Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data encryption method and device based on information security, terminal equipment and medium

A data encryption and information security technology, applied in the field of information security, can solve the problems of poor data confidentiality and data leakage, and achieve the effect of improving confidentiality and avoiding leakage.

Pending Publication Date: 2021-02-23
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present application provides a data encryption method, device, terminal equipment, and medium based on information security, which can solve the existing problems of poor data security and easy data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device based on information security, terminal equipment and medium
  • Data encryption method and device based on information security, terminal equipment and medium
  • Data encryption method and device based on information security, terminal equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0030] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other Presence or addition of features, wholes, steps, operations, elements, components and / or collections thereof.

[0031] It should...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of information security, and particularly relates to a data encryption method and device based on information security, terminal equipment and a medium. According to the method, to-be-encrypted data is subjected to desensitization processing and differential privacy processing, so that local desensitization and local differential privacy of the to-be-encrypted data are realized, and the desensitized data and the differential privacy processed data are two different data obtained by using different privacy processing methods. Because the two kinds of different data are not associated, even if the original data of the two kinds of different data are obtained through corresponding reverse engineering, the original data of the two kinds of different data are not associated, so that the to-be-encrypted data cannot be accurately obtained according to the original data of the two kinds of different data; therefore, the secrecy effect of the to-be-encrypted data is improved, and leakage of the to-be-encrypted data is avoided.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular relates to a data encryption method, device, terminal equipment and medium based on information security. Background technique [0002] At present, cloud computing and mobile Internet technology and applications are becoming more and more mature, and data sharing is also the general trend. At the same time, data security issues are becoming increasingly serious, especially the most confidential or sensitive information, such as ID numbers, mobile phone numbers, bank card numbers and other financial information. , facing the risk of privacy leakage, and the existing technology uses the method of hiding part of the information to achieve secrecy, the logic of this method is simple and easy to be cracked, therefore, the secrecy effect is poor. Contents of the invention [0003] The embodiments of the present application provide a data encryption method, dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227G06F21/6245G06F2221/2107
Inventor 顾佳页
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More