CN104517058A - Method for achieving safe information storage by encrypting and storing information into corresponding side tables - Google Patents
Method for achieving safe information storage by encrypting and storing information into corresponding side tables Download PDFInfo
- Publication number
- CN104517058A CN104517058A CN201310444313.1A CN201310444313A CN104517058A CN 104517058 A CN104517058 A CN 104517058A CN 201310444313 A CN201310444313 A CN 201310444313A CN 104517058 A CN104517058 A CN 104517058A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- corresponding side
- encrypting
- side tables
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Abstract
The invention relates to practical application of the information security technology to software systems of banking industry, particularly to a method for achieving safe information storage by encrypting and storing information into corresponding side tables. The method comprises the corresponding side tables with one field each for the key table of an information system; encrypting every record information of the key table into a character string through DES (data encryption standard) and storing the data string into the corresponding side table. Therefore, when the record information changes, the information system can correct the encrypted record information of the corresponding side table to ensure the consistency of data information of the main table and the side tables; when a database (DBA) user corrects and deletes information background, due to the fact that the user cannot find corresponding records in the side tables for corresponding correction and deleting, the information system can find out the corrected or deleted records through comparison and timely restore data. The information system designed through the method for achieving safe information storage by encrypting and storing the information into the corresponding side tables can prevent legal or illegal DBA users from directly correcting and deleting the data of the key table in a database, thereby greatly improving the safety performance and achieving the effect that data cannot be corrected and deleted even being visible.
Description
Technical field
The present invention relates to practical application in the software systems of information security technology in bank's industry, close key table to infosystem and set up the corresponding subtabulation only having a field, the each recorded information of key table of checking on becomes a character string to be stored in corresponding subtabulation by des encryption, when recorded information changes, infosystem can revise scrambled record information in corresponding subtabulation, ensure major-minor table data message consistance like this, if database DBA user is in backstage amendment with when deleting information record, corresponding amendment and deletion is made due to corresponding record cannot be found in subtabulation, will find after infosystem comparison to be modified or deleted record, data can be recovered in time.The infosystem designed by this method can prevent legal or illegal database D BA user from directly revising in a database and delete the data of closing key table, greatly improve the security performance of infosystem, reach timely visible data, the effect also revised and do not delete.
Background technology
Computer utility is along with the development of information networking; concept and the practice of information security deepen constantly, continuation; from the communication security that the military, government after World War II specially enjoy; develop into the data protection of the twentieth century seventies; to the information security of twentieth century nineties until current Information Assurance; the concept of safety has been not limited to the protection of information; people are it is desirable that to the protection of whole information security and defence; comprise the protection to information, detection, reaction and recovery capability etc., be beneficial to the social development of security information.
1, the content information of information security comprises safely the content of following several respects:
1.1 confidentiality: the illegal leakage of anti-locking system internal information;
1.2 integralities: in anti-locking system, software and data are illegally revised and destroyed;
1.3 validity: require that information and system resource can continuous and effective, and authorized user can whenever and wherever possible with the form accessing resource that he likes.
The computer information system of a safety is all supported these 3 targets, in other words, its information of the computer information system of safety protection and computational resource not by unauthorized access, distort and Denial of Service attack.
2, the threat of information security threaten be enemy for abusing, any ability of harm information or system, intention and attack method, it can be subdivided into two classes: passive-type, i.e. monitoring but do not destroy data; Active, namely deliberately destroy data.Threatening and be called threat consequence to the negative effect of the safe operation of infosystem, is below the definition of 4 kinds of common threat consequences:
2.1 divulge a secret: information or data are divulged to unwarranted people;
2.2 deceptions: the information of company is modified in an unauthorized manner;
2.3 destroy: the resource of company can not be used and maybe can not use for authorized user;
2.4 distort: the resource of company is abused by unwarranted people.
Threat behavior and threaten consequence to be cause-effect relationship, such as, the invader penetrating into security of system region may cause divulging a secret of private information, in this case, infiltrates the threat behavior just representing a kind of this threat consequence that may cause divulging a secret.Finally, main body is threatened to be used to attack infosystem, the source of the behavior of leak of operation or equipment, method or element, such as, the operator, natural disaster, human engineering etc. of outside hostile person, mandate.
3, the fragility fragility of system derives from the security breaches of system, due to the mankind's being familiar with and the limitation of application power the natural law, the electronic information of social application is provided at present, objectively also there is many incomplete places, also have the performance of various fragility, wherein how taking precautions against database DBA user is the problem comparing headache.
Summary of the invention
The object of the invention is to: can prevent legal or illegal database D BA user from directly revising in a database by using the method design of this major-minor table schema infosystem out and delete the data of closing key table, greatly improve the security performance of infosystem, reach the effect that timely visible data are also revised and do not deleted.
Claims (2)
1. information is realized in corresponding subtabulation a method for the safer preservation of information by cryptographic storage, it is characterized in that:
Create corresponding subtabulation and one by one corresponding for master meter recording of encrypted leaving in subtabulation is combined into a character string all fields of master meter information record by permanent order one by one, and then by DES method encrypting storing in the subtabulation only having a field.
2. in corresponding subtabulation, realized the method for the safer preservation of information according to claim 1 with information in key table of checking on by cryptographic storage, it is characterized in that: realize the safer preservation of data of information system by the Design Mode of major-minor table.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444313.1A CN104517058A (en) | 2013-09-26 | 2013-09-26 | Method for achieving safe information storage by encrypting and storing information into corresponding side tables |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444313.1A CN104517058A (en) | 2013-09-26 | 2013-09-26 | Method for achieving safe information storage by encrypting and storing information into corresponding side tables |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104517058A true CN104517058A (en) | 2015-04-15 |
Family
ID=52792344
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310444313.1A Pending CN104517058A (en) | 2013-09-26 | 2013-09-26 | Method for achieving safe information storage by encrypting and storing information into corresponding side tables |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104517058A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050223022A1 (en) * | 2004-04-02 | 2005-10-06 | Salesforce.Com, Inc. | Custom entities and fields in a multi-tenant database system |
CN102456115A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption |
-
2013
- 2013-09-26 CN CN201310444313.1A patent/CN104517058A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050223022A1 (en) * | 2004-04-02 | 2005-10-06 | Salesforce.Com, Inc. | Custom entities and fields in a multi-tenant database system |
CN102456115A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104809405A (en) | Structural data asset leakage prevention method based on hierarchical classification | |
CN107563221A (en) | A kind of certification decoding security management system for encrypting database | |
Toapanta et al. | An approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador | |
CN102456115A (en) | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption | |
Siledar et al. | A distortion-free watermarking approach for verifying integrity of relational databases | |
Yu | Encryption technology for computer network data security protection | |
Konaszczuk | Cybersecurity threats in the sectors of oil, natural gas and electric power in the context of technological evolution | |
CN102456110A (en) | Method used for achieving safe information preservation through combining, encrypting and storing field information in special field | |
CN104517073A (en) | Method for realizing safe information preservation by combining, encrypting and preserving key field information | |
CN104517058A (en) | Method for achieving safe information storage by encrypting and storing information into corresponding side tables | |
Satria Unggul et al. | Analysist of cyber espionage in international law and Indonesian law | |
Dinicu et al. | The Multidimensional Impact on Society of Cyber Attacks Targeting the Energy Critical Infrastructure Sector | |
IBRAHIM et al. | A novel data encryption algorithm to ensure database security | |
ALsaed et al. | Covid-19 age: Challenges in cybersecurity and possible solution domains | |
Wang et al. | Data provenance with retention of reference relations | |
CN112000953A (en) | Big data terminal safety protection system | |
Graboritz et al. | Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data | |
CN113452661A (en) | Server side key safety protection method, equipment and medium | |
Geng et al. | Securing Relational Database Storage with Attribute Association Aware Shuffling | |
Zhang et al. | Application strategy of data encryption technology in computer network security | |
Zou et al. | Computer network information security and Its Countermeasures | |
Kohlbrenner et al. | Poster: Hidden in plain sight: A filesystem for data integrity and confidentiality | |
CN102096641A (en) | Double-factor shadow password protection method for mobile storage medium data safety | |
Ray | Cloud Computing and Challenges Faced in Existing Legal Structure | |
Baba et al. | Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150415 |
|
WD01 | Invention patent application deemed withdrawn after publication |