Database security access control method, device and system and terminal equipment
A security access control and database technology, applied in the fields of systems and terminal equipment, devices, and database security access control methods, to meet audit and data security requirements and improve data security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to make the objectives, technical solutions and advantages of the present application more clear, the technical solutions of the present application will be described in detail below. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the examples in this application, all other implementations obtained by those of ordinary skill in the art without creative work fall within the scope of protection of this application.
[0047] figure 1 A flowchart of a database security access control method provided by an embodiment of the present application, such as figure 1 As shown, the database security access control method includes:
[0048] S11: Capture the data packets in the database access request;
[0049] S12: Parse the data packet to obtain access request information;
[0050] S13: Match the access request information with the preset blocking rule;
[0051] S14: If the m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com