CN115694921B - Data storage method, device and medium - Google Patents

Data storage method, device and medium Download PDF

Info

Publication number
CN115694921B
CN115694921B CN202211244411.6A CN202211244411A CN115694921B CN 115694921 B CN115694921 B CN 115694921B CN 202211244411 A CN202211244411 A CN 202211244411A CN 115694921 B CN115694921 B CN 115694921B
Authority
CN
China
Prior art keywords
data
preset
type
encrypted
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211244411.6A
Other languages
Chinese (zh)
Other versions
CN115694921A (en
Inventor
孙长杰
申传旺
赵海兴
罗超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Original Assignee
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chaozhou Zhuoshu Big Data Industry Development Co Ltd filed Critical Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority to CN202211244411.6A priority Critical patent/CN115694921B/en
Publication of CN115694921A publication Critical patent/CN115694921A/en
Application granted granted Critical
Publication of CN115694921B publication Critical patent/CN115694921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a data storage method, equipment and a medium, which are used for solving the following technical problems: how to safely store the data on the premise of ensuring the availability of the data. The method comprises the following steps: generating a configuration file through preset configuration parameters; reading the preset configuration parameters from the configuration file according to the service data; determining data to be encrypted in the service data; encrypting the data to be encrypted according to the preset configuration parameters to obtain ciphertext data corresponding to the data to be encrypted, and performing hash calculation on the data to be encrypted according to the preset configuration parameters to obtain hash values corresponding to the data to be encrypted; and storing the ciphertext data and the hash value into corresponding preset data items respectively.

Description

Data storage method, device and medium
Technical Field
The present application relates to the field of data storage technologies, and in particular, to a data storage method, device, and medium.
Background
With the rapid development of social economy and technology, data value is rapidly improved, and data security becomes a serious issue in government, enterprise and personal information security. Important information such as government affair data, patient information, financial statement, marketing data, personal privacy data and the like is related to personal privacy and enterprise pulse, and is related to national folk life.
The security of data storage is the readability of the database outside of the system operation. Once the data file is stolen, even if the original system program is not available, the stolen data file can be checked by a program writing method. From this point of view, the unencrypted database is not secure, easily resulting in disclosure of personal privacy information and business secrets.
In order to ensure the data security, a plurality of ways are adopted to increase the difficulty of acquiring the core information, so that a hacker cannot easily enter the system to steal the data, but the method also can produce various troubles, such as slow system response, slow file reading, incompatibility of a service system, excessively high CPU occupancy rate, complex access and the like, which brings a plurality of inconveniences to normal work and reduces the availability of the data.
Disclosure of Invention
The embodiment of the application provides a data storage method, equipment and medium, which are used for solving the following technical problems: how to safely store the data on the premise of ensuring the availability of the data.
In a first aspect, an embodiment of the present application provides a data storage method, where the method includes: generating a configuration file through preset configuration parameters; reading the preset configuration parameters from the configuration file according to the service data; determining data to be encrypted in the service data; encrypting the data to be encrypted according to the preset configuration parameters to obtain ciphertext data corresponding to the data to be encrypted, and performing hash calculation on the data to be encrypted according to the preset configuration parameters to obtain hash values corresponding to the data to be encrypted; and storing the ciphertext data and the hash value into corresponding preset data items respectively.
In one or more embodiments of the present disclosure, the preset configuration parameters include at least any one or more of the following: the cryptographic algorithm type, the cryptographic algorithm name, the key type, the hash algorithm name, and the fixed parameter.
In one or more embodiments of the present description, the type of cryptographic algorithm includes a symmetric cryptographic algorithm and an asymmetric cryptographic algorithm; the cryptographic algorithm names comprise SM1, AES DES, 3DES, RC2, RC4, RC5 and IDEA; the key type comprises a public key and a symmetric key; the hash algorithm names include SM3, SHA-1 and MD5.
In one or more embodiments of the present disclosure, reading the preset configuration parameters in the configuration file according to service data specifically includes: when the read type of the cryptographic algorithm is a symmetric cryptographic algorithm, the read type of the key is a symmetric key; and when the type of the read cryptographic algorithm is an asymmetric cryptographic algorithm, the type of the read key is a public key.
In one or more embodiments of the present disclosure, after generating the configuration file by presetting the configuration parameter, the method further includes: and carrying out encryption processing on the configuration file.
In one or more embodiments of the present disclosure, after storing the ciphertext data and the hash value in respective corresponding preset data items, the method further includes: receiving a plaintext search term; carrying out hash calculation processing on the plaintext retrieval word to obtain a retrieval word hash value corresponding to the plaintext retrieval word; and carrying out retrieval comparison on the preset data item through the retrieval word hash value so as to determine ciphertext data corresponding to the plaintext retrieval word.
In one or more embodiments of the present disclosure, after determining ciphertext data corresponding to the plaintext search term, the method further includes: reading the cipher algorithm type corresponding to the cipher text data, and determining the key type corresponding to the cipher text data according to the cipher algorithm type; and based on the key type, decrypting the ciphertext data through a cryptographic algorithm in the configuration file to obtain plaintext data corresponding to the plaintext retrieval word.
In one or more embodiments of the present disclosure, after storing the ciphertext data and the hash value in respective corresponding preset data items, the method further includes: determining a data table corresponding to the preset data item; and carrying out association processing on the data table containing the same preset data items.
In a second aspect, an embodiment of the present application further provides a data storage device, including: a processor; and a memory having executable code stored thereon that, when executed, causes the processor to perform a data storage method as described above.
In a third aspect, embodiments of the present application also provide a non-volatile computer storage medium storing computer executable instructions arranged to perform a data storage method as described above.
The data storage method, the data storage device and the data storage medium provided by the embodiment of the application have the following beneficial effects: the business data is encrypted through the cryptographic algorithm, so that human-understandable information is hidden, and the disclosure of personal privacy information and business secrets caused by data theft is prevented. When the service data is encrypted, the data needing to be encrypted in the service data is determined, namely, a method of encrypting part of sensitive information instead of encrypting all the information is adopted, reasonable selection is made in the aspects of data security and availability, the relationship between the two is balanced, and both the data security and the service availability are considered. In addition, by storing the hash value in the data item of the database, the retrievable and association relation of the data is realized. The confidentiality and the plaintext recoverability of the data are realized by storing the ciphertext in the database, and finally the confidentiality and the usability of the data are realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a flow chart of a data storage method according to an embodiment of the present application;
Fig. 2 is a flowchart of encrypting and storing plaintext data in an application scenario according to an embodiment of the present application;
fig. 3 is a flowchart of calculating and storing hash values of plaintext data in an application scenario according to an embodiment of the present application;
fig. 4 is a flowchart of ciphertext data retrieval under an application scenario provided by an embodiment of the present application;
fig. 5 is a flowchart of ciphertext data decryption under an application scenario provided by an embodiment of the present application;
FIG. 6 is a flowchart of associating a data table in an application scenario provided by an embodiment of the present application;
fig. 7 is a block diagram of a data storage device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The true meaning of the data security is that the usability and usability of the service system are ensured to the greatest extent on the premise of meeting the security of protecting core important data by users.
Protecting the security of data requires providing a secure and stable system environment, and should be a data-centric security system. The data-centric security architecture consists of two parts, data + environment. First, a trusted data environment, such as trusted people, devices, networks, applications, storage, etc., needs to be built. Secondly, techniques such as data controllability, identity authentication, content identification, encryption and the like are required.
From the viewpoint of data security, converting human-readable data into human-unreadable data, i.e., hiding human-understandable general meaning information, but only retaining machine-understandable associated information, is an effective method for protecting data security. Practical experience also teaches that most of the system processing information operates to screen and correlate, only when a person is engaged in a lane, is information that is understandable to humans required to be presented.
Based on the basic principle, the embodiment of the application provides a data security storage protection method for converting data expression forms through encryption technology. By hiding human comprehensible information, disclosure of personal privacy information and trade secrets due to theft of data is prevented. Meanwhile, a method of encrypting part of information instead of encrypting all the information is adopted, reasonable selection is made in the aspects of data security and availability, the relationship between the two is balanced, and both the data security and the service availability are considered.
The following describes the technical scheme provided by the embodiment of the application in detail through the attached drawings.
Fig. 1 is a flowchart of a data storage method according to an embodiment of the present application. As shown in fig. 1, the data storage method in the embodiment of the present application at least includes the following execution steps:
Step 101, generating a configuration file, and reading preset configuration parameters in the configuration file according to the service data.
Before data encryption and storage are performed, the data storage method provided by the embodiment of the application needs to determine the service data to be operated, and the service data can be designated by a user. Configuration of the configuration file, i.e. generating the configuration file, is then required.
Specifically, the preset configuration parameters included in the configuration file are determined first, that is, the parameters to be configured are determined first, and in one example of the present application, the preset configuration parameters at least include: the cryptographic algorithm type, the cryptographic algorithm name, the key type, the hash algorithm name, and the fixed parameter. The type of the cryptographic algorithm comprises a symmetric cryptographic algorithm and an asymmetric cryptographic algorithm. The symmetric cryptographic algorithm includes: SM1, AES DES, 3DES, RC2, RC4, RC5 and IDEA. The asymmetric cryptographic algorithm includes: SM2, RSA, DSA and ECC. The key types include public keys and symmetric keys. The hash algorithm includes: SM3, SHA-1 and MD5.
It should be noted that the whole service system may be configured with one cryptographic algorithm, or may set a plurality of different cryptographic algorithms according to a specific service, so as to adapt to a plurality of different security scenarios. Also, the entire service system may be configured with only a single key, or may be configured with multiple different keys according to a specific service, so as to adapt to multiple different security scenarios. Moreover, the whole service system can be configured with one hash algorithm, or a plurality of different hash algorithms can be set according to specific services so as to adapt to a plurality of different security scenes. Also, the whole service system can be configured with only one fixed parameter (salt), and a plurality of different fixed parameters (salts) can be set according to specific services so as to adapt to a plurality of different security scenes.
In one or more possible implementation manners of the embodiment of the present application, in order to ensure security of data such as a key in a configuration file, the configuration file may also be encrypted.
Further, after the configuration file is generated, the configuration parameters required when the service data is encrypted can be read in the configuration file according to the service data, namely, the cipher algorithm type, the cipher algorithm name, the key type, the hash algorithm name and the like corresponding to the service data encryption are read. In this process, if the type of cryptographic algorithm read is an asymmetric cryptographic algorithm, the type of key read is a public key. If the type of cryptographic algorithm read is a symmetric cryptographic algorithm, the type of key read is a symmetric key.
Step 102, determining data to be encrypted in the service data.
After the configuration parameters required by the encryption of the service data are determined, the service data can be encrypted, but in the embodiment of the application, in order to ensure the usability of the service data, only part of the data in the service data can be encrypted, namely only the data to be encrypted is encrypted, and the determination of the data to be encrypted can be specified by a user.
And step 103, carrying out encryption processing and hash calculation processing on the data to be encrypted according to the preset configuration parameters to obtain corresponding ciphertext data and hash values.
In this step, the plaintext designated by the user, that is, the data to be encrypted, may be encrypted by using the above-described read cryptographic algorithm (name) and key (type) to obtain corresponding ciphertext data. For example, the identification card number is encrypted to obtain the ciphertext of the identification card number.
Meanwhile, when the configuration parameters in the configuration file are read, a hash algorithm (name) and fixed parameters are also read, and at the moment, hash calculation can be carried out on a plaintext appointed by a user according to the hash algorithm and the fixed parameters to obtain a corresponding hash value. For example, hash calculation is performed on the identification card number to obtain the hash value of the identification card number
Thus, ciphertext data and a hash value corresponding to the data to be encrypted are obtained.
Step 104, storing the ciphertext data and the hash value into a preset data item.
In one example of the present application, the preset data item may be an entry in a data table corresponding to the data to be encrypted, that is, the encrypted ciphertext data is utilized to replace plaintext data at the position of the original entry in the data table.
The specific implementation process can be seen in fig. 2 and 3. Fig. 2 is a flowchart of encrypting and storing plaintext data in an application scenario according to an embodiment of the present application. As shown in fig. 2, the plaintext 1 is encrypted by a symmetric encryption algorithm or an asymmetric encryption algorithm to obtain a corresponding ciphertext 1, and then the ciphertext 1 is stored in a data table corresponding to the ciphertext 1. Fig. 3 is a flowchart of calculating and storing hash values of plaintext data in an application scenario according to an embodiment of the present application. As shown in fig. 3, the plaintext 1 obtains a corresponding hash value 1 through a hash algorithm, and then the hash value 1 is stored in a hash value 1 position in the data table.
In one or more possible implementation manners of the embodiment of the application, after ciphertext data is stored, if plaintext data corresponding to the ciphertext data is required to be checked, at this time, the ciphertext data is required to be searched according to a plaintext search term input by a user, and then the searched ciphertext data is decrypted to obtain the corresponding plaintext data.
Specifically, fig. 4 is a flowchart of ciphertext data retrieval under an application scenario provided by an embodiment of the present application. Before searching, firstly, the name and fixed parameters (salt) of the hash algorithm are required to be read from the configuration file according to the service data. Then, as shown in fig. 4, the plaintext search term is determined according to the search request, and then the hash algorithm and the fixed parameter (salt) can be utilized to perform hash calculation on the plaintext search term designated by the user to obtain a corresponding search term hash value. And finally, inquiring ciphertext data from the data table by using the retrieval word hash value as a retrieval condition, namely, matching or comparing the retrieval word hash value with the hash value in the data table, and feeding back the inquiry result data to the user so as to enable the user to acquire the ciphertext data corresponding to the plaintext retrieval word.
Further, when decrypting the ciphertext data, the type of the cryptographic algorithm, the name of the cryptographic algorithm and the secret key need to be read from the configuration file according to the service data. At this time, if the type of the read cryptographic algorithm is an asymmetric cryptographic algorithm, the read key is a private key. If the type of cryptographic algorithm read is a symmetric cryptographic algorithm, the key read is a symmetric key. And then, decrypting the ciphertext data in the search result by using the cryptographic algorithm and the key to obtain corresponding plaintext data. At this time, if the type of the cryptographic algorithm is an asymmetric cryptographic algorithm, decryption is performed by using the asymmetric cryptographic algorithm and the private key. And if the type of the cryptographic algorithm is a symmetric cryptographic algorithm, decrypting by using the symmetric cryptographic algorithm and the symmetric key. For example, the ciphertext of the identification card number is decrypted to obtain a plaintext identification card number. Finally, the decrypted plaintext data is fed back to the user, and the implementation of the process is shown in fig. 5.
In one or more possible implementation manners of the embodiment of the present application, in order to improve the searching efficiency in the searching process, the data table may be associated with the plaintext data required for feedback to the user as soon as possible. Specifically, two data tables are associated by taking a hash value as a key value, so that associated combined data is obtained, and then the hash value retrieval is carried out on the combined data. Fig. 6 is a flowchart of data table association under an application scenario provided by the embodiment of the present application, as shown in fig. 6, two data tables containing the same ciphertext 1 and hash value 1 are combined, and when the two data tables are combined, the positions of the ciphertext 1 and hash value 1 are unchanged, and the following plaintext data are combined, so that when the hash value is used for searching, two tables containing hash value 1 do not need to be searched, but only the related data tables need to be searched and queried.
The data storage method provided by the embodiment of the application has the following beneficial effects:
1) The hash value of the plaintext data is calculated by utilizing the hash algorithm, the symmetric ciphertext of the plaintext data is calculated by utilizing the password algorithm, and only the hash value and the ciphertext are stored in the database, so that the plaintext data is not stored, the problem of safe storage of the data is solved, and the data leakage caused by the attack of the system is prevented.
2) Because the hash value of the plaintext data is stored, the data can still be retrieved and queried under the state of secret storage.
3) Because the hash value has the characteristic of fixed length, the optimization problem of the data query performance can be completed by combining the characteristic with database means such as indexes.
4) By utilizing the characteristic of fixed length of the hash value, the association inquiry among the data tables can be realized, and the data inquiry speed is improved.
5) The ciphertext is stored, and the ciphertext can be decrypted by using a decryption algorithm for viewing by a user when necessary.
In a word, the method in the embodiment of the application not only solves the problem of data secret storage, but also solves the problems of quick data inquiry, quick association inquiry and data use, thereby realizing the safety and usability of the data.
The foregoing is a method embodiment in the embodiment of the present application, and based on the same inventive concept, the embodiment of the present application further provides a data storage device, and a structure of the data storage device is shown in fig. 7.
Fig. 7 is a block diagram of a data storage device according to an embodiment of the present application, where, as shown in fig. 7, the device includes: a processor; and a memory having executable code stored thereon which, when executed, causes the processor to perform a data storage method as described above
In one or more possible implementations of the embodiment of the present application, the processor is configured to generate a configuration file through preset configuration parameters; reading the preset configuration parameters from the configuration file according to the service data; determining data to be encrypted in the service data; encrypting the data to be encrypted according to the preset configuration parameters to obtain ciphertext data corresponding to the data to be encrypted, and performing hash calculation on the data to be encrypted according to the preset configuration parameters to obtain hash values corresponding to the data to be encrypted; and storing the ciphertext data and the hash value into corresponding preset data items respectively.
In addition, an embodiment of the present application provides a nonvolatile computer storage medium storing computer executable instructions, where the computer executable instructions are configured to: generating a configuration file through preset configuration parameters; reading the preset configuration parameters from the configuration file according to the service data; determining data to be encrypted in the service data; encrypting the data to be encrypted according to the preset configuration parameters to obtain ciphertext data corresponding to the data to be encrypted, and performing hash calculation on the data to be encrypted according to the preset configuration parameters to obtain hash values corresponding to the data to be encrypted; and storing the ciphertext data and the hash value into corresponding preset data items respectively.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for the apparatus and medium embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (7)

1. A method of data storage, the method comprising:
Generating a configuration file through preset configuration parameters;
Reading the preset configuration parameters from the configuration file according to the service data;
determining data to be encrypted in the service data;
encrypting the data to be encrypted according to the preset configuration parameters to obtain ciphertext data corresponding to the data to be encrypted, and performing hash calculation on the data to be encrypted according to the preset configuration parameters to obtain hash values corresponding to the data to be encrypted;
storing the ciphertext data and the hash value into corresponding preset data items respectively;
the preset configuration parameters at least comprise any one or more of the following: the type of the cryptographic algorithm, the name of the cryptographic algorithm, the type of the key, the name of the hash algorithm and the fixed parameters;
the type of the cryptographic algorithm comprises a symmetric cryptographic algorithm and an asymmetric cryptographic algorithm; the cryptographic algorithm names comprise SM1, AESDES, 3DES, RC2, RC4, RC5 and IDEA; the key type comprises a public key and a symmetric key; the hash algorithm name comprises SM3, SHA-1 and MD5;
Reading the preset configuration parameters in the configuration file according to the service data, wherein the method specifically comprises the following steps:
when the read type of the cryptographic algorithm is a symmetric cryptographic algorithm, the read type of the key is a symmetric key; and
When the type of the read cipher algorithm is an asymmetric cipher algorithm, the type of the read cipher key is a public key.
2. The data storage method according to claim 1, wherein after generating the configuration file by presetting the configuration parameters, the method further comprises:
and carrying out encryption processing on the configuration file.
3. The data storage method according to claim 1, wherein after storing the ciphertext data and the hash value in respective corresponding preset data items, the method further comprises:
Receiving a plaintext search term;
Carrying out hash calculation processing on the plaintext retrieval word to obtain a retrieval word hash value corresponding to the plaintext retrieval word;
and carrying out retrieval comparison on the preset data item through the retrieval word hash value so as to determine ciphertext data corresponding to the plaintext retrieval word.
4. A data storage method according to claim 3, wherein after determining ciphertext data corresponding to the plaintext search term, the method further comprises:
reading the cipher algorithm type corresponding to the cipher text data, and determining the key type corresponding to the cipher text data according to the cipher algorithm type;
and based on the key type, decrypting the ciphertext data through a cryptographic algorithm in the configuration file to obtain plaintext data corresponding to the plaintext retrieval word.
5. The data storage method according to claim 1, wherein after storing the ciphertext data and the hash value in respective corresponding preset data items, the method further comprises:
determining a data table corresponding to the preset data item;
and carrying out association processing on the data table containing the same preset data items.
6. A data storage device, the device comprising:
A processor;
And a memory having executable code stored thereon which, when executed, causes the processor to perform a data storage method as claimed in any one of claims 1 to 5.
7. A non-transitory computer storage medium storing computer executable instructions configured to perform a data storage method as recited in any one of claims 1-5.
CN202211244411.6A 2022-10-12 2022-10-12 Data storage method, device and medium Active CN115694921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211244411.6A CN115694921B (en) 2022-10-12 2022-10-12 Data storage method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211244411.6A CN115694921B (en) 2022-10-12 2022-10-12 Data storage method, device and medium

Publications (2)

Publication Number Publication Date
CN115694921A CN115694921A (en) 2023-02-03
CN115694921B true CN115694921B (en) 2024-05-28

Family

ID=85064064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211244411.6A Active CN115694921B (en) 2022-10-12 2022-10-12 Data storage method, device and medium

Country Status (1)

Country Link
CN (1) CN115694921B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117690562A (en) * 2023-12-11 2024-03-12 银川宜善互联网医院有限公司 Medical archive management method, system, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016171271A1 (en) * 2015-04-22 2016-10-27 株式会社日立製作所 Encrypted database system and encrypted data management method
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server
WO2020233373A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Application configuration file management method and device
CN113486389A (en) * 2021-09-08 2021-10-08 北京紫光青藤微系统有限公司 Data storage method and device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016171271A1 (en) * 2015-04-22 2016-10-27 株式会社日立製作所 Encrypted database system and encrypted data management method
WO2020233373A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 Application configuration file management method and device
CN111917535A (en) * 2020-06-30 2020-11-10 山东信通电子股份有限公司 Data encryption storage method and device and server
CN113486389A (en) * 2021-09-08 2021-10-08 北京紫光青藤微系统有限公司 Data storage method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN115694921A (en) 2023-02-03

Similar Documents

Publication Publication Date Title
AU2018367363B2 (en) Processing data queries in a logically sharded data store
US10873450B2 (en) Cryptographic key generation for logically sharded data stores
US8447983B1 (en) Token exchange
US20220343017A1 (en) Provision of risk information associated with compromised accounts
US10650164B2 (en) System and method for obfuscating an identifier to protect the identifier from impermissible appropriation
JP6180177B2 (en) Encrypted data inquiry method and system capable of protecting privacy
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
CN106452770B (en) Data encryption method, data decryption method, device and system
CN107453880B (en) Cloud data secure storage method and system
CN106022155A (en) Method and server for security management in database
KR20130039354A (en) Database management system and encrypting method thereof
CA3065767C (en) Cryptographic key generation for logically sharded data stores
WO2020123926A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN114417073B (en) Neighbor node query method and device of encryption graph and electronic equipment
KR20220092811A (en) Method and device for storing encrypted data
CN115694921B (en) Data storage method, device and medium
US11386429B2 (en) Cryptocurrency securing method and device thereof
US11997191B2 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
Suthar et al. EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques
KR101422759B1 (en) Secure method for data store and share in data outsourcing
CN113065146A (en) Homomorphic encryption method for block chain data protection
JP4338185B2 (en) How to encrypt / decrypt files
EP4123486A1 (en) Systems and methods for improved researcher privacy in distributed ledger-based query logging systems
Kapse et al. Secure and Efficient Search Technique in Cloud Computing
Spirintseva et al. The models of the information security in the cloud storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant