CN114221783A - Data selective encryption and decryption system - Google Patents
Data selective encryption and decryption system Download PDFInfo
- Publication number
- CN114221783A CN114221783A CN202111334937.9A CN202111334937A CN114221783A CN 114221783 A CN114221783 A CN 114221783A CN 202111334937 A CN202111334937 A CN 202111334937A CN 114221783 A CN114221783 A CN 114221783A
- Authority
- CN
- China
- Prior art keywords
- data
- sending
- sent
- decryption
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a data selective encryption and decryption system, which comprises a sending end, a receiving end and a transmission middle end, wherein the sending end is used for sending data; the method comprises the steps that corresponding data to be sent are obtained through a sending end, and data disassembly is carried out on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group; and then, after the receiving end is used for decrypting the sending data set to obtain decrypted data, verifying the decrypted data to obtain the standard decrypted data. Through the encryption and decryption mode provided by the application, the data can be reasonably encrypted, and the data can be verified.
Description
Technical Field
The invention belongs to the field of data encryption, relates to a data encryption technology, and particularly relates to a data selective encryption and decryption system.
Background
Patent publication No. CN104871477A discloses a proxy re-encryption method for implementing functional encryption. The decryption apparatus 300 transmits, to the re-encryption apparatus 400, a decryption key k × rk obtained by converting a decryption key k × set with one of the attribute information x and v corresponding to each other using the conversion information W1, and encrypted conversion information Ψ rk obtained by setting one of the attribute information x 'and v' corresponding to each other and encrypting the conversion information W1. The re-encryption device 400 sets, as re-encrypted ciphertext CT, ciphertext crenc obtained by setting at least one of additional information Η and θ corresponding to each other in ciphertext cenc in which the other attribute information x and v is set, and decryption key k renc obtained by setting at least the other additional information Η and θ in decryption key k r.
However, for the decryption system, the encryption mode is too complicated, a simple and effective encryption mode is not available, and the decryption result can be automatically verified; based on this, a solution is provided.
Disclosure of Invention
The invention aims to provide a data selective encryption and decryption system.
The purpose of the invention can be realized by the following technical scheme:
a data selection encryption and decryption system is characterized by comprising a sending end, a receiving end and a transmission middle end;
the sending end is used for acquiring corresponding data to be sent and performing data disassembly on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group;
the transmission middle end is used for transmitting the sending data group to the receiving end;
the receiving end is used for decrypting the sending data set to obtain decrypted data, and then verifying the decrypted data to obtain the standard decrypted data.
Further, the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data collection selection module is used for transmitting data to be transmitted to the data analysis module, and the data analysis module is used for performing data disassembly on the data to be transmitted to obtain single characters Fi of a selection collection and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, the thread encryption module is used for performing thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi, and the thread encryption processing specifically comprises the following steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: and combining the invisible sending data and the updated sending data to obtain a sending data group.
Further, the specific process of data disassembly is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: marking each text within the check set as Fi, i-1,.
Step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi;
step six: and obtaining the single characters Fi of the check set and the corresponding character strokes Bi thereof.
Further, in step S4, if the initial letters are the same, the corresponding sequential values are sequentially obtained according to the second letter, and if the initial letters are the same;
if all letters are the same, the column values are taken from one to four according to the corresponding tones, and if the letters are the same or the pronunciation is completely the same, the corresponding two or more single words are marked with the same column values.
Furthermore, the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking according to the character habit of the decrypted data;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
Further, the specific way of verifying the decrypted data in step SS8 is as follows:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption to correct the error statements.
The invention has the beneficial effects that:
the invention provides data encryption and decryption data, which is characterized in that corresponding data to be sent are obtained through a sending end, and data disassembly is carried out on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group; and then, after the receiving end is used for decrypting the sending data set to obtain decrypted data, verifying the decrypted data to obtain the standard decrypted data.
Through the encryption and decryption mode provided by the application, the data can be reasonably encrypted, and the data can be verified.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, a data selective encryption and decryption system includes a sending end, a receiving end and a transmission middle end;
the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data set selection module is used for transmitting data to be transmitted to the data analysis module, the data analysis module is used for performing data disassembly on the data to be transmitted, and the specific data disassembly process is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: to facilitate distinguishing each text within the check set, it is labeled Fi, i 1,.. and n, denoted as the corresponding text;
step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi; the specific values corresponding to the stroke number are all expressed by two digits, and if the stroke number is 8, the corresponding stroke number is 08;
step six: obtaining single characters Fi of the check set and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, the thread encryption module is used for performing thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi, and the thread encryption processing specifically comprises the following steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
if the initial letters are the same in the process, sequentially taking corresponding sequence values according to the second letter, and if the initial letters are the same;
if all letters are the same in the step, sequentially taking the column values from one to four according to the corresponding tones, and if the letters are the same or have the same pronunciation, marking the same column values on two or more corresponding single words;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: combining the invisible sending data and the updated sending data to obtain a sending data group;
transmitting the sending data set to a receiving end by means of a transmission middle end;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking and replacing the wrong number according to the character habit of the decrypted data; the error number is referred to as homophone, and there are three ways;
the first method is to adopt manual review, and the second method is realized by document team in the prior art, which is not described in detail in the prior art;
of course, a third method provided by the present application may also be adopted, specifically:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption and corrects error statements;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (8)
1. A data selection encryption and decryption system is characterized by comprising a sending end, a receiving end and a transmission middle end;
the sending end is used for acquiring corresponding data to be sent and performing data disassembly on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group;
the transmission middle end is used for transmitting the sending data group to the receiving end;
the receiving end is used for decrypting the sending data set to obtain decrypted data, and then verifying the decrypted data to obtain the standard decrypted data.
2. The system for selective data encryption and decryption according to claim 1, wherein the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data collection selection module is used for transmitting data to be transmitted to the data analysis module, and the data analysis module is used for performing data disassembly on the data to be transmitted to obtain single characters Fi of a selection collection and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, and the thread encryption module is used for conducting thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi to obtain a transmission data set combining invisible transmission data and updated transmission data.
3. The system for selective data encryption and decryption according to claim 2, wherein the specific process of data disassembly is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: marking each text within the check set as Fi, i-1,.
Step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi;
step six: and obtaining the single characters Fi of the check set and the corresponding character strokes Bi thereof.
4. A data selective encryption/decryption system according to claim 2,
the thread encryption processing comprises the following specific steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: and combining the invisible sending data and the updated sending data to obtain a sending data group.
5. The system for selective data encryption and decryption according to claim 1, wherein the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking according to the character habit of the decrypted data;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
6. The system for selective encryption and decryption of data according to claim 5, wherein the specific way to verify the decrypted data in step SS8 is as follows:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption to correct the error statements.
7. A data selective encryption/decryption system according to claim 4,
if the first letters appear to be the same in step S4, the corresponding order values are sequentially taken according to the second letter, and if they are also the same.
8. The system for selective encryption and decryption of data according to claim 4, wherein in step S4: if all letters are the same, the column values are taken from one to four according to the corresponding tones, and if the letters are the same or the pronunciation is completely the same, the corresponding two or more single words are marked with the same column values.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111334937.9A CN114221783B (en) | 2021-11-11 | 2021-11-11 | Data selective encryption and decryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111334937.9A CN114221783B (en) | 2021-11-11 | 2021-11-11 | Data selective encryption and decryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114221783A true CN114221783A (en) | 2022-03-22 |
CN114221783B CN114221783B (en) | 2023-06-02 |
Family
ID=80696984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111334937.9A Active CN114221783B (en) | 2021-11-11 | 2021-11-11 | Data selective encryption and decryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114221783B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827226A (en) * | 2022-06-30 | 2022-07-29 | 深圳市智联物联科技有限公司 | Remote management method for industrial control equipment |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040139339A1 (en) * | 2002-11-26 | 2004-07-15 | Matsushita Electric Industrial Co., Ltd. | Data encryption and decryption method and apparatus |
CA2468351A1 (en) * | 2004-06-16 | 2004-08-28 | Sxip Networks Inc. | Distributed hierarchical identity management system authentication mechanisms |
CN1933391A (en) * | 2005-09-16 | 2007-03-21 | 北京书生国际信息技术有限公司 | Hidden code inserting and detecting method |
US20080121441A1 (en) * | 2006-05-12 | 2008-05-29 | Velosum, Inc. | Systems and methods for mutually exclusive options on a paper form for use with a digital pen |
WO2010016065A1 (en) * | 2008-08-08 | 2010-02-11 | Moonsun Io Ltd. | Method and device of stroke based user input |
CN104680924A (en) * | 2013-11-27 | 2015-06-03 | 江苏华御信息技术有限公司 | Pictographic character encryption method |
CN106575166A (en) * | 2014-08-11 | 2017-04-19 | 张锐 | Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing |
US20180212960A1 (en) * | 2017-01-25 | 2018-07-26 | Ca, Inc. | Secure biometric authentication with client-side feature extraction |
CN108989287A (en) * | 2018-06-13 | 2018-12-11 | 平安科技(深圳)有限公司 | encryption method, device, terminal device and storage medium |
CN110334527A (en) * | 2019-05-31 | 2019-10-15 | 范玉明 | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet |
CN110347723A (en) * | 2019-07-12 | 2019-10-18 | 税友软件集团股份有限公司 | A kind of data query method, system and electronic equipment and storage medium |
CN110650148A (en) * | 2019-09-30 | 2020-01-03 | 广西科技大学 | Information security transmission system based on random encryption |
CN111800387A (en) * | 2020-06-09 | 2020-10-20 | 刘春燕 | Intelligent encryption transmission system for computer information data |
CN113346999A (en) * | 2021-08-09 | 2021-09-03 | 国网浙江省电力有限公司杭州供电公司 | Splitting encryption-based brain central system |
CN113378202A (en) * | 2021-06-29 | 2021-09-10 | 湖南盈聚信息技术有限公司 | Multi-dimensional data security storage system based on big data |
CN113595674A (en) * | 2021-07-26 | 2021-11-02 | 安徽博格韦尔电气股份有限公司 | Electronic information safety transmission system |
-
2021
- 2021-11-11 CN CN202111334937.9A patent/CN114221783B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040139339A1 (en) * | 2002-11-26 | 2004-07-15 | Matsushita Electric Industrial Co., Ltd. | Data encryption and decryption method and apparatus |
CA2468351A1 (en) * | 2004-06-16 | 2004-08-28 | Sxip Networks Inc. | Distributed hierarchical identity management system authentication mechanisms |
CN1933391A (en) * | 2005-09-16 | 2007-03-21 | 北京书生国际信息技术有限公司 | Hidden code inserting and detecting method |
US20080121441A1 (en) * | 2006-05-12 | 2008-05-29 | Velosum, Inc. | Systems and methods for mutually exclusive options on a paper form for use with a digital pen |
WO2010016065A1 (en) * | 2008-08-08 | 2010-02-11 | Moonsun Io Ltd. | Method and device of stroke based user input |
CN104680924A (en) * | 2013-11-27 | 2015-06-03 | 江苏华御信息技术有限公司 | Pictographic character encryption method |
CN106575166A (en) * | 2014-08-11 | 2017-04-19 | 张锐 | Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing |
US20180212960A1 (en) * | 2017-01-25 | 2018-07-26 | Ca, Inc. | Secure biometric authentication with client-side feature extraction |
CN108989287A (en) * | 2018-06-13 | 2018-12-11 | 平安科技(深圳)有限公司 | encryption method, device, terminal device and storage medium |
CN110334527A (en) * | 2019-05-31 | 2019-10-15 | 范玉明 | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet |
CN110347723A (en) * | 2019-07-12 | 2019-10-18 | 税友软件集团股份有限公司 | A kind of data query method, system and electronic equipment and storage medium |
CN110650148A (en) * | 2019-09-30 | 2020-01-03 | 广西科技大学 | Information security transmission system based on random encryption |
CN111800387A (en) * | 2020-06-09 | 2020-10-20 | 刘春燕 | Intelligent encryption transmission system for computer information data |
CN113378202A (en) * | 2021-06-29 | 2021-09-10 | 湖南盈聚信息技术有限公司 | Multi-dimensional data security storage system based on big data |
CN113595674A (en) * | 2021-07-26 | 2021-11-02 | 安徽博格韦尔电气股份有限公司 | Electronic information safety transmission system |
CN113346999A (en) * | 2021-08-09 | 2021-09-03 | 国网浙江省电力有限公司杭州供电公司 | Splitting encryption-based brain central system |
Non-Patent Citations (4)
Title |
---|
姜文超;林德熙;郭楚谋;武继刚;孙傲冰;: "加密强度可定制的新型文本加解密算法", 计算机科学与探索, no. 09 * |
朱倩;程显毅;丁;高飞;: "基于自然语言处理技术的网络博客版权保护双水印算法", 南京大学学报(自然科学), no. 02 * |
李新: "密文数据库系统的设计", 计算机工程与应用, no. 32 * |
王朝阳;张远;: "单表代替密码技术在表意文字加密中的应用――应用动态变化的文字映射表", 科技创新与应用, no. 36 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827226A (en) * | 2022-06-30 | 2022-07-29 | 深圳市智联物联科技有限公司 | Remote management method for industrial control equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114221783B (en) | 2023-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102025482B (en) | Construction method of virtual genome-based cryptosystem (VGC) | |
CN105100085B (en) | A kind of method and apparatus that information is encrypted and decrypted | |
CN110635914B (en) | Weak password detection method | |
CN106100841B (en) | A kind of data encryption system and method based on molecule encryption technology | |
WO2016153430A1 (en) | Method of obfuscating data | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN115842621B (en) | Intelligent medical system based on big data and cloud edge cooperation | |
CN114861204B (en) | Big data information safe storage encryption system | |
US20170155503A1 (en) | Encryption system and method based on biometric technology | |
CN108418683A (en) | A kind of carrier-free text steganography method based on feature of Chinese characters structure | |
Hamad | Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data. | |
CN118300672B (en) | Beidou satellite-based data transmission method and system | |
CN114221783A (en) | Data selective encryption and decryption system | |
JP5689826B2 (en) | Secret calculation system, encryption apparatus, secret calculation apparatus and method, program | |
Bhattacharyya et al. | Text steganography: a novel approach | |
CN114500035B (en) | Data encryption system based on service data sharing cloud platform | |
García et al. | Communication through chaotic map systems | |
CN117596346A (en) | Cloud data encryption transmission method and device | |
Arboledas Brihuega | A new character-level encryption algorithm: How to implement cryptography in an ICT classroom | |
CN108809516A (en) | A kind of high security coding-decoding method of format data desensitization | |
Al-Sabaawi | Cryptanalysis of Vigenère cipher: method implementation | |
Antal et al. | The first Czechoslovak cipher machine | |
Al-Sabaawi | Cryptanalysis of Classic Ciphers: Methods Implementation Survey | |
Lasry | Analysis of a late 19th century french cipher created by Major Josse | |
CN110351289A (en) | The method and device of data encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |