Database data encryption processing method

A data encryption processing and data encryption technology, applied in the field of database security, can solve the problems of customer economic loss, leakage, data insecurity, etc., achieve the effect of flexible authorization rights, improve confidentiality level, and ensure data security

Pending Publication Date: 2021-12-14
ZHEJIANG WANLI UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As long as any personal data of anyone is stored in the database, whether it is a user or a company employee, the security of the database becomes more important. If no effective protection measures are taken, once the confidential information is stolen by criminals, not only will the customer's personal privacy information Leakage may also lead to economic losses for customers. As the demand for data in the black market rises and the profits of data leakage rise, the issue of database security becomes more important. In solutions to big data security issues, data encryption is usually used to increase Data security, the existing database data encryption is encrypted by a single encryption method, which is easy to decrypt in the chassis in a simple way, resulting in data that is still insecure, and the personnel inside the database system have no restrictions and records on the use of data. It is easy to leak secrets from the inside, which again aggravates the security problem of the database. Therefore, we propose a database data encryption processing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The invention provides a technical solution: a database data encryption processing method, which is applied to a database data encryption system. The database data encryption system includes a database, a user terminal and an approval terminal, and a key generation unit and a key are arranged in the approval terminal. Sending unit, the key generation unit can generate keys of different lengths of time, keys of different access times, download times and download time periods, the key sending unit includes a specific mailbox or an internal communication system, and the database The database of the data encryption system is connected to the approval terminal, and the approval terminal is connected to the user terminal, and the user terminal can enter the database to access the corresponding data content after obtaining the access authority.

[0026] Encryption steps:

[0027] S1. When the database creates a table, it will check whether the attributes of the table include e...

Embodiment 2

[0037] Steps for data encryption:

[0038] S1. During the daily self-inspection of the data encryption system, when sensitive keywords are found in the attributes of the table, the data is cached in data blocks, and then the data blocks are compressed, and the compressed data blocks are used at least two The encryption algorithm is used to encrypt and write the encrypted data into the database;

[0039] S2. When new data content is entered into the database, the operator at the approval end can encrypt data according to the data confidentiality level, and the data encryption system can also perform data encryption according to sensitive keywords;

[0040] Steps for data decryption:

[0041] S1. The user end sends a demand signal to the approval end. The approval end compares the demand signal sent by the user end with the confidentiality level of the data content to be queried. After confirming that the demand is reasonable, the approval end will transmit a command to the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database data encryption processing method, which is applied to a database data encryption system, the database data encryption system comprises a database, a user side and an approval side, and encryption steps are as follows: S1, when a table is established, checking whether attributes of the table comprise encryption keywords; s2, judging the data type of each data column in each table in the database, and performing different encryption processing according to different data types; s4, forced encryption: after the content of the database is opened, copying, newly creating, editing, storing and printing the data content, and automatically encrypting. According to the invention, the data of the table in the database is encrypted by using two encryption modes, when the user side needs to use the data, the user side needs to send a request to the approval side, the approval side can grant the key with the corresponding authority according to the request, and the user side can check and use the corresponding content in the database according to the key; data in the database is kept secret, so that data security is ensured.

Description

technical field [0001] The present invention relates to the technical field of database security, and more specifically, relates to a database data encryption processing method. Background technique [0002] In the big data environment, data security is a feature that is easily overlooked, resulting in data leakage and exposure is very common, because database technology is widely used in various information management systems, transaction systems, and various social software, social networking sites, Social networking systems such as online forums. In these databases, a large number of personal privacy data such as customer names, ID numbers, and personal passwords are stored, and some also store financial privacy data such as customer bank card numbers and expiration dates. As long as any personal data of anyone is stored in the database, whether it is a user or a company employee, the security of the database becomes more important. If no effective protection measures ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227
Inventor 李谦汪沁洪鑫华刘汉中
Owner ZHEJIANG WANLI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products