Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Ideas for decrypting/encrypting numeric data
Message
From
19/10/2018 16:05:12
 
 
To
19/10/2018 10:58:40
General information
Forum:
Visual FoxPro
Category:
Coding, syntax & commands
Environment versions
Visual FoxPro:
VFP 9 SP2
OS:
Windows Server 2012 R2
Network:
Windows Server 2012 R2
Database:
Visual FoxPro
Application:
Desktop
Virtual environment:
VMWare
Miscellaneous
Thread ID:
01662625
Message ID:
01662685
Views:
36
Thx, that was consensus back then when I brought the idea up ;-)

It did sport a few other nuances like lazy decrypt via _ndecrypt field: if table was used in grid (_ndecrypt property on oca[Table]=[-1..-20] ), report (_ndecrypt property on oca[Table]=[-21..-40] ) or export (_ndecrypt property on oca[Table]=[-41..-60] ): decrypt whole table on getting data from backend, otherwise (_ndecrypt property on oca[Table]=[0] ) only if parent table record pointer was positioned explicitly to corresponding parent record via the special positioning methods on oca[Table]s base class: decrypt always set cursor.ndecrypt field to 1...

BIG project with enough slack to polish such nuances;-)

One of my knacks is dreaming up such schemes with valid gut estimates on reachable benefits in performance and implementing them in first draft architected (read encapsulated or isolated) at least well enough only minimal maintainance is needed [employing at least one big No-No in programming rules for the particular project for sure, but always documented as such up front].
Cynics might say others shun touching such project corners without studying the somewhat minimal code and [ahem] terse documentation and leave it running for many releases ;-))

>Well, that's an interesting concept and definitely would be easier. What do you do though for running reports against the data - you would have to decrypt the entire table into a temp table and then run your queries against it - if I understand your structure correctly.
>
>>In the first iteration we did the same.
>>As more fields had to be encrypted and bulk operations and printing were happening often, we went to a different logic: all tables only have 1 encrypted field (can be memo) which gets decrypted into a blank 1:1 related table (or scatter name object). Encrypt/decrypt is done via handcrafted Fll according to the empty table structure bound by name convention to data table in the DBC. As there is only 1 crypt string per table should be more secure.
Previous
Reply
Map
View

Click here to load this message in the networking platform