Interception auditing method and system for data access
A data access and database technology, applied in the field of communications, can solve the problems of difficulty in implementation, difficult to promote, and increase the cost of interception and audit implementation, and achieve the effect of low transformation cost and easy promotion.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In order to help better understand the solutions provided by the embodiments of this application, before introducing the methods provided by the embodiments of this application, some nouns appearing in the embodiments of this application are first explained:
[0040] JDBC (Java Database Connectivity, Java database connection) driver: It is a software package that follows the JDBC standard and is provided by each database manufacturer. When the application program accesses the database, it sends the access command to the database through the JDBC driver, and receives the execution result returned by the database. The Driver, Connection and Statement in the embodiment of this application are all components of the JDBC driver.
[0041] Application system: In the embodiment of this application, it refers to various software systems that can access the database.
[0042] Reflection: Java's reflection mechanism. It refers to the mechanism of dynamically obtaining program in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


