CN102063431B - Information database system and method for controlling systematic access of information database - Google Patents
Information database system and method for controlling systematic access of information database Download PDFInfo
- Publication number
- CN102063431B CN102063431B CN2009102109703A CN200910210970A CN102063431B CN 102063431 B CN102063431 B CN 102063431B CN 2009102109703 A CN2009102109703 A CN 2009102109703A CN 200910210970 A CN200910210970 A CN 200910210970A CN 102063431 B CN102063431 B CN 102063431B
- Authority
- CN
- China
- Prior art keywords
- registry object
- label
- database
- authority
- storage space
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The invention discloses an information database system and an access control method thereof. The access control method of the information database system comprises the following steps: allotting one first-order label and at least one second-order label to each registered object, and checking the labels of for an access command; opening the spacial read and write authority of the currently registered object space in a database to public use under the condition that the access command passes the check of the first-order label of the currently registered object; and opening the spacial read-only authority of the currently registered object space in the database to public use under the condition that the access command passes the check of the second-order label of the currently registered object. Due to the adoption of the invention, the information database information can be kept secret, exchanged and shared flexibly and safely.
Description
Technical field
The present invention relates to database technical field, relate in particular to a kind of information database system, and the method for a kind of control information Database Systems access.
Background technology
Along with the develop rapidly of modern network technology, interpersonal, tissue is more and more general with information interaction and shared phenomenon between organizing.Although the carrier that carries out information interaction and share has diversified selection, such as transmitting with form of firmware by CD or portable hard drive etc., also can be by the database technique information sharing on backstage.
But the database in existing stage is because ossifing with single of its access control form caused the problems in the information sharing process:
For instance, corporate users generally all has oneself independently database, for the consideration of database security angle, certainly will be difficult to authorize other people to have the operation power of database; In this case, want sharing of fulfillment database information, often take the modes such as coping database, waste time and energy;
Again for instance, personal account information in the Credit Information System database is protected according to law by credit information service at present, when a certain third party (such as employer, bank) needs sincere record, must obtain litigant's written authorization, then go to corresponding credit department to obtain, the loaded down with trivial details and inefficiency of whole process;
In addition, the problem that existing network information database often exists personal user information to leak is in the personal space and blog that provides such as each website, everyone is visible often for the information that is write by other people, delete untimelyly, be easy to cause leaking of privacy, etc.
Summary of the invention
Embodiments of the invention aim to provide a kind of Database Systems, be that level of security is distinguished in the access of database by label, and give corresponding processing authority, thereby when guaranteeing database security, overcome the database information that exists in the prior art and share the problems such as loaded down with trivial details that realize.
For achieving the above object, embodiments of the invention provide a kind of information database system, comprising:
Database, its initialization of carrying out storage space take registry object as unit distributes;
Registering unit is used for being provided to the registration interface of described database and registry object being carried out authentication, triggers described database for the registry object by authentication and carries out memory allocation;
The label distribution unit, with described registering unit be connected database and be connected, be that each registry object distributes an one-level label and at least one secondary label, described one-level label and described secondary label are only corresponding to described registry object;
Database access interface is used for receiving the access instruction to a certain registry object of described database;
The access monitoring processing unit is connected with database access interface with described label distribution unit, is used for described access instruction is carried out the label verification;
The first matching treatment unit is used in the situation of described access instruction by the one-level label verification of current registry object the reading and writing authority in current registry object space in the open database;
The second matching treatment unit is used in the situation of described access instruction by the secondary label verification of current registry object the read-only authority in current registry object space in the open database.
Better, in order further to improve the security of database information, system also comprises label aging update unit, is used for periodically and/or based on the instruction of registry object carrying out the aging operation of label, and triggers described label distribution unit and re-start label distribution.
Better, described label distribution unit comprises that key arranges module, is used for according to the systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label.
Better, system can also comprise the 3rd matching treatment unit, be used at described access instruction the not label verification by current registry object but pass through in the situation of one-level label verification of another registry object of database, in database in the current registry object space, the open read-only authority that is labeled with the data of described another registry object one-level label, and, for the data that described another registry object writes are labelled with its one-level label; Be another registry object energy and only can see own data writing for current registry object.
