Protection method and system for database system

A database and protection system technology, applied in the field of database encryption, can solve the problems of increasing the risk of password leakage, the inability to efficiently guarantee the security of the database system, and the lack of a management mechanism for login passwords, and achieve the effect of improving security

Active Publication Date: 2013-09-18
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these protection measures cannot efficiently guarantee the security of the database system. For example, the database system usually adopts an autonomous access control mode, in which the database administrator has the highest authority. Once the attacker obtains the authority of the database administrator, the database will be completely exposed. There is no security at all, and the database system usually adopts a password-based authentication login method, but there is no effective management mechanism for login passwords, which increases the risk of password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and system for database system
  • Protection method and system for database system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The embodiment of the invention provides a protection method for a database system. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. see figure 1 , the protection method for database system that the embodiment of the present invention provides, comprises the following steps:

[0031] S100: Obtain the login information input by the user.

[0032] Before the client logs in to the database, the user of the database system can input login information through the application program interface of the client. The login information can include information such as user name, password and dynamic password. U-shield, log in by entering the password of the U-shield.

[0033] In order to solve the problem that the database administrator is difficult to manage the login password, the protection system of the database system provides a dynamic password for the user. Every time the user needs to log in, the user ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a protection method for a database system, comprising the steps that A, login information inputted by a user is obtained; B, whether an operational instruction is allowed for the database or not is judged according to the login information; C, if the judgment that the operational instruction is allowed for the database is made, a database protection system configures a database port for the operational instruction; D, the database protection system executes the operation to the database system through the database port. The embodiment of the invention also provides a protection system for the database system. With the database protection system, the database server and applications are isolated. All accesses to the database have to access the database protection system, so that a data transmission channel is shielded and cannot be directly utilized by an attacker.

Description

technical field [0001] The invention relates to the technical field of database encryption, in particular to a protection method and system for a database system. Background technique [0002] With the rapid development of computer technology, the application of database has penetrated into various fields. As a collection of information, the database system's security is very important. [0003] Although at present, many protective measures are adopted to strengthen the data security of the database system, including computer room security, physical isolation, firewall, intrusion detection, encrypted transmission identity authentication system and so on. However, these protection measures cannot efficiently guarantee the security of the database system. For example, the database system usually adopts an autonomous access control mode, in which the database administrator has the highest authority. Once the attacker obtains the authority of the database administrator, the dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 张新宇闫忠鹏
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products