Unlock instant, AI-driven research and patent intelligence for your innovation.

Database data encryption and decryption methods and apparatuses

A data encryption and data decryption technology, applied in the database field, can solve problems such as batch loading cannot be realized, and achieve the effect of improving performance

Active Publication Date: 2016-12-21
TIANJIN NANKAI UNIV GENERAL DATA TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a database data encryption and decryption method and device to solve the technical problem that the data encryption method in the prior art cannot realize batch loading

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database data encryption and decryption methods and apparatuses
  • Database data encryption and decryption methods and apparatuses
  • Database data encryption and decryption methods and apparatuses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 1 It is a schematic flow chart of the database data encryption method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of explicit encryption of data in the database. The method can be executed by a database data encryption device, which can be implemented by software / hardware Realized, and can be integrated in the database system.

[0044] see figure 1 , the database data encryption method, comprising:

[0045] S110. When creating a table, check whether the attribute of the table includes an encryption key.

[0046] On the front end, modify the syntax for creating tables to support specifying encryption keywords. Exemplarily, the encryption key is ENCRYPT. The ENCRYPT keyword can appear in table attributes or column attributes, corresponding to table-level and column-level encryption respectively. Save the ENCRYPT attribute to metadata.

[0047] S120. When the attribute of the table includes an encryption key, en...

Embodiment 2

[0068] figure 2 It is a schematic flow chart of the database data decryption method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of loading encrypted data in the database. This method can be executed by a database data decryption device, which can be realized by software / hardware , and can be integrated in the database system.

[0069] see figure 2 , the database data decryption method, comprising:

[0070] S210. Receive a storage file.

[0071] Since the encrypted data is a storage file generated after encryption on the user front end, the corresponding storage file needs to be received before writing the data into the database.

[0072] S220, decrypt the data block according to a preset decryption algorithm, and obtain decrypted data.

[0073] The decryption algorithm corresponding to the encryption algorithm is used to decrypt the data blocks in the storage file to obtain the decrypted data.

[0074] S230. Provide ...

Embodiment 3

[0079] image 3 is a schematic structural diagram of the database data encryption device provided in Embodiment 3 of the present invention, as shown in image 3 As shown, the device includes:

[0080] A checking unit 310, configured to check whether the attributes of the table include encrypted keywords when the table is created;

[0081] An encryption unit 320, configured to encrypt data in data blocks when an encryption keyword is included in the attributes of the table;

[0082] The writing unit 330 is configured to write the encrypted data into the storage file.

[0083] Further, the encryption unit is specifically used for:

[0084] Cache data in blocks;

[0085] Compress the data block;

[0086] Encrypt compressed data blocks.

[0087] The database data encryption device provided by the embodiment of the present invention encrypts the data in data blocks according to the attributes of the established table after the data enters the database and before the database ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides database data encryption and decryption methods and apparatuses. The encryption method comprises the steps of caching data by data blocks; compressing the data blocks; and encrypting the compressed data blocks. The encryption is realized in a database kernel, and batch loading can be carried out by using a loading tool provided by a database without displaying and calling an encryption function, so that the database performance is improved.

Description

technical field [0001] The invention belongs to the technical field of databases, in particular to a database data encryption and decryption method and device. Background technique [0002] In a big data environment, security is a feature that is easily overlooked. Encryption is also a word that is rarely mentioned in all big data solutions. However, in many practical scenarios, there is a need for data encryption, and more and more scenarios require only part of the data to be encrypted, and encrypted and non-encrypted data are stored in the same table at the same time, which puts forward the requirements for column-level encryption. need. [0003] In common databases, encryption is implemented by using an encryption function, that is, by calling the encryption function on the original data to generate encrypted data, and then inserting the encrypted data into the database. This implementation method of encryption is outside the database kernel. It is implemented, and re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 崔维力武新张清伟
Owner TIANJIN NANKAI UNIV GENERAL DATA TECH