Database operation method and device
An operation method and database technology, applied in security devices, digital data protection, electronic digital data processing, etc., can solve problems such as security risks of open source databases, and achieve the effect of avoiding security implications and losses and solving security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0029] In this embodiment, a database operation method is provided, figure 1 is a flow chart of the operation method of the database according to the embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:
[0030] Step S102, receiving a read and write request for the open source database of the first terminal;
[0031] Step S104, under the trigger of the read-write request, generate a first key for accessing the open-source database;
[0032] Step S106, comparing whether the first key is consistent with the second key, wherein the second key is a key generated by the first terminal according to the feature code of the first terminal when creating ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap