473,749 Members | 2,513 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Search encrypted database and display

Hi - I am looking for a solution to a clients requirement. They want
to distribute a database of info on CD, which user can search on
selected fields and results will be displayed.
The data and database MUST be encrypted and be displayed on-screen in
a format that cannot be 'Copy/Pasted'. Apart from the search results
displayed on-screen, user must NOT be able to extract multiple records
to use for Spamming.
Database about 1/2 million records with 10 fields.

Ideally application must run from CD with no setup.exe to install on
their PC.
Doesn't have to be VB, doesn't have to be a database, but must run on
Windows 95 upwards. We intend sending out hundreds of thousands of
CD's so s/w licensing cost is major issue

What can you suggest?
Jul 17 '05 #1
1 2701
On 24 Dec 2003 04:07:40 -0800, bi***@eject.co. za (BillK) wrote:
Hi - I am looking for a solution to a clients requirement. They want
to distribute a database of info on CD, which user can search on
selected fields and results will be displayed.
The data and database MUST be encrypted and be displayed on-screen in
a format that cannot be 'Copy/Pasted'. Apart from the search results
displayed on-screen, user must NOT be able to extract multiple records
to use for Spamming.
Database about 1/2 million records with 10 fields.

Ideally application must run from CD with no setup.exe to install on
their PC.
Doesn't have to be VB, doesn't have to be a database, but must run on
Windows 95 upwards. We intend sending out hundreds of thousands of
CD's so s/w licensing cost is major issue

What can you suggest?


I did something pretty similar back in 1996
- it is still updated and distributed on a quarterly basis
- I give it the odd tweak, but cash-wise it is not interesting

Tackling the problems in order of (my) priority :-

VB5 or VB6 can run straight from a CD without any setup
- provided you do not use any OCXes or AX DLLs
- licensing costs are zero

Preventing Copy/Paste is a doddle
- you just Print the stuff on a Form/Picturebox/UserControl
- no chance of screen scraping
- and if someone uses OCR ... well they are too good to beat

You _definitely_ do not want to use a 'Database'
- well nothing you get from elsewhere

Rolling your own data format is not hard
- it is especially easy for Read Only Apps

Encryption is more of a pain
- in my case I opted for simplicity and simply mucked about with the
bits - this is Ok for seeing off non serious hackers but ...

A heck of a lot depends on the Data itself
- probably your best bet is to go for 'tokenization'
- most compression techniques maintain a 'lexicon' and replace words
or sequences with tokens

- however this is impractical when dealing with individual records
(each record would have its own 'lexicon' ... daft)
- and realistically you need some form of 'Random Access' system
- so you need a 'Global Token Lexicon'

I used this method on the UK PostCode (Zip Code) files
- primarily as a compression technique, but encryption is a byproduct
- also on an old 'Financial Directory' ...

You need a way of rapidly searching garbled data, that can be accessed
both sequentially and in random access

VB is not very fast at this stuff, so I resorted to Delphi
- it is worth taking a look at it
- Delphi DLLs integrate nicely with VB

Much depends on the data itself
- search speeds can be radically improved by maintaining multiple
bitmaps of known fields ... another technique

- that can be extended to extract files that store numbers instead of
words

The trick with read only databases is to anticipate as much as
possible when 'digesting' the data

I would not mind having a look at some of the data ...
Jul 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
3663
by: todd | last post by:
here is a search tool SP I wrote. How many times have you wanted to search all your Stored procs or views (in a database) for a keyword but couldn't!? Well now you can! THis can makes life a lot easier for developers. Would you email me and let me know which part of the world my code is running in?
10
5487
by: sffan | last post by:
I am new to database programming and was curious how others solve the problem of storing encrypted in data in db table columns and then subsequently searching for these records. The particular problem that I am facing is in dealing with (privacy) critical information like credit-card #s and SSNs or business critical information like sales opportunity size or revenue in the database. The requirement is that this data be stored encrypted...
1
1467
by: BillK | last post by:
Hi - I am looking for a solution to a clients requirement. They want to distribute a database of info on CD, which user can search on selected fields and results will be displayed. The data and database MUST be encrypted and be displayed on-screen in a format that cannot be 'Copy/Pasted'. Apart from the search results displayed on-screen, user must NOT be able to extract multiple records to use for Spamming. Database about 1/2 million...
2
6009
by: Jill Elaine | last post by:
I am building an Access 2002 frontend with linked tables to an encrypted Paradox 7 database. When I first create these linked tables, I'm asked for the password to the encrypted Paradox database, and the linked tables are successfully created. I use the data from these linked tables in several forms. All works great until I close the Access frontend and open it again. When I try to use the forms, I get an error message: "Could not...
0
1330
by: VBTricks.de.vu Webmaster | last post by:
Hello, I'm trying to implement an encrypted communication with a PHP script. All the basic stuff (HTTP protocoll, base64) is working. The only problem is that this method works only for the first 8 letters of the encrypted string, the rest seems to be not decrypted. I guess, it's the IV-vector. Unfortunately, I have no experience with encryption:
4
2396
by: nepdae | last post by:
Well, after reading and hunting all over the web, including here, I still haven't been successful in my attempts to resolve my situation. So, I thought maybe I'd just ask. Here's the situation: I have an Access 2000 database (~15 users), split into a front- and back-end. Each user has a local copy of a workgroup file and the data file is out on a server. The problem started when the IS department upgraded the server at night, touching...
0
2080
by: | last post by:
I have a question about spawning and displaying subordinate list controls within a list control. I'm also interested in feedback about the design of my search application. Lots of code is at the end of this message, but I will start with an overview of the problem. I've made a content management solution for my work with a decently structured relational database system. The CMS stores articles. The CMS also stores related items --...
5
2630
by: th1982 | last post by:
HI All I have a search page' s result which view 3results/per page,but my "next" link to view next page is not working. Here is my code : <?php // Get the search variable from URL $string = @$_GET ; $trimmed = trim($string); //trim whitespace from the stored variable // rows to return
4
6899
n8kindt
by: n8kindt | last post by:
i'm trying to create a secure scenario where no one will be able to know our encrypted database passcode. BUT if they login to a form in another database successfully, it will open the encrypted database and systematically plug in the passcode thru vba (kind of like a user on a website logging into a secure SQL database i suppose). i may be going about this whole situation completely wrong but here is what i have for the code that i need to...
0
8833
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9568
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9256
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8257
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6801
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4709
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4881
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
3320
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
2794
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.