Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method and system

A data encryption and data technology, applied in the field of information security, can solve the problem of low security of database access, achieve the effects of alleviating low security, improving security, and access security

Inactive Publication Date: 2019-08-02
京工博创(北京)科技有限公司
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a data encryption method and system to alleviate the technical problem of low database access security existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and system
  • Data encryption method and system
  • Data encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 is a flowchart of a data encryption method according to an embodiment of the present invention, such as figure 1 As shown, the method is applied to the server, and specifically includes the following steps:

[0027] Step S102, acquiring a user's access request to the database, where the access request carries data to be accessed.

[0028] Step S104, extracting the fields to be encrypted from the access request; the fields to be encrypted include: database name, table name and field name.

[0029] Specifically, the preset field type is obtained based on the access request, where the preset field type is the field type of the field to be encrypted;

[0030] Extract the field matching the preset field type from the access request to obtain the field to be encrypted.

[0031] Since the database encryption and decryption system is transparent to the user, when the user submits the query and modification request, the data is submitted in plain text, and it is nece...

Embodiment 2

[0041] figure 2 is a schematic diagram of a data encryption system provided according to an embodiment of the present invention, such as figure 2 As shown, the system is applied to a server, and specifically includes: an acquisition module 10 , an SQL statement analysis module 20 , a key management module 30 and an encryption module 40 .

[0042] Specifically, the acquiring module 10 is configured to acquire a user's access request to the database, wherein the access request carries data to be accessed.

[0043]The SQL statement parsing module 20 is used to extract the fields to be encrypted from the access request; the fields to be encrypted include: database name, table name and field name.

[0044] The key management module 30 is configured to acquire a first encryption key for encrypting a field to be encrypted; and perform secondary encryption on the first encryption key to obtain a second encryption key.

[0045] The encryption module 40 is configured to use the seco...

Embodiment 3

[0057] Figure 4 It is a database encryption and decryption system provided according to the embodiment of the present invention. The system main control program is the core of the database encryption system, which is mainly responsible for calling each module of the database encryption system to complete the encryption and decryption operation. The outline design of each functional module in the database encryption system as follows:

[0058] (1) SQL statement parsing engine:

[0059] Since the database encryption and decryption system is transparent to the user, when the user submits the query and modification request, the data is submitted in plain text. It is necessary to use the SQL statement parsing module to extract the database name, table name, and field name of the operation before proceeding to the next step encryption and decryption processing or SQL reorganization. The parsing operation relies on the SQLParser plug-in that comes with Apache, and the system main ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method and system applied to a server, and the method comprises the steps: obtaining an access request of a user to a database, the access request carrying to-be-accessed data; extracting a to-be-encrypted field from the access request; wherein the to-be-encrypted field comprises a database name, a table name and a field name; obtaining a first encryption key used for encrypting the to-be-encrypted field; performing secondary encryption on the first encryption key to obtain a second encryption key; and encrypting the to-be-encrypted field by using the second encryption key to obtain an encrypted field, the encrypted field being used for encrypting and decrypting the to-be-accessed data. When the access request of the user is obtained, the encryptionfield is generated by utilizing part of fields in the access request, so that the access between the user and the database can be safer, the safety of database access is improved, and the technical problem of relatively low database access safety in the prior art is relieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data encryption method and system. Background technique [0002] Various database leaks have become the protagonists in recent years. This is related to the neglect of database security issues in the traditional security construction. In the traditional information security protection system, the database is at the core of protection and is not easy to be exposed by outsiders. Hacking, and the database itself already has strong security measures, which seem to be safe enough on the surface, but this traditional security defense idea has fatal flaws. [0003] At present, there are mainly the following methods for database encryption: full-disk encryption, file encryption, and database encryption. However, these encryption methods are transparent to the database itself, and the database management system does not feel the existence of the encryption and decryption p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227
Inventor 李顺波赵祚房经纬
Owner 京工博创(北京)科技有限公司