Method for encrypting database and database server
An encryption method and database technology, applied in the field of access protection data for internal management personnel, can solve problems such as inconvenience, and achieve the effect of verifying integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] In the following, various embodiments will be described with reference to the drawings, in which like reference numerals represent like constituent elements. In this specification, various explanations are provided to help understanding of the present invention. However, these embodiments can be practiced even without these specific descriptions. In other examples, disclosed structures and devices are shown in the form of block diagrams for convenience of description.
[0051] The terms "element", "module", "system" and the like used in this specification mean a computer-related entity, hardware, firmware, software, a combination of software and hardware, or an execution of software. For example, an element may be a process executed in a processor, a process, an object, a thread of execution, a program, and / or a computer, but is not limited thereto. For example, both a computing device and an application executing on the computing device may be elements. More than on...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com