Data encryption method and system
A data encryption and data technology, applied in the field of information security, can solve the problem of low security of database access, achieve the effects of alleviating low security, improving security, and access security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 1 is a flowchart of a data encryption method according to an embodiment of the present invention, such as figure 1 As shown, the method is applied to the server, and specifically includes the following steps:
[0027] Step S102, acquiring a user's access request to the database, where the access request carries data to be accessed.
[0028] Step S104, extracting the fields to be encrypted from the access request; the fields to be encrypted include: database name, table name and field name.
[0029] Specifically, the preset field type is obtained based on the access request, where the preset field type is the field type of the field to be encrypted;
[0030] Extract the field matching the preset field type from the access request to obtain the field to be encrypted.
[0031] Since the database encryption and decryption system is transparent to the user, when the user submits the query and modification request, the data is submitted in plain text, and it is nece...
Embodiment 2
[0041] figure 2 is a schematic diagram of a data encryption system provided according to an embodiment of the present invention, such as figure 2 As shown, the system is applied to a server, and specifically includes: an acquisition module 10 , an SQL statement analysis module 20 , a key management module 30 and an encryption module 40 .
[0042] Specifically, the acquiring module 10 is configured to acquire a user's access request to the database, wherein the access request carries data to be accessed.
[0043]The SQL statement parsing module 20 is used to extract the fields to be encrypted from the access request; the fields to be encrypted include: database name, table name and field name.
[0044] The key management module 30 is configured to acquire a first encryption key for encrypting a field to be encrypted; and perform secondary encryption on the first encryption key to obtain a second encryption key.
[0045] The encryption module 40 is configured to use the seco...
Embodiment 3
[0057] Figure 4 It is a database encryption and decryption system provided according to the embodiment of the present invention. The system main control program is the core of the database encryption system, which is mainly responsible for calling each module of the database encryption system to complete the encryption and decryption operation. The outline design of each functional module in the database encryption system as follows:
[0058] (1) SQL statement parsing engine:
[0059] Since the database encryption and decryption system is transparent to the user, when the user submits the query and modification request, the data is submitted in plain text. It is necessary to use the SQL statement parsing module to extract the database name, table name, and field name of the operation before proceeding to the next step encryption and decryption processing or SQL reorganization. The parsing operation relies on the SQLParser plug-in that comes with Apache, and the system main ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


