Method for encrypting database and database server

An encryption method and database technology, applied in the field of access protection data for internal management personnel, can solve problems such as inconvenience, and achieve the effect of verifying integrity

Active Publication Date: 2016-10-12
TMAXTIBERO CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This technique can restrict client access to unauthorized information
However, this existing technology cannot limit the illegal actions of insiders with legitimate access rights (e.g., database administrators) or those with OS privileges (OSprivilege)
[0007] In order to solve the above proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting database and database server
  • Method for encrypting database and database server
  • Method for encrypting database and database server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In the following, various embodiments will be described with reference to the drawings, in which like reference numerals represent like constituent elements. In this specification, various explanations are provided to help understanding of the present invention. However, these embodiments can be practiced even without these specific descriptions. In other examples, disclosed structures and devices are shown in the form of block diagrams for convenience of description.

[0051] The terms "element", "module", "system" and the like used in this specification mean a computer-related entity, hardware, firmware, software, a combination of software and hardware, or an execution of software. For example, an element may be a process executed in a processor, a process, an object, a thread of execution, a program, and / or a computer, but is not limited thereto. For example, both a computing device and an application executing on the computing device may be elements. More than on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to an embodiment of the present invention, the invention relates to a method for encrypting a database and a database server. The method comprises encrypting a data value included in a data table stored in a memory and storing the encrypted data value in a persistent storage medium. The method comprises the following steps: a step of generating an encrypted data value based on the data value included in the data table stored in a memory; a step of generating a hash value that matches the encrypted data value at least partially based on the data value and positional information of the data value; and a step of determining to write the encrypted data value and the hash value on a persistent storage medium.

Description

technical field [0001] The present invention relates to database encryption, and more particularly to encrypting and storing data to protect the data from access by authorized internal administrators. Background technique [0002] With the development of computer and Internet technology, more and more attention has been paid to databases that can effectively store large amounts of data and search them conveniently and quickly with desired retrieval conditions. Today's database systems allow the storage and retrieval of vast amounts of information. Some of this information may include sensitive information such as credit card numbers. [0003] In particular, in the financial industry and in databases that collect and manage personal information on Internet portal sites, in order to prevent unauthorized users from judging or illegally recording information processed in computers, or to protect the information processing services of users with legal rights Database security i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/64
CPCG06F21/6218G06F21/64G06F21/6209H04L9/0872H04L9/3239G06F21/602G06F21/6227G06F21/78
Inventor 尹晶一朴相永
Owner TMAXTIBERO CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products