CN101512525B - 加密的数据搜索 - Google Patents

加密的数据搜索 Download PDF

Info

Publication number
CN101512525B
CN101512525B CN2007800328508A CN200780032850A CN101512525B CN 101512525 B CN101512525 B CN 101512525B CN 2007800328508 A CN2007800328508 A CN 2007800328508A CN 200780032850 A CN200780032850 A CN 200780032850A CN 101512525 B CN101512525 B CN 101512525B
Authority
CN
China
Prior art keywords
item
index
data
plaintext
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007800328508A
Other languages
English (en)
Chinese (zh)
Other versions
CN101512525A (zh
Inventor
E·D·克里斯托弗
L·B·克里斯托弗
T·杜塔
R·加西亚
S·L·胡苏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN101512525A publication Critical patent/CN101512525A/zh
Application granted granted Critical
Publication of CN101512525B publication Critical patent/CN101512525B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
CN2007800328508A 2006-09-06 2007-08-24 加密的数据搜索 Expired - Fee Related CN101512525B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/516,267 2006-09-06
US11/516,267 US7689547B2 (en) 2006-09-06 2006-09-06 Encrypted data search
PCT/US2007/076758 WO2008030717A1 (en) 2006-09-06 2007-08-24 Encrypted data search

Publications (2)

Publication Number Publication Date
CN101512525A CN101512525A (zh) 2009-08-19
CN101512525B true CN101512525B (zh) 2012-10-03

Family

ID=39153188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007800328508A Expired - Fee Related CN101512525B (zh) 2006-09-06 2007-08-24 加密的数据搜索

Country Status (7)

