CN104517058A - Method for achieving safe information storage by encrypting and storing information into corresponding side tables - Google Patents

Method for achieving safe information storage by encrypting and storing information into corresponding side tables Download PDF

Info

Publication number
CN104517058A
CN104517058A CN201310444313.1A CN201310444313A CN104517058A CN 104517058 A CN104517058 A CN 104517058A CN 201310444313 A CN201310444313 A CN 201310444313A CN 104517058 A CN104517058 A CN 104517058A
Authority
CN
China
Prior art keywords
information
data
corresponding side
encrypting
side tables
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310444313.1A
Other languages
Chinese (zh)
Inventor
翟朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd filed Critical JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310444313.1A priority Critical patent/CN104517058A/en
Publication of CN104517058A publication Critical patent/CN104517058A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention relates to practical application of the information security technology to software systems of banking industry, particularly to a method for achieving safe information storage by encrypting and storing information into corresponding side tables. The method comprises the corresponding side tables with one field each for the key table of an information system; encrypting every record information of the key table into a character string through DES (data encryption standard) and storing the data string into the corresponding side table. Therefore, when the record information changes, the information system can correct the encrypted record information of the corresponding side table to ensure the consistency of data information of the main table and the side tables; when a database (DBA) user corrects and deletes information background, due to the fact that the user cannot find corresponding records in the side tables for corresponding correction and deleting, the information system can find out the corrected or deleted records through comparison and timely restore data. The information system designed through the method for achieving safe information storage by encrypting and storing the information into the corresponding side tables can prevent legal or illegal DBA users from directly correcting and deleting the data of the key table in a database, thereby greatly improving the safety performance and achieving the effect that data cannot be corrected and deleted even being visible.

Description

A kind of information encryption be stored in corresponding subtabulation realize information security preserve method
Technical field
The present invention relates to practical application in the software systems of information security technology in bank's industry, close key table to infosystem and set up the corresponding subtabulation only having a field, the each recorded information of key table of checking on becomes a character string to be stored in corresponding subtabulation by des encryption, when recorded information changes, infosystem can revise scrambled record information in corresponding subtabulation, ensure major-minor table data message consistance like this, if database DBA user is in backstage amendment with when deleting information record, corresponding amendment and deletion is made due to corresponding record cannot be found in subtabulation, will find after infosystem comparison to be modified or deleted record, data can be recovered in time.The infosystem designed by this method can prevent legal or illegal database D BA user from directly revising in a database and delete the data of closing key table, greatly improve the security performance of infosystem, reach timely visible data, the effect also revised and do not delete.
Background technology
Computer utility is along with the development of information networking; concept and the practice of information security deepen constantly, continuation; from the communication security that the military, government after World War II specially enjoy; develop into the data protection of the twentieth century seventies; to the information security of twentieth century nineties until current Information Assurance; the concept of safety has been not limited to the protection of information; people are it is desirable that to the protection of whole information security and defence; comprise the protection to information, detection, reaction and recovery capability etc., be beneficial to the social development of security information.
1, the content information of information security comprises safely the content of following several respects:
1.1 confidentiality: the illegal leakage of anti-locking system internal information;
1.2 integralities: in anti-locking system, software and data are illegally revised and destroyed;
1.3 validity: require that information and system resource can continuous and effective, and authorized user can whenever and wherever possible with the form accessing resource that he likes.
The computer information system of a safety is all supported these 3 targets, in other words, its information of the computer information system of safety protection and computational resource not by unauthorized access, distort and Denial of Service attack.
2, the threat of information security threaten be enemy for abusing, any ability of harm information or system, intention and attack method, it can be subdivided into two classes: passive-type, i.e. monitoring but do not destroy data; Active, namely deliberately destroy data.Threatening and be called threat consequence to the negative effect of the safe operation of infosystem, is below the definition of 4 kinds of common threat consequences:
2.1 divulge a secret: information or data are divulged to unwarranted people;
2.2 deceptions: the information of company is modified in an unauthorized manner;
2.3 destroy: the resource of company can not be used and maybe can not use for authorized user;
2.4 distort: the resource of company is abused by unwarranted people.
Threat behavior and threaten consequence to be cause-effect relationship, such as, the invader penetrating into security of system region may cause divulging a secret of private information, in this case, infiltrates the threat behavior just representing a kind of this threat consequence that may cause divulging a secret.Finally, main body is threatened to be used to attack infosystem, the source of the behavior of leak of operation or equipment, method or element, such as, the operator, natural disaster, human engineering etc. of outside hostile person, mandate.
3, the fragility fragility of system derives from the security breaches of system, due to the mankind's being familiar with and the limitation of application power the natural law, the electronic information of social application is provided at present, objectively also there is many incomplete places, also have the performance of various fragility, wherein how taking precautions against database DBA user is the problem comparing headache.
Summary of the invention
The object of the invention is to: can prevent legal or illegal database D BA user from directly revising in a database by using the method design of this major-minor table schema infosystem out and delete the data of closing key table, greatly improve the security performance of infosystem, reach the effect that timely visible data are also revised and do not deleted.

Claims (2)

1. information is realized in corresponding subtabulation a method for the safer preservation of information by cryptographic storage, it is characterized in that:
Create corresponding subtabulation and one by one corresponding for master meter recording of encrypted leaving in subtabulation is combined into a character string all fields of master meter information record by permanent order one by one, and then by DES method encrypting storing in the subtabulation only having a field.
2. in corresponding subtabulation, realized the method for the safer preservation of information according to claim 1 with information in key table of checking on by cryptographic storage, it is characterized in that: realize the safer preservation of data of information system by the Design Mode of major-minor table.
CN201310444313.1A 2013-09-26 2013-09-26 Method for achieving safe information storage by encrypting and storing information into corresponding side tables Pending CN104517058A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310444313.1A CN104517058A (en) 2013-09-26 2013-09-26 Method for achieving safe information storage by encrypting and storing information into corresponding side tables

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310444313.1A CN104517058A (en) 2013-09-26 2013-09-26 Method for achieving safe information storage by encrypting and storing information into corresponding side tables

Publications (1)

Publication Number Publication Date
CN104517058A true CN104517058A (en) 2015-04-15

Family

ID=52792344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310444313.1A Pending CN104517058A (en) 2013-09-26 2013-09-26 Method for achieving safe information storage by encrypting and storing information into corresponding side tables

Country Status (1)

Country Link
CN (1) CN104517058A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050223022A1 (en) * 2004-04-02 2005-10-06 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
CN102456115A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050223022A1 (en) * 2004-04-02 2005-10-06 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
CN102456115A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption

Similar Documents

Publication Publication Date Title
CN104809405A (en) Structural data asset leakage prevention method based on hierarchical classification
CN107563221A (en) A kind of certification decoding security management system for encrypting database
Toapanta et al. An approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador
CN102456115A (en) Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption
Siledar et al. A distortion-free watermarking approach for verifying integrity of relational databases
Yu Encryption technology for computer network data security protection
Konaszczuk Cybersecurity threats in the sectors of oil, natural gas and electric power in the context of technological evolution
CN102456110A (en) Method used for achieving safe information preservation through combining, encrypting and storing field information in special field
CN104517073A (en) Method for realizing safe information preservation by combining, encrypting and preserving key field information
CN104517058A (en) Method for achieving safe information storage by encrypting and storing information into corresponding side tables
Satria Unggul et al. Analysist of cyber espionage in international law and Indonesian law
Dinicu et al. The Multidimensional Impact on Society of Cyber Attacks Targeting the Energy Critical Infrastructure Sector
IBRAHIM et al. A novel data encryption algorithm to ensure database security
ALsaed et al. Covid-19 age: Challenges in cybersecurity and possible solution domains
Wang et al. Data provenance with retention of reference relations
CN112000953A (en) Big data terminal safety protection system
Graboritz et al. Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data
CN113452661A (en) Server side key safety protection method, equipment and medium
Geng et al. Securing Relational Database Storage with Attribute Association Aware Shuffling
Zhang et al. Application strategy of data encryption technology in computer network security
Zou et al. Computer network information security and Its Countermeasures
Kohlbrenner et al. Poster: Hidden in plain sight: A filesystem for data integrity and confidentiality
CN102096641A (en) Double-factor shadow password protection method for mobile storage medium data safety
Ray Cloud Computing and Challenges Faced in Existing Legal Structure
Baba et al. Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150415

WD01 Invention patent application deemed withdrawn after publication