Method and system for preventing sensitive data leakage of database

A sensitive data and database technology, applied in the field of anti-database sensitive data leakage, can solve sensitive data leakage and other problems, achieve the effect of improving the effect, avoiding sensitive data leakage, and improving the security of data access

Pending Publication Date: 2021-07-23
北京以弈信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in order to ensure the data security between the terminal equipment and the Internet database, Internet operators realize the control of the terminal equipment accessing the Internet database through a unified security management platform, and the management platform realizes the authentication of the terminal equipment based on the verification key , and this method still has certain security problems; for example, when a user's terminal device is stolen, the thief can view sensitive data from the database through the terminal, resulting in the leakage of sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing sensitive data leakage of database
  • Method and system for preventing sensitive data leakage of database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] see figure 1 As shown, an embodiment of the present invention provides a method for preventing database sensitive data leakage, and the method includes the following steps:

[0052] S1. Receive a data access request sent by the first access terminal in the server;

[0053] S2. Determine whether the desired access location is included in the data access request; yes, proceed to step S3; no, proceed to step S4; specifically, the desired access location is the sub-library that the first access terminal expects to access;

[0054] S3. Identify the first access authority of the first access terminal; specifically, the first access authority is the sub-library that the first access terminal can access under the current restricted authority;

[0055] S4. Determine whether the desired access location matches the first access authority; if yes, proceed to step S5; if no, proceed to step S6;

[0056] S5. Execute data access according to the desired access location;

[0057] S6...

Embodiment 2

[0071] see figure 2 As shown, an embodiment of the present invention provides a system for preventing database sensitive data leakage, and the system includes:

[0072] The first receiving module 210; set in the server 200, and used for receiving the data access request sent by the first access terminal 100;

[0073] The first analysis module 211 is set in the server 200, and is used to analyze and obtain the expected access location of the first access terminal 100 from the data access request received by the first receiving module 210;

[0074] Identification module 212; set in the server 200, and used to identify the first access authority of the first access terminal 100;

[0075] Judging module 213; set in the server 200, and used to judge whether the desired access location matches the first access right;

[0076] The first execution module 214; is set in the server 200, and is used for performing alarm or access according to the analysis result of the first analysis ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of sensitive data protection, and discloses a method and system for preventing leakage of sensitive data of a database, and the method comprises the steps: S1, receiving a data access request sent by a first access terminal; S2, judging whether the data access request contains an expected access position or not; if yes, entering the step S3; if not, entering the step S4; S3, identifying a first access permission of the first access terminal; S4, judging whether the expected access position is matched with the first access permission or not; if yes, entering the step S5; if not, entering step S6; S5, executing data access according to the expected access position; S6, executing an abnormal access alarm, stopping access and clearing the first access authority of the first access terminal; in conclusion, fixed-point access is executed during data access, and whether abnormal access exists or not is judged by comparing the expected access position and the access permission of the access terminal, so that leakage of sensitive data can be effectively avoided.

Description

technical field [0001] The invention belongs to the technical field of sensitive data protection, and in particular relates to a method and system for preventing leakage of sensitive data in a database. Background technique [0002] With the rapid development and popularization of the Internet and mobile Internet, Internet applications have become the main means for daily individuals, enterprises or government departments to obtain and release information. Therefore, the amount of data in the Internet database is also increasing. There are also more and more sensitive data, such as personal ID cards, bank card numbers, personal home addresses, phone numbers, and mobile geographic trajectories. [0003] At present, in order to ensure the data security between the terminal equipment and the Internet database, Internet operators realize the control of the terminal equipment accessing the Internet database through a unified security management platform, and the management platfo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/22
CPCG06F21/6218G06F16/22
Inventor 孙永姝
Owner 北京以弈信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products