CN117874097A - Ciphertext data fuzzy query method and device - Google Patents

Ciphertext data fuzzy query method and device Download PDF

Info

Publication number
CN117874097A
CN117874097A CN202311823630.4A CN202311823630A CN117874097A CN 117874097 A CN117874097 A CN 117874097A CN 202311823630 A CN202311823630 A CN 202311823630A CN 117874097 A CN117874097 A CN 117874097A
Authority
CN
China
Prior art keywords
rule
encryption
information
data
queried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311823630.4A
Other languages
Chinese (zh)
Inventor
蓝江艳
梁宵
孟媛媛
刘春娜
刘茜
常建新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202311823630.4A priority Critical patent/CN117874097A/en
Publication of CN117874097A publication Critical patent/CN117874097A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A method and a device for fuzzy query of ciphertext data, the method comprises the following steps: acquiring information to be queried; encrypting the information to be queried according to an encryption rule; inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiry result. The method and the device provided by the embodiment of the invention can ensure that the fuzzy query is limited in an allowable range, ensure the data security and realize the fuzzy query, and in addition, when the length or the number of the encryption fields grows exponentially, the consumed resources and the generated workload are not obviously increased, so that the cost of additional resources can be reduced.

Description

Ciphertext data fuzzy query method and device
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for fuzzy query of ciphertext data.
Background
Encryption of data is a common way to protect sensitive data, many of which are stored in a database (e.g., in the form of ciphers). Along with the increasing importance of people on data security, encrypted data is spread from passwords to sensitive data such as identity cards, mobile phone numbers, bank card numbers and the like. Therefore, the retrieval of the database ciphertext data becomes an important issue. Since there is no inferable relationship between the encrypted data and the ciphertext, i.e., plaintext "1" and ciphertext of plaintext "12" have no similar portion. This means that for a phone number, such as "18818881666", the SQL statement can be used to accurately query whether there is "18818881666" in the database, but it is impossible to query whether there is a phone number containing "1888", which corresponds to the actual database query service, meaning that the query keyword "like" is not available for the encrypted field. For example, assume that there is only one row of data in the data table named "USER", where the value of the "phone_number" field is "18818881666", for the following SQL:
SELECT COUNT(1)FROM USER WHERE PHONE_NUMBER=‘18818881666’;
SELECT COUNT(1)FROM USER WHERE PHONE_NUMBER LIKE‘%1888%’;
if the data in the database is plaintext, both sentences can return a query result 1; if the data in the database is ciphertext, the first statement returns 1 and the second returns 0. This means that in real traffic, the fuzzy query results for ciphertext data are inconsistent with the actual results.
Existing ciphertext fuzzy queries require traversal of combinations of possible original data to form a derivative word set for use in the query. If the original data length is further increased, the scope of such derived vocabulary is further exploded, meaning that a large amount of resources need to be used to maintain the vocabulary. Furthermore, if ciphertext data is modified, this means that the derivative word set needs to be recalculated, thereby adding a significant amount of effort.
Disclosure of Invention
In view of the above, the invention provides a method and a device for fuzzy query of ciphertext data, which aim to solve the problem that ciphertext data query is difficult to realize in the prior art.
In a first aspect, an embodiment of the present invention provides a method for fuzzy query of ciphertext data, including: acquiring information to be queried; encrypting the information to be queried according to an encryption rule; inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiry result.
Further, the ciphertext data is obtained in advance by adopting the following mode: acquiring plaintext data; dividing the plaintext data according to a segmentation rule; and encrypting the split civilized data according to the encryption rule to obtain ciphertext data.
Further, before the plaintext data is segmented according to a segmentation rule, the method includes: and acquiring a segmentation rule according to the type of the plaintext data.
Further, before encrypting the information to be queried according to an encryption rule, the method includes: and acquiring an encryption rule according to the type of the information to be queried.
Further, before the obtaining the information to be queried, the method includes: in response to the query instruction, a query information input interface is displayed for a user to input information to be queried.
Further, the method further comprises: and storing the ciphertext data in a database.
Further, the segmentation rule and the encryption rule are obtained in advance by adopting the following modes: according to the type of the plaintext data, setting a segmentation rule and an encryption rule, and storing the segmentation rule and the encryption rule in a rule base.
In a second aspect, an embodiment of the present invention further provides an apparatus for fuzzy query of ciphertext data, including: the acquisition unit is used for acquiring information to be queried; the encryption unit is used for encrypting the information to be queried according to an encryption rule; and the inquiring unit is used for inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiring result.
Further, the ciphertext data is obtained in advance by adopting the following mode: acquiring plaintext data; dividing the plaintext data according to a segmentation rule; and encrypting the split civilized data according to the encryption rule to obtain ciphertext data.
Further, the acquisition unit is further configured to: before the plaintext data is segmented according to the segmentation rules, the segmentation rules are acquired according to the type of the plaintext data.
Further, the encryption unit is further configured to: and before the information to be queried is encrypted according to the encryption rule, acquiring the encryption rule according to the type of the information to be queried.
Further, the device also comprises a display unit for responding to the query instruction before acquiring the information to be queried, and displaying a query information input interface for a user to input the information to be queried.
