Data security processing method and device

A technology of data security and processing method, applied in the field of data processing, can solve the problems of low security and single data encryption method, and achieve the effects of improving security, improving efficiency and reducing the amount of data

Active Publication Date: 2019-05-14
国泰新点软件股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a data security processing method and device, which are used to solve the problems in the prior art that the data encryption method is single and the security of the data is not high after encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method and device
  • Data security processing method and device
  • Data security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] The data security processing method in the embodiment of the present invention is used for encrypting and querying data.

[0052] figure 1 It is a schematic flowchart of a data security processing method according to an embodiment of the present invention. figure 2 It is another schematic flowchart of the data security processing method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a data security processing method and apparatus. The method includes the steps of acquiring a to-be-encrypted data block, wherein the to-be-encrypted data block includes N pieces of to-be-encrypted data, each piece of to-be-encrypted data is corresponding to a unique index identifier, and N is an integer greater than or equal to 1; encrypting the N pieces of to-be-encrypted data sequentially, acquiring N pieces of encrypted data, and recording a storage position of the N pieces of encrypted data; and generating index data according to the storage position of the N pieces of encrypted data and the index identifiers, wherein the index data includes a mapping relationship between the storage position of the N pieces of encrypted data and the N index identifiers. Through adoption of the data security processing method and apparatus provided by the embodiments of the present invention, data storage security is improved, and data read efficiency is improved.

Description

technical field [0001] The invention relates to data processing technology, in particular to a data security processing method and device. Background technique [0002] With the rapid development of the information society, more and more fields need to analyze and process various data to guide the production or business process. In order to prevent competitors from knowing the relevant data, many data storage processes need to be encrypted. For example: Quota list database data. Quota refers to the quantitative standard of manpower, material resources, financial resources and time consumed in the production of qualified unit products under certain technical and organizational conditions. The data in the quota inventory database includes a large amount of data content. In order to ensure that the data will not be arbitrarily obtained without authorization, the data storage process needs to be encrypted. [0003] In the prior art, a commonly used data encryption method is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14
CPCH04L9/0822H04L9/0825H04L9/14
Inventor 张龙斌
Owner 国泰新点软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products