Database access control method on basis of multi-strategy integration

An access control and database technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problems of autonomous access control, which is difficult to control the security level from the whole, lack of flexibility, etc., to achieve enhanced security and flexibility, Avoid the effects of permission conflicts

Active Publication Date: 2015-04-01
AVIC NO 631 RES INST
View PDF7 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to implement access control under multiple security levels, you can use BLP mandatory access control, but it lacks flexibility for changing information confidentiality levels, you can also use role-based access control, but this type of au

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access control method on basis of multi-strategy integration
  • Database access control method on basis of multi-strategy integration
  • Database access control method on basis of multi-strategy integration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The invention adopts a role-based security access control (Role Based Access Control, RBAC) and a secret-level-based mandatory access control (BLP) strategy to control the access of a multi-security level database system. System administrators can perform fine-grained configuration based on user identity and role, and divide database object resources into multiple security levels. Any database access operation needs to be authenticated by the system access control center. The system security access control first determines whether the current requesting user has a user subscription. If there is a user subscription, the authentication result is returned by checking the user subscription table. If not For user customization, the RBAC module is used to judge whether the role corresponding to the user has corresponding access rights to the database tables to be accessed. If there is no access rights, the access is denied; The operation permission to access the fields in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a database access control method on the basis of multi-strategy integration. The database access control method aims to solve widespread problems in the aspect of security access to databases of comprehensive electronic systems. The database access control method includes enabling an RBAC (role-based access control) module to judge whether roles corresponding to users have access permission corresponding to required-to-be-accessed database tables or not; denying access if the roles do not have the access permission; enabling a BLP (Bell-La Padula) module to judge operation permission of the users for fields in the required-to-be-accessed database tables if the roles have the access permission. The database access control method has the advantages that various security levels of information in databases can be assuredly effectively accessed, the security of the databases can be protected on table levels and even field levels, permission of subjective bodies and objective bodies can be effectively customized according to actual conditions, and corresponding access control strategies can be provided for the subjective bodies of the different roles.

Description

technical field [0001] The invention relates to a database security access control method. Background technique [0002] Informatization will play an increasingly important role in future industry, medical care, and war. Modern integrated electronic systems need to participate in the construction of an integrated information sharing platform for air, space, and ground, which will inevitably lead to the birth of a new generation of integrated electronic systems. The system must provide highly flexible communication capabilities for control data and media data. The improvement of these capabilities and enhancements are based on the sharing of hardware resources by a large number of software. The comprehensive extraction of various information in different representation forms inevitably requires the integration of applications with different security levels into a comprehensive information processing platform. How to implement access control under multiple security levels, yo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 蒋挺宇李亚晖牛文生张亚棣叶宏
Owner AVIC NO 631 RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products