Better, for the interactive function of current registry object and another registry object is provided, the first matching treatment unit further comprises the first authority permissions module, be used for the instruction according to system's Lookup protocol or the input of current registry object, but be one or more other registry object setting read rights for the data that current registry object writes.
Better, this information database system is supported the classification for the secondary label, described the second matching treatment unit comprises the second authority permissions module, is used for the read-only authority of the designated space of open current registry object.
Better, be convenient to registry object and carry out database setting or information acquisition, system can also comprise basic common template initialization unit, with described database be connected registering unit and be connected, be used to each registry object by authentication that initialized basic common template is provided; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space.
Better, system can also comprise the storage space regulon, is connected with described database, is used for carrying out the dilatation of its storage space when the storage space surplus of a certain registry object reaches predetermined threshold value.
The present invention also provides a kind of method of control information Database Systems access, comprise the step of accepting registration and registry object being carried out authentication, for the arbitrary registry object allocation database storage space by authentication, and, distribute an one-level label and at least one secondary label, described one-level label and described secondary label are only corresponding to described registry object;
Further comprising the steps of:
In receiving described database, during the access instruction of a certain registry object, described access instruction is carried out the label verification:
If described access instruction is by the one-level label verification of current registry object, the reading and writing authority in current registry object space in the open database then;
If described access instruction is by the secondary label verification of current registry object, the read-only authority in current registry object space in the open database then.
Better, carry out the aging operation of label in order further to improve the security of database information, can also to comprise periodically and/or based on the instruction of registry object, and trigger the step that described label distribution unit re-starts label distribution.
Better, the step of carrying out label distribution is specifically as follows: according to the systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label.
Better, for the interactive function of current registry object and another registry object is provided, when the one-level label verification of described access instruction by current registry object, can also comprise the instruction according to the input of system's Lookup protocol or current registry object, but be the step of one or more other registry object setting read rights for the data that the visitor writes.
Better, in order to support the classification for the secondary label, when the secondary label verification of described access instruction by current registry object, can also comprise according to described secondary label, to the read-only authority of the designated space of the open current registry object of visitor.
Better, when the not label verification by current registry object but the one-level label verification by another registry object in the database of described access instruction, then can be in database in the current registry object space, the open read-only authority that is labeled with the data of described another registry object one-level label, and, for the data that described another registry object writes are labelled with described another registry object one-level label.
Better, carrying out database setting or information acquisition for the ease of registry object, can also comprise for the step that initialized basic common template is provided by the described registry object of authentication; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space.
Better, when the storage space surplus of a certain registry object reaches predetermined threshold value, can also comprise the step of the dilatation of carrying out its storage space.
As shown from the above technical solution, embodiments of the invention have the beneficial effect of flexible, safe fulfillment database information sharing by for each registered user of database arranges the secondary label.
By referring to the accompanying drawing description of a preferred embodiment, above-mentioned and other objects, features and advantages of the present invention will be more obvious.
Description of drawings
Fig. 1 is the block diagram of information database system one preferred embodiment provided by the invention;
Fig. 2 is the process flow diagram of method one preferred embodiment of control information Database Systems access provided by the invention.
Embodiment
The below will describe specific embodiments of the invention in detail.Should be noted that the embodiments described herein only is used for illustrating, be not limited to the present invention.
Main design of the present invention is to adopt label in addition classification of storage space of database, solves existing database information and shares existing safety and complex operation problem.The below will introduce the method for information database system provided by the present invention and the access of control information Database Systems in detail.
Fig. 1 shows information database system 100 1 preferred embodiments provided by the invention, below in conjunction with Fig. 1 information database system provided by the invention is described in detail.
That is to say that above-mentioned database 110 is divided into subspace one by one take registry object as unit, each subspace can be endowed certain storage space when initialization; The concrete distribution amount of storage space is unqualified, can be arranged according to actual needs;
Registering unit 120 is used for being provided to the registration interface of database 110 and registry object being carried out authentication, triggers described database 110 for the registry object by authentication and carries out memory allocation;
Wherein, registration interface can comprise the dissimilar interfaces such as network, phone, and compatible for wired/wave point according to actual needs;
For the registry object by authentication, database 110 can equality carry out the distribution of storage space; For the consideration of actual needs, also can on the authentication condition, be distinguished, the registry object by the different identity verification condition is distributed the storage space of different amounts;
As a specific embodiment, label can be realized by the form of key; Such as, label distribution unit 130 can comprise that key arranges the module (not shown), be used for according to the systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label;
For example, each label can be by system according to default regular allocation, does not duplicate mutually guaranteeing; But from the angle of registry object convenient operation and memory, also can be determined by the registry object input; But might there be identical phenomenon in registered user's input, and therefore better scheme is the information that system's backstage mark part is distributed according to preset rules, in conjunction with the input of registry object, jointly forms label;
Access monitoring processing unit 150 is connected with database access interface with described label distribution unit 130 and is connected, and is used for described access instruction is carried out the label verification;
The first matching treatment unit 160 is used in the situation of described access instruction by the one-level label verification of current registry object the reading and writing authority in current registry object space in the open database 110; Namely when access instruction carry or the subsequent authentication process in input when the one-level label of current registry object is arranged, think that the visitor is the registry object of institute's addressing space itself, therefore allow this visitor that this space is read and write, comprise and make amendment, freeze, thaw etc.;
The second matching treatment unit 170 is used in the situation of described access instruction by the secondary label verification of current registry object the read-only authority in current registry object space in the open database 110; Namely when access instruction carry or the subsequent authentication process in input when the secondary label of current registry object is arranged, think that the visitor is the main body that the registry object of institute's addressing space is authorized, therefore allow it to carry out browsing of space content and shared, carry out write operation but refuse it, thereby guarantee the security of database space data;
Certainly, can continue classification to the secondary label, namely the second matching treatment unit 170 comprises the second authority permissions module (not shown), is used for the read-only authority of the designated space of open current registry object; For instance, the secondary label that user's second and user third hold respectively user's first visits the database space of first, the secondary label that the second authority permissions module is held according to second and third, the read-only authority of the designated space that this secondary label of corresponding opening is corresponding.
The above-mentioned information database system that provides 100 can be taken into account dirigibility and the security of database 110 access.
But in above-mentioned information database system 100, because the secondary label can be used for permitting other people to work as browsing of front space, therefore immobilize and to bring the risk of information leakage; Even for the one-level label, often changing also helps to improve space safety;
Therefore, better technical scheme is that information database system 100 also comprises label aging update unit 180, is used for periodically and/or based on the instruction of registry object carrying out the aging operation of label, and triggers described label distribution unit 130 and re-start label distribution;
Obviously, registry object can permit certain third party to browse the information of its storage space, but generally speaking, does not need long grant; After adopting above-mentioned improved technical scheme, can carry out the secondary label that the aging mode of label more renews by instruction, thus Effective Raise security of system and spatial data security.
Further, information database system 100 provided by the invention also can be had ready conditions and be decontroled unauthorized user to the write permission when front space, and scheme is as follows:
In database 110, in the current registry object space, open the read-only authority of the data that are labeled with described another registry object one-level label, and, for the data that described another registry object writes are labelled with its one-level label;
Thereby, this information database system 100 can support a registry object for the comment of other registry object, and the comment that each registry object is delivered only can accessed space registry object (one-level label/secondary label all can) and the reviewer as seen, thereby avoid information owing to public opening leaks;
Further, this information database system 100 can support other registry objects for browsing when front space, specific implementation is for arranging the first authority permissions module (not shown) in the first matching treatment unit 160, this the first authority permissions module be used for according to system's Lookup protocol or when the instruction of front space registry object input, but be one or more other space registry object setting read rights for the data that write;
Present embodiment both can independently as the improvement of technical solution of the present invention, also can combine to obtain with the preferred embodiment of foregoing description better technique effect; That is, in conjunction with this first authority permissions module and the 3rd matching treatment unit 190, mutual between just can 110 times different registry objects of supporting database; For instance, when the space of user's second calling party first and after making comments, first can be replied for the comment of second, at this moment system can arrange the read-only authority that second has this answer by the first authority permissions module automatically, also can by the first authority permissions module the read-only authority that second has this answer be set by first, thereby second can be carried out alternately with first, but this mutual third party is invisible;
When the registry object in other spaces access during when front space, can either see the own information that writes like this, can see that also the registry object of working as front space permits the information that it is seen.
