Data access detection method and device

A data access and detection method technology, applied in the field of data security, can solve problems such as low data security, and achieve the effect of improving the safety factor

Pending Publication Date: 2021-03-19
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when using the method of the prior art to detect whether the database has been illegally accessed, it is necessary to detect whether the database has been illegally accessed after the database has been accessed, and only when the database manager checks whether the database has been illegally accessed, and the data security is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access detection method and device
  • Data access detection method and device
  • Data access detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0048] figure 1 A schematic diagram of an application scenario provided by an embodiment of the present invention, such as figure 2 As shown, users operate the database through the terminals 101-104 through the server 105, for example, to access data. Therefore, there is a problem that hackers will use the terminals to illegally attack the datab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a data access detection method and device. The method comprises the steps of obtaining a behavior log generated in real time when data in a database is accessed; determining a data access type of the data in real time according to the behavior log and a preset behavior log detection model, wherein the preset behavior log detection model is used for detecting whether the data access type corresponding to the behavior log is legal access or illegal access. The corresponding data access type when the data is accessed can be detected in real time, the problem that in the prior art, whether the database is illegally accessed or not can be known only after the database is accessed is solved, and the safety coefficient of the data is increased.

Description

technical field [0001] The embodiment of the present invention relates to data security technology, and in particular to a data access detection method and device. Background technique [0002] With the advent of the era of big data, the role of data for users is becoming more and more important. Therefore, data security is also paid more and more attention by users. Although users have made a lot of efforts on data security, there are still problems of illegal access to the database, such as hackers attacking the database and stealing data. If it is possible to detect that the database has been illegally accessed, and thus repair the database vulnerabilities, it can prevent the database from being illegally accessed again to the greatest extent and ensure data security. [0003] In the prior art, it is possible to save some false data (for example, data that database managers will never access) in the database. If these false data are accessed, it means that the database h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F16/18G06F16/35
CPCG06F21/604G06F16/35G06F16/1815
Inventor 乔全胜洪敬风胡兆丰沈华林
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products