Interceptor-based data encryption method and apparatus, and computer equipment

A data encryption and interceptor technology, applied in computer security devices, computing, digital data protection, etc., can solve problems such as low data security and complex encryption operations

Pending Publication Date: 2020-10-09
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an interceptor-based data encryption method, device, computer equipment, and storage medium, aiming to solve the problem of using the entire data table when sensitive data such as personal verificat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interceptor-based data encryption method and apparatus, and computer equipment
  • Interceptor-based data encryption method and apparatus, and computer equipment
  • Interceptor-based data encryption method and apparatus, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0038] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an interceptor-based data encryption method and apparatus, computer equipment and a storage medium, and relates to the big data and blockchain technology. The method comprisesthe steps: obtaining personal verification information through a reflection mechanism if a first pre-compiled SQL statement is intercepted through a Mybatis interceptor; obtaining an initial master key and an initial working key which are randomly generated, and encrypting the personal verification information by using the initial working key to obtain encrypted personal verification information;storing the personal verification information into a current data table to obtain an updated data table; if a second pre-compiled SQL statement is intercepted through the Mybatis interceptor, obtaining a corresponding result set in the updated data table of the database; and decrypting to obtain a decrypted result set. According to the method, the personal verification information is automaticallyencrypted before entering the database and is automatically decrypted when coming out, so that the data security is improved, the encryption and decryption processes are fully automatically carried out, and the encryption and decryption efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of data processing of big data, in particular to an interceptor-based data encryption method, device, computer equipment and storage medium. Background technique [0002] At present, when storing data in a MySQL database, if the data includes sensitive data such as personal verification information, two methods are generally used for encryption. The first is to encrypt the table space that stores personal verification information, and the second is to call Utils, an encryption tool, to encrypt and decrypt personal verification information. [0003] When using the encryption method for the table space, the keyring_file plug-in of the MySQL community version (which is an encryption plug-in) is generally used. The master key obtained after the keyring_file plug-in encrypts the table space (the Master Key is used to decrypt the table space), The Master Key is generally stored in the local database server, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60H04L9/08G06F16/242
CPCG06F21/602G06F16/2433G06F16/2448H04L9/0863H04L9/0869
Inventor 叶怡宁
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products