Access control system based on telecommunication database

An access control and database technology, applied in digital transmission systems, transmission systems, electrical components, etc., to solve problems such as leakage, tampering of operational data for profit, and leakage of sensitive data.

Inactive Publication Date: 2020-08-18
王尧
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides an access control system based on a telecommunication database to solve the technology that the access control system of the telecommunication database is tampered with for profit and leaks sensitive data due to leakage of a password with management authority question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] An access control system based on a telecommunications database, comprising: a telecommunications platform server S running the access control system df , the telecom platform server S df Configured with a telecom platform database S i , running a PC terminal U with an access control system i , PC terminal U i Through the network communication equipment on the access control system and the telecommunications platform server S df Realize mutual communication connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of telecommunication database access control and further discloses an access control system based on the telecommunication database. The system comprises atelecommunication platform server Sdf in which an access control system is operated, wherein the telecommunication platform server Sdf is configured with a telecommunication platform database Si anda PC terminal Ui runs the access control system, and the PC terminal Ui is in communication connection with the telecommunication platform server Sdf on the access control system through network communication equipment; the access control system adopts a verification method based on zero knowledge proof to verify the user identity of the PC terminal Ui, and only if the user identity of the PC terminal Ui passes the verification of the access control system, the telecommunication platform server Sdf allows the PC terminal Ui to access the telecommunication platform database Si. According to theinvention, the technical problems that the operation data is tampered and profit is gained and the sensitive data is leaked due to the leakage of the password with the management authority in the access control system of the telecommunication database are solved.

Description

technical field [0001] The invention relates to the technical field of telecommunications database access control, in particular to an access control system based on a telecommunications database. Background technique [0002] As security incidents such as operational data being tampered with for profit and sensitive data leakage continue to occur, telecom operators are paying more and more attention to the security protection and reinforcement of databases. An information system must deploy a security strategy as a whole, and the security of the database first depends on the security of the network system. As the first line of defense of the system, the firewall monitors the access channel between the trusted network and the untrusted network, and can form a protective barrier between the internal and external networks to block illegal access from the outside. The operating system is the operating platform of the database system and can provide a second layer of security p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/08H04L63/083H04L63/10H04L63/123H04L9/0863H04L9/0869
Inventor 王尧
Owner 王尧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products