Data encryption storage method, data encryption search method, data encryption application method and related equipment
A technology of data encryption and search methods, applied in the field of data security, can solve problems such as malicious attacks, data leakage, data loss of control, etc., to avoid leakage, reduce the risk of data leakage, and improve the safety factor.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0051] The invention provides a data encryption storage method, which comprises the following steps:
[0052] performing a first encryption process on the plaintext data using a preset first encryption algorithm and a preset first key to obtain first ciphertext data;
[0053] Obtain the first ciphertext data and a ciphertext data processing algorithm corresponding to the first ciphertext data, and use a preset second encryption algorithm and a preset second ke...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


