A kind of database security hardening method, device and electronic device
A database and security technology, applied in the field of network security, can solve problems such as poor reliability and unfavorable normal work, and achieve the effect of alleviating poor reliability and good reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] According to an embodiment of the present invention, an embodiment of a database security hardening method is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.
[0026] figure 1 It is a flowchart of a database security hardening method according to an embodiment of the present invention, and the method is applied to a database firewall with an authentication agent deployed, such as figure 1 As shown, the method includes the following steps:
[0027] Step S102, obtaining the database authentication request sent by the authentication agent of the client, wherein the database authentication request carries at least one of the following authentication information: access key value, encrypte...
Embodiment 2
[0052] An embodiment of the present invention further provides a database security hardening device, which is applied to a database firewall deployed with an authentication agent, and is mainly used to execute the database security hardening method provided by the above content of the embodiment of the present invention. The following describes the present invention. The database security hardening device provided by the embodiment is introduced in detail.
[0053] image 3 is a schematic diagram of a database security hardening device according to an embodiment of the present invention, such as image 3 As shown, the database security hardening device mainly includes an acquisition module 10, a determination module 20, a signature calculation module 30 and a comparison module 40, wherein:
[0054] an acquisition module, configured to acquire the database authentication request sent by the authentication agent of the client, wherein the database authentication request carries...
Embodiment 3
[0068] An embodiment of the present invention provides an electronic device, refer to Figure 4 , the electronic device includes: a processor 50, a memory 51, a bus 52 and a communication interface 53, the processor 50, the communication interface 53 and the memory 51 are connected through the bus 52; the processor 50 is used for executing executable modules stored in the memory 51, such as computer programs. The processor implements the steps of the method as described in the method embodiments when the processor executes the calculations and programs.
[0069] The memory 51 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 53 (which may be wired or wireless), and the Internet, wide area network...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


