically include:
(1) Rejecting the current encryption calculation process when unauthorized data in the data element and non-element data are included in the current encryption calculation process;
(2) Refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
(3) In the process of obtaining the encryption calculation, identification data subsets and calculation algorithm processes of data elements participating in the calculation each time, each identification data subset is calculated and recorded as being called once by different encryption calculation processes, and when the number of use times of the identification data subsets is larger than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
That is, when the security rule of any one of the three above items is triggered in the specific calculation process of the encryption calculation, the current calculation process is initiatively rejected. By means of the handling of the active rejection operations that may lead to being operated backwards can be avoided.
It should be noted that, different permissions are granted to the data element and the non-element data in a pre-configured link between the execution of the above steps, and in the rule (1), because the permissions corresponding to the data are different, there may be a process that the data with unauthorized or insufficient permission participates in the encryption calculation, so in the rule, when the data with unauthorized or insufficient permission participates in the encryption calculation, the calculation process is rejected.
For example, the algorithm model of the encryption algorithm provided by the present embodiment may be:
if A is the data full set, and the number of elements in the set is more than 3.
A={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n }
Wherein A ', A' 'is a proper subset of the A set, namely A', A '' epsilon A.
A’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-1 }
A’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-2 }
If F (a) ≠ ∅, F (a') =0,F (C) U A ') =0, i.e. F (a'), F (C) U A') no longer takes part in the calculation.
If F (a) = ∅, then F (a ') =0,F (a ") =0, i.e., F (a'), F (a") is no longer involved in the calculation.
By analogy, if A' is taken as the complete set
A '', A '' 'is a proper subset of the set of A', i.e., A '' 'is E.A'.
A’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-2 }
A’’’={A 1 ,A 2 ,A 3 ,A 4 ,A 5 … A n-3 }
Similarly, the algorithm model further comprises:
if F (A ') ≠ ∅, F (A') =0,F (C) U A '') =0, namely F (A ''), F (C) U A ") is no longer involved in the calculation.
If F (a ') = ∅, then F (a ") =0,F (a ' ' ') =0, i.e. F (a"), F (a ' ' ') are no longer involved in the calculation.
It is understood that the above algorithm model is only an example of the present embodiment, and does not limit the scope of the present invention.
It should be noted that, in this embodiment, the configuration of the data element, the importing process of the non-element data, and the subsequent encryption calculation process based on the security rule are all performed offline without networking, and the security of the method provided in this embodiment may be improved.
In this embodiment, the encryption calculation process may also be recorded in a system log, and subsequently, the system log may be utilized to determine the security risk in the encryption calculation process.
Compared with the prior art, the method provided by the embodiment has at least the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by carrying out irregular data encryption on the data elements.
A second embodiment of the present invention, which corresponds to the first embodiment, is a secure encryption computing apparatus for data elements, as shown in fig. 3, and includes the following components:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In this embodiment, the obtaining unit is further configured to:
storing element data included in the data element in an asymmetric encryption manner; generating a key for decrypting the corresponding data element according to the configuration information of the data element; the component data in the data component is subjected to a re-encryption process on an irregular basis.
In this embodiment, the secure computing unit is further configured to:
rejecting a current encryption calculation process when unauthorized data in data element and non-element data is included in the current encryption calculation process;
rejecting the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
in the encryption calculation process, identification data subsets and calculation algorithm processes of data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by different encryption calculation processes, and when the number of use times of the identification data subsets is larger than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
In this embodiment, the data element secure encryption computing device is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
A third embodiment of the present invention, an electronic device, can be understood as a physical device with reference to fig. 4, and includes a processor and a memory storing instructions executable by the processor, and when the instructions are executed by the processor, the following operations are performed:
step S1, acquiring at least one data element and non-element calculation data, wherein the data element and the non-element calculation data are used for encryption calculation in an off-line state;
and S2, carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
In the fourth embodiment of the present invention, the flow of the data element security encryption calculation method in this embodiment is the same as that in the first, second, or third embodiments, but the difference is that in terms of engineering implementation, this embodiment can be implemented by software plus a necessary general hardware platform, and certainly, the present embodiment can also be implemented by hardware, but the former is a better implementation in many cases. With this understanding in mind, the method of the present invention may be embodied in the form of a computer software product stored on a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and including instructions for causing a device (e.g., a network device such as a base station) to perform the method of the present invention.
In summary, compared to the prior art, the present invention has at least the following advantages:
1) The data element safety encryption calculation method provided by the invention processes the calculation process of the data elements and the non-element data by using the preset safety rules, the whole encryption calculation process can be completed off line, networking is not required, and the safety of a method execution main body system is improved.
2) The security rules mentioned in the present invention can actively reject risky computation processes, thereby avoiding operations that may cause reverse operations.
3) The invention reduces the possibility of data decryption and increases the safety of data storage by irregularly changing the data encryption mode of the data element.
While the present invention has been described in connection with the preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Claims (10)
1. A secure cryptographic calculation method for data elements, comprising:
acquiring at least one data element and non-element calculation data, wherein the data element and non-element calculation data are used for encryption calculation in an off-line state;
and carrying out encryption calculation by using the non-element calculation data and the data element, and outputting a calculation result, wherein when a state which does not accord with a pre-configured safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
2. The method of secure cryptographic computation of a data element of claim 1, wherein the step of obtaining at least one data element and non-element computation data is preceded by the method further comprising:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
3. The method for secure cryptographic calculation of data elements according to claim 1, wherein said cryptographic calculation using said non-component calculation data and data components and outputting a calculation result, wherein, when a state of non-compliance with a pre-configured security rule occurs during the cryptographic calculation, rejecting a current cryptographic calculation process comprises:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
refusing the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
4. The method for secure cryptographic computation of a data element of claim 1, the method further comprising: and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
5. A secure cryptographic computing device for data elements, comprising:
an acquisition unit configured to acquire at least one data element and non-element calculation data;
and the safety calculation unit is configured to perform encryption calculation by using the non-element calculation data and the data element and output a calculation result, wherein when a state of not meeting a preset safety rule occurs in the encryption calculation process, the current encryption calculation process is rejected.
6. The data element secure cryptographic computing device of claim 5, wherein the obtaining unit is further configured to:
storing the element data included in the data element in an asymmetric encryption mode;
generating a key for decrypting the corresponding data element according to the configuration information of the data element;
and performing encryption processing on the element data in the data element irregularly.
7. The data element secure cryptographic computing device of claim 5, wherein the secure computing unit is further configured to:
rejecting the current cryptographic calculation process when unauthorized data in the data element and non-element data is included in the current cryptographic calculation process;
rejecting the current encryption calculation process when a binary operation process or an operation process below the binary operation process occurs in the current encryption calculation process;
and in the encryption calculation process, identification data subsets and calculation algorithm processes of the data elements participating in calculation each time are obtained, each identification data subset is calculated and recorded as called once by the different encryption calculation processes, and when the number of use times of the identification data subsets is more than or equal to the number of the data elements in the current identification data subset and the calculation algorithm is different from the previous calculation algorithm process, the current encryption calculation process is rejected.
8. The data element secure cryptographic computing device of claim 5, wherein the device is further configured to:
and recording the encryption calculation process in a system log, and determining the security risk in the encryption calculation process by using the system log.
9. An electronic device, characterized in that the electronic device comprises: memory, processor and computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the data element secure cryptographic calculation method of any one of claims 1 to 4.
10. A computer storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the data element secure cryptographic calculation method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211495726.8A CN115550066B (en) | 2022-11-28 | 2022-11-28 | Data element security encryption calculation method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211495726.8A CN115550066B (en) | 2022-11-28 | 2022-11-28 | Data element security encryption calculation method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115550066A true CN115550066A (en) | 2022-12-30 |
CN115550066B CN115550066B (en) | 2023-04-04 |
Family
ID=84721916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211495726.8A Active CN115550066B (en) | 2022-11-28 | 2022-11-28 | Data element security encryption calculation method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115550066B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609640A (en) * | 2004-10-25 | 2012-07-25 | 安全第一公司 | Secure data parser method and system |
US20200396210A1 (en) * | 2019-06-11 | 2020-12-17 | Bank Of America Corporation | Data security tool |
-
2022
- 2022-11-28 CN CN202211495726.8A patent/CN115550066B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609640A (en) * | 2004-10-25 | 2012-07-25 | 安全第一公司 | Secure data parser method and system |
US20200396210A1 (en) * | 2019-06-11 | 2020-12-17 | Bank Of America Corporation | Data security tool |
Non-Patent Citations (1)
Title |
---|
田洪迅等: "缺失故障数据元件的可靠性评估方法研究" * |
Also Published As
Publication number | Publication date |
---|---|
CN115550066B (en) | 2023-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20210138714A (en) | Encryption and Decryption of Information | |
CN110740128B (en) | Offline data encryption method and device | |
US20170149565A9 (en) | Format-preserving cryptographic systems | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN104281794A (en) | Password storing and verifying method and password storing and verifying device | |
Zhao et al. | Iris template protection based on local ranking | |
CN110750810A (en) | Data desensitization method and device, computer equipment and storage medium | |
CN111859446A (en) | Agricultural product traceability information sharing-privacy protection method and system | |
FR3027753A1 (en) | METHOD FOR AUTHENTICATING A USER HAVING A BIOMETRIC CERTIFICATE | |
CN110365626B (en) | User login security authentication method for anti-collision library, terminal equipment and storage medium | |
CN111859435B (en) | Data security processing method and device | |
CN110162995B (en) | Method and device for evaluating data contribution degree | |
CN115550066B (en) | Data element security encryption calculation method and device and electronic equipment | |
CN105590044A (en) | Information authentication method and apparatus | |
CN108334786A (en) | A kind of data ciphering method | |
CN112182555A (en) | Weak password detection method, device, electronic apparatus, storage medium, and program | |
CN113055159B (en) | Data desensitization method and device | |
CN111078649A (en) | Block chain-based on-cloud file storage method and device and electronic equipment | |
CN116361774A (en) | Password cracking method and device | |
CN115186876A (en) | Method and device for protecting data privacy of two-party joint training service prediction model | |
CN115085974A (en) | Flow confusion method and device | |
CN114374521A (en) | Private data protection method, electronic equipment and storage medium | |
CN114329614A (en) | Data desensitization method and system based on character string confusion | |
Gorbenko et al. | Analysis of Potential Post-Quantum Schemes of Hash-Based Digital Signatur | |
CN112926065A (en) | Customizable encryption and decryption device, encryption and decryption method and storage equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |