Secure encryption method for database

A technology of security encryption and data encryption, which is applied in the computer field, can solve the problems of data security, integrity and non-tamperable modification, etc., and achieve the effect of ensuring security

Active Publication Date: 2011-06-15
东方口岸科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure that the user can remember the key and hope to input it through the keyboard, they usually choose some meaningful character strings as the key, which will inevitably make the key easier to be leaked and stolen; at the same time, because the software algorithm is more common, After the intruder obtains the ciphertext and key, he can also use the software algorithm to decipher
[0004] Another security risk is that the security, integrity and non-tamperability of data cannot be guaranteed during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure encryption method for database
  • Secure encryption method for database
  • Secure encryption method for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The technical solution of the present invention will be described in further detail below with reference to the accompanying drawings.

[0012] figure 2 A schematic diagram of the method according to the invention is shown. The technical solution of the present invention is to install the security encryption component SCC on the client and server of the database, which includes an identity authentication interface, a data block encryption interface, a data block digest interface, a data stream connection authentication interface, a data stream encryption interface, and security Strategy combination module, security instruction conversion module; after the database engine inputs the data to be processed, SCC calls the interface, and the called interface formulates a security policy through the security policy combination module and combines it into an application protocol data unit based on the security policy and sends it to the high-speed For mobile storage devices, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure encryption method for a database. In the method, encryption keys are not needed to be input through a user keyboard, the keys cannot be decoded through software and data transmission is safe. A secure encryption component (SCC) is arranged on a client and a server of the database, and comprises an identity authentication interface, a data block encryption interface, a data block abstract interface, a data stream connection authentication interface, a data stream encryption interface, a security policy combination module and a security instruction conversion module; after a database engine inputs data to be processed, the SCC calls the interfaces, the called interfaces formulate a security policy through the security policy combination module, combine the security policy into an application protocol data unit according to the security instruction conversion module, and transmit the application protocol data unit to high-speed mobile storage equipment; and the SCC gets back the result data and returns the result data to the database.

Description

Technical field [0001] The invention belongs to the technical field of computers, and specifically relates to a method for encrypting database files. Background technique [0002] Because the database system is managed in the form of files under the computer operating system, intruders can directly use the operating system vulnerabilities to steal database files, or directly use operating system tools to illegally forge and tamper with the contents of database files. This kind of hidden danger is difficult for general database users to detect, which requires the database management system to have a strong security mechanism. One of the effective ways to solve this problem is that the database management system encrypts the database files, so that even if the data is unfortunately leaked or lost, it is difficult to decipher and read. [0003] At present, mainstream large, medium and small databases have the function of encrypting data, but a common practice is that users specify an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F17/30
Inventor 黄美华颜静冯薇罗剑峰高立刚钱少华
Owner 东方口岸科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products