Unlock instant, AI-driven research and patent intelligence for your innovation.

Security access control method and system of database

A security access control and security access technology, applied in the field of computer network security, can solve problems such as security risks, corporate reputation impact, leakage of sensitive data such as customer information, etc., and achieve the effect of reducing data leakage and improving security control.

Active Publication Date: 2013-09-11
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There is a common problem in the data systems of the above-mentioned industries: the leakage of sensitive data such as customer information, and this problem is increasingly becoming an information security problem that damages the public interest, threatens the healthy development of the enterprise, and has a significant impact on the reputation of the enterprise
The above-mentioned work consumes a lot of manpower and time. Not only the coverage and accuracy of the review cannot be guaranteed, but also the post-censorship review of some high-risk behaviors cannot meet the timeliness requirements, let alone real-time access control
Therefore, the hysteresis and coarse-grained nature of the traditional database security access control methods cannot meet the data security of the data system, and there are serious security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method and system of database
  • Security access control method and system of database
  • Security access control method and system of database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] figure 1 It is a specific flow chart of a database security access control method provided by an embodiment of the present invention, which is represented by figure 1 As can be seen, the method includes:

[0025] S101: Collect database access methods and database access logs. This step specifically includes:

[0026] (1) Regularly collect database access methods and database access logs from the database help desk server, mail server and database log...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security access control method and a system of a database. The method comprises the steps of collecting a database access mode and a database access log, analyzing the database access mode and the database access log according to database access security elements, formatting SQL (Structured Query Language) statements in the analyzed database access mode and the database access log, collecting database security access request information input by a user, identifying the database security access request information according to the formatted database access mode and the database access log, and generating an identification result. According to the security access control method and the system, the security control of a database system is improved, and the data leakage caused by unauthorized data access due to imperfect authority monitoring in a data system is reduced.

Description

technical field [0001] The present invention relates to the technical field of computer network security, in particular to database security control technology, specifically a database security access control method and system. Background technique [0002] At present, the data systems of all walks of life are equipped with databases, and a large amount of information is stored in the databases. For example: a large amount of customer information is stored in the database of the bank, such as the account number and password of the customer; a large amount of source code is stored in the database of the IT company; a large amount of sales information is stored in the database of the product sales company, such as each model Sensitive information such as product cost price, sales price, and corresponding customer groups. [0003] There is a common problem in the data systems of the above-mentioned industries: the leakage of sensitive data such as customer information, and thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F17/30
Inventor 金海旻罗海波金晶陈静顾骏凌奥莫李华孙佩锋
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More