Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of database security hardening method, device and electronic device

A database and security technology, applied in the field of network security, can solve problems such as poor reliability and unfavorable normal work, and achieve the effect of alleviating poor reliability and good reliability

Active Publication Date: 2022-05-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a database security hardening method, device and electronic equipment to alleviate the technical problems of poor reliability of existing database security hardening methods, which are not conducive to normal work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of database security hardening method, device and electronic device
  • A kind of database security hardening method, device and electronic device
  • A kind of database security hardening method, device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] According to an embodiment of the present invention, an embodiment of a database security hardening method is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.

[0026] figure 1 It is a flowchart of a database security hardening method according to an embodiment of the present invention, and the method is applied to a database firewall with an authentication agent deployed, such as figure 1 As shown, the method includes the following steps:

[0027] Step S102, obtaining the database authentication request sent by the authentication agent of the client, wherein the database authentication request carries at least one of the following authentication information: access key value, encrypte...

Embodiment 2

[0052] An embodiment of the present invention further provides a database security hardening device, which is applied to a database firewall deployed with an authentication agent, and is mainly used to execute the database security hardening method provided by the above content of the embodiment of the present invention. The following describes the present invention. The database security hardening device provided by the embodiment is introduced in detail.

[0053] image 3 is a schematic diagram of a database security hardening device according to an embodiment of the present invention, such as image 3 As shown, the database security hardening device mainly includes an acquisition module 10, a determination module 20, a signature calculation module 30 and a comparison module 40, wherein:

[0054] an acquisition module, configured to acquire the database authentication request sent by the authentication agent of the client, wherein the database authentication request carries...

Embodiment 3

[0068] An embodiment of the present invention provides an electronic device, refer to Figure 4 , the electronic device includes: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; the processor 50 is used for executing executable modules stored in the memory 51, such as computer programs. The processor implements the steps of the method as described in the method embodiments when the processor executes the calculations and programs.

[0069] The memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 53 (which may be wired or wireless), and the Internet, wide area network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a database security reinforcement method, device and electronic equipment, comprising: acquiring a database authentication request sent by an authentication agent on a client side; The target access key corresponding to the value; use the signature algorithm to calculate the signature of the target access key, encrypted version and access time, and obtain the signature of the protection end; compare the client signature with the protection end signature, and perform database operations according to the comparison result . In the method of the present invention, the information transmitted in the traffic does not contain the access key, avoiding the risk of the access key being intercepted, and realizing the security reinforcement of the database by performing signature authentication on the database authentication request, with good reliability, It is not easy to be bypassed, and does not affect normal work, which alleviates the technical problems of poor reliability and unfavorable normal work of existing database security hardening methods.

Description

technical field [0001] The present invention relates to the technical field of network security, and in particular, to a database security strengthening method, device and electronic device. Background technique [0002] After the application server is invaded (illegal operation and maintenance), the intruder can obtain the account password for the application to access the database by means of code scanning, decompilation or packet capture. The current database firewall does not recognize that SQL statements (Structured Query Language, a database query and programming language, used to access data, as well as query, update and manage relational database systems) are issued by the application system. It is still issued by the intruder, and the SQL statement that causes the intruder will also be executed, so the intruder can cause more damage. [0003] In order to prevent intruders from damaging the database, the existing database security hardening methods generally use IP ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40G06F21/62G06F21/60
CPCH04L9/3247H04L63/02H04L63/0884H04L63/10G06F21/6218G06F21/602
Inventor 张力范渊刘博龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD