Database operation method and device

An operation method and database technology, applied in security devices, digital data protection, electronic digital data processing, etc., can solve problems such as security risks of open source databases, and achieve the effect of avoiding security implications and losses and solving security risks

Inactive Publication Date: 2016-03-09
ZTE CORP
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and device for operating a database to at least solve the problem of potential safety hazards in open source databases in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database operation method and device
  • Database operation method and device
  • Database operation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0029] In this embodiment, a database operation method is provided, figure 1 is a flow chart of the operation method of the database according to the embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0030] Step S102, receiving a read and write request for the open source database of the first terminal;

[0031] Step S104, under the trigger of the read-write request, generate a first key for accessing the open-source database;

[0032] Step S106, comparing whether the first key is consistent with the second key, wherein the second key is a key generated by the first terminal according to the feature code of the first terminal when creating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database operation method and device. The method comprises the following steps: receiving a read-write request of an open-source database of a first terminal; generating a first key for accessing the open-source database under a triggering action of the read-write request; comparing whether the first key is consistent with a second key or not, wherein the second key is generated by the first terminal according to a feature code of the first terminal during creation of the open-source database; and determining whether the open-source database is allowed to be read and written or not according to a comparison result, wherein the open-source database is allowed to be read and written when the comparison result indicates that the first key is consistent with the second key, and the open-source database is forbidden to be read and written when the comparison result indicates that the first key is inconsistent with the second key. Through adoption of the database operation method and device, the problem of potential safety hazards in the open-source database is solved; user data written into the database can be protected on a system level; and potential safety hazards and losses of a user due to illegal acquisition of the data are avoided.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a method and device for operating a database. Background technique [0002] The most widely used mobile phone operating system is Android. In the Android system, most of the system and application data are stored in the SQLite database, such as system configuration data, contacts, text messages, website login passwords stored in applications, and online shopping. information etc. SQLite is a very compact cross-platform embedded database, and its database is stored on the local disk in the form of files. Because of its simple, efficient and cross-platform features, SQLite has been widely used in embedded systems, but in its free open source version, it lacks an almost necessary function in the database: database encryption. This makes it possible to use any text editing tool or special SQLite database viewing software to directly see the data content stored in the database aft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62
CPCG06F21/60H04L63/06H04L63/10G06F16/2365G06F16/24565H04W12/08H04W12/041G06F21/62
Inventor 樊武勋赵国涛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products