Database password centralized management and application method and system oriented to application software

An application-oriented, centralized management technology

Pending Publication Date: 2022-06-10
NARI TECH CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]In most of the current automated information systems, the database passwords are managed and configured by each application software, and are distributed among multiple host devices, so there is a greater risk of password leakage, even if Password encryption protection and other methods are adopted, and it is difficult to achieve strict control
Moreover, if you change the database password regularly, you need to adjust and test the configuration of all the application software connected to the database every time, which will bring a large workload to the management and users, and seriously affect the normal use of the automated information system business.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database password centralized management and application method and system oriented to application software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] 1) The database password server PwdCenter is responsible for storing database passwords and providing network request services for application software.

[0021] 2) The database password application program interface PwdAPI can simplify the operation of the application software to request the database password from the server PwdCenter, and encapsulate the network request and encryption and decryption operations into an API interface. The application software only needs to call the API interface, perform simple function calls, and fill in Enter the call parameters and key to get the database password.

[0022] 3) The database password management client PwdManager is used to add, delete and modify the database password on the server PwdCenter.

[0023] 4) The system administrator uses the management client PwdManager to initiate a network connection to the database password server PwdCenter by calling the API interface PwdAPI.

Embodiment 2

[0025]6) When the application software of each business system needs to connect to the database, call the API interface PwdAPI, input parameters (parameter 1: database name, parameter 2: database user, parameter 3: encryption key), and the API interface PwdAPI sends a network request to Database password server PwdCenter. The API interface can provide various methods such as jar, dll, and lib library files, and supports cross-platform, cross-operating system and multi-programming language calls.

[0026] 7) After the database password server PwdCenter receives the request, follow the steps below:

[0027] (3) The database password is encrypted with a key and returned to the API interface called by the application software through the network.

[0028] 8) The API interface PwdAPI decrypts the received encrypted content again to obtain the database password and deliver it to the application software.

[0029] In this embodiment, the database administrator first completes the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application software-oriented database password centralized management and application method and system in the technical field of information security, a database password service is set for storing and issuing database passwords, and application software needing to be connected with a database is not independently configured with the database passwords any more. The method is realized by a database password service component, and has the core functions of receiving a network request initiated by application software and used for acquiring a database password, verifying parameter information in the network request, and returning the database password in an encrypted form to the application software after the verification is passed. On the premise that the security of the database password is improved, the use complexity of the application software end is simplified, and one-time modification and automatic distribution of the database password are realized.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an application software-oriented centralized management and application method and system for database passwords. More specifically, it relates to a method and software for implementing secure centralized storage and distribution of database passwords in an automated information system. Background technique [0002] In most current automated information systems, database passwords are managed and configured by each application software, and are scattered across multiple host devices. There is a greater risk of password leakage. Even if methods such as password encryption and protection are adopted, it is difficult to achieve strict control . Moreover, if you change the database password regularly, you need to adjust and test the configuration of all the application software connected to the database each time, which will bring a large workload to the man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/46H04L9/08
CPCG06F21/6227G06F21/46H04L9/0894
Inventor 刘臣亮张金华舒凯赵宇单鹏珠韩晓言胡灿丁理杰滕予非陈刚王亮
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products