Secure database system
First Claim
1. A computer system comprising:
- (a) a server computer including a database;
(b) a plurality of client computers;
(c) a network connecting said client computers to said server computer;
(d) said database including at least one personal information table holding personal records containing information relating to a plurality of persons, each person being identified in said personal information table by a unique personal identifier value;
(e) said database also including a plurality of further tables, each of said further tables holding records containing further information relating to said persons, and each of said further tables having an encryption parameter associated therewith, said encryption parameter being different for each of said further tables;
(f) each of said client computers including encryption means for encrypting a personal identifier value using the encryption parameter of a selected one of said further tables, to generate an encrypted identifier value and means for sending the encrypted identifier value over said network to said server computer; and
(g) said server computer including access means for using said encrypted identifier value to access a record in the selected one of said further tables.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure database system comprises a server having a database including at least one personal information table and at least one further table containing information relating to the persons whose details are stored in the personal information table. The keys of the tables in the database are unrelated, so that it is impossible to determine solely from information in the server which record in the further table corresponds to which record in the personal information table. Thus, even if a hacker obtains access to the database, the hacker will not be able to relate information in the different tables. Each legitimate client uses an encryption process to convert a personal identifier value, which identifies the record relating to a particular person in the personal information table, into a pseudo-identifier value, which identifies a record relating to the same person in the further table.
49 Citations
10 Claims
-
1. A computer system comprising:
-
(a) a server computer including a database;
(b) a plurality of client computers;
(c) a network connecting said client computers to said server computer;
(d) said database including at least one personal information table holding personal records containing information relating to a plurality of persons, each person being identified in said personal information table by a unique personal identifier value;
(e) said database also including a plurality of further tables, each of said further tables holding records containing further information relating to said persons, and each of said further tables having an encryption parameter associated therewith, said encryption parameter being different for each of said further tables;
(f) each of said client computers including encryption means for encrypting a personal identifier value using the encryption parameter of a selected one of said further tables, to generate an encrypted identifier value and means for sending the encrypted identifier value over said network to said server computer; and
(g) said server computer including access means for using said encrypted identifier value to access a record in the selected one of said further tables. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of securely storing data in a database, the method comprising:
-
(a) storing a database in a server computer;
(b) said database including at least one personal information table holding personal records containing information relating to a plurality of persons, each person being identified in said personal information table by a unique personal identifier value;
(c) said database also including a plurality of further tables, each of said further tables holding records containing further information relating to said persons, and each of said further tables having an encryption parameter associated therewith, said encryption parameter being different for each of said further tables;
(d) in a client computer, encrypting a personal identifier value using the encryption parameter of a selected one of said further tables, to generate an encrypted identifier value, and sending the encrypted identifier value over a network to the server computer; and
(e) in said server computer, using said encrypted identifier value to access a record in the selected one of said further tables. - View Dependent Claims (7, 8, 9, 10)
-
Specification