CN105893871A - Data safety protection method and device based on data partitioning - Google Patents

Data safety protection method and device based on data partitioning Download PDF

Info

Publication number
CN105893871A
CN105893871A CN201610188545.9A CN201610188545A CN105893871A CN 105893871 A CN105893871 A CN 105893871A CN 201610188545 A CN201610188545 A CN 201610188545A CN 105893871 A CN105893871 A CN 105893871A
Authority
CN
China
Prior art keywords
data
private
private data
card
information security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610188545.9A
Other languages
Chinese (zh)
Other versions
CN105893871B (en
Inventor
邢春晓
张桂刚
李超
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201610188545.9A priority Critical patent/CN105893871B/en
Publication of CN105893871A publication Critical patent/CN105893871A/en
Application granted granted Critical
Publication of CN105893871B publication Critical patent/CN105893871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data safety protection method and device based on data partitioning. The method includes the steps that private data are extracted out of original data according to a preset private data extraction rule and partitioned into private data and non-private data; padding data are added to the private data, and encrypted data are obtained; a mapping table is generated according to the serial number of the private data, the padding data and the encrypted data; meanwhile, an index table is generated according to the serial number of the private data, nouns of the mapping table and original file names corresponding to the private data; an information safety card of the private data is generated according to the mapping table and the index table, and the information safety card of the private data is stored in a database according to preset private data storage strategies. According to the data safety protection method and device, the data are partitioned, the private data generate the mapping table and the index table, the information safety card of the private data is established, storage is conducted through different strategies, storage and reading efficiency is improved, and data portioning and encrypting difficulty is greatly simplified.

Description

A kind of data security protection method based on data segmentation and device
Technical field
The present invention relates to technical field of data security, be specifically related to a kind of number based on data segmentation According to safeguard method and device.
Background technology
Big data age, the storage of data, read-write, safety oneself become the great of common concern Problem.Popularizing rapidly of the Internet so that data are no longer isolated, and data sharing becomes main Stream, the rise of ecommerce, make problem of data safety highlight so that traditional safety management plan Slightly receiving impact greatly, in the case of lacking protection, user stores on network and passes , all there is the probability being tampered and revealing in defeated any information.High-tech crime, hacker enter The event of invading takes place frequently, little to individual interest, receives serious infringement to national interests greatly.Data Encryption technology is to solve information security issue, it is achieved data confidentiality takes precautions against effective and feasible doing Method.Data encryption is generally divided into symmetric cryptography and asymmetric encryption two class, typical symmetric cryptography There are DES, IDEA.Asymmetric cryptography uses PKI and private key encrypt respectively and decipher, and makes Encryption key and decruption key are separated, and typical public key cryptography includes RSA, MH knapsack. Data safety and information security have obtained national governments and have more and more paid attention to, and also put into quite a lot of Reasearch funds, not only need protect economic information, and need protect personal information.
Existing data security protection method directly uses encryption technology to be encrypted data, and Do not differentiate between different types of data, and encryption method is the most complicated.
Summary of the invention
Owing to existing data security protection method directly uses encryption technology to add data Close, and do not differentiate between different types of data, and encryption method typically more challenge, this A kind of data security protection method based on data segmentation of bright proposition and device.
First aspect, the present invention proposes a kind of data security protection method based on data segmentation, Including:
According to default private data extracting rule, initial data extracts private data, It is private data and non-private data by original data division;
Filling data are added to described private data, obtains encryption data;
Sequence number according to described private data, described filling data and encryption data, generate and map Table;Simultaneously according to sequence number, the noun of described mapping table and the described privacy number of described private data According to corresponding original document title, generate concordance list;
According to described mapping table and described concordance list, generate the information security card of private data, and According to default private data storage strategy, the information security card of described private data is stored in number According to storehouse.
Preferably, described according to described mapping table with described concordance list, generate the letter of private data Breath safety card, and according to default private data storage strategy, by the information of described private data After safety card is stored in data base, also include:
Information security card according to Raw Data Generation initial data;
According to default original data storage strategy, the information security card of described initial data is deposited Enter data base.
Preferably, the original data storage strategy that described basis is preset, by described initial data After information security card is stored in data base, also include:
The information security card of data is shared according to shared data genaration;
According to default shared data store strategy, the information security card of described shared data is deposited Enter data base;
Wherein, described shared data include described non-private data and described encryption data.
Preferably, information security card includes: safety card numbering, Data Filename, data are in full Digital digest and corresponding digital signature.
, described digital signature is provided by data set provider.
Second aspect, the present invention also proposes a kind of data security protecting dress based on data segmentation Put, including:
Data segmentation module, for according to the private data extracting rule preset, at initial data In extract private data, be private data and non-private data by original data division;
Data encryption module, for filling data being added to described private data, is added Ciphertext data;
Table generation module, is used for sequence number, described filling data according to described private data and adds Ciphertext data, generates mapping table;Simultaneously according to the sequence number of described private data, described mapping table The original document title that noun is corresponding with described private data, generates concordance list;
Private data card generation module, for according to described mapping table and described concordance list, generates The information security card of private data, and according to default private data storage strategy, by described hidden The information security card of private data is stored in data base.
Preferably, also include:
Primary data card generation module, pacifies for the information according to Raw Data Generation initial data Quan Ka;And according to default original data storage strategy, by the information security of described initial data Card is stored in data base.
Preferably, also include:
Share data card generation module, for sharing the information peace of data according to shared data genaration Quan Ka;And according to default shared data store strategy, by the information security of described shared data Card is stored in data base;
Wherein, described shared data include described non-private data and described encryption data.
Preferably, information security card includes: safety card numbering, Data Filename, data are in full Digital digest and corresponding digital signature.
Preferably, described digital signature is provided by data set provider.
As shown from the above technical solution, the present invention is by splitting data, to private data Generation mapping table and concordance list, and set up the information security card of private data, by different plans Slightly store, improve storage and the efficiency read, greatly simplify data segmentation and encryption Difficulty.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below The accompanying drawing used required in embodiment or description of the prior art will be briefly described, aobvious and Easily insight, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to according to these Figure obtains other accompanying drawing.
A kind of based on data segmentation the data that Fig. 1 provides for one embodiment of the invention are protected safely The schematic flow sheet of maintaining method;
A kind of based on data segmentation the data that Fig. 2 provides for one embodiment of the invention are protected safely The embodiment block architecture diagram of maintaining method;
A kind of based on data segmentation the data that Fig. 3 provides for one embodiment of the invention are protected safely The information security card of maintaining method;
A kind of based on data segmentation the data that Fig. 4 provides for one embodiment of the invention are protected safely The structural representation of protection unit.
Detailed description of the invention
Below in conjunction with the accompanying drawings, the detailed description of the invention of invention is further described.Hereinafter implement Example is only used for clearly illustrating technical scheme, and can not limit this with this Bright protection domain.
Fig. 1 shows a kind of based on data segmentation the data peace that one embodiment of the invention provides The schematic flow sheet of full guard method, including:
The private data extracting rule that S1, basis are preset, extracts privacy number in initial data According to, it is private data and non-private data by original data division;
S2, filling data are added in described private data, obtain encryption data;
S3, the sequence number according to described private data, described filling data and encryption data, generate Mapping table;Simultaneously according to the sequence number of described private data, the noun of described mapping table and described hidden The original document title that private data are corresponding, generates concordance list;
S4, according to described mapping table and described concordance list, generate the information security card of private data, And according to default private data storage strategy, the information security card of described private data is stored in Data base.
Wherein, described mapping table is made up of three parts, is respectively { sequence number, E [x], M [x] }. The serial number that sequence number record raw information is extracted, correspondence after E [x] record raw information encryption Information, the filling information that M [x] record raw information is corresponding;Described concordance list is made up of three parts, It is respectively as follows: { sequence number, T [y], D [y] }.Serial number index corresponding relation, T [y] represents y Individual mapping table name, D [y] represents the document name of y-th initial data.
The present embodiment, by splitting data, generates mapping table and index to private data Table, and set up the information security card of private data, stored by different strategies, improve Storage and the efficiency read, greatly simplify the difficulty of data segmentation and encryption.
As the alternative of the present embodiment, after S4, also include:
S5, information security card according to Raw Data Generation initial data;According to default original Data store strategy, is stored in data base by the information security card of described initial data.
By different strategies, initial data is stored, improve storage and the effect read Rate, greatly simplifies the difficulty of data segmentation and encryption.
Further, after S5, also include:
S6, basis are shared data genaration and are shared the information security card of data;Share according to default Data store strategy, is stored in data base by the information security card of described shared data;
Wherein, described shared data include described non-private data and described encryption data.
By different strategies, shared data are stored, improve storage and the effect read Rate, greatly simplifies the difficulty of data segmentation and encryption.
Specifically, information security card includes: safety card numbering, Data Filename, data are in full Digital digest and corresponding digital signature.
By to the safety card numbering of different types of data, Data Filename, data numeral in full Summary and corresponding digital signature set up information security card, provide a kind of safety to protect for privacy information Barrier voucher, while improving storage efficiency, improves the safety of data.
Further, described digital signature is provided by data set provider.
Rivest, shamir, adelman can be used, use the PKI of data set provider to be encrypted, data Supplier uses the private key of oneself to be decrypted, and is more convenient for using.
The present embodiment specifically includes that data splicing mechanism, information security card, AES sum According to storehouse.Described data splicing mechanism refers to that designing a set of privacy information extracting rule storehouse realizes privacy The extraction of information, splits data into initial data, non-private data the most again, shares data; Described information security card refers to data to be carried out according to algorithm calculated to be had encryption and conciliates The device of close function;Described AES can use rivest, shamir, adelman, uses data to provide The PKI of person is encrypted, and data set provider uses the private key of oneself to be decrypted;Described data Storehouse refers to the memory module for memory map assignments and concordance list etc..
The present embodiment can realize extraction and the encryption of privacy information, by privacy information correlative Justice information is filled with, and has both maintained the safety of former data, has added again encrypted data Intelligibility, thus preferably serve human's demand.
Below in conjunction with the accompanying drawings the present embodiment is described in further details.As in figure 2 it is shown, according to Privacy information is separated by the rule in privacy information extracting rule storehouse with non-privacy information, will extract The privacy information come is encrypted and stores, the method using data mask, uses relevant Privacy information is filled with by semantic information, makes original information more intelligibility.Employing information Safety card mechanism is respectively initial data, private data, shares a kind of safety guarantee of data offer Voucher.Specifically can include following 6 steps:
A1, incoming initial data.Here initial data can be the number comprising privacy information According to, it is also possible to it is the data not comprising privacy information.The form of data can be word, txt Deng.
A2, utilize the priori of expert, provide the hidden of respective field according to different fields Personal letter ceases, and designs a set of privacy information extracting rule storehouse, has had initial data and privacy information Behind extracting rule storehouse, then realize the segmentation to initial data by data segmentation algorithm.
The encryption of A3, information and filling.It is non-right that the privacy information extracted according to step 2 is carried out Claim encryption, the private data that those are extracted from initial data P [1], P [2] ..., P [n] } obtaining after encryption E [1], E [2] ..., E [n] }, M [1], M [2] ..., M [n] be P [1], P [2] ..., P [n] corresponding to filling information, That is: privacy information P [1] fills by information M [1] with semantic meaning, and privacy information P [2] uses Information M [2] with semantic meaning is filled ..., privacy information P [n] is with having semantic meaning Information M [n] fill.Wherein M [1], M [2] ..., M [n] } be P [1], P [2] ..., P [n] } The information with certain semantic meaning corresponding in rule base.
A4, generation mapping table.Mapping table is made up of three parts, is respectively { sequence number, E [x], M [x] }. The order that sequence number have recorded the privacy information being extracted in initial data is good.If sequence number is equal to 1 table Show the privacy information being extracted at first.If entire chapter initial data has privacy information at 100 Need extraction, then maximum sequence number is equal to 100.E [x] is by after the encryption of the privacy information extracted Information, M [x] is exactly the information being filled with the information extracted.
A5, one concordance list of generation.The structure of concordance list, it is made up of three parts, respectively For: { sequence number, T [y], D [y] }.Wherein serial number the first group index corresponding relation.Wherein t [y] table Show y-th mapping table database table name, such as: T [1] represents the data base of first mapping table Table name word.D [y] represents the document name of y-th initial data (Word document), such as D [1] Represent the document name of first initial data (Word document).
A6, generation information security card.In order to ensure the safety of data, we devise three kinds The information security card of type, and be managed by information security management storehouse.
Embodiment shows the information security card of three kinds of data types.It is respectively as follows: " information peace Full card-initial data ", " information security card-privacy information " and " information security card-share Data ".
(1) information security card (initial data)
Information security card (initial data) is the initial data system being initially provided of by data set provider The information security card made, its main purpose be for initial data provide a kind of safety guarantee with Card, it comprises four parts, is respectively as follows: safety card numbering (initial data), initial data literary composition Part name, initial data digital digest and digital signature (data set provider) thereof in full.Wherein should The digital signature of part is that data set provider uses the private key of oneself that safety card is numbered (original number According to), the literary composition that generates after digital digest is encrypted in full of raw data file name and initial data Part.
(2) information security card (private data)
Information security card (private data) is from initial data guarantor of extraction after data are split There is the information security card that the privacy information in data base is made.Its main purpose is for hidden Private data provide a kind of safety guarantee voucher, and it comprises four parts, are respectively as follows: safety card numbering (private data), private data filename, private data digital digest in full and numeral thereof are signed Name (data set provider).Wherein the digital signature of this part is that data set provider uses oneself Private key is to safety card numbering (private data), private data filename and private data number in full The file that word summary generates after being encrypted.
(3) information security card (sharing data)
Information security card (share with data) is from initial data extraction non-after data are split Private data and the information security of the Private Parts shared data creating after filling thereof Card.Its main purpose is to provide a kind of safety guarantee voucher for shared data, and it comprises four parts, It is respectively as follows: safety card numbering (sharing data), shares Data Filename, shared data in full Digital digest and digital signature (data set provider) thereof.Wherein the digital signature of this part is several Use the private key of oneself to safety card numbering (sharing data) according to supplier, share data file The file that name and shared data full text digital digest generate after being encrypted.
The present embodiment according to the rule in privacy information extracting rule storehouse by privacy information and non-privacy Information separates, and the privacy information extracted is encrypted and is stored, and uses data The method of shielding, uses relevant semantic information to be filled with privacy information, makes original information more Tool intelligibility.Simultaneously use information security card mechanism be respectively initial data, private data, Share data and a kind of safety guarantee voucher is provided, privacy information and non-privacy information are carried out point Cut, stored by different strategies, improve storage and the efficiency read, greatly simplify Data segmentation and the difficulty encrypted.
Fig. 4 shows a kind of based on data segmentation the data security protecting that the present embodiment provides Device, including:
Data segmentation module 11, for according to the private data extracting rule preset, original Extracting data goes out private data, is private data and non-private data by original data division;
Data encryption module 12, for filling data are added to described private data, To encryption data;
Table generation module 13, for according to the sequence number of described private data, described filling data And encryption data, generate mapping table;Simultaneously according to the sequence number of described private data, described mapping The original document title that the noun of table is corresponding with described private data, generates concordance list;
Private data card generation module 14, is used for according to described mapping table and described concordance list, Generate the information security card of private data, and according to default private data storage strategy, by institute The information security card stating private data is stored in data base.
Alternatively, also include:
Primary data card generation module, pacifies for the information according to Raw Data Generation initial data Quan Ka;And according to default original data storage strategy, by the information security of described initial data Card is stored in data base.
Further, also include:
Share data card generation module, for sharing the information peace of data according to shared data genaration Quan Ka;And according to default shared data store strategy, by the information security of described shared data Card is stored in data base;
Wherein, described shared data include described non-private data and described encryption data.
Specifically, information security card includes: safety card numbering, Data Filename, data are in full Digital digest and corresponding digital signature.
Further, described digital signature is provided by data set provider.
Data security protecting device based on data segmentation described in the present embodiment may be used for holding Row said method embodiment, its principle is similar with technique effect, and here is omitted.
In the description of the present invention, illustrate a large amount of detail.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of not having these details.At some examples In, it is not shown specifically known method, structure and technology, in order to not fuzzy to this specification Understanding.

Claims (10)

1. a data security protection method based on data segmentation, it is characterised in that including:
According to default private data extracting rule, initial data extracts private data, It is private data and non-private data by original data division;
Filling data are added to described private data, obtains encryption data;
Sequence number according to described private data, described filling data and encryption data, generate and map Table;Simultaneously according to sequence number, the noun of described mapping table and the described privacy number of described private data According to corresponding original document title, generate concordance list;
According to described mapping table and described concordance list, generate the information security card of private data, and According to default private data storage strategy, the information security card of described private data is stored in number According to storehouse.
Method the most according to claim 1, it is characterised in that reflect described in described basis Firing table and described concordance list, generate the information security card of private data, and according to default privacy Data store strategy, after the information security card of described private data is stored in data base, also wraps Include:
Information security card according to Raw Data Generation initial data;
According to default original data storage strategy, the information security card of described initial data is deposited Enter data base.
Method the most according to claim 2, it is characterised in that described basis is preset Original data storage strategy, after the information security card of described initial data is stored in data base, Also include:
The information security card of data is shared according to shared data genaration;
According to default shared data store strategy, the information security card of described shared data is deposited Enter data base;
Wherein, described shared data include described non-private data and described encryption data.
Method the most according to claim 3, it is characterised in that information security card includes: Safety card numbering, Data Filename, data digital digest and the digital signature of correspondence in full.
Method the most according to claim 4, it is characterised in that described digital signature by Data set provider provides.
6. a data security protecting device based on data segmentation, it is characterised in that including:
Data segmentation module, for according to the private data extracting rule preset, at initial data In extract private data, be private data and non-private data by original data division;
Data encryption module, for filling data being added to described private data, is added Ciphertext data;
Table generation module, is used for sequence number, described filling data according to described private data and adds Ciphertext data, generates mapping table;Simultaneously according to the sequence number of described private data, described mapping table The original document title that noun is corresponding with described private data, generates concordance list;
Private data card generation module, for according to described mapping table and described concordance list, generates The information security card of private data, and according to default private data storage strategy, by described hidden The information security card of private data is stored in data base.
Device the most according to claim 6, it is characterised in that also include:
Primary data card generation module, pacifies for the information according to Raw Data Generation initial data Quan Ka;And according to default original data storage strategy, by the information security of described initial data Card is stored in data base.
Device the most according to claim 7, it is characterised in that also include:
Share data card generation module, for sharing the information peace of data according to shared data genaration Quan Ka;And according to default shared data store strategy, by the information security of described shared data Card is stored in data base;
Wherein, described shared data include described non-private data and described encryption data.
Device the most according to claim 8, it is characterised in that information security card includes: Safety card numbering, Data Filename, data digital digest and the digital signature of correspondence in full.
Device the most according to claim 9, it is characterised in that described digital signature by Data set provider provides.
CN201610188545.9A 2016-03-29 2016-03-29 A kind of data security protection method and device based on data segmentation Active CN105893871B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610188545.9A CN105893871B (en) 2016-03-29 2016-03-29 A kind of data security protection method and device based on data segmentation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610188545.9A CN105893871B (en) 2016-03-29 2016-03-29 A kind of data security protection method and device based on data segmentation

Publications (2)

Publication Number Publication Date
CN105893871A true CN105893871A (en) 2016-08-24
CN105893871B CN105893871B (en) 2019-04-05

Family

ID=57013933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610188545.9A Active CN105893871B (en) 2016-03-29 2016-03-29 A kind of data security protection method and device based on data segmentation

Country Status (1)

Country Link
CN (1) CN105893871B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345800A (en) * 2018-02-08 2018-07-31 王四春 The discovery of private data and sorting technique in a kind of cross-border electric business commercial affairs big data
CN109032848A (en) * 2018-08-30 2018-12-18 深圳互联先锋科技有限公司 A kind of processing method and processing system based on direct selling system data safety
CN109492412A (en) * 2018-10-31 2019-03-19 上海爱优威软件开发有限公司 The encryption storage method and system of file
CN109660494A (en) * 2017-10-11 2019-04-19 金联汇通信息技术有限公司 The signature method, apparatus and server of electronic contract
CN109829320A (en) * 2019-01-14 2019-05-31 珠海天燕科技有限公司 A kind for the treatment of method and apparatus of information
WO2019128713A1 (en) * 2017-12-29 2019-07-04 西安电子科技大学 Private information processing method and apparatus, and storage medium
WO2019144471A1 (en) * 2018-01-29 2019-08-01 盾钰(上海)互联网科技有限公司 Bluetooth based multi-terminal to multi-terminal communication method and system
CN110365620A (en) * 2018-03-26 2019-10-22 中移(苏州)软件技术有限公司 A kind of stream data method for secret protection and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN112597520A (en) * 2020-12-28 2021-04-02 德州正捷电气有限公司 Data processing system and method based on data segmentation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542212A (en) * 2010-12-24 2012-07-04 北大方正集团有限公司 Text information hiding method and device
CN103973668A (en) * 2014-03-27 2014-08-06 温州大学 Server-side personal privacy data protecting method in network information system
US20140304526A1 (en) * 2009-12-29 2014-10-09 Cleversafe, Inc. Data deduplication in a dispersed storage system
CN104657674A (en) * 2015-01-16 2015-05-27 北京邮电大学 Isolation protection system and isolation protection method of private data in mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140304526A1 (en) * 2009-12-29 2014-10-09 Cleversafe, Inc. Data deduplication in a dispersed storage system
CN102542212A (en) * 2010-12-24 2012-07-04 北大方正集团有限公司 Text information hiding method and device
CN103973668A (en) * 2014-03-27 2014-08-06 温州大学 Server-side personal privacy data protecting method in network information system
CN104657674A (en) * 2015-01-16 2015-05-27 北京邮电大学 Isolation protection system and isolation protection method of private data in mobile phone

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李超: "面向区域医疗信息化平台的数据共享与交换技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660494A (en) * 2017-10-11 2019-04-19 金联汇通信息技术有限公司 The signature method, apparatus and server of electronic contract
WO2019128713A1 (en) * 2017-12-29 2019-07-04 西安电子科技大学 Private information processing method and apparatus, and storage medium
WO2019144471A1 (en) * 2018-01-29 2019-08-01 盾钰(上海)互联网科技有限公司 Bluetooth based multi-terminal to multi-terminal communication method and system
US10972907B2 (en) 2018-01-29 2021-04-06 Fengping ZHAO Method and system for Bluetooth-based multi-end to multi-end communication
CN108345800A (en) * 2018-02-08 2018-07-31 王四春 The discovery of private data and sorting technique in a kind of cross-border electric business commercial affairs big data
CN110365620A (en) * 2018-03-26 2019-10-22 中移(苏州)软件技术有限公司 A kind of stream data method for secret protection and device
CN109032848A (en) * 2018-08-30 2018-12-18 深圳互联先锋科技有限公司 A kind of processing method and processing system based on direct selling system data safety
CN109032848B (en) * 2018-08-30 2020-10-09 深圳互联先锋科技有限公司 Processing method and processing system based on direct marketing system data security
CN109492412A (en) * 2018-10-31 2019-03-19 上海爱优威软件开发有限公司 The encryption storage method and system of file
CN109829320A (en) * 2019-01-14 2019-05-31 珠海天燕科技有限公司 A kind for the treatment of method and apparatus of information
CN109829320B (en) * 2019-01-14 2020-12-11 珠海天燕科技有限公司 Information processing method and device
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN112597520A (en) * 2020-12-28 2021-04-02 德州正捷电气有限公司 Data processing system and method based on data segmentation

Also Published As

Publication number Publication date
CN105893871B (en) 2019-04-05

Similar Documents

Publication Publication Date Title
CN105893871A (en) Data safety protection method and device based on data partitioning
Pouliot et al. The shadow nemesis: Inference attacks on efficiently deployable, efficiently searchable encryption
CN107147652B (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN103281377B (en) A kind of encrypt data storage and querying method of facing cloud
US11151259B2 (en) Method and system for data security, validation, verification and provenance within independent computer systems and digital networks
CN106407822B (en) A kind of keyword, multi-key word can search for encryption method and system
US20180144341A1 (en) Encryption system, encryption key wallet and method
CN103927357B (en) Data encryption and retrieval method for database
US8494154B2 (en) Cryptographic ignition key system
CN103023635A (en) Method and device for message backup
CN102523086A (en) Key recovery method in privacy protection cloud storage system
CN103067170A (en) Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN109165526A (en) A kind of big data security and privacy guard method, device and storage medium
KR100936937B1 (en) Database encryption and query methods keeping order within bucket partially
CN106936820A (en) The elongated amending method of data and its application in big data encryption
CN101859306A (en) Method and equipment for generating blind index table, and united keyword search method and equipment
KR101217491B1 (en) A method for searching keyword based on public key
CN112804052B (en) User identity encryption method based on composite order group
CN107172436B (en) A kind of method and system of ID card information transmission protection
CN104252604B (en) Database based building block system type dynamic encryption method
CN110008753A (en) A kind of data processing method and system in business datum Sensitive Domain
Anandakumar Image cryptography using RSA algorithm in network security
CN109255248A (en) A kind of text searching method based on enciphering and deciphering algorithm
CN106789046B (en) Method for realizing self-generating key pair

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant