CN110046134B - Database log recording method and system and database log recording detection method - Google Patents
Database log recording method and system and database log recording detection method Download PDFInfo
- Publication number
- CN110046134B CN110046134B CN201910281572.4A CN201910281572A CN110046134B CN 110046134 B CN110046134 B CN 110046134B CN 201910281572 A CN201910281572 A CN 201910281572A CN 110046134 B CN110046134 B CN 110046134B
- Authority
- CN
- China
- Prior art keywords
- file
- log
- size
- random number
- dictionary file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1805—Append-only file systems, e.g. using logs or journals to store data
- G06F16/1815—Journaling file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Analysis (AREA)
- Databases & Information Systems (AREA)
- Computational Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; circulating the steps to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; and performing third operation on the absolute path to the size of the current log file to obtain a key, and the like to obtain a database log. By the method, the whole file does not need to be calculated when new records are written, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.
Description
Technical Field
The invention relates to the field of computer information security, in particular to a database log recording method and system and a database log recording detection method.
Background
The system log file records various behaviors of the user and is an important source of audit data. Therefore, it is important to ensure the integrity and authenticity of the log file.
It is common practice to hash the entire log file and then save the digest value in the system. When the file needs to be judged whether to be tampered, the file is hashed, and the digest value is compared with the digest value stored in the system.
The above method has the defects that when new log information is added each time, the whole file needs to be subjected to comparison and judgment by one-time hashing, after the information is successfully added through verification, the file is subjected to one-time hashing again, and a new hashed value is stored in the system. Hashing once takes a long time when the file content is many. This approach is very poor and it is not possible to judge which part of the data has been tampered with, resulting in the entire file being untrusted.
Disclosure of Invention
Objects of the invention
The invention aims to provide a database log recording method and system and a database log recording detection method, so as to solve the problems.
(II) technical scheme
To solve the above problem, a first aspect of the present invention provides a database logging method, including the following steps:
(1) generating a plurality of first random arrays to form a dictionary file;
(2) acquiring the number of bytes of the dictionary file, and generating a second random number;
(3) comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result;
(4) the step (2) and the step (3) are circulated for N times to obtain N first operation results;
(5) acquiring an absolute path of a log file;
(6) acquiring the size of a current log file;
(7) performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
(8) performing a third operation on the absolute path to the size of the current log file to obtain a key;
(9) performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
(10) writing the record, the N first operation results, the second operation result and the second operation result into the log;
(11) and recording the file size in the log after the information is written.
Further, the operation of generating the plurality of first random numbers to form one dictionary file is performed only once.
Further, the first operation result is obtained by comparing the byte number of the dictionary file with the size of the random number and performing the first operation on the byte number of the dictionary file according to the comparison result, and specifically includes: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Further, the first random number is one byte, and the byte range is-128 to 127, i.e. 256 numbers.
Further, the second random number is one byte, and the byte range is-128 to 127, i.e. 256 numbers.
Further, the second operation is AES, DESede, DES, or SM 4.0.
Further, the third operation is AES, DESede, DES, or SM 4.0.
Further, the fourth operation is AES, DESede, DES, or SM 4.0.
According to another aspect of the present invention, there is provided a database logging system including: the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file; the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number; the comparison analysis module is used for comparing the byte number of the dictionary file with the size of the random number and carrying out first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times; the path acquisition module is used for acquiring an absolute path of the log file; the file size calculation module is used for acquiring the size of the current log file; the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key; the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; the recording module is used for writing the record, the N first operation results, the second operation results and the second operation results into the log; and the final file size calculation module is used for recording the file size in the log after the information is written.
Further, the operation of generating the plurality of first random numbers to form one dictionary file is performed only once.
Further, the first operation result is obtained by comparing the byte number of the dictionary file with the size of the random number and performing the first operation on the byte number of the dictionary file according to the comparison result, and specifically includes: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Further, the first random number and the second random number are both one byte, and the byte range is-128 to 127, i.e. 256 numbers; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
According to another aspect of the present invention, there is provided a database log record detection method, including: comparing the size of the log file recorded by the database log recording method according to any one of the above schemes with the size of the file recorded by the log file, and judging whether the content of the log file changes; and calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered.
