Nothing Special   »   [go: up one dir, main page]

CN106357608A - Method for encrypting and decrypting private data for personal healthcare data - Google Patents

Method for encrypting and decrypting private data for personal healthcare data Download PDF

Info

Publication number
CN106357608A
CN106357608A CN201610702632.1A CN201610702632A CN106357608A CN 106357608 A CN106357608 A CN 106357608A CN 201610702632 A CN201610702632 A CN 201610702632A CN 106357608 A CN106357608 A CN 106357608A
Authority
CN
China
Prior art keywords
character
code
arry
ciphertext
dictionary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610702632.1A
Other languages
Chinese (zh)
Other versions
CN106357608B (en
Inventor
于海龙
李建元
温晓岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yinjiang Technology Co.,Ltd.
Original Assignee
Enjoyor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Enjoyor Co Ltd filed Critical Enjoyor Co Ltd
Priority to CN201610702632.1A priority Critical patent/CN106357608B/en
Publication of CN106357608A publication Critical patent/CN106357608A/en
Application granted granted Critical
Publication of CN106357608B publication Critical patent/CN106357608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Document Processing Apparatus (AREA)

Abstract

本发明涉及一种面向个人医疗健康数据的隐私数据加密及解密方法,本方法加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。另外,提供的面向个人医疗健康门户的隐私数据解密方法用于配套本发明提出的加密方法,方便使用,可靠性高。

The invention relates to a private data encryption and decryption method for personal medical and health data. The length of private information encrypted by this method is not limited, and the longer the password, the higher the encryption strength, thereby solving the problem of server computing resource consumption in the case of a large amount of data encryption , and at the same time reduce the possibility of the encrypted ciphertext being cracked when using methods such as exhaustion and password attack. In addition, the private data decryption method oriented to the personal medical health portal is used to match the encryption method proposed by the present invention, which is convenient to use and has high reliability.

Description

一种面向个人医疗健康数据的隐私数据加密及解密方法A private data encryption and decryption method for personal medical and health data

技术领域technical field

本发明涉及隐私数据保护领域,尤其涉及一种面向个人医疗健康数据的隐私数据加密及解密方法。The invention relates to the field of privacy data protection, in particular to a private data encryption and decryption method for personal medical and health data.

背景技术Background technique

随着计算机应用技术的飞跃发展,特别是云存储、云计算的大规模新型应用,面向区域卫生、医疗健康服务中心等应用推广,医疗健康数据量迅猛增长,医疗健康数据成为炙手可热的宝藏,如何保护医疗健康数据涉及到的个人隐私,同时不影响挖掘与应用成为了当下的研究热点。With the rapid development of computer application technology, especially large-scale new applications of cloud storage and cloud computing, which are oriented to regional health and medical and health service centers, the amount of medical and health data is increasing rapidly, and medical and health data has become a hot treasure. Protecting personal privacy involved in medical and health data without affecting mining and application has become a current research hotspot.

在对隐私数据加密技术的实现过程中,一般使用传统的加密技术,如对称的加密技术DES、AES等,非对称的加密技术RSA、Elgamal等,由于大部分常用加密算法因密匙的长度受限、被破译的难度正逐渐降低等原因,人们不断寻找新的加密方法,来弥补这些缺陷,涌现出一些具有特色的加密技术或方案,如专利号为ZL 02803770.7的《存储加密数据的方法》、申请号为201210220262.X的《魔方加密和解密方法》、申请号为201510876310.4的《一种医疗隐私数据自加密机解密的方法》、申请号为201210315347.6的《管理个人信息的方法、装置及终端》等。In the process of realizing privacy data encryption technology, traditional encryption technology is generally used, such as symmetric encryption technology DES, AES, etc., asymmetric encryption technology RSA, Elgamal, etc., because most commonly used encryption algorithms are affected by the length of the key. People are constantly looking for new encryption methods to make up for these shortcomings, and some unique encryption technologies or solutions have emerged, such as the "Method for Storing Encrypted Data" with the patent number ZL 02803770.7 , "Rubik's Cube Encryption and Decryption Method" with application number 201210220262.X, "A Method for Decrypting Medical Privacy Data Self-encrypting Machine" with application number 201510876310.4, "Method, Device and Terminal for Managing Personal Information" with application number 201210315347.6 "Wait.

专利号为ZL 02803770.7的《存储加密数据的方法》在于“从一个加密的数据流中提取数据并送到存储单元(DB),而在把提取出的数据转移到存储单元之前用至少一个特定密码(K1,K2)将这些数据再加密”,该方法依赖一块智能卡设备,在大并发加密数据或解密数据的情况下势必造成性能瓶颈。The patent No. ZL 02803770.7 "Method for storing encrypted data" lies in "extracting data from an encrypted data stream and sending it to the storage unit (DB), and using at least one specific password before transferring the extracted data to the storage unit. (K1, K2) re-encrypt these data", this method relies on a smart card device, which will inevitably cause a performance bottleneck in the case of large concurrent encrypted data or decrypted data.

申请号为201210220262.X的《魔方加密和解密方法》在于“令密匙字符串中每个字符表示为魔方的一种旋转操作,一种旋转操作对应一系列魔方方块序号的换位操作,魔方方块序号对应明文比特流数值的比特位位置”,发明“提出一种密匙长度不受限制且加密强度足够高的加密方法,从而解决加密后的密文被性能极快的计算机用穷举和密码攻击等方法进行破解的可能”。该方法加密的字符越多,消耗的服务器运行资源越多,不适合大量数据加密、解密的数据中心应用场景。The "Rubik's Cube Encryption and Decryption Method" with the application number 201210220262.X lies in "making each character in the key string represent a rotation operation of the Rubik's cube, a rotation operation corresponding to a series of transposition operations of the Rubik's cube serial numbers, the Rubik's cube The block number corresponds to the bit position of the plaintext bit stream value", and the invention "proposes an encryption method with unlimited key length and high enough encryption strength, so as to solve the problem that the encrypted ciphertext is exhausted and exhausted by a computer with extremely fast performance. The possibility of cracking through methods such as password attacks." The more characters encrypted by this method, the more server operating resources will be consumed, which is not suitable for data center application scenarios where a large amount of data is encrypted and decrypted.

申请号为201510876310.4的《一种医疗隐私数据自加密机解密的方法》通过将key同加密数据一同存放来“提供一种可以克服传统的隐私数据加解密处理方法”,方法是使用传统的加密算法,并将固定长度的key(DES为7字节,AES为8/12/16字节)和加密的算法标识,分散到存放着随机数的1K字节的密码区中,密码区中的固定位置p[81]key的第一个字节,同时该字节的值也是密码区中下一个Key字节存放的位置值。该技术侧重于提供一种将key随机存放于密码区的方法来达到密钥同密文一同存放,并防止密钥被破解的方法。由于该方法将key、加密算法标识和加密数据一同存放,对于实施隐私数据加密算法的技术人员或知晓该算法的技术人员来说,这些加密数据相当于没有加密,患者的隐私数据还是面临着被窥探的风险;Application No. 201510876310.4 "A Method for Decrypting Medical Privacy Data Self-Encrypting Machine" stores the key together with the encrypted data to "provide a method that can overcome the traditional encryption and decryption of private data" by using traditional encryption algorithms , and disperse the fixed-length key (DES is 7 bytes, AES is 8/12/16 bytes) and encrypted algorithm identification into the 1K-byte password area storing random numbers. The first byte of the key at position p[81], and the value of this byte is also the position value stored in the next Key byte in the password area. This technology focuses on providing a method of randomly storing the key in the password area to store the key together with the ciphertext and prevent the key from being cracked. Since this method stores the key, the encryption algorithm identifier, and the encrypted data together, for the technicians who implement the privacy data encryption algorithm or those who know the algorithm, these encrypted data are equivalent to no encryption, and the patient's private data still faces the risk of being compromised. risk of snooping;

申请号为201210315347.6的《管理个人信息的方法、装置及终端》根据个人信息的字段长度选择不同的隐藏策略,“并根据用户预先设置的密码对全部个人信息进行加密处理”以此达到“双重保护的目的”。该方法描述了如何使用应用系统的界面来隐藏相应的信息,对如何实现加密的方法没有作任何要求和描述,所以申请号为201210315347.6的《管理个人信息的方法、装置及终端》侧重于描述一种个人隐私保护的方案。Application No. 201210315347.6 "Method, Device and Terminal for Managing Personal Information" selects different concealment strategies according to the field length of personal information, and "encrypts all personal information according to the password preset by the user" to achieve "double protection". the goal of". This method describes how to use the interface of the application system to hide the corresponding information, and does not make any requirements or descriptions on how to implement the encryption method, so the "Method, Device and Terminal for Managing Personal Information" with the application number of 201210315347.6 focuses on describing one A scheme for personal privacy protection.

发明内容Contents of the invention

本发明为克服上述的不足之处,目的在于提供一种面向个人医疗健康数据的隐私数据加密方法,本方法加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。In order to overcome the above disadvantages, the present invention aims to provide a private data encryption method for personal medical and health data. The length of private information encrypted by this method is not limited, and the longer the password, the higher the encryption strength, thereby solving the problem of mass data encryption. In this case, the consumption of server computing resources is a problem, and at the same time, it reduces the possibility of the encrypted ciphertext being cracked when using methods such as exhaustion and password attacks.

