Table field level encryption and security access control method and system
A security access control, table field technology, applied in computer security devices, digital data authentication, digital data protection, etc., can solve the problem of database account password propagation, Azure cloud service column master key leakage, and column master key widespread dissemination and other problems to achieve the effect of resisting high-risk SQL operations, reducing the risk of transmission, and solving the risk of leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Such as figure 1 As shown, this embodiment provides a table field level encryption and security access control method, which is applied on the gateway side, including:
[0038] Connect to the first server through a virtual login password, and receive an access request message from the first server;
[0039] Parse the access request message to obtain the query parameters and their values to be encrypted, and decrypt the ciphertext of the column encryption key according to the column master key according to the encryption type determined by the encryption field, the ciphertext of the column encryption key, and the column master key , encrypt the value of the query parameter according to the encryption type and the decrypted column encryption key, encapsulate the encrypted query parameter into an access request message, and forward it to the second server;
[0040] Receive a response message from the second server, parse and decrypt the response message, and send the de...
Embodiment 2
[0084] This embodiment provides a table field level encryption and security access control system, including:
[0085] The communication module is configured to connect to the first server through a virtual login password, and receive an access request message from the first server;
[0086] The encryption module is configured to parse the access request message, obtain the query parameters to be encrypted and their values, and decrypt the column according to the encryption type determined by the encrypted field, the ciphertext of the column encryption key, and the column master key Encrypt the ciphertext of the encryption key, encrypt the value of the query parameter according to the encryption type and the decrypted column encryption key, encapsulate the encrypted query parameter into the access request message, and forward it to the second server;
[0087] The decryption module is configured to receive a response message from the second server, parse and decrypt the respons...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

