Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption

A technology of encrypted storage and sub-table, which is applied in computer security devices, digital data protection, special data processing applications, etc., and can solve problems such as destruction, information or data leakage, and unusable resources

Inactive Publication Date: 2012-05-16
ZHENJIANG JINGYING SOFTWARE TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2.1 Leakage: Information or data is disclosed to unauthorized persons;
[0011] 2.3 Destruction: making the company's resources unusable or unavailable to authorized users;
[0012] 2.4 Tampering: Company resources are misused by unauthorized persons
[0014] 3. Vulnerability of the system Vulnerability comes from the security loopholes of the system. Due to the limitations of human beings’ familiarity with the laws of nature and their application capabilities, there are still many imperfections in the current electronic information systems that provide social applications. There are various manifestations of vulnerability, among which how to prevent database DBA users is a headache

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] The comprehensive toll system of the Vehicle Management Office of the Public Security Bureau. This system is the core system of the Vehicle Management Office of the Public Security Bureau. The comprehensive toll system mainly realizes the collection of all business fees of the Vehicle Management Office. Charging system (the comprehensive charging system saves the fee details in the chargeinfo table, where the ZT field is written as 'S'), the comprehensive charging system collects the corresponding business fees and then feeds back to each business system (the comprehensive charging system sends the chargeinfo according to the certificate number Look up the records whose ZT field is 'S' in the table to charge fees. After the fee collection is completed, the system will write the corresponding information record ZT field as 'J'). Subsequent business can only be processed after each business system receives the information of fee settlement , the whole process is automatica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the practical application of an information safety technology to a software system in the public security traffic industry, wherein a corresponding subsidiary table with only one field is established for an information system key list, each record information of the key list is encrypted into one character string to be stored in the corresponding subsidiary table by means of DES (Data Encryption Standard); when the record information changes, an information system is about to modify encryption record information in the corresponding subsidiary table so as to guarantee the consistence of data information in a primary table and the subsidiary table; and when a DBA (Database Administrator) user modifies and deletes the information record at background and cannot find out the corresponding record in the subsidiary table to perform modification and deletion, the information system can find out the modified or deleted record after comparison and can timely recover the data. The information system designed with a method in such a way can be used for preventing a legal or illegal DBA user from directly modifying and deleting the data of the key list in the database, so that the safety performance of the information system is greatly enhanced, and the effect that the data can be viewed but not modified and deleted is achieved.

Description

technical field [0001] The present invention relates to the practical application of information security technology in the software system of the public security traffic control industry. A sub-table corresponding to only one field is established for the key table of the information system, and each record information of the key table is encrypted into a string by DES and stored in the corresponding sub-table. In the table, when the record information changes, the information system will modify the encrypted record information in the corresponding sub-table, so as to ensure the consistency of data information in the main and sub-tables. For example, when the database DBA user modifies and deletes information records in the background, the Find the corresponding records in the table and make corresponding modifications and deletions. After the information system compares, it will find the modified or deleted records, and the data can be recovered in time. The information syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F17/30G06F21/60
Inventor 曾凡玉
Owner ZHENJIANG JINGYING SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products