Method for reencryption of a database
First Claim
1. A method for encryption of the content in a 7 days by 24 hours operational database, comprising the steps of:
- deciding the length of a time period to be used by the encryption method;
for each time period generating at least one encryption key to be used when entering new database items to the database;
storing information about the encryption key used for entering new items in the database in association with the item;
associating each encryption key with a life time value, indicating the number of time periods during which the key will be valid;
after entering a new time period, scanning the database to discover items with no longer valid encryption keys; and
replacing such discovered invalid keys with keys assigned to the current time period.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method for encryption of the content in a database, for accomplishing increased protection against unauthorised access to the data. The method assures that every row and item is re-encrypted with a valid key. More specifically this process, the so-called KeyLife process, is executed every time a row is inserted, updated or retrieved after a scanning operation. The key life value, defining the number of days a key is valid for each item, could differ for the items, and could typically be between 30 and 90 days. The scanning operation, checking the validity of the presently used keys, the so-called KeyLife checking, is executed each time a new key generation is created.
32 Citations
11 Claims
-
1. A method for encryption of the content in a 7 days by 24 hours operational database, comprising the steps of:
-
deciding the length of a time period to be used by the encryption method; for each time period generating at least one encryption key to be used when entering new database items to the database; storing information about the encryption key used for entering new items in the database in association with the item; associating each encryption key with a life time value, indicating the number of time periods during which the key will be valid; after entering a new time period, scanning the database to discover items with no longer valid encryption keys; and replacing such discovered invalid keys with keys assigned to the current time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification