CN111368323B - Medical insurance financial user information encryption method and system based on big data - Google Patents

Medical insurance financial user information encryption method and system based on big data Download PDF

Info

Publication number
CN111368323B
CN111368323B CN202010211914.8A CN202010211914A CN111368323B CN 111368323 B CN111368323 B CN 111368323B CN 202010211914 A CN202010211914 A CN 202010211914A CN 111368323 B CN111368323 B CN 111368323B
Authority
CN
China
Prior art keywords
user information
queue
character string
user
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010211914.8A
Other languages
Chinese (zh)
Other versions
CN111368323A (en
Inventor
宗君斌
刘茜
其他发明人请求不公开姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jingdong Technology Co., Ltd
Original Assignee
Shanghai Jingdong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jingdong Technology Co Ltd filed Critical Shanghai Jingdong Technology Co Ltd
Priority to CN202010211914.8A priority Critical patent/CN111368323B/en
Publication of CN111368323A publication Critical patent/CN111368323A/en
Application granted granted Critical
Publication of CN111368323B publication Critical patent/CN111368323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/548Queue

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Public Health (AREA)
  • Primary Health Care (AREA)
  • Epidemiology (AREA)
  • Databases & Information Systems (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The embodiment of the invention provides a medical insurance financial user information encryption method and system based on big data. The characters in the first character string are stored in the queue randomly, so that the encryption performance of user information encryption is improved, a target ciphertext is not easy to crack, and the safety of user information is improved.

Description

Medical insurance financial user information encryption method and system based on big data
Technical Field
The invention relates to the technical field of computers, in particular to a medical insurance financial user information encryption method and system based on big data.
Background
With the progress of the human era, people pay more and more attention to human health, but the medical cost is very high, and medical insurance can be popularized and popularized more and more. In the past, people transact procedures related to medical insurance by purchasing, signing and transacting procedures from the staff of the insurance institution, which requires a lot of manpower, and the services of the insurance institution cannot be radiated to remote areas. With the development of science and technology, procedures related to the online handling of medical insurance have become popular, for example, people can purchase medical insurance and handle medical insurance on some application platforms. Today in the big data era, the application platform centralizes medical and financial related services, and also makes links between medical and financial services through. Under the background of big data, the financial users are more, the data interaction between the financial field and the medical field of the financial users becomes large and complicated, and when the users transact medical insurance related procedures on line, the information safety of the users is guaranteed to be crucial.
In the prior art, Encryption methods such as Advanced Encryption Standard (AES) are generally adopted to encrypt user information, the AES needs to be subjected to operations such as round key Encryption, byte substitution, line displacement, column mixing and the like, the calculation amount is large, the operation is complex, the Encryption algorithm is common, the user information is encrypted according to the Encryption algorithm, the risk of being cracked exists, and the financial user information has potential safety hazards.
Disclosure of Invention
The invention aims to provide a medical insurance financial user information encryption method and system based on big data, which are used for solving the problems in the prior art.
In a first aspect, an embodiment of the present invention provides a big data-based medical insurance financial user information encryption method, including:
obtaining user information, and storing the user information into a queue to obtain a user information queue;
obtaining a first user information block from a user information queue, wherein the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of pieces of user information;
obtaining a first key in a key queue;
encrypting the first user information block based on the first key to obtain a first ciphertext;
obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information;
obtaining a second key in the key queue;
encrypting a second user information block based on the second key to obtain a second ciphertext;
obtaining a third key in the key queue;
encrypting the user information queue based on the third key to obtain a third ciphertext;
encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext;
and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
Optionally, the second user information block includes all user information in the first user information block.
Optionally, the obtaining user information and storing the user information in a queue to obtain a user information queue includes:
acquiring a user name and a user password of a user registration system;
and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
Optionally, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes:
converting the user name into a first character string and converting the user password into a second character string;
firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
Optionally, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes:
converting the user name into a first character string and converting the user password into a second character string;
randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string;
then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
In a second aspect, an embodiment of the present invention provides a big data-based medical insurance financial user information encryption system, where the system includes:
the acquisition module is used for acquiring user information and storing the user information into a queue to obtain a user information queue;
the first encryption module is used for obtaining a first user information block from a user information queue, the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of user information; obtaining a first key in a key queue; encrypting the first user information block based on the first key to obtain a first ciphertext; obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information; obtaining a second key in the key queue; encrypting a second user information block based on the second key to obtain a second ciphertext; obtaining a third key in the key queue; encrypting the user information queue based on the third key to obtain a third ciphertext;
the second encryption module is used for encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext; and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
Optionally, the second user information block includes all user information in the first user information block.
Optionally, the obtaining user information and storing the user information in a queue to obtain a user information queue includes:
acquiring a user name and a user password of a user registration system;
and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
Optionally, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes:
converting the user name into a first character string and converting the user password into a second character string;
firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
Optionally, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes:
converting the user name into a first character string and converting the user password into a second character string;
randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string;
then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a medical insurance financial user information encryption method and system based on big data, which comprises the steps of obtaining user information, storing the user information into a queue and obtaining a user information queue; obtaining a first user information block from a user information queue, wherein the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of pieces of user information; obtaining a first key in a key queue; encrypting the first user information block based on the first key to obtain a first ciphertext; obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information; obtaining a second key in the key queue; encrypting a second user information block based on the second key to obtain a second ciphertext; obtaining a third key in the key queue; encrypting the user information queue based on the third key to obtain a third ciphertext; encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext; and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext. The first number of characters in the first character string are stored in the queue, and then the second number of characters in the second character string are stored in the queue, so that the user name and the user password can be more easily recovered from the user information queue. The characters in the first character string are stored in the queue randomly, so that the encryption performance of user information encryption is improved, a target ciphertext is not easy to crack, and the safety of user information is improved.
Drawings
Fig. 1 shows a flowchart of a big data-based medical insurance financial user information encryption method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a user information queue, a first user information block, and a second user information block provided by the present invention.
Fig. 3 is a schematic diagram illustrating a prevention and control structure of a big data-based medical insurance financial user information encryption system 200 according to an embodiment of the present invention.
The labels in the figure are: a big data based medical insurance financial user information encryption system 200; an obtaining module 210; a first encryption module 220; a second encryption module 230.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings.
Examples
The embodiment of the invention provides a medical insurance financial user information encryption method based on big data, and as shown in figure 1, the method comprises the following steps:
s101: and obtaining user information, and storing the user information into a queue to obtain a user information queue.
S102: and obtaining a first user information block from the user information queue, wherein the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of pieces of user information.
S103: a first key in a key queue is obtained.
S104: and encrypting the first user information block based on the first key to obtain a first ciphertext.
S105: and obtaining a second user information block from the user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information.
S106: a second key in the key queue is obtained.
S107: and encrypting the second user information block based on the second key to obtain a second ciphertext.
S108: a third key in the key queue is obtained.
S109: and encrypting the user information queue based on the third key to obtain a third ciphertext.
S110: and encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext.
S111: and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
As an optional implementation manner, diversification of encryption of the user information is enhanced by encrypting the user information (user information blocks) of different segments in the user information queue, and then encryption is performed based on the result of diversified encryption (the first ciphertext, the second ciphertext, and the third ciphertext), so that the encryption performance, the security, and the reliability of user information encryption are improved, and a target ciphertext obtained after encryption is not easy to crack. Meanwhile, the first ciphertext is used as a key to encrypt the second ciphertext to obtain a fourth ciphertext, the fourth ciphertext is used as a key to encrypt the third ciphertext to obtain a target ciphertext, the target ciphertext does not depend on a prepared key any more, the encryption performance is better, and the target ciphertext is not easy to crack. Meanwhile, the encryption mode of the scheme is simple and the calculated amount is small.
Optionally, as shown in fig. 2, the second user information block includes all the user information in the first user information block, that is, the first user information block and the second user information block are sub-queues in a user information queue. Therefore, the user information is encrypted based on the first user information block, the second user information block and the user information queue, the obtained target ciphertext is high in encryption, and meanwhile the fidelity of the target ciphertext is improved. For example, the user information queue is aabbbccddeefffgghhiijjkkkll, and the first user information block is: aabbbccdde, the second user information block is: aabbbccddeefgghh.
In this embodiment of the present invention, the obtaining user information and storing the user information in a queue to obtain a user information queue includes: acquiring a user name and a user password of a user registration system; and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
And mixing, inserting and temporarily storing the user name and the user password into the queue, wherein the user name and the user password in the user information contained in the obtained user information queue are scrambled, so that the encryption property of user information encryption is enhanced.
As an optional implementation manner, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes: converting the user name into a first character string and converting the user password into a second character string; firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string; then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string; and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
Storing a first number of characters in a first character string into a queue, specifically: a first number of characters are randomly obtained from the first character string and stored in the queue, and the characters can be continuous or discontinuous and random. Similarly, storing a second number of characters in the second character string into the queue specifically includes: a second number of characters, which may be continuous or discontinuous and random, is randomly obtained from the second string and stored in the queue. The first number and the second number may be the same or different, the value of the first number may be a positive integer such as 1, 2, 3, 4, etc., and the value of the second number may be a positive integer such as 1, 2, 3, 4, etc.
As an example, the first string into which the username is converted is: and ABCDEFGHIJKL, wherein the second character string converted from the user password is ABCDEFGHIJKL, and one character is sequentially taken out from the first character string and the second character string respectively and is inserted into the queue, and the steps are repeated until the second character string and the second character string are empty. And when the advance of the first character string is empty, the rest characters in the second character string are sequentially stored in the queue. The resulting user information queue is aaabbcddeefffgghghhiijjkll.
As another optional implementation manner, the mixing, inserting, and temporarily storing the user name and the user password into a queue to obtain a user information queue includes: converting the user name into a first character string and converting the user password into a second character string; randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string; and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
The method comprises the following steps of firstly randomly obtaining characters in a first character string, and storing the characters into a queue, wherein the method specifically comprises the following steps: randomly obtaining a random number of characters from the first character string and storing the characters into a queue, wherein the characters can be continuous or discontinuous and random. If repeated for a plurality of times, the number of characters stored in the queue at each time can be the same or different, and the characters taken out at each time can be continuous or discontinuous and random.
According to the mode, the partial character strings of the user names and the partial character strings of the user passwords are continuously stored in the queue, and the obtained user information queue enables the characters of all the user names in the user information queue not to be arranged continuously and the characters of the user passwords not to be arranged continuously, so that the user names and the user passwords are not easy to decipher, and the encryption of the user information queue to the user information is improved. The first number of characters in the first character string are stored in the queue, and the second number of characters in the second character string are stored in the queue, so that the user name and the user password can be more easily recovered from the user information queue. The characters in the first character string are stored in the queue randomly, so that the encryption performance of user information encryption is improved.
In the embodiment of the present invention, the Encryption algorithm may adopt a Data Encryption Standard (DES). Encrypting the first user information block based on the first key to obtain a first ciphertext, which specifically comprises: and taking the first key as a key, the first user information block as a plaintext, the first user information block as an input of a DES encryption algorithm, and the output of the DES encryption algorithm as a first ciphertext. Encrypting a second user information block based on the second key to obtain a second ciphertext, which specifically comprises: and taking the second key as a key, the second user information block as a plaintext, the second user information block as an input of a DES encryption algorithm, and the output of the DES encryption algorithm as a second ciphertext. Encrypting the user information queue based on the third key to obtain a third ciphertext, which specifically comprises: and taking the third key as a key, the user information queue as a plaintext, the user information queue as an input of a DES encryption algorithm, and the output of the DES encryption algorithm as a third ciphertext.
And encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext, which specifically comprises: and taking the first ciphertext as a secret key, the second ciphertext as a plaintext, the DES encryption algorithm as an input, and the DES encryption algorithm as an output to serve as a fourth ciphertext. And encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext, wherein the target ciphertext is specifically as follows: and taking the fourth ciphertext as a secret key, taking the third ciphertext as a plaintext, taking the third ciphertext as the input of the DES encryption algorithm, and taking the output of the DES encryption algorithm as a target ciphertext. In this way, encryption of the user information is completed.
Optionally, the method further includes: acquiring a face image when a user registers a system, and establishing a corresponding relation between the face image and a user name and a user password; encrypting the face image to obtain encrypted image information; and specifically, the encrypted image information is used as the key, the target ciphertext is used as the plaintext and is used as the input of a DES (data encryption standard) encryption algorithm, and the final user information ciphertext of the DES encryption algorithm is used. Therefore, the reliability of user information encryption is improved.
The embodiment of the present application further correspondingly provides an executing subject for executing the above steps, and the executing subject may be the medical insurance financial user information encryption system 200 based on big data in fig. 3. Referring to fig. 3, the system includes:
an obtaining module 210, configured to obtain user information, store the user information in a queue, and obtain a user information queue;
the first encryption module 220 is configured to obtain a first user information block from a user information queue, where the length of the first user information block is one third of the length of the user information queue, and the first user information block includes a plurality of pieces of user information; obtaining a first key in a key queue; encrypting the first user information block based on the first key to obtain a first ciphertext; obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information; obtaining a second key in the key queue; encrypting a second user information block based on the second key to obtain a second ciphertext; obtaining a third key in the key queue; encrypting the user information queue based on the third key to obtain a third ciphertext;
the second encryption module 230 is configured to encrypt the second ciphertext with the first ciphertext as a key to obtain a fourth ciphertext; and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
Optionally, the obtaining module 210 is further configured to obtain a user name and a user password of the user registration system;
and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
Optionally, the obtaining module 210 is further configured to: converting the user name into a first character string and converting the user password into a second character string;
firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
Optionally, the obtaining module 210 is further configured to mix, insert, and temporarily store the user name and the user password in a queue to obtain a user information queue, where the obtaining module includes:
converting the user name into a first character string and converting the user password into a second character string;
randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string;
then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

Claims (10)

1. A medical insurance financial user information encryption method based on big data is characterized by comprising the following steps:
obtaining user information, and storing the user information into a queue to obtain a user information queue;
obtaining a first user information block from a user information queue, wherein the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of pieces of user information;
obtaining a first key in a key queue;
encrypting the first user information block based on the first key to obtain a first ciphertext;
obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information;
obtaining a second key in the key queue;
encrypting a second user information block based on the second key to obtain a second ciphertext;
obtaining a third key in the key queue;
encrypting the user information queue based on the third key to obtain a third ciphertext;
encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext;
and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
2. The method of claim 1, wherein the second user information block comprises all user information in the first user information block.
3. The method of claim 1, wherein obtaining the user information, storing the user information in a queue, and obtaining a user information queue comprises:
acquiring a user name and a user password of a user registration system;
and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
4. The method of claim 3, wherein the inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue comprises:
converting the user name into a first character string and converting the user password into a second character string;
firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
5. The method of claim 3, wherein the inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue comprises:
converting the user name into a first character string and converting the user password into a second character string;
randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string;
then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
6. A big data based medical insurance financial user information encryption system, the system comprising:
the acquisition module is used for acquiring user information and storing the user information into a queue to obtain a user information queue;
the first encryption module is used for obtaining a first user information block from a user information queue, the length of the first user information block is one third of the length of the user information queue, and the first user information block comprises a plurality of user information; obtaining a first key in a key queue; encrypting the first user information block based on the first key to obtain a first ciphertext; obtaining a second user information block from a user information queue, wherein the length of the second user information block is two thirds of the length of the user information queue, and the second user information block and the first user information block have the same user information; obtaining a second key in the key queue; encrypting a second user information block based on the second key to obtain a second ciphertext; obtaining a third key in the key queue; encrypting the user information queue based on the third key to obtain a third ciphertext;
the second encryption module is used for encrypting the second ciphertext by taking the first ciphertext as a key to obtain a fourth ciphertext; and encrypting the third ciphertext by taking the fourth ciphertext as a key to obtain a target ciphertext.
7. The system of claim 6, wherein the second user information block comprises all user information in the first user information block.
8. The system of claim 6, wherein the obtaining user information, storing the user information in a queue, and obtaining a user information queue comprises:
acquiring a user name and a user password of a user registration system;
and mixing, inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue, wherein the user information queue comprises a plurality of user information, and the user information is the user name or the user password.
9. The system of claim 8, wherein the inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue comprises:
converting the user name into a first character string and converting the user password into a second character string;
firstly, storing a first number of characters in a first character string into a queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
then storing a first number of characters in the updated first character string into the queue, deleting the characters stored in the queue from the first character string, and updating the first character string; then storing a second number of characters in the second character string into the queue, deleting the characters stored in the queue from the second character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
10. The system of claim 8, wherein the inserting and temporarily storing the user name and the user password into a queue to obtain a user information queue comprises:
converting the user name into a first character string and converting the user password into a second character string;
randomly obtaining characters in a first character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the first character string;
then randomly obtaining characters in a second character string, storing the characters in a queue, deleting the characters stored in the queue from the first character string, and updating the second character string;
and if the updated first character string and the second character string are empty, taking the queue with the character strings as a user information queue, wherein each character string is user information.
CN202010211914.8A 2020-03-24 2020-03-24 Medical insurance financial user information encryption method and system based on big data Active CN111368323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010211914.8A CN111368323B (en) 2020-03-24 2020-03-24 Medical insurance financial user information encryption method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010211914.8A CN111368323B (en) 2020-03-24 2020-03-24 Medical insurance financial user information encryption method and system based on big data

Publications (2)

Publication Number Publication Date
CN111368323A CN111368323A (en) 2020-07-03
CN111368323B true CN111368323B (en) 2020-12-01

Family

ID=71206994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010211914.8A Active CN111368323B (en) 2020-03-24 2020-03-24 Medical insurance financial user information encryption method and system based on big data

Country Status (1)

Country Link
CN (1) CN111368323B (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107306181B (en) * 2016-04-18 2020-03-17 杭州云沣科技有限公司 Authentication system and encryption and verification method and device of authentication information thereof
US11290430B2 (en) * 2018-06-25 2022-03-29 Virtual Software Systems, Inc. Systems and methods for securing communications
US11032068B2 (en) * 2018-06-29 2021-06-08 International Business Machines Corporation Leakage-deterring encryption for message communication
CN109150499B (en) * 2018-08-29 2021-06-08 深圳市迷你玩科技有限公司 Method and device for dynamically encrypting data, computer equipment and storage medium
CN109743307A (en) * 2018-12-28 2019-05-10 东莞见达信息技术有限公司 Method, server unit and the client terminal device of cloud data protection
CN109889518B (en) * 2019-02-18 2022-02-15 天固信息安全***(深圳)有限责任公司 Encryption storage method
CN110891061B (en) * 2019-11-26 2021-08-06 ***股份有限公司 Data encryption and decryption method and device, storage medium and encrypted file

Also Published As

Publication number Publication date
CN111368323A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
EP1840814A1 (en) Verification system
CN100592687C (en) Encryption communication system for generating passwords on the basis of start information on both parties of communication
US9112680B2 (en) Distribution of credentials
CN101897165B (en) Method of authentication of users in data processing systems
CN108090761A (en) Block chain token method of payment based on credible two-dimension code
US7707117B1 (en) Method and apparatus for communicating state information in an electronic transaction message
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN107453862A (en) Private key generation storage and the scheme used
JPH04205693A (en) Data communication system
CN111314069A (en) Block chain-based shaking system and method, electronic device and storage medium
CN107819571A (en) The generation method and device of private key
CN102571357A (en) Signature realization method and signature realization device
US20100005519A1 (en) System and method for authenticating one-time virtual secret information
JP2004512570A (en) Method and apparatus using an insecure cryptographic accelerator
CN107155113A (en) The method and server of a kind of protection barrage information
CN108377319A (en) picture transmission method and device
CN116108410A (en) Identity credential generation method and device
CN113055184B (en) Data encryption and decryption method and device
CN108847924A (en) Encryption method, device, computer equipment and storage medium
Catherine et al. Multi authority ciphertext-policy attribute-based encryption for security enhancement in cloud storage unit
CN111368323B (en) Medical insurance financial user information encryption method and system based on big data
Incze Pixel Sieve method for secret sharing & visual cryptography
JP2006302116A (en) Authentication system, authentication server, terminal device, authentication method and program
CN110795726A (en) Password protection method and system based on artificial neural network
EP3515010A1 (en) Transmission and reception system, transmission device, reception device, method, and computer program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zong Junbin

Inventor after: Liu Qian

Inventor after: Other inventor requests not to publish the name

Inventor before: Request for anonymity

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201110

Address after: 177, block B, building 6, No. 1088, Taihe Road, Baoshan District, Shanghai, 200940

Applicant after: Shanghai Jingdong Technology Co., Ltd

Address before: 610000 15 / F, block a, building 1, Shangding international, hi tech Zone, Chengdu, Sichuan Province

Applicant before: Yang Jiumei

GR01 Patent grant
GR01 Patent grant