Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and system based on data attributions

A technology of data attributes and encryption methods, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as the inability to meet the diversity of file encryption, and achieve the effects of reducing data processing volume, improving efficiency, and flexible selection

Inactive Publication Date: 2014-09-24
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For this reason, the technical problem to be solved by the present invention is that the overall encryption of files in the prior art cannot meet the needs of file encryption diversity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system based on data attributions
  • Encryption method and system based on data attributions
  • Encryption method and system based on data attributions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] In this embodiment, an encryption method based on data attributes is provided, and the flow chart is as follows figure 1 As shown, including: select some fields that need to be encrypted, and use different encryption methods to encrypt different fields; configure different permissions for different user identities, and users can decrypt the fields that they are allowed to view according to their permissions.

[0030] The above-mentioned encryption of different fields by using different encryption methods includes: encrypting according to attributes of the fields, and different attributes are encrypted using different methods. When the amount of data is large but not critical, a symmetric encryption method is used; when the amount of data is small but critical, a symmetric decryption algorithm is used for encryption, and an asymmetric encryption method is used to protect the symmetric key. By adopting different encryption methods for key data and non-key data, the effici...

Embodiment 2

[0047] In this embodiment, an encryption system based on data attributes is provided, and the structural block diagram is as follows image 3 As shown, the encryption method corresponding to the data attribute given in the above-mentioned embodiment 1 includes:

[0048] The database layer stores data information, and the data information is encrypted and stored; wherein, different fields in the database are encrypted before being stored according to the system configuration.

[0049] The application layer is integrated with database middleware and data security middleware. The database middleware takes over the access interface of the database layer and acts as an agent for accessing the database layer; the data security middleware performs data processing on the data returned by the database layer to the application layer Encryption and decryption of sensitive data, for some fields that need to be encrypted, different encryption methods are used to encrypt different fields, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method based on data attributions. The encryption method comprises the steps of choosing parts of fields needing encrypting, and encrypting different fields through different encryption modes; configuring different permissions to different user identifications, wherein users decrypt the fields allowing the users to look over according to the permissions. By means of the encryption method, parts of fields in a database are encrypted, parts of fields in files in the database or parts of fields in structural data can be encrypted according to needs, and therefore, encryption speed is increased. Different fields can be encrypted through different encryption modes, therefore, different permissions are configured according to user identifications conveniently, encryption modes can be selected flexibly, working efficiency is increased, and safety of data during usage is improved.

Description

technical field [0001] The present invention relates to an encryption method and system, in particular to an encryption method and system based on data attributes. Background technique [0002] The sharing and application of data information resources is the basic principle of informatization construction. Each enterprise has its own enterprise system, which stores some information that can be made public. In addition, there is information sharing among some enterprises. A certain number of business systems that share and use relevant information resources have weak information security assurance capabilities and severe security risks. If some data information is leaked and misused, it will directly have a bad social impact and directly threaten social stability and national security. [0003] With the increasing application of database technology in daily economic life, database security has increasingly become a focus of attention. At present, the security of the databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 李欣吴昌明
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products