Database service login method, apparatus and device, and readable storage medium

A login method and database technology, applied in the fields of devices, equipment, readable storage media, and database service login methods, can solve problems such as low protection capability and poor security, and achieve improved protection capability, good security, and avoiding malicious login Effect

Active Publication Date: 2021-02-23
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the present invention provides a database service login method, device, equipment and readable storage medium, the main purpose of which is to solve the protection ability of the current database service login Lower, less secure issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database service login method, apparatus and device, and readable storage medium
  • Database service login method, apparatus and device, and readable storage medium
  • Database service login method, apparatus and device, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065]An exemplary embodiment of the present invention will be described in more detail below with reference to the accompanying drawings. While the exemplary embodiments of the present invention are shown in the drawings, it is understood that the present invention can be implemented in various forms and is not limited thereto. Instead, these embodiments are provided to be more thoroughly understood, and the range of the scope of the invention can be communicated to those skilled in the art.

[0066]The embodiment of the present invention provides a database service login method, such asFigure 1A As shown, the method is applied to central control, including:

[0067]101. Based on the point request of the received at least one terminal, generates a list of todped terminal identity, the list terminal identity list includes at least one logo of the terminal that is successfully todged on the central control.

[0068]102. When monitoring the database login request, determine the target identity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database service login method, apparatus and device, and a readable storage medium, relates to the field of information network security, and aims to control a login requestfor a database through a dotted terminal identifier list, realize identification of a terminal in an identity verification mode, avoid malicious login possibly caused when a password is embezzled, andthe protection capability of database service login is improved, and the security is relatively good. The method comprises the steps of forming a dotted terminal identification list according to a received dotting request of at least one terminal, and the dotted terminal identification list comprises an identification of at least one terminal which is successfully dotted on the central controller; when a database login request is monitored, determining a target identifier of a terminal sending the database login request; and if the dotted terminal identifier list comprises the target identifier, allowing execution of the database login request, and releasing the database login request.

Description

Technical field[0001]The invention relates to the field of information network security, in particular to a method, device, equipment and readable storage medium for logging in to a database service.Background technique[0002]Leaving the database is currently one of the greatest hazards encountered in information theft. Many of the earliest database removals were done by exploiting server and website vulnerabilities to infiltrate upstream services. However, with the enhancement of the security construction of website servers, the database permissions held by websites are generally restricted to a lower level. The effect of attacking website servers through traditional methods to obtain data in the database is decreasing. With the development of offensive and defensive technologies, new attack methods are gradually being discovered.[0003]In related technologies, each database has one or more DBAs (Database Administrator), and they use tools or scripts to regularly maintain and optimiz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/60
CPCG06F21/44G06F21/602
Inventor 李博付旻
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products