Hybrid SQLite3 safety access method

A technology of safe access and legitimacy, applied in the field of computer network security, can solve problems such as abuse of authority, unauthorized use, leakage, etc., to achieve the effect of improving safe storage and access, and avoiding unauthorized use

Inactive Publication Date: 2016-04-27
THE PLA INFORMATION ENG UNIV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) When users access the SQLite3 database, there are phenomena such as "ultraauthorized use, abuse of authority, and embezzlement of authority";
[0006] 2) The data information stored in the SQLite3 database is leaked with the loss of the database file, which cannot achieve the purpose of data confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid SQLite3 safety access method
  • Hybrid SQLite3 safety access method
  • Hybrid SQLite3 safety access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0033] see figure 1 , the hybrid SQLite3 security access method of the present application constructs an authority library SystemDB for storing relevant information of database users; all data information in the authority library SystemDB is encrypted and stored to ensure the security of user information, which can only be used by The database administrator is a first-level role to access, and other users cannot access. This application adds an identity authentication module and an access control module at the application layer, and adds an encryption and decryption module at the physical storage stage. At the application layer, first verify the legality of the user's identity through the identity authentication module; when the user's identity is legal, the SQLite3 database will use the access control module to verify the authority and scope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a hybrid SQLite3 safety access method. The method comprises establishing an identity authentication module and an access control module at an application layer, and establishing an encryption and decryption module at a physical storage stage. At the application layer, validity of user identity is verified through the identity authentication module; when the user identity is valid, authority level and extent of the roles that a user is in are verified through the access control module, so that whether operation required by the user on an SQLite3 database is satisfied is determined; and before the user accesses data in the SQLite3 database, the data are decrypted through the encryption and decryption module from a ciphertext form to a plaintext form. Unauthorized use of valid users and authority embezzlement of invalid users are effectively avoided, and a multi-level, multi-stage and configurable safety access method is provided for access of the embedded database SQLite3.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a mixed SQLite3 security access method. Background technique [0002] With the development of social informatization, networking and intelligence, computers are getting smaller and smaller, their functions are getting more powerful, and the processing power of a single chip is getting stronger and stronger. In order to meet the needs of social applications, embedded systems and embedded databases have emerged as the times require, and they have broad development space in the computer field. [0003] SQLite is an open source, embedded relational database developed and implemented by D. Richard Hipp in C language. Currently, version 3 has been developed. The embedded database SQLite3 has the characteristics of zero configuration, open source, portability, ease of use, compactness and reliability. [0004] The embedded database SQLite3 does not have an independe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/31G06F21/60
CPCG06F21/31G06F21/602G06F21/6227G06F2221/2141
Inventor 岳春生田梅孙红胜马晨欣胡泽明程娟李建军万方杰贺靖卿梁少勋
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products