Unlock instant, AI-driven research and patent intelligence for your innovation.

A database account security centralized management and control method

A centralized control and database technology, applied in digital data authentication, electronic digital data processing, instruments, etc., can solve problems such as low maintenance efficiency, lack of user security access control, and unregulated account authority management, and achieve the effect of improving security

Active Publication Date: 2019-04-05
上海新炬网络技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing common practice is to use manual sorting by database maintenance personnel and write scripts to create and authorize database accounts. There are security issues such as lack of norms and standards, lack of user security access control, lack of behavior audit and historical records, and non-recyclable accounts after authorization. In addition, expert-level maintenance personnel are required to operate for a long time. It is difficult to sort out, the cost is very high, and the maintenance efficiency is extremely low.
[0006] It can be seen from the above that the main disadvantages of the prior art are as follows: 1. The account authority management in the system is not standardized
2. Unable to reclaim account authority
3. Manual processing is very cumbersome and inefficient
4. Unable to track and trace security issues
4. Lack of process control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A database account security centralized management and control method
  • A database account security centralized management and control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0022] figure 1 It is a schematic diagram of the centralized management and control process of database account security in the present invention.

[0023] See figure 1 The database account security centralized management and control method provided by the present invention includes the following steps:

[0024] Step S1: Obtain the relevant accounts of all the databases to be monitored;

[0025] Step S2: Perform centralized management of all relevant accounts of the database to be monitored;

[0026] Step S3: Regularly monitor the preset expiration time of the account, and automatically lock or recycle the expired account;

[0027] Step S4: Auditing access traces and user behaviors, giving automatic warnings to accounts operating in violation of regulations, and terminating the operating authority of the account within a preset time.

[0028] The m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe centralized management and control method of a database account. The method comprises followings steps: a) acquiring a related account of each to-be-monitored database; b) performing centralized management on the related account of each to-be-monitored database; c) monitoring a preset expiration time of each account in time and automatically locking or recycling the expired account; and d) reviewing access tracks and user behaviors, performing an automatic early warning on an illegally-operated account and terminating the operation authorization of the account in a preset time. In the step a), different accounts are distributed to different users; different password requirement attribute groups are customized; database authorization roles are distributed according to access objectives of various kinds of accounts; and accounts irrelevant to business operation, routine maintenance and monitoring work are deleted and locked. The safe centralized management and control method is safe and reliable; automatic early-warning and termination performed on illegal operations can be realized; and safety of a password of a database account is greatly improved.

Description

technical field [0001] The invention relates to a database account processing method, in particular to a database account security centralized management and control method. Background technique [0002] With the rapid development of enterprise business, the number of supporting users continues to grow, and the amount of business data continues to rise. At the same time, in order to meet the needs of business development, the application version changes frequently, and more and more new systems are built. This undoubtedly has a great impact on data management and data security, and management is becoming more and more difficult. [0003] For example, China Mobile, as the largest call center in the world, bears services such as 10086, 1008611&12, 12580, telephony, and outbound calls, and accesses seats in six regional centers, 21 telephony seats in prefectures and cities, outsourcing seats in the province, and 12580 seats, etc. . As the core of the system, the Oracle databa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/45
CPCG06F21/45G06F2221/2101G06F2221/2145
Inventor 程永新韩国盛郭振宇
Owner 上海新炬网络技术有限公司