Nothing Special   »   [go: up one dir, main page]

CN114221783A - Data selective encryption and decryption system - Google Patents

Data selective encryption and decryption system Download PDF

Info

Publication number
CN114221783A
CN114221783A CN202111334937.9A CN202111334937A CN114221783A CN 114221783 A CN114221783 A CN 114221783A CN 202111334937 A CN202111334937 A CN 202111334937A CN 114221783 A CN114221783 A CN 114221783A
Authority
CN
China
Prior art keywords
data
sending
sent
decryption
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111334937.9A
Other languages
Chinese (zh)
Other versions
CN114221783B (en
Inventor
吴剑锋
常译文
李传智
陈义松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tiankuan Technology Co ltd
Original Assignee
Hangzhou Tiankuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tiankuan Technology Co ltd filed Critical Hangzhou Tiankuan Technology Co ltd
Priority to CN202111334937.9A priority Critical patent/CN114221783B/en
Publication of CN114221783A publication Critical patent/CN114221783A/en
Application granted granted Critical
Publication of CN114221783B publication Critical patent/CN114221783B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a data selective encryption and decryption system, which comprises a sending end, a receiving end and a transmission middle end, wherein the sending end is used for sending data; the method comprises the steps that corresponding data to be sent are obtained through a sending end, and data disassembly is carried out on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group; and then, after the receiving end is used for decrypting the sending data set to obtain decrypted data, verifying the decrypted data to obtain the standard decrypted data. Through the encryption and decryption mode provided by the application, the data can be reasonably encrypted, and the data can be verified.

Description

Data selective encryption and decryption system
Technical Field
The invention belongs to the field of data encryption, relates to a data encryption technology, and particularly relates to a data selective encryption and decryption system.
Background
Patent publication No. CN104871477A discloses a proxy re-encryption method for implementing functional encryption. The decryption apparatus 300 transmits, to the re-encryption apparatus 400, a decryption key k × rk obtained by converting a decryption key k × set with one of the attribute information x and v corresponding to each other using the conversion information W1, and encrypted conversion information Ψ rk obtained by setting one of the attribute information x 'and v' corresponding to each other and encrypting the conversion information W1. The re-encryption device 400 sets, as re-encrypted ciphertext CT, ciphertext crenc obtained by setting at least one of additional information Η and θ corresponding to each other in ciphertext cenc in which the other attribute information x and v is set, and decryption key k renc obtained by setting at least the other additional information Η and θ in decryption key k r.
However, for the decryption system, the encryption mode is too complicated, a simple and effective encryption mode is not available, and the decryption result can be automatically verified; based on this, a solution is provided.
Disclosure of Invention
The invention aims to provide a data selective encryption and decryption system.
The purpose of the invention can be realized by the following technical scheme:
a data selection encryption and decryption system is characterized by comprising a sending end, a receiving end and a transmission middle end;
the sending end is used for acquiring corresponding data to be sent and performing data disassembly on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group;
the transmission middle end is used for transmitting the sending data group to the receiving end;
the receiving end is used for decrypting the sending data set to obtain decrypted data, and then verifying the decrypted data to obtain the standard decrypted data.
Further, the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data collection selection module is used for transmitting data to be transmitted to the data analysis module, and the data analysis module is used for performing data disassembly on the data to be transmitted to obtain single characters Fi of a selection collection and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, the thread encryption module is used for performing thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi, and the thread encryption processing specifically comprises the following steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: and combining the invisible sending data and the updated sending data to obtain a sending data group.
Further, the specific process of data disassembly is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: marking each text within the check set as Fi, i-1,.
Step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi;
step six: and obtaining the single characters Fi of the check set and the corresponding character strokes Bi thereof.
Further, in step S4, if the initial letters are the same, the corresponding sequential values are sequentially obtained according to the second letter, and if the initial letters are the same;
if all letters are the same, the column values are taken from one to four according to the corresponding tones, and if the letters are the same or the pronunciation is completely the same, the corresponding two or more single words are marked with the same column values.
Furthermore, the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking according to the character habit of the decrypted data;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
Further, the specific way of verifying the decrypted data in step SS8 is as follows:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption to correct the error statements.
The invention has the beneficial effects that:
the invention provides data encryption and decryption data, which is characterized in that corresponding data to be sent are obtained through a sending end, and data disassembly is carried out on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group; and then, after the receiving end is used for decrypting the sending data set to obtain decrypted data, verifying the decrypted data to obtain the standard decrypted data.
Through the encryption and decryption mode provided by the application, the data can be reasonably encrypted, and the data can be verified.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
Detailed Description
As shown in fig. 1, a data selective encryption and decryption system includes a sending end, a receiving end and a transmission middle end;
the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data set selection module is used for transmitting data to be transmitted to the data analysis module, the data analysis module is used for performing data disassembly on the data to be transmitted, and the specific data disassembly process is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: to facilitate distinguishing each text within the check set, it is labeled Fi, i 1,.. and n, denoted as the corresponding text;
step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi; the specific values corresponding to the stroke number are all expressed by two digits, and if the stroke number is 8, the corresponding stroke number is 08;
step six: obtaining single characters Fi of the check set and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, the thread encryption module is used for performing thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi, and the thread encryption processing specifically comprises the following steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
if the initial letters are the same in the process, sequentially taking corresponding sequence values according to the second letter, and if the initial letters are the same;
if all letters are the same in the step, sequentially taking the column values from one to four according to the corresponding tones, and if the letters are the same or have the same pronunciation, marking the same column values on two or more corresponding single words;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: combining the invisible sending data and the updated sending data to obtain a sending data group;
transmitting the sending data set to a receiving end by means of a transmission middle end;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking and replacing the wrong number according to the character habit of the decrypted data; the error number is referred to as homophone, and there are three ways;
the first method is to adopt manual review, and the second method is realized by document team in the prior art, which is not described in detail in the prior art;
of course, a third method provided by the present application may also be adopted, specifically:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption and corrects error statements;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. A data selection encryption and decryption system is characterized by comprising a sending end, a receiving end and a transmission middle end;
the sending end is used for acquiring corresponding data to be sent and performing data disassembly on the data to be sent to obtain single characters Fi of a check set and corresponding character strokes Bi of the single characters Fi; then, thread encryption processing is carried out on the data to be sent, the single characters Fi and the character strokes Bi to obtain invisible sending data and update sending data combination to obtain a sending data group;
the transmission middle end is used for transmitting the sending data group to the receiving end;
the receiving end is used for decrypting the sending data set to obtain decrypted data, and then verifying the decrypted data to obtain the standard decrypted data.
2. The system for selective data encryption and decryption according to claim 1, wherein the sending end comprises a data set selection module, a data analysis module and a thread encryption module;
the data set selection module is used for collecting data to be sent, and the data to be sent is target character data required to be sent by a user; the data collection selection module is used for transmitting data to be transmitted to the data analysis module, and the data analysis module is used for performing data disassembly on the data to be transmitted to obtain single characters Fi of a selection collection and corresponding character strokes Bi thereof;
the data set selection module is used for transmitting the data to be transmitted, the check sets and the single words Fi and the word strokes Bi of the check sets to the thread encryption module, and the thread encryption module is used for conducting thread encryption processing on the data to be transmitted, the single words Fi and the word strokes Bi to obtain a transmission data set combining invisible transmission data and updated transmission data.
3. The system for selective data encryption and decryption according to claim 2, wherein the specific process of data disassembly is as follows:
the method comprises the following steps: acquiring data to be sent;
step two: disassembling data to be transmitted into a plurality of independent characters to obtain a character set;
step three: then deleting repeated characters from the character set, wherein each character only appears once to obtain a check set;
step four: marking each text within the check set as Fi, i-1,.
Step five: acquiring stroke numbers of all characters in all the check sets, and marking the stroke numbers as Bi, i is 1, n, wherein Bi is in one-to-one correspondence with Fi;
step six: and obtaining the single characters Fi of the check set and the corresponding character strokes Bi thereof.
4. A data selective encryption/decryption system according to claim 2,
the thread encryption processing comprises the following specific steps:
s1: acquiring corresponding data to be sent, single characters Fi and character strokes Bi;
s2: then acquiring all the single characters Fi with the same character stroke Bi value, and marking the same characters as same stroke groups; obtaining a plurality of same-division groups;
s3: optionally grouping together to obtain all the single characters in the single characters and the corresponding character strokes;
s4: then obtaining pinyin of all single characters, sequentially obtaining first letters, sequencing according to the sequence of 26 English characters, giving corresponding numbers according to the sequence, marking the numbers as column values, and taking the column values according to two digits as usual;
s5: then, selecting the same dividing group, repeating the steps S3-S5, finishing the processing of all the same dividing groups, and obtaining the column values of all the same dividing groups;
s6: then combining the corresponding character strokes Bi with the corresponding column values to obtain a representative numerical value;
s7: then acquiring corresponding data to be sent;
s8: sequentially arranging the representative numerical values according to the sequence of the corresponding data to be sent, reserving all punctuations of the data to be sent, and simultaneously inserting distinguishing symbols among all the representative numerical values to obtain invisible sending data, wherein the distinguishing symbols are preset symbols of corresponding managers;
s9: then, acquiring a check set, randomly disordering all the check sets to form new sending data, and obtaining updated sending data;
s10: and combining the invisible sending data and the updated sending data to obtain a sending data group.
5. The system for selective data encryption and decryption according to claim 1, wherein the receiving end comprises a forwarding module, a privacy adjusting terminal and a decryption unit;
a forwarding module at a receiving end receives a sending data group transmitted by a transmission middle end and transmits the sending data group to a decryption unit, the decryption unit decrypts the sending data group by combining a privacy adjusting terminal, the privacy adjusting terminal only exists in designated equipment, and non-designated equipment cannot be called when acquiring the privacy adjusting terminal; the specific decryption process is as follows:
SS 1: acquiring invisible sending data in a sending data group and updating the sending data group;
SS 2: then acquiring stroke numbers of all updating sending data groups;
SS 3: spacing the invisible sending data according to the distinguishing symbol in the invisible sending data;
SS 4: data are sent in a one-to-one correspondence and invisible mode according to the stroke number;
SS 5: correspondingly selecting the strokes with the same number according to the last two digits, wherein the strokes can be realized according to the encryption reversal principle, and specific steps are omitted for the sake of no further description;
SS 6: if the latter two numerical values are the same, corresponding to any one of the single characters in the updating sending data group at random;
SS 7: obtaining decrypted data;
SS 8: automatically checking according to the character habit of the decrypted data;
SS 9: obtaining approved standard decryption data;
the decryption unit automatically displays the corresponding encrypted data.
6. The system for selective encryption and decryption of data according to claim 5, wherein the specific way to verify the decrypted data in step SS8 is as follows:
when data to be sent with the same column value is processed, corresponding correct and complete statements are automatically marked, the statements are marked as addendum statements, and the addendum statements are sent to a receiving end along with a sending data set;
then, the decryption unit at the receiving end automatically compares the appendix statements during decryption to correct the error statements.
7. A data selective encryption/decryption system according to claim 4,
if the first letters appear to be the same in step S4, the corresponding order values are sequentially taken according to the second letter, and if they are also the same.
8. The system for selective encryption and decryption of data according to claim 4, wherein in step S4: if all letters are the same, the column values are taken from one to four according to the corresponding tones, and if the letters are the same or the pronunciation is completely the same, the corresponding two or more single words are marked with the same column values.
CN202111334937.9A 2021-11-11 2021-11-11 Data selective encryption and decryption system Active CN114221783B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111334937.9A CN114221783B (en) 2021-11-11 2021-11-11 Data selective encryption and decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111334937.9A CN114221783B (en) 2021-11-11 2021-11-11 Data selective encryption and decryption system

Publications (2)

Publication Number Publication Date
CN114221783A true CN114221783A (en) 2022-03-22
CN114221783B CN114221783B (en) 2023-06-02

Family

ID=80696984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111334937.9A Active CN114221783B (en) 2021-11-11 2021-11-11 Data selective encryption and decryption system

Country Status (1)

Country Link
CN (1) CN114221783B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114827226A (en) * 2022-06-30 2022-07-29 深圳市智联物联科技有限公司 Remote management method for industrial control equipment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139339A1 (en) * 2002-11-26 2004-07-15 Matsushita Electric Industrial Co., Ltd. Data encryption and decryption method and apparatus
CA2468351A1 (en) * 2004-06-16 2004-08-28 Sxip Networks Inc. Distributed hierarchical identity management system authentication mechanisms
CN1933391A (en) * 2005-09-16 2007-03-21 北京书生国际信息技术有限公司 Hidden code inserting and detecting method
US20080121441A1 (en) * 2006-05-12 2008-05-29 Velosum, Inc. Systems and methods for mutually exclusive options on a paper form for use with a digital pen
WO2010016065A1 (en) * 2008-08-08 2010-02-11 Moonsun Io Ltd. Method and device of stroke based user input
CN104680924A (en) * 2013-11-27 2015-06-03 江苏华御信息技术有限公司 Pictographic character encryption method
CN106575166A (en) * 2014-08-11 2017-04-19 张锐 Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing
US20180212960A1 (en) * 2017-01-25 2018-07-26 Ca, Inc. Secure biometric authentication with client-side feature extraction
CN108989287A (en) * 2018-06-13 2018-12-11 平安科技(深圳)有限公司 encryption method, device, terminal device and storage medium
CN110334527A (en) * 2019-05-31 2019-10-15 范玉明 A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet
CN110347723A (en) * 2019-07-12 2019-10-18 税友软件集团股份有限公司 A kind of data query method, system and electronic equipment and storage medium
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN111800387A (en) * 2020-06-09 2020-10-20 刘春燕 Intelligent encryption transmission system for computer information data
CN113346999A (en) * 2021-08-09 2021-09-03 国网浙江省电力有限公司杭州供电公司 Splitting encryption-based brain central system
CN113378202A (en) * 2021-06-29 2021-09-10 湖南盈聚信息技术有限公司 Multi-dimensional data security storage system based on big data
CN113595674A (en) * 2021-07-26 2021-11-02 安徽博格韦尔电气股份有限公司 Electronic information safety transmission system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139339A1 (en) * 2002-11-26 2004-07-15 Matsushita Electric Industrial Co., Ltd. Data encryption and decryption method and apparatus
CA2468351A1 (en) * 2004-06-16 2004-08-28 Sxip Networks Inc. Distributed hierarchical identity management system authentication mechanisms
CN1933391A (en) * 2005-09-16 2007-03-21 北京书生国际信息技术有限公司 Hidden code inserting and detecting method
US20080121441A1 (en) * 2006-05-12 2008-05-29 Velosum, Inc. Systems and methods for mutually exclusive options on a paper form for use with a digital pen
WO2010016065A1 (en) * 2008-08-08 2010-02-11 Moonsun Io Ltd. Method and device of stroke based user input
CN104680924A (en) * 2013-11-27 2015-06-03 江苏华御信息技术有限公司 Pictographic character encryption method
CN106575166A (en) * 2014-08-11 2017-04-19 张锐 Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing
US20180212960A1 (en) * 2017-01-25 2018-07-26 Ca, Inc. Secure biometric authentication with client-side feature extraction
CN108989287A (en) * 2018-06-13 2018-12-11 平安科技(深圳)有限公司 encryption method, device, terminal device and storage medium
CN110334527A (en) * 2019-05-31 2019-10-15 范玉明 A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet
CN110347723A (en) * 2019-07-12 2019-10-18 税友软件集团股份有限公司 A kind of data query method, system and electronic equipment and storage medium
CN110650148A (en) * 2019-09-30 2020-01-03 广西科技大学 Information security transmission system based on random encryption
CN111800387A (en) * 2020-06-09 2020-10-20 刘春燕 Intelligent encryption transmission system for computer information data
CN113378202A (en) * 2021-06-29 2021-09-10 湖南盈聚信息技术有限公司 Multi-dimensional data security storage system based on big data
CN113595674A (en) * 2021-07-26 2021-11-02 安徽博格韦尔电气股份有限公司 Electronic information safety transmission system
CN113346999A (en) * 2021-08-09 2021-09-03 国网浙江省电力有限公司杭州供电公司 Splitting encryption-based brain central system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
姜文超;林德熙;郭楚谋;武继刚;孙傲冰;: "加密强度可定制的新型文本加解密算法", 计算机科学与探索, no. 09 *
朱倩;程显毅;丁;高飞;: "基于自然语言处理技术的网络博客版权保护双水印算法", 南京大学学报(自然科学), no. 02 *
李新: "密文数据库系统的设计", 计算机工程与应用, no. 32 *
王朝阳;张远;: "单表代替密码技术在表意文字加密中的应用――应用动态变化的文字映射表", 科技创新与应用, no. 36 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114827226A (en) * 2022-06-30 2022-07-29 深圳市智联物联科技有限公司 Remote management method for industrial control equipment

Also Published As

Publication number Publication date
CN114221783B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN102025482B (en) Construction method of virtual genome-based cryptosystem (VGC)
CN105100085B (en) A kind of method and apparatus that information is encrypted and decrypted
CN110635914B (en) Weak password detection method
CN106100841B (en) A kind of data encryption system and method based on molecule encryption technology
WO2016153430A1 (en) Method of obfuscating data
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN115842621B (en) Intelligent medical system based on big data and cloud edge cooperation
CN114861204B (en) Big data information safe storage encryption system
US20170155503A1 (en) Encryption system and method based on biometric technology
CN108418683A (en) A kind of carrier-free text steganography method based on feature of Chinese characters structure
Hamad Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data.
CN118300672B (en) Beidou satellite-based data transmission method and system
CN114221783A (en) Data selective encryption and decryption system
JP5689826B2 (en) Secret calculation system, encryption apparatus, secret calculation apparatus and method, program
Bhattacharyya et al. Text steganography: a novel approach
CN114500035B (en) Data encryption system based on service data sharing cloud platform
García et al. Communication through chaotic map systems
CN117596346A (en) Cloud data encryption transmission method and device
Arboledas Brihuega A new character-level encryption algorithm: How to implement cryptography in an ICT classroom
CN108809516A (en) A kind of high security coding-decoding method of format data desensitization
Al-Sabaawi Cryptanalysis of Vigenère cipher: method implementation
Antal et al. The first Czechoslovak cipher machine
Al-Sabaawi Cryptanalysis of Classic Ciphers: Methods Implementation Survey
Lasry Analysis of a late 19th century french cipher created by Major Josse
CN110351289A (en) The method and device of data encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant