Unlock instant, AI-driven research and patent intelligence for your innovation.

Database permission allocation method and related device

A distribution method and database technology, applied in the field of database management, can solve problems such as complex database authority recovery process, malicious data tampering, less recovery of user authority, etc., to ensure correctness and data security, reasonable authorization or recovery, and optimal authorization Effect

Pending Publication Date: 2022-03-29
杭州安恒信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of business needs, users are usually granted too many permissions, and because the database permission recovery process is relatively complicated, and there is a certain communication cost, user permissions are usually rarely recovered, so there are risks such as malicious data tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database permission allocation method and related device
  • Database permission allocation method and related device
  • Database permission allocation method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The core of the present application is to provide a method for allocating database authority, which can realize self-adaptive and reasonable authority allocation. Another core of the present application is to provide a database authority distribution device, equipment, and computer-readable storage medium, all of which have the above-mentioned technical effects.

[0044] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database permission allocation method and a related device, and the method comprises the steps: obtaining database user permission information, and generating a database user permission set according to the database user permission information; acquiring database user operation behavior information, and generating a database user operation behavior set according to the database user operation behavior information; converting a first type of users in the database user operation behavior set into a second type of users to obtain an operation behavior set of the second type of users; the first type of users are users whose permissions cannot cover own businesses, and the second type of users are users whose permissions cover own businesses; counting the times of the operation behaviors of the second type of users, and generating an operation behavior statistical table of the second type of users according to the times; updating an operation behavior statistical table according to the weights of the operation behaviors of the second type of operation users; and comparing the database user permission set with the updated operation behavior statistical table, and updating permissions in the database user permission set according to a comparison result. According to the method, adaptive optimal authorization can be realized.

Description

technical field [0001] The present application relates to the technical field of database management, in particular to a method for allocating database authority; it also relates to a database authority allocating device, equipment and computer-readable storage medium. Background technique [0002] Database user authorization confusion is one of the most important reasons for malicious data tampering, data leakage, illegal operations and other high-risk data threat behaviors, so reasonable authorization is particularly critical. However, the current mainstream authorization scheme is to assign permissions to users in a pre-authorization manner. In view of business needs, too many permissions are usually granted to users, and because the database permission recovery process is relatively complicated, and there is a certain communication cost, user permissions are usually rarely recovered, so there are risks such as malicious data tampering. Therefore, how to effectively auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 聂桂兵莫金友吴小珍龙文洁
Owner 杭州安恒信息安全技术有限公司