Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automatic authorization access method for database

A technology of automatic authorization and access method, applied in the fields of digital data protection, electrical digital data processing, instruments, etc., can solve the problems of unclear master-slave library relationship, prone to errors, online task failure, etc., to improve authorization efficiency, Avoid stressful effects

Active Publication Date: 2015-11-18
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing database authorization access method, there are the following problems: (1) manual offline authorization needs to manually write database authorization statements, such as GRANT statements, etc., which is inefficient and prone to errors; In many cases, multiple authorizations need to be repeated; (3) The master-slave library relationship is not clear, if the production master library is directly extracted, it will affect normal production
(4) There is no verification of the connectivity process after authorization, and only when the actual data is extracted will the operation error be discovered and cause the online task to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic authorization access method for database
  • Automatic authorization access method for database
  • Automatic authorization access method for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0027] figure 1 It is an overall schematic diagram of the database authorization method of the present invention.

[0028] like figure 1 As shown, first, the data warehouse DB1, which is the authorized access object that needs to obtain data access rights, invokes the automatic authorization interface I / F, which provides an interactive interface, and inputs data warehouse DB1 through the interactive interface. The IP of the server where the relational database DB2 needs to be accessed, the name of the database, the name of the data table to be accessed, and the IP of the server that needs to be authorized (including the server where the web terminal is configured and the server that performs the sampling task) IP and o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic authorization access method for a database. The automatic authorization access method is a method for automatically authorizing and accessing to the accessed database by an object required to be subjected to authorization access. The method comprises: step (S1), transmitting information of the accessed database as main library information; step (S2), according to the main library information, matching authorizable slave database information of a slave database corresponding to the accessed database in a preset main and slave database relation list; step (S3), according to the authorizable slave database information, executing an authorization statement in the accessed database to enable the slave database to be provided with an access right; step (S4), according to the authorizable slave database information, generating a data source accessed by the object required to be subjected to authorization access; step (S5), according to the data source, generating access configuration information accessed by the object required to be subjected to authorization access; and step (S6), according to the access configuration information, accessing to the accessed database by the object required to be subjected to authorization access.

Description

technical field [0001] The invention relates to a database authorization access method, in particular to a database automatic authorization access method. Background technique [0002] With the continuous development of database technology and network technology and the wide application of database management systems, the amount of data stored in databases has increased dramatically. In recent years, in the context of the development of information technology and data intelligence, data warehouse (DataWarehouse) technology for massive data storage and computing analysis for enterprise management and decision-making topics has been widely used. Among them, the security of the data warehouse is defined at the database level, and the establishment of access rights to the database is one of the strategies to protect data security, and it is also an effective guarantee for database security applications. [0003] In the process of extracting data from the database to the data wa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 吕沛袁孙荣章冯玉敏刘彦伟李冰心胡帅
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products