CN105809059B - A kind of method and its system of object properties camouflage conversion - Google Patents

A kind of method and its system of object properties camouflage conversion Download PDF

Info

Publication number
CN105809059B
CN105809059B CN201610138564.0A CN201610138564A CN105809059B CN 105809059 B CN105809059 B CN 105809059B CN 201610138564 A CN201610138564 A CN 201610138564A CN 105809059 B CN105809059 B CN 105809059B
Authority
CN
China
Prior art keywords
data
attribute
camouflage
conversion
pencil
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610138564.0A
Other languages
Chinese (zh)
Other versions
CN105809059A (en
Inventor
张鹏
李宏凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zhengquan Technology Co Ltd
Original Assignee
Guangdong Zhengquan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Zhengquan Technology Co Ltd filed Critical Guangdong Zhengquan Technology Co Ltd
Priority to CN201610138564.0A priority Critical patent/CN105809059B/en
Publication of CN105809059A publication Critical patent/CN105809059A/en
Application granted granted Critical
Publication of CN105809059B publication Critical patent/CN105809059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to data processing fields, it shifts to new management mechanisms more particularly to a kind of camouflage of object properties, pass through the object data for receiving to be used for renaming objects attribute, and the object identity in object data, and set up match contacts, it is introduced into after class and attribute configuration, it can be achieved that the renaming of predetermined attribute.By the data of renaming, the title of data structure has been rewritten, true system data structure has been hidden, criminal is avoided to surmise, has improved the safety of system;Data through renaming can also can also can read the specific code of data renamed as, the personnel for making data only know about particular code.

Description

A kind of method and its system of object properties camouflage conversion
Technical field
The present invention relates to data processing fields, and in particular to a kind of method of object properties camouflage conversion, and it is a kind of right As the system of attribute camouflage conversion.
Background technique
Currently, various information storage, exchange are mostly using meter using computer as the emergence and development of the information network of core Calculation machine network as medium, make information transmitting and resource it is shared more convenient, be greatly improved working efficiency, and deeply To every household, all trades and professions.However the networking of computer network, digitlization property also facilitate computer crime molecule and steal The important information information being stored therein in is taken, is more important, the information of secret, the locating risk being subjected to is bigger, invasion The interest of person stolen is deeper, and the crisis after leakage is more serious.Therefore information security research is most important.
Currently, information disguising has become one of the important research direction in information security research, by the data on backstage into Row encryption camouflage, allows invader to intercept and capture false data, or allows after its intercepted data and can not distinguish truth from false, and is that one kind is able to ascend system The method of Information Security.
However a large amount of, the data in different platform are pretended, and are the biggish works of project amount Make, if a kind of method that can be realized data camouflage automation can be used, can effectively reduce opening in development process Hair amount.
Summary of the invention
To solve the above problems, the present invention provides a kind of method of object properties camouflage conversion, and there is the object category Property camouflage conversion system, be used in any Software System Project, realization internal system data structure is renamed, thus hidden Hide true internal system data structure.
To achieve the above object, the invention adopts the following technical scheme:
(1) object data for being used for renaming objects attribute is received, and obtains the object identity in the object data;
(2) it is mark with the object identity, the object data in database is inquired, and obtains and the object The object data to match is identified, the object identity and its object data to match carry out matching treatment, establish Play the first incidence relation;
(3) it will be provided with the corresponding predetermined attribute of the object data of first incidence relation, from the database It extracts, the corresponding predetermined attribute of the object data and its object data to match carry out matching treatment, it is established that the Two incidence relations;
(4) by the predetermined attribute of the object data for setting up the second incidence relation introduce " Attr_Fun ", Three classes of " Attr_Prop ", " Attr_Class " and attribute configuration realize predetermined attribute renaming.
Further, whether the object data inquired in the database has other that match with the object identity right Image data, and the object identity and its other object datas to match are subjected to matching treatment, it is established that the first association Relationship, other described object datas can be part either all with the object identity and its match other are right Image data;Setting up the object data of the first incidence relation as mentioned, there is no corresponding with the object identity described the In the case where one incidence relation, its predetermined attribute is directly acquired.
Further, whether the object data inquired in the database has other that match with the predetermined attribute right Image data, and the predetermined attribute and its other object datas to match are subjected to matching treatment, it is established that the second association Relationship, other described object datas can be part either all with the predetermined attribute and its match other are right Image data.
In addition, object data is when being based on java .NET platform, object data can be converted into Json format either Xml format, and the object data after conversion is renamed, hide true internal system data structure.
The invention has the beneficial effects that the data by renaming, have rewritten the title of data structure, hide true System data structure avoids criminal from surmising, and improves the safety of system;Data through renaming can also order again data Entitled specific code, the personnel for making data only know about particular code can read.
In addition, object data can be converted into the language format of adaptation and different platform, such as Json format, xml format, tool Standby multi-platform wide usage.
Specific embodiment
The invention discloses a kind of method of object properties camouflage conversion, those skilled in the art can be used for reference in this paper Hold, appropriate reconstruction parameter achieves the object of the present invention.In particular, it should be pointed out that all similar substitutions and modifications are to this field It is it will be apparent that they are considered as being included in the present invention for technical staff.Object properties camouflage of the present invention turns Change mechanism has already been through preferred embodiment and is described, and related personnel can obviously not depart from the content of present invention, spirit Method described herein and application are modified or appropriate changes and combinations in range, carry out implementation and application skill of the present invention Art.
It is illustrated below with reference to specific embodiment:
Embodiment 1
1. create a database, include object data Pencil, Pen, Ruler, Eraser, knife,
2. giving above-mentioned object data creation mark (1), (2), (3)
3. creating attribute Factory, Model to above-mentioned object data
4. database table is as follows
Pencil Factory Model
Pencil(1) Factory Model
Pencil(2) Factory Model
Pencil(3) Factory Model
Pen Factory Model
Pen(1) Factory Model
Pen(2) Factory Model
Ruler Factory Model
Ruler(1) Factory Model
Ruler(2) Factory Model
Ruler(3) Factory Model
Eraser Factory Model
Eraser(1) Factory Model
Eraser(2) Factory Model
Knife Factory Model
Knife(1) Factory Model
By taking pencil table in part in database and pen list data structure as an example
Pencil(database table-pencil table)
Field name Description
Model Model
Factory Manufacturer
Pencil(1) (database table-pencil table)
Field name Description
Model Model
Factory Manufacturer
Pen(database table-pencil table)
Field name Description
Model Model
Factory Manufacturer
By taking pencil table in part in database and pen table storing data as an example
Pencil table storing data content
Model Factory
2B Shi Delou
2B China
4B Mary
6B Shi Delou
4B China
Pen table storing data content
Model Factory
Steel point Parker
Jin Jian Hero
Titanium point Immortality
Steel point Hero
Jin Jian Parker
Above-mentioned each table list database table, the data structure of database, storage data content.
Under normal querying condition, if inquiry " pencil " data
The data then obtained can come from Pencil, Pencil(1), Pencil(2), Pencil(3) database pencil table Data.
Wherein Pencil(1), Pencil(2), Pencil(3) (1), (2), the mark that (3) are Pencil, in bracket The specific data such as content can be replaced batch time, date of stocking up only are replaced with number herein;Data label and lead in bracket Table " pencil " establishes the first association connection;Model, Factory are the predetermined attribute of pencil, under respective table, respectively With " pencil ", establish second and be associated with connection, establish first with data label in bracket and be associated with and contact;
By taking wherein Pencil as an example, obtained data are as follows:
Json format:
Pencil:
[
{
“Model”:“2B”,
" Factory ": " Shi Delou "
}
{
“Model”:“2B”,
" Factory ": " China "
}
{
“Model”:“4B”,
" Factory ": " Mary "
}
{
“Model”:“6B”,
" Factory ": " Shi Delou "
}
{
“Model”:“4B”,
" Factory ": " China "
}
]
Pencil(1):
[
{
“Model”:“2B”,
" Factory ": " Shi Delou "
}
{
“Model”:“2B”,
" Factory ": " China "
}
{
“Model”:“4B”,
" Factory ": " Mary "
}
{
“Model”:“6B”,
" Factory ": " Shi Delou "
}
{
“Model”:“4B”,
" Factory ": " China "
}
]
Xml format:
< Pencil>
<DataRow Model=" 2B " Factory=" Shi Delou " "/>
<DataRow Model=" 2B " Factory=" China " "/>
<DataRow Model=" 4B " Factory=" Mary " "/>
<DataRow Model=" 6B " Factory=" Shi Delou " "/>
<DataRow Model=" 4B " Factory=" China " "/>
</ Pencil>
<Pencil(1)>
<DataRow Model=" 2B " Factory=" Shi Delou " "/>
<DataRow Model=" 2B " Factory=" China " "/>
<DataRow Model=" 4B " Factory=" Mary " "/>
<DataRow Model=" 6B " Factory=" Shi Delou " "/>
<DataRow Model=" 4B " Factory=" China " "/>
</Pencil(1)>
By above data by the class and attribute configuration of introducing this patent, ordered again for data entity with data entity attribute Name, specific as follows:
[Attr_Class (ClassName=" pencil ")]
public class Pencil
{
[Attr_Prop (PropName=" model ")]
public string Model {get; set; }
[Attr_Prop (PropName=" producer ")]
public string Factory {get; set; }
}
[Attr_Class (ClassName=" pencil ")]
Public class Pencil(1)
{
[Attr_Prop (PropName=" model ")]
public string Model {get; set; }
[Attr_Prop (PropName=" producer ")]
public string Factory {get; set; }
}
After this patent, the tentation data of renaming can get:
JSON format:
Pencil:
[
{
" pencil _ model ": " 2B ",
" pencil _ producer ": " Shi Delou "
}
{
" pencil _ model ": " 2B ",
" pencil _ producer ": " China "
}
{
" pencil _ model ": " 4B ",
" pencil _ producer ": " Mary "
}
{
" pencil _ model ": " 6B ",
" pencil _ producer ": " Shi Delou "
}
{
" pencil _ model ": " 4B ",
" pencil _ producer ": " China "
}
]
XML format:
<pencil>
<DataRow pencil _ model=" 2B " pencil _ producer "=" Shi Delou " "/>
<DataRow pencil _ model=" 2B " pencil _ producer "=" China " "/>
<DataRow pencil _ model=" 4B " pencil _ producer "=" Mary " "/>
<DataRow pencil _ model=" 6B " pencil _ producer "=" Shi Delou " "/>
<DataRow pencil _ model=" 4B " pencil _ producer "=" China " "/>
</pencil >
After the renaming for carrying out attribute by this patent, can true internal system data structure in hiding data library, It avoids being surmised by criminal, improves the safety of system.
Embodiment 2
What embodiment 1 provided can also be used in attribute renaming when outputting data to foreground, and data structure is changed It writes and hides true system data structure, avoid obtaining true data by hacker attacks computer.
Embodiment 3
This patent can also can read the specific code of data renamed as, the personnel for making data only know about particular code It reads.It such as applies on CAD, predetermined attribute can be modified, such as by the length unit or radial unit of numerical value on CAD diagram Etc. the specific data of data renamed as, the safety of CAD diagram can be protected, allow understand specific data represent the personnel of meaning can Reading understands the CAD diagram, reduces the security risk of leaking data when being stolen.
It should be noted that above-mentioned is only preferable case study on implementation of the invention, protection not for the purpose of limiting the invention Range, made same transformation all belongs to the scope of protection of the present invention on the basis of the above embodiments.

Claims (7)

1. a kind of method of object properties camouflage conversion, is suitable for any Software System Project, it is characterised in that including following step It is rapid:
(1) object data for being used for renaming objects attribute is received, and obtains the object identity in the object data;
(2) it is mark with the object identity, the object data in database is inquired, and obtains and the object identity The object data to match, the object identity and its object data to match carry out matching treatment, it is established that the One incidence relation;
(3) the corresponding predetermined attribute that will be provided with the object data of first incidence relation, is extracted from the database, The corresponding predetermined attribute of the object data and its object data to match carry out matching treatment, it is established that the second association Relationship;
(4) predetermined attribute of the object data for setting up the second incidence relation is introduced into " Attr_Fun ", " Attr_ Prop ", " Attr_Class " three classes and attribute configuration realize predetermined attribute renaming.
2. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: inquire in the database Object data whether have other object datas to match with the object identity, and by the object identity and its phase Other object datas matched carry out matching treatment, it is established that the first incidence relation, other described object datas can be part Either all with the object identity and its other object datas to match;The first incidence relation is set up as mentioned Object data it is predetermined there is no it in the case where first incidence relation corresponding with the object identity, is directly acquired Attribute.
3. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: inquire in the database Object data whether have other object datas to match with the predetermined attribute, and by the predetermined attribute and its phase Other object datas matched carry out matching treatment, it is established that the second incidence relation, other described object datas can be part Either all with the predetermined attribute and its other object datas to match.
4. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: receive for object to be arranged The object data of attribute, format can be converted into Json format either xml format.
5. a kind of method of object properties camouflage conversion as described in claim 1, it is characterised in that: the predetermined attribute weight After name, by calling specified configuration, the attribute for not needing to show is filtered out.
6. a kind of system of object properties camouflage conversion, it is characterised in that: the system includes object described in claim 1 The method of attribute camouflage conversion, the protection applied to Information Security.
7. a kind of system of object properties camouflage conversion, it is characterised in that: the system includes object described in claim 1 The method of attribute camouflage conversion, the conversion applied to software data.
CN201610138564.0A 2016-03-11 2016-03-11 A kind of method and its system of object properties camouflage conversion Active CN105809059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610138564.0A CN105809059B (en) 2016-03-11 2016-03-11 A kind of method and its system of object properties camouflage conversion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610138564.0A CN105809059B (en) 2016-03-11 2016-03-11 A kind of method and its system of object properties camouflage conversion

Publications (2)

Publication Number Publication Date
CN105809059A CN105809059A (en) 2016-07-27
CN105809059B true CN105809059B (en) 2019-02-01

Family

ID=56467149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610138564.0A Active CN105809059B (en) 2016-03-11 2016-03-11 A kind of method and its system of object properties camouflage conversion

Country Status (1)

Country Link
CN (1) CN105809059B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6173404B1 (en) * 1998-02-24 2001-01-09 Microsoft Corporation Software object security mechanism
CN1304099A (en) * 1999-12-22 2001-07-18 国际商业机器公司 Security mechanism for providing access control to local hold data
CN102880835A (en) * 2011-06-01 2013-01-16 国际商业机器公司 Data security for a database in a multi-nodal environment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2427182A1 (en) * 2003-04-29 2004-10-29 Cognos Incorporated Security filters in metadata modelling for reporting

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6173404B1 (en) * 1998-02-24 2001-01-09 Microsoft Corporation Software object security mechanism
CN1304099A (en) * 1999-12-22 2001-07-18 国际商业机器公司 Security mechanism for providing access control to local hold data
CN102880835A (en) * 2011-06-01 2013-01-16 国际商业机器公司 Data security for a database in a multi-nodal environment

Also Published As

Publication number Publication date
CN105809059A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
He et al. Characterizing code clones in the ethereum smart contract ecosystem
Yu et al. Deescvhunter: A deep learning-based framework for smart contract vulnerability detection
CN104732154B (en) By the method and system of data anonymous
CN103810224B (en) information persistence and query method and device
CN105306463B (en) Modbus TCP intrusion detection methods based on support vector machines
CN109118168A (en) A kind of government affairs service process traceability system and its construction method based on block chain mechanism
CN111738738A (en) Block chain-based biological asset object management method and device
CN110414987A (en) Recognition methods, device and the computer system of account aggregation
CN105610819B (en) The method and apparatus of the query service of server info are provided
CN110311913A (en) Computer Network Security System, application method, equipment and storage medium
CN113626865A (en) Data sharing opening method and system for preventing sensitive information from being leaked
CN107943949A (en) A kind of method and server of definite web crawlers
CN111666346A (en) Information merging method, transaction query method, device, computer and storage medium
CN107958154A (en) A kind of malware detection device and method
CN108446720A (en) Abnormal deviation data examination method and system
Yang et al. Recent development trend of blockchain technologies: A patent analysis
CN106101098B (en) A kind of information assets recognition methods and device
CN107704546A (en) Page configuration method and server
CN100550032C (en) Secured inputting method under a kind of Windows system
US20110264991A1 (en) Method and System for Management of Electronic Mail Communication
CN105809059B (en) A kind of method and its system of object properties camouflage conversion
CN101593256B (en) Safe input method based on Windows operating system
CN103442016B (en) The method and system of white list are pushed based on website fingerprint
Bu et al. Security Checking of Trigger-Action-Programming Smart Home Integrations
Masoumifar Cyberspace sovereignty: Is territorializing cyberspace opposed to having a globally compatible internet?

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant