Improved high-security big data hiding method
A high-security, big-data technology, applied in the high-security big data hiding field, can solve problems such as big data storage loopholes and illegal loss, and achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0009] This specific implementation mode adopts the following technical scheme: its hiding method is: after first passing the identity verification, a large amount of data is uploaded to the server database; then the data is randomly divided into N sections, and the data information content of each section is not equal, and then Each segment of data is constructed into an orthogonal matrix, and each segment of data is a matrix. The product of the Mth row and Nth column of each matrix is used as the password of the matrix, and the passwords of each matrix are combined in turn to form the client password.
[0010] All the orthogonal matrices mentioned above are randomly allocated in different partitions of the server data.
[0011] M and N in the Mth row and Nth column of the matrix are randomly generated, and can also be defined by the customer.
[0012] The method of data extraction in this specific embodiment: firstly, after the customer passes the identity identification, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More