CN104966024B - A kind of method and device of protection database - Google Patents
A kind of method and device of protection database Download PDFInfo
- Publication number
- CN104966024B CN104966024B CN201510107743.3A CN201510107743A CN104966024B CN 104966024 B CN104966024 B CN 104966024B CN 201510107743 A CN201510107743 A CN 201510107743A CN 104966024 B CN104966024 B CN 104966024B
- Authority
- CN
- China
- Prior art keywords
- equipment
- database
- hardware information
- information
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and devices of protection database, belong to field of Internet communication.The method includes:Receive the access request message for accessing database;The hardware information of the first equipment is obtained, first equipment is the equipment when creating the database where the database;The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;If the hardware information of first equipment is identical with the hardware information of second equipment, the database is accessed according to the access request message.Described device includes:Receiving module, the first acquisition module, the second acquisition module and access modules.The present invention can improve the safety of data.
Description
Technical field
The present invention relates to field of Internet communication, more particularly to a kind of method and device of protection database.
Background technology
As people’s lives are increasingly dependent on network, more and more use are store in the database of Internet Server
Family information.It is the sensitive information of user to have an information in user information, and sensitive information requires very high, institute to storage security
To need to protect the database for storing sensitive information, to improve the safety of storage sensitive information.
The means protected at present database are mainly encrypted database, and any access to database is grasped
It is required for that first data are decrypted, then accesses operation to database again.However, hacker can be from server at present
In steal entire database, then database is cracked, with realize database is decrypted, so the safety of data
It is relatively low.
Invention content
In order to improve the safety of data, the present invention provides a kind of method and devices of protection database.The technology
Scheme is as follows:
A method of protection database, the method includes:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is where the database when creating the database
Equipment;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access
Request message accesses the database.
A kind of device of protection database, described device include:
Receiving module, for receiving the access request message for accessing database;
First acquisition module, the hardware information for obtaining the first equipment, first equipment are to create the data
Equipment when library where the database;
Second acquisition module, the hardware information for obtaining the second equipment, second equipment are that the database is current
The equipment at place;
Access modules, if the hardware information for first equipment is identical with the hardware information of second equipment,
The database is then accessed according to the access request message.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting
The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located
Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical
And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry
The safety of the data stored in the high database.
Description of the drawings
Fig. 1 is a kind of method flow diagram for protection database that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of method flow diagram for protection database that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of method flow diagram for protection database that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of apparatus structure schematic diagram for protection database that the embodiment of the present invention 4 provides;
Fig. 5 is a kind of terminal structure schematic diagram that the embodiment of the present invention 5 provides.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Embodiment 1
Referring to Fig. 1, an embodiment of the present invention provides a kind of methods of protection database, including:
Step 101:Receive the access request message for accessing database.
Step 102:The hardware information of the first equipment is obtained, the first equipment is where the database when creating the database
Equipment.
Step 103:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
Step 104:If the hardware information of the first equipment and the hardware information of the second equipment are identical, asked according to the access
Message is asked to access the database.
Optionally, upper step 102 can be:
The hardware information of the first equipment is obtained from database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
Further, before above-mentioned steps 102, further include:
When creating the database in the first equipment, the hardware information of the first equipment is stored in the database or should
The correspondence storage of the mark of database and the hardware information of the first equipment is in the server.
Further, further include:
If the hardware information of the first equipment and the hardware information of the second equipment are different, by the database from the second equipment
Middle deletion.
Wherein, the hardware information of the first equipment is the network interface card information of the first equipment and/or the hardware information of the second equipment is
The network interface card information of second equipment.
Wherein, in embodiments of the present invention, the data stored in the database can be the sensitive data of user.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting
The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located
Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical
And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry
The safety of the data stored in the high database.
Embodiment 2
An embodiment of the present invention provides a kind of methods of protection database.
Database first is created in the first equipment before the method for executing this implementation, which includes a client,
The client can obtain the hardware information of the first equipment, in the database by the hardware information storage of the first equipment.First sets
Standby hardware information can be the network interface card information of the first equipment, for example, can be the IP (Internet of the first equipment
Protocol, the agreement interconnected between network) address or MAC (Media Access Control, medium access control) address
Deng.
