Data table encryption method and device, computer equipment and storage medium
An encryption method and data table technology, applied in the computer field, can solve problems such as information leakage, data inconsistency, and affecting user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0035] see figure 1 , figure 1 It is a schematic flowchart of a data table encryption method provided by the embodiment of this application. The data table encryption method is applied in the server. like figure 1 As shown, the data table encryption method includes the following steps S110-S150.
[0036] S110. Receive the data request sent by the terminal, and acquire an initial data table corresponding to the data request, where the initial d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


