Cryptographic technology security control method and system for core table data

A cryptographic technology and table data technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of hidden safety hazards, no supervision, etc., and achieve the effect of eliminating attacks, reducing the possibility, and reducing the requirements

Pending Publication Date: 2021-01-05
江苏大周基业智能科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Data tables are an important form of data storage in databases, but there are still many security risks in the existing data table data management, including: 1. The system administrator has full authority over the core data tables of the information system; 2. The system's The database manages structured and unstructured data in the form of tables; 3. The access to the database table is directly operated by SQL after the access login is confirmed, and the process is in a state of no supervision; 4. The data storage of the database table is stored in plain text way of taking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic technology security control method and system for core table data
  • Cryptographic technology security control method and system for core table data
  • Cryptographic technology security control method and system for core table data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This example specifically illustrates the implementation of the method of the present invention.

[0054] 1. Classify the database table structure and data according to the conventional user table structure, permission table structure, and pure data table structure

[0055] Existing information systems generally use user tables, permission tables, and business data tables to roughly classify them. There are also tables that integrate users and permissions into a single table, or create tables by hierarchical indexing according to data volume. No matter how the table is built, its purpose is to realize the application design under the premise of the minimum amount of calculation, so as to improve the response speed of the information system.

[0056] The data reorganization of this system in this system is equivalent to initializing the table structure to prepare for the subsequent implementation of cryptographic technology. The user table structure and authority table s...

Embodiment 2

[0090] This embodiment specifically illustrates the implementation of the system of the present invention.

[0091] A cryptographic technology security control system for core table data, including:

[0092] Database, a collection of various tables used to store business data;

[0093]The data tables stored in the database are processed based on the following method: the user table structure and the authority table structure in the database are extracted to establish an access control table for the database, and the user access information is counted based on the user table and authority table data, according to the multiplier of the access frequency Perform statistical classification, set n-level access frequency, set up a frequency table, store index IDs, keywords and corresponding frequency grades and frequency attributes, and the frequency attributes store the attribute structure contained in the corresponding database index table, including data paths, Data characteristi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cryptographic technology security control method and system for core table data, and the method comprises the steps: transforming a data table stored in a database, extracting a user table and an authority table, integrating the user table and the authority table into an access control table, carrying out the statistics of user access information based on the user tableand authority table data, carrying out the statistical classification according to the multiplying power of access frequency, and setting n levels of access frequency, establishing a frequency table,and establishing a corresponding multi-level database index table according to the frequency levels in the frequency table structure corresponding to the pure data class table; forming ciphertext forthe key data in the access control table and the frequency table; after user identity authentication, intercepting keywords from user login information and retrieval information, searching records containing the keywords from the frequency table and the access control table, obtaining corresponding ciphertext and carrying out decryption, and accessing a corresponding data table in the database. According to the method and the system, under the condition that all data of the database table cannot be subjected to full-amount encryption and decryption protection, safety control and plaintext confidential storage of the structural data of the database core table can be realized.

Description

technical field [0001] The invention belongs to the technical field of information security and cryptography, and specifically relates to a method and a system for how to implement cryptographic security control of core table structure data under the premise of encrypting and protecting a database system. Background technique [0002] Data tables are an important form of data storage in databases, but there are still many security risks in the existing data table data management, including: 1. The system administrator has full authority over the core data tables of the information system; 2. The system's The database manages structured and unstructured data in the form of tables; 3. The access to the database table is directly operated by SQL after the access login is confirmed, and the process is in a state of no supervision; 4. The data storage of the database table is stored in plain text way of taking. [0003] Based on this, the present invention proposes a cryptograph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/6227G06F21/602G06F21/6218
Inventor 顾峻
Owner 江苏大周基业智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products