A control method for preventing internal leakage of database information

A control method and database technology, applied in the direction of digital data protection, etc., can solve the problems of loss of mobile storage devices, loss of important computer data, leakage of database device information, etc., and achieve the effect of preventing self-theft

Active Publication Date: 2018-04-13
WUHAN FORWORLD SOFTWARE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. Internal document permissions are out of control and confidential
At present, the authority division of confidential information in most ranks is quite extensive. Personnel who do not have the corresponding confidentiality level (such as operation and maintenance personnel) know the high-level confidentiality, which may easily cause data to be copied and leaked.
[0007] 3. There is a risk of information leakage when an accident occurs to the database device
When internal personnel get caught in Trojan horses or viruses when surfing the Internet, the important data in the computer will be lost, and the loss, repair or scrap of mobile storage devices often lead to leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A control method for preventing internal leakage of database information
  • A control method for preventing internal leakage of database information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0038] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0039] The file system filter driver component used to implement database access control works in the operating system kernel and uses the file system layer filter driver technology in the Windows driver hierarchy to perform access control on database files. Since it is at the file filter driver layer, this The logical structure can shield the complexity of the underlying device type. The principle of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a control method for preventing database information from being leaked internally. In the method, a control service, a filter driver, a remote console and a WAN console are adopted. Database files are encrypted automatically in a remote control mode by means of the filter driver, thereby being prevented from being copied and leaked by operation and maintenance staff; illegal export of database information is controlled through the filter driver, so the content of a database is prevented from being embezzled illegally by the operation staff; the WAN console is used for remote control, so the risk that database hardware is stolen is further reduced, and the security of the database information is improved.

Description

technical field [0001] The invention belongs to the field of computer information security, in particular to the field of database information access control. Background technique [0002] In recent years, as an important means of storing structured data, databases have been widely used in various fields of computer storage, and database security issues have become increasingly prominent. Database security includes two parts, operation security and information security, and information security issues are relatively more prominent. Leakage of database information has increasingly become a focal issue, which not only brings serious direct economic losses to enterprises, but also causes damage to brand value, investor relations, and social public image. It is imminent to strengthen database information security management. [0003] Generally, there are various situations that cause database information leakage. In foreign countries, there are often more cases of leaking secr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 张文华
Owner WUHAN FORWORLD SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products