SG11201808892WA - Method and apparatus for processing failure of cipher change of ciphertext in database - Google Patents
Method and apparatus for processing failure of cipher change of ciphertext in databaseInfo
- Publication number
- SG11201808892WA SG11201808892WA SG11201808892WA SG11201808892WA SG11201808892WA SG 11201808892W A SG11201808892W A SG 11201808892WA SG 11201808892W A SG11201808892W A SG 11201808892WA SG 11201808892W A SG11201808892W A SG 11201808892WA SG 11201808892W A SG11201808892W A SG 11201808892WA
- Authority
- SG
- Singapore
- Prior art keywords
- record
- cipher
- database
- cipher change
- failure
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4093—Monitoring of device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0778—Dumping, i.e. gathering error/state information after a fault for later diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1443—Transmit or communication errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/805—Real-time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/82—Solving problems relating to consistency
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Quality & Reliability (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Biomedical Technology (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Retry When Errors Occur (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
This application provides a method and an apparatus for processing a failure of a cipher change of ciphertext data in a database, the method comprising: storing a record's error information when a cipher change of ciphertext data in the record fails, the error information comprising an identifier of the record and a failure cause; and determining a retry strategy based on the stored failure cause, and employing the retry strategy to reperform the cipher change of the ciphertext data in the record having the identifier. The technical scheme of this application boosts the success rate of cipher re-changing, reduces the amount of manual work, and also improves the operating efficiency of failure processing.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610221942.1A CN107292618B (en) | 2016-04-11 | 2016-04-11 | Method and device for processing ciphertext data encryption failure in database |
PCT/CN2017/078499 WO2017177819A1 (en) | 2016-04-11 | 2017-03-29 | Method and apparatus for processing failure of cipher change of ciphertext in database |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201808892WA true SG11201808892WA (en) | 2018-11-29 |
Family
ID=60041360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201808892WA SG11201808892WA (en) | 2016-04-11 | 2017-03-29 | Method and apparatus for processing failure of cipher change of ciphertext in database |
Country Status (10)
Country | Link |
---|---|
US (1) | US10884862B2 (en) |
EP (1) | EP3425579A4 (en) |
JP (1) | JP6875499B2 (en) |
KR (1) | KR102204409B1 (en) |
CN (1) | CN107292618B (en) |
MY (1) | MY183034A (en) |
PH (1) | PH12018502186A1 (en) |
SG (1) | SG11201808892WA (en) |
TW (1) | TWI675311B (en) |
WO (1) | WO2017177819A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110704121B (en) * | 2018-06-25 | 2021-07-20 | 北京嘀嘀无限科技发展有限公司 | Operation retry method, system and computer device |
CN110780983A (en) * | 2019-09-10 | 2020-02-11 | 中国平安财产保险股份有限公司 | Task exception handling method and device, computer equipment and storage medium |
CN111030868B (en) * | 2019-12-19 | 2023-12-05 | 紫光云(南京)数字技术有限公司 | Method for solving failure of elastic public network IP issuing equipment |
CN111709736B (en) * | 2020-05-14 | 2023-04-07 | 支付宝(杭州)信息技术有限公司 | Processing method and device of punishment strategy and electronic equipment |
CN112486719B (en) * | 2020-12-14 | 2023-07-04 | 上海万物新生环保科技集团有限公司 | Method and equipment for RPC interface call failure processing |
CN113419924B (en) * | 2021-08-23 | 2021-12-07 | 北京安华金和科技有限公司 | Database operation risk prompt processing method and device based on session maintenance |
Family Cites Families (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4229818A (en) * | 1978-12-29 | 1980-10-21 | International Business Machines Corporation | Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system |
JP3748155B2 (en) | 1997-11-14 | 2006-02-22 | 富士通株式会社 | File management system with falsification prevention / detection function |
US6108419A (en) * | 1998-01-27 | 2000-08-22 | Motorola, Inc. | Differential fault analysis hardening apparatus and evaluation method |
JPH11231778A (en) * | 1998-02-18 | 1999-08-27 | Matsushita Electric Ind Co Ltd | Device and method for enciphering and deciphering and recording medium recording the same methods |
US7559088B2 (en) | 2004-02-04 | 2009-07-07 | Netapp, Inc. | Method and apparatus for deleting data upon expiration |
JP2006155155A (en) | 2004-11-29 | 2006-06-15 | Fujitsu Ltd | Information leakage preventing device and method, and its program |
WO2007021823A2 (en) * | 2005-08-09 | 2007-02-22 | Tripwire, Inc. | Information technology governance and controls methods and apparatuses |
US7996679B2 (en) | 2005-10-05 | 2011-08-09 | International Business Machines Corporation | System and method for performing a trust-preserving migration of data objects from a source to a target |
US7694134B2 (en) | 2005-11-11 | 2010-04-06 | Computer Associates Think, Inc. | System and method for encrypting data without regard to application |
CN101047978A (en) * | 2006-03-27 | 2007-10-03 | 华为技术有限公司 | Method for updating key in user's set |
US7793110B2 (en) | 2006-05-24 | 2010-09-07 | Palo Alto Research Center Incorporated | Posture-based data protection |
JP4288292B2 (en) * | 2006-10-31 | 2009-07-01 | 株式会社エヌ・ティ・ティ・ドコモ | Operating system monitoring setting information generation device and operating system monitoring device |
US8385551B2 (en) | 2006-12-22 | 2013-02-26 | Telefonaktiebolaget L M Ericsson (Publ) | Highly available cryptographic key storage (HACKS) |
US8423789B1 (en) | 2007-05-22 | 2013-04-16 | Marvell International Ltd. | Key generation techniques |
US8225105B2 (en) | 2007-08-13 | 2012-07-17 | International Business Machines Corporation | Method and apparatus for verifying integrity of computer system vital data components |
US9158933B2 (en) * | 2007-08-17 | 2015-10-13 | Sybase, Inc. | Protection of encryption keys in a database |
JP4985312B2 (en) * | 2007-10-24 | 2012-07-25 | セイコーエプソン株式会社 | Data management apparatus, data management system, and program |
US8005227B1 (en) | 2007-12-27 | 2011-08-23 | Emc Corporation | Key information consistency checking in encrypting data storage system |
US8055633B2 (en) | 2008-01-21 | 2011-11-08 | International Business Machines Corporation | Method, system and computer program product for duplicate detection |
US7987496B2 (en) | 2008-04-11 | 2011-07-26 | Microsoft Corporation | Automatic application of information protection policies |
CN101291457B (en) * | 2008-05-30 | 2012-09-05 | 中兴通讯股份有限公司 | Processing method of UE context updating failure |
US8281388B1 (en) | 2008-06-27 | 2012-10-02 | Symantec Corporation | Hardware secured portable storage |
JP2010176303A (en) * | 2009-01-28 | 2010-08-12 | Nippon Yunishisu Kk | Batch processing system, information terminal apparatus for use in the same, and method for recovering batch processing |
US8707082B1 (en) * | 2009-10-29 | 2014-04-22 | Symantec Corporation | Method and system for enhanced granularity in fencing operations |
JP2011164907A (en) | 2010-02-09 | 2011-08-25 | Hitachi Solutions Ltd | Information management system |
US8276022B2 (en) * | 2010-04-30 | 2012-09-25 | Yahoo! Inc. | Efficient failure detection for long running data transfer jobs |
CN101895846B (en) * | 2010-07-23 | 2014-12-10 | 中兴通讯股份有限公司 | Self-adaptive short message retry control method and device |
US8762944B2 (en) | 2011-03-23 | 2014-06-24 | International Business Machines Corporation | Build process management system |
US9221079B1 (en) * | 2011-08-02 | 2015-12-29 | National Presort, Inc. | System and method for real-time address correction |
CN102332981A (en) * | 2011-10-12 | 2012-01-25 | 深圳市沃达通实业有限公司 | Three-layer key encryption method and bank transaction system |
CN102315933B (en) * | 2011-10-18 | 2014-02-05 | 飞天诚信科技股份有限公司 | Method for updating key and system |
CN102387500B (en) * | 2011-10-25 | 2015-10-28 | 中兴通讯股份有限公司 | A kind of business cipher key management method and system |
CN102413126B (en) * | 2011-11-04 | 2014-05-07 | 中国工商银行股份有限公司 | Secret key synchronization method of bank card transaction preposition equipment and system thereof |
US8726392B1 (en) * | 2012-03-29 | 2014-05-13 | Symantec Corporation | Systems and methods for combining static and dynamic code analysis |
JP5968156B2 (en) | 2012-08-08 | 2016-08-10 | キヤノン株式会社 | Job processing system, information processing system, job processing method, information processing method, and program |
US9053025B2 (en) * | 2012-12-28 | 2015-06-09 | Intel Corporation | Apparatus and method for fast failure handling of instructions |
JP2015060286A (en) * | 2013-09-17 | 2015-03-30 | 株式会社日立システムズ | Delay processing method in cloud computing |
US9405920B1 (en) * | 2014-05-21 | 2016-08-02 | Amazon Technologies, Inc. | Data integrity verification |
JP6373690B2 (en) * | 2014-09-05 | 2018-08-15 | ルネサスエレクトロニクス株式会社 | Semiconductor device |
TW201610907A (en) * | 2014-09-10 | 2016-03-16 | 中華電信股份有限公司 | Methodology for synchronizing heterogeneous data with telecom orders |
CN104376070B (en) * | 2014-11-12 | 2018-10-16 | 中国建设银行股份有限公司 | Update the data the control method and device of library record |
CN104936308B (en) * | 2015-06-18 | 2018-05-22 | 西南交通大学 | A kind of processing method and device of the failure of dual link routing update |
US11469902B2 (en) * | 2019-03-29 | 2022-10-11 | Intel Corporation | Systems and methods of using cryptographic primitives for error location, correction, and device recovery |
-
2016
- 2016-04-11 CN CN201610221942.1A patent/CN107292618B/en active Active
-
2017
- 2017-03-09 TW TW106107802A patent/TWI675311B/en active
- 2017-03-29 EP EP17781795.4A patent/EP3425579A4/en active Pending
- 2017-03-29 KR KR1020187032659A patent/KR102204409B1/en active IP Right Grant
- 2017-03-29 WO PCT/CN2017/078499 patent/WO2017177819A1/en active Application Filing
- 2017-03-29 JP JP2019503610A patent/JP6875499B2/en active Active
- 2017-03-29 MY MYPI2018703640A patent/MY183034A/en unknown
- 2017-03-29 SG SG11201808892WA patent/SG11201808892WA/en unknown
-
2018
- 2018-10-10 US US16/156,762 patent/US10884862B2/en active Active
- 2018-10-11 PH PH12018502186A patent/PH12018502186A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
PH12018502186A1 (en) | 2019-09-23 |
TW201738801A (en) | 2017-11-01 |
US10884862B2 (en) | 2021-01-05 |
TWI675311B (en) | 2019-10-21 |
JP6875499B2 (en) | 2021-05-26 |
WO2017177819A1 (en) | 2017-10-19 |
US20190042367A1 (en) | 2019-02-07 |
EP3425579A1 (en) | 2019-01-09 |
CN107292618A (en) | 2017-10-24 |
KR102204409B1 (en) | 2021-01-19 |
EP3425579A4 (en) | 2019-11-06 |
JP2019514147A (en) | 2019-05-30 |
KR20180128064A (en) | 2018-11-30 |
MY183034A (en) | 2021-02-08 |
CN107292618B (en) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201808892WA (en) | Method and apparatus for processing failure of cipher change of ciphertext in database | |
TW200943975A (en) | Systems and methods for media container file generation | |
PH12019501432A1 (en) | System and method for generating digital marks | |
SG11201805759PA (en) | Service fallback method and apparatus | |
GB0724992D0 (en) | Tooth improvement | |
EA201990251A1 (en) | SYSTEM OF DISTRIBUTED PROCESSING OF TRANSACTIONS AND AUTHENTICATION | |
WO2017013494A3 (en) | Methods and systems for dynamically generating real-time recommendations | |
SG11201907942QA (en) | Blockchain cluster processing system and method, computer device and storage medium | |
BR112019008162A2 (en) | method for executing a settlement and system for executing a settlement | |
TW200943087A (en) | Methods and systems for generating a media program | |
SG11202101248SA (en) | Information processing method and device based on blockchain, and computer-readable storage medium | |
EP4050449A4 (en) | Method and device for robot positioning, smart robot, and storage medium | |
WO2015020900A3 (en) | Method and device for error correcting code (ecc) error handling | |
EP3836682A4 (en) | Method for generating semi-static harq-ack codebook, user terminal, and readable storage medium | |
MY191630A (en) | Method and device for account creation, account refilling and data synchronization | |
EP3901814A4 (en) | Method for generating real-time relative map, intelligent driving device and computer storage medium | |
MX364656B (en) | Systems and methods for providing remote access to interactive media guidance applications. | |
MY198404A (en) | Communication apparatus, control method, and computer readable storage medium | |
SG10201904328UA (en) | Information processing system, method for controlling information processing system, and storage medium | |
EP3790333A4 (en) | Information indication method and device, and computer storage medium | |
WO2019126793A3 (en) | A memory apparatus and method for controlling the same | |
WO2015081911A3 (en) | Instant communications system and method | |
EP3780751A4 (en) | Information indication method and device, and computer storage medium | |
MX2019013535A (en) | Systems and methods for automatic formatting of images for media assets based on user profile. | |
EP4027585A4 (en) | Method for achieving clock source selection, device, system and storage medium |