CN104966024B - A kind of method and device of protection database - Google Patents

A kind of method and device of protection database Download PDF

Info

Publication number
CN104966024B
CN104966024B CN201510107743.3A CN201510107743A CN104966024B CN 104966024 B CN104966024 B CN 104966024B CN 201510107743 A CN201510107743 A CN 201510107743A CN 104966024 B CN104966024 B CN 104966024B
Authority
CN
China
Prior art keywords
equipment
database
hardware information
information
hardware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510107743.3A
Other languages
Chinese (zh)
Other versions
CN104966024A (en
Inventor
陈远斌
陈梦
颜国平
陈荣
李德春
刘宽
董梁
刘飞飞
余传生
李佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201510107743.3A priority Critical patent/CN104966024B/en
Publication of CN104966024A publication Critical patent/CN104966024A/en
Application granted granted Critical
Publication of CN104966024B publication Critical patent/CN104966024B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method and devices of protection database, belong to field of Internet communication.The method includes:Receive the access request message for accessing database;The hardware information of the first equipment is obtained, first equipment is the equipment when creating the database where the database;The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;If the hardware information of first equipment is identical with the hardware information of second equipment, the database is accessed according to the access request message.Described device includes:Receiving module, the first acquisition module, the second acquisition module and access modules.The present invention can improve the safety of data.

