Database storage security encryption method

A security encryption and database technology, applied in the field of database storage security encryption, can solve the problems of difficult transplantation and cumbersome operation, and achieve the effect of good portability and protection of sensitive data

Inactive Publication Date: 2018-10-02
广州市冰海网络技术有限公司
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, non-transparent encryption requires the user to explicitly provide information about the encryption algorithm, and the operation is cumbersome. For existing application systems, transplantation is also very difficult, and non-transparent encryption has restrictions on the data type of the encrypted object, generally only VARCHAR or VARBINARY type

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database storage security encryption method
  • Database storage security encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] ①User 1 defines a table Table1 that stores sensitive data, and specifies the encryption algorithm used to encrypt the data in Table1 when defining Table1;

[0022] ②User 2 logs in to the database, and uses his own key to perform operations such as insertion and query on Table1. In the process of insertion and query, the database management system automatically invokes the encryption algorithm of Table1 and uses the key of user 2 to complete the encryption and decryption process;

[0023] ③ After user 3 logs in to the database, he wants to view the data inserted by user 2 in table Table1.

[0024] When the data is uploaded, the system cannot correct the data inserted by user 2 because it does not know the decryption key of user 2.

[0025] Decryption, so that the sensitive data of user 2 cannot be obtained. Similarly, user 2 does not know the solution of user 3

[0026] When encrypting the key, it is also impossible to view the sensitive data stored in Table 1 by User...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database storage security encryption method. According to the method, related information of an encryption algorithm is associated with an encrypted object, and the association operation is preset by a database manager; a key is associated with user information, and the association operation is preset by a user; the related information of the encryption algorithm and thekey are stored separately; and when the encrypted object needs to be encrypted and decrypted, the related information of the encryption algorithm and the key are combined for use. The related information of the encryption algorithm and the key are stored separately, and when the encrypted object needs to be encrypted and decrypted, the related information of the encryption algorithm and the key are combined for use, so that different encryption algorithms can be adopted for different encrypted objects, the use is very flexible, an existing application system does not need to be changed, the portability is very high, private sensitive data of the user can be well protected, and the data type of the encrypted object is not limited.

Description

technical field [0001] The invention relates to the technical field of database application, in particular to a method for securely encrypting database storage. Background technique [0002] In database application environments such as government, military, and enterprises, a large amount of sensitive data is stored in the database, and once the data is obtained by an opponent, it will cause catastrophic losses. In order to protect these sensitive data, major secure database vendors provide storage encryption methods to encrypt sensitive data. Currently provided encryption methods can be classified into transparent encryption and non-transparent encryption. [0003] Transparent encryption refers to saving the relevant information and keys of the encryption algorithm in the database. When the user operates on sensitive data, the database management system automatically completes the encryption and decryption process, which is invisible to the user. Transparent encryption ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06
CPCG06F21/602G06F21/6218H04L63/0478H04L63/068
Inventor 陈焕耀
Owner 广州市冰海网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products