Further, the device also comprises a storage unit for storing the ciphertext data in a database.
Further, the segmentation rule and the encryption rule are obtained in advance by adopting the following modes: according to the type of the plaintext data, setting a segmentation rule and an encryption rule, and storing the segmentation rule and the encryption rule in a rule base.
In a third aspect, embodiments of the present invention further provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method provided by the above embodiments.
In a fourth aspect, an embodiment of the present invention further provides an electronic device, including: a processor; a memory for storing the processor-executable instructions; the processor is configured to read the executable instructions from the memory and execute the instructions to implement the methods provided in the foregoing embodiments.
According to the method and the device for fuzzy query of the ciphertext data, the encrypted information to be queried is queried in the ciphertext data after the information to be queried is encrypted by adopting the same encryption rule as the ciphertext data, so that the query result is obtained, the fuzzy query is ensured to be limited in an allowable range, the fuzzy query is realized while the data security is ensured, in addition, the consumed resources and the generated workload are not obviously increased when the encryption field length or the number exponentially increases, and the expenditure of additional resources can be reduced.
Drawings
FIG. 1 illustrates an exemplary flow chart of a method of ciphertext data fuzzy query in accordance with one embodiment of the invention;
FIG. 2 illustrates an exemplary flow chart of a method of ciphertext data fuzzy query in accordance with another embodiment of the invention;
fig. 3 is a schematic diagram of an apparatus for fuzzy query of ciphertext data according to an embodiment of the invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the examples described herein, which are provided to fully and completely disclose the present invention and fully convey the scope of the invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, like elements/components are referred to by like reference numerals.
Unless otherwise indicated, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. In addition, it will be understood that terms defined in commonly used dictionaries should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
FIG. 1 illustrates an exemplary flow chart of a method of ciphertext data fuzzy query in accordance with one embodiment of the invention.
As shown in fig. 1, the method includes:
step S101: and obtaining the information to be queried.
Fig. 2 illustrates an exemplary flow chart of a method of ciphertext data fuzzy query in accordance with another embodiment of the invention. As shown in fig. 2, further, before step S101, the method includes:
in response to the query instruction, a query information input interface is displayed for a user to input information to be queried.
Specifically, according to the query instruction, a corresponding query information input interface is generated and displayed. For example, if a corresponding user needs to be found by fuzzily inquiring the mobile phone number, displaying an inquiry information input interface as "please input the last four digits of the mobile phone tail number" according to a mobile phone number inquiry instruction; if the corresponding user needs to be found by fuzzily inquiring the identification card number, displaying an inquiry information input interface as 'six digits after the identification card number is requested to be input' according to an identification card number inquiry instruction.
Step S102: and encrypting the information to be queried according to the encryption rule.
As shown in fig. 2, further, before step S102, the method includes:
and acquiring an encryption rule according to the type of the information to be queried.
Specifically, for different types of plaintext data, the same encryption rule may be used for encryption, or different encryption rules may be used for encryption. And reading a preset corresponding encryption rule from a rule base according to the type of the information to be queried, namely the type of the plaintext data to be queried, so that the information to be queried and the ciphertext data to be searched subsequently adopt the same encryption rule.
Step S103: and inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiry result.
Specifically, the encrypted information to be queried is matched in ciphertext data adopting the same encryption rule, and the obtained matching result is the query result.
As shown in fig. 2, further, ciphertext data is obtained in advance as follows:
acquiring plaintext data;
dividing the plaintext data according to a segmentation rule;
and encrypting the segmented civilized data according to an encryption rule to obtain the ciphertext data.
Further, before the plaintext data is segmented according to the segmentation rule, the method comprises:
and acquiring segmentation rules according to the type of the plaintext data.
Further, the segmentation rule and the encryption rule are obtained in advance by adopting the following modes:
according to the type of the plaintext data, a segmentation rule and an encryption rule are set, and the segmentation rule and the encryption rule are stored in a rule base.
Further, the method further comprises: the ciphertext data is stored in a database.
Specifically, for different types of plaintext data, the same segmentation rule may be used for segmentation, or different segmentation rules may be used for segmentation. And reading a preset corresponding segmentation rule from the rule base according to the type of the plaintext data. The segmentation rule may be set according to the length and format of the plaintext data, which is not limited herein. For example, for the mobile phone number, the first three bits, the middle four bits, and the last four bits, i.e., 3,4 rules, may be used for segmentation; for the identification card number, division can be performed by adopting a rule of 6,6 and 6 which are six digits. And encrypting the segmented plaintext data respectively to obtain ciphertext data. For different types of plaintext data, the same encryption rules may be used for encryption, and different encryption rules may be used for encryption. And reading a preset corresponding encryption rule from the rule base according to the type of the plaintext data. The encryption rule may be set according to the length, format and sensitivity of the plaintext data, and may be symmetric encryption, asymmetric encryption, or hash algorithm, which is not limited herein.
In the above embodiment, since the ciphertext data is directly stored in the position where the original plaintext is located, the segmentation encryption method needs not to perform additional index maintenance or establishment of derivative word sets besides maintaining segmentation rules. For fields with other lengths, the rule set in the rule base only needs to modify or add the content of the digital part, and compared with traversing the plaintext data combination to form the derived word set, the method greatly reduces the consumed resources and the required workload.
It should be noted that, the segment encryption method provided in this embodiment is not only applicable to data with a certain format requirement, such as a certificate number, but also applicable to other data without a special format requirement, such as self-introduction.
Specifically, taking a mobile phone number as an example, common fuzzy query modes include querying the rear four digits of the mobile phone tail number, querying the front three digits of the mobile phone number, and the like, based on the mode, the mobile phone number can be used as encryption to be divided into three sections, and the record segmentation rule is as follows: USER-phone_number-3_4_4 is interpreted as segment encryption of the phone_number field of the USER table with a segmentation standard of 3,4 segmentation.
Still referring to the example of "18818881666" for a mobile phone, we need to encrypt "188", "1888", "1666", respectively, and add the encrypted ciphertext to ASSQ, BQSNSP, SBCSN. At this time, the phone number ciphertext in the database is ASSQBQSNSPSBCSN. For an external illegal user, the series of ciphertext data cannot be decrypted, and the ciphertext cannot be decrypted one by one after being split because no obvious dividing line exists.
At this point the query statement is reviewed:
and (3) accurate query: SELECT COUNT (1) FROM USER WHERE PHONE _number= '18818881666';
fuzzy query: SELECT COUNT (1) FROM USER WHERE PHONE _number LIKE '%1666';
at this time, for the user who needs accurate inquiry, after typing in the mobile phone number, the encryption system can read the preset rule, segment encrypt the mobile phone number input by the user, and then make full field matching again.
The user needing fuzzy inquiry can make corresponding prompt on the interactive interface, such as' please input the last four digits of the mobile phone tail! At this time, the user inputs '1666', the system encrypts the plaintext data to obtain 'SBDSN', and then the statement actually executed by the original query SQL in the query is: SELECT COUNT (1) FROM USER WHERE PHONE _number list '% SBCSN'; since the "assqb qsnspsbcsn" contains the corresponding character string, a correct result can be returned to the user.
Besides, since the ciphertext of the data is directly stored in the original plaintext, the segmentation encryption method does not need to maintain segmentation rules, and does not need to perform additional index maintenance or establishment of derivative word sets, which means that a field in the corresponding table is 1 row or 1 hundred million rows of table data, and the rule set to be maintained at the moment is only "USER-phone_number-3_4_4". For other length fields, the rule set need only modify or add the content of the digital section.
According to the embodiment, after the information to be queried is encrypted by adopting the same encryption rule as the ciphertext data, the encrypted information to be queried is queried in the ciphertext data to obtain the query result, so that the fuzzy query is limited in an allowable range, the data security is ensured, the fuzzy query is realized, in addition, when the length or the number of the encryption fields is exponentially increased, the consumed resources and the generated workload are not obviously increased, and the cost of additional resources can be reduced.
Fig. 3 is a schematic diagram of an apparatus for fuzzy query of ciphertext data according to an embodiment of the invention.
As shown in fig. 3, the apparatus includes:
an acquiring unit 301, configured to acquire information to be queried;
an encryption unit 302, configured to encrypt information to be queried according to an encryption rule;
and the query unit 303 is configured to query the encrypted information to be queried in the ciphertext data adopting the encryption rule, so as to obtain a query result.
Further, the acquiring unit 301 is further configured to:
before the plaintext data is segmented according to the segmentation rules, the segmentation rules are acquired according to the type of the plaintext data.
Further, the encryption unit 302 is further configured to:
and before the information to be queried is encrypted according to the encryption rule, acquiring the encryption rule according to the type of the information to be queried.
Specifically, for different types of plaintext data, the same encryption rule may be used for encryption, or different encryption rules may be used for encryption. And reading a preset corresponding encryption rule from a rule base according to the type of the information to be queried, namely the type of the plaintext data to be queried, so that the information to be queried and the ciphertext data to be searched subsequently adopt the same encryption rule.
Further, the device also comprises a display unit for displaying a query information input interface for a user to input the information to be queried in response to the query instruction before the information to be queried is acquired.
Specifically, according to the query instruction, a corresponding query information input interface is generated and displayed. For example, if a corresponding user needs to be found by fuzzily inquiring the mobile phone number, displaying an inquiry information input interface as "please input the last four digits of the mobile phone tail number" according to a mobile phone number inquiry instruction; if the corresponding user needs to be found by fuzzily inquiring the identification card number, displaying an inquiry information input interface as 'six digits after the identification card number is requested to be input' according to an identification card number inquiry instruction.
Further, ciphertext data is obtained in advance by:
acquiring plaintext data;
dividing the plaintext data according to a segmentation rule;
and encrypting the segmented civilized data according to an encryption rule to obtain the ciphertext data.
Further, the apparatus includes a storage unit for storing ciphertext data in the database.
Further, the segmentation rule and the encryption rule are obtained in advance by adopting the following modes:
according to the type of the plaintext data, a segmentation rule and an encryption rule are set, and the segmentation rule and the encryption rule are stored in a rule base.
Specifically, for different types of plaintext data, the same segmentation rule may be used for segmentation, or different segmentation rules may be used for segmentation. And reading a preset corresponding segmentation rule from the rule base according to the type of the plaintext data. The segmentation rule may be set according to the length and format of the plaintext data, which is not limited herein. For example, for the mobile phone number, the first three bits, the middle four bits, and the last four bits, i.e., 3,4 rules, may be used for segmentation; for the identification card number, division can be performed by adopting a rule of 6,6 and 6 which are six digits. And encrypting the segmented plaintext data respectively to obtain ciphertext data. For different types of plaintext data, the same encryption rules may be used for encryption, and different encryption rules may be used for encryption. And reading a preset corresponding encryption rule from the rule base according to the type of the plaintext data. The encryption rule may be set according to the length, format and sensitivity of the plaintext data, and may be symmetric encryption, asymmetric encryption, or hash algorithm, which is not limited herein.
In the above embodiment, since the ciphertext data is directly stored in the position where the original plaintext is located, the segmentation encryption method needs not to perform additional index maintenance or establishment of derivative word sets besides maintaining segmentation rules. For fields with other lengths, the rule set in the rule base only needs to modify or add the content of the digital part, and compared with traversing the plaintext data combination to form the derived word set, the method greatly reduces the consumed resources and the required workload.
It should be noted that, the segment encryption method provided in this embodiment is not only applicable to data with a certain format requirement (such as a certificate number, etc.), but also applicable to other data without a special format requirement (such as self-introduction).
Specifically, taking a mobile phone number as an example, common fuzzy query modes include querying the rear four digits of the mobile phone tail number, querying the front three digits of the mobile phone number, and the like, based on the mode, the mobile phone number can be used as encryption to be divided into three sections, and the record segmentation rule is as follows: USER-phone_number-3_4_4 is interpreted as segment encryption of the phone_number field of the USER table with a segmentation standard of 3,4 segmentation.
Still referring to the example of "18818881666" for a mobile phone, we need to encrypt "188", "1888", "1666", respectively, and add the encrypted ciphertext to ASSQ, BQSNSP, SBCSN. At this time, the phone number ciphertext in the database is ASSQBQSNSPSBCSN. For an external illegal user, the series of ciphertext data cannot be decrypted, and the ciphertext cannot be decrypted one by one after being split because no obvious dividing line exists.
At this point the query statement is reviewed:
and (3) accurate query: SELECT COUNT (1) FROM USER WHERE PHONE _number= '18818881666';
fuzzy query: SELECT COUNT (1) FROM USER WHERE PHONE _number LIKE '%1666';
at this time, for the user who needs accurate inquiry, after typing in the mobile phone number, the encryption system can read the preset rule, segment encrypt the mobile phone number input by the user, and then make full field matching again.
The user needing fuzzy inquiry can make corresponding prompt on the interactive interface, such as' please input the last four digits of the mobile phone tail! At this time, the user inputs '1666', the system encrypts the plaintext data to obtain 'SBDSN', and then the statement actually executed by the original query SQL in the query is: SELECT COUNT (1) FROM USER WHERE PHONE _number list '% SBCSN'; since the "assqb qsnspsbcsn" contains the corresponding character string, a correct result can be returned to the user.
Besides, since the ciphertext of the data is directly stored in the original plaintext, the segmentation encryption method does not need to maintain segmentation rules, and does not need to perform additional index maintenance or establishment of derivative word sets, which means that a field in the corresponding table is 1 row or 1 hundred million rows of table data, and the rule set to be maintained at the moment is only "USER-phone_number-3_4_4". For other length fields, the rule set need only modify or add the content of the digital section.
According to the embodiment, after the information to be queried is encrypted by adopting the same encryption rule as the ciphertext data, the encrypted information to be queried is queried in the ciphertext data to obtain the query result, so that the fuzzy query is limited in an allowable range, the data security is ensured, the fuzzy query is realized, in addition, when the length or the number of the encryption fields is exponentially increased, the consumed resources and the generated workload are not obviously increased, and the cost of additional resources can be reduced.
It should be noted that, when the apparatus provided in the foregoing embodiment performs the functions thereof, only the division of the foregoing functional modules is used as an example, in practical application, the foregoing functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to perform all or part of the functions described above. In addition, the apparatus and the method embodiments provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the apparatus and the method embodiments are detailed in the method embodiments and are not repeated herein.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when being executed by a processor, realizes the method for fuzzy query of ciphertext data provided by the above embodiments.
The embodiment of the invention also provides electronic equipment, which comprises: a processor; a memory for storing processor-executable instructions; the processor is configured to read the executable instructions from the memory and execute the instructions to implement the method for fuzzy query of ciphertext data provided by the foregoing embodiments.
The invention has been described with reference to a few embodiments. However, as is well known to those skilled in the art, other embodiments than the above disclosed invention are equally possible within the scope of the invention, as defined by the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise therein. All references to "a/an/the [ means, component, etc. ]" are to be interpreted openly as referring to at least one instance of said means, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (10)

1. A method for fuzzy query of ciphertext data, comprising:
acquiring information to be queried;
encrypting the information to be queried according to an encryption rule;
inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiry result.
2. The method according to claim 1, wherein the ciphertext data is obtained in advance by:
acquiring plaintext data;
dividing the plaintext data according to a segmentation rule;
and encrypting the split civilized data according to the encryption rule to obtain ciphertext data.
3. The method of claim 2, wherein prior to partitioning the plaintext data according to a segmentation rule, comprising:
and acquiring a segmentation rule according to the type of the plaintext data.
4. The method according to claim 1, wherein before encrypting the information to be queried according to encryption rules, comprising:
and acquiring an encryption rule according to the type of the information to be queried.
5. The method according to claim 1, wherein before the obtaining the information to be queried, the method comprises:
in response to the query instruction, a query information input interface is displayed for a user to input information to be queried.
6. The method according to claim 2, characterized in that the method further comprises: and storing the ciphertext data in a database.
7. The method according to claim 2, characterized in that the segmentation rules and the encryption rules are obtained in advance in the following way:
according to the type of the plaintext data, setting a segmentation rule and an encryption rule, and storing the segmentation rule and the encryption rule in a rule base.
8. An apparatus for fuzzy query of ciphertext data, comprising:
the acquisition unit is used for acquiring information to be queried;
the encryption unit is used for encrypting the information to be queried according to an encryption rule;
and the inquiring unit is used for inquiring the encrypted information to be inquired in the ciphertext data adopting the encryption rule to obtain an inquiring result.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of any of claims 1-7.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is configured to read the executable instructions from the memory and execute the instructions to implement the method of any one of claims 1-7.
CN202311823630.4A 2023-12-27 2023-12-27 Ciphertext data fuzzy query method and device Pending CN117874097A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311823630.4A CN117874097A (en) 2023-12-27 2023-12-27 Ciphertext data fuzzy query method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311823630.4A CN117874097A (en) 2023-12-27 2023-12-27 Ciphertext data fuzzy query method and device

