CN110046134B - Database log recording method and system and database log recording detection method - Google Patents

Database log recording method and system and database log recording detection method Download PDF

Info

Publication number
CN110046134B
CN110046134B CN201910281572.4A CN201910281572A CN110046134B CN 110046134 B CN110046134 B CN 110046134B CN 201910281572 A CN201910281572 A CN 201910281572A CN 110046134 B CN110046134 B CN 110046134B
Authority
CN
China
Prior art keywords
file
log
size
random number
dictionary file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910281572.4A
Other languages
Chinese (zh)
Other versions
CN110046134A (en
Inventor
赵剑竹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Infosec Technologies Co Ltd
Original Assignee
Beijing Infosec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Infosec Technologies Co Ltd filed Critical Beijing Infosec Technologies Co Ltd
Priority to CN201910281572.4A priority Critical patent/CN110046134B/en
Publication of CN110046134A publication Critical patent/CN110046134A/en
Application granted granted Critical
Publication of CN110046134B publication Critical patent/CN110046134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computational Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; circulating the steps to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; and performing third operation on the absolute path to the size of the current log file to obtain a key, and the like to obtain a database log. By the method, the whole file does not need to be calculated when new records are written, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.

Description

Database log recording method and system and database log recording detection method
Technical Field
The invention relates to the field of computer information security, in particular to a database log recording method and system and a database log recording detection method.
Background
The system log file records various behaviors of the user and is an important source of audit data. Therefore, it is important to ensure the integrity and authenticity of the log file.
It is common practice to hash the entire log file and then save the digest value in the system. When the file needs to be judged whether to be tampered, the file is hashed, and the digest value is compared with the digest value stored in the system.
The above method has the defects that when new log information is added each time, the whole file needs to be subjected to comparison and judgment by one-time hashing, after the information is successfully added through verification, the file is subjected to one-time hashing again, and a new hashed value is stored in the system. Hashing once takes a long time when the file content is many. This approach is very poor and it is not possible to judge which part of the data has been tampered with, resulting in the entire file being untrusted.
Disclosure of Invention
Objects of the invention
The invention aims to provide a database log recording method and system and a database log recording detection method, so as to solve the problems.
(II) technical scheme
To solve the above problem, a first aspect of the present invention provides a database logging method, including the following steps:
(1) generating a plurality of first random arrays to form a dictionary file;
(2) acquiring the number of bytes of the dictionary file, and generating a second random number;
(3) comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result;
(4) the step (2) and the step (3) are circulated for N times to obtain N first operation results;
(5) acquiring an absolute path of a log file;
(6) acquiring the size of a current log file;
(7) performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
(8) performing a third operation on the absolute path to the size of the current log file to obtain a key;
(9) performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
(10) writing the record, the N first operation results, the second operation result and the second operation result into the log;
(11) and recording the file size in the log after the information is written.
Further, the operation of generating the plurality of first random numbers to form one dictionary file is performed only once.
Further, the first operation result is obtained by comparing the byte number of the dictionary file with the size of the random number and performing the first operation on the byte number of the dictionary file according to the comparison result, and specifically includes: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Further, the first random number is one byte, and the byte range is-128 to 127, i.e. 256 numbers.
Further, the second random number is one byte, and the byte range is-128 to 127, i.e. 256 numbers.
Further, the second operation is AES, DESede, DES, or SM 4.0.
Further, the third operation is AES, DESede, DES, or SM 4.0.
Further, the fourth operation is AES, DESede, DES, or SM 4.0.
According to another aspect of the present invention, there is provided a database logging system including: the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file; the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number; the comparison analysis module is used for comparing the byte number of the dictionary file with the size of the random number and carrying out first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times; the path acquisition module is used for acquiring an absolute path of the log file; the file size calculation module is used for acquiring the size of the current log file; the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key; the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; the recording module is used for writing the record, the N first operation results, the second operation results and the second operation results into the log; and the final file size calculation module is used for recording the file size in the log after the information is written.
Further, the operation of generating the plurality of first random numbers to form one dictionary file is performed only once.
Further, the first operation result is obtained by comparing the byte number of the dictionary file with the size of the random number and performing the first operation on the byte number of the dictionary file according to the comparison result, and specifically includes: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Further, the first random number and the second random number are both one byte, and the byte range is-128 to 127, i.e. 256 numbers; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
According to another aspect of the present invention, there is provided a database log record detection method, including: comparing the size of the log file recorded by the database log recording method according to any one of the above schemes with the size of the file recorded by the log file, and judging whether the content of the log file changes; and calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered.
The invention provides a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the step (2) and the step (3) are circulated for N times to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; performing a third operation on the absolute path to the size of the current log file to obtain a key; performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; writing the record, the N first operation results, the second operation result and the second operation result into the log; and recording the file size in the log after the information is written.
(III) advantageous effects
The technical scheme of the invention has the following beneficial technical effects:
(1) when new records are written, the whole file does not need to be calculated, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high;
(2) the whole file does not need to be calculated during detection, several files are used and checked, and the sectional detection and detection efficiency is high.
Drawings
FIG. 1 is a flowchart of a database logging method according to a first embodiment of the present invention;
FIG. 2 is a flow chart of a database logging method according to an alternative embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Fig. 1 is a flowchart of a database logging method according to a first embodiment of the present invention.
As shown in fig. 1, in a first embodiment of the present invention, a first aspect of the embodiment provides a database logging method, including the following steps:
s1: generating a plurality of first random arrays to form a dictionary file;
s2: acquiring the number of bytes of the dictionary file, and generating a second random number;
s3: comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result;
s4: the step (2) and the step (3) are circulated for N times to obtain N first operation results;
s5: acquiring an absolute path of a log file;
s6: acquiring the size of a current log file;
s7: performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
s8: performing a third operation on the absolute path to the size of the current log file to obtain a key;
s9: performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
s10: writing the record, the N first operation results, the second operation result and the second operation result into the log;
s11: and recording the file size in the log after the information is written.
By the method, the database log is obtained, the whole file does not need to be calculated when new records are written, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.
Optionally, the operation of generating a plurality of first random arrays to form a dictionary file is performed only once.
Optionally, the comparing the number of bytes of the dictionary file with the size of the random number, and performing a first operation on the number of bytes of the dictionary file according to the comparison result to obtain a first operation result, specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Optionally, the first random number is one byte, and the byte range is-128 to 127, that is, 256 numbers.
Optionally, the second random number is one byte, and the byte range is-128 to 127, that is, 256 numbers.
Optionally, the second operation is AES, DESede, DES, or SM 4.0.
Optionally, the third operation is AES, DESede, DES, or SM 4.0.
Optionally, the fourth operation is AES, DESede, DES, or SM 4.0.
AES: advanced Encryption Standard (AES), also known as Rijndael Encryption, is a block Encryption Standard adopted by the federal government in the united states.
DES: the block algorithm, which is known as the Data Encryption Standard, is a block algorithm using key Encryption, was determined by the national institute of standards of the federal government in 1977 as the federal Data processing Standard (FIPS), and is authorized for use in non-confidential government communications, and then the algorithm was widely spread internationally.
DESeDE: a symmetric encryption algorithm improved by a DES symmetric encryption algorithm. A mechanism for encrypting material three times using a 168-bit key; it generally (but not always) provides extremely strong security. If the three 56-bit sub-elements are all the same, then triple DES is backwards compatible with DES.
SM 4.0: SM4.0 (original name SMs4.0) is a block cipher standard adopted by the government of the people's republic of china and issued by the national cipher authority on day 3/21 of 2012.
According to another aspect of an embodiment of the present invention, there is provided a database logging system including: the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file; the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number; the comparison analysis module is used for comparing the byte number of the dictionary file with the size of the random number and carrying out first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times; the path acquisition module is used for acquiring an absolute path of the log file; the file size calculation module is used for acquiring the size of the current log file; the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key; the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; the recording module is used for writing the record, the N first operation results, the second operation results and the second operation results into the log; and the final file size calculation module is used for recording the file size in the log after the information is written.
Optionally, the operation of generating a plurality of first random arrays to form a dictionary file is performed only once.
Optionally, the comparing the number of bytes of the dictionary file with the size of the random number, and performing a first operation on the number of bytes of the dictionary file according to the comparison result to obtain a first operation result, specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Optionally, both the first random number and the second random number are a byte, and the byte range is-128 to 127, that is, 256 numbers; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
According to another aspect of the embodiments of the present invention, there is provided a database log record detection method, including: comparing the size of the log file recorded by the database log recording method according to the scheme with the size of the file recorded by the log file, and judging whether the content of the log file changes or not; and calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered.
FIG. 2 is a flow chart of a database logging method according to an alternative embodiment of the invention.
As shown in fig. 2, in an alternative embodiment, a database logging method and a database logging detection method are provided, which include the following steps:
(1) the generation of N random numbers constitutes a dictionary file (denoted F), and this operation is only generated once.
(2) The byte size (denoted by L) of the F file is obtained, and a random number a is generated.
(3) Comparing A with L, when A is large, A is used to get modulus to L to get number M. A is M when A is less than B (so the value of M must be less than L).
(4) Cycling N times (2) (3) resulted in multiple M (by partition) denoted by I.
(5) And taking out values of corresponding positions of the dictionary file according to the index I to form an array K1 of N bytes.
(6) The log file absolute path K2 is obtained.
(7) The size K3 of the current log file is obtained.
(8) K3 is operated using key K1 to obtain E.
(9) K1, K2 and K3 are operated to obtain a key K.
(10) And calculating the record to be written into the log by using the secret key K to obtain a calculation result H.
(11) The log record I, E, H is written to the log file together.
(12) And recording the size of the log file after the log is written.
And when in detection, the size of the read file is compared with the size of the recorded file, and the inconsistency proves that the content of the file is changed.
Reading the log record by line, taking out corresponding data K1, K2 and E according to (5), (6), (7) and (8) to obtain a key K, and calculating the log record to judge whether the record is falsified or not in the comparison calculation result. And (4) calculating and comparing the current recording position by using K1 to judge whether the recording position is correct.
The invention aims to protect a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the step (2) and the step (3) are circulated for N times to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; performing a third operation on the absolute path to the size of the current log file to obtain a key; performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; writing the record, the N first operation results, the second operation result and the second operation result into the log; and recording the file size in the log after the information is written. When new records are written, the whole file does not need to be calculated, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.
In another aspect of the present invention, a database log record detection method is protected, including: comparing the size of the log file recorded by the database log recording method according to any one of the above embodiments with the size of the file recorded by the log file, and judging whether the content of the log file changes; and comparing the operation result of the log file record with the operation result recorded in the log file by the key to judge whether the file record is falsified. And calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered. The whole file does not need to be calculated during detection, several files are used and checked, and the sectional detection and detection efficiency is high. And comparing the operation result of the log file record with the operation result recorded in the log file by the key to judge whether the file record is falsified.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (8)

1. A database logging method, comprising the steps of:
(1) generating a plurality of first random arrays to form a dictionary file;
(2) acquiring the number of bytes of the dictionary file, and generating a second random number;
(3) comparing the byte number of the dictionary file with the second random number, and performing a first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result, wherein the comparing the byte number of the dictionary file with the second random number, and performing the first operation on the byte number of the dictionary file according to the comparison result to obtain the first operation result specifically comprises: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result;
(4) the step (2) and the step (3) are circulated for N times to obtain N first operation results;
(5) acquiring an absolute path of a log file;
(6) acquiring the size of a current log file;
(7) performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
(8) performing a third operation on the absolute path to the size of the current log file to obtain a key;
(9) performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
(10) writing the record, the N first operation results, the second operation result and the third operation result into the log;
(11) and recording the file size in the log after the information is written.
2. The database logging method of claim 1, wherein said operation of generating a plurality of first random numbers to form a dictionary file is performed only once.
3. The database logging method of claim 1, wherein said first random number and said second random number are each a byte, and the byte range is-128 to 127, i.e. 256 numbers.
4. The database logging method of claim 1, wherein said second operation is AES, DESede, DES, or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
5. A database logging system, comprising:
the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file;
the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number;
the comparison analysis module is configured to obtain a first operation result by comparing the byte number of the dictionary file with the size of the second random number and performing a first operation on the byte number of the dictionary file according to the comparison result, and obtain a first operation result by comparing the byte number of the dictionary file with the size of the second random number and performing a first operation on the byte number of the dictionary file according to the comparison result, where the first operation result is specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result;
the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times;
the path acquisition module is used for acquiring an absolute path of the log file;
the file size calculation module is used for acquiring the size of the current log file;
the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key;
the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
the recording module is used for writing the record, the N first operation results, the second operation results and the third operation results into the log;
and the final file size calculation module is used for recording the file size in the log after the information is written.
6. The database logging system of claim 5 wherein said operation of generating a plurality of first random numbers into a dictionary file is performed only once.
7. The database logging system of claim 5, wherein said first random number and said second random number are each a byte, and the byte range is-128 to 127, i.e., 256; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
8. A database log record detection method is characterized by comprising the following steps:
comparing the size of the log file recorded by the database logging method according to any of claims 1-4 with the size of the file recorded by the log file, and determining whether the content of the log file has changed;
and calculating log file records by acquiring the key of the log file, and judging whether the log file records are tampered.
CN201910281572.4A 2019-04-09 2019-04-09 Database log recording method and system and database log recording detection method Active CN110046134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910281572.4A CN110046134B (en) 2019-04-09 2019-04-09 Database log recording method and system and database log recording detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910281572.4A CN110046134B (en) 2019-04-09 2019-04-09 Database log recording method and system and database log recording detection method

Publications (2)

Publication Number Publication Date
CN110046134A CN110046134A (en) 2019-07-23
CN110046134B true CN110046134B (en) 2021-08-31

Family

ID=67276581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910281572.4A Active CN110046134B (en) 2019-04-09 2019-04-09 Database log recording method and system and database log recording detection method

Country Status (1)

Country Link
CN (1) CN110046134B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036157A (en) * 2014-06-05 2014-09-10 蓝盾信息安全技术有限公司 Method based on comprehensive characteristic value for detecting tampering of file
CN105740725A (en) * 2016-01-29 2016-07-06 北京大学 File protection method and system
CN105812391A (en) * 2016-05-16 2016-07-27 广州鼎鼎信息科技有限公司 Safe cloud storage system
CN106874793A (en) * 2017-01-20 2017-06-20 北京小米移动软件有限公司 The processing method and processing device of database
CN107133120A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of calibration of file data, device
US9870386B1 (en) * 2014-10-31 2018-01-16 Amazon Technologies, Inc. Reducing I/O operations for on-demand demand data page generation
CN109101644A (en) * 2018-08-21 2018-12-28 上海新炬网络信息技术股份有限公司 A kind of sound state journal file scanning collecting method
CN109510825A (en) * 2018-11-13 2019-03-22 许昌许继软件技术有限公司 Dynamic base encryption method and device and the anti-abduction method and apparatus of dynamic base

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208335B2 (en) * 2013-09-17 2015-12-08 Auburn University Space-time separated and jointly evolving relationship-based network access and data protection system
CN104144034B (en) * 2013-12-04 2016-04-13 腾讯科技(深圳)有限公司 Password is shared and acquisition methods and device
CN105959281B (en) * 2016-04-29 2020-12-22 腾讯科技(深圳)有限公司 File encryption transmission method and device
CN108809653B (en) * 2018-06-19 2019-07-12 北京多采多宜网络科技有限公司 A kind of cryptographic check processing method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036157A (en) * 2014-06-05 2014-09-10 蓝盾信息安全技术有限公司 Method based on comprehensive characteristic value for detecting tampering of file
US9870386B1 (en) * 2014-10-31 2018-01-16 Amazon Technologies, Inc. Reducing I/O operations for on-demand demand data page generation
CN105740725A (en) * 2016-01-29 2016-07-06 北京大学 File protection method and system
CN107133120A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of calibration of file data, device
CN105812391A (en) * 2016-05-16 2016-07-27 广州鼎鼎信息科技有限公司 Safe cloud storage system
CN106874793A (en) * 2017-01-20 2017-06-20 北京小米移动软件有限公司 The processing method and processing device of database
CN109101644A (en) * 2018-08-21 2018-12-28 上海新炬网络信息技术股份有限公司 A kind of sound state journal file scanning collecting method
CN109510825A (en) * 2018-11-13 2019-03-22 许昌许继软件技术有限公司 Dynamic base encryption method and device and the anti-abduction method and apparatus of dynamic base

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于AES算法的数据库二级密钥系统的设计与实现";苗杰;《江苏科技大学硕士学位论文》;20140122;第24-63页 *

Also Published As

Publication number Publication date
CN110046134A (en) 2019-07-23

Similar Documents

Publication Publication Date Title
EP3443710B1 (en) Cryptologic rewritable blockchain
EP3451578B1 (en) Turn-control rewritable blockchain
CN110032894B (en) Database log recording method and system and database log detection method
US20130046979A1 (en) Protecting the information encoded in a bloom filter using encoded bits of data
CN110011794B (en) Cipher machine key attribute testing method
CN111556072B (en) Improved index encryption algorithm and system
CN110825639A (en) Tamper-resistant time software License verification method
CN106778292A (en) A kind of quick restoring method of Word encrypted documents
CN111259425A (en) Smart city data safety management system
CN110046134B (en) Database log recording method and system and database log recording detection method
CN105933303A (en) File tempering detection method and device
CN112381403A (en) Block chain-based network security performance assessment data processing method
CN115168909B (en) Ciphertext data range query method and system based on comparison index
CN117786644B (en) Safe face recognition system with face self-characteristics participating in encryption and decryption
CN116010993A (en) Data leakage prevention system
CN117421781A (en) HMAC-SM 3-based access control information integrity protection method in government cloud scene
CN115037538A (en) Information processing method and device
CN117749400A (en) Anti-counterfeiting encryption and decryption algorithm based on OTP principle
CN117786644A (en) Safe face recognition system with face self-characteristics participating in encryption and decryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant