Database tamper-proofing method and system applied to data security products

A data security and database technology, applied in the field of data processing, can solve the problem that audit information cannot reflect the real historical situation of the database.

Inactive Publication Date: 2017-09-22
四川盛世天成信息技术有限公司
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application provides an application database permission and structure model design scheme applied in the field of data security, which cuts off the way that the historical data information existing in the current application database may be tampered with. During the upgrade, use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database tamper-proofing method and system applied to data security products
  • Database tamper-proofing method and system applied to data security products
  • Database tamper-proofing method and system applied to data security products

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Embodiment 1 provides a database tamper-proof method applied to data security products, please refer to figure 1 , including the following steps:

[0017] Step S100: Design the logic operation of the database table. Logical operations include logical addition, logical deletion, logical modification, and logical query. Logical addition is to add a valid data record. Tombstone is to add a delete record to indicate that the object data has been deleted. Logical modification is carried out in the manner of deleting first and then adding. Firstly, logical deletion is performed to record that the object data has been deleted, and secondly, logical addition is performed to record the modified object data and the identifier of the object data. Logical query is to query all valid data records except logical deletion.

[0018] Step S110: Add a hash column for each new record in the database table. The field content of the hash column can be customized, and the hash value in ...

Embodiment 2

[0023] Embodiment 2 provides a database tamper-proof system applied to data security products, please refer to figure 2 , the system includes a device 200 for the database access layer to operate the database table under the logic operation described in the first embodiment; a device 210 for setting the hash column, writing the hash value and performing hash verification; for Means 220 for implementing conversion of bottom layer additions to logical operations.

Embodiment 3

[0025] Embodiment 3 provides a kind of product, please refer to image 3 , the product includes a memory 300 and a processor 310 . The memory 300 is used to store programs, and the processor 310 is used to execute the programs stored in the memory 300 to implement the method described in the first embodiment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A database tamper-proofing method applied to data security products is provided. The method comprises: designing a logic operation for a database table. The logic operation comprises logical addition, logical deletion, and logical modification. The logic addition is newly adding a valid data record; the logical deletion is newly adding a deletion record for representing that object data has been deleted; and the logical modification firstly executes logic deletion for recording that the object data has been deleted, and executes logic addition for recording modified object data and identifications of the object data. According to the technical scheme of the present invention, since only write permissions to the database table of ordinary users are retained, and each database table contains a data structure for implementing conversion from the bottom addition to the logic operation, so that only-addition operations are used to stimulate the addition, deletion and modification operations on the bottom of the datable table; and the hash value is recorded in the only-addition operation process to be taken as fingerprint verification to ensure the authenticity of the audit history, so that not only all operations of the database access layer are retained, but also tamperresistance in the whole process of the history of all the database objects is realized.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a database tamper-proof method and system applied to data security products. Background technique [0002] Now governments, enterprises and institutions generally adopt the method of attaching a bastion host, bypass monitoring and real-time backup system to the application system to monitor and audit the operation and maintenance of the application database to ensure the authenticity of historical data. Existing application systems with operation audit functions or audit data security application systems focus on the comprehensiveness of audit content and the display of audit content. Generally, bypass or data periodic backup methods are used to ensure the authenticity of historical data, but Data security is not guaranteed from the design model of the database, and there is still the possibility of historical data being used or tampered with in the operation and maintena...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/62G06F21/64
CPCG06F21/6218G06F21/64G06F16/2365
Inventor 谢宇波
Owner 四川盛世天成信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products