Security component of database system

A security component and database technology, which is applied in the security field of database systems, can solve problems such as unreliable storage methods, inability of developers, information exposure to clients, etc., to achieve the effect of preventing threats and improving security

Inactive Publication Date: 2011-05-11
SANDA UNIVERSITY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users with administrator privileges should be careful to choose passwords that are difficult to crack. But even a low-privileged user account may give attackers an opportunity to log into the system
[0005] 2) Unreliable storage method
Although this information is very useful during the development process, the developer must not and does not want to expose this information to the client in the final product

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security component of database system
  • Security component of database system
  • Security component of database system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] refer to figure 1 As shown, the security components of the database system of the present invention include a login security component 10 and a data processing security component 20 .

[0033] The login security component 10 includes an interface generation module 101, a verification code verification module 102, a password verification module 103 and a form identity identifier verification module 104, wherein,

[0034] The interface generating module 101 provides a user name input interface, a password input interface, a verification code input interface and a form ID input interface on the login page.

[0035] The verification code verification module 102 obtains the verification code through the verification code input interface, and compares it with the set verification code. If the two are consistent, then proceed to the subsequent steps, and if the two are inconsistent, the login is refused.

[0036] The password data interface 103 obtains the password through th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security component of a database system. The security component comprises a log-on security component and a data processing security component, wherein the log-on security component comprises an interface generation module, a security code verification module, a password verification module and a window identifier verification module; and the data processing security component comprises a data interaction module, a format verification module, a code replacement module, a code encoding module and an error page generation module. By utilizing the technical scheme provided by the invention, the problems in the prior art can be effectively solved, sufficient protection can be provided for brute force attack, the storage mode and the security of the authority control can be improved, error pages can be prevented from releasing excessive sensitive information, and the threats caused by script injection and script attack can be prevented.

Description

technical field [0001] The invention relates to the security technology of the database system, in particular to the security component of the database system. Background technique [0002] With the popularization of the Internet in all walks of life and the development of Web applications, the security issues of websites, especially website database systems, have been paid more and more attention by people. When using ASP.NET to develop websites or enterprise project systems, security has become a key issue of primary consideration. [0003] For database systems developed based on ASP.NET, the main security threats come from the following aspects: [0004] 1) Brute force attack. If no systematic measures are taken to prevent malicious users from endlessly trying to log in to the database, the system is vulnerable to countless password guessing attacks. This is a type of brute force attack. This kind of attack is mainly to design a program that sends many requests to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F17/30G06F21/50
Inventor 钱立沙洁
Owner SANDA UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products