Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method for preventing database information from being leaked internally

A control method and database technology, applied in the direction of digital data protection, etc., can solve problems such as loss of control and confidentiality of internal document permissions, loss of mobile storage devices, leakage of confidentiality, etc., and achieve the effect of preventing theft, illegal embezzlement, and copy leakage

Active Publication Date: 2015-06-24
WUHAN FORWORLD SOFTWARE TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Internal document permissions are out of control and confidential
At present, the authority division of confidential information in most ranks is quite extensive. Personnel who do not have the corresponding confidentiality level (such as operation and maintenance personnel) know the high-level confidentiality, which may easily cause data to be copied and leaked.
[0007] 3. There is a risk of information leakage when an accident occurs to the database device
When internal personnel get caught in Trojan horses or viruses when surfing the Internet, the important data in the computer will be lost, and the loss, repair or scrap of mobile storage devices often lead to leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for preventing database information from being leaked internally
  • Control method for preventing database information from being leaked internally

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following describes in detail the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary, only used to explain the present invention, and should not be construed as a limitation of the present invention.

[0038] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments:

[0039] The file system filter driver component used to implement database access control works in the operating system kernel and uses the file system layer filter driver technology in the Windows driver hierarchy to access database files. Because it is in the file filter driver layer, this The logical structure can shield the complexity of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control method for preventing database information from being leaked internally. In the method, a control service, a filter driver, a remote console and a WAN console are adopted. Database files are encrypted automatically in a remote control mode by means of the filter driver, thereby being prevented from being copied and leaked by operation and maintenance staff; illegal export of database information is controlled through the filter driver, so the content of a database is prevented from being embezzled illegally by the operation staff; the WAN console is used for remote control, so the risk that database hardware is stolen is further reduced, and the security of the database information is improved.

Description

technical field [0001] The invention belongs to the field of computer information security, in particular to the field of database information access control. Background technique [0002] In recent years, the database has been widely used in various fields of computer storage as an important means of storing structured data, and the problem of database security has become increasingly prominent. Database security includes operational security and information security, and information security is relatively more prominent. Database information leakage has increasingly become a focus problem, which not only brings serious direct economic losses to enterprises, but also damages brand value, investor relations, and social public image. Strengthening database information security management is imminent. [0003] Usually, there are various situations that cause database information leakage. In foreign countries, there are often more cases of accidentally leaking secrets due to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 张文华
Owner WUHAN FORWORLD SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products