检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Encrypted Functions and Stored Procedures In the current version, only encrypted functions and stored procedures in SQL or PL/pgSQL are supported.
Encrypted Functions and Stored Procedures In the current version, only encrypted functions and stored procedures in SQL or PL/pgSQL are supported.
The definitions of encrypted columns cannot be modified in an encrypted equality query function or stored procedure, including creating an encrypted table and adding an encrypted column.
The definitions of encrypted columns cannot be modified in an encrypted equality query function or stored procedure, including creating an encrypted table and adding an encrypted column.
Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs
Encrypted Equality Query GS_CLIENT_GLOBAL_KEYS GS_CLIENT_GLOBAL_KEYS_ARGS GS_COLUMN_KEYS GS_COLUMN_KEYS_ARGS GS_ENCRYPTED_COLUMNS GS_ENCRYPTED_PROC Parent topic: System Catalogs
Setting Encrypted Equality Queries Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Enhancing Security in the Configuration Phase Encrypted Functions and Stored Procedures
Setting Encrypted Equality Query Overview Using gsql to Operate an Encrypted Database Using JDBC to Operate an Encrypted Database Using Go Driver to Operate an Encrypted Database Enhancing Security in the Configuration Phase Encrypted Functions and Stored Procedures
The schema.table.column points to other encrypted columns. In this case, the original data type of the encrypted column is returned.
The schema.table.column points to other encrypted columns. In this case, the original data type of the encrypted column is returned.
When JDBC is used to perform operations on an encrypted database, different connections change the encrypted configuration data. The client calls the isValid method to ensure that the connections can hold the changed encrypted configuration data.
When JDBC is used to perform operations on an encrypted database, different connections change the encrypted configuration data. The client calls the isValid method to ensure that the connections can hold the changed encrypted configuration data.
credit_card | character varying | encrypted -- 13.
credit_card | character varying | encrypted -- 13.
set credit_card = '80000000011111111' where name = 'joy'; UPDATE 1 -- Add an encrypted column to the table. gaussdb=# ALTER TABLE creditcard_info ADD COLUMN age int ENCRYPTED WITH (COLUMN_ENCRYPTION_KEY = cek1, ENCRYPTION_TYPE = DETERMINISTIC); ALTER TABLE -- Delete an encrypted
(19) encrypted with (column_encryption_key = cek1, encryption_type = DETERMINISTIC)); CREATE TABLE Perform other operations on the encrypted table. -- Write data to the encrypted table. gaussdb=# INSERT INTO creditcard_info VALUES (1,'joe','6217986500001288393'); INSERT 0 1 gaussdb
Parent topic: Setting Encrypted Equality Query
Parent topic: Setting Encrypted Equality Query
The functions of keys in different encryption scenarios are as follows: Data: The encrypted database encrypts data of an encrypted column in SQL statements and decrypts the query result of the encrypted column returned by the database server.
The functions of keys in different encryption scenarios are as follows: Data: The encrypted database encrypts data of an encrypted column in SQL statements and decrypts the query result of the encrypted column returned by the database server.