Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication-based data access method and system applied to database operation and maintenance

A data access and identity authentication technology, which is applied in the field of data access methods and systems based on identity authentication, can solve the problems of low data access security and inability to accurately control data access rights, so as to speed up verification efficiency, improve efficiency, The effect of improving safety

Active Publication Date: 2021-11-23
GUANGDONG ELECTRIC POWER COMM CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a data access method and system based on identity authentication applied in database operation and maintenance to overcome data access during operation and maintenance in the prior art due to the inability to accurately control data access rights during operation and maintenance. The problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication-based data access method and system applied to database operation and maintenance
  • Identity authentication-based data access method and system applied to database operation and maintenance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the objects and advantages of the present invention clearer, the present invention will be further described below in conjunction with the examples; it should be understood that the specific examples described here are only for explaining the present invention, and are not intended to limit the present invention.

[0052] Preferred embodiments of the present invention are described below with reference to the accompanying drawings. Those skilled in the art should understand that these embodiments are only used to explain the technical principle of the present invention, and are not intended to limit the protection scope of the present invention.

[0053] In addition, it should be noted that, in the description of the present invention, unless otherwise clearly stipulated and limited, the terms "installation", "connection" and "connection" should be understood in a broad sense, for example, it can be a fixed connection or a It is a detachable connection ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication-based data access method and system applied to database operation and maintenance, and relates to the technical field of data processing, and the method comprises the steps: S1, inputting user identity information through a login unit for user login, wherein the user identity information comprises a user code, a user name and a user identity card number; S2, inputting an access key through a first input unit, wherein the access keys comprise three groups of keys with different compositions, the first group of keys consists of capital letters and numbers, the second group of keys consists of lowercase letters and numbers, and the third group of keys consists of symbols and numbers; S3, enabling a verification unit to verify the input access key; S4, after the access key passes verification, inputting an extraction code through a second input unit; and S5, extracting the corresponding access data by an extraction unit according to the extraction code. According to the method, the security of data access during database operation and maintenance is effectively improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data access method and system based on identity authentication applied in database operation and maintenance. Background technique [0002] Data access is a behavior in which an application links to a data source to access data. In most applications, data is often needed, and these data may come from many different types of sources, such as databases, network data sources, or Local files enter the data source through a layer of intermediary code or middleware, and the data is taken out and sent to the application for processing. Database operation and maintenance refers to software installation, configuration optimization, backup strategy selection and implementation, data recovery, data migration, troubleshooting, preventive inspection and other maintenance processes for user databases. [0003] In the prior art, during database operation and maintenance, due to arbit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/60G06F21/62G06F21/64
CPCG06F21/31G06F21/602G06F21/6218G06F21/64
Inventor 吴丽琼陈守明林细君李凯彦逸柯康银唐亮亮
Owner GUANGDONG ELECTRIC POWER COMM CO LTD