Unlock instant, AI-driven research and patent intelligence for your innovation.

Database Security Access System

A security access and database technology, applied in the field of database security access systems, can solve the problems of hysteresis and coarse-grained inability to meet data security of data systems, difficulty in meeting timeliness requirements for post-event review of high-risk behaviors, and inability to guarantee coverage and accuracy. , to achieve fine-grained access control, ensure security, and improve efficiency.

Active Publication Date: 2019-01-25
广东盈迅信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned work consumes a lot of manpower and time. Not only the coverage and accuracy of the review cannot be guaranteed, but also the post-censorship review of some high-risk behaviors cannot meet the timeliness requirements, let alone real-time access control
Therefore, the hysteresis and coarse-grained nature of the above-mentioned database security access control methods cannot satisfy the data security of the data system, and there are serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database Security Access System
  • Database Security Access System
  • Database Security Access System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:

[0042] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;

[0043] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...

Embodiment 2

[0065] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:

[0066] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;

[0067] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...

Embodiment 3

[0089] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:

[0090] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;

[0091] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe accessing system of a database. The safe accessing system comprises the database, an accessing identity verification module, a storage data encryption module and a storage data decryption module. Identity information of an accessing user is determined through a label verification manner and safety grades of accessing of the database are distinguished; corresponding processing authorities are given; meanwhile, encryption services are provided for written data and decryption services are provided for read data; the safety of the database is guaranteed and the efficiency of sharing information of the database is improved.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a database security access system. Background technique [0002] Database security access control in related technologies includes the following aspects: (1) recovery and distribution of authorized users; (2) review of data confidentiality, manual spot checks are performed according to a large number of data query logs, sensitive data is selected and results are returned In a large number of cases, ask the relevant personnel whether there is a formal approval procedure to meet the confidentiality requirements. The above-mentioned work consumes a lot of manpower and time. Not only the coverage and accuracy of the review cannot be guaranteed, but also the ex-post review of some high-risk behaviors cannot meet the timeliness requirements, let alone realize real-time access control. Therefore, the hysteresis and coarse-grained nature of the above database security access con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 不公告发明人
Owner 广东盈迅信息技术有限公司