Method and apparatus for detecting data tampering within a database
First Claim
Patent Images
1. A method for detecting data tampering within a table in a database, the method comprising:
- hashing a row in the table to create a row-hash;
hashing a block of consecutive row-hashes to create a block-hash; and
signing the block-hash with an encryption key, wherein tampering with data in the row will result in an invalid row-hash and an invalid block-hash.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that facilitates detecting data tampering within a table in a database. The system operates by hashing a row in the table to create a row-hash. The system then hashes a block of consecutive row-hashes to create a block-hash. Finally, the system signs the block-hash with an encryption key, so that tampering with data in the row will result in an invalid row-hash and an invalid block-hash.
-
Citations
28 Claims
-
1. A method for detecting data tampering within a table in a database, the method comprising:
-
hashing a row in the table to create a row-hash; hashing a block of consecutive row-hashes to create a block-hash; and signing the block-hash with an encryption key, wherein tampering with data in the row will result in an invalid row-hash and an invalid block-hash. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for detecting data tampering within a table in a database, the method comprising:
-
hashing a row in the table to create a row-hash; hashing a block of consecutive row-hashes to create a block-hash; and signing the block-hash with an encryption key, wherein tampering with data in the row will result in an invalid row-hash and an invalid block-hash. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus configured to detect data tampering within a table in a database, comprising:
-
a row-hashing mechanism configured to hash a row in the table to create a row-hash; a block-hashing mechanism configured to hash a block of consecutive row-hashes to create a block-hash; and an encryption mechanism configured to sign the block-hash with an encryption key, wherein tampering with data in the row will result in an invalid row-hash and an invalid block-hash. - View Dependent Claims (18, 19, 20)
-
-
21. A method for detecting data tampering within a table in a database, the method comprising:
-
upon data being inserted into a row in the table, hashing the row to create a row-hash; and storing the row hash at a location associated with the row in the database; wherein tampering with data in the row will result in an invalid row-hash. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for detecting data tampering within a table in a database, the method comprising:
-
upon data being inserted into a row in the table, hashing the row to create a row-hash; and storing the row hash at a location associated with the row in the database; wherein tampering with data in the row will result in an invalid row-hash.
-
Specification