Unlock instant, AI-driven research and patent intelligence for your innovation.

Binding method of a large database and an application software security mechanism

A technology of security mechanism and application software, applied in the field of security integration of heterogeneous information systems, which can solve the problems of low security level and low investment scale

Inactive Publication Date: 2019-06-04
西安玖诚玖谊实业有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For general enterprise applications, the security level and investment scale are relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binding method of a large database and an application software security mechanism
  • Binding method of a large database and an application software security mechanism
  • Binding method of a large database and an application software security mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0014] The method of the present invention is suitable for accessing large databases for data collection, processing, processing, and output, and is often used in the security login mechanism of the management information system, and can also be used in the access interface technology between heterogeneous systems.

[0015] The large-scale database involved in the present invention can be widely used in large-scale databases such as MSS SQL, SYBASE, ORACLE, and DB2. Nowadays, many application software commonly use the data access mechanism for large databases: set a fixed database owner and password, store them in the registry or parameter files in plain text or encrypted, read the file through the login window, and connect to the database to be operated. The database of the application system (as attached figure 2 ). This method is mainl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for binding a large-scale database and an application software security mechanism, which binds the security mechanism of an application system and the security mechanism of the large-scale database, so that the security of data access is improved, and the security level of user data access is improved. According to the method, an independent safety access control database is established, and binding of a safety mechanism of an application system and a safety mechanism of a large database is completed. Through the independent access control database, on one hand, a database security authentication mechanism of a login user is realized; And on the other hand, login of the application database is completed, so that the purpose of operating the application database is achieved. According to the method, the self-construction of a security mechanism and a verification principle of an application system is avoided, the use of a plaintext code or an encrypted database for logging in a user is avoided, and the security mechanism of the application system and the security mechanism of a large database are ingeniously bound.

Description

technical field [0001] The invention relates to a setting method of a security mechanism of a computer information system, which is widely used in the security access of the management information system and the security integration method of the heterogeneous information system. Background technique [0002] Data security is particularly important for enterprise informatization. With the popularization of information technology, the insiders of the enterprise have a stronger understanding of the company's confidential data and the desire to steal; with the popularization of computer technology, the ability of individuals to operate the database has also been strengthened. Therefore, information security technology has increasingly become the focus of attention of enterprise customers. Encryption technology has become the first choice for security solutions in the software industry. The key point of encryption technology is encryption algorithm, which can be divided into th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 翟路海
Owner 西安玖诚玖谊实业有限公司