Database safety access control method based on independent authorization

A security access control and access control technology, applied in the field of database security, can solve problems such as database attacks, database vulnerabilities, and inability to control user behavior

Active Publication Date: 2014-11-26
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1
View PDF6 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. Database attack
[0005] 3. Database vulnerabilities
The "Prism Gate" incident exposed the serious security risks brought about by the use of foreign commercial database systems and other infrastructure. Foreign database manufacturers and intelligence agencies can use the security loopholes and backdoors of the database management system itself to monitor the data in the database. and theft, there are security risks such as loopholes in the database system, and the security and confidentiality mechanism attached to it is useless
[0006] 4. Under the three-tier architecture mode, user behavior cannot be controlled
In this mode, the access to the background data is performed through the Web application server or middleware. Even if fine-grained access control is adopted, it can only be controlled for the Web application server or middleware, and it is impossible to distinguish which foreground the access request is from. It is initiated by web users, so it is difficult to control and audit user access behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database safety access control method based on independent authorization
  • Database safety access control method based on independent authorization
  • Database safety access control method based on independent authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The core of the present invention is database security access control control software, such as figure 1 As shown, the software includes two parts, the client and the server, consisting of 7 modules in total.

[0044] The main functions of the seven functional modules of the database security access control software are:

[0045] Identity association probe: The identity association probe is deployed on the application server, responsible for obtaining the identity information of the front-end user, and sending the corresponding relationship between the user identity information and the access control request to the database security access control software;

[0046] Secure communication module: The secure communication module is deployed on the application server and the access control server, and is responsible for realizing secure data exchange between the application server and the database server;

[0047] Identity acquisition module: the identity acquisition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database safety access control method based on independent authorization, and belongs to the field of database safety. The designing thought that the method is in loose coupling with a database system is adopted, access control on the basis of users instead of database accounts is realized by binding database access behaviors with a USBKey, and control and audit can be conducted on behaviors of terminal users by correlating the database access behaviors and the terminal users. Advanced access control is introduced for conducting analyzing and monitoring on database access statements, therefore, database attack behaviors are shielded, insider operation behaviors are controlled and audited, and information loss caused by the database attacking behaviors can be reduced. By repackaging database access requests, monitoring and sniffing attacks are avoided. According to the technology, by adding the means of identity authentication, access control and safety transmission which are independent from a database management system, safety enhancing of a heterogeneous database management system under multiple platforms is realized on the premise that the usage mode of an existing application system is not changed.

Description

technical field [0001] The invention belongs to the field of database security, and is a database security access control technology based on independent authorization. Background technique [0002] The database system is the basic platform in the information system. The key business systems of many government agencies, military departments, and enterprise companies run on the database platform. The data in the database system is shared by many users. If the security of the database cannot be guaranteed, the applications on it The system can also be accessed or destroyed illegally. Although the current mature commercial database management systems have security functions such as identity authentication, access control, and auditing, which provide certain security guarantees for database security, there are still the following problems in database security: [0003] 1. Insider attacks. 80% of database data loss is caused by internal personnel attacks on the database. Databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F17/30
CPCG06F21/33G06F21/6218
Inventor 孟宪哲曾颖明曾淑娟陈志浩毛俐旻
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products