Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption
A technology of encrypted storage and sub-table, which is applied in computer security devices, digital data protection, special data processing applications, etc., and can solve problems such as destruction, information or data leakage, and unusable resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0017] The comprehensive toll system of the Vehicle Management Office of the Public Security Bureau. This system is the core system of the Vehicle Management Office of the Public Security Bureau. The comprehensive toll system mainly realizes the collection of all business fees of the Vehicle Management Office. Charging system (the comprehensive charging system saves the fee details in the chargeinfo table, where the ZT field is written as 'S'), the comprehensive charging system collects the corresponding business fees and then feeds back to each business system (the comprehensive charging system sends the chargeinfo according to the certificate number Look up the records whose ZT field is 'S' in the table to charge fees. After the fee collection is completed, the system will write the corresponding information record ZT field as 'J'). Subsequent business can only be processed after each business system receives the information of fee settlement , the whole process is automatica...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com