本发明另一目的在于提供一种面向个人医疗健康数据的隐私数据解密方法,本解密方法用于配套如上所述的加密方法,方便使用,可靠性高。Another object of the present invention is to provide a private data decryption method for personal medical and health data. This decryption method is used to match the above encryption method, which is convenient to use and has high reliability.

本发明是通过以下技术方案达到上述目的:一种面向个人医疗健康数据的隐私数据加密方法,包括如下步骤:The present invention achieves the above object through the following technical solutions: a private data encryption method for personal medical and health data, comprising the following steps:

(1)创建M×N的二维数组arry_2rd,将字典码填充至二维数组;(1) Create a two-dimensional array arry_2rd of M×N, and fill the dictionary code into the two-dimensional array;

(2)将个人医疗健康数据的账户的密码转换成ASCII码,并将ASCII码拼结成数字串num_password;(2) Convert the password of the personal medical and health data account into an ASCII code, and combine the ASCII code into a numeric string num_password;

(3)将数字串num_password转换成2进制的数字串byte_password;(3) convert the number string num_password into a binary number string byte_password;

(4)从左至右依次提取数字串byte_password的数字直至数字提取完毕,根据提取得到的数字将二维数组arry_2rd切分为两个等大的子数组,并将下标大的数组依次插入到下标小的数组前,得到新的二维数组arry_2rd;(4) Extract the numbers of the digital string byte_password from left to right until the numbers are extracted, divide the two-dimensional array arry_2rd into two sub-arrays of equal size according to the extracted numbers, and insert the array with a large subscript into Before subscripting the small array, get a new two-dimensional array arry_2rd;

(5)逐行逐个从新的二维数组arry_2rd提取字符直至提取完毕,生成密文字典arry_1rd;(5) extract characters line by line from the new two-dimensional array arry_2rd until the extraction is complete, and generate the ciphertext dictionary arry_1rd;

(6)分别对个人医疗健康数据的隐私信息进行加密,加密的方法为:(6) Encrypt the private information of personal medical and health data respectively. The encryption method is:

(6.1)将ASCII编码表中的可打印字符依次放到GB2312编码表空白区的第10区中,将空白字符、换行符、制表符依次放到空白区的第11区中,生成修改后的GB2312编码表;(6.1) Put the printable characters in the ASCII code table in the 10th area of the blank area of the GB2312 code table in turn, and put the blank characters, line breaks, and tabs in the 11th area of the blank area in turn, and generate the modified GB2312 code table;

(6.2)从左至右依次提取涉及隐私信息明文中的字符,查找该字符在修改后的GB2312编码表中的区号和位号,根据区号和位号到密文字典arry_1rd中提取对应位置的字符,将区号对应的字符放在左边,位号对应的字符放在右边,组成源字符对应两位的密文字符串,直至隐私信息全部转换完毕,将密文字符拼接成最终的密文。(6.2) Extract the characters in the plaintext involving privacy information from left to right in turn, find the area code and bit number of the character in the modified GB2312 code table, and extract the character in the corresponding position from the ciphertext dictionary arry_1rd according to the area code and bit number , put the character corresponding to the area code on the left, and the character corresponding to the bit number on the right, to form a ciphertext string corresponding to two digits of the source character, until all the private information is converted, and the ciphertext characters are spliced into the final ciphertext.

作为优选,所述步骤(1)的字典码为所有作为密码的字符集合,填充时将字典码包含的字符逐行逐个填充到M×N的二维数组arry_2rd中,当最后一个字符填充完后,剩余的数组空间存放空格符,其中,M×N大于字典码包含的字符个数。As preferably, the dictionary code of described step (1) is all as the character collection of password, when filling, the character that dictionary code comprises is filled in the two-dimensional array arry_2rd of M * N one by one, when the last character has been filled , the remaining array space is used to store space characters, where M×N is greater than the number of characters contained in the dictionary code.

作为优选,所述步骤(4)根据提取得到的数字将二维数组arry_2rd切分为两个等大的子数组的方法如下:As a preference, the step (4) divides the two-dimensional array arry_2rd into two sub-arrays of equal size according to the extracted numbers as follows:

(i)若数字为0,则沿X轴方向将二维数组arry_2rd从中间切分为两个等大的子数组;(i) If the number is 0, divide the two-dimensional array arry_2rd into two sub-arrays of equal size from the middle along the X-axis;

(ii)若数字为1,则沿Y轴方向将二维数组arry_2rd从中间切分为两个等大的子数组。(ii) If the number is 1, divide the two-dimensional array arry_2rd into two sub-arrays of equal size from the middle along the Y axis.

作为优选,所述个人医疗健康数据的隐私信息包括姓名、身份证号码、联系电话、联系地址、工作单位、登录密码信息。Preferably, the private information of the personal medical and health data includes name, ID number, contact number, contact address, work unit, and login password information.

作为优选,所述步骤(5)从新的二维数组arry_2rd提取字符时当遇到空格符时,跳过空格符取下一位字符。Preferably, when the step (5) extracts characters from the new two-dimensional array arry_2rd, when a space character is encountered, the space character is skipped to obtain the next character.

一种配套如上所述的隐私数据加密方法的解密方法,包括如下步骤:A decryption method supporting the privacy data encryption method as described above, comprising the following steps:

1)得到密文字典arry_1rd;1) Obtain the ciphertext dictionary arry_1rd;

2)从左至右依次提取密文中的字符,得到区码字符和位码字符;2) Extract the characters in the ciphertext sequentially from left to right to obtain area code characters and bit code characters;

3)根据区码字符和位码字符分别在密文字典arry_1rd中找到区码字符索引和位码字符索引;3) find the area code character index and the bit code character index in the ciphertext dictionary arry_1rd according to the area code character and the bit code character respectively;

4)根据获取的区码索引和位码索引到修改后的GB2312编码表中查找对应的字符,直至密文中的字符提取转换完毕。4) Find the corresponding characters in the modified GB2312 code table according to the obtained area code index and bit code index until the characters in the ciphertext are extracted and converted.

作为优选,所述得到密文字典arry_1rd的方法步骤与隐私数据加密方法中得到密文字典arry_1rd步骤相同。Preferably, the method step of obtaining the ciphertext dictionary arry_1rd is the same as the step of obtaining the ciphertext dictionary arry_1rd in the private data encryption method.

作为优选,所述步骤2)提取密文中的字符的方法是每次提取两位字符。Preferably, the method for extracting characters in the ciphertext in step 2) is to extract two characters at a time.

作为优选,所述步骤4)将获取的区码索引和位码索引分别加1后再到修改后的GB2312编码表中查找对应的字符。Preferably, the step 4) adds 1 to the acquired area code index and bit code index respectively, and then searches the corresponding character in the modified GB2312 coding table.

本发明的有益效果在于:1)本发明的特点是即使技术人员知道加密的细节,在不知道密码的情况下也无法破解密文;重要的是加密、解密所消耗的服务器运算资源和加密字符的多少没有关系;2)加密的隐私信息长度不受限制并且密码越长加密强度越高,从而解决大量数据加密情况下服务器运算资源的消耗问题,同时降低加密后的密文在使用穷举和密码攻击等方法的情况下被破解的可能性。The beneficial effects of the present invention are: 1) the feature of the present invention is that even if the technician knows the details of the encryption, the ciphertext cannot be deciphered without knowing the password; 2) The length of encrypted private information is not limited, and the longer the password, the higher the encryption strength, thus solving the problem of server computing resource consumption in the case of large amounts of data encryption, and at the same time reducing the use of exhaustive and encrypted ciphertexts. The possibility of being cracked in case of password attack and other methods.

附图说明Description of drawings

图1是本发明加密方法的流程总图;Fig. 1 is the general flow chart of encryption method of the present invention;

图2是本发明数据加密时的根据密文字典加密隐私数据的流程示图;Fig. 2 is a flow diagram of encrypting private data according to a ciphertext dictionary when data is encrypted in the present invention;

图3是本发明实施例提取数字为0时的数组切分方法示意图;Fig. 3 is a schematic diagram of an array segmentation method when the extracted number is 0 according to the embodiment of the present invention;

图4是本发明实施例将下标大的数组依次插入到下标小的数组前的示意图。Fig. 4 is a schematic diagram of sequentially inserting arrays with large subscripts before arrays with small subscripts according to an embodiment of the present invention.

具体实施方式detailed description

下面结合具体实施例对本发明进行进一步描述,但本发明的保护范围并不仅限于此:The present invention is further described below in conjunction with specific embodiment, but protection scope of the present invention is not limited thereto:

实施例:如图1、图2所示,一种面向个人医疗健康数据的隐私数据加密方法,包括以下步骤:Embodiment: as shown in Fig. 1, Fig. 2, a kind of privacy data encryption method for personal medical health data, comprises the following steps:

1)填充94个字符的字典码到10×10的二维数组的中。按照表1的顺序填充10×10的二维数组arry_2rd,最后六个位置存放空格符,填充结果如表2所示:1) Fill the dictionary code of 94 characters into a 10×10 two-dimensional array. Fill the 10×10 two-dimensional array arry_2rd in the order of Table 1, and store spaces in the last six positions. The filling results are shown in Table 2:

表1Table 1

! "" ## $$ % && '' (( )) ** ++ ,, -- .. // 00 11 22 33 44 55 66 77 88 99 :: ; << = >> ? @@ AA BB CC DD. EE. Ff GG Hh II JJ KK LL Mm NN Oo PP QQ RR SS TT Uu VV WW Xx YY ZZ [[ \\ ]] ^^ __ `` aa bb cc dd ee ff gg hh ii jj kk ll mm nno oo pp qq rr sthe s tt uu vv ww xx ythe y zz {{ || }} ~

