CN117195262B - Character string encryption method, device, equipment and storage medium - Google Patents
Character string encryption method, device, equipment and storage mediumInfo
- Publication number
- CN117195262B CN117195262B CN202311149950.6A CN202311149950A CN117195262B CN 117195262 B CN117195262 B CN 117195262B CN 202311149950 A CN202311149950 A CN 202311149950A CN 117195262 B CN117195262 B CN 117195262B
- Authority
- CN
- China
- Prior art keywords
- character string
- length
- encrypted
- character
- word segmentation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a character string encryption method, a device, equipment and a storage medium, which relate to the technical field of computers and comprise the steps of obtaining a character string to be encrypted and a preset shortest character word segmentation length, determining a word segmentation length set based on the shortest character word segmentation length and the original length of the character string to be encrypted, segmenting the character string to be encrypted based on the word segmentation length set to obtain a decomposed character string set, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set, and storing a main key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table. The invention divides the character strings to be encrypted according to different lengths, respectively encrypts and stores the decomposed character strings, and inquires the corresponding information through the main key identification in the newly added encryption auxiliary storage table, thereby meeting the service function requirement and improving the inquiry performance and the inquiry efficiency of the system.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for encrypting a character string.
Background
The current fuzzy query method for the encrypted field mainly comprises the steps of 1, supporting the fuzzy query of the encrypted field with specific rules. The new added table field carries out additional encryption storage on characters with specific length intercepted by the sensitive character string, and the length of the intercepted characters is ensured to be consistent with the length of the input query condition value supported by the system. For example, 6 bits after the identification card number is intercepted are encrypted and stored, the last 6 bits of the identification card number are input during inquiry, and the system is precisely matched in a database. 2. The sensitive fields are grouped according to fixed length, generally, the sensitive fields are divided into a group according to 4 English characters (half angle) or 2 Chinese characters (full angle), then each group of character strings are respectively encrypted, then the encrypted strings are spliced and stored in a new table field, and then fuzzy matching is carried out on the input query conditions in the table field. However, the two methods have the following limitations that (1) the method 1 only supports the search of the encryption field under a specific rule or length, the service applicability is not high and the modification cost is high. (2) The method 2 adopts block encryption storage, requires that the length of an encryption field is more than or equal to 4 English characters or 2 Chinese characters, the length of a database storage column after encryption string splice storage is multiplied along with the increase of encryption packets, the encryption string is required to be added for storing the encryption string, the original service table structure is subjected to intrusion modification, if a certain column of data is newly added for encryption, the original table structure is required to be changed, the corresponding block encryption storage column is increased, the complexity of system development operation and maintenance is improved, and the database has safety risks. (3) Both method 1 and method 2 need to modify the original service table field, and add an encrypted storage column, which has an influence on the storage space and query performance of the original service table.
The prior art has the problems that an original service table needs to be added with a table field storage encryption string, table structure intrusion modification exists, safety risks exist in database operation and maintenance operation, the situation that the encryption string is spliced and stored can cause overlarge table fields and increase storage space, the situation is more prominent along with the increase of the encryption string length and can influence the retrieval and maintenance of table data, the fixed length is adopted for grouping the character strings, the service adaptability is low, and the modification and change cost is high.
Disclosure of Invention
Accordingly, the present invention is directed to a method, apparatus, device and storage medium for encrypting a character string, which can meet the service function requirement and improve the query performance and the query efficiency of the system. The specific scheme is as follows:
in a first aspect, the present invention discloses a method for encrypting a character string, comprising:
Acquiring a character string to be encrypted and a preset shortest character word segmentation length, and determining a word segmentation length set based on the shortest character word segmentation length and the original length of the character string to be encrypted;
Segmenting the character string to be encrypted based on the length set of the word to be segmented to obtain a decomposed character string set;
Encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set;
and storing the primary key identification corresponding to the encrypted character string set and the character string to be encrypted into an encryption auxiliary storage table.
Optionally, the determining the set of word segmentation lengths to be used based on the shortest word segmentation length and the original length of the character string to be encrypted includes:
Adding 1 to the shortest character word segmentation length to obtain the current character word segmentation length;
judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
if the current character word segmentation length is smaller than the original length of the character string to be encrypted, judging that the current character word segmentation length meets a preset character word segmentation rule, adding 1 to the current character word segmentation length, and re-entering the step of judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
If the current character word segmentation length is not less than the original length of the character string to be encrypted, ending word segmentation length determining operation;
And determining the shortest character word segmentation length, the original length and the current character word segmentation length which all meet the preset character word segmentation rule as the length set to be segmented.
Optionally, the segmenting the character string to be encrypted based on the set of word lengths to be segmented includes:
Determining a target word segmentation length from the word segmentation length set, and taking the first character of the character string to be encrypted as a current starting interception position;
intercepting the decomposed character string with the length being the target word segmentation length from the character string to be encrypted based on the current starting intercepting position;
Judging whether the current starting interception position is smaller than the current ending interception position, wherein the current ending interception position is obtained by adding 1 to the absolute value of the difference value between the target word segmentation length and the original length;
If the current starting interception position is smaller than the current ending interception position, adding 1 to the current starting interception position, and re-entering the step of intercepting the decomposed character string with the length equal to the target word segmentation length from the character string to be encrypted based on the current starting interception position;
And if the current starting interception position is not smaller than the current ending interception position, ending the current character string segmentation operation.
Optionally, if the current starting interception position is not less than the current ending interception position, after ending the current string segmentation operation, the method further includes:
Judging whether unused length information exists in the length set of the word to be segmented;
If the unused length information exists in the length set of the word to be segmented, determining any length information in the unused length information as the target word segmentation length, and re-entering the step of taking the first character of the character string to be encrypted as the current starting interception position;
correspondingly, the obtaining the decomposed character string set includes:
If the length information which is not used does not exist in the length set of the word to be segmented, integrating all the decomposed character strings corresponding to all the target word segmentation lengths and the character strings to be encrypted to obtain the decomposed character string set.
Optionally, encrypting the decomposed string set by using a preset encryption algorithm to obtain an encrypted string set, including:
encrypting each decomposed character string in the decomposed character string set by using a preset encryption algorithm to obtain a corresponding encrypted decomposed character string;
encrypting the character string to be encrypted by using the preset encryption algorithm to obtain a corresponding encrypted character string;
And integrating all the encrypted and decomposed character strings and the encrypted character strings to obtain the encrypted character string set.
Optionally, after encrypting the character string to be encrypted by using the preset encryption algorithm to obtain a corresponding encrypted character string, the method further includes:
and replacing the character string to be encrypted in the original information table by using the encrypted character string to obtain an encrypted information table.
Optionally, after storing the primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in the encryption auxiliary storage table, the method further includes:
receiving an information inquiry request sent by a user side, and acquiring inquiry index information in the information inquiry request;
Encrypting the query index information by using the preset encryption algorithm to obtain encrypted index information;
Inquiring table information corresponding to the encryption index information in the encryption auxiliary storage table;
If the only corresponding table information is queried in the encryption auxiliary storage table, acquiring the primary key identifier corresponding to the table information;
and acquiring corresponding target information from the original information table based on the primary key identifier, and sending the target information to the user terminal.
In a second aspect, the present invention discloses a character string encryption device, including:
The shortest character word segmentation length acquisition module is used for acquiring the character string to be encrypted and the preset shortest character word segmentation length;
The to-be-segmented word length set determining module is used for determining a to-be-segmented word length set based on the shortest character segmentation length and the original length of the to-be-encrypted character string;
The character string segmentation module is used for segmenting the character string to be encrypted based on the length set of the word to be segmented so as to obtain a decomposed character string set;
the decomposed character string encryption module is used for encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set;
And the encrypted character string storage module is used for storing the main key identification corresponding to the encrypted character string set and the character string to be encrypted into an encryption auxiliary storage table.
In a third aspect, the present invention discloses an electronic device, comprising:
a memory for storing a computer program;
And a processor for executing the computer program to implement the steps of the string encryption method as previously disclosed.
In a fourth aspect, the present invention discloses a computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements a string encryption method as previously disclosed.
The invention provides a character string encryption method, which comprises the steps of obtaining a character string to be encrypted and a preset shortest character word segmentation length, determining a set of the word segmentation length based on the shortest character word segmentation length and the original length of the character string to be encrypted, segmenting the character string to be encrypted based on the set of the word segmentation length to obtain a decomposed character string set, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set, and storing a primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table. Therefore, the invention carries out segmentation on the character strings to be encrypted according to different lengths, respectively carries out encryption storage on the decomposed character strings, a user can inquire corresponding information in the encryption auxiliary storage table no matter how long the character strings are input, then inquires corresponding unencrypted information through the main key identification in the newly added encryption auxiliary storage table, adopts the encryption auxiliary table storage to support a fuzzy inquiry scheme, can reduce the invasion of an original table service model, has no obvious influence on the storage space of the original table after encryption, meets the service function requirement, and improves the inquiry performance and the inquiry efficiency of the system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for encrypting a character string according to the present invention;
FIG. 2 is a flowchart of a specific string encryption method disclosed in the present invention;
FIG. 3 is a flowchart of a specific string encryption method disclosed in the present invention;
FIG. 4 is a schematic diagram of a string encryption device according to the present invention;
Fig. 5 is a block diagram of an electronic device according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The method has the following defects that the search of the encryption field under a specific rule or length is only supported, the service applicability is not high, the change and modification cost is high, the encryption field length is required to be greater than or equal to 4 English characters or 2 Chinese character lengths by adopting the block encryption storage, the length of a database storage column after the encryption string splice storage is multiplied along with the increase of encryption blocks, the column storage encryption string is required to be increased, the original service table structure is subjected to invasive modification, the original table structure is required to be changed if a certain column of data is newly increased for encryption, the corresponding block encryption storage column is increased, the complexity of the system development operation and maintenance is improved, the database has safety risks, the original service table field is required to be modified, the encryption storage column is increased, and the storage space and the query performance of the original service table are influenced. Therefore, the invention provides a character string encryption method which can meet the service function requirement and improve the inquiry performance and the inquiry efficiency of the system.
The embodiment of the invention discloses a character string encryption method, which is shown in fig. 1 and comprises the following steps:
step S11, acquiring a character string to be encrypted and a preset shortest character word segmentation length, and determining a set of the word segmentation lengths based on the shortest character word segmentation length and the original length of the character string to be encrypted.
In this embodiment, a character string to be encrypted and a preset shortest character word segmentation length are obtained, and a set of word segmentation lengths to be determined based on the shortest character word segmentation length and an original length of the character string to be encrypted. The method comprises the steps of obtaining a shortest character word segmentation length, adding 1 to the shortest character word segmentation length to obtain the current character word segmentation length, judging whether the current character word segmentation length is smaller than the original length of a character string to be encrypted, judging that the current character word segmentation length meets a preset character word segmentation rule if the current character word segmentation length is smaller than the original length of the character string to be encrypted, adding 1 to the current character word segmentation length, re-entering the step of judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted, ending word segmentation length determining operation if the current character word segmentation length is not smaller than the original length of the character string to be encrypted, and determining the shortest character word segmentation length, the original length and the current character word segmentation length which all meet the preset character word segmentation rule as the length set to be segmented.
It can be understood that the invention adopts word segmentation algorithm to segment the character string to be encrypted and stored, the length of the character string after word segmentation must be more than or equal to the minimum value configured by the system, and then the character string after word segmentation is respectively encrypted and stored. That is, after the shortest character word segmentation length is obtained, 1 is added to the shortest character word segmentation length, whether the length obtained by adding 1 to the shortest character word segmentation length is still smaller than or equal to the original length of the character string to be encrypted is judged, if the length obtained by adding 1 to the shortest character word segmentation length is still equal to the original length of the character string to be encrypted, 1 is continuously added on the basis of adding 1, that is, the shortest character word segmentation length is taken as a starting point, whether the character word segmentation length with the increment length of 1 is smaller than the original length of the character string to be encrypted is judged in a circulating way on the basis of the shortest character word segmentation length, if the character word segmentation length is smaller than the original length of the character string to be encrypted, circulation continues, and if the character word segmentation length is equal to the original length of the character string to be encrypted, circulation judging operation is ended. And at the moment, determining the current character word segmentation length, the shortest character word segmentation length and the original length which are all acquired in the circulation process and meet the preset character word segmentation rule as a word length set to be segmented corresponding to the character string to be encrypted. It should be noted that, the preset character word segmentation rule is satisfied, that is, the current character word segmentation length is greater than the shortest character word segmentation length, and meanwhile, the current character word segmentation length is less than the original length.
And step S12, segmenting the character string to be encrypted based on the length set of the word to be segmented to obtain a decomposed character string set.
In this embodiment, after determining the to-be-segmented length set based on the shortest character segmentation length and the original length of the to-be-encrypted character string, the to-be-encrypted character string is segmented based on the to-be-segmented length set to obtain a decomposed character string set. The method comprises the steps of determining a target word segmentation length from a word length set to be segmented, taking a first character of a character string to be encrypted as a current start interception position, intercepting a decomposed character string with the length of the target word length from the character string to be encrypted based on the current start interception position, judging whether the current start interception position is smaller than a current end interception position, wherein the current end interception position is obtained by adding 1 to an absolute value of a difference value between the target word length and the original length, adding 1 to the current start interception position if the current start interception position is smaller than the current end interception position, and re-entering the decomposed character string with the length of the target word length from the character string to be encrypted based on the current start interception position, and ending current character string segmentation operation if the current start interception position is not smaller than the current end interception position.
Further, if the current starting interception position is not smaller than the current ending interception position, judging whether unused length information exists in the length set of the word to be segmented after finishing the current character string segmentation operation, if the unused length information exists in the length set of the word to be segmented, determining any length information in the unused length information as the target word length, and reentering the step of taking the first character of the character string to be encrypted as the current starting interception position, and if the unused length information does not exist in the length set of the word to be segmented, integrating all the decomposed character strings corresponding to all the target word length and the character string to be encrypted to obtain the decomposed character string set.
For example, as shown in fig. 2, the length of the original character string before encryption is denoted as L, and the shortest length of the word segmentation sub-character string in the character string encryption process is denoted as N. The word segmentation encryption main processing logic is as follows:
(1) If the original character string length L < = N, the original character string is not segmented and is encrypted in whole.
(2) If the original string length L > N, then all strings of length N, n+1, n+2 are found in a loop.
The word segmentation processing step is described by looking up all decomposed strings of length N (N takes the value of N, n+1, n+2, L):
(1) Starting from the 1 st character of the character string, intercepting a character string with the length of n;
(2) Starting from the 2 nd character of the character string, intercepting a character string with the length of n;
(3)...
(4) A character string of length n is intercepted starting from the L-n+1 th character of the character string.
After a character string of length n is intercepted from the L-n+1 character of the character string, adding 1 to the current n, intercepting a character string of length n+1 from the 1 st character of the character string again, and circularly executing intercepting operation until n=L. n is the length of the word string to be calculated currently, and Pos is the starting position of the word string with the length of n calculated from the original character string.
In the word segmentation algorithm, each initial position only carries out character string interception operation once, each length of character string is required to be executed for L-n+1 times (namely, the number of the word segmentation character strings of each length is L-n+1), and then the character strings obtained by all word segmentation are respectively encrypted and independently stored.
Therefore, when L > N, a total of (L-n+1) strings can be obtained by word segmentation, i.e., corresponding (L-n+1) encryption strings are needed for each string, so that the required storage space can be estimated.
In a specific embodiment, assuming that the original character string to be encrypted is abcdefgia, the character string length is 9, and the minimum word segmentation length of the encryption process is 4, all word segmentation character strings with lengths of 4,5, 6, 7, 8 and 9 are obtained by word segmentation, and the word segmentation string results are as follows:
step 1, word segmentation to obtain all character strings with the length of 4, wherein abcd, bcde, cdef, defg, efgi, fgia;
step 2, word segmentation to obtain all character strings with the length of 5, wherein abcde, bcdef, cdefg, defgi, efgia is a word segmentation step;
...
step 5, word segmentation to obtain all character strings with the length of 8, wherein abcdefgi, bcdefgia is a word segmentation step;
and 6, word segmentation to obtain all character strings with the length of 9, wherein abcdefgia is a step of word segmentation.
And S13, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set.
In this embodiment, the character string to be encrypted is segmented based on the length set of the word to be segmented, so as to obtain a decomposed character string set, and then the decomposed character string set is encrypted by using a preset encryption algorithm, so as to obtain an encrypted character string set. The method comprises the steps of obtaining a set of encrypted character strings, encrypting each decomposed character string in the set of decomposed character strings by using a preset encryption algorithm to obtain a corresponding encrypted character string, encrypting the character string to be encrypted by using the preset encryption algorithm to obtain a corresponding encrypted character string, and integrating all the encrypted decomposed character strings and the encrypted character strings to obtain the set of encrypted character strings.
And step S14, storing the primary key identification corresponding to the character string to be encrypted and the encrypted character string set into an encryption auxiliary storage table.
In this embodiment, the decomposed string set is encrypted by using a preset encryption algorithm, and after the encrypted string set is obtained, the primary key identifier corresponding to the encrypted string set and the string to be encrypted is stored in an encryption auxiliary storage table. It can be appreciated that, as authorities such as supervision and consumer rights protection pay more and more attention to personal sensitive data security, the important data of clients are required to be stored in an encrypted manner to prevent data disclosure, such as personal identity sensitive information including identification card number, name, mobile phone number, bank card number, etc. After information is encrypted and stored, functions such as fuzzy query of the encryption field by each service system are limited, service operation is influenced, and in order not to influence the structure of the original service table, an encryption auxiliary storage table is newly added, fuzzy query of the sensitive field after encryption and storage is supported, the primary key id of the original service table is stored in the encryption auxiliary storage table, the primary key id of the original table is obtained through matching through the auxiliary table when the fuzzy query is carried out, then related records are obtained through inquiring the primary key id, normal use of service functions is guaranteed, and service function requirements are met.
It can be understood that the invention creates an encryption auxiliary storage table stored with encryption fields for the service table of which the encryption storage needs to support fuzzy query, and the main table fields of the encryption auxiliary storage table are as follows in table 1:
TABLE 1
The word segmentation method for the character string is simple, the number of the encrypted strings can be estimated, the algorithm time complexity is O (L x L), L is the length of the original character string, the efficiency is high, the realization is simple and convenient to maintain, the word segmentation method is simple, the character strings are encrypted integrally instead of being encrypted and spliced word by word, the encryption algorithm is simpler and more efficient, the grouping length of the encrypted fields is not fixed, and the method has higher scene adaptability and flexibility according to specific scene configuration. The new encryption field is added without modifying the original table structure, and only one encryption field type is needed to be added in the encryption auxiliary table (namely, the column name of the original service table is added in the encryption_column field), so that the method has good expansibility. The encryption auxiliary table is used for storing, so that the invasion to the original table service model can be reduced, the storage space of the original table is not obviously affected after encryption, and different storage components can be used for the auxiliary table according to specific scenes so as to improve the inquiry performance of the system. All the encryption information is stored in the encryption auxiliary storage table (including the full-text encryption character string of the encryption field), the service only needs to access the encryption auxiliary storage table for inquiring the encryption field, and the encryption string contains all the effective inquiry condition values, so that indexes can be built for the encryption string of the auxiliary table for accurate matching, and the inquiry efficiency is improved. (e.g., a query for an identification card number).
In order to avoid the invasion of the original table structure, an encryption auxiliary storage table is newly added, the encryption auxiliary storage table stores the primary key id of the original service table, the primary key id is associated with the original service table, the encryption auxiliary storage table is queried firstly during fuzzy search, then the original service table data is queried through the association id, the encryption auxiliary storage table can adopt the same database as the original service table, or can adopt intermediate storage components like an ES (electronic search, open-source highly-expanded distributed full text search engine) and the like, so as to improve the flexibility of service processing.
The invention provides a character string encryption method, which comprises the steps of obtaining a character string to be encrypted and a preset shortest character word segmentation length, determining a set of the word segmentation length based on the shortest character word segmentation length and the original length of the character string to be encrypted, segmenting the character string to be encrypted based on the set of the word segmentation length to obtain a decomposed character string set, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set, and storing a primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table. Therefore, the invention carries out segmentation on the character strings to be encrypted according to different lengths, respectively carries out encryption storage on the decomposed character strings, a user can inquire corresponding information in the encryption auxiliary storage table no matter how long the character strings are input, then inquires corresponding unencrypted information through the main key identification in the newly added encryption auxiliary storage table, adopts the encryption auxiliary table storage to support a fuzzy inquiry scheme, can reduce the invasion of an original table service model, has no obvious influence on the storage space of the original table after encryption, meets the service function requirement, and improves the inquiry performance and the inquiry efficiency of the system.
Referring to fig. 3, an embodiment of the present invention discloses a method for encrypting a character string, and compared with the previous embodiment, the present embodiment further describes and optimizes a technical scheme.
Step S21, acquiring a character string to be encrypted and a preset shortest character word segmentation length, and determining a set of the word segmentation lengths based on the shortest character word segmentation length and the original length of the character string to be encrypted.
And S22, segmenting the character string to be encrypted based on the length set of the word to be segmented to obtain a decomposed character string set.
And S23, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set.
In this embodiment, the decomposed string set is encrypted by using a preset encryption algorithm, that is, each string in the decomposed string set is stored in an encrypted manner, and the encrypted string is stored in an encrypted auxiliary storage table corresponding to the service original table according to the requirement. For example, if the nickname in the user table is encrypted for word segmentation, the identification card number is stored with the shortest character length (shortest character word segmentation length) of 2. The information in the user table before encryption storage is as follows in table 2:
TABLE 2
| Main key id | Cert_id (identity card number) | Name (Name) |
| 10000 | 4305XXXXXXX0001 | Ouyang Zhangsan A |
| 10001 | 4305XXXXXXX0002 | Ouyang Lisi A |
And S24, replacing the character string to be encrypted in the original information table by using the encrypted character string to obtain an encrypted information table.
In this embodiment, the data of the user table after the encryption storage scheme is adopted is as follows table 3:
TABLE 3 Table 3
| Main key id | Cert_id (identity card number) | Name (Name) |
| 10000 | aaa1 | bbb1 |
| 10001 | aaa2 | bbb2 |
It should be noted that, aaa and bbb in the above table 3 represent encrypted information obtained by full text encryption of corresponding information, that is, aaa1 corresponds to encrypted information obtained by full text encryption of 4305XXXXXXX0001 in table 2, that is, although a plurality of word lengths to be segmented are obtained when the character string to be encrypted is segmented, and a plurality of decomposed character strings are determined according to the plurality of word lengths to be segmented, the encrypted information corresponding to all decomposed character strings is not all stored in the original table, the encrypted information corresponding to all decomposed character strings is stored in the encryption auxiliary storage table, and only the unique encrypted character string corresponding to the original (full text) of the character string to be encrypted is stored in the original table, and the character string to be encrypted in the original information table is replaced by the encrypted character string, so as to obtain the encrypted information table.
And S25, storing the primary key identification corresponding to the character string to be encrypted and the encrypted character string set into an encryption auxiliary storage table.
And S26, receiving an information inquiry request sent by the user side and executing an information inquiry operation.
In this embodiment, after storing the encrypted string set and the primary key identifier corresponding to the string to be encrypted in the encryption auxiliary storage table, when an information query request sent by the user terminal is received, an information query operation is performed. The method comprises the steps of obtaining query index information in an information query request, encrypting the query index information by utilizing a preset encryption algorithm to obtain encrypted index information, inquiring table information corresponding to the encrypted index information in an encryption auxiliary storage table, obtaining a main key identification corresponding to the table information if only corresponding table information is inquired in the encryption auxiliary storage table, obtaining corresponding target information from an original information table based on the main key identification, and sending the target information to a user side.
For example, the user encryption assist table stores information as follows table 4:
TABLE 4 Table 4
The information shown in table 4 is only a partial example, but not all the information, where the information is convenient to query, and the auxiliary table stores the encrypted information before the original character string is segmented (i.e. the full text of the character string). It can be understood that the encryption information corresponding to each decomposed character string, the encryption information corresponding to the original whole text of the character string to be encrypted, the encryption field column name corresponding to each encryption information, and the associated id corresponding to each encryption information (i.e. the primary key identifier in the primary information table) are stored in the encryption auxiliary table.
When the fuzzy search is carried out, a user inputs a query condition (namely query index information), the query condition at the moment is partial information or all information stored in an original information table, the input query condition value is encrypted by adopting the same encryption algorithm used when the information is stored, then the encrypted character string information is used for carrying out joint query on the original service table and the encryption auxiliary table, and the query result is subjected to de-duplication operation. For example, a query condition with a user name of "Lifour" is input, an encrypted character string of "abs $% ≡," is obtained after Lifour is encrypted, then database matching query is performed by using the encrypted character string, and SQL (Structured Query Language ) statements of query execution are as follows:
SELECT DISTINCT a.id,a.name FROM user a,user_encrypt b WHERE a.id=b.refId AND b.encrypt_column='Name'AND b.encrypt_data='abs$%!'
If the query conditions of the identification card number and the name are input at the same time, and after the query conditions are respectively encrypted, the SQL executed by the database is as follows (assuming that the name query conditions are encrypted as abs $ +% |, the identification card query conditions are encrypted as $ $ +%):
SELECT DISTINCT a.id,a.name FROM user a,user_encrypt b WHERE a.id=b.refId AND(b.encrypt_column='Name'AND b.encrypt_data='abs$%!')AND(b.encrypt_column='Cert_id'AND b.encrypt_data='$$!%%#')
In addition, in order to improve the query efficiency, the method can be used for querying in two steps, wherein the primary key id of the primary table meeting the condition is queried from the encryption auxiliary table in the first step, and the corresponding record is queried from the service table through the id in the second step. The SQL statement is executed as follows:
Step 1:
SELECT DISTINCT b.refId FROM user_encrypt b WHERE b.encrypt_column='Cert_id'AND b.encrypt_data='$$!%%#';
Step 2:
For example, get b.refId value 10000,10001 above, then SQL statement is as follows:
SELECT a.id,a.name FROM user a WHERE a.id IN(‘10000’,’10001’);
It should be noted that the shortest character length (shortest character word segmentation length) of the sensitive field support encryption is configured uniformly for the user, the user can configure different fields with different shortest field lengths according to actual requirements, and the function implementation can be modified by uniform adaptation. The encryption auxiliary storage table can be the same as the original database, and components such as an ES (ES) can be adopted to improve the storage query efficiency, and the naming of the encryption auxiliary storage table is determined by each service system. If the encryption auxiliary storage table is stored in other modes (i.e. is not the same database as the original service table), only a method of firstly inquiring the primary key id of the original table from the auxiliary table and then inquiring records in the original table through the primary key id can be adopted.
The invention encrypts the query condition value input by the user, uses the encryption string to query in the auxiliary table to obtain the primary key id of the original service table, and then queries the service table through the id to obtain the data required by the service. Because the word segmentation encryption comprises all character strings meeting the condition length, accurate query can be directly carried out in the encryption auxiliary table, the encryption field can be used for resume indexing, and the query efficiency is improved.
For the specific content of the steps S21, S22, S25, reference may be made to the corresponding content disclosed in the foregoing embodiment, and no further description is given here.
The method and the device for encrypting the character string comprise the steps of obtaining a character string to be encrypted and a preset shortest character word segmentation length, determining a set of the character string to be encrypted based on the shortest character word segmentation length and the original length of the character string to be encrypted, segmenting the character string to be encrypted based on the set of the character string to be encrypted to obtain a decomposed character string set, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set, replacing the character string to be encrypted in an original information table by using the encrypted character string to obtain an encrypted information table, storing a primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table, receiving an information query request sent by a user side, executing an information query operation, meeting service function requirements, and improving query performance and query efficiency of a system.
Referring to fig. 4, the embodiment of the invention further correspondingly discloses a device for encrypting the character string, which comprises:
The shortest character word segmentation length acquisition module 11 is used for acquiring a character string to be encrypted and a preset shortest character word segmentation length;
A to-be-segmented length set determining module 12, configured to determine a to-be-segmented length set based on the shortest character segmentation length and the original length of the to-be-encrypted character string;
a string segmentation module 13, configured to segment the string to be encrypted based on the set of word length to be segmented, so as to obtain a set of decomposed strings;
a decomposed character string encrypting module 14, configured to encrypt the decomposed character string set by using a preset encrypting algorithm, to obtain an encrypted character string set;
And the encrypted character string storage module 15 is used for storing the main key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table.
The method comprises the steps of obtaining a character string to be encrypted and a preset shortest character word segmentation length, determining a set of the character string to be encrypted based on the shortest character word segmentation length and the original length of the character string to be encrypted, segmenting the character string to be encrypted based on the set of the character string to be encrypted to obtain a decomposed character string set, encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set, and storing a primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table. Therefore, the invention carries out segmentation on the character strings to be encrypted according to different lengths, respectively carries out encryption storage on the decomposed character strings, a user can inquire corresponding information in the encryption auxiliary storage table no matter how long the character strings are input, then inquires corresponding unencrypted information through the main key identification in the newly added encryption auxiliary storage table, adopts the encryption auxiliary table storage to support a fuzzy inquiry scheme, can reduce the invasion of an original table service model, has no obvious influence on the storage space of the original table after encryption, meets the service function requirement, and improves the inquiry performance and the inquiry efficiency of the system.
In some specific embodiments, the shortest character word segmentation length obtaining module 11 specifically includes:
the character string to be encrypted acquisition unit is used for acquiring the character string to be encrypted;
The shortest character word segmentation length acquisition unit is used for acquiring the preset shortest character word segmentation length.
In some specific embodiments, the to-be-segmented length set determining module 12 specifically includes:
the current character word segmentation length obtaining unit is used for adding 1 to the shortest character word segmentation length to obtain the current character word segmentation length;
the current character word segmentation length judging unit is used for judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
The current character word segmentation length judging unit is used for judging that the current character word segmentation length meets a preset character word segmentation rule if the current character word segmentation length is smaller than the original length of the character string to be encrypted;
A current character word segmentation length increasing unit, configured to add 1 to the current character word segmentation length, and reenter the step of determining whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
The word segmentation length determining operation ending unit is used for ending the word segmentation length determining operation if the current character word segmentation length is not smaller than the original length of the character string to be encrypted;
The to-be-segmented length set determining unit is used for determining the shortest character segmentation length, the original length and the current character segmentation length which all meet the preset character segmentation rule as the to-be-segmented length set.
In some specific embodiments, the string segmentation module 13 specifically includes:
The target word segmentation length determining unit is used for determining the target word segmentation length from the to-be-segmented word length set;
A current starting interception position determining unit, configured to take a first character of the character string to be encrypted as a current starting interception position;
the decomposed character string intercepting unit is used for intercepting the decomposed character string with the length being the target word segmentation length from the character string to be encrypted based on the current starting intercepting position;
The device comprises a current starting interception position judging unit, a current ending interception position judging unit and a current ending interception unit, wherein the current starting interception position judging unit is used for judging whether the current starting interception position is smaller than the current ending interception position, and the current ending interception position is obtained by adding 1 to the absolute value of the difference value between the target word segmentation length and the original length;
A current start interception position adding unit, configured to add 1 to the current start interception position if the current start interception position is smaller than the current end interception position, and reenter the step of intercepting the decomposed character string with the length equal to the target word segmentation length from the character string to be encrypted based on the current start interception position;
The character string segmentation operation ending unit is used for ending the current character string segmentation operation if the current starting interception position is not less than the current ending interception position;
the word length set to be segmented judging unit is used for judging whether unused length information exists in the word length set to be segmented;
A length information determining unit, configured to determine, if the unused length information exists in the length set of the word to be segmented, any length information in the unused length information as the target word segmentation length, and reenter the step of taking the first character of the character string to be encrypted as a current starting interception position;
And the decomposed character string set acquisition unit is used for integrating all the decomposed character strings and the character strings to be encrypted corresponding to all the target word segmentation lengths if the unused length information does not exist in the length set of the words to be segmented, so as to obtain the decomposed character string set.
In some embodiments, the decomposed string encryption module 14 specifically includes:
The decomposed character string encryption unit is used for encrypting each decomposed character string in the decomposed character string set by using a preset encryption algorithm so as to obtain a corresponding encrypted decomposed character string;
the encryption character string acquisition unit is used for encrypting the character string to be encrypted by utilizing the preset encryption algorithm so as to obtain a corresponding encryption character string;
the encrypted character string set acquisition unit is used for integrating all the encrypted character strings after encryption and decomposition and the encrypted character strings to obtain the encrypted character string set;
and the encrypted information table acquisition unit is used for replacing the character string to be encrypted in the original information table by the encrypted character string to obtain the encrypted information table.
In some embodiments, the encrypted string storage module 15 specifically includes:
And the encrypted character string storage unit is used for storing the main key identification corresponding to the encrypted character string set and the character string to be encrypted in an encryption auxiliary storage table.
In some embodiments, after the encrypted string storage module 15, the method specifically further includes:
an information inquiry request receiving unit, configured to receive an information inquiry request sent by a user side;
The query index information acquisition unit is used for acquiring the query index information in the information query request;
The encryption index information acquisition unit is used for encrypting the query index information by utilizing the preset encryption algorithm to obtain encryption index information;
A table information inquiry unit configured to inquire table information corresponding to the encryption index information in the encryption auxiliary storage table;
a primary key identifier obtaining unit, configured to obtain the primary key identifier corresponding to the table information if the unique corresponding table information is queried in the encryption auxiliary storage table;
The target information determining unit is used for acquiring corresponding target information from the original information table based on the primary key identification;
and the target information sending unit is used for sending the target information to the user terminal.
Further, the embodiment of the invention also provides electronic equipment. Fig. 5 is a block diagram of an electronic device 20, according to an exemplary embodiment, and is not intended to limit the scope of use of the present invention in any way.
Fig. 5 is a schematic structural diagram of an electronic device 20 according to an embodiment of the present invention. The electronic device 20 may include, in particular, at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input-output interface 25, and a communication bus 26. The memory 22 is configured to store a computer program, which is loaded and executed by the processor 21 to implement the relevant steps in the string encryption method disclosed in any of the foregoing embodiments. In addition, the electronic device 20 in the present embodiment may be specifically an electronic computer.
In this embodiment, the power supply 23 is configured to provide working voltages for each hardware device on the electronic device 20, the communication interface 24 is capable of creating a data transmission channel with an external device for the electronic device 20, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present invention, which is not specifically limited herein, and the input/output interface 25 is configured to obtain external input data or output data to the external device, and the specific interface type of the input/output interface may be selected according to the specific application needs and is not specifically limited herein.
The memory 22 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon may include an operating system 221, a computer program 222, and the like, and the storage may be temporary storage or permanent storage.
The operating system 221 is used for managing and controlling various hardware devices on the electronic device 20 and the computer program 222, which may be Windows Server, netware, unix, linux, etc. The computer program 222 may further include a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the string encryption method performed by the electronic device 20 disclosed in any of the foregoing embodiments.
Further, the embodiment of the invention also discloses a computer readable storage medium, wherein the storage medium stores a computer program, and when the computer program is loaded and executed by a processor, the steps of the character string encryption method disclosed in any embodiment are realized.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The foregoing describes the method, apparatus, device and storage medium for encrypting a character string, and specific examples are provided herein to illustrate the principles and embodiments of the present invention, and the above description of the examples is only for aiding in understanding the method and core concept of the present invention, and meanwhile, to those skilled in the art, according to the concept of the present invention, there are variations in the specific embodiments and application ranges, so the disclosure should not be construed as limiting the invention.
Claims (9)
1. A method for encrypting a character string, comprising:
Acquiring a character string to be encrypted and a preset shortest character word segmentation length, and determining a word segmentation length set based on the shortest character word segmentation length and an original length of the character string to be encrypted, wherein the word segmentation length set comprises the shortest character word segmentation length, the original length, and all lengths between the shortest character word segmentation length and the original length;
Segmenting the character string to be encrypted based on the length set of the word to be segmented to obtain a decomposed character string set;
Encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set;
storing the primary key identification corresponding to the encrypted character string set and the character string to be encrypted into an encryption auxiliary storage table;
after storing the primary key identifier corresponding to the encrypted character string set and the character string to be encrypted in the encryption auxiliary storage table, the method further includes:
receiving an information inquiry request sent by a user side, and acquiring inquiry index information in the information inquiry request;
Encrypting the query index information by using the preset encryption algorithm to obtain encrypted index information;
Inquiring table information corresponding to the encryption index information in the encryption auxiliary storage table;
If the only corresponding table information is queried in the encryption auxiliary storage table, acquiring the primary key identifier corresponding to the table information;
And acquiring corresponding target information from an original information table based on the primary key identification, and sending the target information to the user side.
2. The method for encrypting a character string according to claim 1, wherein said determining a set of word length to be segmented based on the shortest word length and the original length of the character string to be encrypted comprises:
Adding 1 to the shortest character word segmentation length to obtain the current character word segmentation length;
judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
if the current character word segmentation length is smaller than the original length of the character string to be encrypted, judging that the current character word segmentation length meets a preset character word segmentation rule, adding 1 to the current character word segmentation length, and re-entering the step of judging whether the current character word segmentation length is smaller than the original length of the character string to be encrypted;
If the current character word segmentation length is not less than the original length of the character string to be encrypted, ending word segmentation length determining operation;
And determining the shortest character word segmentation length, the original length and the current character word segmentation length which all meet the preset character word segmentation rule as the length set to be segmented.
3. The method for encrypting a character string according to claim 1, wherein said segmenting the character string to be encrypted based on the set of word lengths to be segmented comprises:
Determining a target word segmentation length from the word segmentation length set, and taking the first character of the character string to be encrypted as a current starting interception position;
intercepting the decomposed character string with the length being the target word segmentation length from the character string to be encrypted based on the current starting intercepting position;
Judging whether the current starting interception position is smaller than the current ending interception position, wherein the current ending interception position is obtained by adding 1 to the absolute value of the difference value between the target word segmentation length and the original length;
If the current starting interception position is smaller than the current ending interception position, adding 1 to the current starting interception position, and re-entering the step of intercepting the decomposed character string with the length equal to the target word segmentation length from the character string to be encrypted based on the current starting interception position;
And if the current starting interception position is not smaller than the current ending interception position, ending the current character string segmentation operation.
4. The method for encrypting a character string according to claim 3, wherein after ending the current character string segmentation operation if the current start interception position is not smaller than the current end interception position, further comprising:
Judging whether unused length information exists in the length set of the word to be segmented;
If the unused length information exists in the length set of the word to be segmented, determining any length information in the unused length information as the target word segmentation length, and re-entering the step of taking the first character of the character string to be encrypted as the current starting interception position;
correspondingly, the obtaining the decomposed character string set includes:
If the length information which is not used does not exist in the length set of the word to be segmented, integrating all the decomposed character strings corresponding to all the target word segmentation lengths and the character strings to be encrypted to obtain the decomposed character string set.
5. The method for encrypting a character string according to any one of claims 1 to 4, wherein encrypting the decomposed character string set by using a predetermined encryption algorithm to obtain an encrypted character string set comprises:
encrypting each decomposed character string in the decomposed character string set by using a preset encryption algorithm to obtain a corresponding encrypted decomposed character string;
encrypting the character string to be encrypted by using the preset encryption algorithm to obtain a corresponding encrypted character string;
And integrating all the encrypted and decomposed character strings and the encrypted character strings to obtain the encrypted character string set.
6. The method for encrypting a character string according to claim 5, wherein after encrypting the character string to be encrypted by using the preset encryption algorithm to obtain a corresponding encrypted character string, further comprising:
and replacing the character string to be encrypted in the original information table by using the encrypted character string to obtain an encrypted information table.
7. A character string encryption apparatus, comprising:
The shortest character word segmentation length acquisition module is used for acquiring the character string to be encrypted and the preset shortest character word segmentation length;
The system comprises a to-be-segmented word length set determining module, a to-be-segmented word length set determining module and a to-be-segmented word length setting module, wherein the to-be-segmented word length set determining module is used for determining the to-be-segmented word length set based on the shortest character segmented word length and the original length of the to-be-encrypted character string, and the to-be-segmented word length set comprises the shortest character segmented word length, the original length and all lengths between the shortest character segmented word length and the original length;
The character string segmentation module is used for segmenting the character string to be encrypted based on the length set of the word to be segmented so as to obtain a decomposed character string set;
the decomposed character string encryption module is used for encrypting the decomposed character string set by using a preset encryption algorithm to obtain an encrypted character string set;
the encrypted character string storage module is used for storing the encrypted character string set and the primary key identification corresponding to the character string to be encrypted into an encryption auxiliary storage table;
wherein, the character string encryption device further includes:
an information inquiry request receiving unit, configured to receive an information inquiry request sent by a user side;
The query index information acquisition unit is used for acquiring the query index information in the information query request;
The encryption index information acquisition unit is used for encrypting the query index information by utilizing the preset encryption algorithm to obtain encryption index information;
A table information inquiry unit configured to inquire table information corresponding to the encryption index information in the encryption auxiliary storage table;
a primary key identifier obtaining unit, configured to obtain the primary key identifier corresponding to the table information if the unique corresponding table information is queried in the encryption auxiliary storage table;
the target information determining unit is used for acquiring corresponding target information from the original information table based on the primary key identification;
and the target information sending unit is used for sending the target information to the user terminal.
8. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the character string encryption method according to any one of claims 1 to 6.
9. A computer readable storage medium for storing a computer program, wherein the computer program when executed by a processor implements the character string encryption method according to any one of claims 1 to 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311149950.6A CN117195262B (en) | 2023-09-07 | 2023-09-07 | Character string encryption method, device, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311149950.6A CN117195262B (en) | 2023-09-07 | 2023-09-07 | Character string encryption method, device, equipment and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN117195262A CN117195262A (en) | 2023-12-08 |
| CN117195262B true CN117195262B (en) | 2025-11-21 |
Family
ID=88989910
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311149950.6A Active CN117195262B (en) | 2023-09-07 | 2023-09-07 | Character string encryption method, device, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN117195262B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110019994A (en) * | 2017-11-13 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Data encryption, decryption and querying method, data ciphering and deciphering and inquiry unit |
| CN115292322A (en) * | 2022-08-05 | 2022-11-04 | 中国银行股份有限公司 | Data query method, device, equipment and medium |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110347723A (en) * | 2019-07-12 | 2019-10-18 | 税友软件集团股份有限公司 | A kind of data query method, system and electronic equipment and storage medium |
| US11899698B2 (en) * | 2021-05-28 | 2024-02-13 | Microsoft Technology Licensing, Llc | Wordbreak algorithm with offset mapping |
-
2023
- 2023-09-07 CN CN202311149950.6A patent/CN117195262B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110019994A (en) * | 2017-11-13 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Data encryption, decryption and querying method, data ciphering and deciphering and inquiry unit |
| CN115292322A (en) * | 2022-08-05 | 2022-11-04 | 中国银行股份有限公司 | Data query method, device, equipment and medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN117195262A (en) | 2023-12-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9842132B2 (en) | Bloom filter index for device discovery | |
| US10042875B2 (en) | Bloom filter index for device discovery | |
| CN107704202B (en) | Method and device for quickly reading and writing data | |
| CN110046092B (en) | Experiment shunting method and device, electronic equipment and computer readable storage medium | |
| CN107844488B (en) | Data query method and device | |
| CN114064668A (en) | Method, electronic device and computer program product for storage management | |
| CN111506604A (en) | Method, apparatus and computer program product for accessing data | |
| CN113420241A (en) | Page access method and device, electronic equipment and storage medium | |
| CN113163027B (en) | Data identifier generation method, device, equipment and storage medium | |
| US20240220648A1 (en) | Order-preserving encryption method and apparatus | |
| CN117195262B (en) | Character string encryption method, device, equipment and storage medium | |
| US12476972B2 (en) | Managing access requests for policy-based access control systems in computer networks | |
| JP6233846B2 (en) | Variable-length nonce generation | |
| CN110945506B (en) | Searchable encryption with hybrid index support | |
| CN107979595B (en) | Private data protection method and gateway system | |
| CN116600031B (en) | Message processing method, device, equipment and storage medium | |
| CN115858551B (en) | Memory management method, device, equipment and storage medium based on LDAP | |
| CN118694730A (en) | Control method of sending device, sending device, storage medium and computer product | |
| CN112685451B (en) | Data query processing method, device, computer equipment and storage medium | |
| CN107977381B (en) | Data configuration method, index management method, related device and computing equipment | |
| US8719822B2 (en) | Method and system for storing and referencing partial complex resources using object identifiers in a printing system | |
| CN111159144B (en) | Caching system and method | |
| CN117493721A (en) | Page generation method, page generation device, electronic equipment and computer readable storage medium | |
| CN110866002A (en) | Method and device for processing sub-table data | |
| CN113285933A (en) | User access control method and device, electronic equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |