Database encryption and decryption method and device

An encryption method and database technology, applied in relational databases, database models, digital data protection, etc., can solve problems such as database file corruption and unusable tools, and achieve the effects of ensuring correctness, improving security, and avoiding damage

Active Publication Date: 2015-05-20
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing Access database encryption is too simple, and the ordinary method of encrypting by modifying the memory is likely to cause damage to the database file, making the tool unusable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption and decryption method and device
  • Database encryption and decryption method and device
  • Database encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Please refer to Figure 5 , Figure 5 It is a flow chart of the method in Embodiment 1 of the present invention. Such as Figure 5 As shown, a database encryption method may include the following steps:

[0048] 101. Write file modification information to a preset location in the database to be encrypted.

[0049] Wherein, the database to be encrypted may be an Access database.

[0050] The file modification information includes: version information, flags and encryption algorithms corresponding to the database to be encrypted. In the embodiment of the present invention, the preset position is the data position starting from the 0x300th byte, and the data position of 0x300 does not participate in the verification of the database. Therefore, when the file modification information is written at this position, it can be ensured that the database file does not There will be crashes to ensure the normal operation of the database.

[0051] 102. Calculate an encryption p...

Embodiment 2

[0057] Please refer to Image 6 , Image 6 It is a flowchart of the encryption method in Embodiment 2 of the present invention. Such as Image 6 As shown, compared with Embodiment 1, the embodiment of the present invention also includes steps before writing the file modification information into the preset position in the database to be encrypted:

[0058] 201. Acquire verification code information of a database to be encrypted currently.

[0059] The check code information is used to identify the identity of the database and the version of the database. After the verification code information is obtained, the identifier of the database corresponding to the database to be encrypted and the version of the database can be obtained.

[0060] This embodiment may also include the steps of:

[0061] 202. Write the file modification information to a preset location in the database to be encrypted.

[0062] 203. Calculate an encryption password according to the version informati...

Embodiment 3

[0067] Correspondingly, the present invention also provides a database encryption device, please refer to Figure 7 , Figure 7 It is a schematic diagram of the device structure of the embodiment of the present invention. Such as Figure 7 As shown, the database encryption device may include:

[0068] The first writing unit 30 is configured to write file modification information into a preset location in the database to be encrypted, the file modification information including: version information corresponding to the database to be encrypted, a version flag and an encryption algorithm.

[0069] A calculating unit 31, configured to calculate an encryption password according to the version information and version flag corresponding to the database to be encrypted.

[0070] The second writing unit 32 is configured to write the encryption password into a password verification position in the database to be encrypted, and the password verification position is used to store a de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a database encryption and decryption method and device. The method comprises the steps that version information, a mark and an encryption algorithm corresponding to a database are written into a preset position in a database to be encrypted, an encrypted password is calculated according to the version information and the mark corresponding to the database to be encrypted, and the encrypted password is written into a password verifying position in the database; during decryption, an encryption password in the preset position and the content of the password verifying position in a database to be decrypted are read, and the encryption password and the content of the password verifying position are compared; if the encryption password and the content of the password verifying position are consistent, the database can be opened only when a secret key is obtained according to a secondary encryption algorithm and the password verifying position is backfilled with the secret key; the file loading correctness of the database can be ensured, meanwhile, the cracking difficulty of the database can be improved, and the safety of the encrypted database is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a database encryption and decryption method and device. Background technique [0002] A communication device such as a radio network controller (Radio Network Controller, RNC) needs a management tool such as LMT_R for management and maintenance. For data on a communication device such as a network element RNC, it usually needs to be synchronized to a local database. For the local database, it is necessary to ensure that the local data is consistent with the data on the network element to prevent the data from being illegally modified. Therefore, it is very important to encrypt the database. [0003] Existing databases such as Oracle and SQL (a programming language specially designed for database operating systems, Structure Query Language) servers are too complicated to install and use. Using the Access database can complete the database func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F16/284G06F21/6227G06F2221/2141
Inventor 杨新胜
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products