After having created database in the first equipment, method which can provide through this embodiment is protected
The database.Referring to Fig. 2, this method includes:
Step 201:Receive the access request message for accessing database.
It is likely located in the first equipment in the current database, it is also possible to be usurped and be placed in addition to the first equipment by hacker
Any other equipment on.No matter which equipment the database is located in, when needing to access the database, needs to the data
Access request message, the access request message is submitted to be received first by the client in the database in library.In addition, the visit
Ask that request message carries the mark of data to be visited
Step 202:The hardware information of the first equipment is obtained from the database.
When creating the database in the first equipment, the hardware information of the first equipment is stored in the database by client
At preset memory locations.For example, the hardware information of the first equipment can be stored in the attribute information of the database or be stored
In the configuration information of the database.
This step can be that the hardware information of the first equipment is read from the preset memory locations of the database.
For example, it is assumed that the hardware information of the first equipment obtained in this step is the IP1 of the first equipment.
Step 203:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
This step can be:The hardware information of the second equipment is read in the second equipment being currently located from the database.The
The hardware information of two equipment can be the network interface card information of the second equipment, for example, can be the IP address or MAC Address of the second equipment
Deng.
In embodiments of the present invention, if the database is not stolen by hacker and is still located in the first equipment, the
Two equipment are the first equipment.If the database is stolen and configured in the second equipment by hacker, in addition the access of step 201
Request message is that hacker initiates on the second device, then the second equipment difference and the first equipment, are in addition to the first equipment
Other equipment.
For example, it is assumed that the hardware information of the second equipment obtained in this step is the IP2 of the second equipment, and the second equipment
IP2 differences and the first equipment IP1.
Step 204:The hardware information for comparing the hardware information and the second equipment of the first equipment is held if the two is identical
Row step 205 thens follow the steps 206 if the two is different.
For example, comparing the hardware information IP1 of the first equipment and the hardware information IP2 of the second equipment, since IP1 and IP2 are
Then two different IP address execute step 205 so result of the comparison is that the two is different.
Step 205:The database, end operation are accessed according to the access request message.
This step can be:According to the mark for the data to be visited that the access request message carries, in the database
Access data to be visited.For example, reading data to be visited from the database, number to be visited is changed in the database
It is deleted from the database etc. according to or by data to be visited.
When there is the new access request message for accessing the database, the client reception being located in the database should
Access request message, and executed since step 201 again.
Step 206:The database is deleted from the second equipment, end operation.
For example, the hardware information for comparing the first equipment in step 204 is different from the hardware information of the second equipment, so
The database is deleted from the second equipment in this step.
Since the first equipment and the second equipment are two different equipment, show that the database is stolen and configured by hacker
In second equipment, in order to protect the data in the database, which can be deleted from the second equipment, allowed black
Visitor can not access the database, to improve the safety of the data stored in the database.
Further, which also obtains the time that each data are not accessed in the database, obtain not by
The time of access reaches the data of preset time threshold, by the data of acquisition from the data be middle deletion.
Wherein, when storing data in the database or accessing data from the database, which can record this
The storage time of data or access time.Obtain what the data were not accessed according to the storage time of the data or access time
Time.
Preset time threshold can be one month, half a year, 1 year or 2 years etc..If the time that some data does not access reaches
To preset time threshold, then show that the data are not used by a user for a long time, and stores to exist in the database and be stolen by hacker
The hidden danger taken, therefore the data that the time not accessed is reached to preset time threshold are deleted from the database, can improve number
According to safety.
In embodiments of the present invention, the hardware information of the first equipment where database when creating database is stored in
In the database.When receiving the access request message for accessing the database, first stored in the database is obtained
The hardware information of equipment, and the hardware information for the second equipment that the database is currently located is obtained, compare the hard of the first equipment
The hardware information of part information and the second equipment shows that the first equipment is the second equipment, which does not have if the two is identical
It is stolen and is run in other equipment, thus the database can be accessed according to the access request message.If the two is different,
Then show the first equipment difference and the second equipment, which is stolen and configures same on the second device, and the access request
What message was initiated on the second device, thus the database is deleted from the second equipment four, it can be in the effective protection database
Data, improve the safety of data.
Embodiment 3
An embodiment of the present invention provides a kind of methods of protection database.
Database first is created in the first equipment before the method for executing this implementation, which includes a client,
The client can obtain the hardware information of the first equipment, by the correspondence of the hardware information of the mark of the database and the first equipment
Relationship stores in the server.The hardware information of first equipment can be the network interface card information of the first equipment, for example, can be first
The IP address of equipment or MAC Address etc..
After having created database in the first equipment, method which can provide through this embodiment is protected
The database.Referring to Fig. 3, this method includes:
Step 301:Receive the access request message for accessing database.
It is likely located in the first equipment in the current database, it is also possible to be usurped and be placed in addition to the first equipment by hacker
Any other equipment on.No matter which equipment the database is located in, when needing to access the database, needs to the data
Access request message, the access request message is submitted to be received first by the client in the database in library.In addition, the visit
Ask that request message carries the mark of data to be visited
Step 302:According to the mark of the database, the hardware information of the first equipment is obtained from server.
This step can be to obtain the mark of the database, send and obtain request message to server, acquisition request disappears
Breath carries the mark of the database, makes mark of the server according to the database, the mark of the database stored from itself with it is hard
The hardware information that corresponding first equipment is obtained in the correspondence of part information receives the hard of the first equipment of server return
Part information.
For example, it is assumed that the hardware information of the first equipment obtained in this step is the IP1 of the first equipment.
Step 303:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
This step can be:The hardware information of the second equipment is read in the second equipment being currently located from the database.The
The hardware information of two equipment can be the network interface card information of the second equipment, for example, can be the IP address or MAC Address of the second equipment
Deng.
In embodiments of the present invention, if the database is not stolen by hacker and is still located in the first equipment, the
Two equipment are the first equipment.If the database is stolen and configured in the second equipment by hacker, in addition the access of step 301
Request message is that hacker initiates on the second device, then the second equipment difference and the first equipment, are in addition to the first equipment
Other equipment.
For example, it is assumed that the hardware information of the second equipment obtained in this step is the IP2 of the second equipment, and the second equipment
IP2 differences and the first equipment IP1.
Step 304:The hardware information for comparing the hardware information and the second equipment of the first equipment is held if the two is identical
Row step 305 thens follow the steps 306 if the two is different.
For example, comparing the hardware information IP1 of the first equipment and the hardware information IP2 of the second equipment, since IP1 and IP2 are
Then two different IP address execute step 205 so result of the comparison is that the two is different.
Step 305:The database, end operation are accessed according to the access request message.
This step can be:According to the mark for the data to be visited that the access request message carries, in the database
Access data to be visited.For example, reading data to be visited from the database, number to be visited is changed in the database
It is deleted from the database etc. according to or by data to be visited.
When there is the new access request message for accessing the database, the client reception being located in the database should
Access request message, and executed since step 301 again.
Step 306:The database is deleted from the second equipment, end operation.
For example, the hardware information for comparing the first equipment in step 304 is different from the hardware information of the second equipment, so
The database is deleted from the second equipment in this step.
Since the first equipment and the second equipment are two different equipment, show that the database is stolen and configured by hacker
In second equipment, in order to protect the data in the database, which can be deleted from the second equipment, allowed black
Visitor can not access the database, to improve the safety of the data stored in the database.
Further, which also obtains the time that each data are not accessed in the database, obtain not by
The time of access reaches the data of preset time threshold, by the data of acquisition from the data be middle deletion.
Wherein, when storing data in the database or accessing data from the database, which can record this
The storage time of data or access time.Obtain what the data were not accessed according to the storage time of the data or access time
Time.
Preset time threshold can be one month, half a year, 1 year or 2 years etc..If the time that some data does not access reaches
To preset time threshold, then show that the data are not used by a user for a long time, and stores to exist in the database and be stolen by hacker
The hidden danger taken, therefore the data that the time not accessed is reached to preset time threshold are deleted from the database, can improve number
According to safety.
In embodiments of the present invention, the hardware information of the first equipment where the database is obtained when creating database,
In the server by the correspondence storage of the hardware information of the mark of the database and the first equipment.When receiving for accessing
When the access request message of the database, according to the mark of the database, the hard of corresponding first equipment is obtained from server
Part information, and the hardware information for the second equipment that the database is currently located also is obtained, compare the hardware information of the first equipment
Show that the first equipment is the second equipment, the database is not stolen if the two is identical with the hardware information of the second equipment
It takes and is run in other equipment, thus the database can be accessed according to the access request message.If the two is different, show
First equipment difference and the second equipment, the database are stolen and configure same on the second device, and the access request message exists
Initiated in second equipment, thus the database deleted from the second equipment four, can with the data in the effective protection database,
Improve the safety of data.
Embodiment 4
Referring to Fig. 4, an embodiment of the present invention provides a kind of devices of protection database, including:
Receiving module 401, for receiving the access request message for accessing database;
First acquisition module 402, the hardware information for obtaining the first equipment, the first equipment are when creating the database
Equipment where the database;
Second acquisition module 403, the hardware information for obtaining the second equipment, the second equipment are that the database is currently located
Equipment;
Access modules 404, if identical for the hardware information of the first equipment and the hardware information of the second equipment, basis
The access request message accesses the database.
Optionally, the first acquisition module 402 includes:
First acquisition unit, the hardware information for obtaining the first equipment from the database;Alternatively,
Second acquisition unit obtains the hard of corresponding first equipment for the mark according to the database from server
Part information.
Further, which further includes:
The hardware information of first equipment when for creating the database in the first equipment, is stored in this by memory module
It is stored in the server in database or by the correspondence of the hardware information of the mark of the database and the first equipment.
Further, which further includes:
Removing module, if different for the hardware information of the first equipment and the hardware information of the second equipment, by the number
It is deleted from the second equipment according to library.
Wherein, the hardware information of the first equipment is the network interface card information of the first equipment and/or the hardware information of the second equipment is
The network interface card information of second equipment.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting
The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located
Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical
And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry
The safety of the data stored in the high database.
Embodiment 5
Referring to Fig. 5, it illustrates the terminal structure schematic diagram involved by the embodiment of the present invention, which can be above-mentioned visitor
Family end provides hardware running environment, the method for the protection database for implementing to provide in above-described embodiment.Specifically:
Terminal 900 may include RF (Radio Frequency, radio frequency) circuit 110, include one or more meters
The memory 120 of calculation machine readable storage medium storing program for executing, input unit 130, display unit 140, sensor 150, voicefrequency circuit 160,
WiFi (wireless fidelity, Wireless Fidelity) module 170, include there are one or more than one processing core processing
The components such as device 180 and power supply 190.It will be understood by those skilled in the art that terminal structure shown in Fig. 5 is not constituted pair
The restriction of terminal may include either combining certain components or different component cloth than illustrating more or fewer components
It sets.Wherein:
RF circuits 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuits 110 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuits 110 can also be communicated with network and other equipment by radio communication.The wireless communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short
Messaging Service, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation
Software program and module, to perform various functions application and data processing.Memory 120 can include mainly storage journey
Sequence area and storage data field, wherein storing program area can storage program area, the application program (ratio needed at least one function
Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created number according to terminal 900
According to (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input unit 130 to memory
120 access.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating lever, optics or the input of trace ball signal.Specifically, input unit 130 may include touching
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used
Family on it or neighbouring touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table
Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional
, touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
It is one or more in trace ball, mouse, operating lever etc..
Display unit 140 can be used for showing information input by user or the information and terminal 900 that are supplied to user
Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination.
Display unit 140 may include display panel 141, optionally, LCD (Liquid Crystal Display, liquid crystal may be used
Show device), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects on it or neighbouring touches
After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing type of the device 180 according to touch event
Corresponding visual output is provided on display panel 141.Although in Figure 5, touch sensitive surface 131 and display panel 141 are conducts
Two independent components realize input and input function, but in some embodiments it is possible to by touch sensitive surface 131 and display
Panel 141 is integrated and realizes and outputs and inputs function.
Terminal 900 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 141, and proximity sensor can close display when terminal 900 is moved in one's ear
Panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that terminal 900 can also configure, herein
It repeats no more.
Voicefrequency circuit 160, loud speaker 161, microphone 162 can provide the audio interface between user and terminal 900.Audio
The transformed electric signal of the audio data received can be transferred to loud speaker 161 by circuit 160, and sound is converted to by loud speaker 161
Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160
Audio data is converted to, then by after the processing of audio data output processor 180, through RF circuits 110 to be sent to such as another end
End, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone and terminal 900.
WiFi belongs to short range wireless transmission technology, and terminal 900 can help user's transceiver electronics by WiFi module 170
Mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 5 is shown
WiFi module 170, but it is understood that, and it is not belonging to must be configured into for terminal 900, completely it can exist as needed
Do not change in the range of the essence of invention and omits.
Processor 180 is the control centre of terminal 900, utilizes each portion of various interfaces and connection whole mobile phone
Point, by running or execute the software program and/or module that are stored in memory 120, and calls and be stored in memory 120
Interior data execute the various functions and processing data of terminal 900, to carry out integral monitoring to mobile phone.Optionally, processor
180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor,
Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 900 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity
Management system and processor 180 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event
Hinder the random components such as detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 900 can also include camera, bluetooth module etc., and details are not described herein.Specifically in this reality
It applies in example, the display unit of terminal 900 is touch-screen display, and terminal 900 further includes having memory and one or one
Above program, one of them either more than one program be stored in memory and be configured to by one or one with
Upper processor execution states one or more than one program includes the instruction for being operated below:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is where the database when creating the database
Equipment;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access
Request message accesses the database.
Optionally, the hardware information for obtaining the first equipment, including:
The hardware information of the first equipment is obtained from the database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
Further, before the hardware information for obtaining the first equipment, further include:
When creating the database in first equipment, the hardware information of first equipment is stored in the number
It is stored in the server according in library or by the correspondence of the hardware information of the mark of the database and first equipment
In.
Further, further include:
If the hardware information of first equipment is different with the hardware information of second equipment, by the database
It is deleted from second equipment.
Wherein, the hardware information of first equipment is the network interface card information of first equipment and/or second equipment
Hardware information be second equipment network interface card information.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting
The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located
Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical
And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry
The safety of the data stored in the high database.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of method of protection database, which is characterized in that the method includes:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is the setting where the database when creating the database
It is standby;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access request
Message accesses the database;
The method further includes:When creating database in first equipment, the client that the database includes obtains
The hardware information of first equipment, by the storage of the hardware information of first equipment in the database or by the data
The correspondence storage of the mark in library and the hardware information of first equipment is in the server.
2. the method as described in claim 1, which is characterized in that the hardware information for obtaining the first equipment, including:
The hardware information of the first equipment is obtained from the database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
3. method as claimed in claim 1 or 2, which is characterized in that the method further includes:
If the hardware information of the hardware information of first equipment and second equipment is different, by the database from institute
It states and is deleted in the second equipment.
4. method as claimed in claim 1 or 2, which is characterized in that
The hardware information of first equipment is the network interface card information of first equipment and/or the hardware information of second equipment
For the network interface card information of second equipment.
5. a kind of device of protection database, which is characterized in that described device includes:
Receiving module, for receiving the access request message for accessing database;
First acquisition module, the hardware information for obtaining the first equipment, first equipment are when creating the database
Equipment where the database;
Second acquisition module, the hardware information for obtaining the second equipment, second equipment are that the database is currently located
Equipment;
Access modules, if the hardware information for first equipment is identical with the hardware information of second equipment, root
The database is accessed according to the access request message;
Described device is additionally operable to:When creating database in first equipment, the client that the database includes obtains
The hardware information of first equipment, by the storage of the hardware information of first equipment in the database or by the data
The correspondence storage of the mark in library and the hardware information of first equipment is in the server.
6. device as claimed in claim 5, which is characterized in that first acquisition module includes:
First acquisition unit, the hardware information for obtaining the first equipment from the database;Alternatively,
Second acquisition unit obtains the hardware letter of corresponding first equipment for the mark according to the database from server
Breath.
7. such as device described in claim 5 or 6, which is characterized in that described device further includes:
Removing module will if different for the hardware information of first equipment and the hardware information of second equipment
The database is deleted from second equipment.
8. such as device described in claim 5 or 6, which is characterized in that
The hardware information of first equipment is the network interface card information of first equipment and/or the hardware information of second equipment
For the network interface card information of second equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510107743.3A CN104966024B (en) | 2015-03-11 | 2015-03-11 | A kind of method and device of protection database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510107743.3A CN104966024B (en) | 2015-03-11 | 2015-03-11 | A kind of method and device of protection database |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104966024A CN104966024A (en) | 2015-10-07 |
CN104966024B true CN104966024B (en) | 2018-08-03 |
Family
ID=54220062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510107743.3A Active CN104966024B (en) | 2015-03-11 | 2015-03-11 | A kind of method and device of protection database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104966024B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107153688B (en) * | 2017-04-27 | 2020-11-17 | 努比亚技术有限公司 | Data query method, equipment and computer storage medium |
CN116346506B (en) * | 2023-05-31 | 2023-07-28 | 互丰科技(北京)有限公司 | Intelligent protection method for network security data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479305A (en) * | 2010-11-29 | 2012-05-30 | 金蝶软件(中国)有限公司 | Software licensing verification method and system |
CN102780699A (en) * | 2012-07-09 | 2012-11-14 | 广州杰赛科技股份有限公司 | Protecting method and protecting system for authentication server software copyright |
CN103810417A (en) * | 2014-02-19 | 2014-05-21 | 立德高科(北京)数码科技有限责任公司 | Method for releasing alerting signal on the basis of unconformity of host identify and authentication terminal thereof |
CN104036000A (en) * | 2014-06-13 | 2014-09-10 | 赵维佺 | Database audit method, device and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9032494B2 (en) * | 2011-11-10 | 2015-05-12 | Sony Corporation | Network-based revocation, compliance and keying of copy protection systems |
-
2015
- 2015-03-11 CN CN201510107743.3A patent/CN104966024B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102479305A (en) * | 2010-11-29 | 2012-05-30 | 金蝶软件(中国)有限公司 | Software licensing verification method and system |
CN102780699A (en) * | 2012-07-09 | 2012-11-14 | 广州杰赛科技股份有限公司 | Protecting method and protecting system for authentication server software copyright |
CN103810417A (en) * | 2014-02-19 | 2014-05-21 | 立德高科(北京)数码科技有限责任公司 | Method for releasing alerting signal on the basis of unconformity of host identify and authentication terminal thereof |
CN104036000A (en) * | 2014-06-13 | 2014-09-10 | 赵维佺 | Database audit method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN104966024A (en) | 2015-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3200487B1 (en) | Message processing method and apparatus | |
CN105824958B (en) | A kind of methods, devices and systems of inquiry log | |
CN103616981B (en) | application processing method, device and mobile terminal | |
CN104780164B (en) | A kind of method and apparatus of running game client | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN104639672B (en) | The method and apparatus for carrying out domain name mapping | |
CN105278937B (en) | A kind of method and device showing pop-up box message | |
CN104636047B (en) | The method, apparatus and touch screen terminal operated to the object in list | |
CN105681032B (en) | Method for storing cipher key, key management method and device | |
CN104424431B (en) | A kind of method and device resetting virtual machine user modification logging | |
CN104915091B (en) | A kind of method and apparatus for the prompt information that Shows Status Bar | |
CN104852885A (en) | Method, device and system for verifying verification code | |
CN105389259B (en) | A kind of method, apparatus and system for carrying out Application testing | |
CN104104656B (en) | Give the method and device of account number for change | |
CN106231575B (en) | Method for processing short messages and device | |
CN106533917B (en) | Relation chain processing method, apparatus and system | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN108270757A (en) | A kind of user account switching method, device, client and system | |
CN108090345A (en) | Linux system external command performs method and device | |
CN106708555B (en) | A kind of method and apparatus loading plug-in unit | |
CN104753672B (en) | The method, apparatus and terminal of account authorization | |
CN105653394B (en) | The method and apparatus of data backup | |
CN104104508B (en) | Method of calibration, device and terminal device | |
CN104966024B (en) | A kind of method and device of protection database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |