Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information protection method and system based on user authority automatic check

A technology for automatic inspection and information protection, applied in digital data protection, instruments, electrical digital data processing, etc., can solve the problems of difficult adjustment of control methods, detection and control methods that depend on the response link of user requests, and easy misjudgment, etc. The effect of preventing leakage risk

Pending Publication Date: 2021-10-26
CHINA CITIC BANK
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the field of data security, although the existing technologies cover database user security, database user use, data operation, etc., they are all post-event control technologies or based on the security detection of users themselves. The response to the request cannot achieve the optimal effect of prior control in terms of data protection
Moreover, the existing technology does not take into account the actual use of the user and the control means associated with sensitive information, and the unrelated control technology makes it difficult for the existing control means to adjust in time following the changes in the data system, and it is easy to cause misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method and system based on user authority automatic check
  • Information protection method and system based on user authority automatic check

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to understand the content of the present invention more clearly, it will be described in detail with reference to the drawings and embodiments.

[0043] Such as figure 1 Shown is a schematic flow chart of the information protection method based on automatic inspection of user rights in the present invention, and the main steps include:

[0044] Use the first call script to automatically obtain the list of existing users in the database in batches;

[0045] Use the second call script to obtain the database authorization records of the users in the existing user list, especially including the use of the second call script to regularly and automatically query the database system table syscat.tabauth to obtain the historical user authorization records of the database. Call the script to read the configuration file to obtain the historical user database db authorization records, global global user authorization records, tables table user authorization records and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information protection method and a system based on user authority automatic check, and the method comprises the steps: obtaining a user historical authorization record for matching a latest sensitive information keyword to revise a user authorization range; by anchoring sensitive information keywords updated in real time, adjusting the permission of an illegally authorized user in time, and achieving the effects of permission detection and beforehand control before data access. According to the method, historical user authorization records of the database are regularly and automatically obtained, unreasonable historical authorization of the database user is recovered in combination with sensitive information updated in real time, checking and control are conducted from the source according to the checking mode of the user permission instead of the user access request, the user possibly causing data leakage can be handled in advance, the problem that sensitive information is illegally tampered and leaked is solved, and therefore the data protection capacity is improved.

Description

technical field [0001] The invention relates to the technical field of data security protection, in particular to an information protection method and system based on automatic checking of user rights. Background technique [0002] With the continuous deepening of the development of informatization, more and more personalized and customized services need to call a large amount of data to participate in the calculation. For some specific industries, such as banking and financial fields, the data involved may contain highly sensitive information, and the legality of data requests must be fully verified during use to ensure the security of sensitive information and prevent tampering and leakage. [0003] Currently existing data security technologies usually include database hidden user detection, database statements, usage specifications of database users, authorization of external users of the system, and so on. For example, technology that focuses on the security of database...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245G06F2221/2141
Inventor 李妍刘明高阳
Owner CHINA CITIC BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products