Data-base storage ciphering method based on conversation
An encryption method and database technology, applied in the field of session-based database storage encryption, to achieve the effect of good portability and protection of sensitive data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0019] ①User 1 defines a table Table1 that stores sensitive data, and specifies the encryption algorithm used to encrypt the data in Table1 when defining Table1;
[0020] ②User 2 logs in to the database, and uses his own key to perform operations such as insertion and query on Table1. In the process of insertion and query, the database management system automatically invokes the encryption algorithm of Table1 and uses the key of user 2 to complete the encryption and decryption process;
[0021] ③ After user 3 logs in to the database, he wants to view the data inserted by user 2 in table Table1.
[0022] When the data is uploaded, the system cannot correct the data inserted by user 2 because it does not know the decryption key of user 2.
[0023] Decryption, so that the sensitive data of user 2 cannot be obtained. Similarly, user 2 does not know the solution of user 3
[0024] When encrypting the key, it is also impossible to view the sensitive data stored in Table 1 by User...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com