Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database safeguarding method based on data stream restoration technology

A technology of security protection and data flow, applied in electronic digital data processing, special data processing applications, instruments, etc., can solve the problems of lack of database security enhancement products, inability to effectively defend against malicious attacks on database servers, and database security without protection methods, etc. To achieve the effect of preventing security vulnerabilities and preventing SQL injection attacks

Inactive Publication Date: 2009-12-23
STATE GRID ELECTRIC POWER RES INST +1
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there has been no effective protection method for the security of the database itself.
At the same time, there is a lack of effective database security enhancement products in the current market
[0004] Conventional database protection methods are protected by security devices such as firewalls, which can only perform network layer filtering such as general ports, protocols, and addresses, and cannot effectively defend against malicious attacks on database servers, such as SQL injection attacks, attacks based on database operation interfaces, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database safeguarding method based on data stream restoration technology
  • Database safeguarding method based on data stream restoration technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in conjunction with accompanying drawing.

[0043] The data flow restorer of the method is serially connected between the application server and the database server, and can restore all operations of the application server to the database server. The access controller checks the restored operations, rejects the operations that do not conform to the defined rules, and cuts off the corresponding TCP link.

[0044] Configure basic IP, MAC and other access information in the data flow restorer to avoid IP address forgery and unauthorized application server access to the database.

[0045] For the corresponding operation of the corresponding database, the authority controller will perform the following operations:

[0046] 1) Check the legality of operations such as the corresponding network address, network card hardware address, and application port.

[0047] 2) Check the legitimacy of the login authentication informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database safeguarding method based on data stream restoration technology, for purpose of protecting the safety of key databases. A system of the method is connected between an application server and a database server in series and mainly consists of a data stream restorer and an access controller. A message transmitted by the application server to a database is intercepted and captured by the data stream restorer. The data stream restorer buffers the message, restores the message into a corresponding TCP data stream, restores SQL sentences from the data stream and submits the SQL sentences to the access controller for safety examination. After passing the safety examination, the message is forwarded to the database server, and an execution result sequentially undergoes restoration and examination and then is forwarded to the application server. Due to the database safeguarding method, the fine-grained safety examination and isolation of the existing application and database communication can be carried out, thereby greatly enhancing the safeguarding capability of the database.

Description

technical field [0001] The invention relates to a security protection method in the technical field of information security, in particular to a database security protection method based on data flow restoration technology. Background technique [0002] With the rapid development of computer technology, the application of database is very extensive and penetrates into various fields, but the security problem of database has followed. As the aggregate of information, database system is the core component of computer information system, and its security is very important. [0003] In confidential units or large enterprises, extensive security protection measures have been implemented, including computer room security, physical isolation, firewalls, intrusion detection, encrypted transmission identity authentication systems, and so on. However, there has been no effective protection method for the database's own security issues. At the same time, there is a lack of effective d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F17/30
Inventor 张涛林为民唐汗青杨维永陈浩陈建业焦涌
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products