In addition, as a preferred embodiment, this information database system 100 is for the ease of the initialization setting of registry object, can also comprise basic common template initialization unit 1A0, with described database 110 be connected registering unit 120 and be connected, be used to each registry object by authentication that initialized basic common template is provided; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space;
Thereby, registry object only needs by selection and inputs limited information to get final product, it is open to make some need disclosed information to realize towards registry object even non-registered object by database platform, when the registry object of front space also can be realized inquiry for visitor's essential information.
And, those skilled in the art can understand, database carries out the distribution of storage unit take registry object as unit, its initial capacity is very limited, therefore as a preferred embodiment, this information database system 100 can also comprise storage space regulon 1B0, is connected with described database 110, be used for when the storage space surplus of a certain registry object reaches predetermined threshold value, carrying out the dilatation of its storage space;
Through such processing, this information database system 100 can provide the support to Large Volume Data, such as picture, photo, recording, video recording etc., and is according to actual needs elasticity support, avoids as far as possible the waste of storage space.
The improvement that it is pointed out that above-mentioned each preferred embodiment can combine, to obtain better technique effect.
Below, the method for control information Database Systems provided by the invention access is described please by reference to the accompanying drawings 2.
The method of this control information Database Systems access comprises the step of two aspects;
On the one hand, it is the initialization step of database space, comprise the step of accepting registration and registry object being carried out authentication, for the arbitrary registry object allocation database storage space by authentication, and, distribute an one-level label and at least one secondary label, described one-level label and described secondary label are only corresponding to described registry object;
As a specific embodiment, the step of carrying out label distribution can be specially: according to systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label;
On the other hand, then be the accessing step of database space, comprising:
In receiving described database, during the access instruction of a certain registry object, described access instruction is carried out the label verification:
(1) if the one-level label verification of described access instruction by current registry object, then the reading and writing authority in current registry object space in the open database;
Better, for the support to user interactions is provided, when the one-level label verification of described access instruction by current registry object, also comprise according to system's Lookup protocol or when the instruction of front space registry object input, but be the step of one or more other registry object setting read rights for the data that write;
(2) if the secondary label verification of described access instruction by current registry object, the then read-only authority in current registry object space in the open database;
Better, when the secondary label verification of described access instruction by current registry object, also comprise according to different secondary labels, to the read-only authority of the designated space of the open current registry object of visitor;
Generally speaking, the technical scheme that above-described embodiment provides, can both carry out by label the separation of database access authority, when the registry object (holding the one-level label) of front space has the various authorities in whole space, and its authorization object (holding the secondary label) but only have the read right of whole or local space, thereby taken into account security and the dirigibility of database.
Carry out the aging operation of label in order further to improve the security of database, also to comprise periodically and/or based on the instruction of registry object, and trigger the step that described label distribution unit re-starts label distribution.
Collect for support information, can also allow the part operation authority of other registry objects; Such as at access instruction not in the situation of the label verification by current registry object but one-level label verification by another registry object in the database, also be included in the database in the current registry object space, the open read-only authority that is labeled with the data of described another registry object one-level label, and, the step that the data that write for described another registry object are labelled with described another registry object one-level label;
The setting of above-mentioned part operation authority and (1) but in the combination that arranges of read right, can be at mutual between the effective support registry object on the database platform, and it is invisible for third party's (except authorized user) alternately, has good privacy.
In addition,, can also comprise for the step that initialized basic common template is provided by the described registry object of authentication for the setting when front space for the ease of registry object; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space.
And, in order effectively to utilize database space, can also comprise when the storage space surplus of a certain registry object reaches predetermined threshold value the step of carrying out the dilatation of its storage space.
Above-mentioned each modified embodiment can be bonded to each other, to realize better technique effect.
Above-mentionedly be described with the method for specific embodiment to the access of information database system provided by the invention and control information Database Systems by reference to the accompanying drawings.Technique scheme has very wide application prospect in the social application field, for this point of illustration and outstanding beneficial effect of the present invention, the below take technical scheme of the present invention is applied to information mutually the rule system described as example, as follows:
Information mutually rule system provides registration support to nature person and legal person user, they is placed under the same system allocation database storage space; Certainly, its registration condition can be distinct, and the initialization storage space of distribution is not identical yet;
System arranges respectively performance-based objective by basic common template to all types of user, and the registered user can by selecting or adjusting performance-based objective, carry out sincere reference index setting;
The registered user can arrange or directly from obtaining one-level label and secondary label;
With one-level tag access database, the registered user can exercise read/write authority to the storage space of oneself, therefore can input individual basic condition and delta data, self-praise, self-criticism, search one's heart and the data of defence of self;
When sincerity record being offered the mechanism such as employer or bank when needs, authorize this secondary label, make other people can consult the sincere record of self, revise arbitrarily, add but have no right method; Particularly, by changing voluntarily the secondary label, can effectively control grantee's the timeliness of browsing, with the protection account safety;
The method when the access of information database system provided by the invention and control information Database Systems of it may be noted that is applied to information when restraining system mutually, must the limited open read/write authority, namely allow between the user mutually writing information; Such as, when the registered user has selected bank sincere target in the basic common template, may need regularly record data in its space as registered user's bank; For another example, allow other people data writing as sincere reference;
Particularly, use the information of technical solution of the present invention and restrain mutually system, because the space writes behavior and occur between the registered user, therefore write and equal by between writing, can mutually supervise, mutually learn, mutually promote, can also the irresponsible malice evaluation of effective restraint;
And as seen bipartite interaction data only both sides maintains secrecy for the third party is natural, has well taken the security of privacy into account.
Use the information of technical solution of the present invention and restrain mutually many improvements that system can use technical solution of the present invention equally: but such as by being one or more other registry object setting read rights for the data that write, can allowing space user and information to write the people and just relate to event and defend oneself alternately; By the storage space dilatation, can allow other people to write with the user and reply the propping material of submitting to as evidence; Etc.;
Can find out, the information of using technical solution of the present invention restrain mutually its information of system more comprehensively, describe more reasonable, pin down that mechanism is more scientific, secret protection is more reliable; Certainly, information mutually rule system is just used an instantiation of technical solution of the present invention, the method of information database system provided by the present invention and the access of control information Database Systems can be applied to the information sharing occasion that various existence separate browse right and editing authority, does not repeat them here.
Although described the present invention with reference to several exemplary embodiments, should be appreciated that used term is explanation and exemplary and nonrestrictive term.Because the present invention is implementation and do not break away from spirit or the essence of invention in a variety of forms, so be to be understood that, above-described embodiment is not limited to any aforesaid details, and should be in the spirit and scope that the claim of enclosing limits explain widely, therefore fall into whole variations in claim or its equivalent scope and remodeling and all should be the claim of enclosing and contain.
Claims (8)
1. an information database system is characterized in that, comprising:
Database, its initialization of carrying out storage space take registry object as unit distributes;
Registering unit is used for being provided to the registration interface of described database and registry object being carried out authentication, triggers described database for the registry object by authentication and carries out memory allocation;
The label distribution unit, with described registering unit be connected database and be connected, be that each registry object distributes an one-level label and at least one secondary label, described one-level label and described secondary label are only corresponding to described registry object;
Database access interface is used for receiving the access instruction to a certain registry object of described database;
The access monitoring processing unit is connected with database access interface with described label distribution unit, is used for described access instruction is carried out the label verification;
The first matching treatment unit is used in the situation of described access instruction by the one-level label verification of current registry object the reading and writing authority in current registry object space in the open database;
The second matching treatment unit is used in the situation of described access instruction by the secondary label verification of current registry object the read-only authority in current registry object space in the open database;
The 3rd matching treatment unit, be used at described access instruction the not label verification by current registry object but pass through in the situation of one-level label verification of another registry object of database, in database in the current registry object space, the open read-only authority that is labeled with the data of described another registry object one-level label, and, for the data that described another registry object writes are labelled with its one-level label;
Label aging update unit is used for periodically and/or based on the instruction of registry object carrying out the aging operation of label, and triggers described label distribution unit and re-start label distribution.
2. information database system according to claim 1, it is characterized in that, described label distribution unit comprises that key arranges module, be used for according to the systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label.
3. information database system according to claim 1 is characterized in that, described the first matching treatment unit comprises the first authority permissions module, is used for according to instruction, but is one or more other registry object setting read rights for the data that write.
4. information database system according to claim 1 is characterized in that, described the second matching treatment unit comprises the second authority permissions module, is used for the read-only authority of the designated space of open current registry object.
5. information database system according to claim 1, it is characterized in that, also comprise basic common template initialization unit, with described database be connected registering unit and be connected, be used to each registry object by authentication that initialized basic common template is provided; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space.
6. information database system according to claim 1 is characterized in that, also comprises the storage space regulon, is connected with described database, is used for carrying out the dilatation of its storage space when the storage space surplus of a certain registry object reaches predetermined threshold value.
7. the method for control information Database Systems access, it is characterized in that, comprise the step of accepting registration and registry object being carried out authentication, for the arbitrary registry object allocation database storage space by authentication, and, distribute an one-level label and at least one secondary label, described one-level label and described secondary label are only corresponding to described registry object;
Further comprising the steps of:
In receiving described database, during the access instruction of a certain registry object, described access instruction is carried out the label verification:
If described access instruction is by the one-level label verification of current registry object, the reading and writing authority in current registry object space in the open database then;
If described access instruction is by the secondary label verification of current registry object, the read-only authority in current registry object space in the open database then;
When the not label verification by current registry object but the one-level label verification by another registry object in the database of described access instruction, then in database in the current registry object space, the open read-only authority that is labeled with the data of described another registry object one-level label, and, for the data that described another registry object writes are labelled with described another registry object one-level label;
Periodically and/or based on the instruction of registry object carry out the aging operation of label, and trigger the step that described label distribution unit re-starts label distribution.
8. the method for control information Database Systems according to claim 7 access is characterized in that, one of also comprises the steps or its combination in any:
Wherein, the step of carrying out label distribution is specially: according to systemic presupposition rule and/or according to the input of registry object, for described registry object distributes as the key of described one-level label with as the key of described secondary label;
When the one-level label verification of described access instruction by current registry object, also comprise according to instruction, but be the step of one or more other registry object setting read rights for the data that the visitor writes;
When the secondary label verification of described access instruction by current registry object, also comprise according to described secondary label, to the read-only authority of the designated space of the open current registry object of visitor;
Provide initialized basic common template for the registry object by authentication; Wherein, the registry object of a storage space has selected, reading and writing authority to the basic common template of this storage space, and the registry object of other storage space and/or non-registered object have read-only authority to the selected basic common template of this storage space;
When the storage space surplus of a certain registry object reaches predetermined threshold value, also comprise the step of the dilatation of carrying out its storage space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102109703A CN102063431B (en) | 2009-11-13 | 2009-11-13 | Information database system and method for controlling systematic access of information database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102109703A CN102063431B (en) | 2009-11-13 | 2009-11-13 | Information database system and method for controlling systematic access of information database |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102063431A CN102063431A (en) | 2011-05-18 |
