CN105809059B - A kind of method and its system of object properties camouflage conversion - Google Patents
A kind of method and its system of object properties camouflage conversion Download PDFInfo
- Publication number
- CN105809059B CN105809059B CN201610138564.0A CN201610138564A CN105809059B CN 105809059 B CN105809059 B CN 105809059B CN 201610138564 A CN201610138564 A CN 201610138564A CN 105809059 B CN105809059 B CN 105809059B
- Authority
- CN
- China
- Prior art keywords
- data
- attribute
- camouflage
- conversion
- pencil
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to data processing fields, it shifts to new management mechanisms more particularly to a kind of camouflage of object properties, pass through the object data for receiving to be used for renaming objects attribute, and the object identity in object data, and set up match contacts, it is introduced into after class and attribute configuration, it can be achieved that the renaming of predetermined attribute.By the data of renaming, the title of data structure has been rewritten, true system data structure has been hidden, criminal is avoided to surmise, has improved the safety of system;Data through renaming can also can also can read the specific code of data renamed as, the personnel for making data only know about particular code.
Description
Technical field
The present invention relates to data processing fields, and in particular to a kind of method of object properties camouflage conversion, and it is a kind of right
As the system of attribute camouflage conversion.
Background technique
Currently, various information storage, exchange are mostly using meter using computer as the emergence and development of the information network of core
Calculation machine network as medium, make information transmitting and resource it is shared more convenient, be greatly improved working efficiency, and deeply
To every household, all trades and professions.However the networking of computer network, digitlization property also facilitate computer crime molecule and steal
The important information information being stored therein in is taken, is more important, the information of secret, the locating risk being subjected to is bigger, invasion
The interest of person stolen is deeper, and the crisis after leakage is more serious.Therefore information security research is most important.
Currently, information disguising has become one of the important research direction in information security research, by the data on backstage into
Row encryption camouflage, allows invader to intercept and capture false data, or allows after its intercepted data and can not distinguish truth from false, and is that one kind is able to ascend system
The method of Information Security.
However a large amount of, the data in different platform are pretended, and are the biggish works of project amount
Make, if a kind of method that can be realized data camouflage automation can be used, can effectively reduce opening in development process
Hair amount.
Summary of the invention
To solve the above problems, the present invention provides a kind of method of object properties camouflage conversion, and there is the object category
Property camouflage conversion system, be used in any Software System Project, realization internal system data structure is renamed, thus hidden
Hide true internal system data structure.
To achieve the above object, the invention adopts the following technical scheme:
(1) object data for being used for renaming objects attribute is received, and obtains the object identity in the object data;
(2) it is mark with the object identity, the object data in database is inquired, and obtains and the object
The object data to match is identified, the object identity and its object data to match carry out matching treatment, establish
Play the first incidence relation;
(3) it will be provided with the corresponding predetermined attribute of the object data of first incidence relation, from the database
It extracts, the corresponding predetermined attribute of the object data and its object data to match carry out matching treatment, it is established that the
Two incidence relations;
(4) by the predetermined attribute of the object data for setting up the second incidence relation introduce " Attr_Fun ",
Three classes of " Attr_Prop ", " Attr_Class " and attribute configuration realize predetermined attribute renaming.
Further, whether the object data inquired in the database has other that match with the object identity right
Image data, and the object identity and its other object datas to match are subjected to matching treatment, it is established that the first association
Relationship, other described object datas can be part either all with the object identity and its match other are right
Image data;Setting up the object data of the first incidence relation as mentioned, there is no corresponding with the object identity described the
In the case where one incidence relation, its predetermined attribute is directly acquired.
Further, whether the object data inquired in the database has other that match with the predetermined attribute right
Image data, and the predetermined attribute and its other object datas to match are subjected to matching treatment, it is established that the second association
Relationship, other described object datas can be part either all with the predetermined attribute and its match other are right
Image data.
In addition, object data is when being based on java .NET platform, object data can be converted into Json format either
Xml format, and the object data after conversion is renamed, hide true internal system data structure.
The invention has the beneficial effects that the data by renaming, have rewritten the title of data structure, hide true
System data structure avoids criminal from surmising, and improves the safety of system;Data through renaming can also order again data
Entitled specific code, the personnel for making data only know about particular code can read.
In addition, object data can be converted into the language format of adaptation and different platform, such as Json format, xml format, tool
Standby multi-platform wide usage.
Specific embodiment
The invention discloses a kind of method of object properties camouflage conversion, those skilled in the art can be used for reference in this paper
Hold, appropriate reconstruction parameter achieves the object of the present invention.In particular, it should be pointed out that all similar substitutions and modifications are to this field
It is it will be apparent that they are considered as being included in the present invention for technical staff.Object properties camouflage of the present invention turns
Change mechanism has already been through preferred embodiment and is described, and related personnel can obviously not depart from the content of present invention, spirit
Method described herein and application are modified or appropriate changes and combinations in range, carry out implementation and application skill of the present invention
Art.
It is illustrated below with reference to specific embodiment:
Embodiment 1
1. create a database, include object data Pencil, Pen, Ruler, Eraser, knife,
2. giving above-mentioned object data creation mark (1), (2), (3)
3. creating attribute Factory, Model to above-mentioned object data
4. database table is as follows
Pencil | Factory | Model |
Pencil(1) | Factory | Model |
Pencil(2) | Factory | Model |
Pencil(3) | Factory | Model |
Pen | Factory | Model |
Pen(1) | Factory | Model |
Pen(2) | Factory | Model |
Ruler | Factory | Model |
Ruler(1) | Factory | Model |
Ruler(2) | Factory | Model |
Ruler(3) | Factory | Model |
Eraser | Factory | Model |
Eraser(1) | Factory | Model |
Eraser(2) | Factory | Model |
Knife | Factory | Model |
Knife(1) | Factory | Model |
By taking pencil table in part in database and pen list data structure as an example
Pencil(database table-pencil table)
Field name | Description |
Model | Model |
Factory | Manufacturer |
Pencil(1) (database table-pencil table)
Field name | Description |
Model | Model |
Factory | Manufacturer |
Pen(database table-pencil table)
Field name | Description |
Model | Model |
Factory | Manufacturer |
By taking pencil table in part in database and pen table storing data as an example
Pencil table storing data content
Model | Factory |
2B | Shi Delou |
2B | China |
4B | Mary |
6B | Shi Delou |
4B | China |
Pen table storing data content
Model | Factory |
Steel point | Parker |
Jin Jian | Hero |
Titanium point | Immortality |
Steel point | Hero |
Jin Jian | Parker |
Above-mentioned each table list database table, the data structure of database, storage data content.
Under normal querying condition, if inquiry " pencil " data
The data then obtained can come from Pencil, Pencil(1), Pencil(2), Pencil(3) database pencil table
Data.
Wherein Pencil(1), Pencil(2), Pencil(3) (1), (2), the mark that (3) are Pencil, in bracket
The specific data such as content can be replaced batch time, date of stocking up only are replaced with number herein;Data label and lead in bracket
Table " pencil " establishes the first association connection;Model, Factory are the predetermined attribute of pencil, under respective table, respectively
With " pencil ", establish second and be associated with connection, establish first with data label in bracket and be associated with and contact;
By taking wherein Pencil as an example, obtained data are as follows:
Json format:
Pencil:
[
{
“Model”:“2B”,
" Factory ": " Shi Delou "
}
{
“Model”:“2B”,
" Factory ": " China "
}
{
“Model”:“4B”,
" Factory ": " Mary "
}
{
“Model”:“6B”,
" Factory ": " Shi Delou "
}
{
“Model”:“4B”,
" Factory ": " China "
}
]
Pencil(1):
[
{
“Model”:“2B”,
" Factory ": " Shi Delou "
}
{
“Model”:“2B”,
" Factory ": " China "
}
{
“Model”:“4B”,
" Factory ": " Mary "
}
{
“Model”:“6B”,
" Factory ": " Shi Delou "
}
{
“Model”:“4B”,
" Factory ": " China "
}
]
Xml format:
< Pencil>
<DataRow Model=" 2B " Factory=" Shi Delou " "/>
<DataRow Model=" 2B " Factory=" China " "/>
<DataRow Model=" 4B " Factory=" Mary " "/>
<DataRow Model=" 6B " Factory=" Shi Delou " "/>
<DataRow Model=" 4B " Factory=" China " "/>
</ Pencil>
<Pencil(1)>
<DataRow Model=" 2B " Factory=" Shi Delou " "/>
<DataRow Model=" 2B " Factory=" China " "/>
<DataRow Model=" 4B " Factory=" Mary " "/>
<DataRow Model=" 6B " Factory=" Shi Delou " "/>
<DataRow Model=" 4B " Factory=" China " "/>
</Pencil(1)>
By above data by the class and attribute configuration of introducing this patent, ordered again for data entity with data entity attribute
Name, specific as follows:
[Attr_Class (ClassName=" pencil ")]
