Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal user-based database fine-grained access control method

An end-user and access control technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as consuming computing resources, affecting database retrieval results, and data columns not being able to be indexed normally, to enhance protection capabilities, maintain safe effect

Active Publication Date: 2017-11-28
BEIJING INST OF COMP TECH & APPL
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are mainly the following ideas for carrying out research on database security protection: First, data encryption and decryption control is performed directly on the database, which can be divided into encryption and decryption of the entire database, tables in the database, and data in the tables to ensure data security; The second is to use middleware to add access control middleware between the user and the database, and realize database access control through encryption and decryption of data, table-level access control, etc.; Database firewalls are connected in series to achieve access control such as blocking database users from accessing the database and restricting returned data; however, the current research still has the following deficiencies: the process of database encryption and decryption often consumes computing resources, and the encrypted data columns are often not normal. Index, which affects database retrieval results; fails to implement access control of row and column-level data; cannot implement database access control for end users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal user-based database fine-grained access control method
  • Terminal user-based database fine-grained access control method
  • Terminal user-based database fine-grained access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0042] The present invention provides a fine-grained access control method for databases based on terminal users, which prevents illegal access users by pre-setting the identity information of terminal users, and at the same time realizes fine-grained access requests in combination with row-column-level data access authority control rules control. Through comprehensive terminal user identity information verification and row-column-level data access authority verification, illegal requests are identified to enhance database protection capabilities and maintain information system security.

[0043] The application scene of the present invention is available figure 1 It means that the entire application process of the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a terminal user-based database fine-grained access control method, and belongs to the technical field of database safety protection. According to the method, legal terminal users are identified to stop illegal access users; and meanwhile, fine-grained access control rules are loaded to database access request sentences initiated by the terminal users so as to achieve fine-grained access request control ability for the terminal users. Through the access authority control realized by the method, identity authentication can be carried out on the terminal users, and column-level database fine-grained access control can be carried out on the terminal users without encrypting and decrypting the data, so that the database protection ability is effectively strengthened and the information system safety is maintained.

Description

technical field [0001] The invention relates to the technical field of database security protection, in particular to a fine-grained access control method for databases based on terminal users. Background technique [0002] With the development of information technology, databases have been more and more widely used in various industries. While carrying important data, the database has increasingly become an important attack target for criminals. In order to improve the security protection capability of the database, on the basis of the existing database security mechanism, fine-grained data access control can be carried out according to the different data access rights of different end users to enhance the ability of the database to resist risks. [0003] The end user-based database fine-grained access control technology realizes the database access control capability by identifying the end user who initiates the database access request, and loads the database row and colu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 沈德峰石波吴朝雄胡佳谢小明郭江沈艳林孙琦
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products