Data migration
First Claim
Patent Images
1. A computer-implemented method for encrypting data from a database, said method comprising:
- providing a mechanism having computing resources that is divorced from resources of said database for performing encryption operations;
providing an automated tool that is associated with said mechanism for;
selecting target data for encryption;
selecting an encryption method for said target data;
specifying one or more characteristics for said selected encryption method; and
modifying a corresponding schema for each database column where said target data resides in a manner for accommodating said target data after said target is encrypted.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a mechanism for automating the conversion of the relational database to a secure relational database with little or no impact on the resources of the relational database during the conversion.
-
Citations
38 Claims
-
1. A computer-implemented method for encrypting data from a database, said method comprising:
-
providing a mechanism having computing resources that is divorced from resources of said database for performing encryption operations;
providing an automated tool that is associated with said mechanism for;
selecting target data for encryption;
selecting an encryption method for said target data;
specifying one or more characteristics for said selected encryption method; and
modifying a corresponding schema for each database column where said target data resides in a manner for accommodating said target data after said target is encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An encryption system for encrypting data in a database, the encryption system comprising:
-
a means for selecting target data for encryption;
a means for selecting an encryption method for said target data;
a means for specifying one or more characteristics for said selected encryption method; and
a means for modifying a corresponding schema for each database column where said target data resides in a manner for accommodating said target data after said target is encrypted. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. An apparatus for encrypting data in a database, the apparatus comprising:
-
one or more processors;
a storage for encryption keys;
an authentication mechanism for authenticating users who desire to access said database;
a database interface for interfacing with said database;
a management console for allowing an administrator to manage said data in said database;
a storage medium carrying one or more sequences of one or more instructions which, when executed by said one or more processors, cause said one or more processors to perform the steps of;
selecting target data for encryption;
selecting an encryption method for said target data;
specifying one or more characteristics for said selected encryption method; and
modifying a corresponding schema for each database column where said target data resides in a manner for accommodating said target data after said target is encrypted. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. One or more propagated data signals collectively conveying data that causes a computing system to perform a method for encrypting data from a database, said method comprising:
-
providing a mechanism having computing resources that is divorced from resources of said database for performing encryption operations;
providing an automated tool that is associated with said mechanism for;
selecting target data for encryption;
selecting an encryption method for said target data;
specifying one or more characteristics for said selected encryption method; and
modifying a corresponding schema for each database column where said target data resides in a manner for accommodating said target data after said target is encrypted. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification