Credible database integrity protecting method and system
An integrity protection and database technology, applied in the field of database security, can solve problems such as loss, and achieve the effect of reducing the impact and improving the strength of integrity protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0031] The specific implementation of the key technical modules described in the content of the invention will be exemplified below, but the scope of the invention will not be limited by this explanation.
[0032] For the technical architecture of the present invention, see figure 1 , Mainly including security chip, credibility measurement module, integrity protection module, metadata database, integrity configuration module, access interface module and database operation module.
[0033] First, we will introduce the two basic modules of the security chip module and the credibility measurement module. The present invention needs to utilize some of the functions provided by them, but the implementation of the module itself is not within the scope of the present invention. The functions involved in the present invention will be explained below.
[0034] 1. Security chip
[0035] The functions or mechanisms that need to be provided by the security chip in the present invention are mainl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap