Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for binding security mechanism of application software and large database

A security mechanism and application software technology, applied in the field of security integration of heterogeneous information systems, can solve the problems of low security level and investment scale

Inactive Publication Date: 2008-01-16
INSPUR COMMON SOFTWARE
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For general enterprise applications, the security level and investment scale are relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding security mechanism of application software and large database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0014] The method of the present invention is suitable for accessing large databases for data collection, processing, processing, and output, and is often used in the security login mechanism of the management information system, and can also be used in the access interface technology between heterogeneous systems.

[0015] The large-scale database involved in the present invention can be widely used in large-scale databases such as MSS SQL, SYBASE, ORACLE, and DB2. Nowadays, many application software commonly use the data access mechanism for large databases: set a fixed database owner and password, store them in the registry or parameter files in plain text or encrypted, read the file through the login window, and connect to the database to be operated. The database of the application system (as shown in Figure 2). This method is mainly s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for bundling application software safety mechanism and large database safety mechanism. The method bundles the safety mechanisms of application system and large database together, thus enhancing the safety of data visit and safety grade of user visit. Through establishing the independent visit control database, the method completes the bundling of safety mechanisms of application system and large database. Through the independent visit control database, the method, on the one hand, can realize database safety certification mechanism of user log-in; and on the other hand, the method completes the log-in of application database, so as to reach the purpose of operating application database. The method relieves the application system of building a safety mechanism and validation principle by its own, avoids database log-in through written code or encrypted database registration, and skillfully bundles safety mechanisms of application system and large database together.

Description

technical field [0001] The invention relates to a setting method of a security mechanism of a computer information system, which is widely used in the security access of the management information system and the security integration method of the heterogeneous information system. Background technique [0002] Data security is particularly important for enterprise informatization. With the popularization of information technology, the insiders of the enterprise have a stronger understanding of the company's confidential data and the desire to steal; with the popularization of computer technology, the ability of individuals to operate the database has also been strengthened. Therefore, information security technology has increasingly become the focus of attention of enterprise customers. Encryption technology has become the first choice for security solutions in the software industry. The key point of encryption technology is encryption algorithm, which can be divided into th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F17/30G06F21/62
Inventor 勇喜
Owner INSPUR COMMON SOFTWARE