Publications (1)

Publication Number Publication Date
CN117874097A true CN117874097A (en) 2024-04-12

Family

ID=90582329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311823630.4A Pending CN117874097A (en) 2023-12-27 2023-12-27 Ciphertext data fuzzy query method and device

Country Status (1)

Country Link
CN (1) CN117874097A (en)

Similar Documents

Publication Publication Date Title
US9720943B2 (en) Columnar table data protection
US9576005B2 (en) Search system
CN107209787B (en) Improving searching ability of special encrypted data
EP3245569B1 (en) Record level data security
US9288211B2 (en) Providing access control for public and private document fields
CN109189367B (en) Data processing method, device, server and storage medium
JP2008517354A (en) A computer with a method of building an encrypted database index for database table search
US11924185B2 (en) Method and system for general data protection compliance via blockchain
CN113806776A (en) Block chain-based medical archive query method and device, electronic equipment and medium
WO2019022669A1 (en) Searchable encryption with hybrid index
CN112434506A (en) Electronic protocol signing processing method, device, computer equipment and medium
US11101987B2 (en) Adaptive encryption for entity resolution
CN117874097A (en) Ciphertext data fuzzy query method and device
CN116049783A (en) Enterprise bill management method and system based on secure hardware carrier
KR102658134B1 (en) Electronic document management server that performs database processing for electronic document based on identification tag and operating method thereof
WO2023178792A1 (en) Ciphertext data storage method and apparatus, and device and storage medium
US20130036474A1 (en) Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval
CN117113371A (en) Data processing method, device, electronic equipment and medium
CN115455004A (en) Data storage method, system, terminal and storage medium based on storage rule
CN115687535A (en) Management method and device of relational database
CN115510479A (en) Efficient desensitization method and system
CN117592086A (en) Data reading and writing method, system and storage medium of database
CN116595546A (en) Data encryption method, device, computer equipment and storage medium
CN116089976A (en) Relational database management method and device
CN117493335A (en) Report processing method, report processing device, report processing equipment, storage medium and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication