Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security data item level database encryption system

A data item level, encryption system technology, applied in the field of information security, can solve problems such as inflexibility of the database system

Active Publication Date: 2011-11-09
WANBANG CHARGING EQUIP CO LTD +1
View PDF3 Cites 68 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The present invention aims to overcome the inflexible shortcomings of the existing large-grained encryption database system, as well as the problems of the existing data item-level encrypted database system key generation, storage and management, and provide a very easy to generate , an item-level database encryption system that stores and manages keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] There are many options for system implementation, the following is a reference example:

[0041] In this example, the C / S mode is adopted, and the data encryption is realized through the encryption of the DBMS outer layer (client), and the remote client and the server are connected using the secure socket protocol to ensure the confidentiality and integrity of the communication.

[0042] Data encryption process implementation:

[0043] 1) The user logs in remotely. The client and server establish an SSL connection, and the user logs in.

[0044] 2) The system verifies the user's identity and authority. When the user has the authority to encrypt data, it authorizes. The user requests to input data. If the input data, according to the encryption attribute table, belongs to the type that needs to be encrypted, or when the user enters for the first time, set Some fields need to be encrypted, so it is necessary to write to the encrypted attribute table. At the same time, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security data item level database encryption method. Confidential data is encrypted by a data item level particle size; a hash function is used for deriving an encryption key of each data item according to a derived key and unique positioning information of the data item, even the data item encryption keys for encryption of all integral databases can be derived by using one key to reduce the using amount of the keys and facilitate key management; and a stream cipher algorithm is used for encrypting the data items to avoid filling. A ciphertext index is also encrypted by the stream cipher algorithm; each field (column) is encrypted by using the same key; therefore, searching keywords can be encrypted and then ciphertexts of corresponding fields are matched in spite of precise complete or incomplete searching. The method also has complete security functions of key management, secret sharing, security backup, mandatory access control, security connection and the like.

Description

technical field [0001] The invention belongs to the field of information security and relates to a secure data item level database encryption system. Background technique [0002] Now database security is very important to many enterprise networks, even related to the survival and development of an enterprise. Therefore, enterprises often take certain measures: such as access control, database backup, firewall, etc. to protect the security of the system. But these traditional security protection measures have certain limitations and deficiencies. For example: some unauthorized users may bypass the access control mechanism of the system to invade the database and obtain data illegally; the medium of the backup database is lost, resulting in the leakage of data in the database; the anti-intrusion network security technology represented by the firewall is not equal to information security of all. In addition, users with sufficient authority in the system may obtain some sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F17/30G06F21/60
Inventor 王勇汪华登
Owner WANBANG CHARGING EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products