Firewall application architecture for enterprise management software
A technology of enterprise management and application architecture, applied in the direction of electrical components, electrical digital data processing, instruments, etc., can solve the problems of software development difficulties, software scale and complexity increase, etc., so as to increase the flexibility of secondary development and reduce development Cycle, the effect of lowering the development threshold
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0012] Embodiment 1: a kind of firewall application framework of enterprise management software, it is characterized in that, comprises software application module, program container module, background server module and database are connected successively, and software application module stores and encrypts database file, prevents database server from leaking secrets; The program container module performs access control on the database server, and only allows the computer with the protection terminal installed to access the background database server after being authorized to prevent unauthorized terminal intrusion; create a virtual disk file in the database, and use the virtual disk driver to install The virtual disk file is formed into a hidden virtual disk partition, and then the database service process is stopped, the data files and log files to be protected are copied to the virtual disk partition, and the original data files and log files are encrypted or deleted; use the...
Embodiment 2
[0013] Embodiment 2: a kind of firewall application framework of enterprise management software, it is characterized in that, comprise software application module, program container module, background server module and database are connected successively, and software application module stores and encrypts database file, prevents database server from leaking secrets; The program container module performs access control on the database server, and only allows the computer with the protection terminal installed to access the background database server after being authorized to prevent unauthorized terminal intrusion; create a virtual disk file in the database, and use the virtual disk driver to install The virtual disk file is formed into a hidden virtual disk partition, and then the database service process is stopped, the data files and log files to be protected are copied to the virtual disk partition, and the original data files and log files are encrypted or deleted; use the ...
Embodiment 3
[0014] Embodiment 3: a kind of firewall application framework of enterprise management software, it is characterized in that, comprises software application module, program container module, background server module and database are connected successively, and software application module stores and encrypts database file, prevents database server from leaking secrets; The program container module performs access control on the database server, and only allows the computer with the protection terminal installed to access the background database server after being authorized to prevent unauthorized terminal intrusion; create a virtual disk file in the database, and use the virtual disk driver to install The virtual disk file is formed into a hidden virtual disk partition, and then the database service process is stopped, the data files and log files to be protected are copied to the virtual disk partition, and the original data files and log files are encrypted or deleted; use the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 