Secure data mirroring method with key negotiation function

A technology for key negotiation and secure data, applied in key distribution, can solve problems such as poor platform compatibility, poor real-time performance, and leakage of sensitive information, and achieve the effects of secure data synchronization, data synchronization, and data leakage avoidance

Active Publication Date: 2019-07-09
SOUTHEAST UNIV
View PDF16 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] Aiming at the technical problems of the above data mirroring method such as poor security, sensitive information leakage, large system overhead, poor platform compatibility, poor versatility, high complexity, poor operability, slow system response rate, and poor real-time performance, the present invention is based on trusted The data encryption technology of the third-p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data mirroring method with key negotiation function
  • Secure data mirroring method with key negotiation function
  • Secure data mirroring method with key negotiation function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0053] Based on the data encryption technology of the trusted third-party key forwarding center and the synchronization technology based on log files, the present invention provides a secure data mirroring method with a key negotiation function; the method uses the trusted third-party key forwarding center Complete the identity authentication of the master database and the slave database, and provide a customized one-time pad scheme to enable the master and slave databases to share session keys to ensure the security of key distribution, and complete the mirror authorization and data encryption of the master and slave databases through encryption. Transmission, based on a customized one-time pad scheme to achieve secure data synchronization and avoid data leakage; this method is based on log file synchronization data, whenever the user completes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure data mirroring method with a key negotiation function. The system comprises a master database encryption module, a master database security mirroring module, a slave database security mirroring module and a slave database decryption module. The main database encryption module is responsible for performing encryption preprocessing and grouping encryption on data ofa main database based on a CBC mode, and transmitting the data in a ciphertext mode to ensure confidentiality; the slave database decryption module is responsible for decrypting and verifying the integrity of the mirror image data and restoring the mirror image data based on the CBC mode, and has the capability of resisting replay attack; the master database encryption module and the slave database decryption module distribute session keys through the key forwarding center to ensure the safety of key distribution; and the master database security mirroring module and the slave database security mirroring module avoid data leakage through authorization and encrypted mirroring data transmission. The invention provides an encrypted data mirroring method which realizes safe data synchronization and is suitable for master-slave replication among all databases.

Description

[0001] Technical field: [0002] The invention relates to a safe data mirroring method with key negotiation function, which belongs to the field of computer network communication and information security. [0003] Background technique: [0004] Database mirroring is a data synchronization technology that automatically copies the entire database or some of its key data to another disk. Whenever the data in the primary database is updated, the database management system will automatically copy the updated data to ensure Consistency between mirrored data and primary data. Database mirroring is mainly used for data backup and coping with high concurrency scenarios. When the storage medium fails, the mirrored disk can continue to provide database availability. At the same time, the database management system automatically uses the mirrored disk for database repair, without shutting down the system and reinstalling the database copy. ; When the storage medium is not faulty, database...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08G06F16/27
CPCH04L63/0428H04L63/0884H04L63/06H04L63/083H04L67/1095H04L9/083
Inventor 蒋睿苏家琰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products