Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database anti-leak protocol identification method and device

A protocol identification and database technology, applied in the field of information security, can solve the problems of poor versatility and inability to automatically identify data encryption technology

Active Publication Date: 2019-01-29
华腾数云(北京)科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The embodiment of the present invention provides a database anti-leakage protocol identification method and device, to at least solve the technical problem of poor versatility of data encryption technology due to the inability to automatically identify the protocol type to which the IP message belongs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database anti-leak protocol identification method and device
  • Database anti-leak protocol identification method and device
  • Database anti-leak protocol identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0036] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage protocol identification method and device for a database. The method comprises the steps that a protocol fingerprint of an IP message used for accessing the database is extracted according to a preset identification rule; the protocol fingerprint is matched with at least one preset protocol fingerprint set to determine the protocol type of the IP message; a validation rule set corresponding to the protocol type is acquired; all protocol validation rules in the validation rule set are matched with the IP message to validate the protocol type of the IP message. According to the method and device, the technical problem that a data encryption technique is poor in universality due to the fact that the protocol type to which the IP message belongs cannot be automatically identified is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a database anti-leakage protocol identification method and device. Background technique [0002] Database is a main means for storing and managing data information. Typically, a large amount of data is centrally stored in a database and shared by many users. Once the data stored in the database is leaked or destroyed, it will paralyze the business, cause economic losses, and even endanger national security. Therefore, it is necessary to take appropriate protection measures to protect the data in the database. [0003] It turns out that data encryption is a major way to keep data safe and prevent data breaches. European and American countries provide some products for data encryption, but these products cannot guarantee their information security due to various known and unknown reasons. Domestic database protection methods are mainly realized through database secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 杨龙频刘凤成
Owner 华腾数云(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products