Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

MAC protection enhancement system forobject agent feature database

A technology of object proxy and enhancement system, applied in the direction of digital data protection, electrical digital data processing, instruments, etc., to achieve the effect of improving security performance and secure and flexible access control

Pending Publication Date: 2021-01-15
刘秀萍
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The MAC protection enhancement system of the object proxy feature database provided by the present invention aims at the security problems existing in the object proxy access control module of the current object proxy database, designs a database MAC model based on the object proxy feature, and designs a system based on the model A strict set of database object access control rules and database object security level restriction rules; aiming at the special multi-layer complex agency relationship and data organization mode in the object proxy database, the security level management model of database objects is designed, and the security level of database objects is proposed. Integrate the strategy and method of unified management; Aiming at the problem of limited access caused by a single security level on the virtual attribute of multiple data sources in the object agent multi-data source agent class, a method of subdividing the security level of the virtual attribute based on the data source is proposed, and the design A fine-grained access control method for multiple data source proxy classes; a protection enhancement system that provides MAC functions in the object proxy database is designed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MAC protection enhancement system forobject agent feature database
  • MAC protection enhancement system forobject agent feature database
  • MAC protection enhancement system forobject agent feature database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The technical solution of the MAC protection enhancement system for the object proxy feature database provided by the present invention will be further described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention and implement it.

[0065] Aiming at the security problems existing in the access control module of the object proxy database in the prior art and the limitations of the application of the MAC model to the object proxy, the present invention proposes a MAC model suitable for the object proxy database based on the characteristics of the object proxy, and designs on the basis of this model Subject’s access control rules to database objects and agent relationship database object security level restriction rules; at the same time, to provide integrated and unified security level management for database objects, the present invention proposes a database object security level management mode...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the MAC protection enhancement system for the object agent feature database provided by the invention, a database MAC model based on object agent features is designed, and a set of strictdatabase object access control rules and database object security level limiting rules are designed on the basis of the model; a security level management model of the database object is designed, and a strategy and a method for performing fusion unified management on the security level of the database object are provided; a method for subdividing virtual attribute security levels based on data sources is provided, and a fine-grained access control method of multi-data-source agent classes is designed; a protection enhancement system for providing an MAC function in an object proxy database is designed. The result shows that the method has a good effect in the object proxy database, safer and more flexible access control is provided for the objects in the object proxy database, and the safety performance of the object proxy is improved.

Description

technical field [0001] The invention relates to an object agent database access control method, in particular to a MAC protection enhancement system for an object agent characteristic database, and belongs to the technical field of database protection enhancement. Background technique [0002] With the rapid development of computer and information technology, various application data types are gradually changing from structured to semi-structured and unstructured. The efficient and orderly management of these massive and complex data has brought about major changes in the database field. After the birth of the relational data model and the object-oriented data model, the object proxy model that combines the advantages of both and is more suitable for the characteristics of real world entities came into being. The object proxy database designed and implemented based on the object proxy model has provided many fields Good complex data management support. However, with the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06F2221/2113G06F2221/2141
Inventor 刘秀萍高宏松
Owner 刘秀萍
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products