Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Database security access system and method

A security access and database technology, applied in the field of database security access systems, can solve the problems of easy account theft by hackers, database verification and monitoring, and loss.

Pending Publication Date: 2021-08-06
佳乔(深圳)投资有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing databases often do not undergo too much verification and monitoring when accessing, and often only need account passwords to access, but these accounts are easily stolen by hackers, causing losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security access system and method
  • Database security access system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] The purpose of the present invention is to provide a database security access system and method, with real-time monitoring function, double authentication is required when accessing, and the database server can also be shut down when receiving abnormal access, reducing the loss when the database is invaded, and extremely Greatly improved the security of the database.

[0038] In order to make the above objects, features and advantages of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database security access system and method. The system comprises terminal equipment, a forwarding module, an agent module, a controller, a database server, a data switch, a request verification module and a data verification module, wherein the database server, the data switch, the request verification module and the data verification module are connected with the controller; the terminal equipment is connected with the forwarding module, the forwarding module is connected with the request verification module, the request verification module is connected with the agent module, the agent module is connected with the database server, and the database server is in communication connection with the terminal equipment through the data switch. And the data verification module is connected between the database server and the data switch. According to the database security access system and method provided by the invention, a real-time monitoring function is realized, dual authentication is required during access, and the database server can be closed when the database is abnormally accessed, so that the loss when the database is invaded is reduced, and the security degree of the database is greatly improved.

Description

technical field [0001] The invention relates to the technical field of database security, in particular to a database security access system and method. Background technique [0002] At present, the data systems of all walks of life are equipped with databases, and a large amount of information is stored in the databases. Most of this information belongs to the company's confidentiality. If this information is leaked, it will seriously affect the reputation of the company and even cause heavy losses to the company. Authoritative data shows that the main reasons for data leakage include the following two points: 1. Data leakage caused by external network intrusion, that is, external hackers; 2. Data leakage caused by unauthorized access due to incomplete access authority monitoring inside the database, namely Insiders. [0003] The intrusion of the external network is mainly resolved through the firewall, and even some databases with high confidentiality requirements will d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/31
CPCG06F21/31G06F21/6218
Inventor 王保春张蛟鹏余洋莫恒
Owner 佳乔(深圳)投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products