Hybrid SQLite3 safety access method
A technology of safe access and legitimacy, applied in the field of computer network security, can solve problems such as abuse of authority, unauthorized use, leakage, etc., to achieve the effect of improving safe storage and access, and avoiding unauthorized use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0033] see figure 1 , the hybrid SQLite3 security access method of the present application constructs an authority library SystemDB for storing relevant information of database users; all data information in the authority library SystemDB is encrypted and stored to ensure the security of user information, which can only be used by The database administrator is a first-level role to access, and other users cannot access. This application adds an identity authentication module and an access control module at the application layer, and adds an encryption and decryption module at the physical storage stage. At the application layer, first verify the legality of the user's identity through the identity authentication module; when the user's identity is legal, the SQLite3 database will use the access control module to verify the authority and scope...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com