Method and system for maintaining the safe of data base

A database and security technology, applied in the database field, can solve the problem that data is difficult to maintain logical relationship, and achieve the effect of reducing the number of times and the amount of data

Inactive Publication Date: 2008-04-16
TIANJIN UNIVERSITY OF TECHNOLOGY
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encrypted data will be difficult to maintain the original logical relationship. When DBMS stores encrypted data in the database,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for maintaining the safe of data base
  • Method and system for maintaining the safe of data base

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The system and method for maintaining database security of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0027] The method for maintaining database security of the present invention as shown in Figure 1, comprises the following steps:

[0028] Step S10: the user creates a relationship;

[0029] Step S20: Specify whether to encrypt and store the data in it through the extended statement of SQL, if it is necessary to encrypt and store, execute step S30; if it does not need to encrypt and store, execute step S70;

[0030] Step S30: the key generator automatically generates a key;

[0031] Step S40: storing the key in the encryption relationship table in the security dictionary;

[0032] Step S50: When the DBMS writes the data to the external storage, query the security dictionary in the system table to determine whether encryption is required, if encryption is required, then enter step S60, if encryption is not r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for maintaining database safety, including the following steps: a user creates a relation; whether the data in database needs encryption storage is determined through SQL extension statement; if the data needs encryption storage, a cipher key generator automatically generates a cipher key; if the data does not need encryption storage, the data is written out to an external memory; the cipher key generated by the cipher key generator is stored in the encryption relation table of a security dictionary; when data is written out to an external memory by DBMS, the security dictionary in a system table is queried so as to judge whether encryption is needed; if encryption is needed, data encryption is completed by the cipher key in the security dictionary; otherwise, the data is output to the external memory. The invention completes encryption operation when DBMS writes out the data in a memory to the external memory and completes deciphering operation when the data in the external memory is read in the memory; moreover, because the data is in plaintext in the memory, the function of the DBMS is not influenced and an index can be created in a conventional mode.

Description

technical field [0001] The invention relates to the field of databases, in particular to a method and system for maintaining database security. Background technique [0002] At present, the security issues of computer data storage, the anti-theft and anti-tampering of sensitive data have attracted more and more attention. As the core of the computer information system, the database system and the database file are the aggregation of information. top priority. Traditional physical security, operating system security mechanism and database access control mechanism provide a certain security guarantee for the database, but these cannot meet all the security requirements of the database, and cannot guarantee the security of important and sensitive data in some departments, which involves Encryption of data. [0003] The maintenance of database security is mainly realized by encrypting the data in the database. The existing encryption of data in the database is mainly carried ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F17/30G06F21/62
Inventor 陈伟珂尹贻林王子博
Owner TIANJIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products