CN115618396A - Data encryption method and device - Google Patents

Data encryption method and device Download PDF

Info

Publication number
CN115618396A
CN115618396A CN202211495860.8A CN202211495860A CN115618396A CN 115618396 A CN115618396 A CN 115618396A CN 202211495860 A CN202211495860 A CN 202211495860A CN 115618396 A CN115618396 A CN 115618396A
Authority
CN
China
Prior art keywords
encryption key
encrypted
data
field
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211495860.8A
Other languages
Chinese (zh)
Other versions
CN115618396B (en
Inventor
曹东瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Accumulus Technologies Tianjin Co Ltd
Original Assignee
Accumulus Technologies Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accumulus Technologies Tianjin Co Ltd filed Critical Accumulus Technologies Tianjin Co Ltd
Priority to CN202211495860.8A priority Critical patent/CN115618396B/en
Publication of CN115618396A publication Critical patent/CN115618396A/en
Application granted granted Critical
Publication of CN115618396B publication Critical patent/CN115618396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data encryption method and a device, wherein the method comprises the following steps: calling an encryption key in an encryption key database through an RPC client according to a field name to be encrypted in data to be processed input by a user and an identification of an encryption key corresponding to the field to be encrypted; and encrypting the field to be encrypted according to the encryption key. Therefore, a flexible data encryption strategy can be realized, and the development and deployment processes of stream data encryption can be simplified. In addition, the data encryption and the stream data processing are decoupled by using a processing logic of the user defined function UDF encapsulation data encryption, the reusable stream data encryption processing can be realized, and the method is convenient, easy to use and efficient.

Description

Data encryption method and device
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to a data encryption method and device.
Background
Streaming data processing is a big data processing technology for real-time data streams, and generally requires writing data processing logic in a code or SQL manner by means of an associated real-time data stream computing framework. In the process of encrypting streaming data, two ways are generally used, the first way is to use a Flink streaming computation framework to process streaming data based on a Flink DataStream API, and access a remote data encryption interface during the processing to obtain an encryption key of a data field, encrypt the data, and then write the encrypted data into a downstream data source. The second is to write data into the downstream first and then perform data encryption operation.
The above two encryption methods have the following disadvantages: the first encryption mode has large coding workload and is easy to make mistakes for complex data structures, and the second encryption mode is easy to cause sensitive data leakage to cause safety accidents.
Disclosure of Invention
The embodiment of the invention provides a data encryption method and device, which are used for solving the technical problems that the encoding workload of the existing streaming data encryption processing method is large and error is easy to occur, or sensitive data is easy to leak to cause safety accidents.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a method for encrypting data, where the method includes:
according to the field name to be encrypted in the data to be processed input by a user and the identification of an encryption key corresponding to the field to be encrypted, calling an RPC client through a remote procedure, and calling the encryption key in an encryption key database;
and encrypting the field to be encrypted according to the encryption key.
Preferably, before the encryption key is called in an encryption key database through an RPC client according to a field name to be encrypted in the data to be processed input by the user and an identifier of an encryption key corresponding to the field to be encrypted, the method further includes:
carrying out initialization processing;
wherein, carrying out initialization processing comprises:
acquiring address information of the encryption key database and a name space of the data to be processed, and creating the RPC client;
through the RPC client, calling the encryption key in the encryption key database comprises the following steps:
connecting the address of the encryption key database through an RPC client, and inquiring the encryption key corresponding to the field to be encrypted and the name space in the encryption key database;
and calling the encryption key in a lazy loading mode.
Preferably, encrypting the field to be encrypted according to the encryption key includes:
caching the encryption key locally;
and encrypting the field to be encrypted locally by using the encryption key.
Preferably, the method further comprises:
and reloading the name of the field to be encrypted in the input data to be processed and the identifier of the encryption key corresponding to the field to be encrypted.
Preferably, the method further comprises:
and converting the field name to be encrypted and the identification subjected to the overloading processing into character string types.
Preferably, the data to be processed is streaming data.
In a second aspect, the present invention provides an apparatus for encrypting data, the apparatus comprising:
the calling module is used for calling the RPC client through a remote procedure according to the field name to be encrypted in the data to be processed input by the user and the identification of the encryption key corresponding to the field to be encrypted, and calling the encryption key in the encryption key database;
and the encryption module is used for encrypting the field to be encrypted according to the encryption key.
Preferably, the apparatus further comprises:
the initialization module is used for performing initialization processing before calling the encryption key in the encryption key database through the RPC client according to the field name to be encrypted in the data to be processed input by the user and the identification of the encryption key corresponding to the field to be encrypted;
the initialization module is further used for acquiring address information of the encryption key database and a name space of the data to be processed and creating the RPC client;
the calling module is also used for connecting the address of the encryption key database through an RPC client and inquiring the encryption key corresponding to the field to be encrypted and the name space in the encryption key database;
and calling the encryption key in a lazy loading mode.
Preferably, the encryption module is further configured to cache the encryption key locally;
and encrypting the field to be encrypted locally by using the encryption key.
Preferably, the apparatus further comprises:
and the reloading processing module is used for reloading the field names to be encrypted in the input data to be processed and the identifiers of the encryption keys corresponding to the fields to be encrypted.
Preferably, the apparatus further comprises:
and the character string conversion module is used for converting the field name to be encrypted and the identifier which are subjected to the overloading processing into character string types.
Preferably, the data to be processed is streaming data.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a processor, a memory and a program stored on the memory and executable on the processor, the program, when executed by the processor, implementing the steps of the method of encrypting data according to the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the data encryption method according to the first aspect.
In the embodiment of the invention, the encryption key is called through the unified data encryption API of the RPC client, and different encryption keys are selected according to different field names to be encrypted, so that a flexible data encryption strategy can be realized, and the development and deployment processes of stream data encryption can be simplified. In addition, the data encryption and the stream data processing are decoupled by using the processing logic of the user-defined function UDF encapsulation data encryption, the reusable stream data encryption processing can be realized, and the method is convenient, easy to use and efficient.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a method for encrypting data according to an embodiment of the present invention;
fig. 2 is a system architecture diagram to which a data encryption method according to an embodiment of the present invention is applied;
fig. 3 is a block diagram of an apparatus for encrypting data according to an embodiment of the present invention;
fig. 4 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
In the prior art, a processing method for encrypting streaming data lacks generality, is low in development efficiency and high in use cost, and needs to recompile a whole streaming processing task when version upgrading is performed, and an online deployment process is heavy, an embodiment of the present invention provides a data encryption method, as shown in fig. 1, the method includes:
step S101, according to a field name to be encrypted in data to be processed input by a user and an encryption key identification corresponding to the field to be encrypted, calling an encryption key in an encryption key database through an RPC (Remote Procedure Call) client;
the identification of the encryption key includes, but is not limited to, the name of the encryption key.
And S102, encrypting the field to be encrypted according to the encryption key.
The method is applied to a real-time data processing task, wherein the real-time data processing task is usually a DataStream task or an SQL task written based on a Flink real-time computing framework. The real-time data processing task comprises a User-Defined Function (UDF) module for data encryption, after the real-time data processing task receives data to be encrypted in an upstream data stream, the UDF module obtains an encryption key of a corresponding field from a key service after a User transmits two parameters, namely a field name to be encrypted in the data to be processed and an identification of the encryption key corresponding to the field to be encrypted, and then executes encryption processing on the field to be encrypted in each piece of data to obtain encrypted data, and then the data processing task writes the encrypted data into the downstream data stream. The upstream data flow and the downstream data flow are data sources for real-time data processing, and are streaming data such as Kafka queues and the like. Understandably, the processing logic for encrypting the UDF packaging data is used for decoupling the data encryption and the streaming data processing, so that the reusable streaming data encryption processing can be realized, and the method is convenient, easy to use and efficient.
Fig. 2 is a system architecture diagram to which a data encryption method according to an embodiment of the present invention is applied, and as shown in fig. 2, the entire system architecture for performing data encryption processing based on UDF includes 4 components: upstream data flow, downstream data flow, key service, and real-time data processing tasks. The encryption method of data and UDF according to the present invention will be briefly described with reference to fig. 2.
The UDF for data encryption is defined as follows:
DataEncrypt(key, data) -> result;
wherein key is the encryption key name of the corresponding field (field name to be encrypted), data is the field name to be encrypted, dataEncrypt represents data encryption, and result is the output result. And remotely accessing the key service through the RPC client, and caching the encryption key to the task local after calling the encryption key in the encryption key database for subsequent data encryption.
In one possible implementation, the method further includes: reloading the name of the field to be encrypted in the input data to be processed and the identifier of the encryption key corresponding to the field to be encrypted; converting the field name and the identification to be encrypted after the overloading processing into character string types; wherein, the inside of the UDF is encapsulated with a character string conversion function.
It should be noted that, according to the UDF definition, the DataEncrypt UDF function needs to introduce two parameters (the name of the encryption key and the name of the field to be encrypted, which can be input by the user, and the input method is not limited to key input, voice input, etc.), where the two parameters are both of a string type, and the return value result is also of a string type. In order to facilitate the use of the UDF, the data types in the input parameters can be reloaded to support common basic data types such as integer type, floating point type, enumeration type and the like, and the types are uniformly converted into character string types in the UDF, so that when the UDF function is called, additional character string conversion processing is not needed, and the preprocessing flow is simplified.
In a possible implementation manner, taking a Flink SQL task as an example, using SQL to perform an encryption operation on a col1 field and then output the result, where a key name corresponding to the col1 field is key1, then writing SQL as follows:
SELECT DataEncrypt(key1, col1) AS encrypt_col1 FROM source。
in a possible implementation manner, before the method calls the encryption key in the encryption key database through the RPC client according to the name of the field to be encrypted in the data to be processed input by the user and the identifier of the encryption key corresponding to the field to be encrypted, the method further includes:
carrying out initialization processing; wherein, carrying out initialization processing comprises: acquiring address information of an encryption key database and a name space of data to be processed, and creating an RPC client; wherein, through the RPC client, calling the encryption key in the encryption key database comprises: connecting the address of the encryption key database through an RPC client, and inquiring an encryption key corresponding to a field to be encrypted and a name space in the encryption key database; and calling the encryption key in a lazy loading mode.
It should be noted that, in the initialization stage of the UDF, connection address information of the key service and a namespace corresponding to the real-time data source need to be provided, and an RPC client for accessing the key service is created. When the data encryption processing logic is executed for the first time, the UDF calls an RPC interface for acquiring a key through an RPC client, inquires an encryption key character string corresponding to a current namespace and a current field and caches the encryption key character string to the UDF, and the UDF function can encrypt data of a corresponding field in streaming data. And the encryption key is locally utilized to encrypt the field to be encrypted in the UDF, so that the encryption process is more stable, and the interference of external factors is eliminated. Where a namespace can be understood as a set of names that are uniquely identified to avoid ambiguous problems when objects come from different places but have the same name. The lazy loading mode can reduce the consumption of resources while achieving the original purpose, but the invention is not limited to calling the encryption key by adopting the lazy loading mode.
Therefore, the encryption key is called through the unified data encryption API of the RPC client, different encryption keys are selected according to different field names to be encrypted, a flexible data encryption strategy can be realized, and the development and deployment processes of stream data encryption can be simplified. In addition, the data encryption and the stream data processing are decoupled by using the processing logic of the user-defined function UDF encapsulation data encryption, the reusable stream data encryption processing can be realized, and the method is convenient, easy to use and efficient.
Fig. 3 is a block diagram illustrating an apparatus for encrypting data according to an embodiment of the present invention, where, as shown in fig. 3, the apparatus 30 includes:
the calling module 301 is configured to call an RPC client through a remote procedure according to a field name to be encrypted in data to be processed input by a user and an identifier of an encryption key corresponding to the field to be encrypted, and call the encryption key in an encryption key database;
and an encryption module 302, configured to encrypt the field to be encrypted according to the encryption key.
In one possible implementation, the apparatus 30 further includes:
the initialization module is used for performing initialization processing before calling the encryption key in the encryption key database through the RPC client according to the field name to be encrypted in the data to be processed input by the user and the identification of the encryption key corresponding to the field to be encrypted;
the initialization module is also used for acquiring address information of the encryption key database and a name space of data to be processed and creating an RPC client;
the calling module 301 is further configured to connect an address of the encryption key database through an RPC client, and query an encryption key corresponding to a field to be encrypted and a name space in the encryption key database; and calling the encryption key in a lazy loading mode.
In a possible implementation manner, the encryption module 302 is further configured to cache the encryption key locally;
the field to be encrypted is encrypted locally with an encryption key.
In one possible implementation, the apparatus 30 further includes:
and the reloading processing module is used for reloading the field names to be encrypted in the input data to be processed and the identifiers of the encryption keys corresponding to the fields to be encrypted.
In one possible implementation, the apparatus 30 further includes:
and the character string conversion module is used for converting the field name and the identification to be encrypted after the overloading processing into the character string type.
In one possible implementation, the data to be processed is streaming data.
Therefore, the encryption key is called through the unified data encryption API of the RPC client, different encryption keys are selected according to different field names to be encrypted, a flexible data encryption strategy can be realized, and the development and deployment processes of stream data encryption can be simplified. In addition, the data encryption and the stream data processing are decoupled by using the processing logic of the user-defined function UDF encapsulation data encryption, the reusable stream data encryption processing can be realized, and the method is convenient, easy to use and efficient.
An embodiment of the present invention further provides an electronic device 40, as shown in fig. 4, including: a processor 401, a memory 402 and a program stored on the memory 402 and executable on the processor 401, which program, when executed by the processor 401, performs the steps of the method of encrypting data as shown in the above embodiments.
Embodiments of the present invention further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the data encryption method shown in the foregoing embodiments are implemented, and the same technical effects can be achieved, and are not described herein again to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one of 8230, and" comprising 8230does not exclude the presence of additional like elements in a process, method, article, or apparatus comprising the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A method for encrypting data, the method comprising:
according to the field name to be encrypted in the data to be processed input by a user and the identification of an encryption key corresponding to the field to be encrypted, calling an RPC client through a remote procedure, and calling the encryption key in an encryption key database;
and encrypting the field to be encrypted according to the encryption key.
2. The method of claim 1, wherein before the encryption key is called in an encryption key database by an RPC client according to a field name to be encrypted in the data to be processed input by the user and an identification of an encryption key corresponding to the field to be encrypted, the method further comprises:
carrying out initialization processing;
wherein, carrying out initialization processing comprises:
acquiring address information of the encryption key database and a name space of the data to be processed, and creating the RPC client;
through the RPC client, calling the encryption key in the encryption key database comprises the following steps:
connecting the address of the encryption key database through an RPC client, and inquiring the encryption key corresponding to the field to be encrypted and the name space in the encryption key database;
and calling the encryption key in a lazy loading mode.
3. The method of claim 1, wherein encrypting the field to be encrypted according to the encryption key comprises:
caching the encryption key locally;
and encrypting the field to be encrypted locally by using the encryption key.
4. The method of claim 1, further comprising:
and carrying out reloading processing on the field name to be encrypted in the input data to be processed and the identification of the encryption key corresponding to the field to be encrypted.
5. The method of claim 4, further comprising:
and converting the field name to be encrypted and the identification subjected to the overloading processing into character string types.
6. The method according to any of claims 1-5, wherein the data to be processed is streaming data.
7. An apparatus for encrypting data, the apparatus comprising:
the calling module is used for calling the RPC client through a remote procedure according to the field name to be encrypted in the data to be processed input by the user and the identification of the encryption key corresponding to the field to be encrypted, and calling the encryption key in the encryption key database;
and the encryption module is used for encrypting the field to be encrypted according to the encryption key.
8. The apparatus of claim 7, further comprising:
the initialization module is used for performing initialization processing before the encryption key is called in an encryption key database through an RPC client according to the field name to be encrypted in the data to be processed input by a user and the identification of the encryption key corresponding to the field to be encrypted;
the initialization module is further used for acquiring address information of the encryption key database and a name space of the data to be processed, and creating the RPC client;
the calling module is further used for connecting the address of the encryption key database through an RPC client, and inquiring the encryption key corresponding to the field to be encrypted and the name space in the encryption key database;
and calling the encryption key in a lazy loading mode.
9. An electronic device, comprising: processor, memory and program stored on said memory and executable on said processor, said program, when executed by said processor, implementing the steps of the encryption method of data according to any one of claims 1 to 6.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the encryption method of data according to any one of claims 1 to 6.
CN202211495860.8A 2022-11-28 2022-11-28 Data encryption method and device Active CN115618396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211495860.8A CN115618396B (en) 2022-11-28 2022-11-28 Data encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211495860.8A CN115618396B (en) 2022-11-28 2022-11-28 Data encryption method and device

Publications (2)

Publication Number Publication Date
CN115618396A true CN115618396A (en) 2023-01-17
CN115618396B CN115618396B (en) 2023-04-07

Family

ID=84879195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211495860.8A Active CN115618396B (en) 2022-11-28 2022-11-28 Data encryption method and device

Country Status (1)

Country Link
CN (1) CN115618396B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050054656A1 (en) * 2001-06-21 2005-03-10 Pfizer Inc 5-HT receptor ligands and uses thereof
CN106325775A (en) * 2016-08-24 2017-01-11 北京中科开迪软件有限公司 Optical storage hardware equipment and method for data redundancy/encryption
CN107493286A (en) * 2017-08-23 2017-12-19 杭州安恒信息技术有限公司 A kind of RPC remote procedure calling (PRC) methods based on secure authentication
CN110162556A (en) * 2018-02-11 2019-08-23 陕西爱尚物联科技有限公司 A kind of effective method for playing data value
CN111858616A (en) * 2020-08-06 2020-10-30 中国银行股份有限公司 Streaming data storage method and device
CN112183765A (en) * 2020-10-30 2021-01-05 浙江大学 Multi-source multi-modal data preprocessing method and system for shared learning
CN113158233A (en) * 2021-03-29 2021-07-23 重庆首亨软件股份有限公司 Data preprocessing method and device and computer storage medium
CN113435989A (en) * 2021-06-25 2021-09-24 中国工商银行股份有限公司 Financial data processing method and device
CN114462059A (en) * 2021-12-30 2022-05-10 济南超级计算技术研究院 Table field level encryption and security access control method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050054656A1 (en) * 2001-06-21 2005-03-10 Pfizer Inc 5-HT receptor ligands and uses thereof
CN106325775A (en) * 2016-08-24 2017-01-11 北京中科开迪软件有限公司 Optical storage hardware equipment and method for data redundancy/encryption
CN107493286A (en) * 2017-08-23 2017-12-19 杭州安恒信息技术有限公司 A kind of RPC remote procedure calling (PRC) methods based on secure authentication
CN110162556A (en) * 2018-02-11 2019-08-23 陕西爱尚物联科技有限公司 A kind of effective method for playing data value
CN111858616A (en) * 2020-08-06 2020-10-30 中国银行股份有限公司 Streaming data storage method and device
CN112183765A (en) * 2020-10-30 2021-01-05 浙江大学 Multi-source multi-modal data preprocessing method and system for shared learning
CN113158233A (en) * 2021-03-29 2021-07-23 重庆首亨软件股份有限公司 Data preprocessing method and device and computer storage medium
CN113435989A (en) * 2021-06-25 2021-09-24 中国工商银行股份有限公司 Financial data processing method and device
CN114462059A (en) * 2021-12-30 2022-05-10 济南超级计算技术研究院 Table field level encryption and security access control method and system

Also Published As

Publication number Publication date
CN115618396B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
WO2016192556A1 (en) Interface invoking method, device and terminal
CN110704037B (en) Rule engine implementation method and device
US8386608B1 (en) Service scripting framework
CN110716720A (en) Method and device for realizing application hot deployment
WO2020199594A1 (en) Service component loading method and apparatus, and computer device and storage medium
CN110109983B (en) Method and device for operating Redis database
CN110674205B (en) Single table query method, device, terminal and readable storage medium
CN110764769B (en) Method and device for processing user request
CN115618396B (en) Data encryption method and device
CN116775613A (en) Data migration method, device, electronic equipment and computer readable medium
CN109597611B (en) Front-end data flow control component development system, method, device and storage medium
CN116226921A (en) Desensitization processing method and device
CN110489392A (en) Data access method, device, system, storage medium and equipment between multi-tenant
CN110633162A (en) Remote call implementation method and device, computer equipment and storage medium
CN113656433B (en) Entity object expansion method, entity object expansion device, electronic equipment and storage medium
CN114327404A (en) File processing method and device, electronic equipment and computer readable medium
CN112711602B (en) Method and device for running stored procedure, database system and storage medium
CN115480792A (en) System updating method and related equipment
CN117519691B (en) Application processing method, device, computer equipment and storage medium
CN113805878B (en) Plug-in engineering method, device, computer system and medium
CN113553040B (en) Registration realization method, device, equipment and medium for visible and spoken identification function
CN117194073A (en) Data processing method, device, electronic equipment and computer readable medium
CN113886428A (en) Business method based dynamic SQL generation method and device
CN116820565A (en) Source code processing method, device, electronic equipment and medium
US9411744B1 (en) Content-based caching in a managed runtime computing environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant