Unlock instant, AI-driven research and patent intelligence for your innovation.

Database ciphertext direct indexing method

A database and ciphertext technology, applied in the field of data security

Pending Publication Date: 2021-03-26
航天科工网络信息发展有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method for direct indexing of database ciphertext, which is used to solve the problem of how to encrypt the database and perform efficient and safe data retrieval based on the ciphertext database in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database ciphertext direct indexing method
  • Database ciphertext direct indexing method
  • Database ciphertext direct indexing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] figure 1 Composition diagram for the database encryption system, such as figure 1 The database encryption system includes four modules: database market, database service, application management, and protocol identification and disposal. The entire working mode follows the principle of first creating an instance, then starting the service according to custom parameters, then binding the application, and finally completing the pre-proxy with the help of the protocol identification module The business process of data encryption and decryption.

[0026] The data tables and columns of configured policies exist in the form of ciphertext in the database storage, which prevents users who illegally obtain database permi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a dabase ciphertext direct indexing method, which comprises the following steps that: a security policy of data encryption and access control is performed in a security proxyservice on a user accessing a database through the security proxy service; the security proxy service stores the data in the database through an access interface of the database, and the security proxy service exists between a client application and a database storage engine to complete encryption and decryption work of the data in the database; the security proxy service firstly creates an instance, then starts the service according to self-defined parameters, then binds the application, and finally completes a pre-proxy data encryption and decryption service process by means of a protocol identification module; a data table column with the configured strategy exists in a ciphertext form in database storage; and the security proxy service encrypts the input plaintext data, the encryptiongranularity is a step-by-step iteration amount, and the granularity of each encryption and decryption is the component data of each record.

Description

technical field [0001] The invention relates to data security technology, in particular to a method for direct indexing of database ciphertext. Background technique [0002] At present, people pay more and more attention to the security issues of computer mass data storage, the anti-theft and anti-tampering of sensitive data. The database system is the core component of the computer information system, and the database file is the aggregate of information, and its security will be the top priority of the information industry. [0003] On top of the running operating system of the database management system, the operating system usually has security functions such as user registration, user identification, arbitrary access control (DAC), and auditing. Although the DBMS has added a lot of security measures on the basis of the OS, such as permission-based access control, etc., the OS and DBMS still lack effective protection measures for the database files themselves. Experienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F16/2453G06F16/22H04L9/06
CPCG06F21/602H04L9/0631H04L9/0643G06F16/2453G06F16/22
Inventor 刘金钟白杨
Owner 航天科工网络信息发展有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More