Supercharge Your Innovation With Domain-Expert AI Agents!

Database field encryption method, electronic equipment and computer readable storage medium

An encryption method and database technology, applied in database field encryption methods, electronic equipment and computer-readable storage media, can solve the problems of difficult-to-use products, low performance, and ciphertext incompatibility, and achieve the effect of convenient upgrade operation

Pending Publication Date: 2020-11-24
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The field of database security has been committed to solving database network security and authority management. Due to the high degree of coupling between data security and business, there is no technology for encrypting and decrypting data on the market. The existing basic implementation method is in the business logic. Perform custom encryption on the fields to be encrypted, then store them in the database, read them out, and then decrypt them. The problem is that the coupling to the business is too high, and the operation is cumbersome. If the requirements change, it may cause the original storage in the database The plaintext in the file is incompatible with the ciphertext saved later, causing data confusion
Transparent encryption technology, among the current mainstream databases, only the Oracle database provides this interface, and for databases that do not provide this interface, although transparent encryption can still be achieved, high-speed indexing of encrypted fields cannot be achieved, resulting in poor performance. Low, it is difficult to become a general-purpose product, so there are only database encryption products for Oracle databases on the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database field encryption method, electronic equipment and computer readable storage medium
  • Database field encryption method, electronic equipment and computer readable storage medium
  • Database field encryption method, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meanings as commonly understood by those of ordinary skill in the art to which this application belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be understood to have m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database field encryption method, electronic equipment and a computer readable storage medium. The method comprises steps of determining a labeling category for a database field needing to be subjected to encryption operation; configuring a corresponding encryption key for the annotation category; encrypting a plaintext of a database field needing to be encrypted according to the encryption key by utilizing an encryption algorithm so as to generate a ciphertext; and storing the ciphertext in a database. The invention provides a database field encryption method. Different encryption keys are adopted for different annotation categories, the method can improve data security of the database, is high in universality, is suitable for all mainstream database programs, can achieve the periodic or irregular upgrading of the secret key, does not affect the historical data, further can achieve the batch updating of historical records, enables the secret key to be upgraded to the latest version in a unified manner, and is convenient in upgrading operation.

Description

technical field [0001] The present application relates to the technical field of databases, in particular to a database field encryption method, electronic equipment and a computer-readable storage medium. Background technique [0002] Most of the current secret-related fields use foreign database products, such as Oracle; it is a crucial task to ensure that the system has high performance and high availability while improving data security and ensuring that key information is not leaked. The field of database security has been committed to solving database network security and authority management. Due to the high degree of coupling between data security and business, there is no technology for encrypting and decrypting data on the market. The existing basic implementation method is in the business logic. Perform custom encryption on the fields to be encrypted, then store them in the database, read them out, and then decrypt them. The problem is that the coupling to the bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/08H04L9/14G06F16/21
CPCG06F21/602H04L9/0863H04L9/0869H04L9/14G06F16/21
Inventor 王瑞利
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More