XML (extensive markup language)-based remote and safe database access method

A remote access and database technology, applied in the field of computer network security, can solve problems such as poor management and ineffective management measures, and achieve the effects of easy analysis and unification, simple and effective language, and good scalability

Inactive Publication Date: 2015-02-18
GUIZHOU ZHONGKE BOZHI TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, according to a large number of surveys, at least 70% of the loss events of computer information sys...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] This specific embodiment adopts following technical scheme: the method for its remote access security is:

[0017] (1) The user fills in the corresponding data request form on the JSP page, and declares the fields that need to be encrypted, and then generates the corresponding encryption policy, and the request information is sent to the Web server through the http protocol;

[0018] (2) The client packs the customer access request into an XML message in Web Service format, and sends the XML message to the remote database server;

[0019] (3) The remote database server parses the xml message into corresponding database operation and query commands in the format of Web Service;

[0020] (4) The authentication server requires the user to submit a digital certificate. After receiving the user's certificate, the authentication server decrypts it. When the authentication server determines that the user provided a complete and untampered certificate, the authentication se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an XML (extensive markup language)-based remote and safe database access method and relates to the technical field of computer network safety. The method includes that an authentication server requires a user to submit a digital certificate, and a user passes identity authentication after the authentication server decrypts the digital certificate; corresponding access permission is distributed after the user passes identity authentication, a remote database can be accessed within the authorized access permission, and a Web server after receiving a request accesses the database through JSP+JavaBean and enables a returned result to generate an XML document; after encrypted data are transmitted to a client side through a network, the XML document is decrypted through an XML decryption application program and a private key of the user to acquire original data in an XML format, and the original data are converted to be in an html format to be displayed through a browser. By the method, the problem of safety threat in the process of remote database access and data transmission is solved, and the user is enabled to remotely access the database safely through XML technology.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an XML-based remote access security method for databases. Background technique [0002] With the development of computer applications and information technology, people often rely on the network to share resources, and the application and transmission of new applications and multimedia data on the network increase, and these data are related to data storage in a broad sense. Most of the storage methods are database storage. In the process of accessing remote databases, both database administrators and database access personnel are facing severe security pressure. How to ensure the legitimacy of database access (meaning that specific resources are accessed by specific access objects, and will not be accessed by illegal third parties), and how to ensure high security of data transmission is a thorny issue currently facing, and it is necessary to find out A valid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L12/24G06F17/30
CPCH04L63/105G06F16/95H04L63/08H04L67/025
Inventor 傅涛傅德胜经正俊孙文静
Owner GUIZHOU ZHONGKE BOZHI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products