Database operation request verifying method and device, server and storage medium

A technology for operating requests and verification methods, which is applied in the database field, can solve the problems of attackers' exploitation and implementation difficulty, and achieve the effect of reducing errors, reducing implementation difficulty, and reducing development burden

Inactive Publication Date: 2018-11-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of technology, the status of the database in the daily work and life of users is becoming more and more important. In order to ensure the security of the database, the existing technology provides a variety of anti-injection technologies for the database, such as filtering the incoming parameters and prohibiting illegal input. For example, the input of illegal characters such as "--", "#", "'" is prohibited, but this method requires developers to be familiar with various special characters of the database, and any omission may be exploited by attackers
[0003] It can be seen that the existing database anti-injection technology requires users to have more professional knowledge, which is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database operation request verifying method and device, server and storage medium
  • Database operation request verifying method and device, server and storage medium
  • Database operation request verifying method and device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0035] see figure 1 , figure 1 It is a schematic diagram of the scene of the database system provided by the embodiment of the present invention. The database system may include an interface server 11, a gateway server 12, and a data server 13 that provides various data supports; where:

[0036] The data server 13 is used to provide functions such as storage, reading and writing, and access of various user data;

[0037] The interface server 11 is used to provide the user wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a database operation request verifying method and device, a server and a storage medium. The method comprises the steps of after receiving a database operation request, obtaining a database operation statement of the database operation request; decomposing the database operation statement to obtain an identifier of the database operation statement; constructing a request summary of the database operation statement according to the identifier of the database operation statement; verifying the request summary on the basis of a preset summary set; and when the request summary passes the verification, determining that the database operation request is legal. Through the scheme, the difficulty of implementing the database anti-injection technology can be greatly reduced.

Description

technical field [0001] The invention relates to the field of databases, in particular to a database operation request verification method, device, server and storage medium. Background technique [0002] With the development of technology, the status of the database in the daily work and life of users is becoming more and more important. In order to ensure the security of the database, the existing technology provides a variety of anti-injection technologies for the database, such as filtering the incoming parameters and prohibiting illegal input. For example, the input of illegal characters such as "--", "#", "'" is prohibited, but this method requires developers to be familiar with various special characters of the database, and any omission may be exploited by attackers. [0003] It can be seen that the existing database anti-injection technology requires users to have more professional knowledge, which is difficult to implement. Contents of the invention [0004] Embo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F17/30
CPCG06F21/31
Inventor 唐颢
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products