mybatis field encryption and decryption device and encryption and decryption system
An encryption, decryption, and field technology, which is applied in computer security devices, digital data protection, and electronic digital data processing, can solve problems such as ciphertext incompatibility, high business coupling, and data leakage, and avoid data incompatibility and key issues. The effect of data security and performance impact is small
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] A mybatis field encryption and decryption device, including a mybatis interception plug-in and a parameter setting module. in,
[0051] The mybatis interception plug-in is used to annotate the fields that need to be encrypted and decrypted, and automatically encrypt and decrypt before the database is updated / read;
[0052] The parameter setting module is used for users to set keys and magic values that need to be encrypted and decrypted.
[0053]The magic value refers to the prefix that is automatically added before the encrypted data. If there is already some unencrypted data in the system, the plug-in will not and does not need to decrypt the original data to achieve compatibility with the original data of the system. .
[0054] Further, a method of using a mybatis field encryption and decryption device:
[0055] S1 configures the mybatis interception plug-in;
[0056] S2 sets the key and magic value that needs to be encrypted and decrypted by itself through the...
Embodiment 2
[0072] On the basis of Embodiment 1, this embodiment further proposes an encryption and decryption system based on the above-mentioned mybatis field encryption and decryption device. The system includes: an application program, a configuration center, and a database.
[0073] The database account information is saved as ciphertext in the application program, and the encryption and decryption key is stored in the configuration center. The application program needs to obtain the secret key from the configuration center to access the database with the ciphertext;
[0074] The application program encrypts and stores the key information related to the customer through the mybatis field encryption and decryption device. The encryption and decryption key is stored in the configuration center. After reading the encrypted information, use the secret key to decrypt it through the mybatis field encryption and decryption device and then display it to the customer in plain text .
[0075] ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


