Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protecting method based on target labeling and operation device

A technology for data protection and execution device, applied in the field of object tag-based data protection method and execution device, can solve problems such as coarse granularity, and achieve the effects of improving security and being easy to understand and use.

Inactive Publication Date: 2007-05-23
北京人大金仓信息技术股份有限公司 +7
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is: the granularity of data access control is at the table level or column level, and the granularity is relatively coarse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protecting method based on target labeling and operation device
  • Data protecting method based on target labeling and operation device
  • Data protecting method based on target labeling and operation device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific embodiments of the present invention will be described below in conjunction with the drawings. Figure 1 shows the block diagram of the database management system, and its applicable platforms are:

[0029] One, server side

[0030] Hardware environment:

[0031] CPU: Pentium IV or above or compatible models;

[0032] Memory: 256M or more, 512M or more is recommended;

[0033] Hard disk: at least 1G free space. It is recommended to use NTFS or EXT-3 for the file system.

[0034] Software environment: Windows 2000, Windows XP, Windows 2003, Red Hat, Red Flag Linux, etc.

[0035] 2. Client:

[0036] Hardware environment:

[0037] CPU: Pentium III or higher or compatible models;

[0038] Memory: above 128M;

[0039] Hard disk: at least 100M free space.

[0040] Software environment: Windows 2000, Windows XP, Windows 2003, Red Hat, Red Flag Linux, etc.

[0041] 3. The database management system function:

[0042] Among them, the KingbaseES system consists of a batch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an object-label-based data protection method and the execution device, including the following steps: according to user information, generate user's security licensing; when generate data, grant the data security labels according to user's security licensing; during accessing data, determine whether the user has the authority to access the data according to the user's security licensing and the data security labels. It improves the problem and deficiency of the existing data protection methods, and provides more security for the data.

Description

Technical field [0001] The present invention relates to data security protection technology, in particular to a data protection technology in a multi-user database management system (DBMS), and specifically to a data protection method and execution device based on object tags. Background technique [0002] Data security has always been a concern in database systems. Data security in the database refers to protecting the data in the database from damage, alteration or leakage. Data protection methods refer to measures taken to protect data security. [0003] The usual data protection methods are: [0004] Autonomous access control: Give users the authority to read, write, modify, and delete data, and users with authority can perform corresponding operations on the data. The disadvantage of this method is that the granularity of data access control is table-level or column-level, and the granularity is relatively coarse. Summary of the invention [0005] The purpose of the present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/62
Inventor 王珊杜小勇任永杰张文亮张孝彭朝晖肖艳芹
Owner 北京人大金仓信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products