18608834. DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Christian Priebe of London (GB)

Kapil Vaswani of Cambridge (GB)

Manuel Silverio da Silva Costa of Cambridge (GB)

DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18608834 titled 'DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING

Simplified Explanation

The patent application describes a method for writing transaction log entries to a database system within a trusted execution environment, with the transaction log stored outside of this environment. It also includes a method for restoring the database system using transaction log entries and a secure count.

  • The method involves writing transaction log entries to a transaction log for a database system executed within a trusted execution environment.
  • The transaction log is stored outside of the trusted execution environment.
  • A secure count is maintained to track the number of transaction log entries written for committed transactions.
  • The method also includes restoring the database system using transaction log entries and the secure count.

Key Features and Innovation

  • Writing transaction log entries within a trusted execution environment.
  • Storing the transaction log outside of the trusted execution environment.
  • Maintaining a secure count to track transaction log entries for committed transactions.
  • Restoring the database system using transaction log entries and the secure count.

Potential Applications

This technology can be applied in various database systems that require secure transaction logging and restoration processes.

Problems Solved

This technology addresses the need for secure transaction logging and database system restoration within a trusted execution environment.

Benefits

  • Enhanced security for transaction log entries.
  • Reliable restoration of the database system.
  • Efficient tracking of transaction log entries for committed transactions.

Commercial Applications

Secure transaction logging and database system restoration technology can be utilized in industries such as finance, healthcare, and e-commerce to ensure data integrity and security.

Prior Art

Readers can explore prior art related to secure transaction logging, database system restoration, and trusted execution environments in the field of database management systems.

Frequently Updated Research

Stay informed about the latest advancements in secure transaction logging and database system restoration technologies to enhance data security and reliability.

Questions about Secure Transaction Logging and Database System Restoration

How does this technology improve data security in database systems?

This technology enhances data security by ensuring that transaction log entries are written and stored securely within a trusted execution environment.

What are the key benefits of using a secure count to track transaction log entries?

Using a secure count helps in efficiently monitoring and managing transaction log entries for committed transactions, ensuring data integrity and reliability.


Original Abstract Submitted

In various examples, there is provided a computer-implemented method for writing transaction log entries to a transaction log for a database system. At least part of the database system is configured to be executed within a trusted execution environment. The transaction log is stored outside of the trusted execution environment. The method maintains a first secure count representing a number of transaction log entries which have been written to the transaction log for transactions which have been committed to the database and writes a transaction log entry to the transaction log. In other examples, there is also provided is a computer-implemented method for restoring a database system using transaction log entries received from the transaction log and a current value of the first secure count.