The invention provides a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the step (2) and the step (3) are circulated for N times to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; performing a third operation on the absolute path to the size of the current log file to obtain a key; performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; writing the record, the N first operation results, the second operation result and the second operation result into the log; and recording the file size in the log after the information is written.
(III) advantageous effects
The technical scheme of the invention has the following beneficial technical effects:
(1) when new records are written, the whole file does not need to be calculated, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high;
(2) the whole file does not need to be calculated during detection, several files are used and checked, and the sectional detection and detection efficiency is high.
Drawings
FIG. 1 is a flowchart of a database logging method according to a first embodiment of the present invention;
FIG. 2 is a flow chart of a database logging method according to an alternative embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Fig. 1 is a flowchart of a database logging method according to a first embodiment of the present invention.
As shown in fig. 1, in a first embodiment of the present invention, a first aspect of the embodiment provides a database logging method, including the following steps:
s1: generating a plurality of first random arrays to form a dictionary file;
s2: acquiring the number of bytes of the dictionary file, and generating a second random number;
s3: comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result;
s4: the step (2) and the step (3) are circulated for N times to obtain N first operation results;
s5: acquiring an absolute path of a log file;
s6: acquiring the size of a current log file;
s7: performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
s8: performing a third operation on the absolute path to the size of the current log file to obtain a key;
s9: performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
s10: writing the record, the N first operation results, the second operation result and the second operation result into the log;
s11: and recording the file size in the log after the information is written.
By the method, the database log is obtained, the whole file does not need to be calculated when new records are written, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.
Optionally, the operation of generating a plurality of first random arrays to form a dictionary file is performed only once.
Optionally, the comparing the number of bytes of the dictionary file with the size of the random number, and performing a first operation on the number of bytes of the dictionary file according to the comparison result to obtain a first operation result, specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Optionally, the first random number is one byte, and the byte range is-128 to 127, that is, 256 numbers.
Optionally, the second random number is one byte, and the byte range is-128 to 127, that is, 256 numbers.
Optionally, the second operation is AES, DESede, DES, or SM 4.0.
Optionally, the third operation is AES, DESede, DES, or SM 4.0.
Optionally, the fourth operation is AES, DESede, DES, or SM 4.0.
AES: advanced Encryption Standard (AES), also known as Rijndael Encryption, is a block Encryption Standard adopted by the federal government in the united states.
DES: the block algorithm, which is known as the Data Encryption Standard, is a block algorithm using key Encryption, was determined by the national institute of standards of the federal government in 1977 as the federal Data processing Standard (FIPS), and is authorized for use in non-confidential government communications, and then the algorithm was widely spread internationally.
DESeDE: a symmetric encryption algorithm improved by a DES symmetric encryption algorithm. A mechanism for encrypting material three times using a 168-bit key; it generally (but not always) provides extremely strong security. If the three 56-bit sub-elements are all the same, then triple DES is backwards compatible with DES.
SM 4.0: SM4.0 (original name SMs4.0) is a block cipher standard adopted by the government of the people's republic of china and issued by the national cipher authority on day 3/21 of 2012.
According to another aspect of an embodiment of the present invention, there is provided a database logging system including: the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file; the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number; the comparison analysis module is used for comparing the byte number of the dictionary file with the size of the random number and carrying out first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times; the path acquisition module is used for acquiring an absolute path of the log file; the file size calculation module is used for acquiring the size of the current log file; the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key; the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; the recording module is used for writing the record, the N first operation results, the second operation results and the second operation results into the log; and the final file size calculation module is used for recording the file size in the log after the information is written.
Optionally, the operation of generating a plurality of first random arrays to form a dictionary file is performed only once.
Optionally, the comparing the number of bytes of the dictionary file with the size of the random number, and performing a first operation on the number of bytes of the dictionary file according to the comparison result to obtain a first operation result, specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; and when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result.
