Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, device and system for database security level flag security gateway operation

A security gateway and database technology, applied in the field of database security gateway operations, can solve problems such as database query performance impact, lack of mature and secure database encryption algorithms, etc.

Active Publication Date: 2018-12-04
武汉华工安鼎信息技术有限责任公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the method of generating confidentiality marks of electronic documents is applied to structured data, it will have a serious impact on database query performance
[0003] At present, there is no mature, secure and homomorphic database encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for database security level flag security gateway operation
  • A method, device and system for database security level flag security gateway operation
  • A method, device and system for database security level flag security gateway operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0074] For the technical solutions provided by the embodiments of the present disclosure, refer to figure 1 The schematic diagram of the network architecture shown may involve two parties: a security gateway and a database management server, wherein the security gateway is connected to an application client and a database management server (for example: DBMS (DBMS, database management server, Database Management System) server, DBMS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for operating a security gateway marked with a database confidentiality level. When a first operation instruction is received, the security policy of the corresponding table stored by the security gateway is queried to determine whether the first operation instruction contains a sensitive column. ; When the instruction includes a sensitive column, encrypt the data of the sensitive column and the data of the corresponding attribute column in the first operation instruction, and generate the ciphertext data of the encrypted label column corresponding to the sensitive column; insert the ciphertext data into the first In the operation instruction, generate the corresponding second operation instruction; send the second operation instruction to the database, so that the database completes the insertion data and update data of the sensitive column, the attribute column and the password column; the present invention can realize the encryption of the structured data, and can Realize the data application binding of sensitive column data and corresponding attribute columns, and meet the technical requirements of inseparable and non-tamperable confidentiality marks, ensure that the data is inseparable from the corresponding confidentiality marks during use, and ensure data tracking and identification.

Description

technical field [0001] The invention relates to a method, a device and a system for operating a security gateway marked with a database confidentiality level. Background technique [0002] At present, the existing methods for generating confidentiality marks for electronic documents result in encryption of the content of electronic documents. If the method of generating confidentiality marks of electronic documents is applied to structured data, it will seriously affect the performance of database query. [0003] At present, there is no mature, secure, and homomorphic database encryption algorithm. Therefore, when applying confidentiality marks to database data, we must re-understand the connotation of "inseparable and non-tamperable". [0004] We believe that the confidentiality mark is inseparable, which can be understood as: due to the limitations of existing encryption technology, data and its corresponding confidentiality mark are allowed to be stored separately durin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F17/30
CPCG06F16/21G06F16/2458G06F21/602G06F21/6227
Inventor 景奕昕唐威周涛
Owner 武汉华工安鼎信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products