CN106027509A - Cloud platform data computing method in ERP environment - Google Patents

Cloud platform data computing method in ERP environment Download PDF

Info

Publication number
CN106027509A
CN106027509A CN201610317369.4A CN201610317369A CN106027509A CN 106027509 A CN106027509 A CN 106027509A CN 201610317369 A CN201610317369 A CN 201610317369A CN 106027509 A CN106027509 A CN 106027509A
Authority
CN
China
Prior art keywords
field
data
user
platform
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610317369.4A
Other languages
Chinese (zh)
Inventor
郭建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jingjie Technology Co Ltd
Original Assignee
Chengdu Jingjie Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jingjie Technology Co Ltd filed Critical Chengdu Jingjie Technology Co Ltd
Priority to CN201610317369.4A priority Critical patent/CN106027509A/en
Publication of CN106027509A publication Critical patent/CN106027509A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a cloud platform data computing method in an ERP environment. The cloud platform data computing method comprises the steps that: a master user in a business organization defines and configures encrypted parameters and business data table items; and all the users in the business organization perform query in stages for an encrypted field. The provided cloud platform data computing method in the ERP environment realizes convenient data query in the ERP collaborative cloud platform, avoids a security problem caused by field decryption and brings convenience for sharing of business information at the interior of the business organization.

Description

Cloud platform method for computing data under ERP environment
Technical field
The present invention relates to cloud computing, particularly to the cloud platform method for computing data under a kind of ERP environment.
Background technology
The appearance of cloud computing mode allows the use pattern of software or service transfer the use pattern of lease to from purchase, This brings interests for medium-sized and small enterprises, because they are soft without bearing while obtaining oneself required service The maintenance of part and upgrading expense.Particularly with manufacturing enterprise, the competition between enterprise has developed into enterprise's group Knit the competition between supply chain.For improving competitiveness, each enterprise uses cooperation ERP platform to whole the most one after another Individual supply chain is managed.Being carried out building and safeguarding of platform by the third party service provider, enterprise only need to pay phase To cheap rent, it is possible to obtain the personalized service that can customize of equal quality.Enterprise customer makes When cooperating by ERP cooperation cloud platform, produce substantial amounts of data, wherein part data be business organization it Between significant data, referred to as confidential data.Ensure that confidential data is not obtained by disabled user, use the most extensive , most efficient method be that confidential data is encrypted storage, but cryptographic operation ensure that user believes But destroy original logical relation in plain text while breath confidentiality, will result in the inconvenience of data query.Cannot Directly by inquiring about in encrypted fields data in plain text.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes the cloud under a kind of ERP environment and puts down Platform method for computing data, including:
Encryption parameter and business datum list item are defined and configure by the primary user in business organization;
Field after encryption is inquired about by all users in business organization stage by stage.
Preferably, encryption parameter is defined and configures by described primary user, farther includes, by following Two ways arranges encryption key, and a kind of is that all member enterprises in business organization are for same business datum In table, same field uses identical private key to carry out encryption and decryption, is now being encrypted field selection by primary user Time configuration private key;Another kind is that the business record adhering to different collaboration user in same tables of data separately is used difference Private key carry out encryption and decryption, now encryption and decryption private key is held consultation with collaboration user respectively by primary user, or by Collaboration user configures;
Field after encryption is inquired about by described all users stage by stage, farther includes: the first step is inquired about Realizing at platform, after user setup querying condition, the non-NULL concerning security matters field in querying condition first isolated by platform Matching value, obtains the index record of this field in this table the most again from index file, is extracting index record Time, first judge that inquiry is primary user or collaboration user, during collaboration user inquiry, increase a combined characters Section matching condition, after obtaining index information, then obtains the index record that the match is successful, then uses and divide Outside the most remaining match query condition, from business tables of data, inquire data, therefrom obtain and mate Index record successfully has the record of like-identified field value, obtains the initial results set of platform inquiry, And return to user;Second step inquiry is carried out in client, after client obtains initial results set, at this Encrypted fields in ground deciphering initial results set, carries out mating in plain text, removes wherein with matching condition not The result joined, obtains last correct Query Result.
The present invention compared to existing technology, has the advantage that
The present invention proposes the cloud platform method for computing data under a kind of ERP environment, works in coordination with cloud platform at ERP The convenient data query of middle realization, and avoid safety problem field deciphering caused, facilitate simultaneously Business information within business organization is shared.
Accompanying drawing explanation
Fig. 1 is the flow chart of the cloud platform method for computing data under ERP environment according to embodiments of the present invention.
Detailed description of the invention
Hereafter provide one or more embodiment of the present invention together with the accompanying drawing of the diagram principle of the invention is detailed Thin description.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.This Bright scope is limited only by the appended claims, and the present invention contains many replacements, amendment and equivalent.? Middle elaboration many detail is described below to provide thorough understanding of the present invention.For exemplary purposes And these details are provided, and can also be according to right without some in these details or all details Claim realizes the present invention.
An aspect of of the present present invention provides the cloud platform method for computing data under a kind of ERP environment.Fig. 1 is root According to the cloud platform method for computing data flow chart under the ERP environment of the embodiment of the present invention.
The present invention, according to ERP the cooperation data characteristic of cloud platform, user operation characteristic, proposes for this platform Data encryption and encrypted fields querying method.The realization of encrypted fields inquiry is by being divided into text confidential data Encrypted fields inquiry realize and logarithm value type confidential data encrypted fields inquiry realize.
The ERP cooperation cloud platform of the present invention is a public service platform providing service for medium-sized and small enterprises, for In each ERP, the cooperation between business organization provides support.This platform and the ERP system of each enterprises Realizing seamless connection, provide complete collaboration services for each business organization, content includes: sell, after sale, Buying, logistics management etc..Whole system includes the inquiry of data encrypting and deciphering, encrypted fields and Private key distribution merit Can module.Data encrypting and deciphering module ensures that concerning security matters field is stored securely in platform and user can be allowed again normal simultaneously Check business datum;Encrypted fields inquiry realizes quick search on the premise of confidential data is not revealed in plain text; Private key distribution is to ensure that collaboration user and primary user can normally check the security mechanism of data.
Platform uses self contained data base pattern to the storage of the business datum of each business organization, and business datum is deposited Business datum by the data exchange mechanism between enterprises system, is delivered to after platform by storage In the built-in system of enterprise, information is processed in built-in system by enterprise, then re-uses data exchange Information after mechanism will process is delivered in platform;Confidential data only should be checked by business two parties, and Non-confidential data is then directly stored in plain text in platform database.
Platform have employed the strategy by each tissue oneself management and the confidential data arranging business datum table.In group Knitting inside, primary user has the highest authority, can be managed collaboration user, can check all industry Business data, and collaboration user can only check the data relevant to oneself, therefore by the option and installment of confidential data Power gives primary user.
Data type between different business organizations is the most variant, but the basic data type used substantially phase With, during for different types of field as querying condition, the inquiry mode used also has difference: for Numeric data, is all to use numeric data to store such as data such as unit price, quantity, adjustment amounts, these numbers According to inquiry have two classes: accurately inquiry and interval query.For text data, platform uses two kinds of issuers Formula: fuzzy query and accurately inquiry.In private key stores, private key can only be had the right to obtain the enterprise of this private key Obtaining, unauthorized user cannot obtain the plaintext of private key.
System uses primary user to be encrypted field configuration operation, and arranging of private key can be divided into two kinds, a kind of It is that all member enterprises in business organization use identical private key for same field in same business datum table Carrying out encryption and decryption, now encryption and decryption private key is by primary user's configuration private key when being encrypted field and selecting, another Plant is to use different private keys to add solution the business record adhering to different collaboration user in same tables of data separately Close;Now encryption and decryption private key is held consultation with collaboration user respectively by primary user, or by collaboration user oneself Configure.
ERP cloud platform uses three-tier architecture.User interface layer, is used for providing Custom Encryption view, private key Configuration view and user data query view.Business Logic, for data are processed, including The process of data encrypting and deciphering, encrypted fields inquiry, the content such as process of Private key distribution.Data access layer, uses In controlling platform database digital independent, add, revise, delete.The modules of cloud platform is concrete It is described as follows:
Data self encrypting module: be supplied to primary user and carry out self-defined concerning security matters field configuration, including, industry Business tables of data combined field selects, and receives primary user and is chosen for use as the field of combined field from business tables of data, Business datum table concerning security matters field is added and deletes.
Encryption/decryption module: clear data is used des encryption algorithm and RSA Algorithm, by tables of data The property value of field is that unit is encrypted and deciphered accordingly.
Business datum enquiry module: for counting in the case of tables of data encrypted fields in non-decrypting data base It is investigated inquiry, particularly may be divided into: ciphertext information inquiry: when querying condition comprises concerning security matters text matches bar This module is used to be encrypted Field Inquiry during part, including accurately inquiry and fuzzy query to text data; Concerning security matters text index manages: be managed text index table when business datum table is modified and searched, Including the new index record of condition, delete index record, renewal index record;Numeric type encrypted fields is inquired about: This module is used to be encrypted Field Inquiry when querying condition comprises numeric type concerning security matters matching condition, including Accurately inquiry and the interval query of logarithm value data;
Private key management and distribution module: carry out concerning security matters field protection, encrypted fields inquiry for generation and use User data is checked the generation of required all kinds of private keys, is stored and the functional module distributed, and specifically farther includes: The RSA PKI of storage enterprise customer;The private key of the storage enterprise customer of safety, it is ensured that the private key of user can only Obtained by this enterprise.Operation when have selected a number Value data field as encrypted fields field, generates FMES private key;Realize the safety storage to FMES private key with business private key.Needing in each business organization When wanting, safety, correct acquisition private key are in plain text.
The major key of database table is the most encrypted with external key.Business datum tables of data has a special field, should Field is referred to as combined field, is for differentiating that a record is relevant to which collaboration user, and this group Close field the most encrypted.Confidential data in the business datum being stored in platform is used DES enciphering and deciphering algorithm Carry out encryption and decryption, then use for private key RSA Algorithm to carry out encryption and decryption operation.
Before business datum is encrypted, initially sets up the index data of encrypted fields, specifically include: First individually set up an index look-up table for each concerning security matters field, for text data, use text sequence Row adjacency information generating algorithm processes, and sets up new index record set after adding other information, and counts Value Data then uses FMES to be encrypted clear data, then adds other information and generates new index Set of records ends.The value of the corresponding concerning security matters field of each record in index, in this index record, record has The index match information of plaintext concerning security matters field value corresponding with this index entry, positional information, related information. Index match information be confidential data is carried out in plain text adjacency information generating algorithm calculate the result generated or The result that FMES computing obtains, this information is mated when being used for inquiring about;Positional information represents this index note Business datum position in business datum table that record is corresponding.Positional information is made up of following content: this industry Business unique identification field name of tables of data, unique identification field values;Related information is one and represents this concerning security matters number According to the identification field associated by which collaboration user, this field carries out data when collaboration user inquiry data Isolation, can improve the efficiency of collaboration user inquiry operation simultaneously.
When encryption, first select the combined field of business datum table;Select to need in concerning security matters field selects function The business datum table of operation to be encrypted, simultaneously according to the table configuration information of this data base, analyzes selected Major key in business datum table and external key, and forbid major key, external key and combined field are encrypted selection Operation;The concerning security matters field selected by user information in platform database is generated corresponding index information by platform, And in client, the clear data of concerning security matters field is encrypted, then the business datum after encryption is sent to Platform, updates the Service Database of platform.When user checks data, first inquire about first at platform, To initial results set, initial results set is returned to user, carry out second time in client and inquire about, To last result.
When user inquires about, inquiry is divided into two steps, first step inquiry to realize at platform, and user setup is looked into After inquiry condition, the non-NULL concerning security matters fields match value in querying condition first isolated by platform, the most again from index literary composition Part obtains the index record of this field in this table.When extracting index record, first judge that inquiry is primary Family or collaboration user, during collaboration user inquiry, increase a combined field matching condition, obtain index After information, then obtain, by distinguished number, the index record that the match is successful.Then use and remain after separating Match query condition outside from business tables of data, inquire data, therefrom obtain and the index that the match is successful Record has the record of like-identified field value, obtains the initial results set of platform inquiry, and return to User;Second step inquiry is carried out in client, and after client obtains initial results set, local deciphering is initial Encrypted fields in results set, carries out mating in plain text, removes wherein result unmatched with matching condition, Obtain last correct Query Result.
During primary user's Custom Encryption process, the Custom Encryption service aid that calling platform provides, select to need The business datum table of operation to be encrypted, platform shows all fields, to can not encrypted fields be set to prohibit Only selecting, then primary user selects concerning security matters field, is reconfigured at private key, finally adds confidential data Close.In business datum allocation plan, provide AES, cipher mode and encryption key for primary user Self-defined scheme.DEA uses des encryption algorithm, it is provided that two kinds of encryption policys, a kind of Being individual character section list private key, another kind is the same private key of same table, and first kind of way is that primary user needs to relate to for each Close field is separately provided private key, can repeat, and the second way is that all concerning security matters fields in same table make With identical private key, this private key can be arranged by user oneself, maybe can produce random private-key by platform, The private key of the concerning security matters field that oneself has with this table can also be used.Carry out after private key is arranged private key primary user Check, it is determined that private key is the most legal, be to judge that the figure place of private key is the most correct.
Private key distribution is centered by platform, first needs to set up enterprise's public key information table, private key in platform Information table and Private key distribution table, record the PKI of each enterprise in this tissue in public key information table, and each user Private key be stored encrypted in platform database, encryption method is to use user to log in the password of platform, the most right Private key carries out AES encryption;The private key that the needs of the public key encryption recording enterprise in Private key distribution table are allocated. When primary user uses the data self cryptographic services of platform have selected a new concerning security matters field and arrange for it Private key KiTime, from platform, first obtain the PKI of business organization, with the PKI of each business organization to Ki It is encrypted, then result is added in the Private key distribution table in platform;Equally, when existing concerning security matters field Private key change time, by after in business datum table, the encrypted fields of this field is updated, by new private key It is encrypted and updates Private key distribution table.When enterprise's X landing platform, first obtain encrypted fields from platform Private key, is then decrypted in client with it, and by private key stored in clear in client, then checks During business datum tables of data T, first from the Private key distribution table of platform, the user of the public key encryption of acquisition X The private key of concerning security matters field in deciphering T, then X is deciphered with the private key of oneself in the client of oneself In T, the private key of concerning security matters field is in plain text, the concerning security matters field deciphering in the business datum then transmitted by platform.
It it is below the present invention query script to concerning security matters text message.
Text adjacency matrix is used to represent the text adjacency information of a text sequence, the literary composition then will set up This sequence matrix is compressed storage, i.e. determines figure place m obtaining a compression result, to going out in matrix Existing each 1 processes, and is converted by each 1 position k independent hash function, will It is mapped to multiple positions of an one-dimension information string.
When there being non-NULL concerning security matters matching condition in the querying condition of user, querying flow is divided into two steps, the first step It is to realize at platform, is that the information in the concordance list created by platform is inquired about, it is ensured that the concerning security matters of user Data are not revealed.
Step 1: user X submits inquiry to, obtains querying condition QS, and business datum table to be checked is L;
Step 2: searching platform data base, obtains concerning security matters set of fields SF of table L;
Step 3: decompose QS, obtains concerning security matters matching field name set SQ therein, and matching value Set VS;
Step 4: judge whether each concerning security matters matching field value is empty, if being all empty, the most directly will be fed into DBMS carries out conventional query;
Step 5: if being not all sky, obtains the non-NULL concerning security matters matching field name set FN in QS, and value Set FV, and their query option set, query option is accurately to inquire about or fuzzy query, obtains simultaneously Non-concerning security matters matching field in taking and null value concerning security matters matching field name set NS and value set NF, and inquiry Option set;
Step 6: plaintext matching value is processed, the matching value set OF after being processed;
Step 7: according to concerning security matters field name FN and business datum table L, obtain the rope that these concerning security matters fields are corresponding Draw the table name of table;
Step 8: according to the user type of current enterprise user, obtains user's X energy from manipulative indexing file The index record of concerning security matters field SF of the table L viewed, if this user is primary user, then the relating to of acquisition table L All index records of close field SF, if user is collaboration user, the most only obtain the index record relevant to X, The result obtained is put in a data set DS, and arranges by indication field ascending order, then by following match party Method is mated, the record that in deletion DS, it fails to match:
When accurately inquiring about, first above-mentioned text sequence adjacency information is used to generate method meter matching value Calculate result St obtaining a m position, then with in the past by index match information So generated in plain text mate, Both are identical, then it represents that the match is successful;When carrying out fuzzy query, it is also desirable to first to matching condition Value processes, and including first setting up adjacency matrix, then will abut against matrix compression, but in adjacency matrix Rear four row information all set to 0, and obtain compression result St*, next will index match information St original with St* Matching operation, matching operation step is: the first step, St* Yu St is carried out step-by-step and operation, obtains result Sm;Second step, compares Sm with St* the most identical, and the match is successful in identical then expression, otherwise represents that coupling is lost Lose.
Step 9: obtain business datum, and arrange by ascending order, then downwards the most line by line with the first row carry out word Segment value mates, if identical, then the Article 1 record in deletion, if it is not, then delete the current line of business datum Data.
Step 10: judge whether DS is empty, if not empty, then continues step 8, if it is empty, by business Data are deposited into interim table Tew, then other condition queries outside the non-NULL concerning security matters matching condition in basis Table Tew, obtains data DL.
Second time inquiry is to realize in client, first deciphers encrypted fields, the most accurately inquires about. If collaboration user is inquired about in inquiring about first, platform add user type as querying condition, Can ensure that the data in the initial results that collaboration user obtains do not comprise other cooperations unrelated with this enterprise and use The business datum at family.
Step 1: obtain data base querying QS, inquires about table L
Step 2: obtain concerning security matters set of fields SF of table L from platform;
Step 3: decompose QS and pass through SF, it is thus achieved that the non-NULL concerning security matters matching field name set FN in QS And value set FV;
Step 4: the encryption field information in Query Result DL first is decrypted, it is thus achieved that clear data ML。
For encryption and the inquiry of numeric data, for ensureing the uniformity with data self encipherment scheme, adopt Encryption and decryption is carried out with the DES algorithm as text data, the encrypted fields inquiry of logarithm value data, specifically Including:
Step 1: primary user determines the table L needing to carry out concerning security matters field protection, and has determined that numeric type concerning security matters Field SF;
Step 2: carry the field name T of the acquisition unique indication field of table L, and association belonging to this field signable Make field OW of user;
Step 3: start from Article 1 record and the most down obtain the record Ai L;
Step 4: obtain confidential data SAi in Ai, and the value of field T in Ai, field OW Value;
Step 5: SAi is carried out FMES encryption, obtains encrypted result Ri;
Step 6: by table name L, attribute field name MN, banner word segment value MV, index match information Ri It is stored in an ephemeral data to concentrate;
Step 7: judge whether all to be processed by all of for table L record, if untreated complete all notes Record, then return step 3;
Step 8: generate a new concordance list according to current service data table table name L, concerning security matters field name SF IN;
Step 9: the batch data that ephemeral data is concentrated is inserted in newly-built concordance list.
For the accurate inquiry of numeric data, use the inquiry mode as text confidential data, i.e. visitor Family end, matching value is encrypted by user with the private key of this field, is then communicated to platform, platform database Carrying out conventional database query, but carry out being accomplished by during interval query utilizing the index set up, querying flow is such as Under:
Step 1: user X submits inquiry to, the business datum table obtaining querying condition QS, this QS inquiry is L;
Step 2: searching platform data base, obtains concerning security matters set of fields SF of table L;
Step 3: judge whether the matching condition of user has numeric type field, if proceeding to step 4, numerical value The matching field of data is NF: if without, carry out step 5;
Step 4: the FMES private key of user X NF carries out FMES computing to matching value, and replacement is looked into The matching value of field NF in inquiry condition;
Step 5: QS is passed to platform.QS is decomposed by platform, carries acquisition values match word therein Section name set and matching value set;
Step 6: judge whether each concerning security matters matching field value is empty, if being all empty, then directly send QS Entering and DBMS carries out conventional query, if being not all sky, then forwarding step 7 to;
Step 7: the non-NULL concerning security matters matching field name set NFN in acquisition, and value set NFV, and Their query option set, i.e. query option are accurately inquiry or commensurate in scope, non-in simultaneously obtaining Concerning security matters matching field and null value concerning security matters matching field name set and value set, and query option set;
Step 8: according to concerning security matters field name NFN and business datum table table name L, obtain these concerning security matters fields pair The concordance list table name answered;
Step 9: by the field name of values match field, query option, matching value or the coupling separated Scope, and obtain from each self-corresponding numeric data field index table according to the user type of current enterprise user Take the index record of the concerning security matters field of the table L that family X can view, if particularly as follows: user type is primary Family, then obtain all index records of the concerning security matters field of table L, if user type is collaboration user, the most only obtain Taking the index record relevant to L, the result of acquisition is put in a data set DS, and arranges by indication field ascending order Row.
Step 10: obtain business datum, the value then carrying out downwards field line by line with the first row of DS is mated, If identical, then delete the Article 1 record in DS, if it is different, then delete the Current Datarow of business datum.
Step 11: judge whether DS is empty, if not empty, then continues step 8, if it is empty, then by DS It is deposited into interim table, then according to other condition query tables outside the non-NULL concerning security matters matching condition in QS, To data DL.
In sum, the present invention proposes the cloud platform method for computing data under a kind of ERP environment, at ERP Collaborative cloud platform realizes convenient data query, and avoids safety problem field deciphering caused, Facilitate the business information within business organization to share simultaneously.
Obviously, it should be appreciated by those skilled in the art, each module or each step of the above-mentioned present invention are permissible Realizing by general calculating system, they can concentrate in single calculating system, or is distributed in many On the network that individual calculating system is formed, alternatively, they can use the executable program code of calculating system Realize, it is thus possible to be stored in storage system being performed by calculating system.So, this Bright be not restricted to any specific hardware and software combine.
It should be appreciated that the above-mentioned detailed description of the invention of the present invention is used only for exemplary illustration or explains this The principle of invention, and be not construed as limiting the invention.Therefore, without departing from the spirit and scope of the present invention In the case of any modification, equivalent substitution and improvement etc. done, should be included in protection scope of the present invention Within.Additionally, claims of the present invention be intended to fall into scope and border or Whole in the equivalents on this scope of person and border change and modifications example.

Claims (2)

1. the cloud platform method for computing data under ERP environment, for providing public service for enterprise ERP cooperates cloud platform, it is characterised in that including:
Encryption parameter and business datum list item are defined and configure by the primary user in business organization;
Field after encryption is inquired about by all users in business organization stage by stage.
Method the most according to claim 1, it is characterised in that encryption parameter is carried out by described primary user Definition and configuration, farther include, arrange encryption key by following two mode, and one is business organization In all member enterprises in same business datum table same field use identical private key carry out adding solution Close, now by primary user's configuration private key when being encrypted field and selecting;Another kind is in same tables of data Adhering to the business record of different collaboration user separately uses different private keys to carry out encryption and decryption, now encryption and decryption private key by Primary user holds consultation with collaboration user respectively, or is configured by collaboration user;
Field after encryption is inquired about by described all users stage by stage, farther includes: the first step is inquired about Realizing at platform, after user setup querying condition, the non-NULL concerning security matters field in querying condition first isolated by platform Matching value, obtains the index record of this field in this table the most again from index file, is extracting index record Time, first judge that inquiry is primary user or collaboration user, during collaboration user inquiry, increase a combined characters Section matching condition, after obtaining index information, then obtains the index record that the match is successful, then uses and divide Outside the most remaining match query condition, from business tables of data, inquire data, therefrom obtain and mate Index record successfully has the record of like-identified field value, obtains the initial results set of platform inquiry, And return to user;Second step inquiry is carried out in client, after client obtains initial results set, at this Encrypted fields in ground deciphering initial results set, carries out mating in plain text, removes wherein with matching condition not The result joined, obtains last correct Query Result.
CN201610317369.4A 2016-05-13 2016-05-13 Cloud platform data computing method in ERP environment Pending CN106027509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610317369.4A CN106027509A (en) 2016-05-13 2016-05-13 Cloud platform data computing method in ERP environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610317369.4A CN106027509A (en) 2016-05-13 2016-05-13 Cloud platform data computing method in ERP environment

Publications (1)

Publication Number Publication Date
CN106027509A true CN106027509A (en) 2016-10-12

Family

ID=57099791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610317369.4A Pending CN106027509A (en) 2016-05-13 2016-05-13 Cloud platform data computing method in ERP environment

Country Status (1)

Country Link
CN (1) CN106027509A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765238A (en) * 2019-10-12 2020-02-07 北京字节跳动网络技术有限公司 Data encryption query method and device
CN111914292A (en) * 2020-07-29 2020-11-10 山东浪潮通软信息科技有限公司 Method for constructing national secret unified configuration management center based on AOP technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102024054A (en) * 2010-12-10 2011-04-20 中国科学院软件研究所 Ciphertext cloud-storage oriented document retrieval method and system
CN103973668A (en) * 2014-03-27 2014-08-06 温州大学 Server-side personal privacy data protecting method in network information system
CN104036050A (en) * 2014-07-04 2014-09-10 福建师范大学 Complex query method for encrypted cloud data
US20140379664A1 (en) * 2013-06-19 2014-12-25 Virtual Forge GmbH System and method for automatic correction of a database configuration in case of quality defects
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102024054A (en) * 2010-12-10 2011-04-20 中国科学院软件研究所 Ciphertext cloud-storage oriented document retrieval method and system
US20140379664A1 (en) * 2013-06-19 2014-12-25 Virtual Forge GmbH System and method for automatic correction of a database configuration in case of quality defects
CN103973668A (en) * 2014-03-27 2014-08-06 温州大学 Server-side personal privacy data protecting method in network information system
CN104036050A (en) * 2014-07-04 2014-09-10 福建师范大学 Complex query method for encrypted cloud data
CN104780161A (en) * 2015-03-23 2015-07-15 南京邮电大学 Searchable encryption method supporting multiple users in cloud storage

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765238A (en) * 2019-10-12 2020-02-07 北京字节跳动网络技术有限公司 Data encryption query method and device
CN111914292A (en) * 2020-07-29 2020-11-10 山东浪潮通软信息科技有限公司 Method for constructing national secret unified configuration management center based on AOP technology
CN111914292B (en) * 2020-07-29 2023-04-14 浪潮通用软件有限公司 Method for constructing national encryption unified configuration management center based on AOP technology

Similar Documents

Publication Publication Date Title
CN104881280B (en) A kind of design method for supporting the ciphertext database middleware of inquiry more
CN105787387B (en) A kind of database encryption method and the encrypting database querying method
CN101504706B (en) Database information encryption method and system
CN103502994B (en) Method for handling privacy data
CN106022159A (en) ERP data processing method based on cloud computing
CN105610793B (en) A kind of outsourcing data encryption storage and cryptogram search system and its application process
CN109858262A (en) Workflow examination and approval method, apparatus, system and storage medium based on block catenary system
CN110457930A (en) The attribute base encryption method and system of the hiding traceable revocation malicious user of strategy
CN108288157A (en) A kind of supply chain management method based on financial block chain technology
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN102713995A (en) Confidential search system and encryption processing system
GB2484382A (en) Generating a test database for testing applications by applying format-preserving encryption to a production database
CN102236766A (en) Security data item level database encryption system
CN109711191A (en) It invites and submit bids method and system
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN111008855B (en) Retrospective data access control method based on improved proxy re-encryption
JP4006214B2 (en) Data search system, data relay server, database server, and database access method
CN106326666A (en) Health record information management service system
US20210166222A1 (en) Arrangement of blockchains with a restricted transaction
CN106326766A (en) HBase data reading control method
EP3395004A1 (en) A method for encrypting data and a method for decrypting data
CN114338717A (en) Digital archive management system based on block chain and attribute cryptography
CN111917725A (en) Encryption system and encryption method for multi-tenant SaaS platform
CN109685448A (en) A kind of engineering project bidding Management method and system
CN117896180B (en) Multi-system networking method based on attribute-based encryption technology, intelligent device and storage medium thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20200501

AD01 Patent right deemed abandoned