CN104517073A - Method for realizing safe information preservation by combining, encrypting and preserving key field information - Google Patents
Method for realizing safe information preservation by combining, encrypting and preserving key field information Download PDFInfo
- Publication number
- CN104517073A CN104517073A CN201310444314.6A CN201310444314A CN104517073A CN 104517073 A CN104517073 A CN 104517073A CN 201310444314 A CN201310444314 A CN 201310444314A CN 104517073 A CN104517073 A CN 104517073A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- character string
- database
- field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Abstract
The invention relates to actual application in a software system of an information safety technology in bank industry. A main field in a key table is combined, encrypted into a character string by using DES (Data Encryption Standard) and then stored in a certain specific field; when recorded information changes, an encrypted character string is newly generated by an information system, so the consistency in data information is guaranteed; for example, when an information record is corrected on the background by a database DBA (Database Administrator) user, the corrected record is discovered after comparison of the information system since the encrypted field cannot be amended, and the data can be restored timely. The information system designed through the method can prevent that the legal or illegal database DBA user directly amends the key field data of the table in the database, so the safety performance of the information system is greatly improved, and the effect that the data cannot be amended even though the data is seen is achieved.
Description
Technical field
The present invention relates to practical application in the software systems of information security technology in bank's industry, primary fields in key table of checking on carries out merging and uses des encryption to become a character string to be stored in a certain specific fields, when recorded information changes, infosystem can regenerate encrypted characters string, ensure data message consistance like this, as database DBA user backstage amendment information record time, due to cannot encrypted fields be revised, the record of this amendment will be found after infosystem comparison and data can be recovered in time.The infosystem designed by this method can prevent the critical field data of legal or illegal database D BA user direct amendment table in a database, greatly improve the security performance of infosystem, reach the effect that timely visible data are not revised yet.
Background technology
Computer utility is along with the development of information networking; concept and the practice of information security deepen constantly, continuation; from the communication security that the military, government after World War II specially enjoy; develop into the data protection of the twentieth century seventies; to the information security of twentieth century nineties until current Information Assurance; the concept of safety has been not limited to the protection of information; people are it is desirable that to the protection of whole information security and defence; comprise the protection to information, detection, reaction and recovery capability etc., be beneficial to the social development of security information.
1, the content information of information security comprises safely the content of following several respects:
1.1 confidentiality: the illegal leakage of anti-locking system internal information;
1.2 integralities: in anti-locking system, software and data are illegally revised and destroyed;
1.3 validity: require that information and system resource can continuous and effective, and authorized user can whenever and wherever possible with the form accessing resource that he likes.
The computer information system of a safety is all supported these 3 targets, in other words, its information of the computer information system of safety protection and computational resource not by unauthorized access, distort and Denial of Service attack.
2, the threat of information security threaten be enemy for abusing, any ability of harm information or system, intention and attack method, it can be subdivided into two classes: passive-type, i.e. monitoring but do not destroy data; Active, namely deliberately destroy data.
Threatening and be called threat consequence to the negative effect of the safe operation of infosystem, is below the definition of 4 kinds of common threat consequences:
2.1 divulge a secret: information or data are divulged to unwarranted people;
2.2 deceptions: the information of company is modified in an unauthorized manner;
2.3 destroy: the resource of company can not be used and maybe can not use for authorized user;
2.4 distort: the resource of company is abused by unwarranted people.
Threat behavior and threaten consequence to be cause-effect relationship, such as, the invader penetrating into security of system region may cause divulging a secret of private information, in this case, infiltrates the threat behavior just representing a kind of this threat consequence that may cause divulging a secret.Finally, main body is threatened to be used to attack infosystem, the source of the behavior of leak of operation or equipment, method or element, such as, the operator, natural disaster, human engineering etc. of outside hostile person, mandate.
3, the fragility fragility of system derives from the security breaches of system, due to the mankind's being familiar with and the limitation of application power the natural law, the electronic information of social application is provided at present, objectively also there is many incomplete places, also have the performance of various fragility, wherein how taking precautions against database DBA user is the problem comparing headache.
Summary of the invention
The object of the invention is to: by the data using this method design to critical field cryptographic check pattern infosystem out can prevent legal or illegal database D BA user direct amendment table in a database, greatly improve the security performance of infosystem, reach the effect that timely visible data are not revised yet.
Claims (2)
1. primary fields in key table of checking on carries out merging and uses des encryption to become a character string to be stored into the method realizing the safer preservation of information in a certain specific fields, it is characterized in that:
Create check field---deposit the character string after des encryption
---primary fields information is combined into a character string by permanent order, and then by DES method encrypting storing in check field.
2. carrying out merging with primary fields in key table of checking on according to claim 1 uses des encryption to become a character string to be stored into the method realizing the safer preservation of information in a certain specific fields, it is characterized in that: realize the safer preservation of data of information system by the pattern of design verification field.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444314.6A CN104517073A (en) | 2013-09-26 | 2013-09-26 | Method for realizing safe information preservation by combining, encrypting and preserving key field information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444314.6A CN104517073A (en) | 2013-09-26 | 2013-09-26 | Method for realizing safe information preservation by combining, encrypting and preserving key field information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104517073A true CN104517073A (en) | 2015-04-15 |
Family
ID=52792356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310444314.6A Pending CN104517073A (en) | 2013-09-26 | 2013-09-26 | Method for realizing safe information preservation by combining, encrypting and preserving key field information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104517073A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733205A (en) * | 2021-01-20 | 2021-04-30 | 天地(常州)自动化股份有限公司 | Data tampering rapid identification method, device, equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050223022A1 (en) * | 2004-04-02 | 2005-10-06 | Salesforce.Com, Inc. | Custom entities and fields in a multi-tenant database system |
CN102456110A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method used for achieving safe information preservation through combining, encrypting and storing field information in special field |
CN102456115A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption |
-
2013
- 2013-09-26 CN CN201310444314.6A patent/CN104517073A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050223022A1 (en) * | 2004-04-02 | 2005-10-06 | Salesforce.Com, Inc. | Custom entities and fields in a multi-tenant database system |
CN102456110A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method used for achieving safe information preservation through combining, encrypting and storing field information in special field |
CN102456115A (en) * | 2010-10-26 | 2012-05-16 | 镇江精英软件科技有限公司 | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733205A (en) * | 2021-01-20 | 2021-04-30 | 天地(常州)自动化股份有限公司 | Data tampering rapid identification method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Basharat et al. | Database security and encryption: A survey study | |
CN107563221A (en) | A kind of certification decoding security management system for encrypting database | |
CN104376270A (en) | File protection method and system | |
CN102456115A (en) | Method for realizing safer information saving by storing information in key list into corresponding subsidiary table through encryption | |
Glennon | State-level cybersecurity | |
CN102456110A (en) | Method used for achieving safe information preservation through combining, encrypting and storing field information in special field | |
CN104517073A (en) | Method for realizing safe information preservation by combining, encrypting and preserving key field information | |
CN104517058A (en) | Method for achieving safe information storage by encrypting and storing information into corresponding side tables | |
Dinicu et al. | The Multidimensional Impact on Society of Cyber Attacks Targeting the Energy Critical Infrastructure Sector | |
ALsaed et al. | Covid-19 age: Challenges in cybersecurity and possible solution domains | |
Vidhya | Cyber security-Trends and Challenges | |
Graboritz et al. | Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data | |
CN113452661A (en) | Server side key safety protection method, equipment and medium | |
Woodman | Hackers paradise: Hackers across Latin America are taking advantage of the current crisis to access people’s personal data. If not protected it could spell disaster | |
Geng et al. | Securing Relational Database Storage with Attribute Association Aware Shuffling | |
Zhang et al. | Application strategy of data encryption technology in computer network security | |
Doshi et al. | Sensitive data exposure prevention using dynamic database security policy | |
Dias et al. | Illegal: The SolarWinds Hack under International Law | |
Gu et al. | Optimization Strategy of Computer Network Security Technology in Big Data Environment | |
Ke | Analysis of Financial Information Security in the Age of Big Data | |
Fang et al. | Modern Accounting Information System Security (AISS) Research Based on IT Technology | |
Liu | Network Security Protection in Computer Application | |
Ray | Cloud Computing and Challenges Faced in Existing Legal Structure | |
Ashwath | Importance of Data Protection | |
Baba et al. | Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150415 |
|
WD01 | Invention patent application deemed withdrawn after publication |