CN104517073A - Method for realizing safe information preservation by combining, encrypting and preserving key field information - Google Patents

Method for realizing safe information preservation by combining, encrypting and preserving key field information Download PDF

Info

Publication number
CN104517073A
CN104517073A CN201310444314.6A CN201310444314A CN104517073A CN 104517073 A CN104517073 A CN 104517073A CN 201310444314 A CN201310444314 A CN 201310444314A CN 104517073 A CN104517073 A CN 104517073A
Authority
CN
China
Prior art keywords
information
data
character string
database
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310444314.6A
Other languages
Chinese (zh)
Inventor
翟朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd filed Critical JIANGSU ZHIRUAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310444314.6A priority Critical patent/CN104517073A/en
Publication of CN104517073A publication Critical patent/CN104517073A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention relates to actual application in a software system of an information safety technology in bank industry. A main field in a key table is combined, encrypted into a character string by using DES (Data Encryption Standard) and then stored in a certain specific field; when recorded information changes, an encrypted character string is newly generated by an information system, so the consistency in data information is guaranteed; for example, when an information record is corrected on the background by a database DBA (Database Administrator) user, the corrected record is discovered after comparison of the information system since the encrypted field cannot be amended, and the data can be restored timely. The information system designed through the method can prevent that the legal or illegal database DBA user directly amends the key field data of the table in the database, so the safety performance of the information system is greatly improved, and the effect that the data cannot be amended even though the data is seen is achieved.

Description

Critical field information is merged the method that encrypting storing realizes information security preservation
Technical field
The present invention relates to practical application in the software systems of information security technology in bank's industry, primary fields in key table of checking on carries out merging and uses des encryption to become a character string to be stored in a certain specific fields, when recorded information changes, infosystem can regenerate encrypted characters string, ensure data message consistance like this, as database DBA user backstage amendment information record time, due to cannot encrypted fields be revised, the record of this amendment will be found after infosystem comparison and data can be recovered in time.The infosystem designed by this method can prevent the critical field data of legal or illegal database D BA user direct amendment table in a database, greatly improve the security performance of infosystem, reach the effect that timely visible data are not revised yet.
Background technology
Computer utility is along with the development of information networking; concept and the practice of information security deepen constantly, continuation; from the communication security that the military, government after World War II specially enjoy; develop into the data protection of the twentieth century seventies; to the information security of twentieth century nineties until current Information Assurance; the concept of safety has been not limited to the protection of information; people are it is desirable that to the protection of whole information security and defence; comprise the protection to information, detection, reaction and recovery capability etc., be beneficial to the social development of security information.
1, the content information of information security comprises safely the content of following several respects:
1.1 confidentiality: the illegal leakage of anti-locking system internal information;
1.2 integralities: in anti-locking system, software and data are illegally revised and destroyed;
1.3 validity: require that information and system resource can continuous and effective, and authorized user can whenever and wherever possible with the form accessing resource that he likes.
The computer information system of a safety is all supported these 3 targets, in other words, its information of the computer information system of safety protection and computational resource not by unauthorized access, distort and Denial of Service attack.
2, the threat of information security threaten be enemy for abusing, any ability of harm information or system, intention and attack method, it can be subdivided into two classes: passive-type, i.e. monitoring but do not destroy data; Active, namely deliberately destroy data.
Threatening and be called threat consequence to the negative effect of the safe operation of infosystem, is below the definition of 4 kinds of common threat consequences:
2.1 divulge a secret: information or data are divulged to unwarranted people;
2.2 deceptions: the information of company is modified in an unauthorized manner;
2.3 destroy: the resource of company can not be used and maybe can not use for authorized user;
2.4 distort: the resource of company is abused by unwarranted people.
Threat behavior and threaten consequence to be cause-effect relationship, such as, the invader penetrating into security of system region may cause divulging a secret of private information, in this case, infiltrates the threat behavior just representing a kind of this threat consequence that may cause divulging a secret.Finally, main body is threatened to be used to attack infosystem, the source of the behavior of leak of operation or equipment, method or element, such as, the operator, natural disaster, human engineering etc. of outside hostile person, mandate.
3, the fragility fragility of system derives from the security breaches of system, due to the mankind's being familiar with and the limitation of application power the natural law, the electronic information of social application is provided at present, objectively also there is many incomplete places, also have the performance of various fragility, wherein how taking precautions against database DBA user is the problem comparing headache.
Summary of the invention
The object of the invention is to: by the data using this method design to critical field cryptographic check pattern infosystem out can prevent legal or illegal database D BA user direct amendment table in a database, greatly improve the security performance of infosystem, reach the effect that timely visible data are not revised yet.

Claims (2)

1. primary fields in key table of checking on carries out merging and uses des encryption to become a character string to be stored into the method realizing the safer preservation of information in a certain specific fields, it is characterized in that:
Create check field---deposit the character string after des encryption
---primary fields information is combined into a character string by permanent order, and then by DES method encrypting storing in check field.
2. carrying out merging with primary fields in key table of checking on according to claim 1 uses des encryption to become a character string to be stored into the method realizing the safer preservation of information in a certain specific fields, it is characterized in that: realize the safer preservation of data of information system by the pattern of design verification field.
CN201310444314.6A 2013-09-26 2013-09-26 Method for realizing safe information preservation by combining, encrypting and preserving key field information Pending CN104517073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310444314.6A CN104517073A (en) 2013-09-26 2013-09-26 Method for realizing safe information preservation by combining, encrypting and preserving key field information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310444314.6A CN104517073A (en) 2013-09-26 2013-09-26 Method for realizing safe information preservation by combining, encrypting and preserving key field information

Publications (1)

Publication Number Publication Date
CN104517073A true CN104517073A (en) 2015-04-15

Family

ID=52792356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310444314.6A Pending CN104517073A (en) 2013-09-26 2013-09-26 Method for realizing safe information preservation by combining, encrypting and preserving key field information

Country Status (1)

Country Link
CN (1) CN104517073A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733205A (en) * 2021-01-20 2021-04-30 天地(常州)自动化股份有限公司 Data tampering rapid identification method, device, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050223022A1 (en) * 2004-04-02 2005-10-06 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
CN102456110A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method used for achieving safe information preservation through combining, encrypting and storing field information in special field
CN102456115A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050223022A1 (en) * 2004-04-02 2005-10-06 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
CN102456110A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method used for achieving safe information preservation through combining, encrypting and storing field information in special field
CN102456115A (en) * 2010-10-26 2012-05-16 镇江精英软件科技有限公司 Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733205A (en) * 2021-01-20 2021-04-30 天地(常州)自动化股份有限公司 Data tampering rapid identification method, device, equipment and medium

Similar Documents

Publication Publication Date Title
Basharat et al. Database security and encryption: A survey study
CN107563221A (en) A kind of certification decoding security management system for encrypting database
CN104376270A (en) File protection method and system
CN102456115A (en) Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption
Glennon State-level cybersecurity
CN102456110A (en) Method used for achieving safe information preservation through combining, encrypting and storing field information in special field
CN104517073A (en) Method for realizing safe information preservation by combining, encrypting and preserving key field information
CN104517058A (en) Method for achieving safe information storage by encrypting and storing information into corresponding side tables
Dinicu et al. The Multidimensional Impact on Society of Cyber Attacks Targeting the Energy Critical Infrastructure Sector
ALsaed et al. Covid-19 age: Challenges in cybersecurity and possible solution domains
Vidhya Cyber security-Trends and Challenges
Graboritz et al. Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data
CN113452661A (en) Server side key safety protection method, equipment and medium
Woodman Hackers paradise: Hackers across Latin America are taking advantage of the current crisis to access people’s personal data. If not protected it could spell disaster
Geng et al. Securing Relational Database Storage with Attribute Association Aware Shuffling
Zhang et al. Application strategy of data encryption technology in computer network security
Doshi et al. Sensitive data exposure prevention using dynamic database security policy
Dias et al. Illegal: The SolarWinds Hack under International Law
Gu et al. Optimization Strategy of Computer Network Security Technology in Big Data Environment
Ke Analysis of Financial Information Security in the Age of Big Data
Fang et al. Modern Accounting Information System Security (AISS) Research Based on IT Technology
Liu Network Security Protection in Computer Application
Ray Cloud Computing and Challenges Faced in Existing Legal Structure
Ashwath Importance of Data Protection
Baba et al. Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150415

WD01 Invention patent application deemed withdrawn after publication