Database encryption method and encryption database query method
An encryption method and database technology, applied in the field of data privacy protection, can solve problems such as low execution efficiency, inability to execute on ciphertext, loss, etc., to achieve the effect of protecting privacy, reducing communication and computing overhead, and improving execution efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0064] The specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
[0065] In the actual application process, a database encryption method designed by the present invention comprises the following steps:
[0066] Step 001. Judge the data type of each data column in each table in the database respectively. If the data type of the data column is a numeric type (int, float, double), then enter step 002; if the data type of the data column is a character type ( char, varchar, text), then go to step 003.
[0067] Step 002. For each data in the numerical data column, respectively adopt the equivalent encryption algorithm, the preservation encryption algorithm and the homomorphic encryption algorithm to encrypt respectively, and expand the numerical data column into three columns, and then press the three columns. The relationship between the column and the equivalent encryption algorithm, the preservation...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap