Database data safety management method and system

A technology of data security and management methods, applied in the field of database data security management methods and systems, can solve problems such as damage and inability to effectively guarantee database data security, and achieve the effect of ensuring speed, taking security into account, and reducing excessive permissions

Active Publication Date: 2019-11-22
山东三未信安信息科技有限公司
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Database administrators can take some precautions to help secure databases, such as designing a secure system, encrypting network transmissions, and building firewalls around database servers, but if you encounter stolen media (such as drives or backups) or a highly privileged database When a user maliciously bypasses legitimate business access to core data, the malicious party only needs to restore or attach the database to browse the data information of the database. Existing methods cannot effectively guarantee the security of database data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database data safety management method and system
  • Database data safety management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples cited are only used to explain the present invention, not to limit the scope of the present invention.

[0017] figure 1 It is a schematic flowchart of a database data security management method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0018] S1, receiving a database access request sent by a client, verifying the validity of the database access request, and when the verification is passed, sending the database access request to the key management system;

[0019] S2, receiving authorization information returned by the key management system in response to the database access request, obtaining a data key according to the authorization information, and using the data key to transparently encrypt and / or decrypt a database file;

[0020] Wherein, the authorization information is the author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information safety, and discloses a database data safety management method. The method comprises the following steps: receiving a database access request sent by a client, carrying out legality verification on the database access request, and sending the database access request to a key management system when the verification is passed; and receivingauthorization information returned by the key management system in response to the database access request, obtaining a data key according to the authorization information, and performing transparentencryption and / or decryption operation on a database file by utilizing the data key. According to the invention, transparent encryption and decryption operation is carried out by using the data key from the system file level, so that the quickness of data encryption and decryption can be ensured; and the permission of the data key is controlled through the key management system, so that the safety is considered under the condition of ensuring the data encryption and decryption rapidness. The invention further discloses a database data safety management system.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for database data security management. Background technique [0002] With the popularity and development of the Internet, more and more online applications based on database technology provide services to customers. While database technology brings convenient applications to users, it also brings many problems, among which database information security issues are particularly prominent. Database administrators can take some precautions to help protect the security of the database, such as designing a security system, encrypting network transmission, and building a firewall around the database server, but if the media (such as drives or backups) is stolen or the database with high privileges is encountered The user maliciously bypasses the legitimate business to access the core data. The malicious party only needs to restore or attach the database to b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 刘廷舰刘铁峰鹿淑煜
Owner 山东三未信安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products