473,404 Members | 2,178 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Search encrypted database and display

Hi - I am looking for a solution to a clients requirement. They want
to distribute a database of info on CD, which user can search on
selected fields and results will be displayed.
The data and database MUST be encrypted and be displayed on-screen in
a format that cannot be 'Copy/Pasted'. Apart from the search results
displayed on-screen, user must NOT be able to extract multiple records
to use for Spamming.
Database about 1/2 million records with 10 fields.

Ideally application must run from CD with no setup.exe to install on
their PC.
Doesn't have to be VB, doesn't have to be a database, but must run on
Windows 95 upwards. We intend sending out hundreds of thousands of
CD's so s/w licensing cost is major issue

What can you suggest?
Jul 17 '05 #1
1 2671
On 24 Dec 2003 04:07:40 -0800, bi***@eject.co.za (BillK) wrote:
Hi - I am looking for a solution to a clients requirement. They want
to distribute a database of info on CD, which user can search on
selected fields and results will be displayed.
The data and database MUST be encrypted and be displayed on-screen in
a format that cannot be 'Copy/Pasted'. Apart from the search results
displayed on-screen, user must NOT be able to extract multiple records
to use for Spamming.
Database about 1/2 million records with 10 fields.

Ideally application must run from CD with no setup.exe to install on
their PC.
Doesn't have to be VB, doesn't have to be a database, but must run on
Windows 95 upwards. We intend sending out hundreds of thousands of
CD's so s/w licensing cost is major issue

What can you suggest?


I did something pretty similar back in 1996
- it is still updated and distributed on a quarterly basis
- I give it the odd tweak, but cash-wise it is not interesting

Tackling the problems in order of (my) priority :-

VB5 or VB6 can run straight from a CD without any setup
- provided you do not use any OCXes or AX DLLs
- licensing costs are zero

Preventing Copy/Paste is a doddle
- you just Print the stuff on a Form/Picturebox/UserControl
- no chance of screen scraping
- and if someone uses OCR ... well they are too good to beat

You _definitely_ do not want to use a 'Database'
- well nothing you get from elsewhere

Rolling your own data format is not hard
- it is especially easy for Read Only Apps

Encryption is more of a pain
- in my case I opted for simplicity and simply mucked about with the
bits - this is Ok for seeing off non serious hackers but ...

A heck of a lot depends on the Data itself
- probably your best bet is to go for 'tokenization'
- most compression techniques maintain a 'lexicon' and replace words
or sequences with tokens

- however this is impractical when dealing with individual records
(each record would have its own 'lexicon' ... daft)
- and realistically you need some form of 'Random Access' system
- so you need a 'Global Token Lexicon'

I used this method on the UK PostCode (Zip Code) files
- primarily as a compression technique, but encryption is a byproduct
- also on an old 'Financial Directory' ...

You need a way of rapidly searching garbled data, that can be accessed
both sequentially and in random access

VB is not very fast at this stuff, so I resorted to Delphi
- it is worth taking a look at it
- Delphi DLLs integrate nicely with VB

Much depends on the data itself
- search speeds can be radically improved by maintaining multiple
bitmaps of known fields ... another technique

- that can be extended to extract files that store numbers instead of
words

The trick with read only databases is to anticipate as much as
possible when 'digesting' the data

I would not mind having a look at some of the data ...
Jul 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: todd | last post by:
here is a search tool SP I wrote. How many times have you wanted to search all your Stored procs or views (in a database) for a keyword but couldn't!? Well now you can! THis can makes life a...
10
by: sffan | last post by:
I am new to database programming and was curious how others solve the problem of storing encrypted in data in db table columns and then subsequently searching for these records. The particular...
1
by: BillK | last post by:
Hi - I am looking for a solution to a clients requirement. They want to distribute a database of info on CD, which user can search on selected fields and results will be displayed. The data and...
2
by: Jill Elaine | last post by:
I am building an Access 2002 frontend with linked tables to an encrypted Paradox 7 database. When I first create these linked tables, I'm asked for the password to the encrypted Paradox database,...
0
by: VBTricks.de.vu Webmaster | last post by:
Hello, I'm trying to implement an encrypted communication with a PHP script. All the basic stuff (HTTP protocoll, base64) is working. The only problem is that this method works only for the...
4
by: nepdae | last post by:
Well, after reading and hunting all over the web, including here, I still haven't been successful in my attempts to resolve my situation. So, I thought maybe I'd just ask. Here's the situation: ...
0
by: | last post by:
I have a question about spawning and displaying subordinate list controls within a list control. I'm also interested in feedback about the design of my search application. Lots of code is at the...
5
by: th1982 | last post by:
HI All I have a search page' s result which view 3results/per page,but my "next" link to view next page is not working. Here is my code : <?php // Get the search variable from URL ...
4
n8kindt
by: n8kindt | last post by:
i'm trying to create a secure scenario where no one will be able to know our encrypted database passcode. BUT if they login to a form in another database successfully, it will open the encrypted...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.