[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN117762994A - Data query method, device, electronic equipment and storage medium - Google Patents

Data query method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117762994A
CN117762994A CN202311810415.0A CN202311810415A CN117762994A CN 117762994 A CN117762994 A CN 117762994A CN 202311810415 A CN202311810415 A CN 202311810415A CN 117762994 A CN117762994 A CN 117762994A
Authority
CN
China
Prior art keywords
target
query
encrypted
data
replacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311810415.0A
Other languages
Chinese (zh)
Inventor
李永明
于鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202311810415.0A priority Critical patent/CN117762994A/en
Publication of CN117762994A publication Critical patent/CN117762994A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明提供一种数据查询方法、装置、电子设备及存储介质,包括:响应于业务数据查询请求,对加密查询关键字进行解密;对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串;基于目标加密字符串进行数据库匹配查询。本发明通过将传统脱敏存储敏感信息替换为字符替换加密存储敏感信息的方式,实现加密敏感信息支持完全模糊搜索的目的,确保后端数据库模糊搜索结果更加准确;通过前端发送加密查询关键字、后端解密出目标查询关键字的方式,确保前后端之间信息传输的安全性,大幅提高了查询结果的准确性和前后端之间信息传输的安全性,降低了用户敏感信息的泄露风险,提高了用户对敏感信息搜索的体验度。

The invention provides a data query method, device, electronic equipment and storage medium, which include: decrypting the encrypted query keyword in response to a business data query request; performing character replacement encryption processing on the decrypted target query keyword to determine the target Query the target encrypted string corresponding to the keyword; perform database matching query based on the target encrypted string. By replacing traditional desensitized storage of sensitive information with character replacement and encrypted storage of sensitive information, the present invention achieves the purpose of supporting complete fuzzy search on encrypted sensitive information, ensuring more accurate fuzzy search results in the back-end database; sending encrypted query keywords through the front-end, The way the backend decrypts the target query keywords ensures the security of information transmission between the front and back ends, greatly improves the accuracy of query results and the security of information transmission between the front and back ends, and reduces the risk of leaking user sensitive information. Improved user experience when searching for sensitive information.

Description

数据查询方法、装置、电子设备及存储介质Data query method, device, electronic equipment and storage medium

技术领域Technical field

本发明涉及计算机技术领域,尤其涉及一种数据查询方法、装置、电子设备及存储介质。The present invention relates to the field of computer technology, and in particular, to a data query method, device, electronic equipment and storage medium.

背景技术Background technique

为了保障用户敏感信息(例如用户的手机号码、身份证号码和银行账号等)的隐私安全以及支持用户对敏感信息的查询操作,大多数企业会脱敏存储敏感信息;以此实现在支持查询敏感信息的情况下,降低因黑客入侵导致的敏感信息泄露风险。In order to protect the privacy and security of users' sensitive information (such as users' mobile phone numbers, ID numbers, bank account numbers, etc.) and to support users' query operations on sensitive information, most companies will desensitize and store sensitive information; in this way, they can support querying sensitive information. information, reducing the risk of sensitive information leakage caused by hackers.

然而,脱敏存储虽然降低了敏感信息泄露风险,但是对敏感信息的查询支持并不友好,无法对脱敏部分的信息进行匹配查询,从而大幅降低了查询结果的准确性。However, although desensitized storage reduces the risk of sensitive information leakage, it is not friendly to the query support of sensitive information and cannot match the desensitized part of the information, thus greatly reducing the accuracy of the query results.

发明内容Contents of the invention

本发明提供一种数据查询方法、装置、电子设备及存储介质,用以解决现有技术中无法对脱敏存储的敏感信息中的脱敏部分信息进行匹配查询所导致的敏感信息查询结果的准确性降低的缺陷,通过将传统脱敏存储敏感信息替换为字符替换加密存储敏感信息的方式,实现加密敏感信息支持完全模糊搜索的目的,确保后端数据库模糊搜索结果更加准确;通过前端发送加密查询关键字、后端解密出目标查询关键字的方式,确保前后端之间信息传输的安全性,大幅提高了查询结果的准确性和前后端之间信息传输的安全性,同时也有效降低了用户敏感信息的泄露风险,提高了用户对敏感信息搜索的体验度。The present invention provides a data query method, device, electronic equipment and storage medium to solve the problem of accurate query results of sensitive information caused by the inability in the prior art to match the desensitized part of the information in the desensitized stored sensitive information. By replacing the traditional desensitized storage of sensitive information with the character replacement method of encrypted storage of sensitive information, the purpose of encrypted sensitive information supporting fully fuzzy search is achieved, ensuring that the back-end database fuzzy search results are more accurate; sending encrypted queries through the front-end Keywords and the way the backend decrypts the target query keywords ensure the security of information transmission between the front and back ends, greatly improving the accuracy of query results and the security of information transmission between the front and back ends, while also effectively reducing the user's The risk of sensitive information leakage improves the user experience of searching for sensitive information.

本发明提供一种数据查询方法,包括:The present invention provides a data query method, comprising:

响应于业务数据查询请求,对加密查询关键字进行解密;In response to the business data query request, decrypt the encrypted query keyword;

对解密所得的目标查询关键字进行字符替换加密处理,确定所述目标查询关键字对应的目标加密字符串;Perform character replacement encryption processing on the decrypted target query keyword, and determine the target encrypted string corresponding to the target query keyword;

基于所述目标加密字符串进行数据库匹配查询。A database matching query is performed based on the target encrypted string.

根据本发明提供的一种数据查询方法,所述对解密所得的目标查询关键字进行字符替换加密处理,确定所述目标查询关键字对应的目标加密字符串,包括:According to a data query method provided by the present invention, the decrypted target query keyword is subjected to character replacement encryption processing, and the target encrypted string corresponding to the target query keyword is determined, including:

基于预设的查询关键字-替换字符串之间的映射关系,确定所述目标查询关键字各自对应的目标替换字符串;Based on the preset mapping relationship between query keywords and replacement strings, determine the target replacement strings corresponding to each of the target query keywords;

按照所述目标查询关键字的顺序,对各目标替换字符串进行排列,确定所述目标查询关键字对应的目标加密字符串。Arrange each target replacement string according to the order of the target query keyword, and determine the target encrypted string corresponding to the target query keyword.

根据本发明提供的一种数据查询方法,基于所述目标加密字符串进行数据库匹配查询,包括:According to a data query method provided by the present invention, database matching query is performed based on the target encrypted string, including:

在所述业务数据查询请求为前端网页请求查询目标用户的业务数据的情况下,基于数据库预先存储的用户业务行数据中替换字符串之前和/或之后插入的混淆字符长度,确定正则匹配表达式;When the business data query request is a front-end web page request to query the business data of the target user, the regular matching expression is determined based on the length of obfuscated characters inserted before and/or after the replacement string in the user's business row data pre-stored in the database. ;

基于所述正则匹配表达式进行数据库匹配查询。Database matching query is performed based on the regular matching expression.

根据本发明提供的一种数据查询方法,所述方法还包括:According to a data query method provided by the present invention, the method further includes:

针对待存储的各用户的敏感信息,基于预设的查询关键字-替换字符串之间的映射关系,确定所述用户的敏感信息中的查询关键字以及所述查询关键字对应的替换字符串,并在所述替换字符串之前和/或之后分别插入预先配置的目标混淆字符串,确定所述用户的加密敏感信息;For the sensitive information of each user to be stored, the query keyword in the user's sensitive information and the replacement string corresponding to the query keyword are determined based on the preset mapping relationship between the query keyword and the replacement string. , and insert a pre-configured target obfuscation string before and/or after the replacement string to determine the user's encrypted sensitive information;

基于各所述用户各自的加密敏感信息以及各所述用户各自的业务数据,构建所述用户业务数据列表;所述用户业务数据列表中含有的用户业务行数据的数量与待存储的用户的数量相同。Construct the user business data list based on the encrypted sensitive information of each user and the business data of each user; the number of user business row data contained in the user business data list and the number of users to be stored same.

根据本发明提供的一种数据查询方法,所述方法还包括:According to a data query method provided by the present invention, the method further includes:

针对各目标混淆字符串,从预设的所有查询关键字各自对应的替换字符串中确定符合混淆字符长度需求的所述目标混淆字符串。For each target confusion string, determine the target confusion string that meets the length requirements of the confusion characters from the replacement strings corresponding to all preset query keywords.

根据本发明提供的一种数据查询方法,所述方法还包括:According to a data query method provided by the present invention, the method further includes:

针对各目标混淆字符串,从预设的不同类型字符中随机生成符合混淆字符长度需求的所述目标混淆字符串。For each target confusion string, the target confusion string that meets the length requirements of the confusion characters is randomly generated from preset different types of characters.

根据本发明提供的一种数据查询方法,所述方法还包括:According to a data query method provided by the present invention, the method further includes:

针对各目标混淆字符串,基于预设的所有查询关键字各自对应的替换字符串和不同类型字符确定符合混淆字符长度需求的所述目标混淆字符串。For each target confusion string, the target confusion string that meets the length requirements of the confusion characters is determined based on the replacement strings and different types of characters corresponding to all preset query keywords.

根据本发明提供的一种数据查询方法,所述方法还包括:According to a data query method provided by the present invention, the method further includes:

在查询到至少一个所述目标业务数据的情况下,对查询到的至少一个所述目标业务数据进行加密,并将加密所得到的目标加密业务数据反馈至所述前端网页;When at least one of the target business data is queried, encrypt the at least one of the queried target business data, and feed back the encrypted target encrypted business data to the front-end web page;

在未查询到所述目标业务数据的情况下,向所述前端网页反馈查询失败的提示信息。When the target business data is not queried, a prompt message indicating that the query failed is fed back to the front-end web page.

本发明还提供一种数据查询装置,包括:The invention also provides a data query device, including:

数据解密模块,用于响应于业务数据查询请求,对加密查询关键字进行解密;The data decryption module is used to decrypt encrypted query keywords in response to business data query requests;

替换加密模块,用于对解密所得的目标查询关键字进行字符替换加密处理,确定所述目标查询关键字对应的目标加密字符串;A replacement encryption module, used to perform character replacement encryption processing on the decrypted target query keyword, and determine the target encrypted string corresponding to the target query keyword;

数据查询模块,用于基于所述目标加密字符串进行数据库匹配查询。A data query module is used to perform database matching query based on the target encrypted string.

本发明还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如上述任一种所述数据查询方法。The present invention also provides an electronic device, including a memory, a processor and a computer program stored in the memory and executable on the processor. When the processor executes the program, it implements any of the above data query methods. .

本发明还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如上述任一种所述数据查询方法。The present invention also provides a non-transitory computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, it implements any one of the above data query methods.

本发明提供的数据查询方法、装置、电子设备及存储介质,其中数据查询方法,后端服务器在响应业务数据查询请求时,首先对加密查询关键字进行解密,并对解密所得的目标查询关键字进行字符替换加密处理,再进一步基于字符替换加密处理所得到的目标加密字符串进行数据库匹配查询。这样,通过将传统脱敏存储敏感信息替换为字符替换加密存储敏感信息的方式,实现加密敏感信息支持完全模糊搜索的目的,确保后端数据库模糊搜索结果更加准确;进一步的,通过前端发送加密查询关键字、后端解密出目标查询关键字的方式,确保前后端之间信息传输的安全性,大幅提高了查询结果的准确性和前后端之间信息传输的安全性,同时也有效降低了用户敏感信息的泄露风险,提高了用户对敏感信息搜索的体验度。In the data query method, device, electronic equipment and storage medium provided by the present invention, in the data query method, when the back-end server responds to the business data query request, it first decrypts the encrypted query keyword, and then decrypts the decrypted target query keyword. Carry out character replacement encryption processing, and further perform database matching query based on the target encrypted string obtained by the character replacement encryption processing. In this way, by replacing traditional desensitized storage of sensitive information with character replacement encrypted storage of sensitive information, the purpose of encrypted sensitive information supporting complete fuzzy search is achieved, ensuring that the back-end database fuzzy search results are more accurate; further, encrypted queries are sent through the front-end Keywords and the way the backend decrypts the target query keywords ensure the security of information transmission between the front and back ends, greatly improving the accuracy of query results and the security of information transmission between the front and back ends, while also effectively reducing the user's The risk of sensitive information leakage improves the user experience of searching for sensitive information.

附图说明Description of the drawings

为了更清楚地说明本发明或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the present invention or the technical solutions in the prior art more clearly, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below. Obviously, the drawings in the following description are of the present invention. For some embodiments of the invention, those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts.

图1是本发明提供的数据查询方法的流程示意图;Figure 1 is a schematic flow chart of the data query method provided by the present invention;

图2是本发明提供的数据查询装置的结构示意图;Figure 2 is a schematic structural diagram of the data query device provided by the present invention;

图3是本发明提供的电子设备的结构示意图。Figure 3 is a schematic structural diagram of the electronic device provided by the present invention.

具体实施方式Detailed ways

为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明中的附图,对本发明中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the present invention more clear, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the scope of protection of the present invention.

在本发明的实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。在本发明的文字描述中,字符“/”一般表示前后关联对象是一种“或”的关系。此外,需要说明的是,本发明中为描述的对象所编序号本身,例如“第一”、“第二”等,仅用于区分所描述的对象,不具有任何顺序或技术含义。In the embodiment of the present invention, "at least one" refers to one or more, and "multiple" refers to two or more. "And/or" describes the relationship between associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist simultaneously, and B exists alone, where A and B can be singular or plural. In the text description of the present invention, the character "/" generally indicates that the related objects are in an "or" relationship. In addition, it should be noted that the serial numbers assigned to the described objects in the present invention, such as "first", "second", etc., are only used to distinguish the described objects and do not have any order or technical meaning.

为了保障用户敏感信息(例如用户的手机号码、身份证号码和银行账号等)的隐私安全,大多数企业会加密存储敏感信息;以此实现在支持用户查询敏感信息的情况下,降低因黑客入侵导致的敏感信息泄露风险。但是,为了支持用户对敏感信息的查询操作,有的企业会选择对敏感信息进行加密存储的同时还会将敏感信息脱敏存储一份;还有企业会选择以明文方式存储用户的敏感信息。In order to protect the privacy and security of users' sensitive information (such as users' mobile phone numbers, ID numbers, bank account numbers, etc.), most companies will encrypt and store sensitive information; in this way, they can reduce the risk of hacker intrusions while supporting users to query sensitive information. Risk of leakage of sensitive information. However, in order to support users' query operations on sensitive information, some companies will choose to encrypt and store sensitive information and also desensitize and store a copy of the sensitive information; some companies will choose to store users' sensitive information in clear text.

然而,虽然以明文形式存储敏感数据能支持精确匹配查询,但是敏感信息泄露风险极大;加密存储的敏感信息由于经过解密可以得到原始的敏感信息,也容易造成用户敏感信息泄露;脱敏存储的敏感信息虽然在一定程度上支持模糊匹配搜索且降低敏感信息泄露风险,但是对敏感信息的查询支持不友好,无法对脱敏部分的信息进行匹配查询,从而大幅降低了查询结果的准确性。因此,如何实现如同明文形式存储敏感信息且支持任意匹配查询就显得尤为重要。However, although storing sensitive data in plain text can support accurate matching queries, the risk of leakage of sensitive information is extremely high. Since the original sensitive information can be obtained through decryption of encrypted and stored sensitive information, it is also easy to leak the user's sensitive information; desensitized storage Although sensitive information supports fuzzy matching search to a certain extent and reduces the risk of sensitive information leakage, the query support for sensitive information is not friendly, and the desensitized part of the information cannot be matched and queried, thus greatly reducing the accuracy of the query results. Therefore, how to store sensitive information as plain text and support arbitrary matching queries is particularly important.

为解决上述技术问题,本发明提供一种数据查询方法、装置、电子设备及存储介质,下面结合图1-图3描述本发明的数据查询方法、装置、电子设备及存储介质,其中数据查询方法的后端服务器,后端服务器可以是一台服务器,也可以是由多台服务器构成的服务器集群、云计算中心等等;并且,后端服务器至少具备加解密功能、数据存储功能、列表构建功能和匹配查询功能。本发明对后端服务器的具体形式不做限定。进一步的,数据查询方法还可以应用于设置在后端服务器中的数据查询装置中,该数据查询装置可以通过软件、硬件或两者的结合来实现。下面以该数据查询方法的执行主体为后端服务器为例,对该数据查询方法进行描述。In order to solve the above technical problems, the present invention provides a data query method, device, electronic device and storage medium. The data query method, device, electronic device and storage medium of the present invention will be described below with reference to Figures 1-3. The data query method The back-end server can be a single server, or a server cluster composed of multiple servers, a cloud computing center, etc.; and, the back-end server at least has encryption and decryption functions, data storage functions, and list building functions. and matching query functions. The present invention does not limit the specific form of the backend server. Furthermore, the data query method can also be applied to a data query device provided in the back-end server. The data query device can be implemented by software, hardware, or a combination of both. The following describes the data query method by taking the execution subject of the data query method as the back-end server as an example.

