Unlock instant, AI-driven research and patent intelligence for your innovation.

Multivariate database access control and auditing system based on multiple security authentication mechanisms

A security authentication and access control technology, applied in the field of database management, can solve problems such as increasing application load, system crashes, and data security risks, and achieve the effects of improving security performance, reducing operating load, and saving data resources

Pending Publication Date: 2022-02-18
INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Operation and maintenance personnel can freely operate the database, access and export data, these operation logs cannot be audited, and the security of the database and data cannot be guaranteed
Even in some tools with access auditing, only basic statistics such as access logs can be simply generated. Once the data on the application side is lost or the system crashes, the access logs will no longer exist, resulting in data security risks
At the same time, adding additional access logs will increase the load on the application side, and once the number of applications increases, it will cause too much asynchronous data, making statistical analysis on the database side difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariate database access control and auditing system based on multiple security authentication mechanisms
  • Multivariate database access control and auditing system based on multiple security authentication mechanisms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present application will be further described in detail below in conjunction with specific embodiments, but the protection scope of the present application is not limited to the following description.

[0034] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0035] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multivariate database access control and auditing system based on multiple security authentication mechanisms, comprising at least one input device used for creating a data source, and the generated data source endows the data source with at least one identifier; a data access port is used for calling a data source in the database server in response to an access request of a user; an access auditing module is used for auditing the access authority of the user based on the access request of the user; a data calling execution module responds to the access auditing module and calls a corresponding data source in the database server when the access request of the user is passed; a logic processing module is used for carrying out logic operation on the identifier so as to record an access record of the data source. According to the system, the safety performance of the database can be improved, meanwhile, the database does not need to carry out statistical analysis on asynchronous data, and the operation burden of the database is reduced.

Description

technical field [0001] This application relates to the field of database management, in particular to a multiple database access control and audit system based on multiple security authentication mechanisms. Background technique [0002] Database (Database) is a warehouse that organizes, stores and manages data according to the data structure. It was produced more than 60 years ago. With the development of information technology and the market, especially after the 1990s, data management It is no longer just storing and managing data, but has transformed into various data management methods that users need. There are many types of databases, ranging from the simplest tables storing various data to large database systems capable of storing massive amounts of data, which have been widely used in various aspects. In an information society, fully and effectively managing and utilizing various information resources is a prerequisite for scientific research and decision-making ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/23G06F16/2458
CPCG06F21/6227G06F16/23G06F16/2462
Inventor 吴斗张瑞强曾愚金鑫蒋何王锐杰刘佳奇李途刘坤灵张然马俊赵家宝
Owner INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER