Database data encryption processing method
A data encryption processing and data encryption technology, applied in the field of database security, can solve the problems of customer economic loss, leakage, data insecurity, etc., achieve the effect of flexible authorization rights, improve confidentiality level, and ensure data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0025] The invention provides a technical solution: a database data encryption processing method, which is applied to a database data encryption system. The database data encryption system includes a database, a user terminal and an approval terminal, and a key generation unit and a key are arranged in the approval terminal. Sending unit, the key generation unit can generate keys of different lengths of time, keys of different access times, download times and download time periods, the key sending unit includes a specific mailbox or an internal communication system, and the database The database of the data encryption system is connected to the approval terminal, and the approval terminal is connected to the user terminal, and the user terminal can enter the database to access the corresponding data content after obtaining the access authority.
[0026] Encryption steps:
[0027] S1. When the database creates a table, it will check whether the attributes of the table include e...
Embodiment 2
[0037] Steps for data encryption:
[0038] S1. During the daily self-inspection of the data encryption system, when sensitive keywords are found in the attributes of the table, the data is cached in data blocks, and then the data blocks are compressed, and the compressed data blocks are used at least two The encryption algorithm is used to encrypt and write the encrypted data into the database;
[0039] S2. When new data content is entered into the database, the operator at the approval end can encrypt data according to the data confidentiality level, and the data encryption system can also perform data encryption according to sensitive keywords;
[0040] Steps for data decryption:
[0041] S1. The user end sends a demand signal to the approval end. The approval end compares the demand signal sent by the user end with the confidentiality level of the data content to be queried. After confirming that the demand is reasonable, the approval end will transmit a command to the key...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com