Unlock instant, AI-driven research and patent intelligence for your innovation.

Data table encryption method and device, computer equipment and storage medium

An encryption method and data table technology, applied in the computer field, can solve problems such as information leakage, data inconsistency, and affecting user experience

Active Publication Date: 2019-05-21
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the data sent by the server to the terminal is obtained by a third-party illegal user and tampered with, the third-party illegal user sends the tampered data to the terminal, which leads to the inconsistency between the data received by the terminal and the requested data. Leading to information leakage and affecting user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data table encryption method and device, computer equipment and storage medium
  • Data table encryption method and device, computer equipment and storage medium
  • Data table encryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] see figure 1 , figure 1 It is a schematic flowchart of a data table encryption method provided by the embodiment of this application. The data table encryption method is applied in the server. like figure 1 As shown, the data table encryption method includes the following steps S110-S150.

[0036] S110. Receive the data request sent by the terminal, and acquire an initial data table corresponding to the data request, where the initial d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data table encryption method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a data request sent bya terminal, and obtaining an initial data table corresponding to the data request; Matching each initial field in the initial data table with a preset encryption field to screen out a to-be-encryptedfield and a non-encrypted field, and storing serial numbers of the to-be-encrypted field and the non-encrypted field in the initial data table in segmented information; If the number of the to-be-encrypted fields is within a preset range, independently encrypting each to-be-encrypted field to generate a first encrypted field; Encrypting the plurality of first encrypted fields as a whole to generate a second encrypted field; And combining the second encrypted field and the non-encrypted field to generate a first encrypted data table. Based on the information encryption technology, the data table encryption method can encrypt the sensitive information of the data table returned to the terminal by the server so as to improve the safety of information transmission.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data table encryption method, device, computer equipment and storage medium. Background technique [0002] In the prior art, a terminal sends a data request to a server, and when the server receives the data request, it usually returns the data to the terminal in an unencrypted manner. If the data sent by the server to the terminal is obtained by a third-party illegal user and tampered with, the third-party illegal user sends the tampered data to the terminal, which leads to the inconsistency between the data received by the terminal and the requested data. This leads to information leakage and affects the user experience. Contents of the invention [0003] The application provides a data table encryption method, device, computer equipment and storage medium, so as to improve the security of information transmission. [0004] In a first aspect, the application p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 苏渊博
Owner PING AN TECH (SHENZHEN) CO LTD