Description

A kind of method and device of protection database
Technical field
The present invention relates to field of Internet communication, more particularly to a kind of method and device of protection database.
Background technology
As people’s lives are increasingly dependent on network, more and more use are store in the database of Internet Server Family information.It is the sensitive information of user to have an information in user information, and sensitive information requires very high, institute to storage security To need to protect the database for storing sensitive information, to improve the safety of storage sensitive information.
The means protected at present database are mainly encrypted database, and any access to database is grasped It is required for that first data are decrypted, then accesses operation to database again.However, hacker can be from server at present In steal entire database, then database is cracked, with realize database is decrypted, so the safety of data It is relatively low.
Invention content
In order to improve the safety of data, the present invention provides a kind of method and devices of protection database.The technology Scheme is as follows:
A method of protection database, the method includes:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is where the database when creating the database Equipment;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access Request message accesses the database.
A kind of device of protection database, described device include:
Receiving module, for receiving the access request message for accessing database;
First acquisition module, the hardware information for obtaining the first equipment, first equipment are to create the data Equipment when library where the database;
Second acquisition module, the hardware information for obtaining the second equipment, second equipment are that the database is current The equipment at place;
Access modules, if the hardware information for first equipment is identical with the hardware information of second equipment, The database is then accessed according to the access request message.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry The safety of the data stored in the high database.
Description of the drawings
Fig. 1 is a kind of method flow diagram for protection database that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of method flow diagram for protection database that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of method flow diagram for protection database that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of apparatus structure schematic diagram for protection database that the embodiment of the present invention 4 provides;
Fig. 5 is a kind of terminal structure schematic diagram that the embodiment of the present invention 5 provides.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Embodiment 1
Referring to Fig. 1, an embodiment of the present invention provides a kind of methods of protection database, including:
Step 101:Receive the access request message for accessing database.
Step 102:The hardware information of the first equipment is obtained, the first equipment is where the database when creating the database Equipment.
Step 103:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
Step 104:If the hardware information of the first equipment and the hardware information of the second equipment are identical, asked according to the access Message is asked to access the database.
Optionally, upper step 102 can be:
The hardware information of the first equipment is obtained from database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
Further, before above-mentioned steps 102, further include:
When creating the database in the first equipment, the hardware information of the first equipment is stored in the database or should The correspondence storage of the mark of database and the hardware information of the first equipment is in the server.
Further, further include:
If the hardware information of the first equipment and the hardware information of the second equipment are different, by the database from the second equipment Middle deletion.
Wherein, the hardware information of the first equipment is the network interface card information of the first equipment and/or the hardware information of the second equipment is The network interface card information of second equipment.
Wherein, in embodiments of the present invention, the data stored in the database can be the sensitive data of user.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry The safety of the data stored in the high database.
Embodiment 2
An embodiment of the present invention provides a kind of methods of protection database.
Database first is created in the first equipment before the method for executing this implementation, which includes a client, The client can obtain the hardware information of the first equipment, in the database by the hardware information storage of the first equipment.First sets Standby hardware information can be the network interface card information of the first equipment, for example, can be the IP (Internet of the first equipment Protocol, the agreement interconnected between network) address or MAC (Media Access Control, medium access control) address Deng.
After having created database in the first equipment, method which can provide through this embodiment is protected The database.Referring to Fig. 2, this method includes:
Step 201:Receive the access request message for accessing database.
It is likely located in the first equipment in the current database, it is also possible to be usurped and be placed in addition to the first equipment by hacker Any other equipment on.No matter which equipment the database is located in, when needing to access the database, needs to the data Access request message, the access request message is submitted to be received first by the client in the database in library.In addition, the visit Ask that request message carries the mark of data to be visited
Step 202:The hardware information of the first equipment is obtained from the database.
When creating the database in the first equipment, the hardware information of the first equipment is stored in the database by client At preset memory locations.For example, the hardware information of the first equipment can be stored in the attribute information of the database or be stored In the configuration information of the database.
This step can be that the hardware information of the first equipment is read from the preset memory locations of the database.
For example, it is assumed that the hardware information of the first equipment obtained in this step is the IP1 of the first equipment.
Step 203:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
This step can be:The hardware information of the second equipment is read in the second equipment being currently located from the database.The The hardware information of two equipment can be the network interface card information of the second equipment, for example, can be the IP address or MAC Address of the second equipment Deng.
In embodiments of the present invention, if the database is not stolen by hacker and is still located in the first equipment, the Two equipment are the first equipment.If the database is stolen and configured in the second equipment by hacker, in addition the access of step 201 Request message is that hacker initiates on the second device, then the second equipment difference and the first equipment, are in addition to the first equipment Other equipment.
For example, it is assumed that the hardware information of the second equipment obtained in this step is the IP2 of the second equipment, and the second equipment IP2 differences and the first equipment IP1.
Step 204:The hardware information for comparing the hardware information and the second equipment of the first equipment is held if the two is identical Row step 205 thens follow the steps 206 if the two is different.
For example, comparing the hardware information IP1 of the first equipment and the hardware information IP2 of the second equipment, since IP1 and IP2 are Then two different IP address execute step 205 so result of the comparison is that the two is different.
Step 205:The database, end operation are accessed according to the access request message.
This step can be:According to the mark for the data to be visited that the access request message carries, in the database Access data to be visited.For example, reading data to be visited from the database, number to be visited is changed in the database It is deleted from the database etc. according to or by data to be visited.
When there is the new access request message for accessing the database, the client reception being located in the database should Access request message, and executed since step 201 again.
Step 206:The database is deleted from the second equipment, end operation.
For example, the hardware information for comparing the first equipment in step 204 is different from the hardware information of the second equipment, so The database is deleted from the second equipment in this step.
Since the first equipment and the second equipment are two different equipment, show that the database is stolen and configured by hacker In second equipment, in order to protect the data in the database, which can be deleted from the second equipment, allowed black Visitor can not access the database, to improve the safety of the data stored in the database.
Further, which also obtains the time that each data are not accessed in the database, obtain not by The time of access reaches the data of preset time threshold, by the data of acquisition from the data be middle deletion.
Wherein, when storing data in the database or accessing data from the database, which can record this The storage time of data or access time.Obtain what the data were not accessed according to the storage time of the data or access time Time.
Preset time threshold can be one month, half a year, 1 year or 2 years etc..If the time that some data does not access reaches To preset time threshold, then show that the data are not used by a user for a long time, and stores to exist in the database and be stolen by hacker The hidden danger taken, therefore the data that the time not accessed is reached to preset time threshold are deleted from the database, can improve number According to safety.
In embodiments of the present invention, the hardware information of the first equipment where database when creating database is stored in In the database.When receiving the access request message for accessing the database, first stored in the database is obtained The hardware information of equipment, and the hardware information for the second equipment that the database is currently located is obtained, compare the hard of the first equipment The hardware information of part information and the second equipment shows that the first equipment is the second equipment, which does not have if the two is identical It is stolen and is run in other equipment, thus the database can be accessed according to the access request message.If the two is different, Then show the first equipment difference and the second equipment, which is stolen and configures same on the second device, and the access request What message was initiated on the second device, thus the database is deleted from the second equipment four, it can be in the effective protection database Data, improve the safety of data.
Embodiment 3
An embodiment of the present invention provides a kind of methods of protection database.
Database first is created in the first equipment before the method for executing this implementation, which includes a client, The client can obtain the hardware information of the first equipment, by the correspondence of the hardware information of the mark of the database and the first equipment Relationship stores in the server.The hardware information of first equipment can be the network interface card information of the first equipment, for example, can be first The IP address of equipment or MAC Address etc..
After having created database in the first equipment, method which can provide through this embodiment is protected The database.Referring to Fig. 3, this method includes:
Step 301:Receive the access request message for accessing database.
It is likely located in the first equipment in the current database, it is also possible to be usurped and be placed in addition to the first equipment by hacker Any other equipment on.No matter which equipment the database is located in, when needing to access the database, needs to the data Access request message, the access request message is submitted to be received first by the client in the database in library.In addition, the visit Ask that request message carries the mark of data to be visited
Step 302:According to the mark of the database, the hardware information of the first equipment is obtained from server.
This step can be to obtain the mark of the database, send and obtain request message to server, acquisition request disappears Breath carries the mark of the database, makes mark of the server according to the database, the mark of the database stored from itself with it is hard The hardware information that corresponding first equipment is obtained in the correspondence of part information receives the hard of the first equipment of server return Part information.
For example, it is assumed that the hardware information of the first equipment obtained in this step is the IP1 of the first equipment.
Step 303:The hardware information of the second equipment is obtained, the second equipment is the equipment that the database is currently located.
This step can be:The hardware information of the second equipment is read in the second equipment being currently located from the database.The The hardware information of two equipment can be the network interface card information of the second equipment, for example, can be the IP address or MAC Address of the second equipment Deng.
In embodiments of the present invention, if the database is not stolen by hacker and is still located in the first equipment, the Two equipment are the first equipment.If the database is stolen and configured in the second equipment by hacker, in addition the access of step 301 Request message is that hacker initiates on the second device, then the second equipment difference and the first equipment, are in addition to the first equipment Other equipment.
For example, it is assumed that the hardware information of the second equipment obtained in this step is the IP2 of the second equipment, and the second equipment IP2 differences and the first equipment IP1.
Step 304:The hardware information for comparing the hardware information and the second equipment of the first equipment is held if the two is identical Row step 305 thens follow the steps 306 if the two is different.
For example, comparing the hardware information IP1 of the first equipment and the hardware information IP2 of the second equipment, since IP1 and IP2 are Then two different IP address execute step 205 so result of the comparison is that the two is different.
Step 305:The database, end operation are accessed according to the access request message.
This step can be:According to the mark for the data to be visited that the access request message carries, in the database Access data to be visited.For example, reading data to be visited from the database, number to be visited is changed in the database It is deleted from the database etc. according to or by data to be visited.
When there is the new access request message for accessing the database, the client reception being located in the database should Access request message, and executed since step 301 again.
Step 306:The database is deleted from the second equipment, end operation.
For example, the hardware information for comparing the first equipment in step 304 is different from the hardware information of the second equipment, so The database is deleted from the second equipment in this step.
Since the first equipment and the second equipment are two different equipment, show that the database is stolen and configured by hacker In second equipment, in order to protect the data in the database, which can be deleted from the second equipment, allowed black Visitor can not access the database, to improve the safety of the data stored in the database.
Further, which also obtains the time that each data are not accessed in the database, obtain not by The time of access reaches the data of preset time threshold, by the data of acquisition from the data be middle deletion.
Wherein, when storing data in the database or accessing data from the database, which can record this The storage time of data or access time.Obtain what the data were not accessed according to the storage time of the data or access time Time.
Preset time threshold can be one month, half a year, 1 year or 2 years etc..If the time that some data does not access reaches To preset time threshold, then show that the data are not used by a user for a long time, and stores to exist in the database and be stolen by hacker The hidden danger taken, therefore the data that the time not accessed is reached to preset time threshold are deleted from the database, can improve number According to safety.
In embodiments of the present invention, the hardware information of the first equipment where the database is obtained when creating database, In the server by the correspondence storage of the hardware information of the mark of the database and the first equipment.When receiving for accessing When the access request message of the database, according to the mark of the database, the hard of corresponding first equipment is obtained from server Part information, and the hardware information for the second equipment that the database is currently located also is obtained, compare the hardware information of the first equipment Show that the first equipment is the second equipment, the database is not stolen if the two is identical with the hardware information of the second equipment It takes and is run in other equipment, thus the database can be accessed according to the access request message.If the two is different, show First equipment difference and the second equipment, the database are stolen and configure same on the second device, and the access request message exists Initiated in second equipment, thus the database deleted from the second equipment four, can with the data in the effective protection database, Improve the safety of data.
Embodiment 4
Referring to Fig. 4, an embodiment of the present invention provides a kind of devices of protection database, including:
Receiving module 401, for receiving the access request message for accessing database;
First acquisition module 402, the hardware information for obtaining the first equipment, the first equipment are when creating the database Equipment where the database;
Second acquisition module 403, the hardware information for obtaining the second equipment, the second equipment are that the database is currently located Equipment;
Access modules 404, if identical for the hardware information of the first equipment and the hardware information of the second equipment, basis The access request message accesses the database.
Optionally, the first acquisition module 402 includes:
First acquisition unit, the hardware information for obtaining the first equipment from the database;Alternatively,
Second acquisition unit obtains the hard of corresponding first equipment for the mark according to the database from server Part information.
Further, which further includes:
The hardware information of first equipment when for creating the database in the first equipment, is stored in this by memory module It is stored in the server in database or by the correspondence of the hardware information of the mark of the database and the first equipment.
Further, which further includes:
Removing module, if different for the hardware information of the first equipment and the hardware information of the second equipment, by the number It is deleted from the second equipment according to library.
Wherein, the hardware information of the first equipment is the network interface card information of the first equipment and/or the hardware information of the second equipment is The network interface card information of second equipment.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry The safety of the data stored in the high database.
Embodiment 5
Referring to Fig. 5, it illustrates the terminal structure schematic diagram involved by the embodiment of the present invention, which can be above-mentioned visitor Family end provides hardware running environment, the method for the protection database for implementing to provide in above-described embodiment.Specifically:
Terminal 900 may include RF (Radio Frequency, radio frequency) circuit 110, include one or more meters The memory 120 of calculation machine readable storage medium storing program for executing, input unit 130, display unit 140, sensor 150, voicefrequency circuit 160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include there are one or more than one processing core processing The components such as device 180 and power supply 190.It will be understood by those skilled in the art that terminal structure shown in Fig. 5 is not constituted pair The restriction of terminal may include either combining certain components or different component cloth than illustrating more or fewer components It sets.Wherein:
RF circuits 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuits 110 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex Device etc..In addition, RF circuits 110 can also be communicated with network and other equipment by radio communication.The wireless communication can make With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short Messaging Service, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation Software program and module, to perform various functions application and data processing.Memory 120 can include mainly storage journey Sequence area and storage data field, wherein storing program area can storage program area, the application program (ratio needed at least one function Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created number according to terminal 900 According to (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts. Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input unit 130 to memory 120 access.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating lever, optics or the input of trace ball signal.Specifically, input unit 130 may include touching Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used Family on it or neighbouring touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional , touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically, Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), It is one or more in trace ball, mouse, operating lever etc..
Display unit 140 can be used for showing information input by user or the information and terminal 900 that are supplied to user Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination. Display unit 140 may include display panel 141, optionally, LCD (Liquid Crystal Display, liquid crystal may be used Show device), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel 141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects on it or neighbouring touches After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing type of the device 180 according to touch event Corresponding visual output is provided on display panel 141.Although in Figure 5, touch sensitive surface 131 and display panel 141 are conducts Two independent components realize input and input function, but in some embodiments it is possible to by touch sensitive surface 131 and display Panel 141 is integrated and realizes and outputs and inputs function.
Terminal 900 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 141, and proximity sensor can close display when terminal 900 is moved in one's ear Panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally Three axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify mobile phone posture application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that terminal 900 can also configure, herein It repeats no more.
