Supercharge Your Innovation With Domain-Expert AI Agents!

Database table field encryption and decryption method and data server

A technology of data server and encryption method, which is applied in the database field, can solve the problem of low security of database table fields, and achieve the effect of improving data security

Pending Publication Date: 2019-11-08
SWIFTPASS TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the above-mentioned technical problems, provide a method for adding and decrypting database table fie

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database table field encryption and decryption method and data server
  • Database table field encryption and decryption method and data server
  • Database table field encryption and decryption method and data server

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0080] Example 1

[0081] see figure 2 , figure 2 It is a schematic flowchart of an encryption method for a database table field provided by an embodiment of the present invention; wherein, the encryption method for a database table field is applied to a data server, and the data server is connected to at least one client for receiving the client The data query command sent by the terminal.

[0082] like figure 2 As shown, the encryption methods of the database table fields include:

[0083] Step S21: obtaining the annotation type of the database table field to be encrypted;

[0084] Specifically, the data server adds annotation types to the table fields that need to be encrypted by the database operation layer. The annotation types include: settlement account type, certificate number type, and four-element type of bank card. The four elements of bank card include: bank card The name, bank card number, reserved mobile phone number and ID number of the cardholder. In a...

Example Embodiment

[0135] Embodiment 2

[0136] see again Figure 4 , Figure 4 It is a schematic flowchart of a method for decrypting a database table field provided by an embodiment of the present invention;

[0137] like Figure 4 As shown, the decryption method of the database table field, applied to the data server, includes:

[0138] Step S41: receiving a data query instruction sent by the client;

[0139] Specifically, the client requests data from the data server through a data query instruction. For example, the data query instruction is an SQL statement, wherein after the SQL statement is executed by the data server, the data is retrieved from the database of the data server. The data is read by query in the data server, and the data returned by the data server is placed in the result set. Among them, the SELECT statement is used to select rows from the database and view standard methods in the result set, and the java.sql.ResultSet interface represents the result set of the databas...

Example Embodiment

[0154] Embodiment 3

[0155] The embodiment of the present invention also provides an encryption device for database table fields, please refer to Figure 5 , Figure 5 It is a schematic structural diagram of a database table field encryption device provided by an embodiment of the present invention;

[0156] like Figure 5 As shown, the encryption device 50 of the database table field, applied to the data server, includes:

[0157] The annotation type obtaining unit 51 is used to obtain the annotation type of the database table field to be encrypted;

[0158] An encryption key matching unit 52, configured to match the corresponding encryption key according to the annotation type;

[0159] The data ciphertext generating unit 53 is configured to encrypt the data plaintext of the database table field to be encrypted by the encryption algorithm based on the encryption key to generate the data ciphertext;

[0160] The data ciphertext saving unit 54 is configured to save the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of databases, in particular to a database table field encryption and decryption method and a data server. The encryption method of the database table fieldis applied to the data server, and comprises the steps of obtaining an annotation type of a to-be-encrypted database table field; matching a corresponding encryption key according to the annotation type; encrypting a data plaintext of a to-be-encrypted database table field through an encryption algorithm based on the encryption key to generate a data ciphertext; and storing the data ciphertext ina database. By adopting different encryption keys for different annotation types, the data security of the database can be improved.

Description

technical field [0001] The invention relates to the technical field of databases, in particular to a database table field encryption and decryption method and a data server. Background technique [0002] A database table is a collection of two-dimensional arrays, consisting of vertical columns and horizontal rows. A column is composed of similar information, each column is also called a field, and the title of each column is called a field name; a row includes several columns of information items, and a row of data is called a or a record. [0003] At present, in the process of storing database table information, it is often stored in plain text. However, for some important information in database table fields, such as information related to user privacy, it cannot be directly stored in plain text. When sensitive, the data is usually encrypted before being stored in the database table. [0004] Traditional database table field encryption information often adopts the same e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F16/22H04L9/06H04L9/08H04L29/06
CPCG06F21/6227G06F21/6245G06F16/2282H04L9/0631H04L9/0863H04L63/0428
Inventor 张正义鲜丹
Owner SWIFTPASS TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More