Unlock instant, AI-driven research and patent intelligence for your innovation.

MySQL-based database encryption method

An encryption method and data encryption technology, applied in the field of database encryption, can solve the problem of inability to achieve seamless and non-perceptive, and achieve the effect of strict data encryption, high security, and improved protection ability

Inactive Publication Date: 2018-09-14
北京聚通达科技股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, DBSecurity is poor in being close to users, and cannot be seamless and unaware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MySQL-based database encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The present invention proposes a MySQL-based database encryption method, including table space data encryption, authority control, security services, transparent access and offline recovery; wherein,

[0025] Tablespace data encryption, tablespace-level encryption can be done for shared tablespaces, all data in the tablespace can be encrypted to enhance data security, table-level encryption can be done for shared tablespaces, which enhances security and is flexible at the same time sex;

[0026] Authority control, while not affecting the authority of the database itself, Anhuajin and the database encryption system have enhanced authority control, respectively enhancing authority from different levels such as database users, client IP, application systems, etc., comprehensively preventing unauthorized access and preventing data leakage ;

[0027] Security service, the security service component realizes key management, including encryption key generation, distribution, ...

Embodiment 2

[0036] The present invention proposes a MySQL-based database encryption method, including table space data encryption, authority control, security services, transparent access and offline recovery; wherein,

[0037] Tablespace data encryption can perform tablespace-level encryption for shared tablespaces, encrypt all data in the tablespace to enhance data security, and perform table-level encryption for shared tablespaces, which enhances security and is flexible at the same time ;

[0038] Authority control, while not affecting the authority of the database itself, Anhuajin and the database encryption system have enhanced authority control, respectively enhancing authority from different levels such as database users, client IP, application systems, etc., comprehensively preventing unauthorized access and preventing data leakage ;

[0039] Security service, the security service component realizes key management, including encryption key generation, distribution, backup, recov...

Embodiment 3

[0048] The present invention proposes a MySQL-based database encryption method, including table space data encryption, authority control, security services, transparent access and offline recovery; wherein,

[0049] Tablespace data encryption can perform tablespace-level encryption for shared tablespaces, encrypt all data in the tablespace to enhance data security, and perform table-level encryption for shared tablespaces, which enhances security and is flexible at the same time ;

[0050] Authority control, while not affecting the authority of the database itself, Anhuajin and the database encryption system have enhanced authority control, respectively enhancing authority from different levels such as database users, client IP, application systems, etc., comprehensively preventing unauthorized access and preventing data leakage ;

[0051] Security service, the security service component realizes key management, including encryption key generation, distribution, backup, recov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a MySQL database encryption method, and relates to the technical field of database encryption. The method included table space data encryption, permission control, security service, transparent access and offline recovery; the table space data encryption is used for conducting table space level encryption for shared table space, encrypting all data in the table space, enhancing data security, and conducting table level encryption for the shared table space; according to the permission control, without affecting the permission of a database itself, an x-Secure database encryption system enhances permission control, and permissions are enhanced from different layers of database users, client IP, application systems and the like; the method makes the location of the data encrypted closer to a user, the security is higher, the difficulty of implementing is larger, the data encryption location is gradually closer to the user, and the protection capability is graduallyimproved; compared with DBSecurity, the method is more closely related to the user, the method is basically seamless and is not perceived, and the data encryption is more strict.

Description

technical field [0001] The invention relates to the technical field of database encryption technology, in particular to a MySQL-based database encryption method. Background technique [0002] Jutongda DBSecurity is a data leakage prevention product based on transparent encryption technology. This product can realize encrypted storage of sensitive data in the database, enhanced access control, application access security, ciphertext access audit, and separation of powers. [0003] DBSecurity breaks through the traditional column encryption technology, adds data table (table space) transparent encryption and decryption capabilities, and is compatible with international encryption algorithms, with strong scene adaptability and compliance. [0004] Data encryption can effectively prevent internal data leakage caused by plaintext storage, data theft by high-privileged users, and prevent sensitive data leakage from the root. Through three-layer transparent view, ciphertext indexi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F17/30
CPCG06F21/6218
Inventor 侯战斌
Owner 北京聚通达科技股份有限公司