Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and access control system

An access control and binding relationship technology, applied in the field of database access, can solve problems such as difficulty in ensuring data security in the cloud or database platform, increasing enterprise costs, and increasing the risk of data leakage, so as to reduce the risk of data leakage and reduce costs. , the effect of ensuring data security

Active Publication Date: 2020-05-08
国久大数据股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the first method mentioned above is difficult to ensure the data security of the cloud or database platform because all external IP access is enabled, which will increase the risk of data leakage
In addition, although the above-mentioned second and third methods can ensure the data security of the cloud or database platform, if you apply for a fixed public network IP and VPN private line connection, you need to pay the Internet service provider related fees for line construction and line deployment. This will increase the cost on the enterprise side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and access control system
  • Access control method and access control system
  • Access control method and access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0051] In order to better understand the above technical solutions, the technical solutions of the present invention will be described in detail below through the accompanying drawings and specific examples. It should be understood that the embodiments of the present invention and the specific features in the examples are detailed descriptions of the technical solutions of the present invention, and It is not a limitation to the tech...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of database access, in particular to an access control method and system. An MySQL server can obtain a binding relationship between a domain name and a current public network exit IP; when the current public network exit IP is inconsistent with the target public network exit IP bound with the domain name, the office intranet server isallowed to access through the current public network exit IP, the target public network exit IP bound with the domain name in the MySQL server is upadeted to the current public network exit IP. Only the office intranet server corresponding to the current public network exit IP is allowed to access the MySQL server, the data security of the MySQL server is ensured, and the risk of data leakage is reduced. A current public network exit IP is an IP carried by an office intranet server; therefore, a fixed public network IP and a VPN special line do not need to be applied for the office intranet server, the office intranet server does not need to pay related expenses of line building and line deployment to an internet service provider, and the cost of the office intranet server side can be reduced.

Description

technical field [0001] The invention relates to the technical field of database access, in particular to an access control method and an access control system. Background technique [0002] With the development of big data technology, data storage presents a multi-terminal distribution. For example, data can be stored in the cloud, database platform, local device or data collection terminal, etc. Generally speaking, the enterprise end obtains corresponding data services by accessing the cloud or database platform. [0003] However, some enterprises may not apply for a fixed public network IP. In this case, the enterprise mainly accesses the cloud or database platform through the following methods: [0004] (1) The cloud or database platform enables all external IP access, so that enterprises without fixed public network IP can freely access the cloud or database platform. [0005] (2) The enterprise side upgrades the office environment, applies for a fixed public network I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06G06F21/62
CPCH04L63/10G06F21/6245H04L63/02H04L61/5053H04L61/5007H04L61/4511
Inventor 帅海龙冼臻
Owner 国久大数据股份有限公司