CN109697374A - A kind of encryption method, decryption method and device - Google Patents
A kind of encryption method, decryption method and device Download PDFInfo
- Publication number
- CN109697374A CN109697374A CN201811626544.3A CN201811626544A CN109697374A CN 109697374 A CN109697374 A CN 109697374A CN 201811626544 A CN201811626544 A CN 201811626544A CN 109697374 A CN109697374 A CN 109697374A
- Authority
- CN
- China
- Prior art keywords
- data
- field
- ciphertext
- tables
- clear
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of encryption method, decryption method and device, encryption method includes: newdata table, and definition has field in tables of data, and field includes sensitive data field and nonsensitive data field;Whether the clear data of real-time detection input can change the data in sensitive data field;If so, intercepting clear data;The intercepted clear data of encryption, obtains ciphertext data;Ciphertext data are stored into tables of data.Decryption method includes: the data whether the acquisition data command of detection input is related in sensitive data field;If so, the ciphertext data in the corresponding tables of data of decrypting sensitive data field, obtain the ciphertext data of the tables of data;Newly-built mapping table, the corresponding ciphertext data of tables of data after mapping table mapping decryption;It obtains data command and is directed toward mapping table, and acquire ciphertext data.The embodiment of the present invention changes for solving because of sensitive data, causes the exploitation and problem difficult in maintenance of application program.
Description
Technical field
The invention belongs to data encryption/decryption method technical field more particularly to a kind of encryption methods, decryption method and device.
Background technique
In the prior art, it stores after sensitive data is encrypted by application program into database, specially application program
Sensitive data is encrypted using encryption equipment, while when sensitive data is used decrypts in the application.
Therefore, if sensitive data changes, such as: cipher mode changes, changing encryption algorithm and data are no longer sensitive
The problems such as changing correspondingly Deng, application program needs, be unfavorable for the exploitation and maintenance of application program, data is easily caused to cause confusion.
Summary of the invention
The purpose of the present invention is to provide a kind of encryption method, decryption method and devices, to solve to occur because of sensitive data
Change, causes the exploitation and problem difficult in maintenance of application program.
To achieve this purpose, the present invention adopts the following technical scheme:
In a first aspect, the embodiment of the invention provides a kind of encryption methods, comprising the following steps:
Newdata table, definition has field in the tables of data, and the field includes sensitive data field and non-sensitive number
According to field;
Whether the clear data of real-time detection input can change the data in the sensitive data field;
If so, intercepting the clear data;
The intercepted clear data of encryption, obtains ciphertext data;
The ciphertext data are stored into the tables of data.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field,
Include:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
Optionally, described to intercept the clear data, comprising: the trigger intercepts the clear data;
The intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger calls hardware encryption
The intercepted clear data of machine encryption, obtains ciphertext data.
Optionally, the clear data that the trigger calls the encryption of hardware encryption equipment intercepted, obtains ciphertext
Data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field,
Include:
Whether the clear data of real-time detection input is to increase data or real-time detection newly in the sensitive data field
Whether the clear data of input is to update existing data in the sensitive data field.
Optionally, whether the clear data of the real-time detection input can change the data in the sensitive data field,
Later further include:
If it is not, then storing the clear data into the tables of data.
Second aspect, the embodiment of the invention provides a kind of decryption methods, for decrypting using encryption side as described above
Method stores the ciphertext data into tables of data, comprising the following steps:
Whether the acquisition data command of detection input is related to the data in the sensitive data field;
If so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field, the tables of data is obtained
Ciphertext data;
Newly-built mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
The acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
Optionally, the ciphertext data in the corresponding tables of data of the decryption sensitive data field, obtain the number
According to the ciphertext data of table, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, is somebody's turn to do
The ciphertext data of tables of data.
The third aspect, the embodiment of the invention provides a kind of devices, comprising:
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive number
According to field and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change in the sensitive data field
Data;
Blocking module, when for the data in the sensitive data field can be changed when the clear data for detecting input,
Intercept the clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
Optionally, device further include: whether the second detection module, the acquisition data command for detecting input are related to institute
State the data in sensitive data field;
Deciphering module, for being related to the data in the sensitive data field when the acquisition data command for detecting input
When, the ciphertext data in the corresponding tables of data of the sensitive data field are decrypted, the ciphertext data of the tables of data is obtained;
Second newly-built module, the corresponding solution of tables of data for creating mapping table, after the mapping table mapping decryption
Ciphertext data;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
Compared with prior art, the embodiment of the present invention has the advantages that
A kind of encryption method, decryption method and device provided in an embodiment of the present invention, when being operated to tables of data, when
When detecting to change the data in sensitive data field, stored after being encrypted to the clear data, by input data and
Encryption data individually carries out;When detecting to obtain the data, i.e. ciphertext data in tables of data in sensitive data field,
It first decrypts the tables of data and obtains ciphertext data, ciphertext data is mapped as mapping table, obtain data command and obtain in the mapping table
Ciphertext data;Above-mentioned encryption method and decryption method realize transparent encryption and decryption relative to application program;And it can be for spy
Fixed number is answered according to being encrypted, realizing data function in multiple Application sharing sensitive data fields without remodifying
With program, solves the problems, such as application development of the existing technology and difficult in maintenance.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method flow diagram of encryption method provided in an embodiment of the present invention.
Fig. 2 is a kind of method flow diagram of decryption method provided in an embodiment of the present invention.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
It please refers to shown in Fig. 1 and 2, the embodiment of the invention provides a kind of encryption methods, to solve in the prior art,
Because sensitive data changes, the exploitation and problem difficult in maintenance of application program are caused.
Specifically, the encryption method the following steps are included:
Step S1, newdata table, definition has a field in the tables of data, and the field includes sensitive data field and non-
Sensitive data field;
Whether the clear data of step S2, real-time detection input can change the data in the sensitive data field;
Step S3, if so, intercepting the clear data;
Step S4 encrypts the intercepted clear data, obtains ciphertext data;
Step S5 stores the ciphertext data into the tables of data.
Specifically, including multiple fields, word in server end newdata table, each tables of data in step sl
Section is divided into sensitive data field and nonsensitive data field according to actual requirement.For example, in the database of MySQL, wherein can
Multiple tables of data are created, there are multiple fields in each tables of data.In actual scene, can define a tables of data includes a variety of letters
Breath, such as ID card No. and gender information.ID card No. can be defined as to sensitive data field, and gender be defined as it is non-quick
Feel data field.
In step s 2, optionally, in the application program of client, clear data is inputted, to change in server end
Tables of data in data information.
In step s3, when the clear data of input can change the data in sensitive data field, as change of status is demonstrate,proved
Number information, then server end intercepts the clear data.
Then in step s 4, server end encrypts the clear data, obtains ciphertext data.
Step S5 is finally carried out, ciphertext data are stored into tables of data, i.e., ciphertext data are written quick in tables of data
Feel in data field.
In the encryption method, the application program of client is only responsible for input clear data, and is responsible for sentencing by server end
Whether disconnected clear data is content in sensitive data field, if so, then being encrypted.The encryption method, the input of client
The encrypting plaintext data of clear data and server end are mutually indepedent, to solve in the prior art, because in sensitive data field
Data change, caused by application program need the problem of changing correspondingly.
Further, in step s 2, whether the clear data of the real-time detection input can change the sensitive data
Data in field, comprising:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
Further, in step s3, described to intercept the clear data, comprising: the trigger intercepts the plaintext
Data;
In step s 4, the intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger
The clear data for calling the encryption of hardware encryption equipment intercepted, obtains ciphertext data.
Further, the clear data that the trigger calls the encryption of hardware encryption equipment intercepted, obtains close
Literary data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
Optionally, in another embodiment of the application, MySQL database is installed, using C Plus Plus in server end
A plug-in unit is developed, for calling hardware encryption equipment.Since hardware encryption equipment generally can not be called directly by MySQL, it needs
The plug-in unit is developed, and the plug-in unit is compiled into dynamic base, is mounted in the plugin library of MySQL.
Therefore, the trigger in server end calls the plug-in unit by the sql like language of MySQL, so that hardware be called to add
Close machine realizes encryption and decryption to clear data using the function of encryption and the decryption of hardware encryption equipment.
Further, in step s 2, whether the clear data of the real-time detection input can change the sensitive data
Data in field, comprising:
Whether the clear data of real-time detection input is to increase data or real-time detection newly in the sensitive data field
Whether the clear data of input is to update existing data in the sensitive data field.
Further, whether the clear data of the real-time detection input can change the number in the sensitive data field
According to later further include: if it is not, then storing the clear data into the tables of data.In the present embodiment, pass through the encryption side
Method can encrypt required clear data on demand.
The present embodiment additionally provides a kind of decryption method, is stored using encryption method as described above to data for decrypting
Ciphertext data in table.
Specifically, the decryption method the following steps are included:
Whether step S6, the acquisition data command for detecting input are related to data in the sensitive data field;
Step S7 is somebody's turn to do if so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field
The ciphertext data of tables of data;
Step S8 creates mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
Step S9, the acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
In step s 6, the application program of client needs to call the content obtained in tables of data.Therefore, server end is examined
It surveys it and obtains the data whether data command is related in sensitive data field, i.e., whether be related to ciphertext data.
If so, carrying out step S7, server end is decrypted close in the corresponding tables of data of the sensitive data field
Literary data obtain the ciphertext data of the tables of data.
Then step S8 is carried out, mapping table is obtained, finally carries out step S9.
Decryption method provided in this embodiment substantially exists when the application program of client obtains ciphertext data
Data are obtained in mapping table, therefore ensure that the data safety in tables of data, and transparent decryption is realized to application program.
In conclusion a kind of encryption method provided in an embodiment of the present invention and decryption method, operate to tables of data
When, when detecting to change the data in sensitive data field, is being stored after being encrypted to the clear data, number will be inputted
It is individually carried out according to encryption data;When detecting to obtain the data in tables of data in sensitive data field, i.e. ciphertext number
According to when, first decrypt the tables of data and obtain ciphertext data, ciphertext data is mapped as mapping table, obtains data command in the mapping table
Obtain ciphertext data;Above-mentioned encryption method and decryption method realize transparent encryption and decryption relative to application program;And it can needle
Specific data is encrypted, realizes data function in multiple Application sharing sensitive data fields, without repairing again
Change application program, solves the problems, such as application development of the existing technology and difficult in maintenance.
Further, close in the corresponding tables of data of the decryption sensitive data field in the step S7
Literary data obtain the ciphertext data of the tables of data, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, is somebody's turn to do
The ciphertext data of tables of data.
Realization principle is consistent in above-mentioned encryption method herein, i.e., server end calls hardware encryption equipment by plug-in unit,
So that the decryption function of hardware encryption equipment realizes decryption ciphertext data.
Further, the embodiment of the invention also provides a kind of devices, for realizing above-mentioned encryption method.
Specifically, the device includes:
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive number
According to field and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change in the sensitive data field
Data;
Blocking module, when for the data in the sensitive data field can be changed when the clear data for detecting input,
Intercept the clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
Further, in order to realize above-mentioned decryption method, the device further include:
Whether the second detection module, the acquisition data command for detecting input are related to the number in the sensitive data field
According to;
Deciphering module, for being related to the data in the sensitive data field when the acquisition data command for detecting input
When, the ciphertext data in the corresponding tables of data of the sensitive data field are decrypted, the ciphertext data of the tables of data is obtained;
Second newly-built module, the corresponding solution of tables of data for creating mapping table, after the mapping table mapping decryption
Ciphertext data;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
How the device specifically realizes the encryption method and decryption method, due to no longer going to live in the household of one's in-laws on getting married in above-mentioned elaboration herein
It states.
Therefore, a kind of device provided in an embodiment of the present invention, it is quick to change when detecting when being operated to tables of data
When feeling the data in data field, stored after being encrypted to the clear data, input data and encryption data is single respectively
Solely carry out;When detecting to obtain the data, i.e. ciphertext data in tables of data in sensitive data field, the tables of data is first decrypted
Ciphertext data is obtained, ciphertext data is mapped as mapping table, data command is obtained and obtains ciphertext data in the mapping table;It is above-mentioned to add
Decryption method and decryption method realize transparent encryption and decryption relative to application program;And can be encrypted for specific data,
It realizes the data function in multiple Application sharing sensitive data fields, without remodifying application program, solves existing
There are application development existing for technology and problem difficult in maintenance.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of encryption method, which comprises the following steps:
Newdata table, definition has field in the tables of data, and the field includes sensitive data field and nonsensitive data word
Section;
Whether the clear data of real-time detection input can change the data in the sensitive data field;
If so, intercepting the clear data;
The intercepted clear data of encryption, obtains ciphertext data;
The ciphertext data are stored into the tables of data.
2. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can
Change the data in the sensitive data field, comprising:
Newly-built trigger in advance;
Whether the clear data of the trigger real-time detection input can change the data in the sensitive data field.
3. encryption method according to claim 2, which is characterized in that described to intercept the clear data, comprising: the touching
It sends out device and intercepts the clear data;
The intercepted clear data of the encryption, obtains ciphertext data, comprising: the trigger calls hardware encryption equipment to add
The close intercepted clear data, obtains ciphertext data.
4. encryption method according to claim 3, which is characterized in that the trigger calls the encryption of hardware encryption equipment
The intercepted clear data, obtains ciphertext data, comprising:
The trigger is by calling pre-added plug-in unit to call the hardware encryption equipment;
The hardware encryption equipment encrypts the clear data, obtains ciphertext data;
The ciphertext data are returned to the trigger by the hardware encryption equipment.
5. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can
Change the data in the sensitive data field, comprising:
Whether the clear data of real-time detection input is to increase data or real-time detection input newly in the sensitive data field
Clear data whether be to update existing data in the sensitive data field.
6. encryption method according to claim 1, which is characterized in that whether the clear data of the real-time detection input can
Change the data in the sensitive data field, later further include:
If it is not, then storing the clear data into the tables of data.
7. a kind of decryption method stores the ciphertext number into tables of data using encryption method described in claim 1 for decrypting
According to, which comprises the following steps:
Whether the acquisition data command of detection input is related to the data in the sensitive data field;
If so, decrypting the ciphertext data in the corresponding tables of data of the sensitive data field, the solution of the tables of data is obtained
Ciphertext data;
Newly-built mapping table, the corresponding ciphertext data of tables of data after the mapping table mapping decryption;
The acquisition data command is directed toward the mapping table, and acquires the ciphertext data.
8. decryption method according to claim 7, which is characterized in that described to decrypt the corresponding institute of the sensitive data field
The ciphertext data in tables of data are stated, the ciphertext data of the tables of data is obtained, comprising:
Hardware encryption equipment is called by pre-added plug-in unit;
The hardware encryption equipment decrypts the ciphertext data in the corresponding tables of data of the sensitive data field, obtains the data
The ciphertext data of table.
9. a kind of device characterized by comprising
First newly-built module is used for newdata table, and definition has field in the tables of data, and the field includes sensitive data word
Section and nonsensitive data field;
Whether first detection module, the clear data for real-time detection input can change the number in the sensitive data field
According to;
Blocking module when for that can change the data in the sensitive data field when the clear data for detecting input, intercepts
The clear data;
Encrypting module obtains ciphertext data for encrypting the intercepted clear data;
Memory module stores the ciphertext data into the tables of data.
10. device according to claim 9, which is characterized in that further include: the second detection module, for detecting input
Obtain whether data command is related to the data in the sensitive data field;
Deciphering module, for solving when the acquisition data command for detecting input is related to the data in the sensitive data field
Ciphertext data in the corresponding tables of data of the close sensitive data field, obtain the ciphertext data of the tables of data;
Second newly-built module, the corresponding decryption number of tables of data for creating mapping table, after the mapping table mapping decryption
According to;
It is directed toward module, is directed toward the mapping table for the acquisition data command, and acquire the ciphertext data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811626544.3A CN109697374A (en) | 2018-12-28 | 2018-12-28 | A kind of encryption method, decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811626544.3A CN109697374A (en) | 2018-12-28 | 2018-12-28 | A kind of encryption method, decryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109697374A true CN109697374A (en) | 2019-04-30 |
Family
ID=66232346
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811626544.3A Pending CN109697374A (en) | 2018-12-28 | 2018-12-28 | A kind of encryption method, decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109697374A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112651214A (en) * | 2020-08-28 | 2021-04-13 | 成都格斗科技有限公司 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
CN113642014A (en) * | 2021-07-23 | 2021-11-12 | 广州有信科技有限公司 | Data access system based on hybrid cloud and public cloud server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102243629A (en) * | 2010-05-12 | 2011-11-16 | 北京安华金和科技有限公司 | Transparent encryption and decryption method for database based on multi-level view and trigger |
US20160224795A1 (en) * | 2015-01-29 | 2016-08-04 | International Business Machines Corporation | Secure format-preserving encryption of data fields |
CN106022143A (en) * | 2016-05-10 | 2016-10-12 | 武汉华工安鼎信息技术有限责任公司 | A method, a device and a system for database security classification mark security gateway operation |
CN106850187A (en) * | 2017-01-13 | 2017-06-13 | 温州大学瓯江学院 | A kind of privacy character information encrypted query method and system |
-
2018
- 2018-12-28 CN CN201811626544.3A patent/CN109697374A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102243629A (en) * | 2010-05-12 | 2011-11-16 | 北京安华金和科技有限公司 | Transparent encryption and decryption method for database based on multi-level view and trigger |
US20160224795A1 (en) * | 2015-01-29 | 2016-08-04 | International Business Machines Corporation | Secure format-preserving encryption of data fields |
CN106022143A (en) * | 2016-05-10 | 2016-10-12 | 武汉华工安鼎信息技术有限责任公司 | A method, a device and a system for database security classification mark security gateway operation |
CN106850187A (en) * | 2017-01-13 | 2017-06-13 | 温州大学瓯江学院 | A kind of privacy character information encrypted query method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112651214A (en) * | 2020-08-28 | 2021-04-13 | 成都格斗科技有限公司 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
CN112651214B (en) * | 2020-08-28 | 2023-03-28 | 成都格斗科技有限公司 | Method for converting data table plaintext into binary ciphertext convenient for program to read |
CN113642014A (en) * | 2021-07-23 | 2021-11-12 | 广州有信科技有限公司 | Data access system based on hybrid cloud and public cloud server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112804257B (en) | Method and system for distributed cryptographic keys | |
JP5965973B2 (en) | Specific information security input system and method | |
CN107294709A (en) | A kind of block chain data processing method, apparatus and system | |
CN100380274C (en) | Method and system for backup and restore of a context encryption key | |
US8971535B2 (en) | Multi-level key management | |
CN108475237A (en) | Storage operation is encrypted | |
CN104660551B (en) | A kind of database access device and method based on webservice | |
CN102855448B (en) | A kind of Field-level database encryption device | |
CN104156642A (en) | Security password input system and method based on security touch screen control chip | |
CN103294961A (en) | Method and device for file encrypting/decrypting | |
CN111898156A (en) | Method, node and storage medium for realizing contract calling in block chain | |
CN103259651A (en) | Encryption and decryption method and system of terminal data | |
CN106022143B (en) | A kind of method, apparatus and system of the operation of database level of confidentiality mark security gateway | |
CN110490741B (en) | Device and method for managing data validity and controllability in block chain | |
US9779258B2 (en) | Confidential extraction of system internal data | |
CN107612898A (en) | Internet of Things big data safe transmission and storage method, system | |
CN109697374A (en) | A kind of encryption method, decryption method and device | |
CN109358859A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN110213052A (en) | Data processing method and device | |
CN109213501A (en) | The method, apparatus and storage medium of intelligent contract are installed in block chain network | |
CN107995147A (en) | Metadata encryption and decryption method and system based on distributed file system | |
CN108390942A (en) | A kind of encrypted distributed cloud storage method and apparatus of hardware | |
CN102521541A (en) | Softdog device and software protection method thereof | |
CN104717213A (en) | Encryption and decryption method and system for network data transmission | |
CN105119917A (en) | Data safety enhancing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190430 |
|
RJ01 | Rejection of invention patent application after publication |