Optionally, both the first random number and the second random number are a byte, and the byte range is-128 to 127, that is, 256 numbers; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
According to another aspect of the embodiments of the present invention, there is provided a database log record detection method, including: comparing the size of the log file recorded by the database log recording method according to the scheme with the size of the file recorded by the log file, and judging whether the content of the log file changes or not; and calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered.
FIG. 2 is a flow chart of a database logging method according to an alternative embodiment of the invention.
As shown in fig. 2, in an alternative embodiment, a database logging method and a database logging detection method are provided, which include the following steps:
(1) the generation of N random numbers constitutes a dictionary file (denoted F), and this operation is only generated once.
(2) The byte size (denoted by L) of the F file is obtained, and a random number a is generated.
(3) Comparing A with L, when A is large, A is used to get modulus to L to get number M. A is M when A is less than B (so the value of M must be less than L).
(4) Cycling N times (2) (3) resulted in multiple M (by partition) denoted by I.
(5) And taking out values of corresponding positions of the dictionary file according to the index I to form an array K1 of N bytes.
(6) The log file absolute path K2 is obtained.
(7) The size K3 of the current log file is obtained.
(8) K3 is operated using key K1 to obtain E.
(9) K1, K2 and K3 are operated to obtain a key K.
(10) And calculating the record to be written into the log by using the secret key K to obtain a calculation result H.
(11) The log record I, E, H is written to the log file together.
(12) And recording the size of the log file after the log is written.
And when in detection, the size of the read file is compared with the size of the recorded file, and the inconsistency proves that the content of the file is changed.
Reading the log record by line, taking out corresponding data K1, K2 and E according to (5), (6), (7) and (8) to obtain a key K, and calculating the log record to judge whether the record is falsified or not in the comparison calculation result. And (4) calculating and comparing the current recording position by using K1 to judge whether the recording position is correct.
The invention aims to protect a database log recording method, which comprises the following steps: generating a plurality of first random arrays to form a dictionary file; acquiring the number of bytes of the dictionary file, and generating a second random number; comparing the byte number of the dictionary file with the size of the random number, and performing first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result; the step (2) and the step (3) are circulated for N times to obtain N first operation results; acquiring an absolute path of a log file; acquiring the size of a current log file; performing second operation on the size of the current log file by using the absolute path to obtain a second operation result; performing a third operation on the absolute path to the size of the current log file to obtain a key; performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result; writing the record, the N first operation results, the second operation result and the second operation result into the log; and recording the file size in the log after the information is written. When new records are written, the whole file does not need to be calculated, the writing recording efficiency is improved, the new records can be found in time when being changed, and the safety is high.
In another aspect of the present invention, a database log record detection method is protected, including: comparing the size of the log file recorded by the database log recording method according to any one of the above embodiments with the size of the file recorded by the log file, and judging whether the content of the log file changes; and comparing the operation result of the log file record with the operation result recorded in the log file by the key to judge whether the file record is falsified. And calculating the log file record by acquiring the key of the log file, and judging whether the log file record is tampered. The whole file does not need to be calculated during detection, several files are used and checked, and the sectional detection and detection efficiency is high. And comparing the operation result of the log file record with the operation result recorded in the log file by the key to judge whether the file record is falsified.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.
Claims (8)
1. A database logging method, comprising the steps of:
(1) generating a plurality of first random arrays to form a dictionary file;
(2) acquiring the number of bytes of the dictionary file, and generating a second random number;
(3) comparing the byte number of the dictionary file with the second random number, and performing a first operation on the byte number of the dictionary file according to the comparison result to obtain a first operation result, wherein the comparing the byte number of the dictionary file with the second random number, and performing the first operation on the byte number of the dictionary file according to the comparison result to obtain the first operation result specifically comprises: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result;
(4) the step (2) and the step (3) are circulated for N times to obtain N first operation results;
(5) acquiring an absolute path of a log file;
(6) acquiring the size of a current log file;
(7) performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
(8) performing a third operation on the absolute path to the size of the current log file to obtain a key;
(9) performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
(10) writing the record, the N first operation results, the second operation result and the third operation result into the log;
(11) and recording the file size in the log after the information is written.