Country Link
US (1) US7689547B2 (enExample)
EP (1) EP2064638B1 (enExample)
JP (1) JP4810611B2 (enExample)
KR (1) KR101403745B1 (enExample)
CN (1) CN101512525B (enExample)
TW (1) TWI372345B (enExample)
WO (1) WO2008030717A1 (enExample)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082837A1 (en) 2006-09-29 2008-04-03 Protegrity Corporation Apparatus and method for continuous data protection in a distributed computing network
US7809142B2 (en) * 2007-06-19 2010-10-05 International Business Machines Corporation Data scrambling and encryption of database tables
US10262136B1 (en) * 2008-08-04 2019-04-16 Zscaler, Inc. Cloud-based malware detection
CN101770462A (zh) * 2008-12-30 2010-07-07 日电(中国)有限公司 用于密文索引和检索的装置和方法
CN101788985B (zh) * 2009-01-23 2013-01-23 日电(中国)有限公司 对加密倒排索引表进行k匿名更新的方法和装置
US9684710B2 (en) * 2009-05-28 2017-06-20 Microsoft Technology Licensing, Llc Extending random number summation as an order-preserving encryption scheme
JP5411034B2 (ja) * 2010-03-19 2014-02-12 株式会社日立ソリューションズ データベース暗号化システム及び方法
US8533489B2 (en) * 2010-09-29 2013-09-10 Microsoft Corporation Searchable symmetric encryption with dynamic updating
JP5348337B2 (ja) * 2010-12-13 2013-11-20 日本電気株式会社 暗号化データベース管理システム、クライアントおよびサーバ、自然結合方法およびプログラム
EP2738689A4 (en) 2011-07-29 2015-04-29 Nec Corp SYSTEM FOR GENERATING A DISPLAY OF INFORMATION RESISTANT INDEX, INDEX GENERATING DEVICE AND METHOD THEREFOR
US8832427B2 (en) 2012-03-30 2014-09-09 Microsoft Corporation Range-based queries for searchable symmetric encryption
EP2885732B1 (en) * 2012-08-15 2018-04-04 Visa International Service Association Searchable encrypted data
US8943331B2 (en) * 2012-12-28 2015-01-27 Alcatel Lucent Privacy-preserving database system
WO2014182419A1 (en) * 2013-05-06 2014-11-13 Thomson Reuters South Asia Private Limited Offline searching of encrypted content
US9553867B2 (en) 2013-08-01 2017-01-24 Bitglass, Inc. Secure application access system
US9552492B2 (en) * 2013-08-01 2017-01-24 Bitglass, Inc. Secure application access system
US10122714B2 (en) 2013-08-01 2018-11-06 Bitglass, Inc. Secure user credential access system
US9852306B2 (en) 2013-08-05 2017-12-26 International Business Machines Corporation Conjunctive search in encrypted data
US9646166B2 (en) * 2013-08-05 2017-05-09 International Business Machines Corporation Masking query data access pattern in encrypted data
CN104462990B (zh) * 2013-09-13 2019-02-26 腾讯科技(深圳)有限公司 字符串加解密方法和装置
WO2016018298A1 (en) * 2014-07-30 2016-02-04 Hewlett-Packard Development Company, L.P. Key search token for encrypted data
EP3195106B1 (en) 2014-09-15 2020-10-21 Demandware, Inc. Secure storage and access to sensitive data
US10013440B1 (en) * 2014-10-31 2018-07-03 Amazon Technologies, Inc. Incremental out-of-place updates for index structures
CN104572827B (zh) * 2014-12-08 2017-12-15 北京工业大学 一种基于跨明文与密文的混合搜索系统
JP6441160B2 (ja) 2015-04-27 2018-12-19 株式会社東芝 秘匿化装置、復号装置、秘匿化方法および復号方法
US9519798B2 (en) 2015-05-07 2016-12-13 ZeroDB, Inc. Zero-knowledge databases
KR101703828B1 (ko) * 2015-10-15 2017-02-08 한국전자통신연구원 암호화된 데이터에 대한 색인 태그 생성 방법, 색인 태그를 이용한 암호화된 데이터 검색 방법 및 이를 위한 데이터베이스 장치
WO2017193108A2 (en) 2016-05-06 2017-11-09 ZeroDB, Inc. Encryption for distributed storage and processing
US11392600B2 (en) * 2016-09-22 2022-07-19 Visa International Service Association Techniques for in memory key range searches
US10482279B2 (en) * 2016-11-08 2019-11-19 Microsoft Technology Licensing, Llc Pattern-less private data detection on data sets
US10360390B2 (en) * 2016-12-14 2019-07-23 Sap Se Oblivious order-preserving encryption
EP3388969B1 (en) 2017-04-13 2019-10-16 DSwiss AG Search system
EP3657475B1 (en) * 2017-09-12 2021-08-25 Mitsubishi Electric Corporation Data processing apparatus, data processing method, and data processing program
CN110858251B (zh) * 2018-08-22 2020-07-21 阿里巴巴集团控股有限公司 数据查询方法和装置
US10783270B2 (en) 2018-08-30 2020-09-22 Netskope, Inc. Methods and systems for securing and retrieving sensitive data using indexable databases
US11003783B1 (en) * 2018-09-21 2021-05-11 Amazon Technologies, Inc. Searchable encrypted data stores
US10977315B2 (en) 2019-03-01 2021-04-13 Cyborg Inc. System and method for statistics-based pattern searching of compressed data and encrypted data
EP4154147B1 (en) * 2020-06-29 2025-09-24 Huawei Technologies Co., Ltd. Data storage server and client devices for securely storing data
CN112182616B (zh) * 2020-09-29 2024-05-17 江苏大周基业智能科技有限公司 核心表数据的密码技术安全控制方法及系统
TWI835039B (zh) * 2021-06-16 2024-03-11 威聯通科技股份有限公司 索引節點配置方法、資料處理裝置與電腦可讀媒介
US12267420B2 (en) * 2022-12-09 2025-04-01 Yuen Ping Lee Systems and methods for programmable corporate policies and management intervention

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5692124A (en) * 1996-08-30 1997-11-25 Itt Industries, Inc. Support of limited write downs through trustworthy predictions in multilevel security of computer network communications
US6052686A (en) * 1997-07-11 2000-04-18 At&T Corporation Database processing using schemas
US6233658B1 (en) * 1997-06-03 2001-05-15 Nec Corporation Memory write and read control
US6601026B2 (en) * 1999-09-17 2003-07-29 Discern Communications, Inc. Information retrieval by natural language querying
US7065579B2 (en) * 2001-01-22 2006-06-20 Sun Microsystems, Inc. System using peer discovery and peer membership protocols for accessing peer-to-peer platform resources on a network

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
CA2000006C (en) * 1989-01-23 1994-07-12 Walter W. Chang Combinatorial signatures for data encoding and searching
US5293576A (en) * 1991-11-21 1994-03-08 Motorola, Inc. Command authentication process
US5475826A (en) 1993-11-19 1995-12-12 Fischer; Addison M. Method for protecting a volatile file using a single hash
NZ329808A (en) * 1993-12-01 1999-08-30 Rpk New Zealand Ltd Public key encryption system and mixture generator
US5495533A (en) 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
WO1996025801A1 (en) * 1995-02-17 1996-08-22 Trustus Pty. Ltd. Method for partitioning a block of data into subblocks and for storing and communicating such subblocks
US5742807A (en) * 1995-05-31 1998-04-21 Xerox Corporation Indexing system using one-way hash for document service
US5701469A (en) * 1995-06-07 1997-12-23 Microsoft Corporation Method and system for generating accurate search results using a content-index
JP3647940B2 (ja) * 1995-09-22 2005-05-18 富士通株式会社 データ管理装置
US5854916A (en) * 1995-09-28 1998-12-29 Symantec Corporation State-based cache for antivirus software
US5864852A (en) * 1996-04-26 1999-01-26 Netscape Communications Corporation Proxy server caching mechanism that provides a file directory structure and a mapping mechanism within the file directory structure
US6012057A (en) * 1997-07-30 2000-01-04 Quarterdeck Corporation High speed data searching for information in a computer system
JP3056704B2 (ja) * 1997-08-25 2000-06-26 三菱電機株式会社 データ管理装置
US6233685B1 (en) 1997-08-29 2001-05-15 Sean William Smith Establishing and employing the provable untampered state of a device
JPH11143780A (ja) * 1997-11-05 1999-05-28 Hitachi Ltd データベースにおける秘密情報管理方法およびデータベースの秘密情報管理装置
WO1999026207A1 (en) * 1997-11-19 1999-05-27 Rsa Security Inc. Digital coin tracing using trustee tokens
JP3849279B2 (ja) * 1998-01-23 2006-11-22 富士ゼロックス株式会社 インデクス作成方法および検索方法
JP3457184B2 (ja) * 1998-06-25 2003-10-14 シャープ株式会社 検索装置及びその制御プログラムを記憶した媒体
US7152165B1 (en) 1999-07-16 2006-12-19 Intertrust Technologies Corp. Trusted storage systems and methods
US20010042099A1 (en) * 2000-02-02 2001-11-15 Doongo Technologies, Inc. Apparatus and methods for optimizing traffic volume in wireless email communications
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
US7043641B1 (en) * 2000-03-08 2006-05-09 Igt Encryption in a secure computerized gaming system
US6968456B1 (en) 2000-08-08 2005-11-22 Novell, Inc. Method and system for providing a tamper-proof storage of an audit trail in a database
US7362868B2 (en) 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US6928428B1 (en) * 2000-11-27 2005-08-09 Microsoft Corporation Distributed confidential contextual querying
JP2005502096A (ja) * 2001-01-11 2005-01-20 ゼット−フォース コミュニケイションズ インコーポレイテッド ファイルスイッチ及び交換ファイルシステム
US7360075B2 (en) * 2001-02-12 2008-04-15 Aventail Corporation, A Wholly Owned Subsidiary Of Sonicwall, Inc. Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7062490B2 (en) * 2001-03-26 2006-06-13 Microsoft Corporation Serverless distributed file system
GB2377514B (en) * 2001-07-05 2005-04-27 Hewlett Packard Co Document encryption
US7266699B2 (en) 2001-08-30 2007-09-04 Application Security, Inc. Cryptographic infrastructure for encrypting a database
US7269729B2 (en) 2001-12-28 2007-09-11 International Business Machines Corporation Relational database management encryption system
US20030159054A1 (en) * 2002-02-19 2003-08-21 Minebea Co. Reconfigurable secure input device
US7287033B2 (en) * 2002-03-06 2007-10-23 Ori Software Development, Ltd. Efficient traversals over hierarchical data and indexing semistructured data
JP4077329B2 (ja) * 2003-01-31 2008-04-16 株式会社東芝 トランザクション処理システム、並行制御方法及びプログラム
US20030177115A1 (en) * 2003-02-21 2003-09-18 Stern Yonatan P. System and method for automatic preparation and searching of scanned documents
US20050004924A1 (en) * 2003-04-29 2005-01-06 Adrian Baldwin Control of access to databases
US10339336B2 (en) 2003-06-11 2019-07-02 Oracle International Corporation Method and apparatus for encrypting database columns
US7743069B2 (en) 2004-09-03 2010-06-22 Sybase, Inc. Database system providing SQL extensions for automated encryption and decryption of column data
US7571490B2 (en) 2004-11-01 2009-08-04 Oracle International Corporation Method and apparatus for protecting data from unauthorized modification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5692124A (en) * 1996-08-30 1997-11-25 Itt Industries, Inc. Support of limited write downs through trustworthy predictions in multilevel security of computer network communications
US6233658B1 (en) * 1997-06-03 2001-05-15 Nec Corporation Memory write and read control
US6052686A (en) * 1997-07-11 2000-04-18 At&T Corporation Database processing using schemas
US6601026B2 (en) * 1999-09-17 2003-07-29 Discern Communications, Inc. Information retrieval by natural language querying
US7065579B2 (en) * 2001-01-22 2006-06-20 Sun Microsystems, Inc. System using peer discovery and peer membership protocols for accessing peer-to-peer platform resources on a network

Also Published As

Publication number Publication date
EP2064638A1 (en) 2009-06-03
JP2010503118A (ja) 2010-01-28
JP4810611B2 (ja) 2011-11-09
TWI372345B (en) 2012-09-11
EP2064638A4 (en) 2016-05-04
US20080059414A1 (en) 2008-03-06
TW200817949A (en) 2008-04-16
KR101403745B1 (ko) 2014-06-03
WO2008030717A1 (en) 2008-03-13
US7689547B2 (en) 2010-03-30
EP2064638B1 (en) 2019-03-27
CN101512525A (zh) 2009-08-19
KR20090048623A (ko) 2009-05-14

Similar Documents

Publication Publication Date Title
CN101512525B (zh) 加密的数据搜索
CN101529423B (zh) 有范围查找
US7519835B2 (en) Encrypted table indexes and searching encrypted tables
Iyer et al. A framework for efficient storage security in RDBMS
US10985902B2 (en) Dynamic symmetric searchable encryption
US9720943B2 (en) Columnar table data protection
US7743069B2 (en) Database system providing SQL extensions for automated encryption and decryption of column data
US7797342B2 (en) Database system providing encrypted column support for applications
US8639947B2 (en) Structure preserving database encryption method and system
US9934388B2 (en) Method and system for database encryption
Shmueli et al. Implementing a database encryption solution, design and implementation issues
US7930560B2 (en) Personal information management system, personal information management program, and personal information protecting method
US20200210595A1 (en) CryptoJSON Indexed Search Systems and Methods
JP2006189925A (ja) 個人情報管理システム、個人情報管理プログラムおよび個人情報保護方法
Jang et al. An effective queries execution algorithm on the encrypted database
Waisenberg SPDE-A Structure Preserving Database Encryption Scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150507

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150507

Address after: Washington State

Patentee after: MICROSOFT TECHNOLOGY LICENSING, LLC

Address before: Washington State

Patentee before: Microsoft Corp.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121003

CF01 Termination of patent right due to non-payment of annual fee