Database Security Access System
A security access and database technology, applied in the field of database security access systems, can solve the problems of hysteresis and coarse-grained inability to meet data security of data systems, difficulty in meeting timeliness requirements for post-event review of high-risk behaviors, and inability to guarantee coverage and accuracy. , to achieve fine-grained access control, ensure security, and improve efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:
[0042] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;
[0043] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...
Embodiment 2
[0065] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:
[0066] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;
[0067] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...
Embodiment 3
[0089] see figure 1 , figure 2 , the database security access system of this embodiment includes a database 1, an access identity verification module 2, a stored data encryption module 3, and a stored data decryption module 4:
[0090] The database 1 initializes the storage space in units of registered objects, and the storage space is used to store encrypted data processed by the storage data encryption module 3;
[0091] The access identity verification module 2 is connected to the access interface of the database 1, and is used to verify whether the access user is a legitimate user by means of label verification. First-level label and second-level label, when receiving an access request from a user, it verifies the first-level or second-level label of the accessing user. If the first-level label is verified, the corresponding registered object space in Open Database 1 Read and write permissions; if the secondary label verification is passed, the read-only permission of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


