CN109815715A - A kind of data ciphering method and relevant apparatus - Google Patents
A kind of data ciphering method and relevant apparatus Download PDFInfo
- Publication number
- CN109815715A CN109815715A CN201910007689.3A CN201910007689A CN109815715A CN 109815715 A CN109815715 A CN 109815715A CN 201910007689 A CN201910007689 A CN 201910007689A CN 109815715 A CN109815715 A CN 109815715A
- Authority
- CN
- China
- Prior art keywords
- data
- preset rules
- encryption
- key
- initial data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
This application involves information encryption and decryption, a kind of data ciphering method and relevant apparatus are disclosed, comprising: when receiving encrypted instruction, send key request to cipher key service center;It receives the key request for the key request that the cipher key service center is sent to respond, wherein the key request response includes encryption key;Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.Implement the embodiment of the present invention, is beneficial to prevent leaking data.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of data ciphering methods and relevant apparatus.
Background technique
With the high speed development of Internet enterprises, while the data that enterprise operation system generates are more and more, enterprise
Requirement to data storage is higher and higher.Therefore, in order to guarantee the stability of data and the agility of network processes speed, mesh
Before, most of networks have been transitioned into distributed and collaborative network computing model by traditional centralized network computation model.Point
Cloth and collaborative network computing model not only ensure that performance and capacity can be expanded simultaneously, and system scale has very strong stretch
Contracting also improves the reliability, availability and access efficiency of system.
It promotes and applies however as distributed cloud storage system, when by data distribution to multiple servers, how to guarantee
The safety of data, increasingly by the concern of user.In traditional technical solution, storage volume usually is opened in client
When, then carry out the read-write of data.However, as long as storage volume can be opened, no matter anyone, can obtain in storage volume not plus
Close data.Therefore, if encountering the case where system is by hacker attacks, storage volume may be opened, so as to cause number
According to leakage.
Summary of the invention
The embodiment of the invention discloses a kind of data ciphering method and relevant apparatus, implement the embodiment of the present invention, are conducive to
Prevent leaking data.
First aspect of the embodiment of the present invention provides a kind of data ciphering method, comprising:
When receiving encrypted instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein described close
Key request response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein
The initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Second aspect of the embodiment of the present invention provides a kind of data encryption device, comprising:
Sending module, for sending key request to cipher key service center when receiving encrypted instruction;
Receiving module is rung for receiving the key request for the key request that the cipher key service center is sent
It answers, wherein the key request response includes encryption key;
Encrypting module, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, to be added
Ciphertext data, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
The third aspect of the embodiment of the present invention provides a kind of electronic equipment of data encryption, including processor, memory, logical
Believe interface and one or more programs, wherein one or more of programs are stored in the memory, and are matched
It sets and is executed by the processor, to execute the part for including any data ciphering method recorded in above method embodiment
Or Overall Steps.
Fourth aspect of the embodiment of the present invention provides a kind of computer storage medium, and the computer readable storage medium is used
In storage computer program, the storage computer program is executed by the processor, to realize including above method embodiment
Some or all of any data ciphering method of middle record step.
As can be seen that, when receiving encrypted instruction, client sends key to cipher key service center in above-mentioned technical proposal
Request sends encryption key to client when cipher key service center, which carries out authentication to client, to be passed through.It is then determined
The severity level of initial data obtains original number in turn with the matched Data Identification of severity level of initial data to generate
According to secret grade.Then, client chosen from encryption algorithm database with the matched N number of Encryption Algorithm of secret grade, into
And initial data is encrypted according to encryption key and N number of Encryption Algorithm, to obtain encryption data.By client according to
Secret grade selectively encrypts initial data using N number of Encryption Algorithm, provides multilayer for significant data and protects machine
System, prevents leaking data, promotes the security performance of data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Wherein:
Fig. 1-a is a kind of flow diagram of data ciphering method provided in an embodiment of the present invention;
Fig. 1-b is a kind of configuration diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another data ciphering method provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of data encryption device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Term " includes " in description and claims of this specification and above-mentioned attached drawing and " having " and they appoint
What is deformed, it is intended that is covered and non-exclusive is included.Such as contain the process, method, system, production of a series of steps or units
Product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or
Optionally further comprising the other step or units intrinsic for these process, methods, product or equipment.
One embodiment of the method for data encryption of the present invention.Wherein, a kind of data ciphering method, comprising: add receiving
When close instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein described close
Key request response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein
The initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Firstly, being a kind of data ciphering method that one embodiment of the present of invention provides referring to Fig. 1-a and Fig. 1-b, Fig. 1-a
Flow diagram.Scheme shown in Fig. 1-a can carry out specific embodiment in the system of the framework shown in Fig. 1-b.Wherein, such as Fig. 1-
Shown in a, a kind of data ciphering method that one embodiment of the present of invention provides may include:
101, when receiving encrypted instruction, client sends key request to cipher key service center.
102, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
103, client encrypts initial data according to the encryption key and N number of Encryption Algorithm, to be encrypted
Data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
Referring to fig. 2, Fig. 2 is the process signal for another data ciphering method that another embodiment of the invention provides
Figure.Wherein, as shown in Fig. 2, another data ciphering method that another embodiment of the invention provides may include:
201, when receiving encrypted instruction, client sends key request to cipher key service center.
Optionally, in a kind of possible embodiment of the invention, the key request carries the body of the client
Part authentication information, wherein the authentication information of the client carries out the client for the cipher key service center
Authentication, when the authentication passes through, the cipher key service center construction communication channel, to pass through the communication channel
The key request response is sent to the client.
202, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
203, M preset rules are arranged in client.
Wherein, M is positive integer.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, preset rules for example may include regular expression.
204, client uses the M preset rules to detect with the determination initial data initial data
Meet K preset rules in the M preset rules.
Wherein, K is positive integer, M >=K.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, in a first aspect, in one possible embodiment of the invention, the initial data includes video counts
According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data
K preset rules in preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q number
Corresponding with i-th of picture frame in the L picture frame according to i-th of data set of concentration, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with determination the Q
Data set has the K preset rules met in the M preset rules altogether.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, Q for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, it is based in a first aspect, in one possible embodiment of the invention, the use M is default
Each data set that rule concentrates the Q data, which is detected, meets altogether the M with the determination Q data set in advance
If the K preset rules in rule, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q number
According to concentration, only one data set meets the K preset rules in the M preset rules, then the Q data set one
Meet the K preset rules altogether;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q
The R data that a data are concentrated are filled with E preset rules in the foot M preset rules, S that the Q data are concentrated
Data set meets F preset rules in the M preset rules, then the Q data set meets altogether the K default rule
Then, wherein K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any in the F preset rules
One.
Wherein, R for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, S for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, E for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, F for example can be equal to 1,2,3,5,6,11,13,20 or other values.
205, client determines the severity level of the initial data.
Wherein, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules.
Optionally, in one possible embodiment of the invention, the severity level of the determination initial data,
In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set and the Q data
The number that collection meets preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the weight of the video data
Want rank, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K
When, the preset ratio is equal to (K-Q)/K.
206, client generates the matched Data Identification of severity level with the initial data.
Wherein, the Data Identification is for identifying the initial data.
207, client obtains and the matched secret grade J of the Data Identification from secret grade database.
Wherein, J is positive integer.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
208, client is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database.
Wherein, N=J.
209, client encrypts initial data according to the encryption key and N number of Encryption Algorithm, to be encrypted
Data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
Optionally, in one possible embodiment of the invention, described according to the encryption key and N number of Encryption Algorithm
Initial data is encrypted, to obtain encryption data, comprising:
The L picture frame is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain L encryption figure
As frame;
The L encrypted image frame is synthesized, to form enciphered video data.
Referring to Fig. 3, Fig. 3 is the process signal for another data ciphering method that another embodiment of the invention provides
Figure.Wherein, as shown in figure 3, another data ciphering method that another embodiment of the invention provides may include:
301, when receiving encrypted instruction, client sends key request to cipher key service center.
Optionally, in a kind of possible embodiment of the invention, the key request carries the body of the client
Part authentication information, wherein the authentication information of the client carries out the client for the cipher key service center
Authentication, when the authentication passes through, the cipher key service center construction communication channel, to pass through the communication channel
The key request response is sent to the client.
302, the key request for the key request that client receives that the cipher key service center is sent responds.
Wherein, the key request response includes encryption key.
303, M preset rules are arranged in client.
Wherein, M is positive integer.
Wherein, M for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, preset rules for example may include regular expression.
304, client uses the M preset rules to detect with the determination initial data initial data
Meet K preset rules in the M preset rules.
Wherein, K is positive integer, M >=K.
Wherein, K for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, in a first aspect, in one possible embodiment of the invention, the initial data includes video counts
According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data
K preset rules in preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q number
Corresponding with i-th of picture frame in the L picture frame according to i-th of data set of concentration, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with determination the Q
Data set has the K preset rules met in the M preset rules altogether.
Wherein, L for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, Q for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, i for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, it is based in a first aspect, in one possible embodiment of the invention, the use M is default
Each data set that rule concentrates the Q data, which is detected, meets altogether the M with the determination Q data set in advance
If the K preset rules in rule, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q number
According to concentration, only one data set meets the K preset rules in the M preset rules, then the Q data set one
Meet the K preset rules altogether;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q
The R data that a data are concentrated are filled with E preset rules in the foot M preset rules, S that the Q data are concentrated
Data set meets F preset rules in the M preset rules, then the Q data set meets altogether the K default rule
Then, wherein K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any in the F preset rules
One.
Wherein, R for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, S for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, E for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, F for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Optionally, second aspect, in one possible embodiment of the invention, the initial data include number of files
According to described to use the M preset rules to detect the initial data to meet the M with the determination initial data
K preset rules in preset rules, comprising:
The document data is parsed, to obtain T field, wherein T is positive integer;
The T field is compared with H preset field, to obtain comparing successful G critical field, wherein H
It is positive integer, T < H, G≤T with G;
The data of each critical field in the G critical field are extracted, to obtain G data set, wherein the G
I-th of data set that a data are concentrated is corresponding with i-th of critical field in the G critical field;
The each data set for using the M preset rules to concentrate the G data is detected with determination the G
Data set has the K preset rules met in the M preset rules altogether.
305, client determines the severity level of the initial data.
Wherein, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules.
Optionally, in one possible embodiment of the invention, the severity level of the determination initial data,
In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set and the Q data
The number that collection meets preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the weight of the video data
Want rank, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K
When, the preset ratio is equal to (K-Q)/K.
306, client generates the matched Data Identification of severity level with the initial data.
Wherein, the Data Identification is for identifying the initial data.
307, client obtains and the matched secret grade J of the Data Identification from secret grade database.
Wherein, J is positive integer.
Wherein, J for example can be equal to 1,2,3,5,6,11,13,20 or other values.
308, client is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database.
Wherein, N=J.
309, client encrypts the L picture frame according to the encryption key and N number of Encryption Algorithm, to obtain
L encrypted image frame.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, the initial data includes video data.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
310, client synthesizes the L encrypted image frame, to form enciphered video data.
Referring to fig. 4, Fig. 4 is a kind of schematic diagram for data encryption device that one embodiment of the present of invention provides.Wherein, such as
Shown in Fig. 4, a kind of data encryption device 400 that one embodiment of the present of invention provides may include:
Sending module 401, for sending key request to cipher key service center when receiving encrypted instruction.
Receiving module 402, the key request for the key request sent for receiving the cipher key service center
Response.
Wherein, the key request response includes encryption key.
Encrypting module 403, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, with
To encryption data.
Wherein, the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
Wherein, N for example can be equal to 1,2,3,5,6,11,13,20 or other values.
Wherein, storage volume for example may include the storage region from hard disk partition.
Wherein, Encryption Algorithm for example may include symmetric encipherment algorithm and rivest, shamir, adelman.
The embodiment of the present invention also provides a kind of electronic equipment of data encryption, which is characterized in that including processor, storage
Device, communication interface and one or more programs, wherein one or more of programs are stored in the memory, and
And be configured to be executed by the processor, it include any data ciphering method recorded in above method embodiment to execute
Some or all of step.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey
Sequence, to realize including some or all of any data ciphering method recorded in above method embodiment step.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple module or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module,
It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module
It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of method of data encryption characterized by comprising
When receiving encrypted instruction, key request is sent to cipher key service center;
It receives the key request for the key request that the cipher key service center is sent to respond, wherein the key is asked
Asking response includes encryption key;
Initial data is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain encryption data, wherein described
Initial data is obtained from the storage volume of the client by the client, and N is positive integer.
2. the method according to claim 1, wherein the key request carries the authentication of the client
Information, wherein the authentication information of the client carries out identity to the client for the cipher key service center and recognizes
Card, when the authentication passes through, the cipher key service center construction communication channel, with by the communication channel to described
Client sends the key request response.
3. the method according to claim 1, wherein described according to the encryption key and N number of Encryption Algorithm
Initial data is encrypted, before obtaining encryption data, comprising:
M preset rules are set, wherein M is positive integer;
It uses the M preset rules to detect the initial data and meets the M in advance with the determination initial data
If K preset rules in rule, wherein K is positive integer, M >=K;
Determine the severity level of the initial data, wherein the severity level of the initial data and the initial data meet
The number of preset rules is directly proportional;
Generate the matched Data Identification of severity level with the initial data, wherein the Data Identification is described for identifying
Initial data;
It is obtained and the matched secret grade J of the Data Identification from secret grade database, wherein J is positive integer;
It is chosen and the matched N number of Encryption Algorithm of the secret grade J from encryption algorithm database, wherein N=J.
4. described to use institute according to the method described in claim 3, it is characterized in that, the initial data includes video data
It states M preset rules and is detected the K met in the M preset rules with the determination initial data to the initial data
A preset rules, comprising:
The video data is parsed, to obtain L picture frame, wherein L is positive integer;
The data of each picture frame in the L picture frame are extracted, to obtain Q data set, wherein the Q data set
In i-th of data set it is corresponding with i-th of picture frame in the L picture frame, Q and i are positive integer, Q=L;
The each data set for using the M preset rules to concentrate the Q data is detected with the determination Q data
Collection meets altogether the K preset rules in the M preset rules.
5. the method according to claim 3 or 4, which is characterized in that the severity level of the determination initial data,
In, the severity level of the initial data is directly proportional to the number that the initial data meets preset rules, comprising:
Determine the severity level of the Q data set, wherein the severity level of the Q data set is filled with the Q data
The number of sufficient preset rules is directly proportional;
The severity level of the Q data set is handled according to preset ratio, to obtain the importance level of the video data
Not, wherein in Q>K, the preset ratio is equal to (Q-K)/K, and in Q=K, the preset ratio is equal to 1, in Q<K, institute
Preset ratio is stated equal to (K-Q)/K.
6. according to the method described in claim 4, it is characterized in that, described use the M preset rules to the Q data
The each data set concentrated is detected the K for having altogether and meeting in the M preset rules with the determination Q data set
Preset rules, comprising:
It is detected using each data set that the M preset rules concentrate the Q data, if the Q data set
In only one data set meet the K preset rules in the M preset rules, then the Q data set is full altogether
The foot K preset rules;
Alternatively, being detected using each data set that the M preset rules concentrate the Q data, if the Q number
E preset rules in the foot M preset rules, the S data that the Q data are concentrated are filled with according to R data of concentration
Collection meets F preset rules in the M preset rules, then the Q data set meets the K preset rules altogether,
Wherein, K=E+F, R, S, E and F are positive integer, and the E preset rules are different from any one in the F preset rules
It is a.
7. method according to claim 1 or 6, which is characterized in that described according to the encryption key and N number of Encryption Algorithm
Initial data is encrypted, to obtain encryption data, comprising:
The L picture frame is encrypted according to the encryption key and N number of Encryption Algorithm, to obtain L encrypted image frame;
The L encrypted image frame is synthesized, to form enciphered video data.
8. a kind of data encryption device characterized by comprising
Sending module, for sending key request to cipher key service center when receiving encrypted instruction;
Receiving module is responded for receiving the key request for the key request that the cipher key service center is sent,
In, the key request response includes encryption key;
Encrypting module, for being encrypted according to the encryption key and N number of Encryption Algorithm to initial data, to obtain encryption number
According to, wherein the initial data is obtained from the storage volume of the client by the client, and N is positive integer.
9. a kind of electronic equipment of data encryption, which is characterized in that including processor, memory, communication interface and one or
Multiple programs, wherein one or more of programs are stored in the memory, and are configured to be held by the processor
Row, to execute the instruction such as the step in any one of claim 1-7 method.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer
Program, the storage computer program is executed by the processor, to realize the method according to claim 1 to 7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910007689.3A CN109815715A (en) | 2019-01-04 | 2019-01-04 | A kind of data ciphering method and relevant apparatus |
PCT/CN2019/117545 WO2020140616A1 (en) | 2019-01-04 | 2019-11-12 | Data encryption method and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910007689.3A CN109815715A (en) | 2019-01-04 | 2019-01-04 | A kind of data ciphering method and relevant apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109815715A true CN109815715A (en) | 2019-05-28 |
Family
ID=66603930
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910007689.3A Pending CN109815715A (en) | 2019-01-04 | 2019-01-04 | A kind of data ciphering method and relevant apparatus |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109815715A (en) |
WO (1) | WO2020140616A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111126604A (en) * | 2019-12-31 | 2020-05-08 | 北京奇艺世纪科技有限公司 | Model training method, device, server and storage medium |
WO2020140616A1 (en) * | 2019-01-04 | 2020-07-09 | 平安科技(深圳)有限公司 | Data encryption method and related device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102412967A (en) * | 2011-09-29 | 2012-04-11 | 用友软件股份有限公司 | Data transmission system and method |
CN103780622A (en) * | 2014-01-24 | 2014-05-07 | 华中科技大学 | Data classification and encryption method for cloud storage |
CN106372519A (en) * | 2016-08-30 | 2017-02-01 | 江苏博智软件科技有限公司 | Information encryption method and device |
US20170124336A1 (en) * | 2015-11-03 | 2017-05-04 | Palo Alto Research Center Incorporated | Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization |
CN106650482A (en) * | 2015-11-04 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system |
CN106936771A (en) * | 2015-12-29 | 2017-07-07 | 航天信息股份有限公司 | A kind of secure cloud storage method and system based on graded encryption |
CN107292183A (en) * | 2017-06-29 | 2017-10-24 | 国信优易数据有限公司 | A kind of data processing method and equipment |
CN107508796A (en) * | 2017-07-28 | 2017-12-22 | 北京明朝万达科技股份有限公司 | A kind of data communications method and device |
CN108520183A (en) * | 2018-04-13 | 2018-09-11 | 杭州橙鹰数据技术有限公司 | A kind of date storage method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483383B (en) * | 2016-06-07 | 2021-10-15 | 腾讯科技(深圳)有限公司 | Data processing method, terminal, background server and storage medium |
KR101987025B1 (en) * | 2017-05-31 | 2019-06-10 | 삼성에스디에스 주식회사 | Method for processing encryption and Apparatus thereof |
CN109815715A (en) * | 2019-01-04 | 2019-05-28 | 平安科技(深圳)有限公司 | A kind of data ciphering method and relevant apparatus |
-
2019
- 2019-01-04 CN CN201910007689.3A patent/CN109815715A/en active Pending
- 2019-11-12 WO PCT/CN2019/117545 patent/WO2020140616A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102412967A (en) * | 2011-09-29 | 2012-04-11 | 用友软件股份有限公司 | Data transmission system and method |
CN103780622A (en) * | 2014-01-24 | 2014-05-07 | 华中科技大学 | Data classification and encryption method for cloud storage |
US20170124336A1 (en) * | 2015-11-03 | 2017-05-04 | Palo Alto Research Center Incorporated | Computer-Implemented System And Method For Automatically Identifying Attributes For Anonymization |
CN106650482A (en) * | 2015-11-04 | 2017-05-10 | 阿里巴巴集团控股有限公司 | Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system |
CN106936771A (en) * | 2015-12-29 | 2017-07-07 | 航天信息股份有限公司 | A kind of secure cloud storage method and system based on graded encryption |
CN106372519A (en) * | 2016-08-30 | 2017-02-01 | 江苏博智软件科技有限公司 | Information encryption method and device |
CN107292183A (en) * | 2017-06-29 | 2017-10-24 | 国信优易数据有限公司 | A kind of data processing method and equipment |
CN107508796A (en) * | 2017-07-28 | 2017-12-22 | 北京明朝万达科技股份有限公司 | A kind of data communications method and device |
CN108520183A (en) * | 2018-04-13 | 2018-09-11 | 杭州橙鹰数据技术有限公司 | A kind of date storage method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020140616A1 (en) * | 2019-01-04 | 2020-07-09 | 平安科技(深圳)有限公司 | Data encryption method and related device |
CN111126604A (en) * | 2019-12-31 | 2020-05-08 | 北京奇艺世纪科技有限公司 | Model training method, device, server and storage medium |
CN111126604B (en) * | 2019-12-31 | 2024-02-02 | 北京奇艺世纪科技有限公司 | Model training method, device, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2020140616A1 (en) | 2020-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210409191A1 (en) | Secure Machine Learning Analytics Using Homomorphic Encryption | |
CN112950367B (en) | Method and device for generating and executing intelligent contract transaction | |
US10693657B2 (en) | Method and apparatus for verifying processed data | |
Xiang et al. | Privacy-preserving face recognition with outsourced computation | |
CN109067528B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN106713508B (en) | A kind of data access method and system based on Cloud Server | |
CN110086817B (en) | Reliable user service system and method | |
Han et al. | Verifiable and privacy preserving federated learning without fully trusted centers | |
CN113179158B (en) | Multi-party combined data processing method and device for controlling bandwidth | |
Erkin et al. | Privacy enhanced recommender system | |
Liu et al. | EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination | |
US9660813B1 (en) | Dynamic privacy management for communications of clients in privacy-preserving groups | |
CN110737915A (en) | Anti-quantum-computation anonymous identity recognition method and system based on alliance chain and implicit certificate | |
CN111741268A (en) | Video transmission method, device, server, equipment and medium | |
JP2008042590A (en) | Recipient device, sender device, encryption communication system and program | |
Zhao et al. | Fuzzy identity-based dynamic auditing of big data on cloud storage | |
CN115664629A (en) | Homomorphic encryption-based data privacy protection method for intelligent Internet of things platform | |
CN109815715A (en) | A kind of data ciphering method and relevant apparatus | |
CN113807534B (en) | Model parameter training method and device of federal learning model and electronic equipment | |
CN112380404A (en) | Data filtering method, device and system | |
CN115022012B (en) | Data transmission method, device, system, equipment and storage medium | |
CN113254989B (en) | Fusion method and device of target data and server | |
CN114547684A (en) | Method and device for protecting multi-party joint training tree model of private data | |
CN108712657B (en) | Barrage verification method, computer equipment and storage medium | |
CN109218016B (en) | Data transmission method and device, server, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |