A method and device for securely accessing sqlite database files

A security access and database technology, applied in the field of SQLite database file security access, can solve the problems of no hardware protection of keys, data leakage, security risks, etc., and achieve the effect of avoiding data security problems and high security

Active Publication Date: 2022-03-15
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The original free version of SQLite has a fatal shortcoming: it does not support encryption, so that the data stored in SQLite can be viewed by anyone with any text editor. The paid version of SQLite and open source software that implements encryption through the encryption interface provided by SQLite , realized the encryption database based on the international standard algorithm DES, SHA512, etc., but the algorithm is implemented as pure software, there are certain security risks, the generation and storage of the key is not protected by hardware, the key has a great risk of leakage, through Static analysis, dynamic debugging, or HOOK technology can obtain the key, so charging based on international standard algorithms or open source encrypted database SQLite has great security risks, which may easily cause data leakage or data tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for securely accessing sqlite database files
  • A method and device for securely accessing sqlite database files
  • A method and device for securely accessing sqlite database files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0051] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0052] The first aspect of the present invention proposes a kind of safe access method of SQLite database file, adopts the safe access method of SQLite database file based on hardware cryptographic m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a secure access method and device for SQLite database files, wherein the method includes: calling a hardware cryptographic module to generate an original encryption key when using SQLite for the first time, and using the provided SM1 algorithm and device master key, Encrypt the original key and store it with the hardware encryption module. When using it later, check whether the hardware encryption module is inserted and verify the PIN code. When writing the SQLite database file, calculate the 16 characters of the first page of the SQLite database file storage structure. To save the salt value, perform the bitwise AND of the generated original key and the salt value, perform three PBKDF2‑HMAC‑SM3 operations to generate the final SQLite database file encryption key, and then call the final database encryption key pair to the The file content of the SQLite database is to be encrypted page by page, and the message check code of the ciphertext of each page of the SQLite database is generated using the HMAC‑SM3 algorithm. Through the check code, the integrity of the SQLite database ciphertext is verified when the encrypted data file is decrypted. verify.

Description

technical field [0001] The invention relates to the field of embedded databases, in particular to a method and device for safely accessing SQLite database files. Background technique [0002] SQLite is an embedded lightweight database, which is widely used in Android and PC applications. It is also a built-in database in browsers such as Android system, Chrome, and Jinshi. It is an in-process library that realizes self-sufficiency, serverless, and zero configuration. , Transactional SQL database engine. It is a zero-configuration database, which means that like other databases, it does not need to be configured in the system. [0003] The original free version of SQLite has a fatal shortcoming: it does not support encryption, so that the data stored in SQLite can be viewed by anyone with any text editor. The paid version of SQLite and open source software that implements encryption through the encryption interface provided by SQLite , realized the encryption database based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6227
Inventor 杨飞廖正赟张彦斗王超江淋
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products