Database data encryption and decryption method and device, computer equipment and storage medium

An encrypted storage and database technology, applied in the field of information security, can solve the problems of low key distribution efficiency and poor security, and achieve the effect of improving product development and maintenance efficiency, and improving key security and security.

Inactive Publication Date: 2019-04-30
深圳采福科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above method will lead to inefficient key distribution and poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database data encryption and decryption method and device, computer equipment and storage medium
  • Database data encryption and decryption method and device, computer equipment and storage medium
  • Database data encryption and decryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0056]The current method of encrypting sensitive data is usually to first save the key locally on the server. If it is a distributed service, you need to save the key on multiple servers, and then read the key locally from the server to perform encryption operations. In addition, when the application service accesses the database, the usual practice is to directly solidify the encryption and decryption operations for sensitive data in the business code, which will lead to too tight coupling between the business function module and the encryption and decryption function modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database data encryption and decryption method and device, computer equipment and a storage medium. The method comprises the steps that acquiring an access request initiatedby an application service to a database; reading a database configuration template according to the access request; when determining that a database table accessed by the access request contains encrypted and stored fields according to the database configuration template, calling an encryption and decryption interface to encrypt and decrypt data corresponding to the fields; wherein the database configuration template configures a configuration item containing fields needing to be encrypted and stored for each database table; wherein the encryption and decryption interface is generated according to a key corresponding to the application service, and the key is loaded from a key machine according to the application service identifier. The key distribution efficiency and security can be improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a database data encryption and decryption method, device, computer equipment and storage medium. Background technique [0002] With the rapid development of networking and informatization, the security of information and data has become increasingly prominent. The security of mass data storage and the protection of sensitive data from theft and tampering have attracted more and more attention. In order to enhance data security, most systems encrypt sensitive data and store it in the database. When reading these encrypted data, they need to be decrypted before normal operation. [0003] The traditional method of encrypting sensitive data is usually to save the key locally on the server, and read the key locally from the server for encryption. [0004] However, the above method will lead to low key distribution efficiency and poor security. Contents of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 魏科峰杨世华凌玉黄鑫
Owner 深圳采福科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products