CN111901099A - Method, system and equipment for encrypting vehicle information - Google Patents
Method, system and equipment for encrypting vehicle information Download PDFInfo
- Publication number
- CN111901099A CN111901099A CN202010550563.3A CN202010550563A CN111901099A CN 111901099 A CN111901099 A CN 111901099A CN 202010550563 A CN202010550563 A CN 202010550563A CN 111901099 A CN111901099 A CN 111901099A
- Authority
- CN
- China
- Prior art keywords
- data
- vehicle information
- encrypted
- target character
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012550 audit Methods 0.000 claims abstract description 41
- 230000008569 process Effects 0.000 claims abstract description 13
- 230000015654 memory Effects 0.000 claims description 18
- 238000007689 inspection Methods 0.000 abstract description 9
- 230000005291 magnetic effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The method comprises the steps of obtaining vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted; processing a target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string; and encrypting the position of the target character and the class character string to generate encrypted data, and sending the encrypted data to a mobile terminal for displaying. Therefore, the safety of the vehicle information data is ensured through a secondary encryption mode, and the display software is arranged to ensure that a user can conveniently obtain the vehicle inspection information.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a method, system, and device for encrypting vehicle information.
Background
In the current automobile inspection and audit process, a user drives to an automobile inspection and audit organization to detect the automobile; the staff of the automobile inspection and audit organization can take pictures of the automobile so as to input automobile information and the appearance photos of the automobile. And after the staff finishes the inspection, warehousing each audit result, and searching the warehoused comparison result by the user. If the comparison result is sent to the mobile terminal of the user, the problem that the vehicle information and the information of the comparison result are not safe due to transmission can be caused, and the information is easy to be intercepted by others.
Disclosure of Invention
An object of the present application is to provide a method, a system and a device for encrypting vehicle information, which solve the problems in the prior art that it is difficult for a user to obtain a vehicle audit result and it is not safe to transmit vehicle audit related information.
According to an aspect of the present application, there is provided a method for encrypting vehicle information, the method including:
acquiring vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted;
processing a target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string;
and encrypting the position of the target character and the class character string to generate encrypted data, and sending the encrypted data to a mobile terminal for displaying.
Further, the acquiring of the vehicle information and the audit result includes:
determining vehicle information according to the acquired picture of the target vehicle;
and determining an auditing result according to the vehicle information.
Further, the processing the target character in the data to be encrypted includes:
and deleting special characters in all target characters in the data to be encrypted.
Further, the recording the position of the target character in the generation process of the class character string includes:
and recording numerical values corresponding to the sequence of the target characters in the data to be encrypted as the positions of the target characters.
Further, the encrypting the position of the target character and the class character string together to generate encrypted data includes:
and merging the position of the target character and the class character string, and then carrying out res encryption processing to generate encrypted data.
Further, the sending the encrypted data to a mobile terminal for display includes:
pulling the encrypted data by using a display application program in the mobile terminal, wherein the display application program carries out rsa decryption processing on the pulled encrypted data to determine vehicle information and an auditing result;
and displaying the vehicle information and the auditing result in the display application program.
Further, the display application program carries out rsa decryption processing on the pulled encrypted data to determine vehicle information and an audit result, and the method comprises the following steps:
the display application program carries out rsa decryption processing on the pulled encrypted data to obtain decrypted data;
and restoring the decrypted data according to the target character and the position of the target character to obtain vehicle information and an auditing result.
According to another aspect of the present application, there is also provided a system for encrypting vehicle information, the system comprising a data acquisition module, a first encryption module, and a second encryption module, wherein:
the data acquisition module is used for acquiring vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted;
the first encryption module is used for processing a target character in the data to be encrypted, generating a similar character string and recording the position of the target character in the generation process of the similar character string;
and the second encryption module is used for encrypting the position of the target character and the similar character string together to generate encrypted data, and sending the encrypted data to the mobile terminal for display.
According to yet another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement a method for encrypting vehicle information as described in any one of the preceding.
According to still another aspect of the present application, there is also provided an apparatus for encrypting vehicle information, wherein the apparatus includes:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of a method for encrypting vehicle information as described in any one of the preceding.
Compared with the prior art, the vehicle information and the audit result are used as the data to be encrypted by acquiring the vehicle information and the audit result; processing a target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string; and encrypting the position of the target character and the class character string to generate encrypted data, and sending the encrypted data to a mobile terminal for displaying. Therefore, the safety of the vehicle information data is ensured through a secondary encryption mode, and the display software is arranged to ensure that a user can conveniently obtain the vehicle inspection information.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a schematic flow chart of a method for encrypting vehicle information provided in accordance with an aspect of the present application;
FIG. 2 illustrates a system framework for encrypting vehicle information in accordance with another aspect of the subject application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 shows a schematic flow diagram of a method for encrypting vehicle information, the method comprising: S11-S13, wherein in the S11, vehicle information and an auditing result are obtained and are used as data to be encrypted; step S12, processing the target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string; and step S13, encrypting the position of the target character and the class character string together to generate encrypted data, and sending the encrypted data to the mobile terminal for display. Therefore, the safety of the vehicle information data is ensured through a secondary encryption mode, and the display software is arranged to ensure that a user can conveniently obtain the vehicle inspection information.
Specifically, in step S11, vehicle information and an audit result are obtained, and the vehicle information and the audit result are used as data to be encrypted. After the vehicle information is acquired by an automobile audit checking authority in a shooting mode or the like, the vehicle information is audited to determine an audit result, wherein the vehicle information includes but is not limited to a vehicle body color, a license plate number, a wheel and an engine model, and the audit result includes that the audit is passed and the audit is not passed. And after the vehicle information and the auditing result are obtained, the vehicle information and the auditing result are used as data to be encrypted to complete subsequent encryption operation.
Step S12, processing the target character in the data to be encrypted, generating a similar character string, and recording the position of the target character in the generation process of the similar character string. Here, the data to be encrypted generally includes letters, numbers and special characters, a similar character string is generated from the data to be encrypted through a preset server, the target character is preferably a special character, vehicle information and an audit result are displayed in a character string mode and the target character is processed to complete first encryption, for example, the target character is deleted, or another character is used to replace the target character to complete first encryption, and the positions of all the special characters are recorded after the similar character string is generated so as to facilitate subsequent second encryption. Note that the special characters are all characters except for letters and numbers.
And step S13, encrypting the position of the target character and the class character string together to generate encrypted data, and sending the encrypted data to the mobile terminal for display. The position of the target character and the similar character string are combined and arranged, then encryption processing is carried out, encrypted data is generated, the encrypted data is sent to a mobile terminal, the encrypted data is decrypted by the mobile terminal and then restored and displayed to the vehicle information and the auditing result, and the timeliness of obtaining the vehicle auditing result by a user is guaranteed by displaying the vehicle information and the auditing result through the mobile terminal.
In a preferred embodiment of the present application, in step S11, vehicle information is determined according to the acquired picture of the target vehicle, wherein the vehicle information includes a vehicle body color, a license plate number, a wheel, and an engine model; and determining an audit result according to the vehicle information, wherein the audit result comprises that the audit is passed and that the audit is not passed. The method comprises the steps of acquiring an appearance picture of a target vehicle through a video recording device or a camera device, for example, pictures obtained by capturing pictures and the like, carrying out picture processing on the appearance picture of the target vehicle to determine vehicle information, for example, determining a license plate number through license plate number character recognition, determining clear vehicle information in a mode of improving picture contrast brightness and the like, comparing whether the vehicle information is consistent with original vehicle information in a library or not, if so, the result of verification is that verification is passed, and if not, the result of verification is that verification is not passed.
In a preferred embodiment of the present application, in step S12, a special character of all target characters in the data to be encrypted is deleted. The special characters in the data to be encrypted are deleted, so that the character length of the generated character string can be reduced, the character string can be stored as a file with a suffix name of java, the character string can be directly stored as a file with a suffix name of java before the target character is not deleted and is encrypted for the first time, the file can be used after the file is stored, and the character string cannot be used even if the file suffix is a java file after the target character is deleted and is stored in a java file format. The subsequent second encryption depends on public key encryption and private key decryption, correct information can be obtained if the private key is lost, but after a target character in the class character string is deleted, original data to be encrypted cannot be directly restored even if the private key is lost, and other people cannot understand the meaning of the class character string after the target character is deleted in an intercepting mode, so that the safety of the data to be encrypted is ensured. And the deleted target character can be replenished in a software end in the mobile equipment, so that the accuracy of subsequent decryption is ensured.
In a preferred embodiment of the present application, in step S12, a numerical value corresponding to the order of the target character in the data to be encrypted is recorded as the position of the target character. In a preferred embodiment of the present application, the character string of the data to be encrypted is:
public class Info { public String name ═ license plate number "; public String value "1234560"; public String code is "12"; }
The method includes the steps that a license plate number, a value (value) corresponding to the license plate number and a mark (public string code) corresponding to the license plate number are arranged to generate a character string, then the positions of all special symbols are recorded, commas are used for separating multiple position values, for example, the numerical value corresponding to the sequence of { "in data to be encrypted is" 17 ", the position of the {" is "17", and so on, the position of the "}" is "96", the position of a space is "6, 12, 23, 30, 48, 55, 78, 85", and the position of the "{" is "31, 55, 82"; "is in the position" 36, 63, 84 ". Then, all the target characters are deleted, and the obtained class character string is as follows:
pubhclassInfopublicStringname "license plate number" publicStringvalue "1234560" publicStringcode "12"
In a preferred embodiment of the present application, in step S13, the position of the target character and the class character string are combined and then re-encrypted to generate encrypted data. Here, the positions of the target characters are arranged with commas separated from each other, and then merged with the class character string, followed by res encryption processing. As in the above embodiment, the encrypted data obtained by merging the position of the target character in the character string and the similar character string and performing res encryption together is:
U2FsdGVkX1+yAps25DQm7TqbrMOBAYG7mDSO08yNsYPETacKWF I6jsy+PhXqdihDIjaPWdC6mNDCwDGYwiOEnrpLLTPsKQNtqLpwmN/idVd p8Lisfyx4dYwRq4y0316hnWysOKEl+b2AUFsvSdctgvWvhSBdTgYAHnsAO DePN8c=。
in a preferred embodiment of the present application, in step S13, the encrypted data is pulled using a display application in the mobile terminal, and the display application performs rsa decryption processing on the pulled encrypted data to determine vehicle information and an audit result; and displaying the vehicle information and the auditing result in the display application program. After the encrypted data is pulled by using a display application program in the mobile terminal, rsa decryption is performed on the encrypted data to obtain a similar character string so as to determine the vehicle information and the auditing result, and the vehicle information and the auditing result are displayed in the display application program so as to ensure that a user can conveniently obtain vehicle inspection information.
In a preferred embodiment of the present application, in step S13, the display application performs rsa decryption processing on the fetched encrypted data, so as to obtain decrypted data; and restoring the decrypted data according to the target character and the position of the target character to obtain vehicle information and an auditing result. Here, the decrypted data is data before res encryption, that is, merged data of the position of the target character and the class character string after the target character is deleted, and the target character in the class character string is restored according to the position of the target character to obtain vehicle information and an audit result. Next to the above embodiment, rsa decryption is performed on the encrypted data, the obtained character string after restoring the target character according to the position of the target character is the character string data shown in fig. 2, the character string is stored in the mobile terminal for local storage, and is renamed to a file with a suffix name of java, and then information type data is determined through reflection processing of java, where the information type data is vehicle information and an audit result.
In another preferred embodiment of the present application, the vehicle information to be encrypted is the license plate number of shanghai C11111, and the corresponding obtained character string is:
public class Info { public String name ═ license plate number "; public String value ═ Shanghai C11111; public String code is 01; }
At this time, if the character string is subjected to target character processing, and the target character is preferably a special character, then the position of "{" is 17, the position of "}" is 97, the position of "space" is 6,18,41,89, and the positions of "{" are 31,86, and "; "positions 36, 99. Then deleting all special characters to obtain a class character string as follows:
publicclassinfopublicStringname ═ license plate number "publicStringvalue ═ Shanghai C11111" publicStringcode ═ 01"
Merging the positions of different special symbols by using "#", merging the positions and the class character strings of all the special symbols by using "- - - - - - - - - - - - - - - - - - - - - - - -, wherein the determined character strings needing res encryption are as follows:
17#97#6,18,41,89#31,86#36# 99-publicclassInfopublicStringname "license plate number" publicStringvalue "Shanghai C11111" publicStringcode "01"
Then, the res encryption processing is performed on the character string that needs to be subjected to res encryption, and the obtained encryption result is: u2FsdGvkX1+ riBlo + ivrEuVph6atbAvz4TzmtBlUSteOxdw/9PEj2 wCbRNAB/kzy
uS/1kXlFdAuCpRV6tVtis3fdywE+FconFP09azo0zTR+m+slklNY604a7 EKP67El
iKtqpeYfmnt4nc2dqFKsBIhRC+LAjU71oWvWNpU88RvH1shhgc0IQev 08eTHN6Gp
XDKhenqQ7Ll2p+AWNglPJA==
The safety of the vehicle information data is ensured through a secondary encryption mode.
Fig. 2 shows a schematic diagram of a system framework for encrypting vehicle information according to another aspect of the present application, the system includes a data acquisition module 11, a first encryption module 12, and a second encryption module 13, wherein: the data acquisition module 11 is configured to acquire vehicle information and an audit result, and use the vehicle information and the audit result as data to be encrypted; the first encryption module 12 is configured to process a target character in the data to be encrypted, generate a similar character string, and record a position of the target character in a generation process of the similar character string; the second encryption module 13 is configured to encrypt the position of the target character and the class character string together to generate encrypted data, and send the encrypted data to the mobile terminal for display. Therefore, the safety of the vehicle information data is ensured through a secondary encryption mode, and the display software is arranged to ensure that a user can conveniently obtain the vehicle inspection information.
It should be noted that the content executed by the data obtaining module 11, the first encryption module 12, and the second encryption module 13 is the same as or corresponding to the content in the above steps S11, S12, and S13, and for brevity, no further description is provided here.
In addition, a computer readable medium is provided in the embodiments of the present application, and has computer readable instructions stored thereon, which can be executed by a processor to implement the aforementioned method for encrypting vehicle information.
According to still another aspect of the present application, there is also provided an apparatus for encrypting vehicle information, wherein the apparatus includes:
one or more processors; and
a memory having computer readable instructions stored thereon that, when executed, cause the processor to perform the operations of one of the methods for encrypting vehicle information described previously.
For example, the computer readable instructions, when executed, cause the one or more processors to:
acquiring vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted; processing a target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string; and encrypting the position of the target character and the class character string to generate encrypted data, and sending the encrypted data to a mobile terminal for displaying.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (10)
1. A method for encrypting vehicle information, wherein the method comprises:
acquiring vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted;
processing a target character in the data to be encrypted to generate a similar character string, and recording the position of the target character in the generation process of the similar character string;
and encrypting the position of the target character and the class character string to generate encrypted data, and sending the encrypted data to a mobile terminal for displaying.
2. The method of claim 1, wherein the obtaining vehicle information and audit results comprises:
determining vehicle information according to the acquired picture of the target vehicle;
and determining an auditing result according to the vehicle information.
3. The method of claim 1, wherein the processing the target character in the data to be encrypted comprises:
and deleting special characters in all target characters in the data to be encrypted.
4. The method of claim 1, wherein said recording the location of the target character during the generation of the class string comprises:
and recording numerical values corresponding to the sequence of the target characters in the data to be encrypted as the positions of the target characters.
5. The method according to claim 1, wherein the encrypting the position of the target character and the class string together to generate encrypted data comprises:
and merging the position of the target character and the class character string, and then carrying out res encryption processing to generate encrypted data.
6. The method of claim 1, wherein the sending the encrypted data to a mobile terminal for display comprises:
pulling the encrypted data by using a display application program in the mobile terminal, wherein the display application program carries out rsa decryption processing on the pulled encrypted data to determine vehicle information and an auditing result;
and displaying the vehicle information and the auditing result in the display application program.
7. The method of claim 1, wherein the display application rsa decrypts the pulled encrypted data to determine vehicle information and an audit result, comprising:
the display application program carries out rsa decryption processing on the pulled encrypted data to obtain decrypted data;
and restoring the decrypted data according to the target character and the position of the target character to obtain vehicle information and an auditing result.
8. A system for encrypting vehicle information, wherein the system comprises a data acquisition module, a first encryption module, and a second encryption module, wherein:
the data acquisition module is used for acquiring vehicle information and an audit result, and taking the vehicle information and the audit result as data to be encrypted;
the first encryption module is used for processing a target character in the data to be encrypted, generating a similar character string and recording the position of the target character in the generation process of the similar character string;
and the second encryption module is used for encrypting the position of the target character and the similar character string together to generate encrypted data, and sending the encrypted data to the mobile terminal for display.
9. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 7.
10. An apparatus for encrypting vehicle information, wherein the apparatus comprises:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 7.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010550563.3A CN111901099A (en) | 2020-06-16 | 2020-06-16 | Method, system and equipment for encrypting vehicle information |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010550563.3A CN111901099A (en) | 2020-06-16 | 2020-06-16 | Method, system and equipment for encrypting vehicle information |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111901099A true CN111901099A (en) | 2020-11-06 |
Family
ID=73207693
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010550563.3A Pending CN111901099A (en) | 2020-06-16 | 2020-06-16 | Method, system and equipment for encrypting vehicle information |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111901099A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114091071A (en) * | 2021-11-24 | 2022-02-25 | 中海油能源发展股份有限公司 | Data encryption protection method based on filling type information |
| CN114491624A (en) * | 2021-12-31 | 2022-05-13 | 钉钉(中国)信息技术有限公司 | Data desensitization and restoration method and device |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
| CN105591737A (en) * | 2016-01-27 | 2016-05-18 | 浪潮(北京)电子信息产业有限公司 | Data encryption, decryption and transmission methods and systems |
| WO2016086788A1 (en) * | 2014-12-02 | 2016-06-09 | 阿里巴巴集团控股有限公司 | Method and apparatus for encrypting/decrypting data on mobile terminal |
| US20170078251A1 (en) * | 2015-09-11 | 2017-03-16 | Skyhigh Networks, Inc. | Wildcard search in encrypted text using order preserving encryption |
| CN108090329A (en) * | 2018-01-17 | 2018-05-29 | 上海海笛数字出版科技有限公司 | A kind of method and device that digital watermarking encipherment protection is carried out to content of text |
| CN109617680A (en) * | 2018-12-06 | 2019-04-12 | 中国移动通信集团福建有限公司 | Encryption method, apparatus, equipment and medium |
| CN109919766A (en) * | 2019-02-19 | 2019-06-21 | 上海市张江公证处 | Data deposit card and verify the method and terminal, server of trade user authenticity |
-
2020
- 2020-06-16 CN CN202010550563.3A patent/CN111901099A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
| WO2016086788A1 (en) * | 2014-12-02 | 2016-06-09 | 阿里巴巴集团控股有限公司 | Method and apparatus for encrypting/decrypting data on mobile terminal |
| US20170078251A1 (en) * | 2015-09-11 | 2017-03-16 | Skyhigh Networks, Inc. | Wildcard search in encrypted text using order preserving encryption |
| CN105591737A (en) * | 2016-01-27 | 2016-05-18 | 浪潮(北京)电子信息产业有限公司 | Data encryption, decryption and transmission methods and systems |
| CN108090329A (en) * | 2018-01-17 | 2018-05-29 | 上海海笛数字出版科技有限公司 | A kind of method and device that digital watermarking encipherment protection is carried out to content of text |
| CN109617680A (en) * | 2018-12-06 | 2019-04-12 | 中国移动通信集团福建有限公司 | Encryption method, apparatus, equipment and medium |
| CN109919766A (en) * | 2019-02-19 | 2019-06-21 | 上海市张江公证处 | Data deposit card and verify the method and terminal, server of trade user authenticity |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114091071A (en) * | 2021-11-24 | 2022-02-25 | 中海油能源发展股份有限公司 | Data encryption protection method based on filling type information |
| CN114491624A (en) * | 2021-12-31 | 2022-05-13 | 钉钉(中国)信息技术有限公司 | Data desensitization and restoration method and device |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108985081B (en) | Watermark encryption method, device, medium and electronic equipment | |
| CN107122297B (en) | Method and equipment for generating request message of test interface | |
| US8904184B2 (en) | Certification of authenticity of media signals | |
| CN112148571B (en) | Webpage operation process recording and playback method and device | |
| US20160171205A1 (en) | Integrity for security audit logs | |
| Saltaformaggio et al. | Vcr: App-agnostic recovery of photographic evidence from android device memory images | |
| US11501016B1 (en) | Digital password protection | |
| Fowler | SQL server forenisc analysis | |
| CN111708680A (en) | Error reporting information analysis method and device, electronic equipment and storage medium | |
| CN111901099A (en) | Method, system and equipment for encrypting vehicle information | |
| KR20220048700A (en) | Electronic document management server that supports security settings for some content embedded in electronic documents based on member identification information and operating method thereof | |
| CN112115436B (en) | AD domain account password modification method and device | |
| CN115348472A (en) | Video recognition method, device, readable medium and electronic equipment | |
| US8327150B2 (en) | System, method and program for managing information | |
| CN114925337A (en) | Data labeling method and device and electronic equipment | |
| CN109729076B (en) | Data desensitization and inverse desensitization method and device, storage medium and terminal | |
| CN120012055A (en) | Document tracing method, device, computer equipment and medium based on dark watermark | |
| CN116821941B (en) | Data encryption and decryption method, device, equipment and storage medium | |
| KR102513228B1 (en) | Electronic apparatus that can automatically convert and migrate the display format of data according to data conversion rules and the operating method thereof | |
| CN111582954B (en) | False data identification method and device | |
| JP7521871B2 (en) | Event log tamper resistance | |
| CN110807640A (en) | Method and device for recording copyright information | |
| US20230409754A1 (en) | Method for certifying the authenticity of digital files generated by a communication device | |
| CN120492407B (en) | Data change capturing method, system, device, medium and program product | |
| US20210240956A1 (en) | Systems and methods for encoding executable code in barcodes |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20201106 |