Method for encrypting format-preserved numeric type personally identifiable information

A technology for identifying information and encryption methods, which is applied in the field of encryption of numerical personal identification information, and can solve problems such as corrupted data formats and data that cannot be stored

Inactive Publication Date: 2014-02-19
NANKAI UNIV +1
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the traditional encryption algorithm will destroy the format of the data, so that the encrypted data cannot be stored in the original database or node, and provide an encryption method for numerical personal identification information that retains the format

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting format-preserved numeric type personally identifiable information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Numerical personal identification information includes ID card number, bank card number, etc. The present invention takes ID card number as an example to explain in detail the encryption method of the reserved format.

[0043] 1. Encryption algorithm

[0044] First, divide a legal 18-digit ID card number into six parts: I={I 1 , I 2 , I 3 , I 4 , I 5 , I 6 }, respectively represent the area code, birth year, birth month, date of birth, random number and check code. Among them, the length of each part is: |I 1 |=6, |I 2 |=4, |I 3 |=2, |I 4 |=2, |I 5 |=3, |I 6 |=1; the value range of each part is: I 1 ={0, …, 999999}, I 2 ={1900, …, 2050}, I 3 ={1, …, 12}, I 4 ={1, …, 31}, I 5 ={1, …, 999}, I 6 ={1… 9, ‘X’}; where I 6 The value of can be obtained by using the check code operation on the first five parts.

[0045] Use input = i 1 || i 2 || i 3 || i 4 || i 5 Represents a legal ID number, where: i 1 ∈I 1 , I 2 ∈I 2 , I 3 ∈I 3 , I 4 ∈I 4 , I 5 ∈I 5 . In order to ensure the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting format-preserved numeric type personally identifiable information (such as ID numbers and bank card numbers). The encryption purpose is achieved on the premise that original formats are kept unchanged. The method comprises the steps of first dividing the personally identifiable information into different data segments according to characteristics of the information and describing element sets of the segments through different integer finite fields; then connecting elements of the segments and inputting the elements into a Feistel network; finally outputting cryptograph data the same as original data in format under the effects of user-defined pseudo-random functions and modulo addition operation and modulo subtraction operation based on specified secret keys. By adopting the method, the possibility that encryption protection is performed on the numeric type personally identifiable information in a database application system is provided.

Description

Technical field [0001] The present invention is a data encryption field, which involves a encryption method for a numerical type of personal identification information that retains formats. Background technique [0002] With the rapid development of the Internet, more and more invasion methods have caused many sensitive data stored in nodes and databases to be stolen. The fundamental reason is that their storage of these sensitive data still uses clear ways, and encryption is an enhanced enhancementThe most effective way to store sensitive data security.However, traditional encryption algorithms, such as AES, 3DES, etc., will destroy the format of the data, so that the encrypted data cannot be stored in the original database or node, and it will destroy the function of the existing business system.Numerical personal identification information, including ID numbers, bank card numbers, etc., is a very important sensitive data. It has special format requirements. How to encrypt thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 刘哲理贾春福李进
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products