Unlock instant, AI-driven research and patent intelligence for your innovation.

mybatis field encryption and decryption device and encryption and decryption system

An encryption, decryption, and field technology, which is applied in computer security devices, digital data protection, and electronic digital data processing, can solve problems such as ciphertext incompatibility, high business coupling, and data leakage, and avoid data incompatibility and key issues. The effect of data security and performance impact is small

Active Publication Date: 2022-04-15
苏州海管家物流科技有限公司
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The field of database security has been committed to solving database network security and authority management. Due to the high degree of coupling between data security and business, there is no technology for encrypting and decrypting data on the market. The existing basic implementation method is in the business logic. Perform custom encryption on the fields to be encrypted, then store them in the database, read them out, and then decrypt them. The problem is that the coupling to the business is too high, and the operation is cumbersome. If the requirements change, it may cause the original storage in the database The plaintext in the file is incompatible with the ciphertext saved later, causing data confusion
[0004] (1) The internal personnel of the company directly export all the data, resulting in data leakage;
[0005] (2) The database was taken off, resulting in the leakage of key customer information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • mybatis field encryption and decryption device and encryption and decryption system
  • mybatis field encryption and decryption device and encryption and decryption system
  • mybatis field encryption and decryption device and encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] A mybatis field encryption and decryption device, including a mybatis interception plug-in and a parameter setting module. in,

[0051] The mybatis interception plug-in is used to annotate the fields that need to be encrypted and decrypted, and automatically encrypt and decrypt before the database is updated / read;

[0052] The parameter setting module is used for users to set keys and magic values ​​that need to be encrypted and decrypted.

[0053]The magic value refers to the prefix that is automatically added before the encrypted data. If there is already some unencrypted data in the system, the plug-in will not and does not need to decrypt the original data to achieve compatibility with the original data of the system. .

[0054] Further, a method of using a mybatis field encryption and decryption device:

[0055] S1 configures the mybatis interception plug-in;

[0056] S2 sets the key and magic value that needs to be encrypted and decrypted by itself through the...

Embodiment 2

[0072] On the basis of Embodiment 1, this embodiment further proposes an encryption and decryption system based on the above-mentioned mybatis field encryption and decryption device. The system includes: an application program, a configuration center, and a database.

[0073] The database account information is saved as ciphertext in the application program, and the encryption and decryption key is stored in the configuration center. The application program needs to obtain the secret key from the configuration center to access the database with the ciphertext;

[0074] The application program encrypts and stores the key information related to the customer through the mybatis field encryption and decryption device. The encryption and decryption key is stored in the configuration center. After reading the encrypted information, use the secret key to decrypt it through the mybatis field encryption and decryption device and then display it to the customer in plain text .

[0075] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mybatis field encryption and decryption device and an encryption and decryption system, the device includes a mybatis interception plug-in and a parameter setting module; wherein, the mybatis interception plug-in is used to annotate and mark fields that need to be encrypted and decrypted, and update them in the database Automatically encrypt and decrypt before reading; the parameter setting module is used for users to set keys and magic values ​​that need to be encrypted and decrypted. The magic value refers to a prefix automatically added to encrypted data. The present invention aims at excessively high business coupling, uses mybatis plug-ins, and marks the fields that need to be encrypted and decrypted through annotations, and automatically encrypts and decrypts before the database is updated / read, without affecting the operation of the business logic on the database; for the original plaintext data requirements In the case of changing to ciphertext, the magic value is used for marking, and only the marked data is encrypted and decrypted to avoid data incompatibility before and after the change.

Description

technical field [0001] The invention belongs to the field of database content security, and in particular relates to a mybatis field encryption and decryption device and an encryption and decryption system. Background technique [0002] The field of database security has been committed to solving database network security and authority management. Due to the high degree of coupling between data security and business, there is no technology for encrypting and decrypting data on the market. The existing basic implementation method is in the business logic. Perform custom encryption on the fields to be encrypted, then store them in the database, read them out, and then decrypt them. The problem is that the coupling to the business is too high, and the operation is cumbersome. If the requirements change, it may cause the original storage in the database The plaintext in is incompatible with the ciphertext saved later, resulting in data confusion. [0003] In the saas system, da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6227G06F21/602
Inventor 许路路
Owner 苏州海管家物流科技有限公司