Database access method, system and equipment

A database and access request technology, applied in the field of database access, can solve the problems of database upgrade, database password issuance error, database password leakage probability, etc., and achieve the effect of reducing wrong sending, improving security, and reducing the risk of being dragged into the database.

Pending Publication Date: 2019-09-10
ADVANCED NEW TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the growth of the enterprise, the scale and complexity of the database system increase, which makes the management of database passwords extremely difficult, which leads to a large increase in the probability of database password issuance errors and database password leaks, which in turn makes the database being dragged into the database. Significantly increased risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access method, system and equipment
  • Database access method, system and equipment
  • Database access method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0075] In the prior art, authentication of database visitors is usually implemented based on database passwords. That is, the corresponding database passwords are issued to those who have access rights. When the visitor accesses the database, verify the database password he has, so as to determine whether he has access authority. However, with the g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a system and equipment for accessing a database. In the method provided by the embodiment of the invention, the method for accessing the database comprises the following steps: acquiring registration credential information from a deployment platform; registration information is generated according to the registration certificate information, and registration verification is initiated to an access control platform based on the registration information; receiving access verification information from the access control platform, the access verification information being obtained only after successful registration verification, the access verification information comprising database instance information with right access, and the database instance informationcomprising a corresponding database password; and initiating an access request to a database host based on the access verification information, wherein the access request comprises the database password.

Description

technical field [0001] This specification relates to the field of computer technology, in particular to a method, system and equipment for accessing a database. Background technique [0002] A database is a warehouse that organizes, stores and manages data according to its data structure. Generally, the data stored in the database is not open to everyone. Therefore, when a user accesses the database, it is necessary to authenticate the user, confirm the database instance that the user has the right to access, and prevent illegal access. [0003] In the prior art, authentication of database visitors is usually implemented based on database passwords. That is, the corresponding database passwords are issued to those who have access rights. When the visitor accesses the database, verify the database password he has, so as to determine whether he has access authority. However, with the growth of the enterprise, the scale and complexity of the database system increase, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F21/31
CPCG06F21/6218G06F21/602G06F21/31
Inventor 肖磊张园超姚兴李婷婷
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products