Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Transparent encryption and decryption method for database based on multi-level view and trigger

A transparent encryption and decryption, trigger technology, applied in the fields of digital data protection, electrical digital data processing, special data processing applications, etc. Text query, good application transparency, and the effect of ensuring transparency

Inactive Publication Date: 2011-11-16
BEIJING ANHUA JINHE TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the encryption protection method based on the database front agent is generally adopted. The disadvantage of this method is that the application must use the API provided by the encryption front agent, so the existing program needs to be modified, and the transparency of the application cannot be realized; The second is that the features of a large number of database products cannot be used normally, and this "pre-encryption and decryption" method is invalid for stored procedures and functions executed inside the database
[0004] In recent years, database-based views and triggers have been used to implement transparent encryption and decryption methods. This method currently uses a single-level view, which cannot implement encryption processing on tables without primary keys, and cannot achieve true application transparency. For tables with composite primary keys, its data update performance will be affected; at the same time, it cannot accurately determine how the database optimizer handles the data retrieval method of any query operation request, resulting in the inability to perform effective data caching and batch pre-decryption processing. processing, which greatly affects the performance of the query

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention realizes the automatic encryption and decryption of sensitive data by realizing the multi-level view and combining the trigger based on the row identification on the basis of the common view and trigger of the relational database, so as to achieve the goal of being transparent to the application, and the application system does not need Transformation; through multi-level views, accurate judgment of database query behavior can be realized, so that for different types of query behavior, a special ciphertext and plaintext data caching strategy based on the LRU cache management mechanism can be constructed, and batch pre-processing of ciphertext data can be constructed. Decryption processing strategy to achieve efficient ciphertext query.

[0030] (1): Sensitive field encryption

[0031] In the method of the present invention, for each table that needs to encrypt sensitive fields:

[0032] Step 1: Change the sensitive field data type

[0033] The data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a transparent encryption and decryption method for a database based on a multi-level view and a trigger, which is used for encrypting and protecting data in a relational database and preventing information from being stolen illegally. Based on the view and the trigger, which are universal to the relational database, an aim of being correspondingly transparent is achieved by implementing automatic encryption and decryption of sensitive data through implementing the multi-level view and using the trigger based on a row identifier, and an application system is not needed to be modified; precise judgment on query actions to the database is implemented through the multi-level view, so that a special ciphertext and plaintext data caching strategy based on an LRU cache management mechanism is established for different types of query actions, a strategy of pre-decrypting the ciphertext data in batches is established, and efficient ciphertext query is implemented.

Description

technical field [0001] The invention relates to the field of computer data security, in particular to a method for encrypting and decrypting data in a relational database. Background technique [0002] With the rapid development of computer technology, the application of database has been very extensive and has penetrated into various fields. Government organizations, commercial organizations, and financial institutions all use database servers to save various sensitive data such as important personnel information, trade records, and market decision-making information. The importance of these data is unquestionable, it is related to the security of the country and the rise and fall of enterprises. Therefore, how to effectively ensure the security of the database system and realize the confidentiality, integrity, validity and availability of data has become an important research topic for people in the industry. At present, the mainstream commercial databases used in China ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/00G06F21/62
Inventor 赵飞
Owner BEIJING ANHUA JINHE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products