Method and system for providing a tamper-proof storage of an audit trail in a database
First Claim
1. A method for providing a tamper-proof storage of an audit trail having one or more records for a database system, the integrity of the audit trail being vulnerable to actions taken by an access-privileged user, the method comprising:
- creating an initial authentication token and initial validation token for the audit trail from a Pseudo Random Number, a Timestamp, and a preliminary authentication token;
saving the initial authentication token as a current authentication token in a predetermined format in a secured information storage;
generating one or more validation tokens and authentication tokens sequentially from the initial authentication token and the initial validation token through a combination of at least one hashing process and at least one encryption process;
integrating the generated validation tokens in the records of the audit trail by a writing machine which is decoupled from the database and inaccessible by the user; and
validating, by an authorized auditor, the records of the audit trail by using the generated validation tokens in order to detect a tampering of the audit trail,wherein a writing and reading access to the secured information storage is given to the writing machine and only a reading access is given to the auditor, and wherein the Pseudo Random Number, the Timestamp, and the preliminary authentication token are saved in the secured information storage.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system is provided for a tamper-proof storage of one or more records of an audit trail in a database. Since the integrity of the database records may be vulnerable to actions taken by a user such as a privileged database administrator, a mechanism is provided to efficiently detect any changes made by him to the database records. The method creates one or more authentication tokens, and generates one or more validation tokens from the authentication tokens through a combination of a hashing process and an encryption process. Once the validation tokens are created, they are further integrated into the records in the database. The authentication tokens are written to a secured information storage in a predetermined format by a writing machine inaccessible by the user but accessible by the auditor. When an authorized person such as an independent auditor who needs to check the integrity of the records, he can detect a tampering of the records by comparing a validation token computed from the stored validation token with the validation token integrated in the record.
70 Citations
17 Claims
-
1. A method for providing a tamper-proof storage of an audit trail having one or more records for a database system, the integrity of the audit trail being vulnerable to actions taken by an access-privileged user, the method comprising:
-
creating an initial authentication token and initial validation token for the audit trail from a Pseudo Random Number, a Timestamp, and a preliminary authentication token; saving the initial authentication token as a current authentication token in a predetermined format in a secured information storage; generating one or more validation tokens and authentication tokens sequentially from the initial authentication token and the initial validation token through a combination of at least one hashing process and at least one encryption process; integrating the generated validation tokens in the records of the audit trail by a writing machine which is decoupled from the database and inaccessible by the user; and validating, by an authorized auditor, the records of the audit trail by using the generated validation tokens in order to detect a tampering of the audit trail, wherein a writing and reading access to the secured information storage is given to the writing machine and only a reading access is given to the auditor, and wherein the Pseudo Random Number, the Timestamp, and the preliminary authentication token are saved in the secured information storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program for providing a tamper-proof storage of an audit trail having one or more records for a database, the integrity of the trail being vulnerable to actions taken by an access-privileged user, the program comprising:
-
program means for creating an initial authentication token and initial validation token of the audit trail from a Pseudo Random Number, a Timestamp, and a preliminary authentication token; program means for saving the initial authentication token as a current authentication token in a predetermined format in a secured information storage; program means for generating one or more validation tokens and authentication tokens sequentially from the initial authentication token and the initial validation token through a combination of at least one hashing process and at least one encryption process; program means for integrating the generated validation tokens in the records of the audit trail by a writing machine which is decoupled from the database and inaccessible by the user; and program means for validating, by an authorized auditor, the records of the audit trail by using the generated validation tokens in order to detect a tampering of the audit trail, wherein a writing and reading access to the secured information storage is given to the writing machine and only a reading access is given to the auditor, and wherein the Pseudo Random Number, the Timestamp, and the preliminary authentication token are saved in the secured information storage. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer system for providing a tamper-proof storage of an audit trail having one or more records for a database, the integrity of the trail being vulnerable to actions taken by an access-privileged user, the system comprising:
-
means for creating an initial authentication token and initial validation token of the audit trail from a Pseudo Random Number, a Timestamp, and a preliminary authentication token; a secured information storage means for saving the initial authentication token as a current authentication token in a predetermined format; means for generating one or more validation tokens and authentication tokens sequentially from the initial authentication token and the initial validation token through a combination of at least one hashing process and at least one encryption process; means for integrating the generated validation tokens in the records of the audit trail; and means for validating, by an authorized auditor, the records of the audit trail by using the generated validation tokens in order to detect a tampering of the audit trail, wherein the secured information storage is inaccessible by the user but accessible by the auditor, a writing and reading access to the secured information storage is only given to a writing machine which is decoupled from the database and inaccessible by the user, and wherein the Pseudo Random Number, the Timestamp, and the preliminary authentication token are saved in the secured information storage.
-
Specification