CN114760063A - Home decoration data processing method, system, storage medium and equipment - Google Patents

Home decoration data processing method, system, storage medium and equipment Download PDF

Info

Publication number
CN114760063A
CN114760063A CN202210267568.4A CN202210267568A CN114760063A CN 114760063 A CN114760063 A CN 114760063A CN 202210267568 A CN202210267568 A CN 202210267568A CN 114760063 A CN114760063 A CN 114760063A
Authority
CN
China
Prior art keywords
key
information
funding
database
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210267568.4A
Other languages
Chinese (zh)
Inventor
涂子辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baianju Information Technology Shanghai Co ltd
Original Assignee
Baianju Information Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baianju Information Technology Shanghai Co ltd filed Critical Baianju Information Technology Shanghai Co ltd
Priority to CN202210267568.4A priority Critical patent/CN114760063A/en
Publication of CN114760063A publication Critical patent/CN114760063A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a home decoration data processing method, a home decoration data processing system, a storage medium and home decoration data processing equipment. The method comprises the following steps: acquiring client funding information acquired by a third party funding platform through https funding api; sending a key acquisition request to a key database through a key query api to the information leaving the resources according to the sensitive data type; receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and storing the ciphertext to a resource reservation database. The method and the system reduce the database leakage risk in the plaintext storage data of the sensitive data at the system level, and reduce the legal risk of a decoration company caused by leakage of user information and huge economic benefit loss caused by the legal risk.

Description

Home decoration data processing method, system, storage medium and equipment
Technical Field
The invention relates to the field of data processing, in particular to a home decoration data processing method, a home decoration data processing system, a storage medium and home decoration data processing equipment.
Background
Most decoration companies in the market put decoration services on a third-party platform at present, a client pushes sensitive data information (including a mobile phone number, a name, an address, decoration time, plan decoration cost and the like) to the decoration companies through authorization, and a back-end system during decoration work can display the information in a clear text by default. Due to the complex decoration scene, a plurality of designers and a plurality of construction managers are required to follow in decoration will of a client, sensitive data leakage risks exist in the communication process, in addition, database leakage risks also exist in system-level sensitive data plaintext storage data, and finally huge economic benefit loss and legal risks can be caused by decoration companies, so that the home decoration industry is particularly important for protecting sensitive information of the client.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, it is an object of the present invention to provide a method, system, storage medium and device for processing home decoration funding data, which solve the above problems in the prior art.
To achieve the above and other related objects, the present invention provides a method for processing homedress refuge data, comprising: acquiring client funding information acquired by a third party funding platform through an https funding api; sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources; receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and storing the ciphertext to a resource reservation database.
In an embodiment of the present invention, the method further includes: the customer information includes: name, mobile phone number, decoration style and overall budget; defining a sensitive data type registration key for the information to be retained according to the service type and acquiring the key; generating a corresponding key for the customer information according to the sensitive data type; and storing the key in the key database in a distributed mode.
In an embodiment of the present invention, the method further includes: converting the information of the reserved data into a hexadecimal numerical value; and calling a corresponding AES symmetric encryption algorithm scheme according to the length of the generated key to generate a ciphertext for the information.
In an embodiment of the present invention, the method further includes: and generating the key by using the server IP, the database name, the table name, the field name and the random number as parameters through an MD5 algorithm, wherein the number of the random number cannot be lower than N.
In an embodiment of the present invention, the method further includes: receiving a request for business personnel to check the plaintext of the information left; verifying the identity, the authority and the checking quantity information of the service personnel; sending the key acquisition request to a key management module according to the sensitive data type of the funding information; after receiving the key, extracting a ciphertext in the resource reserving database; an AES symmetric decryption algorithm is called through a secret key to be converted into a plaintext; and recording the plaintext record of the information left by the service personnel as log.
In an embodiment of the present invention, the method further includes: further comprising, before sending the key acquisition request: establishing a server ip mutual access white list; adding authentication parameters to the head part of the key request information data, wherein the authentication parameters comprise a request id, a service serial number and a time stamp; setting an effective time length k min for the timestamp; filtering the authentication parameters with byte type and empty parameter values, and sequencing according to the natural sequence of the authentication parameters; connecting the authentication parameters and the corresponding parameter values thereof to combine to generate a first character string; and generating the authentication signature from the first character string by using an MD5 algorithm.
In an embodiment of the present invention, the method further includes the key management module verifying the validity of the request information after receiving the key acquisition request: judging whether the key acquisition request information sending ip is in a white list or not; verifying the authentication parameter sequencing and signature method; and judging whether the receiving time is within the effective duration according to the timestamp.
To achieve the above and other related objects, the present invention provides a home furnishing funding data processing system, comprising: the data acquisition module is used for acquiring client refund information acquired by a third-party refund platform through https refund api and acquiring a key for the refund information according to the type of sensitive data; a key management module for generating the key and managing the key; the data processing module is used for receiving the key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left; and the storage database module is used for storing the key and the ciphertext.
To achieve the above and other related objects, the present invention provides a computer-readable storage medium, in which a computer program is stored, and the computer program is loaded and executed by a processor to implement the home furnishing resize data processing method.
To achieve the above and other related objects, the present invention provides an electronic device comprising: a processor, a memory, and a communication interface; wherein the memory is for storing a computer program; the processor is used for loading and executing the computer program to enable the electronic equipment to execute the home decoration funding data processing method; the communication interface is used for realizing communication between the access device and other equipment.
As described above, according to the home decoration data processing method, system, storage medium and device provided by the present invention, the data leakage problem caused by storing the customer data information in the plaintext is encrypted with high precision, and the key is stored by the distributed system, so that the personnel checking the data information is prevented from obtaining the sensitive information in the application, and the home decoration data processing method, system, storage medium and device are easy to implement.
Drawings
Fig. 1 is a schematic flow chart illustrating a home decoration funding data processing method according to an embodiment of the invention.
FIG. 2 is a block diagram of a home furnishing funding data processing system according to an embodiment of the invention.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
The following embodiments of the present invention are provided by way of specific examples, and other advantages and effects of the present invention will be readily apparent to those skilled in the art from the disclosure herein. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
In order to solve the problem that database data leakage caused by uncontrollable reasons exists in a database and a file of a home decoration system due to the fact that a large amount of client remaining data is stored in a plaintext form in the prior art, the invention provides a home decoration remaining data processing method, a home decoration remaining data processing system, a storage medium and equipment.
As shown in fig. 1, the present embodiment provides a home decoration funding data processing method, which includes the following steps:
s11: and obtaining the client funding information obtained by the third-party funding platform through the https funding api.
Specifically, personal information such as names, mobile phone numbers, decoration styles, overall budgets and the like reserved by users on third-party platforms such as enterprise platform official networks, trembles, fast hands, microblogs and the like is obtained through the https funding api.
S12: and sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources.
Specifically, firstly, a sensitive data type is defined for the information to be retained in advance according to a service type, and then a registration key is applied to the key management module.
Further, a corresponding key is generated according to the sensitive data type of the client funding information. In detail, the server ip (host), the database name (schema), the table name (table), the field name (column), and the random number are used as parameters to generate the secret key through the MD5 algorithm, wherein the number of the random number cannot be lower than N, for example: the Key generation rule is String keyStr ═ Host + schema + table + column + random number (uuid 64 bit), and Key ═ md5 (keyStr).
Further, the keys are stored in a distributed manner in a key database.
Preferably, the key is persisted and the creation time and the identity of whether or not to change is recorded.
Secondly, a key acquisition request is sent to the inquiry api provided by the key management module through the sensitive data type of the funding information. Before sending the acquisition request, processing the original request information data: firstly, adding an authentication parameter at a head part of key request information data, wherein the authentication parameter comprises a request id, a service serial number, a timestamp and other necessary parameters, and then setting an effective duration kmin for the timestamp, for example, setting the effective duration 3 minutes for the timestamp.
Furthermore, the type of the filtering parameter is byte type, the parameter value is empty authentication parameter, and the type of the parameter is not added into the header part of the request information and is not transmitted to the gateway. And then sorting according to the natural sequence of the authentication parameters, connecting the authentication parameters and the corresponding parameter values to combine and generate a first character string, for example, combining the sorted parameters and the corresponding values into a format of 'parameter-parameter value', and connecting the parameters by using & characters, wherein the generated character string is the character string to be signed.
Further, the first string is generated into an authentication signature using the MD5 algorithm.
Preferably, after receiving the key obtaining request, the key management module verifies the validity of the request information: the method comprises the steps of establishing a server ip mutual access white list for a requesting party and a requested party in advance, judging whether a request information source ip is in the white list or not after key request information is received, verifying authentication parameters in the request information if the request information source ip is in the white list, and returning request failure if the request information source ip is not in the white list.
Further, after receiving the key request, verifying the authentication parameters in the request message according to the sorting order and the signature method, and if the sorting order or the signature method of the authentication parameters is different from the agreement, failing to verify.
Preferably, after the authentication parameter and the signature are successfully verified, whether the receiving time is within a preset effective duration of the timestamp called by the addition request parameter is judged, if so, the verification is successful, and if not, the verification fails.
S13: and receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the leave-standing information.
Specifically, the obtained client information is converted into a hexadecimal numerical value, and then a corresponding AES symmetric encryption algorithm scheme is called according to the length of the generated key to generate a ciphertext for the information. For example: if the key length is 16 bits, the data of the reserved plaintext of the hexadecimal numerical value is encrypted by adopting 16-bit AES-128 which gives consideration to performance and security attributes, and the encryption is carried out by using algorithms such as byte substitution, row shifting, column confusion or round keys.
S14: and storing the ciphertext to a funding database.
Specifically, the encrypted data retention information is stored in a data retention database.
Further, when the service needs to check the information-left plaintext, a request for checking the information-left plaintext is received. And after receiving the request, firstly verifying the identity, the authority and the checking quantity information of the service personnel.
Further, when the user identity, the authority and the amount of the information for requesting to view the reserved information all meet the request, then the key is obtained according to the sensitive data type of the reserved information for requesting to view, the data processing of the key obtaining request is the same as that in the step S12, and after the key management module verifies that the key obtaining request is correct, the key is extracted from the key database and returned.
Further, after receiving the key, extracting the ciphertext information stored in the resource-reserving database, and then calling a decryption interface through the key to convert the ciphertext information into plaintext by adopting an AES symmetric decryption algorithm.
Preferably, the service personnel is recorded to view the plaintext record of the leave information as log, so that when a problem occurs, the source is conveniently found.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with a computer program. Based on this understanding, the present invention also provides a computer program product comprising one or more computer instructions. The computer instructions may be stored in a computer readable storage medium. The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media.
Referring to fig. 2, the present embodiment provides a home decoration refuge data processing system 20, which is installed in an electronic device as a piece of software to execute the home decoration refuge data processing method according to the foregoing method embodiment when running. Since the technical principle of the embodiment of the system is similar to that of the embodiment of the method, repeated description of the same technical details is omitted.
The home decoration funding data processing system 20 of the present embodiment specifically includes: a data acquisition module 21, a key management module 22, a data processing module 23, and a storage database module 24. The data acquisition module 21 is configured to acquire, through the https credentialing api, client credentialing information acquired by a third-party credentialing platform, and acquire a secret key for the credentialing information according to a sensitive data type; the key management module 22 is configured to generate the key and manage the key, where managing the key includes verifying a key request authentication parameter, and returning the key after the verification is successful; the data processing module 23 is configured to receive a key returned by the key database, invoke an encryption algorithm to generate a ciphertext from the information retained, and further perform data processing of adding an authentication parameter to the key acquisition request information and generate a signature; the storage database module 24 is used for storing the key and the ciphertext, and particularly for storing the key in a distributed manner.
It should be understood by those skilled in the art that the division of the modules in the embodiment of fig. 2 is only a logical division, and the actual implementation may be wholly or partially integrated into one or more physical entities. And the modules can be realized in a form that all the modules are called by the processing element through software, can also be realized in a form that all the modules are called by the hardware, can also be realized in a form that part of the modules are called by the processing element through software, and can also be realized in a form that part of the modules are called by the hardware. For example, the data processing module 23 may be a separate processing element, or may be integrated in a chip, or may be stored in a memory in the form of program codes, and the functions of the data processing module 23 are called and executed by a certain processing element. The other modules are implemented similarly. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
Referring to fig. 3, the embodiment provides an electronic device, which may be a portable computer, a smart phone, a tablet computer, or the like. In detail, the electronic device comprises at least, connected by a bus 31: a memory 32, a processor 33, and a communication interface 34, wherein the communication interface 34 is used for implementing communication between the data access apparatus and other devices, the memory 32 is used for storing computer programs, and the processor 33 is used for executing the computer programs stored in the memory 32 to execute all or part of the steps in the foregoing method embodiments.
The above-mentioned system bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The system bus may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus. The communication interface is used for realizing communication between the database access device and other equipment (such as a client, a read-write library and a read-only library). The Memory may include a Random Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
In summary, the home decoration data processing method, system, storage medium and device provided by the invention aim at the problem of data leakage caused by storing customer data information in plaintext, and avoid user information being extracted, checked and forwarded at will by encrypting the customer data information, extracting plaintext information for limited auditing and storing keys in a distributed manner, thereby achieving higher safety performance and being easy to implement. Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Those skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which may be made by those skilled in the art without departing from the spirit and scope of the present invention as defined in the appended claims.

Claims (10)

1. A home decoration refund data processing method is characterized by comprising the following steps:
acquiring client funding information acquired by a third party funding platform through an https funding api;
sending a key acquisition request to a key database through a key query api according to the sensitive data type for the information leaving the resources;
receiving a key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information leaving the data;
and storing the ciphertext to a funding database.
2. The method of claim 1, further comprising:
the client information comprises: name, mobile phone number, decoration style and overall budget;
defining a sensitive data type registration key for the information to be reserved according to the service type;
generating a corresponding key according to the sensitive data type of the client funding information;
and storing the key in the key database in a distributed mode.
3. The method of claim 2, further comprising:
converting the information of the reserved data into a hexadecimal numerical value;
and calling a corresponding AES symmetric encryption algorithm scheme according to the length of the generated key to generate a ciphertext for the information.
4. The method of claim 2, further comprising:
And generating the key by using the MD5 algorithm by taking the server IP, the database name, the table name, the field name and the random number as parameters, wherein the number of the random number cannot be lower than N.
5. The method of claim 1, further comprising:
receiving a request for business personnel to check the plaintext of the information left;
verifying the identity, the authority and the checking quantity information of the service personnel;
sending the key acquisition request to a key management module according to the sensitive data type of the funding information;
after receiving the key, extracting a ciphertext in the resource reserving database;
an AES symmetric decryption algorithm is called through a secret key to be converted into a plaintext;
and recording the plaintext record of the information left by the service personnel as log.
6. The method of claim 5, further comprising, prior to sending the key acquisition request:
establishing a server ip mutual access white list;
adding authentication parameters to the head part of the key request information data, wherein the authentication parameters comprise a request id, a service serial number and a time stamp;
setting an effective time length k min for the timestamp;
filtering the authentication parameters with byte type and empty parameter values, and sequencing according to the natural sequence of the authentication parameters;
Connecting the authentication parameters and the corresponding parameter values thereof to combine to generate a first character string;
the first string is generated into an authentication signature using the MD5 algorithm.
7. The method of claim 6, further comprising a key management module verifying the validity of the requested information after receiving the key acquisition request:
judging whether the key acquisition request information sending ip is in a white list or not;
verifying the authentication parameter sequencing and signature method;
and judging whether the receiving time is within the effective duration according to the timestamp.
8. A home improvement data processing system, said system comprising:
the data acquisition module is used for acquiring the client funding information acquired by the third-party funding platform through the https funding api and acquiring a key for the funding information according to the type of sensitive data;
a key management module for generating the key and managing the key;
the data processing module is used for receiving the key returned by the key database and calling an encryption algorithm to generate a ciphertext for the information left;
and the storage database module is used for storing the secret key and the ciphertext.
9. A computer-readable storage medium, in which a computer program is stored, which, when loaded and executed by a processor, carries out a method of processing homedress funding data according to any one of claims 1 to 7.
10. An electronic device, comprising: a processor, a memory, and a communication interface; wherein,
the memory is used for storing a computer program;
the processor is used for loading and executing the computer program to enable the electronic equipment to execute the home decoration funding data processing method according to any one of claims 1 to 7;
the communication interface is used for realizing communication between the access device and other equipment.
CN202210267568.4A 2022-03-18 2022-03-18 Home decoration data processing method, system, storage medium and equipment Pending CN114760063A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210267568.4A CN114760063A (en) 2022-03-18 2022-03-18 Home decoration data processing method, system, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210267568.4A CN114760063A (en) 2022-03-18 2022-03-18 Home decoration data processing method, system, storage medium and equipment

Publications (1)

Publication Number Publication Date
CN114760063A true CN114760063A (en) 2022-07-15

Family

ID=82326505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210267568.4A Pending CN114760063A (en) 2022-03-18 2022-03-18 Home decoration data processing method, system, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN114760063A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934299A (en) * 2015-12-29 2017-07-07 北京明朝万达科技股份有限公司 A kind of Database Encrypt System and method
US20190147170A1 (en) * 2017-11-16 2019-05-16 Intuit Inc. Processing data queries in a logically sharded data store
CN110839004A (en) * 2018-08-16 2020-02-25 北京京东尚科信息技术有限公司 Method and device for access authentication
CN111935094A (en) * 2020-07-14 2020-11-13 北京金山云网络技术有限公司 Database access method, device, system and computer readable storage medium
US20200394317A1 (en) * 2019-06-14 2020-12-17 Kenneth White Systems and methods for client-side and field-level encryption with dynamic schema databases
CN112685755A (en) * 2020-12-30 2021-04-20 石化盈科信息技术有限责任公司 Database encryption and decryption method and device, storage medium and electronic equipment
CN112988888A (en) * 2021-02-19 2021-06-18 平安科技(深圳)有限公司 Key management method, key management device, electronic equipment and storage medium
US11212264B1 (en) * 2019-05-30 2021-12-28 Wells Fargo Bank, N.A. Systems and methods for third party data protection
CN113886418A (en) * 2021-09-28 2022-01-04 支付宝(杭州)信息技术有限公司 Data processing method and device, electronic equipment and machine-readable storage medium
WO2022052665A1 (en) * 2020-09-14 2022-03-17 中兴通讯股份有限公司 Wireless terminal and interface access authentication method for wireless terminal in uboot mode

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934299A (en) * 2015-12-29 2017-07-07 北京明朝万达科技股份有限公司 A kind of Database Encrypt System and method
US20190147170A1 (en) * 2017-11-16 2019-05-16 Intuit Inc. Processing data queries in a logically sharded data store
CN110839004A (en) * 2018-08-16 2020-02-25 北京京东尚科信息技术有限公司 Method and device for access authentication
US11212264B1 (en) * 2019-05-30 2021-12-28 Wells Fargo Bank, N.A. Systems and methods for third party data protection
US20200394317A1 (en) * 2019-06-14 2020-12-17 Kenneth White Systems and methods for client-side and field-level encryption with dynamic schema databases
CN111935094A (en) * 2020-07-14 2020-11-13 北京金山云网络技术有限公司 Database access method, device, system and computer readable storage medium
WO2022052665A1 (en) * 2020-09-14 2022-03-17 中兴通讯股份有限公司 Wireless terminal and interface access authentication method for wireless terminal in uboot mode
CN112685755A (en) * 2020-12-30 2021-04-20 石化盈科信息技术有限责任公司 Database encryption and decryption method and device, storage medium and electronic equipment
CN112988888A (en) * 2021-02-19 2021-06-18 平安科技(深圳)有限公司 Key management method, key management device, electronic equipment and storage medium
CN113886418A (en) * 2021-09-28 2022-01-04 支付宝(杭州)信息技术有限公司 Data processing method and device, electronic equipment and machine-readable storage medium

Similar Documents

Publication Publication Date Title
WO2021003980A1 (en) Blacklist sharing method and apparatus, computer device and storage medium
CN110266764B (en) Gateway-based internal service calling method and device and terminal equipment
US11290446B2 (en) Access to data stored in a cloud
WO2021003977A1 (en) Default information query method and apparatus, and computer device and storage medium
CN111476573B (en) Account data processing method, device, equipment and storage medium
US11695740B2 (en) Anonymization method and apparatus, device, and storage medium
US12028458B2 (en) Systems and methods for user identity
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
CN109286620A (en) Method for managing user right, system, equipment and computer readable storage medium
CN110266653B (en) Authentication method, system and terminal equipment
CN113129008B (en) Data processing method, device, computer readable medium and electronic equipment
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN110955909B (en) Personal data protection method and block link point
CN117113392A (en) Private data processing method, device, computer equipment and storage medium
CN110602051B (en) Information processing method based on consensus protocol and related device
KR102517001B1 (en) System and method for processing digital signature on a blockchain network
CN103559430A (en) Application account management method and device based on android system
CN106453273B (en) A kind of information insurance management system and method based on cloud
CN106534047A (en) Information transmitting method and apparatus based on Trust application
CN114760063A (en) Home decoration data processing method, system, storage medium and equipment
CN110995437B (en) ETC system-based user information input method, device, equipment and storage medium
KR102602086B1 (en) Operation server for safe phone service using qr code and its operation method
CN110941745A (en) Electronic contract management method and device, storage medium and electronic equipment
CN107517177B (en) Interface authorization method and device
CN108076458B (en) Method and device for binding TF password card and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220715