CN112699389A - Administrative data safe storage method and device and terminal equipment - Google Patents
Administrative data safe storage method and device and terminal equipment Download PDFInfo
- Publication number
- CN112699389A CN112699389A CN202011579080.2A CN202011579080A CN112699389A CN 112699389 A CN112699389 A CN 112699389A CN 202011579080 A CN202011579080 A CN 202011579080A CN 112699389 A CN112699389 A CN 112699389A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- administrative data
- encrypted
- administrative
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
本发明适用于数据处理技术领域,提供了一种行政数据安全存储方法、装置及终端设备,该方法包括:获取企业的行政数据;对所述行政数据进行预处理,得到预处理后的行政数据;对所述预处理后的行政数据按照加密等级进行加密,并对加密后的加密数据对应存储在数据库中不同的扇区中,从而可以解决现有技术中加密安全性较低的问题。
The invention is applicable to the technical field of data processing, and provides a method, device and terminal equipment for safe storage of administrative data. The method includes: acquiring administrative data of an enterprise; and preprocessing the administrative data to obtain the preprocessed administrative data ; Encrypting the preprocessed administrative data according to the encryption level, and correspondingly storing the encrypted encrypted data in different sectors in the database, thereby solving the problem of low encryption security in the prior art.
Description
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to a method and a device for safely storing administrative data and terminal equipment.
Background
The administrative data describe the characteristics of a certain social group, and an enterprise as a large group in the current society has the corresponding enterprise administrative data which are crucial to an enterprise, and the enterprise administrative data have more data types and larger data scale.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, and a terminal device for securely storing administrative data, which aim to solve the problem in the prior art that the storage security of enterprise administrative data is low.
In order to achieve the above object, a first aspect of the embodiments of the present invention provides a method for securely storing administrative data, including:
acquiring administrative data of an enterprise;
preprocessing the administrative data to obtain preprocessed administrative data;
and encrypting the preprocessed administrative data according to the encryption level, and correspondingly storing the encrypted data in different sectors in a database.
As another embodiment of the present application, the acquiring administrative data of an enterprise includes:
adopting different acquisition modes to acquire administrative data of enterprises, wherein the different acquisition modes comprise: file submission, page entry and API docking.
As another embodiment of the present application, the preprocessing the administrative data to obtain preprocessed administrative data includes:
extracting data characteristics of the administrative data, and classifying the administrative data according to the data characteristics;
and carrying out data cleaning on the classified administrative data to obtain preprocessed administrative data.
As another embodiment of the present application, the encrypting the preprocessed administrative data according to an encryption level includes:
determining encryption levels of the preprocessed administrative data according to categories, different contents in the same category and encryption requirements;
and encrypting all administrative data to different degrees according to the encryption level.
As another embodiment of the present application, the encryption levels include primary encryption, intermediate encryption, and advanced encryption;
the encrypting of all administrative data according to the encryption level to different degrees comprises:
when the encryption level is primary encryption, corresponding administrative data is not encrypted;
when the encryption level is middle-level encryption, respectively calculating MD5 values of corresponding administrative data, and encrypting the corresponding category of administrative data according to MD5 values;
and when the encryption level is advanced encryption, encrypting the corresponding administrative data in a chain encryption mode.
As another embodiment of the present application, a process for encrypting administrative data to be encrypted by using a chain encryption method includes:
dividing the administrative data to be encrypted into a plurality of data blocks according to the data volume of the administrative data to be encrypted;
calculating the data of the first data block and a preset initial vector to obtain a first calculation result;
encrypting the first operation result by adopting a user-defined encryption key to obtain an encrypted ciphertext;
determining preset data in the encrypted message as an initial encryption vector of a second data block according to a preset rule;
and encrypting the second data block according to the initial encryption vector in a mode of encrypting the first data block, determining the initial encryption vector of the next data block, and encrypting the next data block until all data blocks are completely encrypted to obtain the encrypted administrative data.
As another embodiment of the present application, the storing encrypted data after encryption in different sectors in a database correspondingly includes:
according to the encryption grade, correspondingly storing the encrypted data in different sectors in a database;
and sequentially storing the encrypted data in different sectors in the database according to the category of the administrative data and the encryption degree of the encryption level.
