Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Database table structure construction method and device, computer equipment and storage medium

A construction method and database technology, applied in the direction of database index, database management system, computing, etc., can solve the problems of incomplete database table structure, difficult management, data leakage, etc., and achieve complete construction of database table structure and intelligent construction of database table structure. , the effect of ensuring reliability and availability

Pending Publication Date: 2021-06-29
深圳红途科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the first method, when using the bypass mode to deploy and extract network traffic, because the deployment is based on port mirroring or optical splitting equipment, due to the physical location of the deployment, it requires a large number of equipment deployments in large-scale network deployments, and management becomes extremely difficult; When using the proxy mode to deploy and extract network traffic, it will change the network architecture design, increase the complexity of the network architecture, increase the difficulty of network operation and maintenance, reduce the efficiency of troubleshooting, and reduce the reliability and availability of the overall network; regardless of the use of bypass Deployment mode or proxy mode is limited by the physical limitations of port mirroring and optical splitting devices. It cannot be deployed and implemented in a cloud environment, and it is impossible to manage and manage the access to the data collection object, that is, the database, through an interactive data collection strategy. Control, such as through application interfaces, interface fields, collection frequency, data collection volume, etc.; for open source databases such as mysql, mariadb, PostgreSQL, etc., SQL statements and returned data can be extracted during network traffic analysis, but for non-open source databases For databases such as oracle, DB2, Dameng, etc., due to the use of private protocols, their data encoding rules have not been disclosed. If they want to extract the executed SQL statements and transmitted data, they need to be decoded. However, the existing products that use network traffic analysis database protocol technology are all It is difficult to completely extract the SQL statement and the returned data; because the extracted SQL statement is incomplete, the construction of the database table structure information is incomplete; when constructing the database table structure information, there is no field type in the parsed SQL statement , field length and other information, so the constructed database table structure is not complete
The second method needs to establish an account and authorize each database to be connected, and then enter the account and password on the product that needs to be connected to connect. Maintenance personnel and product maintenance personnel are a challenge. The database identification and database desensitization products currently on the market belong to this type; due to security requirements, it is necessary to regularly modify the database account password, so how to regularly modify the database account password and synchronize it safely When it comes to products, it has also become a major problem in security operation and maintenance. If the security protection measures are not done well, it may lead to the leakage of account passwords and security incidents leading to data leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database table structure construction method and device, computer equipment and storage medium
  • Database table structure construction method and device, computer equipment and storage medium
  • Database table structure construction method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0058] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a database table structure construction method and device, computer equipment and a storage medium. The method comprises the following steps:formulating a collection strategy and issuing the collection strategy to an application server, so that the application server collects user behavior data and application transmission data to obtain intermediate data, and specifically, the application server sets an actual collection strategy by adopting a switching mode according to the collection strategy; intercepting the access data by the application server by adopting a byte enhancement technology to obtain intercepted data; the application server collects user behavior data and application transmission data from the intercepted data according to an actual collection strategy to obtain intermediate data; gathering intermediate data; filtering the intermediate data based on the application database access interface to obtain target data; and analyzing and constructing a database table structure according to the target data. By implementing the method provided by the embodiment of the invention, the database table structure can be constructed more comprehensively, automatically, intelligently and completely, and the security is high.

Description

technical field [0001] The present invention relates to a data processing method, and more specifically refers to a database table structure construction method, device, computer equipment and storage medium. Background technique [0002] When auditing the database and identifying sensitive data in the database, the database table structure information is needed, and the table structure information generally includes database IP (Internet Interconnection Protocol, Internet Protocol) or domain name, database name, table name, field name and other information. [0003] There are two main ways to construct the database table structure. One is to use network traffic to analyze database-related protocols and extract SQL (Structured Query Language, Structured Query Language) statements, and then construct database tables by analyzing SQL syntax and semantics. Structural information, and the other is to use an authorized database account to connect to the database to pull table str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/22G06F16/242G06F16/25
CPCG06F16/2282G06F16/2433G06F16/252
Inventor 肖茂林
Owner 深圳红途科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products