public class Pencil
{
[Attr_Prop (PropName=" model ")]
public string Model {get; set; }
[Attr_Prop (PropName=" producer ")]
public string Factory {get; set; }
}
[Attr_Class (ClassName=" pencil ")]
Public class Pencil(1)
{
[Attr_Prop (PropName=" model ")]
public string Model {get; set; }
[Attr_Prop (PropName=" producer ")]
public string Factory {get; set; }
}
After this patent, the tentation data of renaming can get:
JSON format:
Pencil:
[
{
" pencil _ model ": " 2B ",
" pencil _ producer ": " Shi Delou "
}
{
" pencil _ model ": " 2B ",
" pencil _ producer ": " China "
}
{
" pencil _ model ": " 4B ",
" pencil _ producer ": " Mary "
}
{
" pencil _ model ": " 6B ",
" pencil _ producer ": " Shi Delou "
}
{
" pencil _ model ": " 4B ",
" pencil _ producer ": " China "
}
]
XML format:
<pencil>
<DataRow pencil _ model=" 2B " pencil _ producer "=" Shi Delou " "/>
<DataRow pencil _ model=" 2B " pencil _ producer "=" China " "/>
<DataRow pencil _ model=" 4B " pencil _ producer "=" Mary " "/>
<DataRow pencil _ model=" 6B " pencil _ producer "=" Shi Delou " "/>
<DataRow pencil _ model=" 4B " pencil _ producer "=" China " "/>
</pencil >
After the renaming for carrying out attribute by this patent, can true internal system data structure in hiding data library,
It avoids being surmised by criminal, improves the safety of system.
Embodiment 2
What embodiment 1 provided can also be used in attribute renaming when outputting data to foreground, and data structure is changed
It writes and hides true system data structure, avoid obtaining true data by hacker attacks computer.
Embodiment 3
This patent can also can read the specific code of data renamed as, the personnel for making data only know about particular code
It reads.It such as applies on CAD, predetermined attribute can be modified, such as by the length unit or radial unit of numerical value on CAD diagram
Etc. the specific data of data renamed as, the safety of CAD diagram can be protected, allow understand specific data represent the personnel of meaning can
Reading understands the CAD diagram, reduces the security risk of leaking data when being stolen.
It should be noted that above-mentioned is only preferable case study on implementation of the invention, protection not for the purpose of limiting the invention
Range, made same transformation all belongs to the scope of protection of the present invention on the basis of the above embodiments.
Claims (7)
1. a kind of method of object properties camouflage conversion, is suitable for any Software System Project, it is characterised in that including following step
It is rapid:
(1) object data for being used for renaming objects attribute is received, and obtains the object identity in the object data;
(2) it is mark with the object identity, the object data in database is inquired, and obtains and the object identity
The object data to match, the object identity and its object data to match carry out matching treatment, it is established that the
One incidence relation;
(3) the corresponding predetermined attribute that will be provided with the object data of first incidence relation, is extracted from the database,
The corresponding predetermined attribute of the object data and its object data to match carry out matching treatment, it is established that the second association
Relationship;
(4) predetermined attribute of the object data for setting up the second incidence relation is introduced into " Attr_Fun ", " Attr_
Prop ", " Attr_Class " three classes and attribute configuration realize predetermined attribute renaming.
2. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: inquire in the database
Object data whether have other object datas to match with the object identity, and by the object identity and its phase
Other object datas matched carry out matching treatment, it is established that the first incidence relation, other described object datas can be part
Either all with the object identity and its other object datas to match;The first incidence relation is set up as mentioned
Object data it is predetermined there is no it in the case where first incidence relation corresponding with the object identity, is directly acquired
Attribute.
3. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: inquire in the database
Object data whether have other object datas to match with the predetermined attribute, and by the predetermined attribute and its phase
Other object datas matched carry out matching treatment, it is established that the second incidence relation, other described object datas can be part
Either all with the predetermined attribute and its other object datas to match.
4. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: receive for object to be arranged
The object data of attribute, format can be converted into Json format either xml format.
5. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: the predetermined attribute weight
After name, by calling specified configuration, the attribute for not needing to show is filtered out.
6. a kind of system of object properties camouflage conversion, it is characterised in that: the system includes object described in claim 1
The method of attribute camouflage conversion, the protection applied to Information Security.
7. a kind of system of object properties camouflage conversion, it is characterised in that: the system includes object described in claim 1
The method of attribute camouflage conversion, the conversion applied to software data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610138564.0A CN105809059B (en) | 2016-03-11 | 2016-03-11 | A kind of method and its system of object properties camouflage conversion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610138564.0A CN105809059B (en) | 2016-03-11 | 2016-03-11 | A kind of method and its system of object properties camouflage conversion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105809059A CN105809059A (en) | 2016-07-27 |
CN105809059B true CN105809059B (en) | 2019-02-01 |
Family
ID=56467149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610138564.0A Active CN105809059B (en) | 2016-03-11 | 2016-03-11 | A kind of method and its system of object properties camouflage conversion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105809059B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173404B1 (en) * | 1998-02-24 | 2001-01-09 | Microsoft Corporation | Software object security mechanism |
CN1304099A (en) * | 1999-12-22 | 2001-07-18 | 国际商业机器公司 | Security mechanism for providing access control to local hold data |
CN102880835A (en) * | 2011-06-01 | 2013-01-16 | 国际商业机器公司 | Data security for a database in a multi-nodal environment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2427182A1 (en) * | 2003-04-29 | 2004-10-29 | Cognos Incorporated | Security filters in metadata modelling for reporting |
-
2016
- 2016-03-11 CN CN201610138564.0A patent/CN105809059B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173404B1 (en) * | 1998-02-24 | 2001-01-09 | Microsoft Corporation | Software object security mechanism |
CN1304099A (en) * | 1999-12-22 | 2001-07-18 | 国际商业机器公司 | Security mechanism for providing access control to local hold data |
CN102880835A (en) * | 2011-06-01 | 2013-01-16 | 国际商业机器公司 | Data security for a database in a multi-nodal environment |
Also Published As
Publication number | Publication date |
---|---|
CN105809059A (en) | 2016-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
He et al. | Characterizing code clones in the ethereum smart contract ecosystem | |
Yu et al. | Deescvhunter: A deep learning-based framework for smart contract vulnerability detection | |
CN104732154B (en) | By the method and system of data anonymous | |
CN103810224B (en) | information persistence and query method and device | |
CN105306463B (en) | Modbus TCP intrusion detection methods based on support vector machines | |
CN109118168A (en) | A kind of government affairs service process traceability system and its construction method based on block chain mechanism | |
CN111738738A (en) | Block chain-based biological asset object management method and device | |
CN110414987A (en) | Recognition methods, device and the computer system of account aggregation | |
CN105610819B (en) | The method and apparatus of the query service of server info are provided | |
CN110311913A (en) | Computer Network Security System, application method, equipment and storage medium | |
CN113626865A (en) | Data sharing opening method and system for preventing sensitive information from being leaked | |
CN107943949A (en) | A kind of method and server of definite web crawlers | |
CN111666346A (en) | Information merging method, transaction query method, device, computer and storage medium | |
CN107958154A (en) | A kind of malware detection device and method | |
CN108446720A (en) | Abnormal deviation data examination method and system | |
Yang et al. | Recent development trend of blockchain technologies: A patent analysis | |
CN106101098B (en) | A kind of information assets recognition methods and device | |
CN107704546A (en) | Page configuration method and server | |
CN100550032C (en) | Secured inputting method under a kind of Windows system | |
US20110264991A1 (en) | Method and System for Management of Electronic Mail Communication | |
CN105809059B (en) | A kind of method and its system of object properties camouflage conversion | |
CN101593256B (en) | Safe input method based on Windows operating system | |
CN103442016B (en) | The method and system of white list are pushed based on website fingerprint | |
Bu et al. | Security Checking of Trigger-Action-Programming Smart Home Integrations | |
Masoumifar | Cyberspace sovereignty: Is territorializing cyberspace opposed to having a globally compatible internet? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |