A Bottom Data Encryption Method Applicable to Enterprise Management Information System

A technology for managing information systems and encryption methods, applied in the field of underlying data encryption, can solve problems such as low efficiency of information systems, low efficiency of decryption functions, and complicated encryption methods, so as to achieve simple encryption methods and ensure privacy and security , strong practical effect

Active Publication Date: 2022-02-11
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Take the SQL server database as an example. This database has its own encryption and decryption functions, but its encryption method is too complicated, and the efficiency of the decryption function is not high. It takes a long time to process large-scale data queries, which will cause information The system efficiency becomes low, and even freezes and other situations occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Bottom Data Encryption Method Applicable to Enterprise Management Information System
  • A Bottom Data Encryption Method Applicable to Enterprise Management Information System
  • A Bottom Data Encryption Method Applicable to Enterprise Management Information System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0028] see figure 1 , figure 2 , image 3 and Figure 4 , the underlying data encryption method applicable to enterprise management information systems provided by the present invention, the underlying data encryption method mainly includes the following steps:

[0029] Step 1: Create an encryption function and a decryption function, and encrypt the encryption function and the decryption fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to the technical field related to information security, and discloses a bottom data encryption method applicable to enterprise management information systems. (2) create a trigger in the table that needs to be encrypted, and the trigger will encrypt the unencrypted data and cover the original data; (3) use the decryption function to make the enterprise management information system required views and stored procedures, and then encrypt the views and stored procedures; (4) build function modules and report modules, and call corresponding functions according to the requirements of the function modules and the report modules The view and the stored procedure; at the same time, setting permissions for the function module and the report module. The invention improves efficiency and realizes fast decryption and display of data.

Description

technical field [0001] The invention belongs to the technical field related to information security, and more specifically relates to a bottom data encryption method suitable for an enterprise management information system. Background technique [0002] During the development, operation and maintenance of ERP management information systems, development and operation personnel will come into contact with a lot of enterprise data. Most of the data is not classified or sensitive, but there is still a small amount of sensitive data. Some sensitive data needs to be kept private, such as employee salary data. Employees' salaries are not allowed to be viewed by other employees at will. However, in the actual process, these salary data are stored in plain text at the bottom layer, and can be viewed by operation and maintenance personnel with database super administrator privileges. How to make the operation and maintenance personnel with database super administrator privileges una...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06Q10/10
CPCG06F21/602G06F21/6218G06Q10/10
Inventor 计效园钱学文张志鹏周建新殷亚军沈旭
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products