Database security access control method, device and system and terminal equipment

A security access control and database technology, applied in the fields of systems and terminal equipment, devices, and database security access control methods, to meet audit and data security requirements and improve data security.

Pending Publication Date: 2022-08-02
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome at least to a certain extent the problem of malicious tampering of stored data or leakage of sensitive data during traditional database access, this application provides a database security access control method, device, system and terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security access control method, device and system and terminal equipment
  • Database security access control method, device and system and terminal equipment
  • Database security access control method, device and system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the objectives, technical solutions and advantages of the present application more clear, the technical solutions of the present application will be described in detail below. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the examples in this application, all other implementations obtained by those of ordinary skill in the art without creative work fall within the scope of protection of this application.

[0047] figure 1 A flowchart of a database security access control method provided by an embodiment of the present application, such as figure 1 As shown, the database security access control method includes:

[0048] S11: Capture the data packets in the database access request;

[0049] S12: Parse the data packet to obtain access request information;

[0050] S13: Match the access request information with the preset blocking rule;

[0051] S14: If the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database security access control method, device and system and terminal equipment, and belongs to the technical field of database security, the database security access control method comprises the following steps: capturing a data packet in a database access request, analyzing the data packet to obtain access request information, matching the access request information with a preset blocking rule, and sending the matching result to the terminal equipment; and if the matching is successful, blocking the access request. Database security access control is realized, the requirements of database auditing and data security are met, and the data security is improved.

Description

technical field [0001] The present application belongs to the technical field of database security, and in particular relates to a database security access control method, device, system and terminal device. Background technique [0002] At present, data systems in all walks of life are equipped with databases, and a large amount of information is stored in the databases. For some databases, such as MySQL, MongoDB, TiDB, etc., the audit function of the database itself is not perfect, and the data security in the database is not guaranteed. Even if some databases have auditing functions to supervise database access behavior, for example, according to database auditing requirements, application developers cannot have write permissions for the production environment database of the audit library / sensitive library. If there is no unified access restriction between the office network and the production environment database, once the database account password is leaked, you can d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 路希孙宇
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products