表2Table 2

2)将个人医疗健康数据的账户的密码转换成ASCII码,并将ASCII码拼结成数字串,将数字串转换成2进制的数字串;我们假设用户设定自己的账户密码为:123456,那么我们将密码的ASCII编码49 50 51 52 53 54转换成二进制串:110001 110010 110011110100 110101 110110。2) Convert the password of the personal medical and health data account into ASCII codes, and combine the ASCII codes into a number string, and convert the number string into a binary number string; we assume that the user sets his account password as: 123456 , then we convert the ASCII code 49 50 51 52 53 54 of the password into a binary string: 110001 110010 110011110100 110101 110110.

3)从左至右依次提取数字串的数字直至数字提取完毕,若数字为0,则沿X轴方向将如前所述的二维数组arry_2rd从中间切分为两个等大的子数组;若数字为1,则沿Y轴方向将如前所述的二维数组arry_2rd从中间切分为两个等大的子数组,图3所示的是提取数字为0的情形;并将下标大的数组依次插入到下标小的数组前,得到新的二维数组arry_2rd,如图4所示。3) Extract the digits of the digit string sequentially from left to right until the digits are extracted. If the digit is 0, divide the two-dimensional array arry_2rd as described above into two sub-arrays of equal size from the middle along the X-axis direction; If the number is 1, then divide the two-dimensional array arry_2rd as mentioned above into two sub-arrays of equal size from the middle along the Y-axis direction. Figure 3 shows the situation where the extracted number is 0; and the subscript The large arrays are sequentially inserted before the arrays with small subscripts to obtain a new two-dimensional array arry_2rd, as shown in Figure 4.

在本实施例具体如下:In this embodiment, it is as follows:

第一次,从左向右取二进制串第一位数字为“1”转换上述字典码的二维数组的结果如表3所示:For the first time, take the first digit of the binary string from left to right as "1" and convert the result of the two-dimensional array of the above dictionary code as shown in Table 3:

SS TT Uu VV WW Xx YY ZZ [[ \\ ! "" ## $$ % && '' (( )) ** ]] ^^ __ `` aa bb cc dd ee ff ++ ,, -- .. // 00 11 22 33 44 gg hh ii jj kk ll mm nno oo pp 55 66 77 88 99 :: ; << = >> qq rr sthe s tt uu vv ww xx ythe y zz ? @@ AA BB CC DD. EE. Ff GG Hh {{ || }} ~ II JJ KK LL Mm NN Oo PP QQ RR

表3table 3

第二次,从左向右取二进制串第二位数字为“1”,转换结果如表4所示:For the second time, take the second digit of the binary string from left to right as "1", and the conversion result is as shown in Table 4:

55 66 77 88 99 :: ; << = >> SS TT Uu VV WW Xx YY ZZ [[ \\ qq rr sthe s tt uu vv ww xx ythe y zz ! "" ## $$ % && '' (( )) ** ? @@ AA BB CC DD. EE. Ff GG Hh ]] ^^ __ `` aa bb cc dd ee ff {{ || }} ~ ++ ,, -- .. // 00 11 22 33 44 II JJ KK LL Mm NN Oo PP QQ RR gg hh ii jj kk ll mm nno oo pp

表4Table 4

第三次,从左向右取二进制串第三位数组为“0”,转换结果如表5所示:For the third time, take the third digit array of the binary string from left to right as "0", and the conversion result is shown in Table 5:

表5table 5

最终转换结果如表6所示:The final conversion results are shown in Table 6:

\\ [[ ZZ YY Xx WW VV Uu TT SS ** )) (( '' && % $$ ## "" ! ff ee dd cc bb aa `` __ ^^ ]] 44 33 22 11 00 // .. -- ,, ++ pp oo nno mm ll kk jj ii hh gg >> = << ; :: 99 88 77 66 55 zz ythe y xx ww vv uu tt sthe s rr qq Hh GG Ff EE. DD. CC BB AA @@ ? ~ }} || {{ RR QQ PP Oo NN Mm LL KK JJ II

表6Table 6

4)输出字典码字符串获得密文字典arry_1rd:4) Output the dictionary code string to obtain the ciphertext dictionary arry_1rd:

\[ZYXWVUTS*)('&%$#"!fedcba`_^]43210/.-,+ponmlkjihg>=<;:98765zyxwvutsrqHGFEDCBA@?~}|{RQPONMLKJI\[ZYXWVUTS*)('&%$#"!fedcba`_^]43210/.-,+ponmlkjihg>=<;:98765zyxwvutsrqHGFEDCBA@?~}|{RQPONMLKJI

5)结合密文字典arry_1rd和修改后的GB2312编码表依次对隐私信息进行加密,查找原字符在GB2312编码表的区码和位码,查找原字符对应的区位码在密文字典arry_1rd中对应的字符,形成密文。如原字符:a,GB2312编码表的区号为10,位号为65,arry_1rd中对应的字符分别为S和v。5) Combine the ciphertext dictionary arry_1rd and the modified GB2312 code table to encrypt the private information in turn, find the area code and bit code of the original character in the GB2312 code table, and find the corresponding area code of the original character in the ciphertext dictionary arry_1rd characters to form ciphertext. For example, the original character: a, the area code of the GB2312 code table is 10, the bit number is 65, and the corresponding characters in arry_1rd are S and v respectively.

我们假设该用户的姓名为abc:Let's assume the user's name is abc:

姓名:abcName: abc

区位码——1065 1066 1067Area Code——1065 1066 1067

密文——SvSuStCiphertext - SvSuSt

最终的加密结果:The final encrypted result:

姓名:SvSuStName: SvSuSt

再假设该用户的姓名为西门吹雪:Assume that the user's name is Ximen Chuuxue:

姓名:西门吹雪Name: Ximen Fuxue

区位码——4687 3537 2021 4909Area Code——4687 3537 2021 4909

密文——kP0.!fhTCiphertext - kP0.! f

最终的加密结果:The final encrypted result:

姓名:kP0.!fhTName: kP0.! f

一种配套如上所述的隐私数据加密方法的解密方法,具体为首先得到密文字典arry_1rd;然后从左至右依次提取姓名的密文SvSuSt的两位字符,到密文字典arry_1rd(密文字典arry_1rd通过输入密码实时产生,系统并不保留)找相应的位置结果为:1065 10661067。根据上述的结果到修改后的GB2312编码表查找相应的字符为:abc。A kind of decryption method supporting the private data encryption method as described above, specifically for first obtaining the ciphertext dictionary arry_1rd; then extracting the two characters of the ciphertext SvSuSt of the name successively from left to right, to the ciphertext dictionary arry_1rd (ciphertext dictionary arry_1rd is generated in real time by entering the password, and the system does not keep it) Find the corresponding location and the result is: 1065 10661067. According to the above results, look up the corresponding characters in the modified GB2312 encoding table: abc.

如果输入的密码不正确,将得到错误的密文字典arry_1rd,解密的姓名将是其它字符。姓名为西门吹雪的解密方法依次类推,不再敖述。If the password entered is incorrect, the wrong ciphertext dictionary arry_1rd will be obtained, and the decrypted name will be other characters. The deciphering method named Ximen Chuuxue is deduced by analogy and will not be described again.

本发明加密技术能够加密GB2312编码表中的所有字符,包括ASCII编码表中的可打印字符。如遇到GB2312编码表以外的个别生僻汉字的情况加密会遇到问题。解决的办法是在针对个人隐私信息加密的过程中,如果遇到GB2312编码表以外的个别生僻汉字,可将该生僻汉字填充到GB2312编码表剩余的空白区中,同时维护空白区的字符集和个人唯一识别的信息(避免空白区生僻字符的冲突)达到加密的目的。The encryption technology of the invention can encrypt all characters in the GB2312 code table, including printable characters in the ASCII code table. Encryption will encounter problems if encountering individual rare Chinese characters other than the GB2312 code table. The solution is that in the process of encrypting personal privacy information, if you encounter some rare Chinese characters outside the GB2312 code table, you can fill the rare Chinese characters into the remaining blank area of the GB2312 code table, and at the same time maintain the character set and Personally uniquely identifiable information (to avoid conflicts of rare characters in the blank space) achieves the purpose of encryption.

综上所述,本发明与常见加密技术相比,加密、解密基本都是字符查找的过程,具有实施简单、占服务器运算资源少、加密字符长度不受限制等特点,非常适合数据库的应用场景。To sum up, compared with the common encryption technology, the present invention is basically a character search process for encryption and decryption. It has the characteristics of simple implementation, less computing resources on the server, and unlimited encrypted character length. It is very suitable for database application scenarios. .

以上的所述乃是本发明的具体实施例及所运用的技术原理,若依本发明的构想所作的改变,其所产生的功能作用仍未超出说明书及附图所涵盖的精神时,仍应属本发明的保护范围。The above descriptions are the specific embodiments of the present invention and the technical principles used. If the changes made according to the conception of the present invention do not exceed the spirit covered by the description and accompanying drawings, they should still be Belong to the protection scope of the present invention.

Claims (9)

1. a kind of privacy data encryption method towards personal medical treatment & health data is it is characterised in that comprise the steps:
(1) create the two-dimensional array arry_2rd of m × n, dictionary code is filled to two-dimensional array;
(2) password of the account of personal medical treatment & health data is converted into ascii code, and numeric string is formed in the spelling of ascii code num_password;
(3) numeric string num_password is converted into the numeric string byte_password of 2 systems;
(4) extract the numeral of numeric string byte_password from left to right successively until digital extraction finishes, obtained according to extraction Numeral two-dimensional array arry_2rd cutting is the big subnumber group of two grades, and array big for subscript is sequentially inserted into subscript Before little array, obtain new two-dimensional array arry_2rd;
(5) extracting character from new two-dimensional array arry_2rd one by one line by line to finish until extracting, generating ciphertext dictionary arry_ 1rd;
(6) respectively the privacy information of personal medical treatment & health data is encrypted, the method for encryption is:
(6.1) printable character in ascii coding schedule is put into successively in the 10th area of gb2312 coding schedule clear area, by sky Wrongly written or mispronounced character symbol, newline, tab are put in the 11st area of clear area successively, generate amended gb2312 coding schedule;
(6.2) extract the character being related in privacy information plaintext successively from left to right, search this character gb2312 after the modification Area code in coding schedule and item, extract the character of correspondence position in ciphertext dictionary arry_1rd according to area code and item, will The corresponding character of area code is placed on the left side, and the corresponding character of item is placed on the right, and composition source word symbol corresponds to the ciphertext character string of two, Until privacy information is all changed finishing, ciphertext character is spliced into final ciphertext.
2. a kind of privacy data encryption method towards personal medical treatment & health data according to claim 1, its feature exists In: the dictionary code of described step (1) is all character sets as password, character during filling, dictionary code being comprised line by line by In the individual two-dimensional array arry_2rd being filled into m × n, after last character has been filled, sky is deposited in remaining array space Lattice accord with, wherein, the character number that m × n comprises more than dictionary code.
3. a kind of privacy data encryption method towards personal medical treatment & health data according to claim 1, its feature exists In: described step (4) according to extracting the side that two-dimensional array arry_2rd cutting is the big subnumber group of two grades by the numeral obtaining Method is as follows:
If (i) numeral be 0, along the x-axis direction by two-dimensional array arry_2rd from middle cutting be the big subnumber group of two grades;
(ii) if numeral be 1, along the y-axis direction by two-dimensional array arry_2rd from middle cutting be the big subnumber group of two grades.
4. a kind of privacy data encryption method towards personal medical treatment & health data according to claim 1, its feature exists In: the privacy information of described individual's medical treatment & health data includes name, ID (identity number) card No., telephone number, contact address, job note Position, login password information.
5. a kind of privacy data encryption method towards personal medical treatment & health data according to claim 1, its feature exists In: described step (5) when running into space character, is skipped space character and is taken off one when new two-dimensional array arry_2rd extracts character Position character.
6. a kind of decryption method of supporting privacy data encryption method as claimed in claim 1 is it is characterised in that include as follows Step:
1) obtain ciphertext dictionary arry_1rd;
2) extract the character in ciphertext from left to right successively, obtain area's code character and bit code character;
3) area's code character index and bit word are found respectively in ciphertext dictionary arry_1rd according to area's code character and bit code character Symbol index;
4) index in amended gb2312 coding schedule and search corresponding character according to the area's code index obtaining and bit code, until Character in ciphertext extracts conversion and finishes.
7. decryption method according to claim 6 it is characterised in that: the described method step obtaining ciphertext dictionary arry_1rd Rapid identical with obtaining ciphertext dictionary arry_1rd step in privacy data encryption method.
8. decryption method according to claim 6 it is characterised in that: described step 2) extract ciphertext in character method It is two characters of each extraction.
9. decryption method according to claim 6 it is characterised in that: described step 4) by the area code obtaining index and bit code Index searches corresponding character after Jia 1 respectively again in amended gb2312 coding schedule.
CN201610702632.1A 2016-08-19 2016-08-19 A kind of private data encryption and decryption method towards personal medical treatment & health data Active CN106357608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610702632.1A CN106357608B (en) 2016-08-19 2016-08-19 A kind of private data encryption and decryption method towards personal medical treatment & health data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610702632.1A CN106357608B (en) 2016-08-19 2016-08-19 A kind of private data encryption and decryption method towards personal medical treatment & health data

Publications (2)

Publication Number Publication Date
CN106357608A true CN106357608A (en) 2017-01-25
CN106357608B CN106357608B (en) 2019-05-24

Family

ID=57843730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610702632.1A Active CN106357608B (en) 2016-08-19 2016-08-19 A kind of private data encryption and decryption method towards personal medical treatment & health data

Country Status (1)

Country Link
CN (1) CN106357608B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481181A (en) * 2017-07-27 2017-12-15 银江股份有限公司 A kind of picture hidden method, restoring method and picture for being used to protect individual privacy hides system
CN107659399A (en) * 2017-10-09 2018-02-02 四川巧夺天工信息安全智能设备有限公司 It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key
CN108134799A (en) * 2018-01-18 2018-06-08 国网湖南省电力有限公司 Novel encipher-decipher method and its device
CN111899855A (en) * 2020-07-16 2020-11-06 武汉大学 A visualization construction method and platform for spatiotemporal aggregation of individual health and public health data
CN115567318A (en) * 2022-11-08 2023-01-03 广州市保伦电子有限公司 Password encryption and decryption method and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024695A3 (en) * 2003-09-03 2005-11-03 Agilent Technologies Inc Methods for encoding non-biological information on microarrays
CN105281894A (en) * 2015-11-25 2016-01-27 深圳供电局有限公司 Plaintext encryption method and system based on seven-order magic cube

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024695A3 (en) * 2003-09-03 2005-11-03 Agilent Technologies Inc Methods for encoding non-biological information on microarrays
CN105281894A (en) * 2015-11-25 2016-01-27 深圳供电局有限公司 Plaintext encryption method and system based on seven-order magic cube

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱雨: "面向托管数据查询的隐私保护技术及应用框架的研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481181A (en) * 2017-07-27 2017-12-15 银江股份有限公司 A kind of picture hidden method, restoring method and picture for being used to protect individual privacy hides system
CN107481181B (en) * 2017-07-27 2020-08-04 银江股份有限公司 A picture hiding method, restoration method and picture hiding system for protecting personal privacy
CN107659399A (en) * 2017-10-09 2018-02-02 四川巧夺天工信息安全智能设备有限公司 It is a kind of to be pretended, solved the method for camouflage to character based on not repeating key
CN108134799A (en) * 2018-01-18 2018-06-08 国网湖南省电力有限公司 Novel encipher-decipher method and its device
CN108134799B (en) * 2018-01-18 2021-06-22 国网湖南省电力有限公司 Novel coding and decoding method and device thereof
CN111899855A (en) * 2020-07-16 2020-11-06 武汉大学 A visualization construction method and platform for spatiotemporal aggregation of individual health and public health data
CN111899855B (en) * 2020-07-16 2024-04-26 武汉大学 Method and platform for constructing individual health and public health data space-time aggregation visualization
CN115567318A (en) * 2022-11-08 2023-01-03 广州市保伦电子有限公司 Password encryption and decryption method and terminal
CN115567318B (en) * 2022-11-08 2023-05-16 广东保伦电子股份有限公司 Password encryption and decryption method and terminal

Also Published As

Publication number Publication date
CN106357608B (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN110337649B (en) Method and system for dynamic symmetric searchable encryption with imperceptible search patterns
CN106610995B (en) Method, device and system for creating ciphertext index
US20180316491A1 (en) Fast format-preserving encryption for variable length data
CN106357608A (en) Method for encrypting and decrypting private data for personal healthcare data
CN105099652B (en) Data encryption, decryption method and device
CN102025482B (en) A Construction Method of Cryptography System (VGC) Based on Virtual Genome
CN111832056B (en) Method and system for generating two-dimensional code
CN111628858B (en) Encryption and decryption system and encryption and decryption method of network security algorithm
CN107609418A (en) Desensitization method, device, storage device and the computer equipment of text data
CN105959098A (en) Format-reserved encryption algorithm based on multi-segmented Feistel network
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN101335616B (en) Symmetric ciphering method having infinite cipher key space
CN104899517B (en) Phrase-based can search for symmetric encryption method
CN101394268A (en) Advanced Encryption System and Method Based on Generalized Information Domain
Zhou et al. Stereo matching using a neural network
Geetha et al. Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN112235104A (en) Data encryption transmission method, system, terminal and storage medium
CN107248915A (en) A kind of method for the data message dynamic encryption for preventing from being decrypted by violence
Vershinin et al. Associative steganography of text messages
CN115834163B (en) Method, device, equipment and storage medium for generating secret key of encrypted data
CN101364868B (en) Pseudo-random code generator and its generation method based on generalized information domain
Bazli et al. Data encryption using bio-molecular information
CN115580489A (en) Data transmission method, device, equipment and storage medium
CN107135213A (en) Data communications method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 310012 1st floor, building 1, 223 Yile Road, Hangzhou City, Zhejiang Province

Patentee after: Yinjiang Technology Co.,Ltd.

Address before: 310012 1st floor, building 1, 223 Yile Road, Hangzhou City, Zhejiang Province

Patentee before: ENJOYOR Co.,Ltd.

CP01 Change in the name or title of a patent holder
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170125

Assignee: Hangzhou Yinjiang Intelligent Health Group Co.,Ltd.

Assignor: Yinjiang Technology Co.,Ltd.

Contract record no.: X2024980042646

Denomination of invention: A privacy data encryption and decryption method for personal medical and health data

Granted publication date: 20190524

License type: Common License

Record date: 20250102

EE01 Entry into force of recordation of patent licensing contract