Computer firewall device based on cloud database and using method
A database and firewall technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to guarantee effectiveness, inability to independently improve protection performance, and consumption of database session resources.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0020] A computer firewall device and usage method based on cloud database, comprising the following steps:
[0021] S1. Intelligent identification and control of application protocols: it can automatically identify DBA protocols, operation and maintenance protocols, hacker access, and application software, comprehensively monitor access to all interfaces of the database, and realize effective access control;
[0022] S2. Accurate interception: It can be blocked based on various conditions such as IP address, time, operation, keyword, database account, statement length, column name, table name, row number, injection feature library, etc., to achieve precise access control;
[0023] S3, Anti-APT attack: quickly verify and block complex and continuous violation operations and malicious attacks according to the combination of access behaviors and statistical models;
[0024] S4. Built-in AI: Built-in intelligent learning module, machine intelligent learning, automatic modeling, a...
Embodiment 2
[0031] A computer firewall device and usage method based on cloud database, comprising the following steps:
[0032] S1. In the transparent bridging mode, there is no need to set an IP address for it, and it has "zero" impact on the original network configuration. Through various bypass modes, it can ensure that the business is still running normally under various software and hardware failures;
[0033] S2. The client logically connects to the address of the firewall device, and the firewall device forwards traffic to the database server; through the proxy access mode, the network topology remains unchanged;
[0034] S3. Accurate interception: It can be blocked based on various conditions such as IP address, time, operation, keyword, database account, statement length, column name, table name, row number, injection feature library, etc., to achieve precise access control;
[0035] S4. According to the combination of access behaviors and statistical models, quickly verify and ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com