Database access control method and system

An access control and data access technology, applied in the field of data security, can solve the problems of potential safety hazards, the inability of the user rights management system to fuzzy process sensitive data, and the inability to process sensitive information mutations, etc., to achieve advanced architecture, high compatibility, and flexible configuration Effect

Inactive Publication Date: 2017-10-27
北京明朝万达科技股份有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] From a practical point of view, the user rights management system cannot vaguely process sensitive data, and there are security risks
The user rights management system can only control the range of data that users can access, and cannot mutate certain sensitive information in the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access control method and system
  • Database access control method and system
  • Database access control method and system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0074] attached Figure 4 Describes the data processing steps of the company's database desensitization system.

[0075] 1. After logging in to the computer system, log in to the database desensitization system (that is, according to the configured user access and data processing rules, the key information in the obtained data can be blurred and replaced, such as ID number, bank card number, etc.), after the verification is passed Go to step 2 for processing.

[0076] 2. The system analyzes user rights and initializes the data processing engine. After completion, go to step 3 for processing.

[0077] 3. The user accesses the data in the database, and then proceeds to step 4 for processing.

[0078] 4. The system responds to user requests, acquires data, and proceeds to step 5 for processing.

[0079] 5. Based on the configured user access control rules, determine whether content cleaning is required for the acquired data. If necessary, go to step 6 for processing, otherwise...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database access control method and system. The system includes: a user identity verification module, which verifies the user identity; an analysis module, which invokes user data access control configuration, and analyzes user access control rules and data processing rules; an initialization module , receiving the data processing rules, and initializing the data processing engine; the data response module, responding to the user data access request; the range judgment module, judging whether the user data access request exceeds the control range, and if it exceeds the user control range, refusing to provide the user's data access request service; The data processing judging module judges whether the data needs to be processed, and if so, calls the data processing engine to clean the acquired data. Through the solution of the invention, the range of data accessible to users can be effectively controlled, and some sensitive information of data content can be mutated and replaced to prevent leakage of sensitive information.

Description

technical field [0001] The invention relates to the field of data security, in particular to a database access control method and system. Background technique [0002] At present, some terminal protection software has appeared in the prior art, as follows: [0003] A. The user rights management system mainly controls the access rights of server data. According to different user rights, it can control whether the data is available, so as to achieve user-level access control, determine the range of data availability according to the rights, and prevent users from accessing data without authorization. [0004] Such as figure 1 , a flowchart of a user rights management system in the prior art, specifically including: [0005] 1) User login; [0006] 2) Perform user identity authentication; [0007] 3) If passed, then jump to step 4), otherwise jump to step 8); [0008] 4) request data; [0009] 5) judge whether to allow request data, if yes, then jump to step 6), otherwise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 王志刚喻波王志海彭洪涛曲恩纯
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products