Unlock instant, AI-driven research and patent intelligence for your innovation.

Database encryption method and device, electronic equipment and storage medium

An encryption method and storage medium technology, applied in the field of encryption methods for electronic equipment, storage media, devices, and databases, can solve problems such as reducing data access efficiency, and achieve the effects of ensuring security, improving flexibility and timeliness

Pending Publication Date: 2022-03-01
闪捷信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Or do indiscriminate encrypted access to the entire database, but such indiscriminate access methods will reduce data access efficiency to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption method and device, electronic equipment and storage medium
  • Database encryption method and device, electronic equipment and storage medium
  • Database encryption method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the description of the present application, the terms "first", "second" and the like are only used for distinguishing descriptions, and do not represent sequence numbers, nor can they be understood as indicating or implying relative importance.

[0037] In the description of the present application, the terms "comprising", "comprising", etc. indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or more other features, steps, operations, The presence or addition of elements, components and / or collections thereof.

[0038] The technical solutions of the present application will be clearly and completely described below in conjunction with the accompanying drawings.

[0039] figure 1 It is a schematic diagram of the application scenario of the database encryption method provided by the embodiment of this application. The application scenario includes a client 110 and a server 120 , wherein the serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database encryption method and device, electronic equipment and a storage medium. The method comprises the steps that a request statement of a user side is received; if the user side has the authority, specified data in the request statement is converted into a ciphertext, and an encrypted request statement is obtained; sending the encrypted request statement to a database, and receiving result data returned by the database according to the encrypted request statement; and decrypting the result data, and returning a decryption result to the user side. According to the method, the security of important data in the database can be improved, and the access efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of databases, in particular to database encryption methods, devices, electronic equipment and storage media. Background technique [0002] In today's increasingly developed Internet, data security is becoming more and more important. The storage of data may be obtained or even destroyed by attackers using system vulnerabilities, and data access operations may cause data to be intercepted by attackers, seriously threatening data security. [0003] In the prior art, middleware is usually used to hide the real address of the data, or a simple proxy without any encryption processing, so that the data will be exposed to attackers in plain text. Or do indiscriminate encrypted access to the entire database, but such an indiscriminate access method will reduce data access efficiency to a certain extent. Contents of the invention [0004] The embodiment of the present application provides a database enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F2221/2141
Inventor 张黎孙涛李蓓蓓陈广辉刘维炜
Owner 闪捷信息科技有限公司