Unlock instant, AI-driven research and patent intelligence for your innovation.

Remote brute force cracking prevention method based on database security

A database, anti-violence technology, applied in the field of Internet security, can solve problems such as corporate economic losses, affect corporate image, etc., to achieve the effect of anti-brute force technology security

Pending Publication Date: 2021-03-12
BEIJING HUATECH INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the information is tampered with or leaked, it will cause economic losses to the company, and affect the image of the company, and even the safety of the industry and society.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote brute force cracking prevention method based on database security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A remote anti-brute force cracking method based on database security, such as figure 1 shown, including the following steps:

[0046] S1. Obtain registered user information and receive system security policies;

[0047]The management center formulates a security policy against brute force cracking and sends it to the client. The content of the policy includes: database account lockout threshold, database account lockout time, database account reset counter time, and unlocking methods. Specifically,

[0048] Database account lock threshold: divide the database into legal accounts and illegal accounts, and configure account lock thresholds for the two types of accounts respectively;

[0049] Legal account: the account name is in the database user list;

[0050] Illegal account: the account name is not in the database user list;

[0051] Account lock threshold: When a legal account or an illegal account fails to log in more than a certain number of times within the spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a remote violent cracking prevention method based on database security, which comprises the following steps of: firstly, registering to a management center, receiving databasesecurity policies, automatically checking a current database environment, obtaining information such as a database access port and the like, capturing outbound / inbound communication data packets related to account verification between all remote IPs and a local database port, finally analyzing the captured communication data packets, and executing corresponding security policies according to the captured information. The method allows database security management personnel to autonomously formulate security policies, including account legality detection formulation, account locking frequency threshold, account locking time and account unlocking mode diversification, so that the violent cracking prevention technology of a database account is more flexible and applicable. According to the method, a black list and white list function is added, and related security policies are combined, so that the database account violent cracking prevention technology is safer.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a remote anti-violence cracking method based on database security. Background technique [0002] With the development of computer Internet technology and the advent of the era of big data, the application of various data information systems is becoming more and more extensive. As the basic core of business platform information technology, the database carries the analysis and management functions of data information recording, access, interaction, etc., and has gradually become the most important strategic asset in national public security units and enterprise organizations. The safe and stable operation of the database also directly determines whether the business system can be used normally. And the database of the platform often stores extremely important and sensitive information. Once the information is tampered with or leaked, it will cause economic losses to the enterpri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/101H04L63/1441H04L63/02H04L63/108
Inventor 王晓娜任鹏龙邹自果
Owner BEIJING HUATECH INFORMATION TECH CO LTD