Transparent encryption and decryption method for database based on multi-level view and trigger
A transparent encryption and decryption, trigger technology, applied in the fields of digital data protection, electrical digital data processing, special data processing applications, etc. Text query, good application transparency, and the effect of ensuring transparency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0029] The present invention realizes the automatic encryption and decryption of sensitive data by realizing the multi-level view and combining the trigger based on the row identification on the basis of the common view and trigger of the relational database, so as to achieve the goal of being transparent to the application, and the application system does not need Transformation; through multi-level views, accurate judgment of database query behavior can be realized, so that for different types of query behavior, a special ciphertext and plaintext data caching strategy based on the LRU cache management mechanism can be constructed, and batch pre-processing of ciphertext data can be constructed. Decryption processing strategy to achieve efficient ciphertext query.
[0030] (1): Sensitive field encryption
[0031] In the method of the present invention, for each table that needs to encrypt sensitive fields:
[0032] Step 1: Change the sensitive field data type
[0033] The data...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com