Database protection method

A database and protection layer technology, applied in the computer field, can solve problems such as the inability to fully protect the database, and achieve the effect of blocking possibility and data leakage

Active Publication Date: 2012-06-20
HIGHGO SOFTWARE
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the face of increasingly complex network structures and the unpredictability of potential system vulnerabilities, traditional methods have been unable to fully protect the database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database protection method
  • Database protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The method for protecting the database of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0019] The method for protecting a database of the present invention includes a protection layer made up of a verification mechanism and several rules, each rule contains a verification definition for allowing or denying access to the database, and when a user access request is received, a user / password verification is performed when the user / password is reached at the database. Before the verification, the protection layer verifies the connection request, and decides whether to allow or deny the request according to all rule definitions. The verification process is shown in the figure below:

[0020] 1) The access client (network or local) initiates a connection request, and the protection layer receives the request and obtains the detailed information of the request;

[0021] 2) Define circular validation for each ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a database protection method. In the method, a verification mechanism and multiple rules form a protection layer; each rule includes a verification definition allowing or rejecting database access; and after receiving a user access request and before verifying the user/password in the database, the protection layer verifies the connection request and judges whether to allowor reject the request according to all rule definitions. Through the method, the protected database is only accessible to the network domain in the designated range, and the possibility of data leakage can be effectively avoided even in the case of user/password leakage in the database. The client connection is necessary to conform to the designated transmission and verification mode; and the method can forcibly requires encryption of the transmission process and adoption of a stricter verification mode so as to prevent acquisition of password and data through network peep.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a database protection method for protecting database systems from attacks and eliminating potential threats. Background technique [0002] Traditional database systems generally adopt a user / password pair protection method, which can protect data security to a certain extent. However, in the face of increasingly complex network structures and the unpredictability of potential system vulnerabilities, traditional methods have been unable to fully protect databases. Several ports used by the database have to be opened by the system firewall, so as to allow the access of external applications. At this time, the direct protection of the database by the system firewall has lost its effect, and the database has been opened to the entire network. Nowadays, computer systems are becoming more and more powerful, and the various software and hardware they run are becoming more and more co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/22G06F21/62
Inventor 权宗亮卢健韩永利
Owner HIGHGO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products