Transparent encryption using secure encryption device
First Claim
Patent Images
1. A computer-implemented method for allowing an application program to access sensitive data in a database in a manner that is transparent to said application program and said database, said method comprising:
- instantiating a view, when said application program attempts to access said sensitive data, wherein said view corresponds to a source table in said database and wherein said source table is where said sensitive data resides as encrypted data;
populating said view with decrypted data corresponding to said sensitive data if said application program is authenticated; and
revealing said view to said authenticated application program.
10 Assignments
0 Petitions
Accused Products
Abstract
A system and method for allowing application programs that are external to the relational database to access the sensitive data in the database in a seamless fashion are described. The application programs are allowed to use existing query statements without having to modify such statements for accessing encrypted data in the relational database.
-
Citations
37 Claims
-
1. A computer-implemented method for allowing an application program to access sensitive data in a database in a manner that is transparent to said application program and said database, said method comprising:
-
instantiating a view, when said application program attempts to access said sensitive data, wherein said view corresponds to a source table in said database and wherein said source table is where said sensitive data resides as encrypted data;
populating said view with decrypted data corresponding to said sensitive data if said application program is authenticated; and
revealing said view to said authenticated application program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A transparent encryption system for encrypting data in a database, the transparent encryption system comprising:
-
means for encrypting and decrypting data on demand from within said database in order to integrate said database into said transparent encryption system;
means for migrating data from one or more plaintext database table columns to corresponding one or more encrypted database table columns;
means for automating subsequent encrypt and decrypt operations on said database after integrating said database into said transparent encryption system; and
means for authenticating users so that only authorized users are able to access encrypted data in said integrated database.
-
-
17. A transparent encryption system for encrypting data in a database, the transparent encryption system comprising:
-
means for instantiating a view, when an application program attempts to access sensitive data, wherein said view corresponds to a source table in a database and wherein said source table is where said sensitive data resides as encrypted data;
means for populating said view with decrypted data corresponding to said sensitive data if said application program is authenticated; and
means for revealing said view to said authenticated application program. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. One or more propagated data signals collectively conveying data that causes a computing system to perform a method for allowing an application program to access sensitive data in a database in a manner that is transparent to said application program and said database, the method comprising:
-
instantiating a view, when said application program attempts to access said sensitive data, wherein said view corresponds to a source table in said database and wherein said source table is where said sensitive data resides as encrypted data;
populating said view with decrypted data corresponding to said sensitive data if said application program is authenticated; and
revealing said view to said authenticated application program. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification