Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

118 results about "Database encryption" patented technology

Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted. It can therefore be said that the purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions. The act of encrypting a database also reduces the incentive for individuals to hack the aforementioned database as "meaningless" encrypted data is of little to no use for hackers. There are multiple techniques and technologies available for database encryption, the most important of which will be detailed in this article.

Database encryption system, method and program

Provided is a system for suppressing database information leakage, and improving processing efficiency. A user system (20) for connecting to a database system (10) via a network (30) is provided with means (23, 24) for managing key information for encryption and decryption, and a storage unit (25) for storing the safety setting information for data and/or metadata. The user system (20) is further provided with an application response means (22) for: determining whether encryption of a database operation command is necessary; selecting an encryption algorithm according to the data and/or metadata when encryption is necessary, transmitting the database operation command to a database control means (12) after encryption thereof, and executing the database (11) operation; transmitting the database operation command to the database control means (12) when encryption is not necessary, and executing the database operation; receiving a processing result transmitted by the database control means; executing the necessary decryption or conversion when decryption or conversion of the processing result data and/or metadata is necessary; and returning the processing result data and/or metadata as a response to the database operation command. The user system (20) is also provided with a safety setting means (26) for setting the safety information for data stored in the database.
Owner:NEC CORP

Encipherment protection system and encipherment protection method for database in cloud computing environment

ActiveCN102722576ASolve the encryption protection problemAffect performance degradationComputer security arrangementsTransmissionPlaintextCiphertext
The invention provides an encipherment protection system and an encipherment protection method for a database in a cloud computing environment. The encipherment protection system provided by the invention comprises an application interface, a task management subsystem, a resource management subsystem and an encipherment engine pool. The encipherment protection system provided by the invention has the following advantages that 1. the encipherment protection system adopts the encipherment engine pool so as to avoid that the database performance is reduced by the influence of the overload operation of encipherment and decryption modules; 2. an application system is entirely transparent to final users of the database, so that the conversion between clear test and cipher text can be carried out according to the requirements; 3. the encipherment engine pool is fully independent from the database and the application system, so that the encipherment function of data can be realized without changing the database and the application system; 4. the encipherment engine pool constructed by using virtualization technologies has favorable manageability and elasticity, and can be constructed according to the requirements, the bottleneck problems of the fine granularity and the large concurrency access in the application of a relational database are solved, resources can be reasonably used, and the capability and the efficiency of a database server are enhanced.
Owner:XIAN FUTURE INT INFORMATION CO LTD +1

Ciphertext indexing method for database encryption and in-base encryption system

The invention relates to a ciphertext indexing method for database encrypted fields and an in-base encryption system and belongs to the field of information security technology. According to the method, first, identification ID is mapped to encryption ID based on an encrypted field P1, (encryption ID, Hash value) is saved into a T2(ID2, P2), finally, a ciphertext index table T2 is established, and the table where the encrypted field P1 exists is recorded as T1, wherein the table T2 comprises a ciphertext index field P2, and fields ID2 in one-to-one correspondence with records in the T1 are recorded in the T2; and then, content of a to-be-encrypted field is mapped to the Hash value based on an order-preserving Hash function, equivalent query and range query of the encrypted field are realized based on the Hash value obtained after the record of the content of the to-be-encrypted field is mapped to the Hash value based on an encryption function, decryption is performed on the recorded ID2 according to query results to obtain a record set in the T1, and the record set is returned. Compared with the prior art, the method is good in reliability and high in universality, meanwhile has high security and can guarantee extremely high retrieval and storage efficiency.
Owner:戴林

Field-level database encryption device

The invention is suitable for the field of information security and provides a field-level database encryption device, which comprises a user information storage unit, a database field encryption setting unit and a database access preprocessor, wherein the user information storage unit is used for storing database encryption symmetric keys which are encrypted through user public keys; the database field encryption setting unit is used for setting whether fields in a database are encrypted or not; and the database access preprocessor is used for conducting encryption conversion or decryption conversion to database access statements according to the decrypted database encryption symmetric keys and field encryption setting information in the database field encryption setting unit. By using the field-level database encryption device, a user can select different symmetric encryption algorithms supported by a database system according to demands for different encryption intensities, an application program does not need to conduct encryption or decryption operation to the database, all data encryption and decryption operations are completed by the database system, a full-text retrieval function of data items can be supported, and the original database access statements are not needed to be changed and can be directly and transparently used.
Owner:SHENZHEN LIMING NETWORK SYST CO LTD +1

Security protection method and system for light-weight database

The invention provides a security protection method and system for a light-weight database, and relates to the technical field of information security. The method includes the steps that firstly, a user has access to the database through a database access agency; secondly, the database access agency verifies the security of a running platform where a client-side is located through a remote authentication platform before responding to the operation conducted by the user on the database; thirdly, the database must be decoded before the operation conducted by the user is responded due to the fact that the database is a ciphertext database; fourthly, the running platform where the database is located needs to verify the security of the running platform before the database is decoded, if the running platform is safe, decoding is conducted on the database and the user operation is conducted, and the database is encoded and stored again after the operation is completed. The system comprises a remote authentication subsystem and a database encoding protection subsystem. After the method and system are adopted, the security of the database can be enhanced, the security of the running platform where the client-side is located and the security of the running platform where the database is located are verified before the user has access to the database, and therefore the potential safety hazards caused by undemanding identity authentication and the platforms which may have been broken through can be avoided.
Owner:NO 709 RES INST OF CHINA SHIPBUILDING IND CORP

Secure data mirroring method with key negotiation function

The invention discloses a secure data mirroring method with a key negotiation function. The system comprises a master database encryption module, a master database security mirroring module, a slave database security mirroring module and a slave database decryption module. The main database encryption module is responsible for performing encryption preprocessing and grouping encryption on data ofa main database based on a CBC mode, and transmitting the data in a ciphertext mode to ensure confidentiality; the slave database decryption module is responsible for decrypting and verifying the integrity of the mirror image data and restoring the mirror image data based on the CBC mode, and has the capability of resisting replay attack; the master database encryption module and the slave database decryption module distribute session keys through the key forwarding center to ensure the safety of key distribution; and the master database security mirroring module and the slave database security mirroring module avoid data leakage through authorization and encrypted mirroring data transmission. The invention provides an encrypted data mirroring method which realizes safe data synchronization and is suitable for master-slave replication among all databases.
Owner:SOUTHEAST UNIV

Data acquisition system for electricity vending system, self-upgrade type electricity vending system and upgrading method

The invention discloses a data acquisition system for an electricity vending system. The data acquisition system comprises a client application end, a server end and an electricity vending terminal, wherein the client application end is in communication and connection with the electricity vending terminal through the server end. The invention further discloses a self-upgrade type electricity vending system utilizing the data acquisition system and an automatic upgrading method thereof. The server end of the data acquisition system disclosed by the invention can provide the access to a main station terminal database, encryption service and the like through a provided WEB-SERVICE interface so as to respond to different requests of a client; and after a server receives the request, corresponding data or parameters can be obtained, and an electricity vending TOKEN code is further required in an encrypted way. According to the data acquisition system disclosed by the invention, mounting and use of the client can be facilitated; and simultaneously, data communication between the client and the server is of required data which is in TOKEN way purely, picture graphs, tables or other unrelated stream media data are not involved, and data traffic and bandwidth are saved.
Owner:WAHLAP TECH CO LTD +1

Automatic management device of lead-acid power batteries

The invention discloses an automatic management device of lead-acid power batteries. The automatic management device comprises a data base, an acquisition module, an encryption and decryption module, a data processing module and a display, wherein the data base is used for storing digital certificates and maintaining the digital certificates in the data base via a management interface; the acquisition module is used for acquiring parameter data of the lead-acid power batteries by a two-wire system and uploading the parameter data to the data base; the encryption and decryption module is used for encrypting and / or decrypting the parameter data by using the digital certificates; the data processing module is used for paying the encryption and decryption module for separate passwords, receiving and processing the parameter data and then sending the processing results to the display; the display is used for receiving and displaying the processing results. The automatic management device has the beneficial effects that the parameter data is encrypted and / or decrypted by using the digital certificates so as to achieve safety management of the device, thus improving the safety of the automatic management device of the lead-acid power batteries.
Owner:GUANGXI UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products