DATABASE INTEGRATION WITH AN EXTERNAL KEY MANAGEMENT SYSTEM

    公开(公告)号:US20220329413A1

    公开(公告)日:2022-10-13

    申请号:US17228986

    申请日:2021-04-13

    Applicant: SAP SE

    Abstract: The present disclosure involves systems, software, and computer implemented methods for database integration with an external key management system. One example method includes receiving, by a database system, a key encryption key from an external key management system external to the database system that is used to encrypt a data encryption key used to encrypt database data. The data encryption key is obtained, by the database system, using the key encryption key. Encrypted database data is decrypted, by the database system and using the data encryption key, to obtain decrypted database data before performing an operation on the decrypted database data. The database system determines that the external key management system has performed an operation on the key encryption key. In response to determining that the external key management system has performed the operation on the key encryption key, the database system modifies operation of the database system.

    KEY MANAGEMENT CONFIGURATIONS
    12.
    发明申请

    公开(公告)号:US20210099289A1

    公开(公告)日:2021-04-01

    申请号:US16590047

    申请日:2019-10-01

    Applicant: SAP SE

    Abstract: A method, a system, and a computer program product for performing key management configurations. One or more encryption keys for encrypting one or more data payloads for accessing one or more databases are received. The received encryption keys are compared to a plurality of encryption keys associated with the databases. Based on the comparison, a configuration of at least one database is changed using the received encryption keys. The changed configuration is stored.

    Column protection
    13.
    发明授权

    公开(公告)号:US10235531B2

    公开(公告)日:2019-03-19

    申请号:US15202498

    申请日:2016-07-05

    Applicant: SAP SE

    Abstract: Methods, systems, and apparatus, including computer program products, are provided for configuring access controls to a database. In one aspect there is provided a method. The method may include receiving, from a first user, a table declaration for creating a database table in a database; generating, based on the table declaration, the database table; receiving, from the first user, a specification of one or more access mechanisms that have a privilege to access the database table; receiving a designation of at least one column in the database table as a protected column and one or more users who have a privilege to access the content of the protected column; and providing control over access to the content of the protected column based at least in part on the specification of the one or more access mechanisms and the designation of the at least one column and the second user.

    Secure Database Featuring Separate Operating System User

    公开(公告)号:US20180131517A1

    公开(公告)日:2018-05-10

    申请号:US15347431

    申请日:2016-11-09

    Applicant: SAP SE

    Abstract: Embodiments manage access to cryptography keys for database data, within a secure key store of a local key server owned by a new (security) operating system (OS) user separate from an original default OS user. Existing principles governing distinct OS user access privileges engrained within the OS itself, are leveraged to preclude the default OS user from accessing files of the new security OS user. Embodiments thus segregate the right to read secure cryptography keys of a secure key store, from the right to administer database installation on the OS level. While the original default OS user retains access to the encrypted data, the new security OS user now owns the cryptography key necessary to decrypt that database data. Thus, the default OS user is denied enough information to unlock the database data, enhancing its security. Embodiments are particularly useful for promoting data security in cloud setups and multi-tenant databases.

Patent Agency Ranking