Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data access control device and data access control method

A data access control and access control technology, applied in the computer field, can solve the problems of relatively high encryption key security requirements, hidden dangers of data security, and high database requirements, and achieve the effects of convenient and flexible control, ensuring security, and reducing computing pressure.

Active Publication Date: 2012-04-04
YONYOU NETWORK TECH
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] This session-based encryption method has the following defects: 1. The key is associated with user information and set by the user in advance, so that only the person who sets the password can decrypt it, and there is no certain type of person who can decrypt and view the data through authorization
2. Because the encryption and decryption are all done by the database, the requirements for the database are relatively high, which is not conducive to wide application
3. Both the encryption algorithm and the key are stored in the database, which is inherently insecure. After knowing the database password, all encrypted information can be decrypted
[0012] In addition, the encryption and decryption methods in this solution are all completed by the data container component of the client. Since there are many customer information points, it is necessary to encrypt and store the data when sensitive information is entered into the system, which affects the security of the encryption key. The requirements are relatively high, so it is best to store the encryption key and decryption key separately. If the same key is used for encryption and decryption, there will be hidden dangers to data security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access control device and data access control method
  • Data access control device and data access control method
  • Data access control device and data access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0033] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0034] figure 1 is a block diagram of a data access control device according to an embodiment of the present invention.

[0035] The present invention provides a data access control device 100, such as figure 1 , including: an encryption setting module 102, which sets an encryption field and a ciphertext field for the data table; a data encryption module 104, which encrypts the data in the encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data access control device. The device comprises an encryption setting module, a data encryption module and an access control module, wherein the encryption setting module sets an encryption field and a ciphertext field for a data sheet; the data encryption module encrypts the data of the encryption field, and records the obtained encrypted ciphertext into the ciphertext field; and when a user requests to access the data of the encryption field, the access control module decrypts the data of the ciphertext field according to the decryption key obtained by the user, after the decryption succeeds, the access control module records plaintext data obtained by the decryption into a corresponding field and provides the field to the user. The invention also provides a data access control method. By the technical scheme provided by the invention, the security of encryption information can be well ensured without destroying the original structure of a database and the data sheet and without increasing the calculation pressure of encryption and decryption of the database simultaneously and user access permission can be conveniently controlled.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular, to a data access control device and a data access control method. Background technique [0002] In the management of modern medium and large enterprises, there are usually hundreds of users operating and using ERP (Enterprise Resource Planning) management software. Among these operating users, identities and responsibilities are different, and different positions and positions use and view data from different angles. Relying on a single function to distinguish usage permissions can no longer meet the requirements of the existing fine-grained management. [0003] In medium and large ERP management systems, usually some information can only be seen by members of specific roles, and even in the same report, operators with different identities can see different data permissions. For example, in the CRM (Customer Relationship Management) system or member management system, ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/62
Inventor 赵哲
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products