Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method for database information

A management method and database technology, applied in the fields of digital data protection, user identity/authority verification, electrical components, etc., can solve the problems of neglecting information data security, information leakage, database system crash, etc.

Inactive Publication Date: 2013-09-18
NINGXIA XINHANG INFORMATION TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while technicians pay attention to the classified management and utilization of data, they ignore the security of information data. Most of the security management measures are to set up identity authentication windows on the information platform to control user access.
In this way, due to the singleness of security measures and the fixedness of designated user access, it is easy to cause the collapse of the entire database system and the leakage of information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method for database information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] according to figure 1 , the concrete implementation method step of the inventive method is:

[0009] 1. Identity verification of the user platform; 2. Transcoding and encryption of database information; 3. Dynamic log filing and prompting of database information access.

[0010] In the step of user platform identity verification, the user logs in to the home page of the security management system through the account, and the system analyzes and classifies the user level. The content opened on the home page is the system operating platform corresponding to the user level, so that the database information can be effectively processed. Effectively hidden. In the steps of transcoding and encryption of database information, the software development team designs a database transcoding storage software with limited authority. This software classifies, transcodes, stores, and encrypts the uploaded user information. The code is transcoded according to a set of code books compi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security management method for database information, which aims to provide a method to realize effective management of security of the database information not only through user identity authentication, but also through information encryption and transcoding, prompt for dynamics of database information access and log recording. The method includes the steps of authenticating a user through a user platform, transcoding and encrypting the database information, prompting the dynamics of the database information access and recording the dynamics of the database information access.

Description

technical field [0001] The invention relates to the field of database information management, in particular to a management method in the aspect of database information security. technical background [0002] With the rapid development of digital information technology, computers have played different important roles in people's life and work. People are increasingly inseparable from computers and digital information technology. However, everything has two sides. While it brings quickness and convenience to our life and work, it also brings us many safety hazards. The user's privacy may be stolen due to system flaws, malicious attacks, or illegal use of the database by the head of the household. [0003] At present, as far as the current information management technology is concerned, information management gradually uses databases and big data as endorsements, and manages this big data in a database unit through the classification and management of information types and le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06G06F21/60
Inventor 张飞
Owner NINGXIA XINHANG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products