Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database transparent encryption method and device, electronic device and storage medium

A transparent encryption and database technology, applied in digital data protection, electronic digital data processing, special data processing applications, etc., can solve problems such as difficult to develop databases, and achieve the effect of reducing development difficulty and development costs

Pending Publication Date: 2019-05-21
成都卫士通信息产业股份有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this disclosure is to provide a database transparent encryption method, device, electronic equipment, and computer-readable storage medium, aiming to solve the difficulty in development caused by the need to write all rewriting rules for the four operations of adding, deleting, modifying, and checking in the prior art Larger Problems and Generality of Database Encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database transparent encryption method and device, electronic device and storage medium
  • Database transparent encryption method and device, electronic device and storage medium
  • Database transparent encryption method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] See figure 1 , figure 1 A flow chart of a database transparent encryption method provided by an embodiment of the present disclosure, which includes the following steps:

[0056] S101: Write rewriting rules for three operations of adding, deleting and modifying, and place the rewriting rules in the SQL gateway, so as to realize the three operations of adding, deleting and modifying the ciphertext database by the user through the SQL gateway;

[0057] Different from the existing technology that needs to write the four rewriting rules of adding, deleting, modifying and checking, this application only needs to write the three rewriting rules of adding, deleting and modifying which are less difficult to develop, less time-consuming and less costly rules, and put them into the SQL gateway on the upper layer of the ciphertext database, so that through the built-in rewriting rules in the SQL gateway, the common SQL commands of the three types of addition, deletion, and modifi...

Embodiment 2

[0077] See Figure 4 , Figure 4 It is a flowchart of a method for determining the operation type of an SQL command based on a keyword in the database transparent encryption method provided by the embodiment of the present disclosure. On the basis of Embodiment 1, this embodiment provides a method for determining the SQL command based on a keyword The method of the operation type includes the following steps:

[0078] S301: Using keywords of different access types to match the character strings contained in the SQL command to obtain matching keywords;

[0079] S302: Use the access type to which the matching keyword belongs as the operation type of the SQL command.

[0080]This embodiment aims to use keywords of different access types to actively match the character strings contained in the SQL command, wherein the various types of keywords used for active matching can also form a corresponding keyword set, each type of keyword Combining the access type strings corresponding...

Embodiment 3

[0087] See Figure 5 , Figure 5 A structural block diagram of a database transparent encryption device provided by an embodiment of the present disclosure, the device may include:

[0088] The addition, deletion and modification operation processing unit 100 is used to write the rewrite rules for the three operations of addition, deletion and modification, and place the rewrite rules in the SQL gateway, so as to realize the addition, deletion and modification of the ciphertext database by the user through the SQL gateway three operations;

[0089] The query operation processing unit 200 is configured to create a view with the same name and fields as the original table of ciphertext data, and map each ciphertext field in the original table of ciphertext data to a corresponding field in the view through a decryption function, so as to pass the view Realize the query operation performed by the user on the ciphertext database.

[0090] Further, the database transparent encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a database transparent encryption method, an electronic device and a readable storage medium. Pre-compilation of increments compared to the need for pre-compilation, and deleting, modifying and checking all rewriting rules of the four operations in the prior art. According to the database transparent encryption method provided by the invention, only an increase in difficulty needs to be compiled; deleting and changing rewriting rules of the three operations. The query operation with the maximum development difficulty is realized through a pre-created view. The view isthe same as a ciphertext data original table in which ciphertext character fields are stored. Compared with the prior art, the method has the advantages that the fields are the same, each field in theview is obtained by mapping each ciphertext field in the ciphertext data original table through the decryption function, query operation can be achieved very lightly, complex rewriting rules do not need to be compiled, and development difficulty and development cost are reduced as much as possible on the basis that universality is met. The device applying the database transparent encryption method, the electronic device and the readable storage medium also have the same beneficial effects.

Description

technical field [0001] The present disclosure relates to the technical field of data transparent encryption, and in particular to a database transparent encryption method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] In order to enhance the type of database to which the transparent encryption technology can be applied, that is, the versatility, there is an implementation method by means of a SQL (Structured Query Language, Structured Query Language) gateway in the related technology, that is, by rewriting the built-in SQL gateway The rule rewrites the normal SQL command entered by the user into a rewritten SQL command that can perform various operations on the ciphertext data in the ciphertext database. Since the SQL gateway is a component independent of the ciphertext database, it has nothing to do with the database type. There is also no need to rely on special components that only exist in certain types of databases, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F16/242
Inventor 宣兆新李龙袁忠付玲玲段品言
Owner 成都卫士通信息产业股份有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More