Credible database integrity protecting method and system

An integrity protection and database technology, applied in the field of database security, can solve problems such as loss, and achieve the effect of reducing the impact and improving the strength of integrity protection

Active Publication Date: 2015-05-13
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What's more serious is that once the insiders who have physical access to the industrial control system are malicious, they can tamper with sensitive data without being easily detected, causing serious losses
This is a problem that cannot be solved by a secure database solution th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible database integrity protecting method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The specific implementation of the key technical modules described in the content of the invention will be exemplified below, but the scope of the invention will not be limited by this explanation.

[0032] For the technical architecture of the present invention, see figure 1 , Mainly including security chip, credibility measurement module, integrity protection module, metadata database, integrity configuration module, access interface module and database operation module.

[0033] First, we will introduce the two basic modules of the security chip module and the credibility measurement module. The present invention needs to utilize some of the functions provided by them, but the implementation of the module itself is not within the scope of the present invention. The functions involved in the present invention will be explained below.

[0034] 1. Security chip

[0035] The functions or mechanisms that need to be provided by the security chip in the present invention are mainl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credible database integrity protecting method and system which are particularly but not just suitable for an industrial control system. The method includes the steps that when sensitive data need integrity protection, whether the current system environment conforms to the environment needed for sensitive data integrity protection or not is checked through a credible measurement technology, and whether the system environment is credible or not is checked similarly before an integrity measurement signature is verified. A signature secret key for carrying out integrity verification is protected by a hardware safety chip in an encipherment mode, and therefore safety based on hardware is achieved. Finally, integrity verification is achieved in a middleware mode, and the normal operation efficiency of a system is ensured while integrity verification of the sensitive data is ensured. Based on the credible database integrity protecting method and system, the safe database system for storing the sensitive data based on the safety chip can be set up for the industrial control environment, the integrity protection intensity of the sensitive data in the safe database system is improved, and it is ensured that production plans, technological processes and other sensitive data are not tampered.

Description

technical field [0001] The invention relates to a trusted database integrity protection method and system, belonging to the field of database security. Background technique [0002] Due to the strict requirements of industrial production on the availability of industrial control systems, security operations such as upgrades, patches, or updates of anti-virus software virus databases are usually not performed in a timely manner after deployment of industrial control systems. Therefore, compared with traditional information systems, there is a certain lag in the security protection measures of industrial control systems. With the integration of informatization and industrialization, enterprise management networks and industrial control networks in many industrial production fields are gradually interconnected to realize the integration of management and control. This makes the industrial control system face more serious external threats such as viruses, Trojan horses, and hac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64
CPCG06F21/64G06F2221/2107G06F2221/2141
Inventor 张敏冯登国张振峰李昊苏璞睿秦宇陈震宇迟佳琳
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products