Security protection providing system and method for database

A security protection and database technology, applied in digital data protection, digital data authentication, electronic digital data processing, etc., can solve the problems that computers accessing the database cannot be controlled, blocked, and illegal computer connections cannot be prevented.

Pending Publication Date: 2021-09-17
无锡慧盾安全科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. Cannot control the computer accessing the database
Any computer can connect to the database, and the connection of illegal computers cannot be prevented
[0011] 2. Any application or tool can connect to the database, causing illegal applications or tools to obtain data information from the database
The

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection providing system and method for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The server program is installed on the database service, and the client is installed on the application side.

[0032] In addition, a very important point to realize the system of the present invention is the setting of security policy:

[0033] The security policy includes the following items:

[0034] 1) Security level setting

[0035] In order to meet the different security needs of various customers, there are three levels of security: nuclear secret, confidential, and secret.

[0036] 2) Encryption algorithm setting

[0037] Different encryption algorithms can be set through the application, such as DES, 3DES, AES, RC4, etc.

[0038] 3) Key setting

[0039] Different keys can be set through the application program, and keys of any length can be set.

[0040] 4) Risk query operation setting

[0041] Define the query object, including: table name, field name.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protection providing system and method for a database. The system comprises an access module, an access control module, a database file protection module, an encryption and decryption module, a hard disk copy prevention module and a log recording module; the access module allows/forbids access to the database; the access control module allows legal applications and tools to be connected with the database and forbids the connection of database with other applications and tools; the database file protection module protects the database files from being deleted, copied, moved and the like; the encryption and decryption module encrypts files exported from the database by legal applications and tools, and, when encrypted data files are imported, decrypts the encrypted data files first and then imports the decrypted files into the database; the hard disk copy prevention module forbids the disk-level backup of the hard disk; the log recording module records all operations on the database, operation time, operation types, operators and the like. According to the system and the method, security protection is provided for the database, the protection is comprehensive, the expandability is good, the security is high, and the system resource occupancy rate and the user experience is good.

Description

technical field [0001] The present invention relates to a system and method for providing security protection for a database. For a database server, through operating system network drivers, file drivers, SPI, HOOK and encryption and decryption technologies, the protection of data in the database can be realized to avoid database data leakage possible. [0002] Abbreviations and explanations: [0003] SPI: Windows Network Access Control Technology [0004] HOOK: Windows hook technology [0005] IP: computer network access address [0006] Network driver: based on the network transmission driver on winodws / linux. [0007] Ghost: Disk Backup Tool Background technique [0008] With the continuous development of enterprise informatization, enterprises build information systems: business systems, office systems, financial systems, etc., and the data of these systems are stored in databases, many of which have sensitive information databases for corporate customers. The data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F21/31
CPCG06F21/6218G06F21/602G06F21/31
Inventor 王晓波
Owner 无锡慧盾安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products