Security protection method and system for light-weight database

A security protection and database technology, applied in the field of database protection, can solve problems such as system security risks, not verifying the security status of the database operating platform, ignoring the security constraints of the operating platform, etc., so as to avoid security risks and increase security strength.

Active Publication Date: 2014-01-08
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above protection methods all have a common weakness, that is, they all ignore the security constraints on the running platform, neither verify the security status of the client running platform, nor verify the security status of the running platform where the database is located, thus leaving the system safety hazard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system for light-weight database
  • Security protection method and system for light-weight database
  • Security protection method and system for light-weight database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] A database protection function is accomplished jointly by using trusted platform modules. Trusted Platform Module (TPM) is a chip that is planted inside a computer to provide a root of trust for the computer. Chip specifications are developed by the Trusted Computing Group. According to the "TPM Main Specification Level 2 Version 1.2, Revision 116" (referred to as TPM 1.2) specification description issued by TCG, the chip can provide the sealed storage (TPM_Seal), unsealed operation (TPM_Unseal), complete Functions such as performance measurement (TPM_SHA1Complete), key generation (TPM_GetRandom), etc.

[0033]The database protection method of the present invention includes: (1) the user accesses the database through the database access agent instead of directly operating the database; (2) before responding to the user's operation request on the database, the database access agent first authenticates the client through the remote certification platform If the verifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protection method and system for a light-weight database, and relates to the technical field of information security. The method includes the steps that firstly, a user has access to the database through a database access agency; secondly, the database access agency verifies the security of a running platform where a client-side is located through a remote authentication platform before responding to the operation conducted by the user on the database; thirdly, the database must be decoded before the operation conducted by the user is responded due to the fact that the database is a ciphertext database; fourthly, the running platform where the database is located needs to verify the security of the running platform before the database is decoded, if the running platform is safe, decoding is conducted on the database and the user operation is conducted, and the database is encoded and stored again after the operation is completed. The system comprises a remote authentication subsystem and a database encoding protection subsystem. After the method and system are adopted, the security of the database can be enhanced, the security of the running platform where the client-side is located and the security of the running platform where the database is located are verified before the user has access to the database, and therefore the potential safety hazards caused by undemanding identity authentication and the platforms which may have been broken through can be avoided.

Description

technical field [0001] The invention relates to the technical field of database protection methods, in particular to a light-weight database security protection method. The method encrypts and protects the database through trusted computing technology, and only performs database protection on the premise of ensuring the security of the platform where the database is located. Decryption; the remote proof technology is used to protect the database from being accessed by illegal users, and prevent legitimate users from accessing the database on unsecured client operating platforms. Background technique [0002] With the continuous development of database technology and network technology, the database application system based on network and database has been more and more widely used. These database systems are responsible for storing and managing information, and leaking or destroying such information will cause heavy losses to enterprises and countries. Therefore, the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F21/6218
Inventor 沈楚楚徐明迪刘毅
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products