Data-base storage ciphering method based on conversation

An encryption method and database technology, applied in the field of session-based database storage encryption, to achieve the effect of good portability and protection of sensitive data

Inactive Publication Date: 2008-05-21
WUHAN DAMENG DATABASE
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a session-based database storage encryption method that overcomes the dilemma that the existing database storage encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data-base storage ciphering method based on conversation
  • Data-base storage ciphering method based on conversation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0019] ①User 1 defines a table Table1 that stores sensitive data, and specifies the encryption algorithm used to encrypt the data in Table1 when defining Table1;

[0020] ②User 2 logs in to the database, and uses his own key to perform operations such as insertion and query on Table1. In the process of insertion and query, the database management system automatically invokes the encryption algorithm of Table1 and uses the key of user 2 to complete the encryption and decryption process;

[0021] ③ After user 3 logs in to the database, he wants to view the data inserted by user 2 in table Table1.

[0022] When the data is uploaded, the system cannot correct the data inserted by user 2 because it does not know the decryption key of user 2.

[0023] Decryption, so that the sensitive data of user 2 cannot be obtained. Similarly, user 2 does not know the solution of user 3

[0024] When encrypting the key, it is also impossible to view the sensitive data stored in Table 1 by User...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data base memory encryption method based on conversation, which adopts the following methods: relative information of encryption algorithm is linked with an encrypted object, which is preset by a database administrator in advance; secret key is linked with information of users, which is preset by users in advance; relative information of encryption algorithm and the secret key are respective stored and are combined for used when encryption and decryption are needed for the encrypted object. Due to respectively storing of relative information of encryption algorithm and the secret key and the combination used when encryption and decryption are needed for the encrypted object, the invention can adopt different encryption algorithm for different encrypted object, thereby flexibly using without changing existing application system. The invention has the advantages of very good transplantation, ability to protect private sensitive data of users and no limit for data type of the encrypted object..

Description

technical field [0001] The invention belongs to the technical field of database application in computers, in particular to a session-based database storage encryption method for protecting user sensitive data. Background technique [0002] In database application environments such as government, military, and enterprises, a large amount of sensitive data is stored in the database, and once the data is obtained by an opponent, it will cause catastrophic losses. In order to protect these sensitive data, major secure database vendors provide storage encryption methods to encrypt sensitive data. Currently provided encryption methods can be classified into transparent encryption and non-transparent encryption. [0003] Transparent encryption refers to saving the relevant information and keys of the encryption algorithm in the database. When the user operates on sensitive data, the database management system automatically completes the encryption and decryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F17/30G06F21/60
Inventor 付铨宁亮
Owner WUHAN DAMENG DATABASE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products