CN102063431B true CN102063431B (en) | 2013-03-20 |
Family
ID=43998712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009102109703A Expired - Fee Related CN102063431B (en) | 2009-11-13 | 2009-11-13 | Information database system and method for controlling systematic access of information database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102063431B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254029B (en) * | 2011-07-29 | 2013-06-19 | 株洲南车时代电气股份有限公司 | View-based data access system and method |
US9860221B2 (en) * | 2015-03-10 | 2018-01-02 | Intel Corporation | Internet of things group formation using a key-based join protocol |
CN105718817B (en) * | 2016-01-22 | 2018-05-18 | 合肥工业大学 | A kind of data safety exchange system and method based on permissions mapping |
CN106203168B (en) * | 2016-07-06 | 2019-01-25 | 广东盈迅信息技术有限公司 | Database security accesses system |
CN106447187A (en) * | 2016-09-05 | 2017-02-22 | 武汉盛硕电子有限公司 | Intelligent seal management system based on short-distance wireless communication and control method |
CN111191279A (en) * | 2019-12-21 | 2020-05-22 | 河南中原云信信息技术有限公司 | Big data safe operation space implementation method and system oriented to data sharing service |
CN112766843A (en) * | 2020-12-31 | 2021-05-07 | 车主邦(北京)科技有限公司 | Carrier information registration method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567300A (en) * | 2003-06-19 | 2005-01-19 | 鸿富锦精密工业(深圳)有限公司 | Database using right inquiry system and method |
CN101286203A (en) * | 2008-03-24 | 2008-10-15 | 陆航程 | Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system |
CN101387963A (en) * | 2008-10-31 | 2009-03-18 | 金蝶软件(中国)有限公司 | Method and system for optimizing system integration |
CN101387962A (en) * | 2008-10-31 | 2009-03-18 | 金蝶软件(中国)有限公司 | Method and system for establishing mapping relationship in system integration |
-
2009
- 2009-11-13 CN CN2009102109703A patent/CN102063431B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1567300A (en) * | 2003-06-19 | 2005-01-19 | 鸿富锦精密工业(深圳)有限公司 | Database using right inquiry system and method |
CN101286203A (en) * | 2008-03-24 | 2008-10-15 | 陆航程 | Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system |
CN101387963A (en) * | 2008-10-31 | 2009-03-18 | 金蝶软件(中国)有限公司 | Method and system for optimizing system integration |
CN101387962A (en) * | 2008-10-31 | 2009-03-18 | 金蝶软件(中国)有限公司 | Method and system for establishing mapping relationship in system integration |
Also Published As
Publication number | Publication date |
---|---|
CN102063431A (en) | 2011-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11096052B2 (en) | Quorum-based secure authentication | |
CN102063431B (en) | Information database system and method for controlling systematic access of information database | |
US9330511B2 (en) | Apparatus and methods for identity verification | |
US8811971B2 (en) | Mobile communication device and method for disabling applications | |
CN101809579B (en) | Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications | |
US8224852B2 (en) | Method for protecting product data from unauthorized access | |
CN103778384B (en) | The guard method of the virtual terminal security context of a kind of identity-based certification and system | |
CN106227785A (en) | The display packing of a kind of page object and device | |
CN104823207A (en) | Securing personal identification numbers for mobile payment applications by combining with random components | |
Chen et al. | NFC attacks analysis and survey | |
EP3425846A1 (en) | Authorization method and device for joint account, and authentication method and device for joint account | |
KR100818244B1 (en) | System for protecting tag-related information and method thereof | |
KR20120112598A (en) | Implementing method, system of universal card system and smart card | |
EP2048591A1 (en) | Method for communication, communication device and secure processor | |
JP7105495B2 (en) | Segmented key authenticator | |
US10182072B2 (en) | RF communication device with access control for host interface | |
Sabaragamu Koralalage et al. | POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism | |
JP2017199331A (en) | Data recovery system, data recovery method, data recovery program, information processing device, data creation type mobile terminal, and passive type storage medium | |
Khabarlak et al. | Mobile access control system based on RFID tags and facial information | |
CN109151151A (en) | Realize the method and device of the user mode switching of terminal | |
CN102354353A (en) | Method for acquiring data and terminal | |
US8320570B2 (en) | Apparatus and method for generating secret key | |
US8880859B2 (en) | Method and arrangement for configuring electronic devices | |
CN103699853B (en) | A kind of intelligent SD card and control system thereof and method | |
CN104951823A (en) | Composite card management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130320 Termination date: 20171113 |
|
CF01 | Termination of patent right due to non-payment of annual fee |