Database access control method and system and related equipment

An access control and database technology, applied in the field of data processing, can solve problems such as data leakage, achieve precise access control and improve security.

Active Publication Date: 2019-12-20
金蝶蝶金云计算有限公司
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the ERP business, when cooperating with a third party for in-depth business integration, there will be a business scenario in which both parties conduct business expansion based on the same database. The current mainstream whitelis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access control method and system and related equipment
  • Database access control method and system and related equipment
  • Database access control method and system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Embodiments of the present invention provide a database access control method, system and related equipment, which are used to reduce the granularity of database access control and improve the security of data access.

[0050] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0051] The terms "first", "second", "third", "fourth" and the like in the description and claims of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a database access control method, a database access control system and related equipment, which are used for reducing the granularity of database access control and improving the security of data access. The method of the embodiment of the invention comprises: receiving a database operation request, and parsing operation information and authentication information in the database operation request, wherein the operation information at least comprises an operation object table; verifying whether the authentication information is valid or not, and if the authentication information is valid, judging whether the operation object table exists in a preset white list or not; and if the operation object table exists in a preset authorization white list, executing a corresponding operation in the database operation request, and if the operation object table does not exist in the preset authorization white list, not allowing the corresponding operation inthe database operation request.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a database access control method, system and related equipment. Background technique [0002] The current database access control is mainly established at the IP address level. It is based on the user IP address to decide whether to allow access to data. After the user configures the whitelist list, when the user IP accesses the database, the decision whether to allow access is based on the whitelist list. [0003] In the ERP business, when cooperating with a third party for in-depth business integration, there will be a business scenario in which both parties conduct business expansion based on the same database. The current mainstream whitelist method is authorization at the IP address level, and the IP After authorization, the entire database can be accessed. Since there are data tables that are not related to third-party businesses in the database, there is a risk of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F16/2455
CPCG06F21/6218G06F16/2455
Inventor 刘喜
Owner 金蝶蝶金云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products