Integration encrypted storage tamper-proofing method and system

An encrypted storage and anti-tampering technology, which is applied in transmission systems, instruments, electrical digital data processing, etc., can solve the problems of personal privacy impact, data leakage, data tampering, etc., to improve storage efficiency, reduce calculation times, and reduce storage effect of space

Inactive Publication Date: 2017-03-22
浙江丞易软件开发有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So the data will be at risk of being leaked
In particular, sensitive information is stored in the database, such as user personal information. After leakage, it will have a significant impact on personal privacy.
[0004] 2) Data has been tampered with
After the financial information is tampered with, it will cause serious financial losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integration encrypted storage tamper-proofing method and system
  • Integration encrypted storage tamper-proofing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] In one aspect, the present invention provides a tamper-proof method for integrated encrypted storage, the method comprising:

[0043] S1. Integrate multiple fields in the original data into one field according to preset integration rules;

[0044] S2. Read the encryption key, encrypt the integrated fields, and store the encrypted data in the database.

[0045] In a specific implementation, multiple fields are integrated and encrypted to reduce storage space and improve storage efficiency. Before encryption, the multi-fields that need to be stored are integrated into one field in a certain format. After the integrated fields are encrypted as a whole, the ciphertext is stored in the database. Although there are multiple fields to be stored, only one encryption calculation and one storage space are required. Thereby greatly reducing the number of encryption calculations, reducing storage space, and improving storage efficiency.

[0046] Preferably, the method also incl...

Embodiment 2

[0073] The decryption process is the inverse process of the above encryption process. Preferably, the decryption process is: first read the encrypted ciphertext, and then decrypt it from the ciphertext, so as to obtain the decrypted integrated fields. Then according to the integration rules, the data information corresponding to each field is read. Moreover, information such as fields and data cannot be found from the ciphertext. Therefore, in this method, the stored data information can be prevented from being tampered with.

[0074] In a specific embodiment, the data reading process of the present invention is as follows:

[0075] a) After the method starts, read out the stored ciphertext

[0076] b) Use the decryption module to decrypt the data in step a). In order to obtain the data in JSON format. An example of its decryption module function is as follows:

[0077] The first step is to read the decryption key in the decryption module.

[0078] In the second part, ca...

Embodiment 3

[0091] On the other hand, the present invention also provides a tamper-proof system for integrated encrypted storage, which is applied to the encryption of database data. The system includes: an integration module, an encryption module, a decryption module, and a decomposition module;

[0092] The integration module is used to integrate multiple fields of the original data into one field to obtain data to be encrypted;

[0093] The encryption module is used to encrypt the data to be encrypted;

[0094] The decryption module is used to decrypt the encrypted data stored in the database when reading encrypted data, and obtain the data to be encrypted;

[0095] The decomposing module is configured to decompose the data to be encrypted obtained after decryption into a plurality of fields to obtain original data.

[0096] In the two processes, four functional modules are involved - integration module, encryption module, decryption module and decomposition module. Its corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an integration encrypted storage tamper-proofing method and system. The system comprises an integration module, an encryption module, a decryption module and a decomposing module, wherein the integration module is used for integrating a plurality of fields of original data into one field to obtain data to be encrypted; the encryption module is used for encrypting the data to be encrypted; the decryption module is used for decrypting encrypted data stored in a database while reading the encrypted data to obtain the data to be encrypted; and the decomposing module is used for decomposing the data to be encrypted obtained after decryption into a plurality of fields to obtain the original data. Through adoption of the technical scheme, the plurality of fields are encrypted through an extremely small number of steps, and extremely small storage space is required to store the data after encryption, so that the data storage space is saved, and the encryption efficiency and effect are improved.

Description

technical field [0001] The invention relates to a tamper-proof method and system for storing data, in particular to a tamper-proof method and system suitable for integrated encrypted storage of various types of databases. Background technique [0002] Databases, such as MySQL, SQL Server, etc., are the mainstream data storage tools. In various computer systems, databases are commonly used to store data during the system generation process and to find information. The information security of the data stored in plaintext in the database faces several challenges. [0003] 1) Information leakage. Since the data is stored in plain text, if the database is accessed without authorization or illegally invaded, the data will be clear at a glance. So the data will face the risk of being leaked. In particular, sensitive information stored in the database, such as user personal information, will have a significant impact on personal privacy after being leaked. [0004] 2) The data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60G06F21/62
CPCH04L63/0428G06F21/602G06F21/6218
Inventor 胡雄易锋
Owner 浙江丞易软件开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products