Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Database access supervision method

A database and application system technology, applied in the database field, can solve problems such as buffer overflow security attacks, failure of database management system security functions, security protection, etc., to achieve the effect of ensuring transparency and wide applicability

Inactive Publication Date: 2016-08-24
GUANGXI UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) There are super users in the database system, and their permissions are not restricted, which will lead to the misuse and abuse of database access permissions, and bring very serious security problems
[0005] (2) The application system uses the identity of the database super user to link to the database, which hinders the implementation of security functions such as access control functions and security audit functions of the database management system, resulting in many security functions of the database management system failing to provide proper security protection
[0006] (3) Record the user name and password to connect to the database in plain text in the application system configuration file, resulting in the leakage of the database user name and password, and making all the security functions of the database management system useless
[0007] (4) Failure to check the security of the SQL statement passed to the database for execution, resulting in security attacks such as SQL injection and buffer overflow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access supervision method
  • Database access supervision method
  • Database access supervision method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings.

[0021] The database access supervision method is mainly implemented by the database access supervision server DBASS (Database Access Supervising Server), and the DBASS is deployed between the database application system APP (Application) and the database management system DBMS (Database Management System), such as figure 1 shown.

[0022] DBASS cuts off the network communication between the machine where the APP is located and the DBMS, so that direct interaction between the APP and the DBMS is impossible. The access of the APP to the database must be processed by the DBASS, so that the DBASS controls the connection process of the application system to the database and after the connection is established. all access processes.

[0023] In order to obtain the characteristics of the application system and provide transparent secure database access support for the applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database access supervision method, which comprises the following steps: 1) deploying a database supervision server before a database is deployed, intercepting access to the database through an application layer proxy technology, and putting all pieces of database access under the control of the supervision server; 2) controlling a user name and a password for connecting the database, and adopting a one-time one-authorization way for a database connection request to guarantee the controllability of database connection; 3) identifying the fingerprint of the application system to control the application system which can access the database to guarantee the credibility of the application system; and 4) analyzing, checking, auditing and controlling a SQL (Structured Query Language) statement which accesses the database. The database access supervision method can avoid a phenomenon that a user optionally directly connects with the database to operate, monitors all database access activities, can effectively improve the safety of a database system, and overcomes harm which may be caused to database safety by a superuser, the backdoor and the bug of a database management system, the bug of the application system and the like.

Description

technical field [0001] The invention belongs to the field of databases, in particular to a database access supervision method. Background technique [0002] A database is a warehouse for storing data. Today's applications, ranging from mobile phone applications to enterprise-level web applications, all use databases to store the data to be managed. People have generally realized that database security is the last line of defense for information security and plays a decisive role in protecting the information wealth of the information society. Although the importance of database security has been generally recognized in recent years, there are some deficiencies in the security aspects of commonly used database management systems. [0003] As an information system, the database management system first faces many technical security problems. Such as denial of service attacks, buffer overflow attacks, SQL injection, communication packet sniffing, database storage leaks, backd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
Inventor 黄保华霍林覃海生
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products