2. The database logging method of claim 1, wherein said operation of generating a plurality of first random numbers to form a dictionary file is performed only once.
3. The database logging method of claim 1, wherein said first random number and said second random number are each a byte, and the byte range is-128 to 127, i.e. 256 numbers.
4. The database logging method of claim 1, wherein said second operation is AES, DESede, DES, or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
5. A database logging system, comprising:
the dictionary file generation module is used for generating a plurality of first random arrays to form a dictionary file;
the second random number generation module is used for acquiring the byte number of the dictionary file and generating a second random number;
the comparison analysis module is configured to obtain a first operation result by comparing the byte number of the dictionary file with the size of the second random number and performing a first operation on the byte number of the dictionary file according to the comparison result, and obtain a first operation result by comparing the byte number of the dictionary file with the size of the second random number and performing a first operation on the byte number of the dictionary file according to the comparison result, where the first operation result is specifically: comparing the byte number of the dictionary file with the size of the random number; when the byte number of the dictionary file is larger than that of the random number, performing modulo operation on the random number by using the byte number of the dictionary file to obtain a first operation result; when the byte number of the dictionary file is smaller than the random number, the byte number of the dictionary file is the first operation result;
the circulation module is used for circulating the operation steps of the second random number generation module and the comparison and analysis module to obtain N first operation results for N times;
the path acquisition module is used for acquiring an absolute path of the log file;
the file size calculation module is used for acquiring the size of the current log file;
the second operation module is used for performing second operation on the size of the current log file by using the absolute path to obtain a second operation result;
the key generation module is used for carrying out third operation on the size of the current log file by the absolute path to obtain a key;
the fourth operation module is used for performing fourth operation on the record to be written into the log by using the secret key to obtain a third operation result;
the recording module is used for writing the record, the N first operation results, the second operation results and the third operation results into the log;
and the final file size calculation module is used for recording the file size in the log after the information is written.
6. The database logging system of claim 5 wherein said operation of generating a plurality of first random numbers into a dictionary file is performed only once.
7. The database logging system of claim 5, wherein said first random number and said second random number are each a byte, and the byte range is-128 to 127, i.e., 256; the second operation is AES, DESeDE, DES or SM 4.0; the third operation is AES, DESeDE, DES or SM 4.0; the fourth operation is AES, DESeDE, DES or SM 4.0.
8. A database log record detection method is characterized by comprising the following steps:
comparing the size of the log file recorded by the database logging method according to any of claims 1-4 with the size of the file recorded by the log file, and determining whether the content of the log file has changed;
and calculating log file records by acquiring the key of the log file, and judging whether the log file records are tampered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281572.4A CN110046134B (en) | 2019-04-09 | 2019-04-09 | Database log recording method and system and database log recording detection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281572.4A CN110046134B (en) | 2019-04-09 | 2019-04-09 | Database log recording method and system and database log recording detection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110046134A CN110046134A (en) | 2019-07-23 |
CN110046134B true CN110046134B (en) | 2021-08-31 |
Family
ID=67276581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910281572.4A Active CN110046134B (en) | 2019-04-09 | 2019-04-09 | Database log recording method and system and database log recording detection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110046134B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104036157A (en) * | 2014-06-05 | 2014-09-10 | 蓝盾信息安全技术有限公司 | Method based on comprehensive characteristic value for detecting tampering of file |
CN105740725A (en) * | 2016-01-29 | 2016-07-06 | 北京大学 | File protection method and system |
CN105812391A (en) * | 2016-05-16 | 2016-07-27 | 广州鼎鼎信息科技有限公司 | Safe cloud storage system |
CN106874793A (en) * | 2017-01-20 | 2017-06-20 | 北京小米移动软件有限公司 | The processing method and processing device of database |
CN107133120A (en) * | 2016-02-29 | 2017-09-05 | 阿里巴巴集团控股有限公司 | A kind of method of calibration of file data, device |
US9870386B1 (en) * | 2014-10-31 | 2018-01-16 | Amazon Technologies, Inc. | Reducing I/O operations for on-demand demand data page generation |
CN109101644A (en) * | 2018-08-21 | 2018-12-28 | 上海新炬网络信息技术股份有限公司 | A kind of sound state journal file scanning collecting method |
CN109510825A (en) * | 2018-11-13 | 2019-03-22 | 许昌许继软件技术有限公司 | Dynamic base encryption method and device and the anti-abduction method and apparatus of dynamic base |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9208335B2 (en) * | 2013-09-17 | 2015-12-08 | Auburn University | Space-time separated and jointly evolving relationship-based network access and data protection system |
CN104144034B (en) * | 2013-12-04 | 2016-04-13 | 腾讯科技(深圳)有限公司 | Password is shared and acquisition methods and device |
CN105959281B (en) * | 2016-04-29 | 2020-12-22 | 腾讯科技(深圳)有限公司 | File encryption transmission method and device |
CN108809653B (en) * | 2018-06-19 | 2019-07-12 | 北京多采多宜网络科技有限公司 | A kind of cryptographic check processing method |
-
2019
- 2019-04-09 CN CN201910281572.4A patent/CN110046134B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104036157A (en) * | 2014-06-05 | 2014-09-10 | 蓝盾信息安全技术有限公司 | Method based on comprehensive characteristic value for detecting tampering of file |
US9870386B1 (en) * | 2014-10-31 | 2018-01-16 | Amazon Technologies, Inc. | Reducing I/O operations for on-demand demand data page generation |
CN105740725A (en) * | 2016-01-29 | 2016-07-06 | 北京大学 | File protection method and system |
CN107133120A (en) * | 2016-02-29 | 2017-09-05 | 阿里巴巴集团控股有限公司 | A kind of method of calibration of file data, device |
CN105812391A (en) * | 2016-05-16 | 2016-07-27 | 广州鼎鼎信息科技有限公司 | Safe cloud storage system |
CN106874793A (en) * | 2017-01-20 | 2017-06-20 | 北京小米移动软件有限公司 | The processing method and processing device of database |
CN109101644A (en) * | 2018-08-21 | 2018-12-28 | 上海新炬网络信息技术股份有限公司 | A kind of sound state journal file scanning collecting method |
CN109510825A (en) * | 2018-11-13 | 2019-03-22 | 许昌许继软件技术有限公司 | Dynamic base encryption method and device and the anti-abduction method and apparatus of dynamic base |
Non-Patent Citations (1)
Title |
---|
"基于AES算法的数据库二级密钥系统的设计与实现";苗杰;《江苏科技大学硕士学位论文》;20140122;第24-63页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110046134A (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3443710B1 (en) | Cryptologic rewritable blockchain | |
EP3451578B1 (en) | Turn-control rewritable blockchain | |
CN110032894B (en) | Database log recording method and system and database log detection method | |
US20130046979A1 (en) | Protecting the information encoded in a bloom filter using encoded bits of data | |
CN110011794B (en) | Cipher machine key attribute testing method | |
CN111556072B (en) | Improved index encryption algorithm and system | |
CN110825639A (en) | Tamper-resistant time software License verification method | |
CN106778292A (en) | A kind of quick restoring method of Word encrypted documents | |
CN111259425A (en) | Smart city data safety management system | |
CN110046134B (en) | Database log recording method and system and database log recording detection method | |
CN105933303A (en) | File tempering detection method and device | |
CN112381403A (en) | Block chain-based network security performance assessment data processing method | |
CN115168909B (en) | Ciphertext data range query method and system based on comparison index | |
CN117786644B (en) | Safe face recognition system with face self-characteristics participating in encryption and decryption | |
CN116010993A (en) | Data leakage prevention system | |
CN117421781A (en) | HMAC-SM 3-based access control information integrity protection method in government cloud scene | |
CN115037538A (en) | Information processing method and device | |
CN117749400A (en) | Anti-counterfeiting encryption and decryption algorithm based on OTP principle | |
CN117786644A (en) | Safe face recognition system with face self-characteristics participating in encryption and decryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |