CN111125224B - Method and system for realizing automatic encryption and decryption of database data in Java program - Google Patents

Method and system for realizing automatic encryption and decryption of database data in Java program Download PDF

Info

Publication number
CN111125224B
CN111125224B CN201911332153.5A CN201911332153A CN111125224B CN 111125224 B CN111125224 B CN 111125224B CN 201911332153 A CN201911332153 A CN 201911332153A CN 111125224 B CN111125224 B CN 111125224B
Authority
CN
China
Prior art keywords
data
database
timestamp
decryption
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911332153.5A
Other languages
Chinese (zh)
Other versions
CN111125224A (en
Inventor
凡赞
何奎
曹连峰
陶洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lubangtong IoT Co Ltd
Original Assignee
Guangzhou Robustel Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Robustel Technologies Co ltd filed Critical Guangzhou Robustel Technologies Co ltd
Priority to CN201911332153.5A priority Critical patent/CN111125224B/en
Publication of CN111125224A publication Critical patent/CN111125224A/en
Application granted granted Critical
Publication of CN111125224B publication Critical patent/CN111125224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention belongs to the technical field of communication, in particular to a method for realizing automatic encryption and decryption of database data in a Java program, wherein before the data is stored in a database, the data is encrypted in a mybatis frame of the JAVA program according to a time stamp and an encryption algorithm to obtain encrypted data, and the encrypted data and the time stamp are stored in the database; when the data are called from the database, the data and the time stamp are called from the database, and decryption is carried out in a mybatis frame of the JAVA program according to the time stamp and a decryption algorithm corresponding to the encryption algorithm. According to the scheme, the plug-in or the function of dynamic encryption is integrated in the MyBatis framework, so that the decoding risk caused by data processing and encryption in a service layer in the prior art is solved, the data is represented in different forms in the client and the database, the safety of data storage is improved, and the coupling in the data processing process is reduced. Meanwhile, the invention also provides a system for realizing the encryption and decryption method.

Description

Method and system for realizing automatic encryption and decryption of database data in Java program
Technical Field
The invention relates to the technical field of communication, in particular to a method and a system for realizing automatic encryption and decryption of database data in a Java program.
Background
MyBatis is a java-based persistent layer framework that supports customized SQL, storage procedures, and advanced mapping. MyBAtis avoids almost all JDBC code and manual setting of parameters and acquisition of result sets. MyBAtis can use simple XML or annotations to configure and map the native information, mapping the interfaces and java's pojs to records in the database.
The problems existing in the prior art are that: the current implementation mode of in-line comparison mainstream is realized by processing a service rule and encrypting and decrypting operations at a service layer of a JAVA program, so that service and encryption actions are coupled; the encryption rule of the data stored in the database is complex and single, dynamic encryption cannot be realized, and if others know the encryption algorithm, the encryption data of the whole database can be cracked.
Therefore, the technical problem to be solved by the present application is: how to improve the data storage security and reduce the coupling of data encryption processing.
Disclosure of Invention
The invention aims to provide a method and a system for realizing automatic encryption and decryption of database data in a Java program, which fully utilize a MyBatis framework to provide a tool for program development to conveniently operate a database, provide a flexible expansion interface at the same time, develop corresponding plug-ins according to business characteristics, and solve the decoding risk caused by data processing and encryption in a traditional business layer by integrating the dynamically encrypted plug-ins or functions in the MyBatis framework. Meanwhile, the invention also provides a system for realizing the encryption and decryption method.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for realizing automatic encryption and decryption of database data in a Java program specifically comprises the following steps: before the data are stored in a database, encrypting the data according to an encryption algorithm in a mybatis frame of a JAVA program according to a timestamp to obtain encrypted data, and storing the encrypted data and the timestamp in the database;
when the data are called from the database, calling the data and the time stamp from the database, and decrypting in a mybatis frame of the JAVA program according to the time stamp and a decryption algorithm corresponding to the encryption algorithm;
the timestamp is generated by the mybatis framework by intercepting the moment of the sql request at which data is stored in the database.
In the above method for implementing automatic encryption and decryption of database data in a Java program, the data encryption comprises the following specific steps:
step 11: intercepting an sql request about storing data into a database in a mybatis framework, and generating a time stamp of the moment;
step 12: processing the timestamp according to a first preset rule to obtain superposed data;
step 13: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
step 14: storing the encrypted data and the time stamp into a database;
the encryption algorithm is a set of a first preset rule and a second preset rule.
In the above method for implementing automatic encryption and decryption of database data in a Java program, the specific steps of data decryption are as follows:
step 21: receiving an sql request for calling data in a database sent by a user to a JAVA program;
step 22: sending the encrypted data corresponding to the sql request in the database and a timestamp synchronously stored with the encrypted data to a mybatis framework;
step 23: processing the timestamp in a mybatis frame according to a first preset rule to obtain superposed data;
step 24: processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user;
the decryption algorithm is a set of a first preset rule and a third preset rule.
In the above method for implementing automatic encryption and decryption of database data in a Java program, the first preset rule is to multiply the last-but-one digit of the timestamp by the last-but-one digit, and then add the last-but-one digit to obtain the superimposed data.
In the method for realizing automatic encryption and decryption of database data in a Java program, the second preset rule is to add the superimposed data and the data to obtain encrypted data;
the third preset rule is as follows: and subtracting the superposed data from the encrypted data to obtain decrypted data.
Meanwhile, the invention also discloses a system for the method, which comprises a database and a mybatis framework of the JAVA program;
the mybatis framework is used for intercepting an sql request when data are stored in the database, generating a timestamp, encrypting the data by adopting the timestamp according to an encryption algorithm, and storing the encrypted data and the timestamp into the database;
the mybatis framework is also used for decrypting the encrypted data by adopting the timestamp according to a decryption algorithm when the data and the timestamp are called out from the database.
In the above system for implementing automatic encryption and decryption of database data, the mybatis frame includes the following modules:
an sql request interception module: the system comprises a server and a server, wherein the server is used for intercepting an sql request sent by a peripheral device or a client; the sql request comprises a request for storing data into the database and a request for calling data out of the database;
a timestamp generation module: the system comprises a data storage module, an sql request interception module, a timestamp generation module and a timestamp generation module, wherein the data storage module is used for storing data in a database;
an encryption module: the system comprises a database, a timestamp and data processing module, a data processing module and a data processing module, wherein the database is used for storing encrypted data;
a decryption module: and the system is used for calling the encrypted data and the time stamp in the database according to the sql request for calling the data from the database, processing the encrypted data according to the decryption algorithm and the time stamp and sending the processed data to a user of the peripheral equipment.
In the above system for implementing automatic encryption and decryption of database data, the encryption module includes:
a timestamp processing submodule: the time stamp is processed according to a first preset rule to obtain superposed data;
an encryption submodule: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
the decryption module includes:
a timestamp processing submodule: the time stamp is processed according to a first preset rule to obtain superposed data;
a decryption submodule: and processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user.
In the above system for implementing automatic encryption and decryption of database data, the first preset rule is: multiplying the last but one digit of the timestamp by the last but one digit, and then adding the last but one digit to obtain the superposed data;
the second preset rule is that the superposed data and the data are added to obtain encrypted data;
the third preset rule is as follows: and subtracting the superposed data from the encrypted data to obtain decrypted data.
Compared with the prior art, the invention has the beneficial effects that:
the scheme makes full use of the MyBatis framework, which is a tool for providing a convenient operation database for program development, and simultaneously provides a flexible expansion interface, so that corresponding plug-ins can be developed according to business characteristics, and the problem of decoding risk caused by data processing and encryption in a traditional business layer is solved by integrating dynamically encrypted plug-ins or functions in the MyBatis framework, so that data can be represented in different forms in a client and the database, the safety of data storage is improved, and the coupling in the data processing process is reduced. Meanwhile, the invention also provides a system for realizing the encryption and decryption method.
Drawings
Fig. 1 is an encryption flow chart of embodiment 1 of the present invention;
fig. 2 is an encryption flow chart of embodiment 1 of the present invention;
fig. 3 is an encryption flow chart of embodiment 1 of the present invention;
fig. 4 is a decryption flowchart of embodiment 1 of the present invention;
FIG. 5 is a decryption flowchart of embodiment 1 of the present invention;
fig. 6 is a decryption flowchart of embodiment 1 of the present invention;
fig. 7 is a block diagram showing the structure of embodiment 1 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
A method for realizing automatic encryption and decryption of database data in a Java program specifically comprises the following steps: before the data are stored in a database, encrypting the data according to an encryption algorithm in a mybatis frame of a JAVA program according to a timestamp to obtain encrypted data, and storing the encrypted data and the timestamp in the database;
when the data are called from the database, calling the data and the time stamp from the database, and decrypting in a mybatis frame of the JAVA program according to the time stamp and a decryption algorithm corresponding to the encryption algorithm;
the timestamp is generated by the mybatis framework by intercepting the moment of the sql request at which data is stored in the database.
The main points of the embodiment are as follows: the data are encrypted and decrypted in the mybatis framework, and the data are processed according to the encryption algorithm and the decryption algorithm by adopting the dynamic timestamp, the mybatis framework has excellent plug-in integration capability, and the encryption and decryption modules are integrated in the mybatis framework, so that the encryption and decryption can be avoided in a service layer, and the coupling of service processing and encryption operation is reduced.
Meanwhile, the dynamic timestamp is used as the source data of the superposed data, the encryption process is dynamic, the difficulty of password cracking is improved, the data exist in different forms at the client and the database, and the data security is improved.
In particular, the present invention relates to a method for producing,
referring to fig. 1 to 6, the specific steps of data encryption are as follows:
step 11: intercepting an sql request about storing data into a database in a mybatis framework, and generating a time stamp of the moment;
the device sends data and sql requests to the database through the JAVA program, the data and sql requests reach a persistent layer after passing through a control layer and a service layer, and a mybatis framework is located in the persistent layer.
The mybatis framework intercepts the sql request, and the time when the sql request is intercepted is used as a timestamp.
Step 12: processing the timestamp according to a first preset rule to obtain superposed data;
in practical applications, the first preset rule may be various, and in this embodiment, the rule specifically includes: the superimposed data is obtained by multiplying the last-but-one digit of the timestamp by the last-but-one digit and then adding the last-but-one digit, and if the timestamp is 123456789, the superimposed data is 71.
Step 13: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
in practical application, the second preset rule may also be various, and in this embodiment, the rule specifically is: and adding the superposed data and the data to obtain encrypted data.
Example (c): the device uploads a piece of data having a field temp with a value of 15, an upload timestamp of 1576726563266, and an encrypted value of 15+ (6 x 2+6) ═ 33
Step 14: storing the encrypted data and the time stamp into a database; the encrypted data and the time stamps are in one-to-one correspondence, and any encrypted data has a unique time stamp.
The encryption algorithm is a set of a first preset rule and a second preset rule.
Referring to fig. 4 to 6, the specific steps of data decryption are:
step 21: receiving an sql request for calling data in a database sent by a user to a JAVA program;
if a user needs to call data in a database, an sql request needs to be sent to a JAVA program; the sql request reaches the mybatis framework of the persistent layer after being processed by the control layer and the service layer.
Step 22: sending the encrypted data corresponding to the sql request in the database and a timestamp synchronously stored with the encrypted data to a mybatis framework;
inquiring corresponding encrypted data through the sql request, and sending the encrypted data and the corresponding timestamp to the mybatis framework; generally any data needs to be decrypted, but if the database stores data which is not encrypted, a step of judging whether the data needs to be decrypted or not should be added. Generally, the encrypted data and the time stamp are sent to the mybatis framework in the form of a data packet, and whether the data needs to be decrypted can be judged by analyzing the data packet to judge whether the time stamp exists.
Step 23: processing the timestamp in a mybatis frame according to a first preset rule to obtain superposed data;
and processing the time stamp in the decryption process according to the rule in the encryption process, wherein the processed superposed data is the same.
Step 24: processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user;
the third rule is opposite to the second rule, if the second rule is that the superposition data and the data needing to be encrypted are added to obtain the encrypted data, the third rule is that the data after encryption is used for subtracting the superposition data to obtain the decrypted data.
The decryption algorithm is a set of a first preset rule and a third preset rule.
The embodiment makes full use of the MyBatis framework, which is a tool for providing a convenient operation database for program development, and simultaneously provides a flexible expansion interface, so that corresponding plug-ins can be developed according to business characteristics, and the problem of decoding risk caused by data processing and encryption in a traditional business layer is solved by integrating dynamically encrypted plug-ins or functions in the MyBatis framework, so that data can be represented in different forms in a client and the database, the safety of data storage is improved, and the coupling in the data processing process is reduced.
Example 2
A system for use in the method of embodiment 1, comprising the mybatis framework B of the database A, JAVA program;
the mybatis framework is used for intercepting an sql request when data are stored in the database, generating a timestamp, encrypting the data by adopting the timestamp according to an encryption algorithm, and storing the encrypted data and the timestamp into the database;
the mybatis framework is also used for decrypting the encrypted data by adopting the timestamp according to a decryption algorithm when the data and the timestamp are called out from the database.
Specifically, the mybatis framework includes the following modules:
sql request interception module 1: the system comprises a server and a server, wherein the server is used for intercepting an sql request sent by a peripheral device or a client; the sql request comprises a request for storing data into the database and a request for calling data out of the database;
the timestamp generation module 2: the system comprises an sql request intercepting module 1, a database and a timestamp generating module, wherein the sql request intercepting module is used for generating a timestamp when intercepting an sql request for storing data into the database;
an encryption module: the system comprises a database, a timestamp and data processing module, a data processing module and a data processing module, wherein the database is used for storing encrypted data;
the encryption module includes:
the timestamp processing submodule 3: the time stamp is processed according to a first preset rule to obtain superposed data;
the encryption submodule 4: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
a decryption module: and the system is used for calling the encrypted data and the time stamp in the database according to the sql request for calling the data from the database, processing the encrypted data according to the decryption algorithm and the time stamp and sending the processed data to a user of the peripheral equipment.
The decryption module includes:
the timestamp processing submodule 3: the time stamp is processed according to a first preset rule to obtain superposed data;
decryption submodule 5: and processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user.
The basic process of data processing is as follows:
the data encryption storage process includes that data are uploaded to a database through a JAVA program by peripheral equipment, an sql request intercepting module 1 intercepts an sql request about data storage sent by the equipment, a timestamp generating module 2 generates a timestamp when the sql request intercepting module 1 intercepts the sql request, the encryption module processes the timestamp and the data according to an encryption algorithm to obtain encrypted data, the encrypted data are stored to the database, specifically, the timestamp is processed through a timestamp processing submodule 3 to obtain superposed data, the data and the superposed data are added through a decryption module to obtain encrypted data, and the encrypted data and the timestamp are stored to the database.
The data calling and decrypting process comprises the following steps: the user sends a data calling request to the JAVA program, namely an sql request for calling data in a database, an sql request intercepting module 1 intercepts the request and receives encrypted data and a timestamp corresponding to the sql request sent by the database, a timestamp processing sub-module 3 processes the timestamp to obtain superimposed data, and a decryption sub-module 5 subtracts the superimposed data from the encrypted data to obtain decrypted data and sends the decrypted data to a client.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (7)

1. A method for realizing automatic encryption and decryption of database data in Java programs is characterized by comprising the following steps: before the data are stored in a database, encrypting the data according to an encryption algorithm in a mybatis frame of a JAVA program according to a timestamp to obtain encrypted data, and storing the encrypted data and the timestamp in the database;
when the data are called from the database, calling the data and the time stamp from the database, and decrypting in a mybatis frame of the JAVA program according to the time stamp and a decryption algorithm corresponding to the encryption algorithm; if the database stores data which are not encrypted, a step of judging whether the data need to be decrypted is added: the encrypted data and the time stamp are sent to the mybatis framework in a data packet form, whether the time stamp exists or not is judged by analyzing the data packet, and whether the data needs to be decrypted or not can be judged;
the timestamp is generated by the mybatis frame by intercepting the moment of the sql request stored in the database;
the data encryption method comprises the following specific steps:
step 11: intercepting an sql request about storing data into a database in a mybatis framework, and generating a time stamp of the moment;
step 12: processing the timestamp according to a first preset rule to obtain superposed data;
step 13: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
step 14: storing the encrypted data and the time stamp into a database;
the encryption algorithm is a set of a first preset rule and a second preset rule.
2. The method for implementing automatic encryption and decryption of database data in Java program according to claim 1, wherein the data decryption comprises the following steps:
step 21: receiving an sql request for calling data in a database sent by a user to a JAVA program;
step 22: sending the encrypted data corresponding to the sql request in the database and a timestamp synchronously stored with the encrypted data to a mybatis framework;
step 23: processing the timestamp in a mybatis frame according to a first preset rule to obtain superposed data;
step 24: processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user;
the decryption algorithm is a set of a first preset rule and a third preset rule.
3. The method for implementing automatic encryption and decryption of database data in a Java program according to claim 1 or 2, wherein the first predetermined rule is to multiply the last-but-one digit of the timestamp by the last-but-one digit, and then add the last-but-one digit to obtain the superimposed data.
4. The method for implementing automatic encryption and decryption of database data in a Java program according to claim 2, wherein the second predetermined rule is to add the superimposed data and the data to obtain encrypted data;
the third preset rule is as follows: and subtracting the superposed data from the encrypted data to obtain decrypted data.
5. A system for implementing the method of any of claims 1-4, characterized by: the system comprises a database and a mybatis framework of a JAVA program;
the mybatis framework is used for intercepting an sql request when data are stored in the database, generating a timestamp, encrypting the data by adopting the timestamp according to an encryption algorithm, and storing the encrypted data and the timestamp into the database;
the mybatis framework is also used for decrypting the encrypted data by adopting the timestamp according to a decryption algorithm when the data and the timestamp are called out from the database;
an sql request interception module: the system comprises a server and a server, wherein the server is used for intercepting an sql request sent by a peripheral device or a client; the sql request comprises a request for storing data into the database and a request for calling data out of the database;
a timestamp generation module: the system comprises a data storage module, an sql request interception module, a timestamp generation module and a timestamp generation module, wherein the data storage module is used for storing data in a database;
an encryption module: the system comprises a database, a timestamp and data processing module, a data processing module and a data processing module, wherein the database is used for storing encrypted data;
a decryption module: the system comprises a database, a user and a peripheral, wherein the database is used for calling encrypted data and a timestamp in the database according to an sql request for calling the data from the database, processing the encrypted data according to a decryption algorithm and the timestamp and sending the processed data to the peripheral user; if the database stores unencrypted data, the encrypted data and the timestamp are sent to the mybatis framework in the form of a data packet, and whether the timestamp exists or not can be judged by analyzing the data packet, so that whether the data needs to be decrypted or not can be judged.
6. The system for realizing automatic encryption and decryption of database data according to claim 5, characterized in that:
the encryption module includes:
a timestamp processing submodule: the time stamp is processed according to a first preset rule to obtain superposed data;
an encryption submodule: processing the data corresponding to the sql request and the superposed data according to a second preset rule to obtain encrypted data;
the decryption module includes:
a timestamp processing submodule: the time stamp is processed according to a first preset rule to obtain superposed data;
a decryption submodule: and processing the encrypted data and the superposed data according to a third preset rule to obtain decrypted data, and sending the decrypted data to a user.
7. The system for realizing automatic encryption and decryption of database data according to claim 6, characterized in that: the first preset rule is as follows: multiplying the last but one digit of the timestamp by the last but one digit, and then adding the last but one digit to obtain the superposed data;
the second preset rule is that the superposed data and the data are added to obtain encrypted data;
the third preset rule is as follows: and subtracting the superposed data from the encrypted data to obtain decrypted data.
CN201911332153.5A 2019-12-21 2019-12-21 Method and system for realizing automatic encryption and decryption of database data in Java program Active CN111125224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911332153.5A CN111125224B (en) 2019-12-21 2019-12-21 Method and system for realizing automatic encryption and decryption of database data in Java program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911332153.5A CN111125224B (en) 2019-12-21 2019-12-21 Method and system for realizing automatic encryption and decryption of database data in Java program

Publications (2)

Publication Number Publication Date
CN111125224A CN111125224A (en) 2020-05-08
CN111125224B true CN111125224B (en) 2021-07-16

Family

ID=70500855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911332153.5A Active CN111125224B (en) 2019-12-21 2019-12-21 Method and system for realizing automatic encryption and decryption of database data in Java program

Country Status (1)

Country Link
CN (1) CN111125224B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711762A (en) * 2020-12-22 2021-04-27 航天信息股份有限公司 Transparent encryption method for database

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN107222493A (en) * 2017-06-26 2017-09-29 浪潮软件股份有限公司 A kind of ORACLE JDBC data transmission channels ciphered compressed system and method
CN110287208A (en) * 2019-05-27 2019-09-27 北京三快在线科技有限公司 The method and apparatus of database field encryption, storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105022966B (en) * 2015-07-21 2018-11-23 郭俊雄 Database data encryption decryption method and system
CN105357191B (en) * 2015-10-28 2018-09-28 北京奇虎科技有限公司 The encryption method and device of user data
US11030328B2 (en) * 2017-05-31 2021-06-08 Entrust Corporation Cryptographic object management across multiple remote sites
CN107292197B (en) * 2017-06-29 2020-02-07 北京京东尚科信息技术有限公司 Data encryption method, data decryption method, encryption device and decryption device
KR102488636B1 (en) * 2017-11-23 2023-01-17 삼성전자주식회사 Encryption device encrypting data and timestamp, system on chip including the same, and electronic device
CN108009440B (en) * 2017-11-23 2020-05-22 重庆金融资产交易所有限责任公司 Data storage method, query method, device, storage medium and computer equipment
EP3738063A4 (en) * 2018-01-08 2021-10-06 Paperclip Inc. Methods for securing data
CN109325369B (en) * 2018-11-02 2020-06-30 浙江大学 Method for encrypting, storing and retrieving time field of building structure test data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN107222493A (en) * 2017-06-26 2017-09-29 浪潮软件股份有限公司 A kind of ORACLE JDBC data transmission channels ciphered compressed system and method
CN110287208A (en) * 2019-05-27 2019-09-27 北京三快在线科技有限公司 The method and apparatus of database field encryption, storage medium

Also Published As

Publication number Publication date
CN111125224A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN112929172B (en) System, method and device for dynamically encrypting data based on key bank
US8644513B2 (en) Database processing on externally encrypted data
CN109547445A (en) A kind of method and system that verifying client network requests are legal
JP2009099151A (en) User query processing system and method by query encryption transformation in database including encrypted column
CN111460503B (en) Data sharing method, device, equipment and storage medium
CN101247232A (en) Encryption technique method based on digital signature in data communication transmission
CN111970109B (en) Data transmission method and system
CN111274611A (en) Data desensitization method, device and computer readable storage medium
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN108734023B (en) System and method for accessing and integrating ciphertext database system
CN113642014A (en) Data access system based on hybrid cloud and public cloud server
CN115422570A (en) Data processing method and system for distributed storage
CN111125224B (en) Method and system for realizing automatic encryption and decryption of database data in Java program
CN114428784A (en) Data access method and device, computer equipment and storage medium
CN112511295A (en) Authentication method and device for interface calling, micro-service application and key management center
CN116028486A (en) Method and device for data storage and data query
CN105049206B (en) A method of it is encrypted using SM2 elliptic curves in OpenSSL
CN111460475B (en) Method for implementing de-identification processing of data object main body based on cloud service
CN112199703B (en) Web data dynamic encryption transmission method and system based on client
CN112187750B (en) Information encryption method and system based on Internet
CN105302822B (en) Method for reading and writing data of database and application response device
CN115277206B (en) Data processing method and server
CN116881973B (en) Financial privacy data trusted computing method and system based on multiple data sources
CN108833583B (en) Power plant information management system and method based on mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 511356 Room 501, building 2, No. 63, Yong'an Avenue, Huangpu District, Guangzhou, Guangdong

Patentee after: Guangzhou lubangtong Internet of things Technology Co.,Ltd.

Address before: 510653 3rd floor, building F, kehuiyuan, 95 Daguan Road, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: GUANGZHOU ROBUSTEL TECHNOLOGIES Co.,Ltd.