CN106357608A - Method for encrypting and decrypting private data for personal healthcare data - Google Patents
Method for encrypting and decrypting private data for personal healthcare data Download PDFInfo
- Publication number
- CN106357608A CN106357608A CN201610702632.1A CN201610702632A CN106357608A CN 106357608 A CN106357608 A CN 106357608A CN 201610702632 A CN201610702632 A CN 201610702632A CN 106357608 A CN106357608 A CN 106357608A
- Authority
- CN
- China
- Prior art keywords
- character
- code
- arry
- ciphertext
- dictionary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 239000000284 extract Substances 0.000 claims description 14
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims description 4
- 239000000203 mixture Substances 0.000 claims 1
- 230000004048 modification Effects 0.000 claims 1
- 238000012986 modification Methods 0.000 claims 1
- 238000003491 array Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Document Processing Apparatus (AREA)
Abstract
本发明涉及一种面向个人医疗健康数据的隐私数据加密及解密方法,本方法加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。另外,提供的面向个人医疗健康门户的隐私数据解密方法用于配套本发明提出的加密方法,方便使用,可靠性高。
The invention relates to a private data encryption and decryption method for personal medical and health data. The length of private information encrypted by this method is not limited, and the longer the password, the higher the encryption strength, thereby solving the problem of server computing resource consumption in the case of a large amount of data encryption , and at the same time reduce the possibility of the encrypted ciphertext being cracked when using methods such as exhaustion and password attack. In addition, the private data decryption method oriented to the personal medical health portal is used to match the encryption method proposed by the present invention, which is convenient to use and has high reliability.
Description
技术领域technical field
本发明涉及隐私数据保护领域,尤其涉及一种面向个人医疗健康数据的隐私数据加密及解密方法。The invention relates to the field of privacy data protection, in particular to a private data encryption and decryption method for personal medical and health data.
背景技术Background technique
随着计算机应用技术的飞跃发展,特别是云存储、云计算的大规模新型应用,面向区域卫生、医疗健康服务中心等应用推广,医疗健康数据量迅猛增长,医疗健康数据成为炙手可热的宝藏,如何保护医疗健康数据涉及到的个人隐私,同时不影响挖掘与应用成为了当下的研究热点。With the rapid development of computer application technology, especially large-scale new applications of cloud storage and cloud computing, which are oriented to regional health and medical and health service centers, the amount of medical and health data is increasing rapidly, and medical and health data has become a hot treasure. Protecting personal privacy involved in medical and health data without affecting mining and application has become a current research hotspot.
在对隐私数据加密技术的实现过程中,一般使用传统的加密技术,如对称的加密技术DES、AES等,非对称的加密技术RSA、Elgamal等,由于大部分常用加密算法因密匙的长度受限、被破译的难度正逐渐降低等原因,人们不断寻找新的加密方法,来弥补这些缺陷,涌现出一些具有特色的加密技术或方案,如专利号为ZL 02803770.7的《存储加密数据的方法》、申请号为201210220262.X的《魔方加密和解密方法》、申请号为201510876310.4的《一种医疗隐私数据自加密机解密的方法》、申请号为201210315347.6的《管理个人信息的方法、装置及终端》等。In the process of realizing privacy data encryption technology, traditional encryption technology is generally used, such as symmetric encryption technology DES, AES, etc., asymmetric encryption technology RSA, Elgamal, etc., because most commonly used encryption algorithms are affected by the length of the key. People are constantly looking for new encryption methods to make up for these shortcomings, and some unique encryption technologies or solutions have emerged, such as the "Method for Storing Encrypted Data" with the patent number ZL 02803770.7 , "Rubik's Cube Encryption and Decryption Method" with application number 201210220262.X, "A Method for Decrypting Medical Privacy Data Self-encrypting Machine" with application number 201510876310.4, "Method, Device and Terminal for Managing Personal Information" with application number 201210315347.6 "Wait.
专利号为ZL 02803770.7的《存储加密数据的方法》在于“从一个加密的数据流中提取数据并送到存储单元(DB),而在把提取出的数据转移到存储单元之前用至少一个特定密码(K1,K2)将这些数据再加密”,该方法依赖一块智能卡设备,在大并发加密数据或解密数据的情况下势必造成性能瓶颈。The patent No. ZL 02803770.7 "Method for storing encrypted data" lies in "extracting data from an encrypted data stream and sending it to the storage unit (DB), and using at least one specific password before transferring the extracted data to the storage unit. (K1, K2) re-encrypt these data", this method relies on a smart card device, which will inevitably cause a performance bottleneck in the case of large concurrent encrypted data or decrypted data.
申请号为201210220262.X的《魔方加密和解密方法》在于“令密匙字符串中每个字符表示为魔方的一种旋转操作,一种旋转操作对应一系列魔方方块序号的换位操作,魔方方块序号对应明文比特流数值的比特位位置”,发明“提出一种密匙长度不受限制且加密强度足够高的加密方法,从而解决加密后的密文被性能极快的计算机用穷举和密码攻击等方法进行破解的可能”。该方法加密的字符越多,消耗的服务器运行资源越多,不适合大量数据加密、解密的数据中心应用场景。The "Rubik's Cube Encryption and Decryption Method" with the application number 201210220262.X lies in "making each character in the key string represent a rotation operation of the Rubik's cube, a rotation operation corresponding to a series of transposition operations of the Rubik's cube serial numbers, the Rubik's cube The block number corresponds to the bit position of the plaintext bit stream value", and the invention "proposes an encryption method with unlimited key length and high enough encryption strength, so as to solve the problem that the encrypted ciphertext is exhausted and exhausted by a computer with extremely fast performance. The possibility of cracking through methods such as password attacks." The more characters encrypted by this method, the more server operating resources will be consumed, which is not suitable for data center application scenarios where a large amount of data is encrypted and decrypted.
申请号为201510876310.4的《一种医疗隐私数据自加密机解密的方法》通过将key同加密数据一同存放来“提供一种可以克服传统的隐私数据加解密处理方法”,方法是使用传统的加密算法,并将固定长度的key(DES为7字节,AES为8/12/16字节)和加密的算法标识,分散到存放着随机数的1K字节的密码区中,密码区中的固定位置p[81]key的第一个字节,同时该字节的值也是密码区中下一个Key字节存放的位置值。该技术侧重于提供一种将key随机存放于密码区的方法来达到密钥同密文一同存放,并防止密钥被破解的方法。由于该方法将key、加密算法标识和加密数据一同存放,对于实施隐私数据加密算法的技术人员或知晓该算法的技术人员来说,这些加密数据相当于没有加密,患者的隐私数据还是面临着被窥探的风险;Application No. 201510876310.4 "A Method for Decrypting Medical Privacy Data Self-Encrypting Machine" stores the key together with the encrypted data to "provide a method that can overcome the traditional encryption and decryption of private data" by using traditional encryption algorithms , and disperse the fixed-length key (DES is 7 bytes, AES is 8/12/16 bytes) and encrypted algorithm identification into the 1K-byte password area storing random numbers. The first byte of the key at position p[81], and the value of this byte is also the position value stored in the next Key byte in the password area. This technology focuses on providing a method of randomly storing the key in the password area to store the key together with the ciphertext and prevent the key from being cracked. Since this method stores the key, the encryption algorithm identifier, and the encrypted data together, for the technicians who implement the privacy data encryption algorithm or those who know the algorithm, these encrypted data are equivalent to no encryption, and the patient's private data still faces the risk of being compromised. risk of snooping;
申请号为201210315347.6的《管理个人信息的方法、装置及终端》根据个人信息的字段长度选择不同的隐藏策略,“并根据用户预先设置的密码对全部个人信息进行加密处理”以此达到“双重保护的目的”。该方法描述了如何使用应用系统的界面来隐藏相应的信息,对如何实现加密的方法没有作任何要求和描述,所以申请号为201210315347.6的《管理个人信息的方法、装置及终端》侧重于描述一种个人隐私保护的方案。Application No. 201210315347.6 "Method, Device and Terminal for Managing Personal Information" selects different concealment strategies according to the field length of personal information, and "encrypts all personal information according to the password preset by the user" to achieve "double protection". the goal of". This method describes how to use the interface of the application system to hide the corresponding information, and does not make any requirements or descriptions on how to implement the encryption method, so the "Method, Device and Terminal for Managing Personal Information" with the application number of 201210315347.6 focuses on describing one A scheme for personal privacy protection.
发明内容Contents of the invention
本发明为克服上述的不足之处,目的在于提供一种面向个人医疗健康数据的隐私数据加密方法,本方法加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。In order to overcome the above disadvantages, the present invention aims to provide a private data encryption method for personal medical and health data. The length of private information encrypted by this method is not limited, and the longer the password, the higher the encryption strength, thereby solving the problem of mass data encryption. In this case, the consumption of server computing resources is a problem, and at the same time, it reduces the possibility of the encrypted ciphertext being cracked when using methods such as exhaustion and password attacks.
本发明另一目的在于提供一种面向个人医疗健康数据的隐私数据解密方法,本解密方法用于配套如上所述的加密方法,方便使用,可靠性高。Another object of the present invention is to provide a private data decryption method for personal medical and health data. This decryption method is used to match the above encryption method, which is convenient to use and has high reliability.
本发明是通过以下技术方案达到上述目的:一种面向个人医疗健康数据的隐私数据加密方法,包括如下步骤:The present invention achieves the above object through the following technical solutions: a private data encryption method for personal medical and health data, comprising the following steps:
(1)创建M×N的二维数组arry_2rd,将字典码填充至二维数组;(1) Create a two-dimensional array arry_2rd of M×N, and fill the dictionary code into the two-dimensional array;
(2)将个人医疗健康数据的账户的密码转换成ASCII码,并将ASCII码拼结成数字串num_password;(2) Convert the password of the personal medical and health data account into an ASCII code, and combine the ASCII code into a numeric string num_password;
(3)将数字串num_password转换成2进制的数字串byte_password;(3) convert the number string num_password into a binary number string byte_password;
(4)从左至右依次提取数字串byte_password的数字直至数字提取完毕,根据提取得到的数字将二维数组arry_2rd切分为两个等大的子数组,并将下标大的数组依次插入到下标小的数组前,得到新的二维数组arry_2rd;(4) Extract the numbers of the digital string byte_password from left to right until the numbers are extracted, divide the two-dimensional array arry_2rd into two sub-arrays of equal size according to the extracted numbers, and insert the array with a large subscript into Before subscripting the small array, get a new two-dimensional array arry_2rd;
(5)逐行逐个从新的二维数组arry_2rd提取字符直至提取完毕,生成密文字典arry_1rd;(5) extract characters line by line from the new two-dimensional array arry_2rd until the extraction is complete, and generate the ciphertext dictionary arry_1rd;
(6)分别对个人医疗健康数据的隐私信息进行加密,加密的方法为:(6) Encrypt the private information of personal medical and health data respectively. The encryption method is:
(6.1)将ASCII编码表中的可打印字符依次放到GB2312编码表空白区的第10区中,将空白字符、换行符、制表符依次放到空白区的第11区中,生成修改后的GB2312编码表;(6.1) Put the printable characters in the ASCII code table in the 10th area of the blank area of the GB2312 code table in turn, and put the blank characters, line breaks, and tabs in the 11th area of the blank area in turn, and generate the modified GB2312 code table;
(6.2)从左至右依次提取涉及隐私信息明文中的字符,查找该字符在修改后的GB2312编码表中的区号和位号,根据区号和位号到密文字典arry_1rd中提取对应位置的字符,将区号对应的字符放在左边,位号对应的字符放在右边,组成源字符对应两位的密文字符串,直至隐私信息全部转换完毕,将密文字符拼接成最终的密文。(6.2) Extract the characters in the plaintext involving privacy information from left to right in turn, find the area code and bit number of the character in the modified GB2312 code table, and extract the character in the corresponding position from the ciphertext dictionary arry_1rd according to the area code and bit number , put the character corresponding to the area code on the left, and the character corresponding to the bit number on the right, to form a ciphertext string corresponding to two digits of the source character, until all the private information is converted, and the ciphertext characters are spliced into the final ciphertext.
作为优选,所述步骤(1)的字典码为所有作为密码的字符集合,填充时将字典码包含的字符逐行逐个填充到M×N的二维数组arry_2rd中,当最后一个字符填充完后,剩余的数组空间存放空格符,其中,M×N大于字典码包含的字符个数。As preferably, the dictionary code of described step (1) is all as the character collection of password, when filling, the character that dictionary code comprises is filled in the two-dimensional array arry_2rd of M * N one by one, when the last character has been filled , the remaining array space is used to store space characters, where M×N is greater than the number of characters contained in the dictionary code.
作为优选,所述步骤(4)根据提取得到的数字将二维数组arry_2rd切分为两个等大的子数组的方法如下:As a preference, the step (4) divides the two-dimensional array arry_2rd into two sub-arrays of equal size according to the extracted numbers as follows:
(i)若数字为0,则沿X轴方向将二维数组arry_2rd从中间切分为两个等大的子数组;(i) If the number is 0, divide the two-dimensional array arry_2rd into two sub-arrays of equal size from the middle along the X-axis;
(ii)若数字为1,则沿Y轴方向将二维数组arry_2rd从中间切分为两个等大的子数组。(ii) If the number is 1, divide the two-dimensional array arry_2rd into two sub-arrays of equal size from the middle along the Y axis.
作为优选,所述个人医疗健康数据的隐私信息包括姓名、身份证号码、联系电话、联系地址、工作单位、登录密码信息。Preferably, the private information of the personal medical and health data includes name, ID number, contact number, contact address, work unit, and login password information.
作为优选,所述步骤(5)从新的二维数组arry_2rd提取字符时当遇到空格符时,跳过空格符取下一位字符。Preferably, when the step (5) extracts characters from the new two-dimensional array arry_2rd, when a space character is encountered, the space character is skipped to obtain the next character.
一种配套如上所述的隐私数据加密方法的解密方法,包括如下步骤:A decryption method supporting the privacy data encryption method as described above, comprising the following steps:
1)得到密文字典arry_1rd;1) Obtain the ciphertext dictionary arry_1rd;
2)从左至右依次提取密文中的字符,得到区码字符和位码字符;2) Extract the characters in the ciphertext sequentially from left to right to obtain area code characters and bit code characters;
3)根据区码字符和位码字符分别在密文字典arry_1rd中找到区码字符索引和位码字符索引;3) find the area code character index and the bit code character index in the ciphertext dictionary arry_1rd according to the area code character and the bit code character respectively;
4)根据获取的区码索引和位码索引到修改后的GB2312编码表中查找对应的字符,直至密文中的字符提取转换完毕。4) Find the corresponding characters in the modified GB2312 code table according to the obtained area code index and bit code index until the characters in the ciphertext are extracted and converted.
作为优选,所述得到密文字典arry_1rd的方法步骤与隐私数据加密方法中得到密文字典arry_1rd步骤相同。Preferably, the method step of obtaining the ciphertext dictionary arry_1rd is the same as the step of obtaining the ciphertext dictionary arry_1rd in the private data encryption method.
作为优选,所述步骤2)提取密文中的字符的方法是每次提取两位字符。Preferably, the method for extracting characters in the ciphertext in step 2) is to extract two characters at a time.
作为优选,所述步骤4)将获取的区码索引和位码索引分别加1后再到修改后的GB2312编码表中查找对应的字符。Preferably, the step 4) adds 1 to the acquired area code index and bit code index respectively, and then searches the corresponding character in the modified GB2312 coding table.
本发明的有益效果在于:1)本发明的特点是即使技术人员知道加密的细节,在不知道密码的情况下也无法破解密文;重要的是加密、解密所消耗的服务器运算资源和加密字符的多少没有关系;2)加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。The beneficial effects of the present invention are: 1) the feature of the present invention is that even if the technician knows the details of the encryption, the ciphertext cannot be deciphered without knowing the password; 2) The length of encrypted private information is not limited, and the longer the password, the higher the encryption strength, thus solving the problem of server computing resource consumption in the case of large amounts of data encryption, and at the same time reducing the use of exhaustive and encrypted ciphertexts. The possibility of being cracked in case of password attack and other methods.
附图说明Description of drawings
图1是本发明加密方法的流程总图;Fig. 1 is the general flow chart of encryption method of the present invention;
图2是本发明数据加密时的根据密文字典加密隐私数据的流程示图;Fig. 2 is a flow diagram of encrypting private data according to a ciphertext dictionary when data is encrypted in the present invention;
图3是本发明实施例提取数字为0时的数组切分方法示意图;Fig. 3 is a schematic diagram of an array segmentation method when the extracted number is 0 according to the embodiment of the present invention;
图4是本发明实施例将下标大的数组依次插入到下标小的数组前的示意图。Fig. 4 is a schematic diagram of sequentially inserting arrays with large subscripts before arrays with small subscripts according to an embodiment of the present invention.
具体实施方式detailed description
下面结合具体实施例对本发明进行进一步描述,但本发明的保护范围并不仅限于此:The present invention is further described below in conjunction with specific embodiment, but protection scope of the present invention is not limited thereto:
实施例:如图1、图2所示,一种面向个人医疗健康数据的隐私数据加密方法,包括以下步骤:Embodiment: as shown in Fig. 1, Fig. 2, a kind of privacy data encryption method for personal medical health data, comprises the following steps:
1)填充94个字符的字典码到10×10的二维数组的中。按照表1的顺序填充10×10的二维数组arry_2rd,最后六个位置存放空格符,填充结果如表2所示:1) Fill the dictionary code of 94 characters into a 10×10 two-dimensional array. Fill the 10×10 two-dimensional array arry_2rd in the order of Table 1, and store spaces in the last six positions. The filling results are shown in Table 2:
表1Table 1
表2Table 2
2)将个人医疗健康数据的账户的密码转换成ASCII码,并将ASCII码拼结成数字串,将数字串转换成2进制的数字串;我们假设用户设定自己的账户密码为:123456,那么我们将密码的ASCII编码49 50 51 52 53 54转换成二进制串:110001 110010 110011110100 110101 110110。2) Convert the password of the personal medical and health data account into ASCII codes, and combine the ASCII codes into a number string, and convert the number string into a binary number string; we assume that the user sets his account password as: 123456 , then we convert the ASCII code 49 50 51 52 53 54 of the password into a binary string: 110001 110010 110011110100 110101 110110.
3)从左至右依次提取数字串的数字直至数字提取完毕,若数字为0,则沿X轴方向将如前所述的二维数组arry_2rd从中间切分为两个等大的子数组;若数字为1,则沿Y轴方向将如前所述的二维数组arry_2rd从中间切分为两个等大的子数组,图3所示的是提取数字为0的情形;并将下标大的数组依次插入到下标小的数组前,得到新的二维数组arry_2rd,如图4所示。3) Extract the digits of the digit string sequentially from left to right until the digits are extracted. If the digit is 0, divide the two-dimensional array arry_2rd as described above into two sub-arrays of equal size from the middle along the X-axis direction; If the number is 1, then divide the two-dimensional array arry_2rd as mentioned above into two sub-arrays of equal size from the middle along the Y-axis direction. Figure 3 shows the situation where the extracted number is 0; and the subscript The large arrays are sequentially inserted before the arrays with small subscripts to obtain a new two-dimensional array arry_2rd, as shown in Figure 4.
在本实施例具体如下:In this embodiment, it is as follows:
第一次,从左向右取二进制串第一位数字为“1”转换上述字典码的二维数组的结果如表3所示:For the first time, take the first digit of the binary string from left to right as "1" and convert the result of the two-dimensional array of the above dictionary code as shown in Table 3:
表3table 3
第二次,从左向右取二进制串第二位数字为“1”,转换结果如表4所示:For the second time, take the second digit of the binary string from left to right as "1", and the conversion result is as shown in Table 4:
表4Table 4
第三次,从左向右取二进制串第三位数组为“0”,转换结果如表5所示:For the third time, take the third digit array of the binary string from left to right as "0", and the conversion result is shown in Table 5:
表5table 5
最终转换结果如表6所示:The final conversion results are shown in Table 6:
表6Table 6
4)输出字典码字符串获得密文字典arry_1rd:4) Output the dictionary code string to obtain the ciphertext dictionary arry_1rd:
\[ZYXWVUTS*)('&%$#"!fedcba`_^]43210/.-,+ponmlkjihg>=<;:98765zyxwvutsrqHGFEDCBA@?~}|{RQPONMLKJI\[ZYXWVUTS*)('&%$#"!fedcba`_^]43210/.-,+ponmlkjihg>=<;:98765zyxwvutsrqHGFEDCBA@?~}|{RQPONMLKJI
5)结合密文字典arry_1rd和修改后的GB2312编码表依次对隐私信息进行加密,查找原字符在GB2312编码表的区码和位码,查找原字符对应的区位码在密文字典arry_1rd中对应的字符,形成密文。如原字符:a,GB2312编码表的区号为10,位号为65,arry_1rd中对应的字符分别为S和v。5) Combine the ciphertext dictionary arry_1rd and the modified GB2312 code table to encrypt the private information in turn, find the area code and bit code of the original character in the GB2312 code table, and find the corresponding area code of the original character in the ciphertext dictionary arry_1rd characters to form ciphertext. For example, the original character: a, the area code of the GB2312 code table is 10, the bit number is 65, and the corresponding characters in arry_1rd are S and v respectively.
我们假设该用户的姓名为abc:Let's assume the user's name is abc:
姓名:abcName: abc
区位码——1065 1066 1067Area Code——1065 1066 1067
密文——SvSuStCiphertext - SvSuSt
最终的加密结果:The final encrypted result:
姓名:SvSuStName: SvSuSt
再假设该用户的姓名为西门吹雪:Assume that the user's name is Ximen Chuuxue:
姓名:西门吹雪Name: Ximen Fuxue
区位码——4687 3537 2021 4909Area Code——4687 3537 2021 4909
密文——kP0.!fhTCiphertext - kP0.! f
最终的加密结果:The final encrypted result:
姓名:kP0.!fhTName: kP0.! f
一种配套如上所述的隐私数据加密方法的解密方法,具体为首先得到密文字典arry_1rd;然后从左至右依次提取姓名的密文SvSuSt的两位字符,到密文字典arry_1rd(密文字典arry_1rd通过输入密码实时产生,系统并不保留)找相应的位置结果为:1065 10661067。根据上述的结果到修改后的GB2312编码表查找相应的字符为:abc。A kind of decryption method supporting the private data encryption method as described above, specifically for first obtaining the ciphertext dictionary arry_1rd; then extracting the two characters of the ciphertext SvSuSt of the name successively from left to right, to the ciphertext dictionary arry_1rd (ciphertext dictionary arry_1rd is generated in real time by entering the password, and the system does not keep it) Find the corresponding location and the result is: 1065 10661067. According to the above results, look up the corresponding characters in the modified GB2312 encoding table: abc.
如果输入的密码不正确,将得到错误的密文字典arry_1rd,解密的姓名将是其它字符。姓名为西门吹雪的解密方法依次类推,不再敖述。If the password entered is incorrect, the wrong ciphertext dictionary arry_1rd will be obtained, and the decrypted name will be other characters. The deciphering method named Ximen Chuuxue is deduced by analogy and will not be described again.
本发明加密技术能够加密GB2312编码表中的所有字符,包括ASCII编码表中的可打印字符。如遇到GB2312编码表以外的个别生僻汉字的情况加密会遇到问题。解决的办法是在针对个人隐私信息加密的过程中,如果遇到GB2312编码表以外的个别生僻汉字,可将该生僻汉字填充到GB2312编码表剩余的空白区中,同时维护空白区的字符集和个人唯一识别的信息(避免空白区生僻字符的冲突)达到加密的目的。The encryption technology of the invention can encrypt all characters in the GB2312 code table, including printable characters in the ASCII code table. Encryption will encounter problems if encountering individual rare Chinese characters other than the GB2312 code table. The solution is that in the process of encrypting personal privacy information, if you encounter some rare Chinese characters outside the GB2312 code table, you can fill the rare Chinese characters into the remaining blank area of the GB2312 code table, and at the same time maintain the character set and Personally uniquely identifiable information (to avoid conflicts of rare characters in the blank space) achieves the purpose of encryption.
综上所述,本发明与常见加密技术相比,加密、解密基本都是字符查找的过程,具有实施简单、占服务器运算资源少、加密字符长度不受限制等特点,非常适合数据库的应用场景。To sum up, compared with the common encryption technology, the present invention is basically a character search process for encryption and decryption. It has the characteristics of simple implementation, less computing resources on the server, and unlimited encrypted character length. It is very suitable for database application scenarios. .
以上的所述乃是本发明的具体实施例及所运用的技术原理,若依本发明的构想所作的改变,其所产生的功能作用仍未超出说明书及附图所涵盖的精神时,仍应属本发明的保护范围。The above descriptions are the specific embodiments of the present invention and the technical principles used. If the changes made according to the conception of the present invention do not exceed the spirit covered by the description and accompanying drawings, they should still be Belong to the protection scope of the present invention.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610702632.1A CN106357608B (en) | 2016-08-19 | 2016-08-19 | A kind of private data encryption and decryption method towards personal medical treatment & health data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610702632.1A CN106357608B (en) | 2016-08-19 | 2016-08-19 | A kind of private data encryption and decryption method towards personal medical treatment & health data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106357608A true CN106357608A (en) | 2017-01-25 |
CN106357608B CN106357608B (en) | 2019-05-24 |
Family
ID=57843730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610702632.1A Active CN106357608B (en) | 2016-08-19 | 2016-08-19 | A kind of private data encryption and decryption method towards personal medical treatment & health data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106357608B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107481181A (en) * | 2017-07-27 | 2017-12-15 | 银江股份有限公司 | A kind of picture hidden method, restoring method and picture for being used to protect individual privacy hides system |
CN107659399A (en) * | 2017-10-09 | 2018-02-02 | 四川巧夺天工信息安全智能设备有限公司 | It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key |
CN108134799A (en) * | 2018-01-18 | 2018-06-08 | 国网湖南省电力有限公司 | Novel encipher-decipher method and its device |
CN111899855A (en) * | 2020-07-16 | 2020-11-06 | 武汉大学 | A visualization construction method and platform for spatiotemporal aggregation of individual health and public health data |
CN115567318A (en) * | 2022-11-08 | 2023-01-03 | 广州市保伦电子有限公司 | Password encryption and decryption method and terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005024695A3 (en) * | 2003-09-03 | 2005-11-03 | Agilent Technologies Inc | Methods for encoding non-biological information on microarrays |
CN105281894A (en) * | 2015-11-25 | 2016-01-27 | 深圳供电局有限公司 | Plaintext encryption method and system based on seven-order magic cube |
-
2016
- 2016-08-19 CN CN201610702632.1A patent/CN106357608B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005024695A3 (en) * | 2003-09-03 | 2005-11-03 | Agilent Technologies Inc | Methods for encoding non-biological information on microarrays |
CN105281894A (en) * | 2015-11-25 | 2016-01-27 | 深圳供电局有限公司 | Plaintext encryption method and system based on seven-order magic cube |
Non-Patent Citations (1)
Title |
---|
朱雨: "面向托管数据查询的隐私保护技术及应用框架的研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107481181A (en) * | 2017-07-27 | 2017-12-15 | 银江股份有限公司 | A kind of picture hidden method, restoring method and picture for being used to protect individual privacy hides system |
CN107481181B (en) * | 2017-07-27 | 2020-08-04 | 银江股份有限公司 | A picture hiding method, restoration method and picture hiding system for protecting personal privacy |
CN107659399A (en) * | 2017-10-09 | 2018-02-02 | 四川巧夺天工信息安全智能设备有限公司 | It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key |
CN108134799A (en) * | 2018-01-18 | 2018-06-08 | 国网湖南省电力有限公司 | Novel encipher-decipher method and its device |
CN108134799B (en) * | 2018-01-18 | 2021-06-22 | 国网湖南省电力有限公司 | Novel coding and decoding method and device thereof |
CN111899855A (en) * | 2020-07-16 | 2020-11-06 | 武汉大学 | A visualization construction method and platform for spatiotemporal aggregation of individual health and public health data |
CN111899855B (en) * | 2020-07-16 | 2024-04-26 | 武汉大学 | Method and platform for constructing individual health and public health data space-time aggregation visualization |
CN115567318A (en) * | 2022-11-08 | 2023-01-03 | 广州市保伦电子有限公司 | Password encryption and decryption method and terminal |
CN115567318B (en) * | 2022-11-08 | 2023-05-16 | 广东保伦电子股份有限公司 | Password encryption and decryption method and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106357608B (en) | 2019-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110337649B (en) | Method and system for dynamic symmetric searchable encryption with imperceptible search patterns | |
CN106610995B (en) | Method, device and system for creating ciphertext index | |
US20180316491A1 (en) | Fast format-preserving encryption for variable length data | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
CN105099652B (en) | Data encryption, decryption method and device | |
CN102025482B (en) | A Construction Method of Cryptography System (VGC) Based on Virtual Genome | |
CN111832056B (en) | Method and system for generating two-dimensional code | |
CN111628858B (en) | Encryption and decryption system and encryption and decryption method of network security algorithm | |
CN107609418A (en) | Desensitization method, device, storage device and the computer equipment of text data | |
CN105959098A (en) | Format-reserved encryption algorithm based on multi-segmented Feistel network | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN101335616B (en) | Symmetric ciphering method having infinite cipher key space | |
CN104899517B (en) | Phrase-based can search for symmetric encryption method | |
CN101394268A (en) | Advanced Encryption System and Method Based on Generalized Information Domain | |
Zhou et al. | Stereo matching using a neural network | |
Geetha et al. | Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm | |
CN115603907A (en) | Method, device, equipment and storage medium for encrypting storage data | |
CN112235104A (en) | Data encryption transmission method, system, terminal and storage medium | |
CN107248915A (en) | A kind of method for the data message dynamic encryption for preventing from being decrypted by violence | |
Vershinin et al. | Associative steganography of text messages | |
CN115834163B (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
CN101364868B (en) | Pseudo-random code generator and its generation method based on generalized information domain | |
Bazli et al. | Data encryption using bio-molecular information | |
CN115580489A (en) | Data transmission method, device, equipment and storage medium | |
CN107135213A (en) | Data communications method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 310012 1st floor, building 1, 223 Yile Road, Hangzhou City, Zhejiang Province Patentee after: Yinjiang Technology Co.,Ltd. Address before: 310012 1st floor, building 1, 223 Yile Road, Hangzhou City, Zhejiang Province Patentee before: ENJOYOR Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20170125 Assignee: Hangzhou Yinjiang Intelligent Health Group Co.,Ltd. Assignor: Yinjiang Technology Co.,Ltd. Contract record no.: X2024980042646 Denomination of invention: A privacy data encryption and decryption method for personal medical and health data Granted publication date: 20190524 License type: Common License Record date: 20250102 |
|
EE01 | Entry into force of recordation of patent licensing contract |