Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database encryption method and device

An encryption method and database technology, applied in the field of database encryption methods and devices, can solve problems such as low encryption/decryption efficiency, vulnerability of ciphertext search attacks, and no solution proposed, so as to reduce key storage volume and key storage volume Less, the effect of improving efficiency

Pending Publication Date: 2021-07-23
CCB FINTECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional field-based database encryption method, the key is statically generated. The disadvantages of this encryption method are obvious: (1) the encryption / decryption efficiency is low; (2) if a single key is used to repeatedly encrypt each field, the Ciphertext search attack is vulnerable; (3) If the data elements of each field are encrypted with different keys, the number of keys = the number of records × the number of fields, the number is very surprising and difficult to manage
[0009] For the above problems, no effective solutions have been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption method and device
  • Database encryption method and device
  • Database encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0093] Those skilled in the art know that the embodiments of the present invention can be realized as a system, device, method or computer program product. Therefore, the disclosure of the present invention can be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0094] Before introducing the embodiments of the present invention, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cryptography, and discloses a database encryption method and device.The method comprises the steps that an encryption key of a to-be-encrypted database table is preset, the to-be-encrypted database table corresponds to a plurality of users, each user corresponds to a user key, and the encryption key of the to-be-encrypted database table corresponds to one user key; the user key of each user is associated with the encryption key through the decryption parameter of each user, and the decryption parameter of each user is determined according to the user key of each user and the encryption key; a first data key and a second data key of each data item in the database table to be encrypted are determined according to the encryption key; and according to the first data key and the second data key, based on a 3DES encryption algorithm, encryption processing is performed on each data item of the to-be-encrypted database table. According to the invention, the efficiency of database encryption can be improved, and high security and low key storage capacity of database encryption are realized.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a database encryption method and device. Background technique [0002] With the rapid development of various businesses of commercial banks, the amount of business data in the background database related to the business is also increasing exponentially. For data-intensive enterprises such as commercial banks, the importance of data has become increasingly prominent. On the one hand, data is the core of bank informatization and the key to ensuring the normal operation of banks; on the other hand, data is a valuable resource and wealth of banks. The mining, analysis and utilization of data will create greater wealth for banks. And it is precisely because the data is so important that it becomes a very clear target for attackers. In order to ensure the security of commercial bank databases, the first thing that needs to be understood is the source of security threats. Threats...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/06H04L9/08H04L9/14
CPCG06F21/602G06F21/6218H04L9/0894H04L9/14H04L9/0625
Inventor 马瑶李晓莉
Owner CCB FINTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products