Unlock instant, AI-driven research and patent intelligence for your innovation.

Data access method and system based on identity authentication applied in database operation and maintenance

A data access and identity authentication technology, which is applied in the field of data access methods and systems based on identity authentication, can solve the problems of low data access security and inability to accurately control data access rights, so as to speed up verification efficiency, improve efficiency, The effect of improving safety

Active Publication Date: 2022-06-21
GUANGDONG ELECTRIC POWER COMM CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a data access method and system based on identity authentication applied in database operation and maintenance to overcome data access during operation and maintenance in the prior art due to the inability to accurately control data access rights during operation and maintenance. The problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and system based on identity authentication applied in database operation and maintenance
  • Data access method and system based on identity authentication applied in database operation and maintenance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose and advantages of the present invention clearer, the present invention will be further described below with reference to the embodiments; it should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0052] Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only used to explain the technical principle of the present invention, and are not intended to limit the protection scope of the present invention.

[0053] In addition, it should also be noted that, in the description of the present invention, unless otherwise expressly specified and limited, the terms "installed", "connected" and "connected" should be understood in a broad sense, for example, it may be a fixed connection or a It is a detachable connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a data access method and system based on identity authentication applied in database operation and maintenance, and relates to the technical field of data processing, including, step S1, inputting user identity information through a login unit to log in; the user identity information includes User code, user name and user ID number; step S2, input the access key through the first input unit; the access key includes three groups of different keys, the first group of keys consists of capital letters and numbers, The second group of keys is composed of lowercase letters and numbers, and the third group of keys is composed of symbols and numbers; step S3, the verification unit verifies the inputted access key; step S4, after the access key is verified, , input the extraction code through the second input unit; step S5, the extraction unit extracts the corresponding access data according to the extraction code. The invention effectively improves the security of data access during database operation and maintenance.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data access method and system based on identity authentication applied in database operation and maintenance. Background technique [0002] Data access is the behavior of an application linking to a data source to access data. In most applications, data is often needed, and the data may come from many different types of sources, such as databases, network data sources or The native file enters the data source through a layer of intermediary code or middleware, and takes out the data and sends it to the application for processing. The database operation and maintenance refers to the maintenance and processing of software installation, configuration optimization, backup strategy selection and implementation, data recovery, data migration, troubleshooting, and preventive inspection for the user database. [0003] In the prior art, during database operation and maintenance...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60G06F21/62G06F21/64
CPCG06F21/31G06F21/602G06F21/6218G06F21/64
Inventor 吴丽琼陈守明林细君李凯彦逸柯康银唐亮亮
Owner GUANGDONG ELECTRIC POWER COMM CO LTD