Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security protection method and device, electronic equipment and storage medium

A data security and database technology, applied in the field of data security, can solve problems such as privacy data leakage, and achieve the effect of ensuring security

Pending Publication Date: 2022-04-19
闪捷信息科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current security protection means are database firewalls. Users can access the database through the firewall to prevent unauthorized operations. However, some attackers can bypass the database firewall and directly connect to the database to obtain data, resulting in the leakage of private data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device, electronic equipment and storage medium
  • Data security protection method and device, electronic equipment and storage medium
  • Data security protection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0034] figure 1 A schematic flow diagram of a data security protection method provided in the embodiment of this application, as shown in figure 1 As shown, this method can be applied to the server connected to the database. The server has an agent end and a management end. The agent end is the protection end of the outer layer of the database. It protects the database on the basis of the database firewall and can The data request sent by the client is processed accordingly to provide data protection, and the management terminal is used to implement database management functions, such as adding data assets, configuring rules, and data encryption. The method includes:

[0035] Step 101: Obtain permission information of the client and a first SQL statement, the first SQL statement includes a stateme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security protection method and device, electronic equipment and a storage medium. The method comprises the steps that permission information of a client side and a first SQL statement are obtained, the first SQL statement comprises a statement type and a field, and the field comprises an encrypted field; if the statement type is a query type, querying from a target database based on a first SQL statement to obtain a query result, the query result comprising encrypted data corresponding to an encrypted field; processing the query result according to the permission information to obtain a target query result; and returning the target query result to the client. The query result queried by the SQL statement is processed according to the obtained client permission information, so that data security access of different user permissions is realized, and a safer data security protection means is provided.

Description

technical field [0001] The present application relates to the field of data security, in particular, to a data security protection method, device, electronic equipment, and storage medium. Background technique [0002] With the advancement of information technology, people are paying more and more attention to information security. Once the private data stored in the database is leaked, the consequences will be disastrous. Therefore, the requirements for database security protection are getting higher and higher. [0003] The current security protection means are database firewalls. Users can access the database through the firewall to prevent unauthorized operations. However, some attackers can bypass the database firewall and directly connect to the database to obtain data, resulting in the leakage of private data. Contents of the invention [0004] The purpose of the embodiments of the present application is to provide a data security protection method, device, electron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/2455G06F16/28
CPCG06F21/602G06F21/6254G06F21/62G06F16/2455G06F16/284
Inventor 张黎刘青李蓓蓓陈广辉刘维炜
Owner 闪捷信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products