Database field encryption method and device and storage medium
A database and field technology, applied in the field of information security, can solve problems such as errors, time-consuming, and encryption process omissions, and achieve the effect of solving omissions, fast access, and efficient encryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.
[0049] The security of the database system mainly lies in the confidentiality of sensitive data, and the most effective means is to encrypt. In related technologies, the encryption method for sensitive data is to sort out the code blocks inserted and queried by sensitive fields, modify them sequentially, and perform encryption and decryption. However, the encryption scheme in the related technology is to modify the code at the service layer (service layer) or the manager layer (management layer), which is prone to omissions and leads to online errors, and is very time-consuming.
[0050] figure 1 It is a flow chart of a database field encryption method show...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