Voicefrequency circuit 160, loud speaker 161, microphone 162 can provide the audio interface between user and terminal 900.Audio The transformed electric signal of the audio data received can be transferred to loud speaker 161 by circuit 160, and sound is converted to by loud speaker 161 Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160 Audio data is converted to, then by after the processing of audio data output processor 180, through RF circuits 110 to be sent to such as another end End, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that earphone jack, To provide the communication of peripheral hardware earphone and terminal 900.
WiFi belongs to short range wireless transmission technology, and terminal 900 can help user's transceiver electronics by WiFi module 170 Mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 5 is shown WiFi module 170, but it is understood that, and it is not belonging to must be configured into for terminal 900, completely it can exist as needed Do not change in the range of the essence of invention and omits.
Processor 180 is the control centre of terminal 900, utilizes each portion of various interfaces and connection whole mobile phone Point, by running or execute the software program and/or module that are stored in memory 120, and calls and be stored in memory 120 Interior data execute the various functions and processing data of terminal 900, to carry out integral monitoring to mobile phone.Optionally, processor 180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor, Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 900 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 180 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event Hinder the random components such as detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 900 can also include camera, bluetooth module etc., and details are not described herein.Specifically in this reality It applies in example, the display unit of terminal 900 is touch-screen display, and terminal 900 further includes having memory and one or one Above program, one of them either more than one program be stored in memory and be configured to by one or one with Upper processor execution states one or more than one program includes the instruction for being operated below:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is where the database when creating the database Equipment;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access Request message accesses the database.
Optionally, the hardware information for obtaining the first equipment, including:
The hardware information of the first equipment is obtained from the database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
Further, before the hardware information for obtaining the first equipment, further include:
When creating the database in first equipment, the hardware information of first equipment is stored in the number It is stored in the server according in library or by the correspondence of the hardware information of the mark of the database and first equipment In.
Further, further include:
If the hardware information of first equipment is different with the hardware information of second equipment, by the database It is deleted from second equipment.
Wherein, the hardware information of first equipment is the network interface card information of first equipment and/or second equipment Hardware information be second equipment network interface card information.
In embodiments of the present invention, it when receiving the access request message for accessing database, is being created due to getting The hardware for the second equipment that the hardware information and the database of the first equipment when the database where the database are currently located Information shows that the database is not stolen if the hardware information of the first equipment and the hardware information of the second equipment are identical And operate in the other equipment in addition to the first equipment, the database is then accessed according to the access request message, to carry The safety of the data stored in the high database.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of method of protection database, which is characterized in that the method includes:
Receive the access request message for accessing database;
The hardware information of the first equipment is obtained, first equipment is the setting where the database when creating the database It is standby;
The hardware information of the second equipment is obtained, second equipment is the equipment that the database is currently located;
If the hardware information of first equipment is identical with the hardware information of second equipment, according to the access request Message accesses the database;
The method further includes:When creating database in first equipment, the client that the database includes obtains The hardware information of first equipment, by the storage of the hardware information of first equipment in the database or by the data The correspondence storage of the mark in library and the hardware information of first equipment is in the server.
2. the method as described in claim 1, which is characterized in that the hardware information for obtaining the first equipment, including:
The hardware information of the first equipment is obtained from the database;Alternatively,
According to the mark of the database, the hardware information of corresponding first equipment is obtained from server.
3. method as claimed in claim 1 or 2, which is characterized in that the method further includes:
If the hardware information of the hardware information of first equipment and second equipment is different, by the database from institute It states and is deleted in the second equipment.
4. method as claimed in claim 1 or 2, which is characterized in that
The hardware information of first equipment is the network interface card information of first equipment and/or the hardware information of second equipment For the network interface card information of second equipment.
5. a kind of device of protection database, which is characterized in that described device includes:
Receiving module, for receiving the access request message for accessing database;
First acquisition module, the hardware information for obtaining the first equipment, first equipment are when creating the database Equipment where the database;
Second acquisition module, the hardware information for obtaining the second equipment, second equipment are that the database is currently located Equipment;
Access modules, if the hardware information for first equipment is identical with the hardware information of second equipment, root The database is accessed according to the access request message;
Described device is additionally operable to:When creating database in first equipment, the client that the database includes obtains The hardware information of first equipment, by the storage of the hardware information of first equipment in the database or by the data The correspondence storage of the mark in library and the hardware information of first equipment is in the server.
6. device as claimed in claim 5, which is characterized in that first acquisition module includes:
First acquisition unit, the hardware information for obtaining the first equipment from the database;Alternatively,
Second acquisition unit obtains the hardware letter of corresponding first equipment for the mark according to the database from server Breath.
7. such as device described in claim 5 or 6, which is characterized in that described device further includes:
Removing module will if different for the hardware information of first equipment and the hardware information of second equipment The database is deleted from second equipment.
8. such as device described in claim 5 or 6, which is characterized in that
The hardware information of first equipment is the network interface card information of first equipment and/or the hardware information of second equipment For the network interface card information of second equipment.
CN201510107743.3A 2015-03-11 2015-03-11 A kind of method and device of protection database Active CN104966024B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510107743.3A CN104966024B (en) 2015-03-11 2015-03-11 A kind of method and device of protection database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510107743.3A CN104966024B (en) 2015-03-11 2015-03-11 A kind of method and device of protection database

Publications (2)

Publication Number Publication Date
CN104966024A CN104966024A (en) 2015-10-07
CN104966024B true CN104966024B (en) 2018-08-03

Family

ID=54220062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510107743.3A Active CN104966024B (en) 2015-03-11 2015-03-11 A kind of method and device of protection database

Country Status (1)

Country Link
CN (1) CN104966024B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107153688B (en) * 2017-04-27 2020-11-17 努比亚技术有限公司 Data query method, equipment and computer storage medium
CN116346506B (en) * 2023-05-31 2023-07-28 互丰科技(北京)有限公司 Intelligent protection method for network security data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479305A (en) * 2010-11-29 2012-05-30 金蝶软件(中国)有限公司 Software licensing verification method and system
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN103810417A (en) * 2014-02-19 2014-05-21 立德高科(北京)数码科技有限责任公司 Method for releasing alerting signal on the basis of unconformity of host identify and authentication terminal thereof
CN104036000A (en) * 2014-06-13 2014-09-10 赵维佺 Database audit method, device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9032494B2 (en) * 2011-11-10 2015-05-12 Sony Corporation Network-based revocation, compliance and keying of copy protection systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479305A (en) * 2010-11-29 2012-05-30 金蝶软件(中国)有限公司 Software licensing verification method and system
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN103810417A (en) * 2014-02-19 2014-05-21 立德高科(北京)数码科技有限责任公司 Method for releasing alerting signal on the basis of unconformity of host identify and authentication terminal thereof
CN104036000A (en) * 2014-06-13 2014-09-10 赵维佺 Database audit method, device and system

Also Published As

Publication number Publication date
CN104966024A (en) 2015-10-07

Similar Documents

Publication Publication Date Title
EP3200487B1 (en) Message processing method and apparatus
CN105824958B (en) A kind of methods, devices and systems of inquiry log
CN103616981B (en) application processing method, device and mobile terminal
CN104780164B (en) A kind of method and apparatus of running game client
CN104836664B (en) A kind of methods, devices and systems executing business processing
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN104639672B (en) The method and apparatus for carrying out domain name mapping
CN105278937B (en) A kind of method and device showing pop-up box message
CN104636047B (en) The method, apparatus and touch screen terminal operated to the object in list
CN105681032B (en) Method for storing cipher key, key management method and device
CN104424431B (en) A kind of method and device resetting virtual machine user modification logging
CN104915091B (en) A kind of method and apparatus for the prompt information that Shows Status Bar
CN104852885A (en) Method, device and system for verifying verification code
CN105389259B (en) A kind of method, apparatus and system for carrying out Application testing
CN104104656B (en) Give the method and device of account number for change
CN106231575B (en) Method for processing short messages and device
CN106533917B (en) Relation chain processing method, apparatus and system
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN108270757A (en) A kind of user account switching method, device, client and system
CN108090345A (en) Linux system external command performs method and device
CN106708555B (en) A kind of method and apparatus loading plug-in unit
CN104753672B (en) The method, apparatus and terminal of account authorization
CN105653394B (en) The method and apparatus of data backup
CN104104508B (en) Method of calibration, device and terminal device
CN104966024B (en) A kind of method and device of protection database

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant