Database encryption and decryption methods and devices, storage medium and terminal

An encryption method and technology of an encryption device, which are applied in the field of mobile communication, can solve the problems of data leakage, inability to encrypt the application program database, etc., and achieve the effects of realizing protection, improving use security and reducing risks.

Active Publication Date: 2018-10-26
BEIJING 58 INFORMATION TTECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a database encryption and decryption method, device, storage medium and t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption and decryption methods and devices, storage medium and terminal
  • Database encryption and decryption methods and devices, storage medium and terminal
  • Database encryption and decryption methods and devices, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to solve the problem that the existing technology cannot encrypt the application program database and easily cause data leakage, the present invention provides a database encryption and decryption method, device, storage medium and terminal. For further details. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The first embodiment of the present invention provides a database encryption method, the method is applied to the terminal, its flow chart is as follows figure 1 As shown, it mainly includes steps S101 and S102:

[0036] S101. Encrypt the field to be encrypted in the database based on the key.

[0037] In the prior art, the field content stored in the database corresponding to the application program is displayed in plain text. When the mobile terminal is cracked, illegal users can easily obtain the plain text content in the database, resulti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database encryption method and device, a database decryption method and device, a storage medium, and a terminal. The method comprises the steps of encrypting, based on secret keys, to-be-encrypted fields of a database; and mixing the secret keys according to a preset mixing manner, and storing the mixed secret keys. According to the method, the fields of the database areencrypted, and the secret keys are mixed, so that even if an unauthorized user cracks a mobile terminal and acquires database content, the user cannot acquire a correct secret key so as not to decrypt encrypted database fields, therefore, the database content is protected, the operating risk of the application is lowered, and the use safety for the user is improved.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a database encryption and decryption method, device, storage medium and terminal. Background technique [0002] Along with the popularization of the use of mobile terminals, various application programs (APP, Application) are also enriching the functions of the mobile terminals, so as to meet various functional requirements of users. The database is an important part of the APP file, especially for various high school examination, answering, and evaluation APPs, and the corresponding content in the database is the object that needs to be protected. [0003] The databases used in existing mobile terminals (such as the lightweight cross-platform relational database SQLITE) usually do not have an encryption function, and the contents of the database fields are all displayed in plain text, which cannot be protected by encryption. When an illegal user cracks the mobile terminal an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0435
Inventor 陈萌弓晓东
Owner BEIJING 58 INFORMATION TTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products