CN109697374A - A kind of encryption method, decryption method and device - Google Patents

A kind of encryption method, decryption method and device Download PDF

Info

Publication number
CN109697374A
CN109697374A CN201811626544.3A CN201811626544A CN109697374A CN 109697374 A CN109697374 A CN 109697374A CN 201811626544 A CN201811626544 A CN 201811626544A CN 109697374 A CN109697374 A CN 109697374A
Authority
CN
China
Prior art keywords
data
field
ciphertext
tables
clear
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811626544.3A
Other languages
Chinese (zh)
Inventor
施伟周
刘光健
陈柏坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastcompeace Technology Co Ltd
Original Assignee
Eastcompeace Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastcompeace Technology Co Ltd filed Critical Eastcompeace Technology Co Ltd
Priority to CN201811626544.3A priority Critical patent/CN109697374A/en
Publication of CN109697374A publication Critical patent/CN109697374A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encryption method, decryption method and device, encryption method includes: newdata table, and definition has field in tables of data, and field includes sensitive data field and nonsensitive data field;Whether the clear data of real-time detection input can change the data in sensitive data field;If so, intercepting clear data;The intercepted clear data of encryption, obtains ciphertext data;Ciphertext data are stored into tables of data.Decryption method includes: the data whether the acquisition data command of detection input is related in sensitive data field;If so, the ciphertext data in the corresponding tables of data of decrypting sensitive data field, obtain the ciphertext data of the tables of data;Newly-built mapping table, the corresponding ciphertext data of tables of data after mapping table mapping decryption;It obtains data command and is directed toward mapping table, and acquire ciphertext data.The embodiment of the present invention changes for solving because of sensitive data, causes the exploitation and problem difficult in maintenance of application program.

Description

A kind of encryption method, decryption method and device
Technical field
The invention belongs to data encryption/decryption method technical field more particularly to a kind of encryption methods, decryption method and device.
Background technique
In the prior art, it stores after sensitive data is encrypted by application program into database, specially application program Sensitive data is encrypted using encryption equipment, while when sensitive data is used decrypts in the application.
Therefore, if sensitive data changes, such as: cipher mode changes, changing encryption algorithm and data are no longer sensitive The problems such as changing correspondingly Deng, application program needs, be unfavorable for the exploitation and maintenance of application program, data is easily caused to cause confusion.
Summary of the invention
The purpose of the present invention is to provide a kind of encryption method, decryption method and devices, to solve to occur because of sensitive data Change, causes the exploitation and problem difficult in maintenance of application program.
To achieve this purpose, the present invention adopts the following technical scheme:
In a first aspect, the embodiment of the invention provides a kind of encryption methods, comprising the following steps:
Newdata table, definition has field in the tables of data, and the field includes sensitive data field and non-sensitive number According to field;
Whether the clear data of real-time detection input can change the data in the sensitive data field;
If so, intercepting the clear data;
The intercepted clear data of encryption, obtains ciphertext data;
The ciphertext data are stored into the tables of data.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field, Include:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
Optionally, described to intercept the clear data, comprising: the trigger intercepts the clear data;
The intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger calls hardware encryption The intercepted clear data of machine encryption, obtains ciphertext data.
Optionally, the clear data that the trigger calls the encryption of hardware encryption equipment intercepted, obtains ciphertext Data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field, Include:
Whether the clear data of real-time detection input is to increase data or real-time detection newly in the sensitive data field Whether the clear data of input is to update existing data in the sensitive data field.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field, Later further include:
If it is not, then storing the clear data into the tables of data.
Second aspect, the embodiment of the invention provides a kind of decryption methods, for decrypting using encryption side as described above Method stores the ciphertext data into tables of data, comprising the following steps:
Whether the acquisition data command of detection input is related to the data in the sensitive data field;
If so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field, the tables of data is obtained Ciphertext data;
Newly-built mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
The acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
Optionally, the ciphertext data in the corresponding tables of data of the decryption sensitive data field, obtain the number According to the ciphertext data of table, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, is somebody's turn to do The ciphertext data of tables of data.
The third aspect, the embodiment of the invention provides a kind of devices, comprising:
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive number According to field and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change in the sensitive data field Data;
Blocking module, when for the data in the sensitive data field can be changed when the clear data for detecting input, Intercept the clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
Optionally, device further include: whether the second detection module, the acquisition data command for detecting input are related to institute State the data in sensitive data field;
Deciphering module, for being related to the data in the sensitive data field when the acquisition data command for detecting input When, the ciphertext data in the corresponding tables of data of the sensitive data field are decrypted, the ciphertext data of the tables of data is obtained;
Second newly-built module, the corresponding solution of tables of data for creating mapping table, after the mapping table mapping decryption Ciphertext data;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
Compared with prior art, the embodiment of the present invention has the advantages that
A kind of encryption method, decryption method and device provided in an embodiment of the present invention, when being operated to tables of data, when When detecting to change the data in sensitive data field, stored after being encrypted to the clear data, by input data and Encryption data individually carries out;When detecting to obtain the data, i.e. ciphertext data in tables of data in sensitive data field, It first decrypts the tables of data and obtains ciphertext data, ciphertext data is mapped as mapping table, obtain data command and obtain in the mapping table Ciphertext data;Above-mentioned encryption method and decryption method realize transparent encryption and decryption relative to application program;And it can be for spy Fixed number is answered according to being encrypted, realizing data function in multiple Application sharing sensitive data fields without remodifying With program, solves the problems, such as application development of the existing technology and difficult in maintenance.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method flow diagram of encryption method provided in an embodiment of the present invention.
Fig. 2 is a kind of method flow diagram of decryption method provided in an embodiment of the present invention.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention Range.
It please refers to shown in Fig. 1 and 2, the embodiment of the invention provides a kind of encryption methods, to solve in the prior art, Because sensitive data changes, the exploitation and problem difficult in maintenance of application program are caused.
Specifically, the encryption method the following steps are included:
Step S1, newdata table, definition has a field in the tables of data, and the field includes sensitive data field and non- Sensitive data field;
Whether the clear data of step S2, real-time detection input can change the data in the sensitive data field;
Step S3, if so, intercepting the clear data;
Step S4 encrypts the intercepted clear data, obtains ciphertext data;
Step S5 stores the ciphertext data into the tables of data.
Specifically, including multiple fields, word in server end newdata table, each tables of data in step sl Section is divided into sensitive data field and nonsensitive data field according to actual requirement.For example, in the database of MySQL, wherein can Multiple tables of data are created, there are multiple fields in each tables of data.In actual scene, can define a tables of data includes a variety of letters Breath, such as ID card No. and gender information.ID card No. can be defined as to sensitive data field, and gender be defined as it is non-quick Feel data field.
In step s 2, optionally, in the application program of client, clear data is inputted, to change in server end Tables of data in data information.
In step s3, when the clear data of input can change the data in sensitive data field, as change of status is demonstrate,proved Number information, then server end intercepts the clear data.
Then in step s 4, server end encrypts the clear data, obtains ciphertext data.
Step S5 is finally carried out, ciphertext data are stored into tables of data, i.e., ciphertext data are written quick in tables of data Feel in data field.
In the encryption method, the application program of client is only responsible for input clear data, and is responsible for sentencing by server end Whether disconnected clear data is content in sensitive data field, if so, then being encrypted.The encryption method, the input of client The encrypting plaintext data of clear data and server end are mutually indepedent, to solve in the prior art, because in sensitive data field Data change, caused by application program need the problem of changing correspondingly.
Further, in step s 2, whether the clear data of the real-time detection input can change the sensitive data Data in field, comprising:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
Further, in step s3, described to intercept the clear data, comprising: the trigger intercepts the plaintext Data;
In step s 4, the intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger The clear data for calling the encryption of hardware encryption equipment intercepted, obtains ciphertext data.
Further, the clear data that the trigger calls the encryption of hardware encryption equipment intercepted, obtains close Literary data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
Optionally, in another embodiment of the application, MySQL database is installed, using C Plus Plus in server end A plug-in unit is developed, for calling hardware encryption equipment.Since hardware encryption equipment generally can not be called directly by MySQL, it needs The plug-in unit is developed, and the plug-in unit is compiled into dynamic base, is mounted in the plugin library of MySQL.
Therefore, the trigger in server end calls the plug-in unit by the sql like language of MySQL, so that hardware be called to add Close machine realizes encryption and decryption to clear data using the function of encryption and the decryption of hardware encryption equipment.
Further, in step s 2, whether the clear data of the real-time detection input can change the sensitive data Data in field, comprising:
Whether the clear data of real-time detection input is to increase data or real-time detection newly in the sensitive data field Whether the clear data of input is to update existing data in the sensitive data field.
Further, whether the clear data of the real-time detection input can change the number in the sensitive data field According to later further include: if it is not, then storing the clear data into the tables of data.In the present embodiment, pass through the encryption side Method can encrypt required clear data on demand.
The present embodiment additionally provides a kind of decryption method, is stored using encryption method as described above to data for decrypting Ciphertext data in table.
Specifically, the decryption method the following steps are included:
Whether step S6, the acquisition data command for detecting input are related to data in the sensitive data field;
Step S7 is somebody's turn to do if so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field The ciphertext data of tables of data;
Step S8 creates mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
Step S9, the acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
In step s 6, the application program of client needs to call the content obtained in tables of data.Therefore, server end is examined It surveys it and obtains the data whether data command is related in sensitive data field, i.e., whether be related to ciphertext data.
If so, carrying out step S7, server end is decrypted close in the corresponding tables of data of the sensitive data field Literary data obtain the ciphertext data of the tables of data.
Then step S8 is carried out, mapping table is obtained, finally carries out step S9.
Decryption method provided in this embodiment substantially exists when the application program of client obtains ciphertext data Data are obtained in mapping table, therefore ensure that the data safety in tables of data, and transparent decryption is realized to application program.
In conclusion a kind of encryption method provided in an embodiment of the present invention and decryption method, operate to tables of data When, when detecting to change the data in sensitive data field, is being stored after being encrypted to the clear data, number will be inputted It is individually carried out according to encryption data;When detecting to obtain the data in tables of data in sensitive data field, i.e. ciphertext number According to when, first decrypt the tables of data and obtain ciphertext data, ciphertext data is mapped as mapping table, obtains data command in the mapping table Obtain ciphertext data;Above-mentioned encryption method and decryption method realize transparent encryption and decryption relative to application program;And it can needle Specific data is encrypted, realizes data function in multiple Application sharing sensitive data fields, without repairing again Change application program, solves the problems, such as application development of the existing technology and difficult in maintenance.
Further, close in the corresponding tables of data of the decryption sensitive data field in the step S7 Literary data obtain the ciphertext data of the tables of data, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, is somebody's turn to do The ciphertext data of tables of data.
Realization principle is consistent in above-mentioned encryption method herein, i.e., server end calls hardware encryption equipment by plug-in unit, So that the decryption function of hardware encryption equipment realizes decryption ciphertext data.
Further, the embodiment of the invention also provides a kind of devices, for realizing above-mentioned encryption method.
Specifically, the device includes:
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive number According to field and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change in the sensitive data field Data;
Blocking module, when for the data in the sensitive data field can be changed when the clear data for detecting input, Intercept the clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
Further, in order to realize above-mentioned decryption method, the device further include:
Whether the second detection module, the acquisition data command for detecting input are related to the number in the sensitive data field According to;
Deciphering module, for being related to the data in the sensitive data field when the acquisition data command for detecting input When, the ciphertext data in the corresponding tables of data of the sensitive data field are decrypted, the ciphertext data of the tables of data is obtained;
Second newly-built module, the corresponding solution of tables of data for creating mapping table, after the mapping table mapping decryption Ciphertext data;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
How the device specifically realizes the encryption method and decryption method, due to no longer going to live in the household of one's in-laws on getting married in above-mentioned elaboration herein It states.
Therefore, a kind of device provided in an embodiment of the present invention, it is quick to change when detecting when being operated to tables of data When feeling the data in data field, stored after being encrypted to the clear data, input data and encryption data is single respectively Solely carry out;When detecting to obtain the data, i.e. ciphertext data in tables of data in sensitive data field, the tables of data is first decrypted Ciphertext data is obtained, ciphertext data is mapped as mapping table, data command is obtained and obtains ciphertext data in the mapping table;It is above-mentioned to add Decryption method and decryption method realize transparent encryption and decryption relative to application program;And can be encrypted for specific data, It realizes the data function in multiple Application sharing sensitive data fields, without remodifying application program, solves existing There are application development existing for technology and problem difficult in maintenance.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of encryption method, which comprises the following steps:
Newdata table, definition has field in the tables of data, and the field includes sensitive data field and nonsensitive data word Section;
Whether the clear data of real-time detection input can change the data in the sensitive data field;
If so, intercepting the clear data;
The intercepted clear data of encryption, obtains ciphertext data;
The ciphertext data are stored into the tables of data.
2. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can Change the data in the sensitive data field, comprising:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
3. encryption method according to claim 2, which is characterized in that described to intercept the clear data, comprising: the touching It sends out device and intercepts the clear data;
The intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger calls hardware encryption equipment to add The close intercepted clear data, obtains ciphertext data.
4. encryption method according to claim 3, which is characterized in that the trigger calls the encryption of hardware encryption equipment The intercepted clear data, obtains ciphertext data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
5. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can Change the data in the sensitive data field, comprising:
Whether the clear data of real-time detection input is to increase data or real-time detection input newly in the sensitive data field Clear data whether be to update existing data in the sensitive data field.
6. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can Change the data in the sensitive data field, later further include:
If it is not, then storing the clear data into the tables of data.
7. a kind of decryption method stores the ciphertext number into tables of data using encryption method described in claim 1 for decrypting According to, which comprises the following steps:
Whether the acquisition data command of detection input is related to the data in the sensitive data field;
If so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field, the solution of the tables of data is obtained Ciphertext data;
Newly-built mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
The acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
8. decryption method according to claim 7, which is characterized in that described to decrypt the corresponding institute of the sensitive data field The ciphertext data in tables of data are stated, the ciphertext data of the tables of data is obtained, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, obtains the data The ciphertext data of table.
9. a kind of device characterized by comprising
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive data word Section and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change the number in the sensitive data field According to;
Blocking module when for that can change the data in the sensitive data field when the clear data for detecting input, intercepts The clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
10. device according to claim 9, which is characterized in that further include: the second detection module, for detecting input Obtain whether data command is related to the data in the sensitive data field;
Deciphering module, for solving when the acquisition data command for detecting input is related to the data in the sensitive data field Ciphertext data in the corresponding tables of data of the close sensitive data field, obtain the ciphertext data of the tables of data;
Second newly-built module, the corresponding decryption number of tables of data for creating mapping table, after the mapping table mapping decryption According to;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
CN201811626544.3A 2018-12-28 2018-12-28 A kind of encryption method, decryption method and device Pending CN109697374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811626544.3A CN109697374A (en) 2018-12-28 2018-12-28 A kind of encryption method, decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811626544.3A CN109697374A (en) 2018-12-28 2018-12-28 A kind of encryption method, decryption method and device

Publications (1)

Publication Number Publication Date
CN109697374A true CN109697374A (en) 2019-04-30

Family

ID=66232346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811626544.3A Pending CN109697374A (en) 2018-12-28 2018-12-28 A kind of encryption method, decryption method and device

Country Status (1)

Country Link
CN (1) CN109697374A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read
CN113642014A (en) * 2021-07-23 2021-11-12 广州有信科技有限公司 Data access system based on hybrid cloud and public cloud server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243629A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Transparent encryption and decryption method for database based on multi-level view and trigger
US20160224795A1 (en) * 2015-01-29 2016-08-04 International Business Machines Corporation Secure format-preserving encryption of data fields
CN106022143A (en) * 2016-05-10 2016-10-12 武汉华工安鼎信息技术有限责任公司 A method, a device and a system for database security classification mark security gateway operation
CN106850187A (en) * 2017-01-13 2017-06-13 温州大学瓯江学院 A kind of privacy character information encrypted query method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243629A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Transparent encryption and decryption method for database based on multi-level view and trigger
US20160224795A1 (en) * 2015-01-29 2016-08-04 International Business Machines Corporation Secure format-preserving encryption of data fields
CN106022143A (en) * 2016-05-10 2016-10-12 武汉华工安鼎信息技术有限责任公司 A method, a device and a system for database security classification mark security gateway operation
CN106850187A (en) * 2017-01-13 2017-06-13 温州大学瓯江学院 A kind of privacy character information encrypted query method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read
CN112651214B (en) * 2020-08-28 2023-03-28 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read
CN113642014A (en) * 2021-07-23 2021-11-12 广州有信科技有限公司 Data access system based on hybrid cloud and public cloud server

Similar Documents

Publication Publication Date Title
CN112804257B (en) Method and system for distributed cryptographic keys
JP5965973B2 (en) Specific information security input system and method
CN107294709A (en) A kind of block chain data processing method, apparatus and system
CN100380274C (en) Method and system for backup and restore of a context encryption key
US8971535B2 (en) Multi-level key management
CN108475237A (en) Storage operation is encrypted
CN104660551B (en) A kind of database access device and method based on webservice
CN102855448B (en) A kind of Field-level database encryption device
CN104156642A (en) Security password input system and method based on security touch screen control chip
CN103294961A (en) Method and device for file encrypting/decrypting
CN111898156A (en) Method, node and storage medium for realizing contract calling in block chain
CN103259651A (en) Encryption and decryption method and system of terminal data
CN106022143B (en) A kind of method, apparatus and system of the operation of database level of confidentiality mark security gateway
CN110490741B (en) Device and method for managing data validity and controllability in block chain
US9779258B2 (en) Confidential extraction of system internal data
CN107612898A (en) Internet of Things big data safe transmission and storage method, system
CN109697374A (en) A kind of encryption method, decryption method and device
CN109358859A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN110213052A (en) Data processing method and device
CN109213501A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN107995147A (en) Metadata encryption and decryption method and system based on distributed file system
CN108390942A (en) A kind of encrypted distributed cloud storage method and apparatus of hardware
CN102521541A (en) Softdog device and software protection method thereof
CN104717213A (en) Encryption and decryption method and system for network data transmission
CN105119917A (en) Data safety enhancing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190430

RJ01 Rejection of invention patent application after publication