为了便于理解本发明实施例提供的数据查询方法,下面,将通过下述几个示例地实施例对本发明提供的数据查询方法进行详细地说明。可以理解的是,下面这几个示例地实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例不再赘述。In order to facilitate understanding of the data query method provided by the embodiments of the present invention, below, the data query method provided by the present invention will be described in detail through the following exemplary embodiments. It can be understood that the following exemplary embodiments can be combined with each other, and the same or similar concepts or processes may not be described again in some embodiments.

参照图1,为本发明实施例提供的数据查询方法的流程示意图,如图1所示,该数据查询方法包括如下步骤110~步骤130。Referring to Figure 1, a schematic flow chart of a data query method provided by an embodiment of the present invention is shown. As shown in Figure 1, the data query method includes the following steps 110 to 130.

步骤110、响应于业务数据查询请求,对加密查询关键字进行解密。Step 110: In response to the business data query request, decrypt the encrypted query keyword.

其中,业务数据查询请求可以是用户在前端网页输入目标查询关键字时自动生成的查询请求,并且前端网页在检测到用户输入的目标查询关键字时,为了确保传输安全性,可以对该目标查询关键字进行加密,并将加密后所得到的加密查询关键字以业务数据查询请求的方式传输至后端服务器。前端网页采用的加密方式可以包括但不限定数据加密标准(Data Encryption Standard,DES)算法和国际数据加密算法(International DataEncryption Algorithm,IDEA)等其它可逆加密算法中的一个。Among them, the business data query request can be a query request automatically generated when the user enters the target query keyword on the front-end web page, and when the front-end web page detects the target query keyword input by the user, in order to ensure transmission security, the target query can be The keywords are encrypted, and the encrypted query keywords obtained after encryption are transmitted to the back-end server in the form of business data query requests. The encryption method used by the front-end web page may include but is not limited to one of other reversible encryption algorithms such as the Data Encryption Standard (DES) algorithm and the International Data Encryption Algorithm (IDEA).

此处的目标查询关键字,可以为待查询业务数据对应目标用户的目标敏感信息中的关键字,具体可以为文字或者明文数值;当目标查询关键字为文字时,文字的数量至少为1个,例如姓名中的姓或者名,也可以是家庭住址中的**省、**市或者**区等;当目标查询关键字为明文数值时,明文数值的数量可以为至少两个,例如明文数值可以为身份证号码、证件号或者银行卡号中的至少两个数字。本发明对此不作具体限定。The target query keyword here can be a keyword in the target sensitive information of the target user corresponding to the business data to be queried. Specifically, it can be a text or a plain text value; when the target query keyword is text, the number of words must be at least 1. , such as the surname or first name in the name, or the **province, **city, or **district in the home address; when the target query keyword is a plaintext value, the number of plaintext values can be at least two, for example The plain text value can be at least two digits from the ID number, document number or bank card number. The present invention does not specifically limit this.

具体的,在步骤110中,当后端服务器接收到前端网页发送的业务数据查询请求时,会即刻响应该业务数据查询请求,也即对加密查询关键字进行解密;此处采用的解密方式可以基于前端网页采用的加密方式确定;例如,当前端网页使用DES算法对加密查询关键字进行加密时,后端服务器可以使用与DES加密对应的密钥对加密查询关键字进行解密。此外,若后端服务器预先与前端网页之间约定好加解密方式以及加解密密钥的获取方式的情况下,后端服务器也可以按照约定先获取解密密钥,并使用获取的解密密钥对加密查询关键字进行解密。本发明对此不作具体限定。Specifically, in step 110, when the back-end server receives the business data query request sent by the front-end web page, it will immediately respond to the business data query request, that is, decrypt the encrypted query keyword; the decryption method used here can be Determined based on the encryption method used by the front-end web page; for example, when the front-end web page uses the DES algorithm to encrypt the encrypted query keyword, the back-end server can use the key corresponding to DES encryption to decrypt the encrypted query keyword. In addition, if the back-end server has agreed upon the encryption and decryption methods and the method of obtaining the encryption and decryption keys with the front-end web page in advance, the back-end server can also obtain the decryption key according to the agreement and use the obtained decryption key pair Encrypted query keyword for decryption. The present invention does not specifically limit this.

步骤120、对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串。Step 120: Perform character replacement encryption processing on the decrypted target query keyword to determine the target encrypted string corresponding to the target query keyword.

具体的,在步骤120中,后端服务器对于解密所得到的目标查询关键字,可以采用预先定义的字符替换规则,对目标查询关键字进行字符替换加密处理,也即,当目标查询关键字为文字时,可以采用预先配置的文字-字符之间的映射关系,将每个目标查询关键字替换为对应的目标字符;当目标查询关键字为明文数值时,可以采用预先配置的明文数值-字符之间的映射关系,将每个目标查询关键字替换为对应的目标字符;当目标查询关键为至少1个文字和至少1个明文数值的组合时,可以采用预先配置的文字-明文数值-字符之间的映射关系,将每个目标查询关键字替换为对应的目标字符;以此方式对目标查询关键字进行字符替换加密处理,从而确定目标查询关键字对应的目标加密字符串。Specifically, in step 120, the back-end server can use predefined character replacement rules to perform character replacement encryption processing on the target query keyword obtained by decrypting it. That is, when the target query keyword is When text is used, the preconfigured text-character mapping relationship can be used to replace each target query keyword with the corresponding target character; when the target query keyword is a plaintext value, the preconfigured plaintext value-character can be used The mapping relationship between each target query keyword is replaced with the corresponding target character; when the target query key is a combination of at least 1 text and at least 1 plaintext value, the preconfigured text-plaintext value-character can be used The mapping relationship between each target query keyword is replaced with the corresponding target character; in this way, the target query keyword is subjected to character replacement encryption processing, thereby determining the target encrypted string corresponding to the target query keyword.

需要说明的是,预先为每个文字和/或每个明文数值配置的可替换的字符,可以为大写字母、小写字母、标点符号、下划线和特殊字符中的至少一个。此处不作具体限定。It should be noted that the replaceable characters configured in advance for each text and/or each plaintext value can be at least one of uppercase letters, lowercase letters, punctuation marks, underlines and special characters. There are no specific limitations here.

步骤130、基于目标加密字符串进行数据库匹配查询。Step 130: Perform database matching query based on the target encrypted string.

具体的,在步骤130中,后端服务器在其数据库中预先存储有含有不同加密字符串的不同加密敏感信息,每个加密敏感信息分别与对应用户的业务数据之间具备映射关系。基于此,后端服务器在响应于业务数据查询请求并确定出目标加密字符串时,可以基于该目标加密字符串进行数据库匹配查询,以确定数据库中是否存在含有目标加密字符串的目标加密敏感信息所对应的目标业务数据。Specifically, in step 130, the backend server pre-stores different encrypted sensitive information containing different encrypted strings in its database, and each encrypted sensitive information has a mapping relationship with the corresponding user's business data. Based on this, when the backend server responds to the business data query request and determines the target encrypted string, it can perform a database matching query based on the target encrypted string to determine whether there is target encrypted sensitive information containing the target encrypted string in the database. The corresponding target business data.

本发明实施例提供的数据查询方法,后端服务器在响应业务数据查询请求时,首先对加密查询关键字进行解密,并对解密所得的目标查询关键字进行字符替换加密处理,再进一步基于字符替换加密处理所得到的目标加密字符串进行数据库匹配查询。这样,通过将传统脱敏存储敏感信息替换为字符替换加密存储敏感信息的方式,实现加密敏感信息支持完全模糊搜索的目的,确保后端数据库模糊搜索结果更加准确;进一步的,通过前端发送加密查询关键字、后端解密出目标查询关键字的方式,确保前后端之间信息传输的安全性,大幅提高了查询结果的准确性和前后端之间信息传输的安全性,同时也有效降低了用户敏感信息的泄露风险,提高了用户对敏感信息搜索的体验度。In the data query method provided by the embodiment of the present invention, when the back-end server responds to a business data query request, it first decrypts the encrypted query keyword, performs character replacement encryption processing on the decrypted target query keyword, and then further performs character replacement based on character replacement. The target encrypted string obtained by encryption processing is used for database matching query. In this way, by replacing traditional desensitized storage of sensitive information with character replacement encrypted storage of sensitive information, the purpose of encrypted sensitive information supporting complete fuzzy search is achieved, ensuring that the back-end database fuzzy search results are more accurate; further, encrypted queries are sent through the front-end Keywords and the way the backend decrypts the target query keywords ensure the security of information transmission between the front and back ends, greatly improving the accuracy of query results and the security of information transmission between the front and back ends, while also effectively reducing the user's The risk of sensitive information leakage improves the user experience of searching for sensitive information.

基于上述图1所示的数据查询方法,在一种示例实施例中,当后端服务器预先与前端网页之间约定用户可输入的所有类型的查询关键字时,后端服务器可以为所有类型的查询关键字预先配置各自对应的替换字符串,以便于后续解密出目标查询关键字时可以快速确定对应的目标加密字符串。基于此,步骤120的具体实现过程可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, when the back-end server agrees with the front-end web page in advance on all types of query keywords that the user can input, the back-end server can provide all types of query keywords that the user can input. The query keywords are pre-configured with their corresponding replacement strings, so that the corresponding target encrypted string can be quickly determined when the target query keyword is subsequently decrypted. Based on this, the specific implementation process of step 120 may include:

首先,基于预设的查询关键字-替换字符串之间的映射关系,确定目标查询关键字各自对应的目标替换字符串;再进一步的,按照目标查询关键字的顺序,对各目标替换字符串进行排列,确定目标查询关键字对应的目标加密字符串。First, based on the preset mapping relationship between query keywords and replacement strings, the target replacement strings corresponding to the target query keywords are determined; further, according to the order of the target query keywords, each target replacement string is Arrange them to determine the target encrypted string corresponding to the target query keyword.

具体的,前后端之间可以预先约定用户可在前端网页输入的查询关键字的类型,例如文字、明文数值(也即数字)、大写字母、小写字母、标点符号和特殊字符等;特殊字符可以为使用频率较少字符且难以直接输入的符号,包括但不限定数字符号、数学符号、希腊数字、希腊字母、月份符号、日期符号、时间符号、特殊中文字符和音乐符号等,并且为每个查询关键字分别配置对应的替换字符串。Specifically, the front-end and back-end can pre-agree on the types of query keywords that users can enter on the front-end web page, such as text, plain text values (that is, numbers), uppercase letters, lowercase letters, punctuation marks, special characters, etc.; special characters can Symbols that use less frequently characters and are difficult to input directly, including but not limited to numeric symbols, mathematical symbols, Greek numerals, Greek letters, month symbols, date symbols, time symbols, special Chinese characters and music symbols, etc., and for each Query keywords are configured with corresponding replacement strings.

示例性的,当查询关键字的类型为明文数值时,0~9这10个数字各自的替换字符串可以如表1所示。For example, when the type of the query keyword is a plain text value, the replacement strings for each of the 10 numbers from 0 to 9 can be as shown in Table 1.

表1Table 1

基于此,后端服务器基于预先存储的查询关键字-替换字符串之间的映射关系,可以先确定各目标查询关键字各自对应的目标替换字符串,再各目标查询关键字的排列顺序,对各目标替换字符串进行排序,即可得到各目标查询关键字对应的目标加密字符串。Based on this, based on the pre-stored mapping relationship between query keywords and replacement strings, the back-end server can first determine the target replacement string corresponding to each target query keyword, and then sort the target query keywords in order. By sorting each target replacement string, the target encrypted string corresponding to each target query keyword can be obtained.

示例性的,当目标查询关键字为明文数值类型且具体为4288时,可以按照表1所示,“4”的目标替换字符串为“we”,“2”的目标替换字符串为“cd”,“8”的目标替换字符串为“nv”,按照顺序排列后,可以得到“4288”这4个目标查询关键字对应的目标加密字符串为“wecdnvnv”。For example, when the target query keyword is a plain text numerical type and is specifically 4288, as shown in Table 1, the target replacement string for "4" is "we", and the target replacement string for "2" is "cd" ", and the target replacement string of "8" is "nv". After arranging it in order, we can get that the target encrypted string corresponding to the four target query keywords "4288" is "wecdnvnv".

需要说明的是,后端服务器在为每个不同类型的查询关键字预先配置对应的替换字符串时,每种类型的查询关键字对应的替换字符串的长度可以自定义配置,也即每个替换字符串所包括的字符个数是可以自定义配置的,每相邻两个替换字符串均不相同。例如,当查询关键字为数字时,各个数字各自对应的替换字符串的长度为2,也即由2个字符组成的字符串,如表1所示;当查询关键字为文字时,文字对应的替换字符串的长度可以为3,也即由3个字符组成的替换字符串。每个查询关键字对应的替换字符串中各个字符可以自定义配置,也可以随机生成。本发明对此不作具体限定。It should be noted that when the back-end server pre-configures the corresponding replacement string for each different type of query keyword, the length of the replacement string corresponding to each type of query keyword can be customized, that is, each The number of characters included in the replacement string can be customized, and each two adjacent replacement strings are different. For example, when the query keyword is a number, the length of the replacement string corresponding to each number is 2, that is, a string composed of 2 characters, as shown in Table 1; when the query keyword is a text, the length of the text corresponding to The length of the replacement string can be 3, that is, the replacement string consists of 3 characters. Each character in the replacement string corresponding to each query keyword can be customized or randomly generated. The present invention does not specifically limit this.

本发明实施例提供的数据查询方法,后端服务器通过确定每个目标查询关键字各自对应的目标替换字符串、再顺序排列各目标替换字符串方式,提高了确定目标加密字符串的便捷性和可靠性。In the data query method provided by the embodiment of the present invention, the back-end server determines the target replacement string corresponding to each target query keyword and then sequentially arranges the target replacement strings, thereby improving the convenience and efficiency of determining the target encrypted string. reliability.

基于上述图1所示的数据查询方法,在一种示例实施例中,为了提高加密存储的可靠性和安全性,后端服务器预先存储的每个用户的用户业务行数据中的敏感信息可以结合加密字符串和混淆字符共同加密,后续查询时可根据加密方式确定查询方式后再匹配查询。基于此,步骤130的具体实现过程可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, in order to improve the reliability and security of encrypted storage, the sensitive information in each user's user business row data pre-stored by the back-end server can be combined with The encrypted string and obfuscated characters are encrypted together. In subsequent queries, the query method can be determined based on the encryption method before matching the query. Based on this, the specific implementation process of step 130 may include:

首先,在业务数据查询请求为前端网页请求查询目标用户的业务数据的情况下,基于数据库预先存储的用户业务行数据中替换字符串之前和/或之后插入的混淆字符长度,确定正则匹配表达式;再进一步基于正则匹配表达式进行数据库匹配查询。First, when the business data query request is a front-end web page request to query the target user's business data, the regular matching expression is determined based on the length of obfuscated characters inserted before and/or after the replacement string in the user's business row data pre-stored in the database. ; Further perform database matching query based on regular matching expressions.

具体的,后端服务器的数据库中存储有预先构建的用户业务数据列表,该用户业务数据列表中含有不同用户各自对应的用户业务行数据,每个用户业务行数据中包括对应用户的加密敏感信息和对应用户的业务数据,每个加密敏感信息是结合替换字符串和混淆字符对对应用户的敏感信息中的关键字进行加密处理后得到的,例如敏感信息为手机号码时,可以将手机号码中关键数字先使用各自对应的替换字符串进行替换,再在第一个替换字符串之前、相邻替换字符串之间和最后一个替换字符串之后中至少一处插入若干个混淆字符后,即可得到加密敏感信息。Specifically, a pre-built user business data list is stored in the database of the back-end server. The user business data list contains user business row data corresponding to different users. Each user business row data includes encrypted sensitive information of the corresponding user. and the corresponding user's business data. Each encrypted sensitive information is obtained by encrypting the keywords in the corresponding user's sensitive information by combining replacement strings and obfuscated characters. For example, when the sensitive information is a mobile phone number, the mobile phone number can be encrypted. The key numbers are first replaced with their corresponding replacement strings, and then several confusing characters are inserted in at least one place before the first replacement string, between adjacent replacement strings, and after the last replacement string. Obtain encrypted sensitive information.

基于此,后端服务器可以根据用户业务行数据中替换字符串之前和/或之后插入的混淆字符长度,确定正则匹配表达式,以便于根据该正则匹配表达式进行数据库匹配查询。Based on this, the backend server can determine a regular matching expression based on the length of confusing characters inserted before and/or after the replacement string in the user's business row data, so as to facilitate database matching queries based on the regular matching expression.

示例性的,若数据库中的用户业务行数据中两个替换字符串之间插入4个混淆字符后的加密敏感信息为“actdsfab”,且“actdsfab”中的“ac”和“ab”均为替换字符串时,可以确定混淆字符为“tdsf”且其长度为4,此时可以确定正则匹配表达式为ac[a-z]{4}ab。For example, if the encrypted sensitive information after inserting 4 obfuscated characters between the two replacement strings in the user business row data in the database is "actdsfab", and both "ac" and "ab" in "actdsfab" are When replacing the string, you can determine that the confusing character is "tdsf" and its length is 4. At this time, you can determine that the regular matching expression is ac[a-z]{4}ab.

本发明实施例提供的数据查询方法,后端服务器通过基于用户业务行数据中替换字符串之前和/或之后插入的混淆字符长度所确定的正则匹配表达式进行数据库匹配查询的方式,不仅能够确保加密敏感信息更难破解,而且也有效提高了敏感信息加密存储的安全性和完全支持模糊搜索的可靠性。In the data query method provided by the embodiment of the present invention, the back-end server performs database matching query through a regular matching expression determined based on the length of obfuscated characters inserted before and/or after the replacement string in the user's business row data, which can not only ensure Encrypted sensitive information is more difficult to crack, and it also effectively improves the security of encrypted storage of sensitive information and fully supports the reliability of fuzzy search.

基于上述图1所示的数据查询方法,在一种示例实施例中,为了确保加密存储的敏感信息在后期可以支持完全模糊搜索,后端服务器对于不同用户各自的敏感信息和业务数据可以预先构建用户业务数据列表,该用户业务数据列表的具体过程可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, in order to ensure that the encrypted and stored sensitive information can support fully fuzzy search in the later stage, the back-end server can pre-construct the sensitive information and business data of different users. User business data list. The specific process of the user business data list may include:

首先,针对待存储的各用户的敏感信息,基于预设的查询关键字-替换字符串之间的映射关系,确定用户的敏感信息中的查询关键字以及查询关键字对应的至少两个替换字符串,并在替换字符串之前和/或之后分别插入预先配置的目标混淆字符串,确定用户的加密敏感信息;然后,基于各用户各自的加密敏感信息以及各用户各自的业务数据,构建用户业务数据列表;用户业务数据列表中含有的用户业务行数据的数量与待存储的用户的数量相同。First, for each user's sensitive information to be stored, based on the preset mapping relationship between query keywords and replacement strings, determine the query keyword in the user's sensitive information and at least two replacement characters corresponding to the query keyword. string, and insert the pre-configured target obfuscation string before and/or after the replacement string to determine the user's encryption sensitive information; then, based on each user's respective encryption sensitive information and each user's respective business data, build the user business Data list; the number of user business row data contained in the user business data list is the same as the number of users to be stored.

其中,敏感信息可以包括但不限定用户的姓名、身份证号码、手机号码、家庭住址、银行账号、邮箱地址、医疗信息和教育背景等其它用户不愿泄露的个人隐私数据中的至少一个。Among them, sensitive information may include but is not limited to at least one of the user's name, ID number, mobile phone number, home address, bank account number, email address, medical information, educational background and other personal privacy data that the user does not want to disclose.

具体的,后端服务器对于每个用户的敏感信息,可以选取其中部分或者全部关键字作为查询关键字进行加密,例如敏感信息为手机号码时,可以选取手机号码中的部分数字或者全部数字作为查询关键字进行加密;加密方式可以根据预先为每个关键字各自配置的替换字符串确定查询关键字各自对应的替换字符串,再在确定的替换字符串之前和/或之后插入预先配置的目标混淆字符串。Specifically, for each user's sensitive information, the back-end server can select some or all of the keywords as query keywords for encryption. For example, when the sensitive information is a mobile phone number, some or all of the digits in the mobile phone number can be selected as the query. Keywords are encrypted; the encryption method can determine the replacement string corresponding to the query keyword based on the replacement string configured in advance for each keyword, and then insert the pre-configured target obfuscation before and/or after the determined replacement string. string.

示例性的,参照表1对手机号码“15010424288”这一查询关键字按照替换字符串和目标混淆字符进行加密后,得到的加密敏感信息可以为:For example, after referring to Table 1 to encrypt the query keyword of mobile phone number "15010424288" according to the replacement string and target confusion characters, the encrypted sensitive information obtained can be:

acacweffdeopabffabacnvacabrtffweopabcdcdrtweabwecdffuinvopnvnv;并且该加密敏感信息每两个黑色粗体字符均为对应数字的替换字符串,每相邻两个黑色粗体字符之间的4个字符均为目标混淆字符。以此方式可以得到每个用户的加密敏感信息。acacweffdeopabffabacnvacabrtffweopabcdcdrtweabwecdffuinvopnvnv; and every two black bold characters in the encrypted sensitive information are replacement strings corresponding to numbers, and the 4 characters between every two adjacent black bold characters are target confusion characters. In this way, each user's encrypted sensitive information can be obtained.

当后端服务器得到待加密存储的所有用户各自的加密敏感信息时,可以将所有加密敏感信息与对应用户的业务数据进行匹配,并且每个用户的加密敏感信息及其业务数据可以以行数据形式显示于列表的对应行中,以此可以得到构建好的用户业务数据列表。When the back-end server obtains the encrypted sensitive information of all users to be encrypted and stored, it can match all the encrypted sensitive information with the corresponding user's business data, and each user's encrypted sensitive information and its business data can be in the form of row data Displayed in the corresponding row of the list, you can get the constructed user business data list.

需要说明的是,在确定的替换字符串之前和/或之后插入预先配置的目标混淆字符,插入的目标混淆字符的长度相同,并且插入的相同数量的目标混淆字符串均不相同。It should be noted that the preconfigured target obfuscation characters are inserted before and/or after the determined replacement string, the length of the inserted target obfuscation characters is the same, and the same number of inserted target obfuscation strings are all different.

本发明实施例提供的数据查询方法,后端服务器通过替换字符串和目标混淆字符串的加密方式对不同用户各自的敏感信息进行加密,再将加密所得到的各加密敏感信息以及各用户各自的业务数据以列表行数据形式构建为用户业务数据列表。这样,结合替换加密和混淆码加密能够确保加密敏感信息更加难以破解,并且支持完全模糊搜索,为后续数据查询的准确性和可靠性提供可靠保障。In the data query method provided by the embodiment of the present invention, the back-end server encrypts the sensitive information of different users through the encryption method of replacing the string and the target obfuscation string, and then encrypts each encrypted sensitive information obtained by encryption and each user's respective Business data is constructed as a user business data list in the form of list row data. In this way, the combination of replacement encryption and obfuscated code encryption can ensure that encrypted sensitive information is more difficult to crack, and supports fully fuzzy search, providing reliable guarantee for the accuracy and reliability of subsequent data queries.

需要说明的是,前后端之间无需预先约定通过替换字符串和目标混淆码加密敏感信息的加密方式及解密方式,以防止敏感信息泄露,后续查询数据时,只需用户在前端网页上输入的查询关键字属于敏感信息,后端服务器即可进行数据库匹配查询。It should be noted that there is no need to agree in advance between the front-end and the back-end on the encryption and decryption methods of encrypting sensitive information by replacing strings and target obfuscation codes to prevent leakage of sensitive information. When querying data later, only the user input on the front-end web page is required. The query keywords are sensitive information, and the back-end server can perform database matching queries.

基于上述图1所示的数据查询方法,在一种示例实施例中,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,可以通过预先配置的各查询关键字各自对应的替换字符串确定。基于此,本发明提供的数据查询方法还可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, the back-end server can query the target obfuscation string inserted before and/or after the encrypted replacement string in the database through each preconfigured query. The replacement string corresponding to each keyword is determined. Based on this, the data query method provided by the present invention may also include:

针对各目标混淆字符串,从预设的所有查询关键字各自对应的替换字符串中确定符合混淆字符长度需求的所述目标混淆字符串。For each target confusion string, determine the target confusion string that meets the length requirements of the confusion characters from the replacement strings corresponding to all preset query keywords.

具体的,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,每个目标混淆字符串所含的目标混淆字符的长度均可以预先配置,也即混淆字符长度需求可以预先配置,每个符合混淆字符长度需求的目标混淆字符串可以是预先配置的所有查询关键字各自对应的替换字符串中至少一个替换字符串。例如,如表1所示的各个数字各自对应的替换字符串,若预先配置的混淆字符长度为4,可以随机获取2个字符长度为2的替换字符串生成含有4个混淆字符的目标混淆字符串“acwe”、“deop”或者“rtff”。Specifically, the back-end server can pre-configure the length of the target obfuscation characters contained in each target obfuscation string for the target obfuscation string inserted before and/or after the encrypted replacement string in the database, that is, the obfuscation character The length requirement can be pre-configured, and each target obfuscation string that meets the obfuscation character length requirement can be at least one replacement string among the pre-configured replacement strings corresponding to all query keywords. For example, as shown in Table 1, for the replacement strings corresponding to each number, if the pre-configured obfuscation character length is 4, you can randomly obtain 2 replacement strings with a character length of 2 to generate a target obfuscation character containing 4 obfuscation characters. String "acwe", "deop" or "rtff".

需要说明的是,对于每个用户的敏感信,若需确定N个替换字符串,则可以确定插入N个目标混淆字符串。例如,若针对手机号码这一敏感信息确定11个替换字符串进行加密时,则可以确定插入11个目标混淆字符串;或者,若确定4个替换字符串,则可以确定插入4个目标混淆字符串。并且,对于确定的N各目标混淆字符串,可以在第1个替换字符串之前插入目标混淆字符串,也可以在最后1个替换字符串之后插入目标混淆字符串,还可以在每相邻两个替换字符串之间分别插入对应的目标混淆字符串;每两个目标混淆字符串各自所含的混淆字符数量相同,每两个目标混淆字符串各不相同。It should be noted that for each user's sensitive information, if N replacement strings need to be determined, N target confusion strings can be inserted. For example, if 11 replacement strings are determined for sensitive information such as a mobile phone number for encryption, then 11 target obfuscation strings can be determined to be inserted; or, if 4 replacement strings are determined, 4 target obfuscation characters can be inserted. string. Moreover, for the determined N target confusion strings, the target confusion string can be inserted before the first replacement string, or after the last replacement string, or between every two adjacent ones. The corresponding target confusion strings are inserted between the replacement strings; each two target confusion strings contain the same number of confusion characters, and each two target confusion strings are different.

此外还需要说明的是,每个目标混淆字符串的混淆字符总长度与替换字符串总长度相同。例如,当替换字符串为de时,目标混淆字符串可以为3Y且含有2个字符,其长度都是2。It should also be noted that the total length of obfuscated characters for each target obfuscated string is the same as the total length of the replacement string. For example, when the replacement string is de, the target obfuscation string can be 3Y and contain 2 characters, both of which have a length of 2.

本发明实施例提供的数据查询方法,后端服务器通过预先配置的各查询关键字各自对应的替换字符串确定每个目标混淆字符串,提高了确定目标混淆字符串的可靠性和便捷性。In the data query method provided by the embodiment of the present invention, the back-end server determines each target obfuscation string through the pre-configured replacement string corresponding to each query keyword, which improves the reliability and convenience of determining the target obfuscation string.

基于上述图1所示的数据查询方法,在一种示例实施例中,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,可以从不同类型字符中随机生成每个目标混淆字符串。基于此,本发明提供的数据查询方法还可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, the back-end server can randomly select the target confusion string inserted before and/or after the encrypted replacement string in the database from different types of characters. Generate obfuscated strings for each target. Based on this, the data query method provided by the present invention may also include:

针对各目标混淆字符串,从预设的不同类型字符中随机生成符合混淆字符长度需求的所述目标混淆字符串。For each target confusion string, the target confusion string that meets the length requirements of the confusion characters is randomly generated from preset different types of characters.

具体的,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,可以从大写字母、小写字母、数字、下划线和特殊字符中随机选取符合混淆字符长度需求的多个字符作为一个目标混淆字符串;以此方式可以确定所需插入的若干个目标混淆字符串。Specifically, for the target obfuscation string inserted before and/or after the encrypted replacement string in the database, the back-end server can randomly select from uppercase letters, lowercase letters, numbers, underscores and special characters that meet the obfuscation character length requirements. Multiple characters are used as a target obfuscation string; in this way, several target obfuscation strings to be inserted can be determined.

示例性的,随机生成长度为3的目标混淆码为aB1,也可以为9M_,还可以为m@T。For example, the randomly generated target obfuscated code with length 3 is aB1, or it can be 9M_, or it can be m@T.

本发明实施例提供的数据查询方法,后端服务器通过从不同类型字符中随机生成符合混淆字符长度需求的各个目标混淆字符串,提高了确定目标混淆字符串的便捷性和可靠性。In the data query method provided by the embodiment of the present invention, the back-end server randomly generates each target obfuscation string that meets the obfuscation character length requirements from different types of characters, thereby improving the convenience and reliability of determining the target obfuscation string.

基于上述图1所示的数据查询方法,在一种示例实施例中,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,可以通过预先配置的各查询关键字各自对应的替换字符串和不同类型字符确定每个目标混淆字符串。基于此,本发明提供的数据查询方法还可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, the back-end server can query the target obfuscation string inserted before and/or after the encrypted replacement string in the database through each preconfigured query. The replacement strings and different types of characters corresponding to the keywords determine each target obfuscation string. Based on this, the data query method provided by the present invention may also include:

针对各目标混淆字符串,基于预设的所有查询关键字各自对应的替换字符串和不同类型字符确定符合混淆字符长度需求的目标混淆字符串。For each target confusion string, the target confusion string that meets the length requirements of the confusion characters is determined based on the replacement strings and different types of characters corresponding to all the preset query keywords.

具体的,后端服务器对于数据库中加密所得替换字符串之前和/或之后对应插入的目标混淆字符串,可以从大写字母、小写字母、数字、下划线和特殊字符,以及预先配置的各查询关键字各自对应的替换字符串中,确定符合混淆字符长度需求的多个字符作为一个目标混淆字符串。以此方式确定待插入的多个目标混淆字符串。Specifically, the back-end server can insert the target obfuscation string before and/or after the encrypted replacement string in the database from uppercase letters, lowercase letters, numbers, underscores and special characters, as well as pre-configured query keywords. In the respective replacement strings, multiple characters that meet the obfuscation character length requirements are determined as a target obfuscation string. In this way multiple target obfuscated strings to be inserted are determined.

示例性的,若需确定长度为5的目标混淆字符串,可以结合表1和不同类型字符,确定的目标混淆字符串可以为ab_we,也可以为cd#M8,还可以为6@rt0。For example, if you need to determine a target confusion string with a length of 5, you can combine Table 1 and different types of characters. The determined target confusion string can be ab_we, cd#M8, or 6@rt0.

本发明实施例提供的数据查询方法,后端服务器通过从预先配置的各查询关键字各自对应的替换字符串,以及不同类型字符中随机生成符合混淆字符长度需求的各个目标混淆字符串,提高了确定各目标混淆字符串的灵活性和可靠性。In the data query method provided by the embodiment of the present invention, the back-end server randomly generates each target obfuscation string that meets the obfuscation character length requirements from the pre-configured replacement strings corresponding to each query keyword and different types of characters, thereby improving the efficiency of the data query. Determine the flexibility and reliability of each target obfuscation string.

基于上述图1所示的数据查询方法,在一种示例实施例中,后端服务器通过数据库匹配查询后,可以将查询到的结果加密反馈至前端网页或者反馈查询失败结果。基于此,本发明提供的数据查询方法还可以包括:Based on the data query method shown in Figure 1 above, in an example embodiment, after matching the query through the database, the back-end server can encrypt the query results and feed them back to the front-end web page or feed back the query failure results. Based on this, the data query method provided by the present invention may also include:

在查询到至少一个目标业务数据的情况下,对查询到的至少一个目标业务数据进行加密,并将加密所得到的目标加密业务数据反馈至前端网页;在未查询到目标业务数据的情况下,向前端网页反馈查询失败的提示信息。When at least one target business data is queried, the at least one target business data queried is encrypted, and the encrypted target encrypted business data is fed back to the front-end web page; when the target business data is not queried, Feed back query failure prompt information to the front-end web page.

具体的,由于后端服务器的数据库中存储的每个加密敏感信息,插入的目标混淆字符串所含目标混淆字符的数量(也即长度)相同但相邻两个目标混淆字符串均不相同,因此按照加密所得的目标加密字符串进行数据库匹配查询时,可以实现完全模糊搜索;例如,当目标加密字符串是wecdnvnv且正则匹配表达式为we[a-z]{4}cd[a-z]{4}nv[a-z]{4}nv时,若进行数据库匹配查询后搜索到符合正则匹配表达式的目标加密敏感信息weabwecdffuinvopnvnv时,可以确定所需查询的目标用户及其对应的目标业务数据存在于数据库中,此时可以将该目标用户的目标业务数据进行加密后反馈至前端网页;此处的加密方式可以为可逆加密方式,也可以为与前端网页预先约定好的其它加密方式。本发明对此不作具体限定。Specifically, because of each encrypted sensitive information stored in the database of the back-end server, the inserted target obfuscation string contains the same number of target obfuscation characters (that is, the length) but the two adjacent target obfuscation strings are different. Therefore, when performing a database matching query based on the encrypted target encrypted string, a completely fuzzy search can be achieved; for example, when the target encrypted string is wecdnvnv and the regular matching expression is we[a-z]{4}cd[a-z]{4} nv[a-z]{4}nv, if the target encrypted sensitive information weabwecdffuinvopnvnv that matches the regular matching expression is searched after performing a database matching query, it can be determined that the target user to be queried and its corresponding target business data exist in the database , at this time, the target business data of the target user can be encrypted and fed back to the front-end web page; the encryption method here can be a reversible encryption method, or other encryption methods pre-agreed with the front-end web page. The present invention does not specifically limit this.

相应的,若进行数据库匹配查询未搜索到符合正则匹配表达式的目标加密敏感信息,则可以向前端网页反馈查询失败的提示信息,也此提示信息可以提示用户检查是否输入了不属于敏感信息的目标查询关键字,和/或提示前端网页检查其加密方式及加密密钥是否有效;进一步的,若经修改和/或经检查均无误后再次查询失败,或者累计查询次数超过预设次数阈值(例如3次),则可以确定数据库中未存储所需查询的目标用户及其所有信息。Correspondingly, if the database matching query does not find the target encrypted sensitive information that matches the regular matching expression, a prompt message indicating that the query failed can be fed back to the front-end web page. This prompt message can also prompt the user to check whether the input is not sensitive information. Target query keywords, and/or prompt the front-end web page to check whether the encryption method and encryption key are valid; further, if the query fails again after modification and/or inspection, or the cumulative number of queries exceeds the preset threshold ( For example, 3 times), it can be determined that the target user of the required query and all its information are not stored in the database.

本发明实施例提供的数据查询方法,后端服务器通过将查询到的目标业务数据加密反馈至前端网页,或者向前端网页反馈查询失败的提示信息的方式,提高了前后端之间传输信息的安全性和可靠性。In the data query method provided by the embodiment of the present invention, the back-end server improves the security of information transmission between the front-end and the back-end by encrypting the queried target business data and feeding it back to the front-end web page, or feeding back prompt information of failed query to the front-end web page. performance and reliability.

下面对本发明提供的数据查询装置进行描述,下文描述的数据查询装置与上文描述的数据查询方法可相互对应参照。The data query device provided by the present invention is described below. The data query device described below and the data query method described above can be referenced correspondingly.

参照图2,为本发明提供的数据查询装置的结构示意图,如图2所示,该数据查询装置200,包括:数据解密模块210、替换加密模块220和数据查询模块230。Referring to Figure 2, which is a schematic structural diagram of a data query device provided by the present invention. As shown in Figure 2, the data query device 200 includes: a data decryption module 210, a replacement encryption module 220 and a data query module 230.

数据解密模块210,用于响应于业务数据查询请求,对加密查询关键字进行解密。The data decryption module 210 is used to decrypt the encrypted query keyword in response to the business data query request.

替换加密模块220,用于对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串。The replacement encryption module 220 is used to perform character replacement encryption processing on the decrypted target query keyword, and determine the target encrypted string corresponding to the target query keyword.

数据查询模块230,用于基于目标加密字符串进行数据库匹配查询。The data query module 230 is used to perform database matching queries based on the target encrypted string.

可选的,替换加密模块220,具体用于基于预设的查询关键字-替换字符串之间的映射关系,确定目标查询关键字各自对应的目标替换字符串;按照目标查询关键字的顺序,对各目标替换字符串进行排列,确定目标查询关键字对应的目标加密字符串。Optionally, the replacement encryption module 220 is specifically configured to determine the target replacement string corresponding to the target query keyword based on the preset mapping relationship between the query keyword and the replacement string; according to the order of the target query keyword, Arrange each target replacement string to determine the target encrypted string corresponding to the target query keyword.

可选的,数据查询模块230,具体用于在业务数据查询请求为前端网页请求查询目标用户的业务数据的情况下,基于数据库预先存储的用户业务行数据中替换字符串之前和/或之后插入的混淆字符长度,确定正则匹配表达式;基于正则匹配表达式进行数据库匹配查询。Optionally, the data query module 230 is specifically configured to, when the business data query request is a front-end web page request to query the business data of the target user, insert the string before and/or after the replacement string in the user's business row data pre-stored in the database. The length of the obfuscated characters determines the regular matching expression; a database matching query is performed based on the regular matching expression.

可选的,数据查询模块230,具体用于针对待存储的各用户的敏感信息,基于预设的查询关键字-替换字符串之间的映射关系,确定用户的敏感信息中的查询关键字以及查询关键字对应的替换字符串,并在替换字符串之前和/或之后分别插入预先配置的目标混淆字符串,确定用户的加密敏感信息;基于各用户各自的加密敏感信息以及各用户各自的业务数据,构建用户业务数据列表;用户业务数据列表中含有的用户业务行数据的数量与待存储的用户的数量相同。Optionally, the data query module 230 is specifically configured to determine the query keywords in the user's sensitive information based on the preset query keyword-replacement string mapping relationship for each user's sensitive information to be stored. Query the replacement string corresponding to the keyword, and insert the pre-configured target obfuscation string before and/or after the replacement string to determine the user's encryption sensitive information; based on each user's respective encryption sensitive information and each user's respective business data to construct a user business data list; the number of user business row data contained in the user business data list is the same as the number of users to be stored.

可选的,数据查询模块230,具体用于针对各目标混淆字符串,从预设的所有查询关键字各自对应的替换字符串中确定符合混淆字符长度需求的目标混淆字符串。Optionally, the data query module 230 is specifically configured to, for each target confusion string, determine the target confusion string that meets the length requirements of the confusion characters from the replacement strings corresponding to all preset query keywords.

可选的,数据查询模块230,具体用于针对各目标混淆字符串,从预设的不同类型字符中随机生成符合混淆字符长度需求的目标混淆字符串。Optionally, the data query module 230 is specifically configured to, for each target confusion string, randomly generate a target confusion string that meets the length requirements of the confusion characters from preset different types of characters.

可选的,数据查询模块230,具体用于针对各目标混淆字符串,基于预设的所有查询关键字各自对应的替换字符串和不同类型字符确定符合混淆字符长度需求的目标混淆字符串。Optionally, the data query module 230 is specifically configured to, for each target obfuscated string, determine the target obfuscated string that meets the obfuscated character length requirements based on the replacement strings and different types of characters corresponding to all preset query keywords.

可选的,本发明提供的数据查询装置还可以包括数据反馈模块,用于在查询到至少一个目标业务数据的情况下,对查询到的至少一个目标业务数据进行加密,并将加密所得到的目标加密业务数据反馈至前端网页;在未查询到目标业务数据的情况下,向前端网页反馈查询失败的提示信息。Optionally, the data query device provided by the present invention may also include a data feedback module, configured to encrypt at least one of the queried target business data when at least one target business data is queried, and the encrypted result is The target encrypted business data is fed back to the front-end web page; if the target business data is not queried, a query failure message is fed back to the front-end web page.

本发明提供的数据查询装置200,可以执行上述任一实施例中数据查询方法的技术方案,其实现原理以及有益效果与数据查询方法的实现原理及有益效果类似,可参见数据查询方法的实现原理及有益效果,此处不再进行赘述。The data query device 200 provided by the present invention can execute the technical solution of the data query method in any of the above embodiments. Its implementation principle and beneficial effects are similar to those of the data query method. Please refer to the implementation principle of the data query method. and beneficial effects, which will not be described in detail here.

图3示例了一种电子设备的实体结构示意图,如图3所示,该电子设备可以包括:处理器(processor)310、通信接口(CommunicationsInterface)320、存储器(memory)330和通信总线340,其中,处理器310,通信接口320,存储器330通过通信总线340完成相互间的通信。处理器310可以调用存储器330中的逻辑指令,以执行数据查询方法,该方法包括:Figure 3 illustrates a schematic diagram of the physical structure of an electronic device. As shown in Figure 3, the electronic device may include: a processor (processor) 310, a communication interface (Communications Interface) 320, a memory (memory) 330 and a communication bus 340, where , the processor 310, the communication interface 320, and the memory 330 complete communication with each other through the communication bus 340. The processor 310 can call logical instructions in the memory 330 to execute a data query method, which method includes:

响应于业务数据查询请求,对加密查询关键字进行解密;对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串;基于目标加密字符串进行数据库匹配查询。In response to the business data query request, decrypt the encrypted query keyword; perform character replacement encryption processing on the decrypted target query keyword to determine the target encrypted string corresponding to the target query keyword; perform database matching query based on the target encrypted string .

此外,上述的存储器330中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,RandomAccessMemory)、磁碟或者光盘等各种可以存储程序代码的介质。In addition, the above-mentioned logical instructions in the memory 330 can be implemented in the form of software functional units and can be stored in a computer-readable storage medium when sold or used as an independent product. Based on this understanding, the technical solution of the present invention essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of the present invention. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code.

另一方面,本发明还提供一种计算机程序产品,所述计算机程序产品包括计算机程序,计算机程序可存储在非暂态计算机可读存储介质上,所述计算机程序被处理器执行时,计算机能够执行上述各方法所提供的数据查询方法,该方法包括:On the other hand, the present invention also provides a computer program product. The computer program product includes a computer program. The computer program can be stored on a non-transitory computer-readable storage medium. When the computer program is executed by a processor, the computer can Execute the data query method provided by each of the above methods, which includes:

响应于业务数据查询请求,对加密查询关键字进行解密;对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串;基于目标加密字符串进行数据库匹配查询。In response to the business data query request, decrypt the encrypted query keyword; perform character replacement encryption processing on the decrypted target query keyword to determine the target encrypted string corresponding to the target query keyword; perform database matching query based on the target encrypted string .

又一方面,本发明还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各方法提供的数据查询方法,该方法包括:On the other hand, the present invention also provides a non-transitory computer-readable storage medium on which a computer program is stored. The computer program is implemented when executed by the processor to execute the data query method provided by each of the above methods. The method includes:

响应于业务数据查询请求,对加密查询关键字进行解密;对解密所得的目标查询关键字进行字符替换加密处理,确定目标查询关键字对应的目标加密字符串;基于目标加密字符串进行数据库匹配查询。In response to the business data query request, decrypt the encrypted query keyword; perform character replacement encryption processing on the decrypted target query keyword to determine the target encrypted string corresponding to the target query keyword; perform database matching query based on the target encrypted string .

以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。The device embodiments described above are only illustrative. The units described as separate components may or may not be physically separated. The components shown as units may or may not be physical units, that is, they may be located in One location, or it can be distributed across multiple network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. Persons of ordinary skill in the art can understand and implement the method without any creative effort.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and of course, it can also be implemented by hardware. Based on this understanding, the part of the above technical solution that essentially contributes to the existing technology can be embodied in the form of a software product. The computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., including a number of instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or certain parts of the embodiments.

最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that it can still be used Modifications are made to the technical solutions described in the foregoing embodiments, or equivalent substitutions are made to some of the technical features; however, these modifications or substitutions do not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A method of querying data, comprising:
decrypting the encrypted query key in response to the service data query request;
performing character replacement encryption processing on the target query keyword obtained by decryption, and determining a target encryption character string corresponding to the target query keyword;
and carrying out database matching query based on the target encryption character string.
2. The data query method according to claim 1, wherein the performing the character replacement encryption processing on the target query keyword obtained by decryption to determine the target encrypted character string corresponding to the target query keyword includes:
Determining target replacement character strings corresponding to the target query keywords respectively based on a mapping relation between preset query keywords and the replacement character strings;
and arranging the target replacement character strings according to the sequence of the target query keywords, and determining the target encryption character strings corresponding to the target query keywords.
3. The data query method of claim 1, wherein performing a database matching query based on the target encrypted string comprises:
determining a regular matching expression based on the length of confusion characters inserted before and/or after the replacement of character strings in user business line data stored in advance in a database under the condition that the business data query request is a front-end webpage request for querying the business data of a target user;
and carrying out database matching query based on the regular matching expression.
4. A data query method as claimed in claim 3, wherein the method further comprises:
aiming at sensitive information of each user to be stored, determining a query keyword in the sensitive information of the user and a replacement character string corresponding to the query keyword based on a mapping relation between a preset query keyword and the replacement character string, and respectively inserting a preset target confusion character string before and/or after the replacement character string to determine encrypted sensitive information of the user;
Constructing the user service data list based on the encryption sensitive information of each user and the service data of each user; the number of user service line data contained in the user service data list is the same as the number of users to be stored.
5. The data query method of claim 4, wherein the method further comprises:
and determining the target confusion character strings meeting the confusion character length requirement from the preset replacement character strings corresponding to all the query keywords respectively aiming at each target confusion character string.
6. The data query method of claim 4, wherein the method further comprises:
and randomly generating target confusion character strings meeting the length requirements of the confusion characters from preset different types of characters aiming at each target confusion character string.
7. The data query method of claim 4, wherein the method further comprises:
and determining the target confusion character strings meeting the confusion character length requirement based on the preset replacement character strings and different types of characters corresponding to all the query keywords.
8. The data query method of any one of claims 1 to 7, further comprising:
under the condition that at least one piece of target service data is inquired, encrypting the inquired at least one piece of target service data, and feeding the encrypted target encrypted service data back to the front-end webpage;
and under the condition that the target service data is not queried, feeding back prompt information of query failure to the front-end webpage.
9. A data query device, comprising:
the data decryption module is used for decrypting the encrypted query keyword in response to the service data query request;
the replacing encryption module is used for carrying out character replacing encryption processing on the target query keyword obtained by decryption and determining a target encryption character string corresponding to the target query keyword;
and the data query module is used for carrying out database matching query based on the target encryption character string.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the data query method of any of claims 1 to 8 when the program is executed by the processor.
11. A non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the data query method of any of claims 1 to 8.
CN202311810415.0A 2023-12-26 2023-12-26 Data query method, device, electronic equipment and storage medium Pending CN117762994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311810415.0A CN117762994A (en) 2023-12-26 2023-12-26 Data query method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311810415.0A CN117762994A (en) 2023-12-26 2023-12-26 Data query method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117762994A true CN117762994A (en) 2024-03-26

Family

ID=90319756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311810415.0A Pending CN117762994A (en) 2023-12-26 2023-12-26 Data query method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117762994A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118627130A (en) * 2024-08-13 2024-09-10 天翼视联科技有限公司 Dense fuzzy search method, device and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118627130A (en) * 2024-08-13 2024-09-10 天翼视联科技有限公司 Dense fuzzy search method, device and computer equipment

Similar Documents

Publication Publication Date Title
US10498706B2 (en) Searchable encryption enabling encrypted search based on document type
CN107209787B (en) Improving searching ability of special encrypted data
Fu et al. Enabling central keyword-based semantic extension search over encrypted outsourced data
US9977918B2 (en) Method and system for verifiable searchable symmetric encryption
US10404669B2 (en) Wildcard search in encrypted text
CN107077469B (en) Server device, search system, terminal device, and search method
US8930691B2 (en) Dynamic symmetric searchable encryption
Awad et al. Chaotic searchable encryption for mobile cloud storage
Zhu et al. A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing
US8769302B2 (en) Encrypting data and characterization data that describes valid contents of a column
CN102782692A (en) System, apparatus and method for encryption and decryption of data transmitted over a network
EP3531365B1 (en) Computer system, connection apparatus, and processing method using transaction
US10298401B1 (en) Network content search system and method
US9946720B1 (en) Searching data files using a key map
US10615965B1 (en) Protected search index
CN117762994A (en) Data query method, device, electronic equipment and storage medium
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
CN108650268B (en) A searchable encryption method and system for realizing multi-level access
JP2006189925A (en) Private information management system, private information management program, and private information protection method
CN112084487B (en) Weak password analysis method and device, storage medium and electronic equipment
Handa et al. Keyword binning-based efficient search on encrypted cloud data
CN114661793A (en) Fuzzy query method, device, electronic device and storage medium
CN114528370A (en) Dynamic multi-keyword fuzzy ordering searching method and system
US11727108B2 (en) Systems and methods for providing secure passwords
JP5969681B1 (en) Confidential information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination