Data security processing method

A processing method and data security technology, applied in the field of data processing, to achieve the effect of ensuring integrity, realizing intrusion tolerance, and ensuring legality and authenticity

Pending Publication Date: 2021-02-09
国网新疆电力有限公司信息通信公司 +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Previous intrusion-tolerant databases only provided internal intrusion-toleran

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method
  • Data security processing method
  • Data security processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1: as figure 1 As shown, the data security processing method processes data through an encryption authentication module and an internal tolerance module, and the encryption authentication module includes an encryption unit, a decryption unit and an authentication unit;

[0042] The data is authenticated by the authentication unit to determine that each field of the i records has not been modified, and to determine the integrity and legality of the data. The authentication unit includes:

[0043] Construct X i value:

[0044] In formula (1),

[0045] satisfy

[0046] j=1,2,...,n+2;

[0047] The data is encrypted by the encryption unit, such as figure 2 As shown, the encryption unit includes:

[0048] Define the i-th record of a table in the database as (x i1 , x i2 , x i3 ,...,x in ),

[0049] Choose n modulus values ​​(m 1 m 2 … m n ), where X i ∈[0,M],

[0050] x i Expressed as:

[0051] In formula (2), M=m 1 m 2 … m n ,

[005...

Embodiment 2

[0067] Embodiment 2: As the optimization of the above-mentioned embodiment, the internal tolerance module includes an agent service unit, an error repair unit, an error isolation unit, an event management unit and an intrusion detection unit, an agent service unit, an error repair unit, an error isolation unit and an intrusion detection unit Communicatively connect with the event management unit respectively.

Embodiment 3

[0068] Embodiment 3: As an optimization of the above embodiment, the proxy service unit includes more than one heterogeneous proxy server.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data processing methods, in particular to a data security processing method, which processes data through an encryption authentication module and an internal tolerance module. Data security processing is realized through the encryption authentication module and the internal tolerance module, and an encryption authentication function is realized through the encryption unit, the decryption unit and the authentication unit of the encryption authentication module, so that the integrity, confidentiality and security of data are ensured, and the validity and authenticity of a data source are ensured at the same time; in addition, errors in the data transmission process are tolerated through the internal tolerance module, and external intrusion tolerance of a database is achieved.

Description

technical field [0001] The invention relates to the technical field of data processing methods, and relates to a data security processing method. Background technique [0002] The application of databases in today's world is becoming more and more extensive and in-depth. For example, the management control of enterprises, e-commerce, banking systems and other fields all require a large amount of confidential information stored in databases. Therefore, database security has become an important issue that cannot be ignored. Database security means that no part of any database is allowed to be maliciously violated or unauthorized access or modification. Its main content includes four aspects: confidentiality, integrity, validity and legality. [0003] Currently used database security technologies mainly include: multi-level security database, access control, intrusion detection, authentication, encryption, etc. The introduction of intrusion tolerance technology provides a ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 杨恒翔王燕军杨大伟杨柳胡美慧温刚李凯何伟刘昆孙若寒向志威马斌
Owner 国网新疆电力有限公司信息通信公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products