Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A database protection method

A database and data technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve the problems that cannot fundamentally prevent data leakage in the database, database data information leakage, leakage, etc.

Active Publication Date: 2017-04-12
CHINA NAT SOFTWARE & SERVICE
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these protective measures are helpful to the centralized storage database protection, the above protective measures cannot solve the following problems
[0004] Unintentional data loss by insiders: Insiders will come into contact with various data information during the operation process. When the information is exported to the local in plain text, the scope of use of these data can no longer be controlled through traditional protection measures. Data is easily lost. Existing Safeguards are ineffective for protecting database data reaching endpoints
[0005] Malicious data leakage by insiders: Insiders, especially database administrators, have all access rights to the database. Insiders can export database data information to cause data leakage. However, the existing security protection can only be audited after the event, and cannot fundamentally To prevent data leakage in the database;
[0006] Take the operation of the internal database administrator as an example; one situation is that the administrator directly saves the data obtained from the database to the terminal for the convenience of viewing, and in this case other personnel can view the data as long as they obtain the right to use the terminal; there is another The second situation is that the administrator maliciously operates, resulting in the complete leakage of the entire database data information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A database protection method
  • A database protection method
  • A database protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples of implementation.

[0027] The main purpose of the present invention is to control the loss of data information after the database terminal management program obtains the protected database instance, so as to ensure the safety of the data information in the database in the terminal environment.

[0028] In the following detailed description, numerous specific details are given, such as specific method sequences, structures, elements, and connections. It should be understood, however, that this and other specific details such as: common knowledge, system environment elements, etc., are not exhaustive.

[0029] 1) Strategy formulation and application;

[0030] The policy is uniformly formulated and delivered by the policy server; the policy server is responsible for formul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a database protection method. According to the database protection method, data loss control is performed on a database terminal management program which access database examples to guarantee safety of database data during a utilization process of a terminal; data outflow control is performed on the database terminal management program which access the database examples and the database data is allowed to examine but is forbidden to be guided out to the terminal; data using range control not confining to the current access database examples is guaranteed, data guiding-in and guiding-out between different databases are convenient due to guiding out of a data forced encryption mode, and safe of the data which separates the database during a propagation process is guaranteed; network transmission safety of the data from the database examples to the terminal which the database terminal management program is in is guaranteed through a safe channel encryption mode.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to the protection of data information in a database system. [0002] Background technique, [0003] As a typical form of centralized storage of structured data, the security of the database has always been concerned by security vendors, colleges and research institutes. The existing database data security protection measures mainly include the following aspects: database access authentication, user authorization and fine-grained access control, database audit, database storage file isolation or encryption, etc. Although these protection measures are helpful to the centralized storage database protection, the above protection measures cannot solve the following problems. [0004] Unintentional data loss by insiders: Insiders will come into contact with various data information during the operation process. When the information is exported to the local in plain t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 王文宇苑海彬吴生东刘玉红
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products