A second aspect of an embodiment of the present invention provides an administrative data security storage apparatus, including:
the acquisition module is used for acquiring administrative data of an enterprise;
the preprocessing module is used for preprocessing the administrative data to obtain preprocessed administrative data;
and the encryption module is used for encrypting the preprocessed administrative data according to the encryption level and correspondingly storing the encrypted data in different sectors in the database.
A third aspect of an embodiment of the present invention provides a terminal device, including: the system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the administrative data secure storage method according to any one of the above embodiments.
A fourth aspect of an embodiment of the present invention provides a computer-readable storage medium, including: the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements the steps of the administrative data secure storage method according to any one of the above embodiments.
Compared with the prior art, the embodiment of the invention has the following beneficial effects: compared with the prior art, the method has the advantages that the administrative data are divided according to the categories, then are encrypted according to the encryption levels, and then are correspondingly stored in different sectors in the database, the encryption mode adopts the encryption according to the MD5 value, and the encryption mode adopts the chain encryption mode, so that the safety is high, and the decryption is not easy.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an implementation of a secure storage method for administrative data according to an embodiment of the present invention;
FIG. 2 is an exemplary diagram of an administrative data security storage device provided by an embodiment of the present invention;
fig. 3 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 is a schematic flow chart of an implementation of the method for securely storing administrative data according to the embodiment of the present invention, which is described in detail as follows.
Optionally, the administrative data of the enterprise may include enterprise basic information, enterprise associated information, credit transaction information, enterprise rating information, disagreement information, and the like.
The basic information of the enterprise may include identification information, license information, status information, principal information, stockholder information, and funding information, among others.
The enterprise associated information is related information capable of embodying an association relationship between an information subject or main personnel of an enterprise and other subjects, and mainly comprises: the enterprise investments to the outside, the legal representatives of the enterprise invest to the outside, the legal representatives of the enterprise other companies hold their duties, the actual controllers, etc.
The credit transaction information is information based on a contract between market entities, and mainly includes: financial credit transaction information, the financial credit transaction information comprising: the method comprises the following steps of dividing the enterprise credit transaction into six account types according to the characteristics of the throwing frequency, the account management mode, the circulation and the like of the financial credit transaction, wherein the basic information record of an enterprise credit main body, the information record of the enterprise loan transaction, the information record of the enterprise credit line and the information record of an associated contract are as follows: the method comprises the following steps of managing non-cyclic accounts in a single unified mode, managing non-cyclic accounts in a grading unified mode, managing cyclic accounts in a grading unified mode, independently managing non-cyclic accounts in a grading independent mode and independently managing cyclic accounts in a grading independent mode.
The enterprise evaluation information refers to the result information obtained by evaluating the reliability and the security degree of the credit behaviors and the social activities of the enterprise by government-related departments, professional evaluation organizations or industry associations and the like according to a certain method and program, and is further divided into credit supervision information and social evaluation information according to the difference of evaluation subjects.
The objection information is objection application information and feedback result information which are provided by the recorded information main body for identifying objection to the credit information record.
Optionally, the acquiring administrative data of the enterprise in this step may include:
adopting different acquisition modes to acquire administrative data of enterprises, wherein the different acquisition modes comprise: file submission, page entry and API docking.
Optionally, the file submission is mainly used for collecting credit transaction information. The page entry is mainly used for collecting the objection information and the credit transaction information, a page entry function can be provided for a user through developing an entry page, and different information types are entered on different pages. The API docking is mainly used for collecting basic enterprise information, associated enterprise information and credit evaluation information, and for docking government departments and compliant third-party data providers, various enterprise credit information such as the basic enterprise information, the associated enterprise information and the credit evaluation information are obtained in the form of API interface calling.
And 102, preprocessing the administrative data to obtain preprocessed administrative data.
Optionally, the preprocessing the administrative data in this step to obtain the preprocessed administrative data may include:
extracting data characteristics of the administrative data, and classifying the administrative data according to the data characteristics;
and carrying out data cleaning on the classified administrative data to obtain preprocessed administrative data.
Optionally, in this embodiment, preset features may be extracted from administrative data acquired in different acquisition manners, and data conforming to the preset features are unified into one category, so that corresponding enterprise basic information, enterprise association information, credit transaction information, enterprise evaluation information, and disagreement information may be obtained.
Optionally, after performing data cleansing operations such as null data deletion, error data deletion, data de-duplication, and the like on the classified administrative data of each category, step 103 is continuously performed.
It should be noted that, when performing data cleaning on administrative data, error data and duplicate data may be extracted for further verification, and then the data is maintained.
And 103, encrypting the preprocessed administrative data according to the encryption level, and correspondingly storing the encrypted data in different sectors in the database.
Optionally, encrypting the preprocessed administrative data according to an encryption level in this step may include:
determining encryption levels of the preprocessed administrative data according to categories, different contents in the same category and encryption requirements;
and encrypting all administrative data to different degrees according to the encryption level.
Optionally, the encryption requirement is an encryption requirement for enterprise file prefabrication. It should be noted that the encryption requirements for different types of administrative data are different, and the encryption requirements for different content of administrative data in the same type of administrative data may also be different. We therefore encrypt to different extents all the administrative data for different content.
Optionally, the encryption level includes a primary encryption, a medium encryption, and a high encryption. It can be understood that the administrative data subjected to the primary encryption is of lower importance, and the administrative data subjected to the advanced encryption is of higher importance.
Optionally, encrypting all administrative data to different degrees according to the encryption level may include:
when the encryption level is primary encryption, corresponding administrative data is not encrypted;
when the encryption level is middle-level encryption, respectively calculating MD5 values of corresponding administrative data, and encrypting the corresponding category of administrative data according to MD5 values;
and when the encryption level is advanced encryption, encrypting the corresponding administrative data in a chain encryption mode.
Optionally, MD5 can ensure the integrity and consistency of information transmission, and is one of the hash algorithms widely used by computers, which can operate on data (such as chinese characters) to another fixed length value. When the two data are completely consistent, the MD5 values respectively calculated according to the two data are the same, and when only one of the numbers or letters is different from the two data, the calculated MD5 values are also very different. Therefore, data integrity can be guaranteed by encrypting data by using MD5 values. When the administrative data is found to be maliciously tampered, it can be found immediately when MD5 is recalculated. In this embodiment, the administrative data is encrypted again according to the calculated MD5 value, and the encryption method is not limited in this case, that is, the encrypted data is obtained by secondary encryption.
Optionally, the chain encryption mode is that data related to the previous data is used for encryption when the next data is encrypted, so that when the intermediate data is intercepted, the intercepted intermediate data cannot be decrypted, and thus the encryption mode is more complex and the security is higher.
Optionally, the process of encrypting the administrative data to be encrypted by using a chain encryption manner includes:
and step A, dividing the administrative data to be encrypted into a plurality of data blocks according to the data volume of the administrative data to be encrypted.
Optionally, the administrative data to be encrypted is divided according to a preset data volume, and the preset data volume may be set according to actual requirements. The divided data blocks may be a first data block, a second data block, a third data block … nth data block, and so on.
Optionally, each data block is sequentially encrypted, and a ciphertext encrypted by a previous data block is used when a next data block is encrypted, so that the encrypted ciphertext has higher security.
And B, computing the data of the first data block and a preset initial vector to obtain a first computing result.
Optionally, the initial vector may be set according to requirements.
Optionally, the operation performed on the data of the first data block and the preset initial vector may include any one or more operations, such as an exclusive-or operation, an addition-subtraction operation, a square operation, and the like.
And step C, encrypting the first operation result by adopting a user-defined encryption key to obtain an encrypted ciphertext.
And D, determining preset data in the encrypted message as an initial encryption vector of the second data block according to a preset rule.
Optionally, the preset rule is a rule for determining a ciphertext as an encryption vector of the second data block, for example, a section of continuous ciphertext is selected at the beginning of the encrypted ciphertext, or a section of continuous ciphertext is selected at the end of the encrypted ciphertext, or a section of continuous ciphertext is selected in the middle of the ciphertext.
The encryption vector of the next data block is set according to the encrypted ciphertext of the previous data block, so that the risk of the ciphertext being cracked can be reduced.
And E, encrypting a second data block according to the initial encryption vector in a mode of encrypting the first data block, determining the initial encryption vector of the next data block, and encrypting the next data block until all data blocks are completely encrypted to obtain the encrypted administrative data.
Optionally, the second data block is encrypted according to the initial encryption vector, that is, the data of the second data block and the initial encryption vector are operated to obtain a second operation result. And encrypting the second operation result by adopting the user-defined encryption key to obtain a second ciphertext. And determining preset data in the encrypted message as an initial encryption vector of the second data block according to a preset rule.
Optionally, after obtaining all encrypted files, the encrypted data may be correspondingly stored in different sectors in the database according to the encryption level;
and sequentially storing the encrypted data in different sectors in the database according to the category of the administrative data and the encryption degree of the encryption level. For example, when different contents under administrative data such as enterprise-related information are encrypted by using intermediate-level encryption and high-level encryption respectively, the enterprise-related information may be stored in sectors 1 to 3 in the database, where sector 2 stores intermediate-level encryption information and sector 3 stores high-level encryption information.
According to the method for safely storing the administrative data, the administrative data are divided according to the categories, then encrypted according to the encryption level, and then correspondingly stored in different sectors in the database, the encryption mode is that the data are encrypted according to the MD5 value, and the data are encrypted in a chain encryption mode, so that the security is high, and the data are not easy to crack.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 2 is a diagram illustrating an example of an administrative data security storage apparatus provided by an embodiment of the present invention, corresponding to the administrative data security storage method described in the foregoing embodiment. As shown in fig. 2, the apparatus may include: an acquisition module 201, a preprocessing module 202 and an encryption module 203.
An obtaining module 201, configured to obtain administrative data of an enterprise;
the preprocessing module 202 is configured to preprocess the administrative data to obtain preprocessed administrative data;
and the encryption module 203 is configured to encrypt the preprocessed administrative data according to an encryption level, and correspondingly store the encrypted data in different sectors in the database.
Optionally, when the obtaining module 201 obtains the administrative data of the enterprise, it may be configured to:
adopting different acquisition modes to acquire administrative data of enterprises, wherein the different acquisition modes comprise: file submission, page entry and API docking.
Optionally, the preprocessing module 202 is configured to preprocess the administrative data to obtain preprocessed administrative data, and may be configured to:
extracting data characteristics of the administrative data, and classifying the administrative data according to the data characteristics;
and carrying out data cleaning on the classified administrative data to obtain preprocessed administrative data.
Optionally, when the encryption module 203 encrypts the preprocessed administrative data according to the encryption level, it may be configured to:
determining encryption levels of the preprocessed administrative data according to categories, different contents in the same category and encryption requirements;
and encrypting all administrative data to different degrees according to the encryption level.
Optionally, the encryption level includes primary encryption, intermediate encryption, and advanced encryption;
when the encryption module 203 encrypts all administrative data to different degrees according to the encryption levels, it may be configured to:
when the encryption level is primary encryption, corresponding administrative data is not encrypted;
when the encryption level is middle-level encryption, respectively calculating MD5 values of corresponding administrative data, and encrypting the corresponding category of administrative data according to MD5 values;
and when the encryption level is advanced encryption, encrypting the corresponding administrative data in a chain encryption mode.
Optionally, the encryption module 203 may further be configured to:
dividing the administrative data to be encrypted into a plurality of data blocks according to the data volume of the administrative data to be encrypted;
calculating the data of the first data block and a preset initial vector to obtain a first calculation result;
encrypting the first operation result by adopting a user-defined encryption key to obtain an encrypted ciphertext;
determining preset data in the encrypted message as an initial encryption vector of a second data block according to a preset rule;
and encrypting the second data block according to the initial encryption vector in a mode of encrypting the first data block, determining the initial encryption vector of the next data block, and encrypting the next data block until all data blocks are completely encrypted to obtain the encrypted administrative data.
Optionally, when the encryption module 203 correspondingly stores the encrypted data after encryption in different sectors in the database, it may be configured to:
according to the encryption grade, correspondingly storing the encrypted data in different sectors in a database;
and sequentially storing the encrypted data in different sectors in the database according to the category of the administrative data and the encryption degree of the encryption level.
According to the administrative data safety storage device, the administrative data are firstly divided according to the categories, then encrypted according to the encryption levels, and then the encrypted data are correspondingly stored in different sectors in the database, the encryption mode adopts the encryption according to the MD5 value, and the encryption mode adopts the chain encryption mode, so that the safety is high, and the decryption is not easy.
Fig. 3 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 3, the terminal device 300 of this embodiment includes: a processor 301, a memory 302, and a computer program 303, such as an administrative data security storage program, stored in the memory 302 and executable on the processor 301. The processor 301 executes the computer program 303 to implement the steps in the above embodiment of the method for securely storing administrative data, such as steps 101 to 103 shown in fig. 1, and the processor 301 executes the computer program 303 to implement the functions of the modules in the above embodiments of the apparatus, such as the functions of the modules 201 to 203 shown in fig. 2.
Illustratively, the computer program 303 may be divided into one or more program modules that are stored in the memory 302 and executed by the processor 301 to implement the present invention. The one or more program modules may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 303 in the administrative data security storage or the terminal device 300. For example, the computer program 303 may be divided into the obtaining module 201, the preprocessing module 202 and the encryption module 203, and specific functions of the modules are shown in fig. 2, which are not described herein again.
The terminal device 300 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 301, a memory 302. Those skilled in the art will appreciate that fig. 3 is merely an example of a terminal device 300 and does not constitute a limitation of terminal device 300 and may include more or fewer components than shown, or some components may be combined, or different components, for example, the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 301 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 302 may be an internal storage unit of the terminal device 300, such as a hard disk or a memory of the terminal device 300. The memory 302 may also be an external storage device of the terminal device 300, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 300. Further, the memory 302 may also include both an internal storage unit and an external storage device of the terminal device 300. The memory 302 is used for storing the computer programs and other programs and data required by the terminal device 300. The memory 302 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. . Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011579080.2A CN112699389A (en) | 2020-12-28 | 2020-12-28 | Administrative data safe storage method and device and terminal equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011579080.2A CN112699389A (en) | 2020-12-28 | 2020-12-28 | Administrative data safe storage method and device and terminal equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN112699389A true CN112699389A (en) | 2021-04-23 |
Family
ID=75511276
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011579080.2A Pending CN112699389A (en) | 2020-12-28 | 2020-12-28 | Administrative data safe storage method and device and terminal equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112699389A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114385586A (en) * | 2021-12-17 | 2022-04-22 | 基智智能科技(上海)有限公司 | A cloud data processing platform and data exchange method thereof |
| CN114817953A (en) * | 2022-04-12 | 2022-07-29 | 浪潮软件股份有限公司 | Encryption and decryption application method, device and medium |
| CN116089988A (en) * | 2023-04-10 | 2023-05-09 | 航天万源云数据河北有限公司 | Method, device, equipment and storage medium for managing server data hosting |
| CN116414923A (en) * | 2023-04-03 | 2023-07-11 | 浪潮软件股份有限公司 | Government affair data identification classification and encryption method and system based on data meta-model |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100150344A1 (en) * | 2008-12-15 | 2010-06-17 | Thomson Licensing | Methods and devices for a chained encryption mode |
| CN106022196A (en) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | Information sharing method and intelligent terminal |
| CN107292183A (en) * | 2017-06-29 | 2017-10-24 | 国信优易数据有限公司 | A kind of data processing method and equipment |
| CN109215170A (en) * | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Storage method, device and the equipment of travelling data |
| CN110209349A (en) * | 2019-04-25 | 2019-09-06 | 科华恒盛股份有限公司 | The method and terminal device of data processing |
| CN111523853A (en) * | 2020-04-14 | 2020-08-11 | 上海资信有限公司 | Management method for processing, sorting and storing enterprise credit information |
| CN112738080A (en) * | 2020-12-28 | 2021-04-30 | 中科恒运股份有限公司 | Administrative data transmission encryption method and terminal equipment |
-
2020
- 2020-12-28 CN CN202011579080.2A patent/CN112699389A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100150344A1 (en) * | 2008-12-15 | 2010-06-17 | Thomson Licensing | Methods and devices for a chained encryption mode |
| CN106022196A (en) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | Information sharing method and intelligent terminal |
| CN107292183A (en) * | 2017-06-29 | 2017-10-24 | 国信优易数据有限公司 | A kind of data processing method and equipment |
| CN109215170A (en) * | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Storage method, device and the equipment of travelling data |
| CN110209349A (en) * | 2019-04-25 | 2019-09-06 | 科华恒盛股份有限公司 | The method and terminal device of data processing |
| CN111523853A (en) * | 2020-04-14 | 2020-08-11 | 上海资信有限公司 | Management method for processing, sorting and storing enterprise credit information |
| CN112738080A (en) * | 2020-12-28 | 2021-04-30 | 中科恒运股份有限公司 | Administrative data transmission encryption method and terminal equipment |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114385586A (en) * | 2021-12-17 | 2022-04-22 | 基智智能科技(上海)有限公司 | A cloud data processing platform and data exchange method thereof |
| CN114817953A (en) * | 2022-04-12 | 2022-07-29 | 浪潮软件股份有限公司 | Encryption and decryption application method, device and medium |
| CN116414923A (en) * | 2023-04-03 | 2023-07-11 | 浪潮软件股份有限公司 | Government affair data identification classification and encryption method and system based on data meta-model |
| CN116089988A (en) * | 2023-04-10 | 2023-05-09 | 航天万源云数据河北有限公司 | Method, device, equipment and storage medium for managing server data hosting |
| CN116089988B (en) * | 2023-04-10 | 2023-06-23 | 航天万源云数据河北有限公司 | Method, device, equipment and storage medium for managing server data hosting |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112738080B (en) | Administrative data transmission encryption method and terminal equipment | |
| US11468192B2 (en) | Runtime control of automation accuracy using adjustable thresholds | |
| AU2024200809B2 (en) | Data protection via aggregation-based obfuscation | |
| US12231566B2 (en) | Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data | |
| CN112699389A (en) | Administrative data safe storage method and device and terminal equipment | |
| US12182305B2 (en) | Batch tokenization service | |
| US20210112101A1 (en) | Data set and algorithm validation, bias characterization, and valuation | |
| US8584247B1 (en) | Systems and methods for evaluating compliance checks | |
| US11714919B2 (en) | Methods and systems for managing third-party data risk | |
| CN111367903A (en) | Credit report generation method based on block chain and related system | |
| CN112990281A (en) | Abnormal bid identification model training method, abnormal bid identification method and abnormal bid identification device | |
| JP2023512338A (en) | Context-driven data profiling | |
| US20200234794A1 (en) | Improved computing device | |
| US20240232422A1 (en) | De-Tokenization Patterns And Solutions | |
| CN112085611A (en) | Asynchronous data verification method and device, electronic equipment and storage medium | |
| CN116701365B (en) | Power data storage management method, system, terminal equipment and storage medium | |
| CN110943982B (en) | Document data encryption method and device, electronic equipment and storage medium | |
| CN111611601A (en) | Method, device and storage medium for joint training of multi-data user analysis model | |
| US12386984B2 (en) | Data privacy enhancing technique selection | |
| CN113498592B (en) | Method and system for digital property authentication and management | |
| CN113392138A (en) | Statistical analysis method and device for private data, server and storage medium | |
| CN119312392B (en) | Image data processing method and device, electronic device, and storage medium | |
| Eriksson | Using Neural Networks to Identify Infected Files for Protection against Ransomware | |
| CN120672303A (en) | Human resources position matching method and device | |
| CN115952554A (en) | Electronic signature data processing method and device, computer equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |