Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret state data access protection method for db2 data

A data access and data technology, applied in the field of information security, can solve problems such as inability to use transparently, difficulty in parsing drda packets, and complex deployment

Active Publication Date: 2021-06-04
上海凯馨信息科技有限公司
View PDF15 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When users are setting security protection rules, they cannot easily configure access rules, security rules, and desensitization rule information;
[0005]2. The deployment is complicated and cannot be used transparently
[0006] 3. Db2 is currently the mainstream database in the financial industry, because the db2 drda protocol and database mechanism are not completely open, it is difficult to parse drda messages
[0007]The above deficiencies have seriously affected the use of encrypted data access in actual scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret state data access protection method for db2 data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the content of the present invention clearer and easier to understand, the content of the present invention will be further described below in conjunction with the accompanying drawings. Obviously, the present invention is not limited to this specific embodiment, and general replacements known to those skilled in the art also fall within the protection scope of the present invention. Secondly, the present invention is described in detail by means of schematic diagrams. When describing the examples of the present invention in detail, for the convenience of explanation, the schematic diagrams are not partially enlarged according to the general scale, which should not be used as a limitation of the present invention.

[0029] Embodiments of the present invention are applicable to computer systems / servers that are operable with numerous other general purpose or special purpose computing system environments or configurations, examples of well-known computing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a secret state data access protection method for db2 data, which comprises the following steps: step S01, configuring target db2 data connection information to authorize the device to access a target db2 database, obtaining all privacy field information of the db2 database by performing privacy discovery on the db2 database, and according to the actual situation, finishing incremental privacy discovery; s02, configuring grouping information of the access users; s03, setting a secret state data access protection rule, namely a security rule and a privacy scheme, of the target database, and controlling the access permission of the target database; and step S04, setting a secret state data access protection task, selecting a protected target database, an access group, a specific secret state data access protection rule and a forwarding port, and enabling a user to access a target db2 database through a proxy port monitored by the device. The invention is simple in deployment and can be transparently used.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, the present invention relates to a method for protecting encrypted state data access to db2 data Background technique [0002] The stock data stored in a certain system may become the data resources required by other external information systems, and the value of data resources can be applied again after circulation, thereby generating more application value. Data circulation makes data out of the original usage scenario, changes the purpose of use, transfers from data generation end to other data application end, optimizes resource allocation, and becomes an important link to release data value. At the same time, private information and core data assets lack effective management and control in circulation links such as opening, sharing, aggregation, trading, and access, and face the risk of leakage. [0003] For the active access link in data circulation, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60H04L29/06
CPCG06F21/6245G06F21/602H04L63/10H04L63/306H04L63/0407H04L63/0281G06F2221/2141
Inventor 陈俊
Owner 上海凯馨信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products