Method for self-contained access of database list row data

A technology of autonomous access control and access control, which is applied in the direction of electrical digital data processing, special data processing applications, instruments, etc. Row-level data, the effect of improved security

Active Publication Date: 2007-11-21
北京神舟航天软件技术股份有限公司
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this traditional table-level, attribute-level (column-level) granular object rights management can no longer fully meet the security requirements of today's database systems, especially database systems that integrate information from multiple heterogeneous databases. security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for self-contained access of database list row data
  • Method for self-contained access of database list row data
  • Method for self-contained access of database list row data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The invention modifies the database table, and adds a column in the data table to which the row-level autonomous access control strategy is applied, which is used to record the row-level authorization situation of each record row, so as to realize the row-level autonomous access control. At the same time, the offset of the database user in the database table is recorded in the row-level autonomous access control system table, and the permission information of the row recorded by the user is found through this offset.

[0023] The structure diagram of the row-level autonomous access control model is shown in Figure 1.

[0024] A database that uses row-level autonomous access contains the following data objects:

[0025] ●One system table: the row-level autonomous access control system table (sys_user_row_privilege), which is mainly used to record the information of the database table using the row-level access control policy, including: the name of the table to which the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for controlling active access of line grade data in databank table includes adding a control authority column of line grade access for enabling to use each databank table of line grade access control in order to record access control authority information of this line, granting relevant access authority and access type in databank table to user of databank, carrying out line grade access control on user according to line grade access authority granted to said user and control policy of said line grade access.

Description

technical field [0001] The invention relates to an autonomous access control method for database tables, in particular to an autonomous access control method for row-level data in database tables. Background technique [0002] Discretionary access control is the foundation of operating systems and database management systems, and an important attribute of it is the ability to support delegated authorization rules. At present, the autonomous access control of many databases is based on the access control matrix (Access Control Matrix) to realize the access control of the table level and attribute level (column level) of the role. Access controls are performed on these columns, but such access controls do not constrain access to rows in the database. For example, if a database user has access rights to a certain database table, the user can have relevant access to each row in this table. Therefore, this traditional table-level, attribute-level (column-level) granular object ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 王渊
Owner 北京神舟航天软件技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products