Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method used for achieving safe information preservation through combining, encrypting and storing field information in special field

A specific field and field technology, which is applied in the field of information security preservation by combining and encrypting field information in a specific field, can solve problems such as damage, headache, information or data leakage, and achieve the effect of improving security performance.

Inactive Publication Date: 2012-05-16
ZHENJIANG JINGYING SOFTWARE TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2.1 Leakage: Information or data is disclosed to unauthorized persons;
[0012] 2.2 Fraud: Company information is altered in an unauthorized manner;
[0013] 2.3 Destruction: making the company's resources unusable or unavailable to authorized users;
[0014] 2.4 Tampering: Company resources are misused by unauthorized persons
[0016] 3. Vulnerability of the system Vulnerability comes from the security loopholes of the system. Due to the limitations of human beings’ familiarity with the laws of nature and their application capabilities, there are still many imperfections in the current electronic information systems that provide social applications. There are various manifestations of vulnerability, among which how to prevent database DBA users is a headache

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] The illegal processing system of the traffic police team of the Public Security Bureau is the main business system of the traffic police team of the Public Security Bureau. The basic database for comparing vehicles and drivers with illegal and unprocessed information. All illegal information is mainly stored in the peccancy table, and the ZT field is used to mark whether the fee for the illegal act has been paid. When ZT='S', it means that it has not been paid. ZT ='J' means it has been paid. The annual cost of a prefecture-level city's traffic police team through the illegal handling system management is estimated to be at least 100 million or more, and it can reach 200 million. Therefore, the traffic police team's illegal handling system should be developed and designed as much as possible A lot of information security design.

[0020] The process of this embodiment is:

[0021] First, when the traffic police illegal processing system writes information records in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method used for achieving safe information preservation through combining, encrypting and storing field information in special field. The invention relates to a practical application of an information safety technology in a software system in a public security traffic industry. The method comprises the following steps: combining main fields in a key table, encrypting the combined main fields into a character string by using a DES (data encryption standard) and storing the character string into one special field; when record information changes, regenerating an encrypted character string by virtue of an information system, thereby guaranteeing the consistency of data information; and when a data base DBA (data base administrator) user modifies information record on a backstage and because the encryption field can not be modified, carrying out comparison to discover the modified record and recovery data in time by virtue of the information system. The information system designed by the method can prevent the legal or illegal database DBA user in a data base from directly modifying the key field data of the table, thus the safety performance of the information system is greatly improved, thereby achieving the effect that the data can be seen in time but can not be modified.

Description

technical field [0001] The invention relates to the practical application of information security technology in the software system of the public security traffic control industry. The main fields in the key table are combined and encrypted with DES into a character string and stored in a specific field. When the record information changes, the information system The encrypted string will be regenerated to ensure the consistency of data information. For example, when the database DBA user modifies the information record in the background, since the encrypted field cannot be modified, the information system will find the modified record after comparison and can restore the data in time. The information system designed by this method can prevent legal or illegal database DBA users from directly modifying the key field data of the table in the database, which greatly improves the security performance of the information system and achieves the ability to see and modify data in time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/60
Inventor 曾凡玉
Owner ZHENJIANG JINGYING SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products