Using SHA-512 is a good idea to get a cryptographically strong hash, but your choice of salt does not add extra protection. In particular, salt is only good if its value is random and cannot be predicted in advance. This allows an attacker to pre-compute a table of known hashes with which you can try to attack your database. If the salt is known, then the attacker can simply precompute the hash value table with a solid salt relationship.
, . , () , SHA-512 . , .
, , , , . , , , , , . , , , , (, 128 ), , . SHA-512, ( " " ), .