Data security protection method of enterprise management software

A technology of enterprise management and data security, applied in the field of information security, can solve problems such as password loss, enterprise core confidential information leakage, enterprise confidential information leakage, etc., and achieve the effect of preventing network attacks

Inactive Publication Date: 2010-12-22
WUHAN TIANYU INFORMATION IND
View PDF8 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once these plaintext data files and log files are stolen, they can be easily imported on other machines installed with the same type of DBMS database, which will directly lead to the leakage of the core confidential information of the enterprise
[0006] Two: Hidden dangers of confidentiality leakage caused by client software
[0007] In the process of using the enterprise management software client, basically every interface and every report has a data export function, and the current report can be exported into a custom report format, Excel and other formats, causing leakage; basically every report can be printed directly output, resulting in leaks; even the current screen can be saved and sent directly through the screenshot tool, thus causing the leak of the core confidential information of the enterprise
[0008] Three: Network attacks caused by password loss
Any computer in the same local area network can directly connect to the remote DBMS database server by installing a DBMS database client tool of the same type, and then back up the plaintext database, resulting in the leakage of corporate confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method of enterprise management software
  • Data security protection method of enterprise management software
  • Data security protection method of enterprise management software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the following, the present invention takes the SQL-Server database server as an example, and provides a clear and complete description of the technical solution of the present invention in conjunction with the accompanying drawings. Wherein, the present invention is also applicable to the protection of DBMS databases such as MySql and Oracle. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0055] One: SQL-Server database server storage encryption

[0056] Such as figure 1 The figure shows the principle of storage encryption technology of SQL-Server database server. The present invention has created a larger virtual disk file at the SQL-Server server end, then utilizes the virtual disk driver to install a hidden virtual disk partition (in the present invention, the partition letter is #:); all write hidd...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise management software security protection method and belongs to the field of information security. The method provided by the invention can protect the data security of enterprise confidential information without any influences on the application flow of enterprise management software. In the method, a database file which stores enterprise core confidential data is subjected to storage encryption to prevent secret leakage caused by copying the database file; for preventing password secret leakage from leading to network attack, the access to a database server is controlled, so that only specific terminals are allowed to access the database server after verification; and an enterprise management software system client is protected completely and intelligently, the output files are encrypted, and content copying, printing, screen capturing and any other operation which may lead to secret leakage are strictly controlled in a management software application process.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for ensuring data security and confidentiality of enterprise management software. technical background [0002] At present, most enterprises and institutions use domestic management software with low security and confidentiality to handle business processes such as corporate finance, purchase, sales, inventory, personnel, and wages, which involve core confidential information of the company. The mainstream products of these management software adopt C / S (Client / Server, client / database server) architecture, among which, the database server adopts a general-purpose DBMS (Database Management System, relational database, such as SQL-Server, Mysql, Oracle, etc.), Provide external services through the communication service port of the database (for example, SQL-Server is port 1433); the client establishes a connection with the above-mentioned database server thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/00G06F21/00G06F21/62
Inventor 熊彩辉
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products