CN106570035B - Database authorization method and device - Google Patents
Database authorization method and device Download PDFInfo
- Publication number
- CN106570035B CN106570035B CN201510657824.0A CN201510657824A CN106570035B CN 106570035 B CN106570035 B CN 106570035B CN 201510657824 A CN201510657824 A CN 201510657824A CN 106570035 B CN106570035 B CN 106570035B
- Authority
- CN
- China
- Prior art keywords
- database
- target
- authorization
- target database
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/211—Schema design and management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method and a device for database authorization, relates to the technical field of internet, and aims to solve the problem of low efficiency of manually implementing database authorization in the prior art. The method of the invention comprises the following steps: the method comprises the steps of obtaining a database list under a database example, wherein the database example relates to a plurality of databases, and the database list records names of the databases; selecting a target database from a database list, wherein the target database is a database which needs to be authorized to be used externally; generating a one-dimensional array containing the name of the target database; acquiring the name of a target database from a one-dimensional array; generating an authorization script corresponding to the target database according to the name of the target database; and executing the authorization script to finish the authorization of the external use target database. The invention is suitable for being applied to the process of batch authorization for database users.
Description
Technical Field
The invention relates to the technical field of internet, in particular to a database authorization method and a database authorization device.
Background
In the database operation and maintenance process, different database authorities need to be granted to different users. Currently, a commonly used authorization method is that operation and maintenance personnel click a database to be authorized on an interface through a visual interface tool to complete database authorization. This method requires the operation and maintenance personnel to manually find the database to be authorized and then perform manual authorization operation.
In the process of the database authorization, the inventor finds that when a large number of databases to be authorized exist, the manual authorization mode requires a large number of searching and clicking operations by operation and maintenance personnel, and the authorization efficiency is very low.
Disclosure of Invention
The invention provides a database authorization method and a database authorization device, which can solve the problem of low efficiency in manual database authorization in the prior art.
To solve the above technical problem, in one aspect, the present invention provides a method for database authorization, where the method includes:
acquiring a database list under a database instance, wherein the database instance relates to a plurality of databases, and names of the databases are recorded in the database list;
selecting a target database from the database list, wherein the target database is a database which needs to be authorized to be used externally;
generating a one-dimensional array containing the name of the target database;
acquiring the name of the target database from the one-dimensional array;
generating an authorization script corresponding to the target database according to the name of the target database;
and executing the authorization script to finish the authorization of the external use of the target database.
In another aspect, the present invention further provides a database authorization apparatus, including:
the database management system comprises a first acquisition unit, a second acquisition unit and a management unit, wherein the first acquisition unit is used for acquiring a database list under a database instance, the database instance relates to a plurality of databases, and names of the databases are recorded in the database list;
the selection unit is used for selecting a target database from the database list acquired by the first acquisition unit, wherein the target database is a database which needs to be authorized to be used externally;
a first generating unit configured to generate a one-dimensional array including the name of the target database selected by the selecting unit;
a second obtaining unit, configured to obtain a name of the target database from the one-dimensional array generated by the first generating unit;
the second generation unit is used for generating an authorization script corresponding to the target database according to the name of the target database acquired by the second acquisition unit;
and the execution unit is used for executing the authorization script generated by the second generation unit and finishing the authorization of the external use of the target database.
The method and the device for authorizing the database can acquire the database list from the database instance, select the target database needing to be authorized from the database list, generate the name of the selected target database needing to be authorized into the one-dimensional array, generate the authorization script corresponding to each target database according to the name of the target database, and finally execute the authorization script to complete the setting of the use permission of the database from the outside. Compared with the prior art, the method and the device can store the names of the target databases into the one-dimensional array, and automatically generate the authorized scripts of each target database according to the names of the target databases, so that the database authorization efficiency is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a method for database authorization according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method for authorizing a database according to an embodiment of the present invention;
fig. 3 shows a block diagram of a database authorization apparatus according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to solve the problem of low efficiency in manually implementing database authorization in the prior art, an embodiment of the present invention provides a method for database authorization, as shown in fig. 1, the method includes:
101. the method comprises the steps of obtaining a database list under a database instance, wherein the database instance relates to a plurality of databases, and names of the databases are recorded in the database list.
The database instance is not fixed, is a part of computer memory and background process of auxiliary processing required when accessing the database, and is a set formed by the memory occupied by the process and the thread, and when the server is closed, the database instance disappears. The database is fixed and is a disk-based data file. Database files in the disk are typically accessed and controlled by a database instance. The database instances and the databases have corresponding relations, and one database instance may correspond to one database, or one database instance may correspond to a plurality of databases. Therefore, the database can be obtained through the database instance, and a database list display is formed, wherein the database in the database list is displayed by the name of the database.
The database platform based on the method in this embodiment is not limited, and may be SQL-server, oracle, and the like, and specifically, the SQL-server database platform is selected for description in this embodiment.
102. And selecting a target database from the database list, wherein the target database is a database which needs to be authorized for external use.
In step 101, the database list obtained records the names of all databases related to the database instance, and in this step, the database to be authorized for external use is selected from the database list as the target database. When the target database is selected, a selection condition is set, the selection condition is the limitation of the name of the database, and the setting of the specific selection condition is determined according to actual needs.
103. A one-dimensional array containing the names of the target databases is generated.
For the purpose of reading the name of the target database conveniently and quickly later, the embodiment stores all the names of the target databases meeting the selection condition obtained in the step 102 in a one-dimensional array so as to be obtained from the target databases when the authorization script is generated later.
Specifically, the process of storing the names of all the target databases as a one-dimensional array is as follows: pre-calculating the number of target databases; then defining a one-dimensional space array with a preset length according to the number of the target databases, wherein the preset length is determined by the number of the databases; and sequentially assigning the names of the target databases to the elements in the one-dimensional space array to generate a one-dimensional array containing the names of the target databases.
In practical applications, the above-mentioned manner of storing all target database names as one-dimensional arrays is not limited, and may be implemented by using different programming languages such as C #, C, C + +, and the like.
104. And acquiring the name of the target database from the one-dimensional array.
In step 103, all the target database names are stored as a one-dimensional array, so the target database names need to be obtained from the one-dimensional array.
When the name of the target database is obtained from the one-dimensional array, the name of the target database is obtained according to a certain rule, and the obtaining of the name of the target database also prepares for later generation of a corresponding target database authorization script.
105. And generating an authorization script corresponding to the target database according to the name of the target database.
The authorization script for generating the target database is generated according to a certain rule or function, and the target database is distinguished by the corresponding name of the target database, so that the name of the target database can be used as an attribute or a variable of the authorization script rule or function for generating the target database, and the authorization script of the target database corresponding to the name of the target database can be obtained.
106. And executing the authorization script to finish the authorization of the external use target database.
And executing the authorization script obtained in the step 105, wherein the specific implementation process is as follows: and putting the obtained authorization script into a database management tool for execution, and completing the authorization of the external use target database.
Common database management tools include SQL Server database management platform (SSMS), sequential Pro, SQLyog, PhpMyAmin, and the like, and different database platforms use appropriate database management tools. For the SQL Server database platform, the most suitable database management tool is SSMS.
SSMS is a fully functional utility for managing SQL Server objects, for accessing, configuring, managing and developing all the components of SQL Server, which combines a large number of graphical tools and rich script editors. The process of executing the script and authorizing the external use of the target database may thus be accomplished by the SSMS tool.
The database authorization method provided by the embodiment of the invention can acquire the database list from the database instance, select the target database to be authorized from the database list, generate the name of the selected target database to be authorized into the one-dimensional array, generate the authorization script corresponding to each target database according to the name of the target database, and finally execute the authorization script to complete the setting of the use permission of the database from the outside. Compared with the prior art, the method and the device have the advantages that the target database names are stored into the one-dimensional array, and then the authorized scripts of the target databases are automatically generated according to the target database names, so that the database authorization efficiency is improved.
Further, as a refinement and an extension of the embodiment shown in fig. 1, another embodiment is provided in the embodiment of the present invention. As shown in fig. 2, the method for authorizing the database in this embodiment includes:
201. and reading the system table of the database instance, and acquiring the database list from the system table.
The database instance system table can correspond to a plurality of databases, so that the database list can be obtained from the system table of the database instance, and the obtained database list is also used for preparing for obtaining a target database later.
202. And searching a database with names containing preset keywords in the database list, and determining the database as a target database.
In step 201, a database list can be obtained from the database instance system table, and a selection condition needs to be set for selection in order to obtain the target database. As can be seen from step 101, the databases in the database list are displayed by the names of the databases, so the target database selection condition in this embodiment is set as: and searching a database with the name containing preset keywords, and determining the database as a target database. Wherein the predetermined keyword is typically a character or a string of characters contained in at least one database name. The determination of the keywords is determined according to specific practical requirements.
And after determining the keywords, generating a query sentence according to the keywords, and executing the query sentence to obtain the target database.
203. A one-dimensional array containing the names of the target databases is generated.
The implementation of this step is the same as that of step 103 in fig. 1, and is not described here again.
204. And acquiring the name of the target database from the one-dimensional array according to the arrangement sequence of the names.
In practical applications, the names of the target databases are obtained from the one-dimensional array according to the arrangement order of the names in the following two ways.
In a first mode
When the target databases corresponding to the target database names in the one-dimensional array are authorized to be the same usage right, for example, when a user is granted access rights to the target databases, the target database names may be sequentially obtained from the one-dimensional array according to the arrangement order of the names.
Mode two
When two or more usage rights are authorized for each target database corresponding to the target database name in the one-dimensional array, for example, a part of the target databases are authorized for the user access right, and another part of the target databases are authorized for the user modification right. In this case, the names of the target databases need to be obtained by grouping according to different usage rights, so that the names of the target databases cannot be obtained from the one-dimensional array in sequence according to the arrangement order of the names, and the names of the target databases can be obtained from the one-dimensional array arbitrarily according to the arrangement order of the names according to the specific grouping condition.
205. When a plurality of target databases exist, the authorization scripts corresponding to the target databases are generated in batches through the loop function.
The loop function in this embodiment is for loop, and the specific loop function implementation logic is as follows: declaring an integer array; assigning the name of the target database obtained from the one-dimensional array in the step 204 to a shaping array; and traversing the names of the target databases in the shaping array by utilizing a cycle, repeatedly executing a cycle body, and automatically generating the authorization scripts corresponding to the target databases. Where the loop body is a single database authorization script.
In this embodiment, the multiple target databases refer to that the target databases are authorized to have the same usage right. The following two ways of obtaining the name of the target database in step 204 are described respectively: in the first mode, the target databases are authorized to have the same use permission, so that the authorization scripts corresponding to the target databases can be generated in batch at one time directly through a loop function; and secondly, grouping according to different use authorities to obtain the names of the target databases, wherein the authority authorized by the target databases in each group is the same, so that the circulation function needs to be used for multiple times by taking the group as a unit to generate the authorization scripts corresponding to the target databases. The loop body of each loop function is specifically set according to the use authority, and the number of times of using the loop functions is consistent with the number of groups.
206. And executing the script statement, searching the target database corresponding to the name and setting the use permission of the open database.
As can be seen from step 205, authorized scripts corresponding to the respective target databases are obtained, where each script includes a name of the database and a script statement for authorizing the target database. And executing the target database authorization script statement in the SSMS, finding the corresponding target database according to the name of the target database contained in the target database authorization script statement in the execution process, and then executing the authorization script statement of the target database corresponding to the name to complete the setting of the database, namely opening the use permission of the target database.
Further, as an application of the method shown in fig. 2, in one scenario of the present invention, the method for authorizing the database includes:
firstly, a target database with 'Web' in database names is selected from a database list, and the following is realized:
SELECT Name FROM Master..SysDatabase
WHERE name LIKE‘%Web%’
ORDER BY Name
the SysDatabase is a system table under a database instance, and a database list containing all database names can be acquired from the system table through the execution of the first row statement. The second line of statements is executed in order to select a database name containing the keyword "Web" in the database list and determine the database corresponding to the name as the target database. The third row is performed for the purpose of sorting the selected names of the target databases according to a certain rule, for example, sorting according to an initial order, sorting according to a database usage frequency, and the like.
Secondly, storing the selected target database name as a one-dimensional array, and outputting the following results:
{WebDissector,WebDissector1,WebDissector2,WebDissector3,…}
the "webdistector", "webdistector 1", "webdistector 2", and the like are names of the target databases containing the keywords selected in the foregoing steps.
And finally, acquiring the name of the target database from the one-dimensional array to generate an authorization script corresponding to each target database, wherein the method is realized as follows:
wherein the databases WebDissector, WebDissector1, WebDissector2 and WebDissector3 are granted the same authority, so that the batch authorization can be performed through a for-loop function.
The application scenario is only an illustrative example, and is to more clearly illustrate an overall logic idea for implementing database authorization, and a specific practical application implementation is complex and needs to be designed and supplemented according to specific practical needs.
Further, as an implementation of the method shown in fig. 1 and fig. 2, another embodiment of the present invention further provides a database authorization apparatus, which is used to implement the method shown in fig. 1 and fig. 2. As shown in fig. 3, the apparatus includes: a first acquisition unit 31, a selection unit 32, a first generation unit 33, a second acquisition unit 34, a second generation unit 35, and an execution unit 36.
A first obtaining unit 31, configured to obtain a database list under a database instance, where the database instance relates to multiple databases, and names of the multiple databases are recorded in the database list;
a selecting unit 32, configured to select a target database from the database list acquired by the first acquiring unit 31, where the target database is a database that needs to be authorized for external use;
a first generating unit 33 for generating a one-dimensional array containing the names of the target databases selected by the selecting unit 32;
a second obtaining unit 34 configured to obtain the name of the target database from the one-dimensional array generated by the first generating unit 33;
a second generating unit 35, configured to generate an authorization script corresponding to the target database according to the name of the target database acquired by the second acquiring unit 34;
and an executing unit 36, configured to execute the authorization script generated by the second generating unit 35, and complete authorization for external use of the target database.
Further, the first obtaining unit 31 is configured to:
and reading the system table of the database instance, and acquiring the database list from the system table.
Further, the selecting unit 32 is configured to:
and searching a database with names containing preset keywords in the database list, and determining the database as a target database.
Further, the second obtaining unit 34 is configured to:
and acquiring the name of the target database from the one-dimensional array according to the arrangement sequence of the names.
Further, the second generating unit 35 is configured to:
when a plurality of target databases exist, the authorization scripts corresponding to the target databases are generated in batches through the loop function.
Further, the authorization script generated by the second generating unit 35 includes a name of the target database and a script statement for authorizing the target database;
an execution unit 36 for:
and executing the script statement, searching the target database corresponding to the name and setting the use permission of the open database.
The database authorization device provided by the embodiment of the invention can acquire the database list from the database instance, select the target database to be authorized from the database list, generate the name of the selected target database to be authorized into the one-dimensional array, generate the authorization script corresponding to each target database according to the name of the target database, and finally execute the authorization script to complete the setting of the use permission of the database from the outside. Compared with the prior art, the method and the device have the advantages that the target database names are stored into the one-dimensional array, and then the authorized scripts of the target databases are automatically generated according to the target database names, so that the database authorization efficiency is improved.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another. In addition, "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent merits of the embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of embodiments of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best modes of embodiments of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, the claimed embodiments of the invention require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of an embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of and form different embodiments of the invention. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in the title of the invention (e.g., means for determining the level of links within a web site) in accordance with embodiments of the invention. Embodiments of the invention may also be implemented as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing embodiments of the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the embodiments of the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. Embodiments of the invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Claims (12)
1. A method of database authorization, the method comprising:
acquiring a database list under a database instance, wherein the database instance relates to a plurality of databases, and names of the databases are recorded in the database list;
selecting a target database from the database list, wherein the target database is a database which needs to be authorized to be used externally;
generating a one-dimensional array containing the name of the target database;
acquiring the name of the target database from the one-dimensional array;
generating an authorization script corresponding to the target database according to the name of the target database;
and executing the authorization script in a database management tool to finish the authorization of the external use of the target database.
2. The method of claim 1, wherein obtaining a database listing under a database instance comprises:
and reading a system table of the database instance, and acquiring the database list from the system table.
3. The method of claim 1, wherein selecting the target database from the database list comprises:
and searching a database with names containing preset keywords in the database list, and determining the database as the target database.
4. The method of claim 1, wherein obtaining the name of the target database from the one-dimensional array comprises:
and acquiring the name of the target database from the one-dimensional array according to the arrangement sequence of the names.
5. The method of claim 1, wherein generating an authorization script corresponding to the target database according to the name of the target database comprises:
when a plurality of target databases exist, the authorization scripts corresponding to the target databases are generated in batches through the loop function.
6. The method of claim 1, wherein the authorization script comprises a name of the target database and a script statement authorizing the target database;
the executing the authorization script completes authorization for using the target database externally, including:
and executing the script statement, searching a target database corresponding to the name and setting the use permission for opening the database.
7. An apparatus for database authorization, the apparatus comprising:
the database management system comprises a first acquisition unit, a second acquisition unit and a management unit, wherein the first acquisition unit is used for acquiring a database list under a database instance, the database instance relates to a plurality of databases, and names of the databases are recorded in the database list;
the selection unit is used for selecting a target database from the database list acquired by the first acquisition unit, wherein the target database is a database which needs to be authorized to be used externally;
a first generating unit configured to generate a one-dimensional array including the name of the target database selected by the selecting unit;
a second obtaining unit, configured to obtain a name of the target database from the one-dimensional array generated by the first generating unit;
the second generation unit is used for generating an authorization script corresponding to the target database according to the name of the target database acquired by the second acquisition unit;
and the execution unit is used for executing the authorization script generated by the second generation unit in a database management tool to finish the authorization of the target database for external use.
8. The apparatus of claim 7, wherein the first obtaining unit is configured to:
and reading a system table of the database instance, and acquiring the database list from the system table.
9. The apparatus of claim 7, wherein the selecting unit is configured to:
and searching a database with names containing preset keywords in the database list, and determining the database as the target database.
10. The apparatus of claim 7, wherein the second obtaining unit is configured to:
and acquiring the name of the target database from the one-dimensional array according to the arrangement sequence of the names.
11. A storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the storage medium is located to perform the database authorization method according to any one of claims 1 to 6.
12. A processor configured to execute a program, wherein the program execution is to perform the method of database authorization according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510657824.0A CN106570035B (en) | 2015-10-13 | 2015-10-13 | Database authorization method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510657824.0A CN106570035B (en) | 2015-10-13 | 2015-10-13 | Database authorization method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106570035A CN106570035A (en) | 2017-04-19 |
CN106570035B true CN106570035B (en) | 2020-10-13 |
Family
ID=58508618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510657824.0A Active CN106570035B (en) | 2015-10-13 | 2015-10-13 | Database authorization method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570035B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990802B (en) * | 2019-11-13 | 2022-10-14 | 上海易点时空网络有限公司 | Method and device for carrying out batch authorization on mysql user permission information |
CN111291025B (en) * | 2020-03-10 | 2020-11-10 | 北京东方金信科技有限公司 | Method for supporting multi-physical model conversion by logic model and storage device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553380A (en) * | 2003-05-27 | 2004-12-08 | 鸿富锦精密工业(深圳)有限公司 | Database use authority controlling system and method |
CN1592230A (en) * | 2003-08-28 | 2005-03-09 | 微软公司 | Delegated administration of a hosted resource |
CN101378401A (en) * | 2007-08-31 | 2009-03-04 | 华为技术有限公司 | Method, system and equipment for controlling business resource authorization |
CN103809942A (en) * | 2012-11-08 | 2014-05-21 | 苏州博远容天信息科技有限公司 | Wonderware data warehouse object authorization method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7685152B2 (en) * | 2006-01-10 | 2010-03-23 | International Business Machines Corporation | Method and apparatus for loading data from a spreadsheet to a relational database table |
-
2015
- 2015-10-13 CN CN201510657824.0A patent/CN106570035B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553380A (en) * | 2003-05-27 | 2004-12-08 | 鸿富锦精密工业(深圳)有限公司 | Database use authority controlling system and method |
CN1592230A (en) * | 2003-08-28 | 2005-03-09 | 微软公司 | Delegated administration of a hosted resource |
CN101378401A (en) * | 2007-08-31 | 2009-03-04 | 华为技术有限公司 | Method, system and equipment for controlling business resource authorization |
CN103809942A (en) * | 2012-11-08 | 2014-05-21 | 苏州博远容天信息科技有限公司 | Wonderware data warehouse object authorization method |
Also Published As
Publication number | Publication date |
---|---|
CN106570035A (en) | 2017-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11042662B2 (en) | Data aggregation system for enabling query operations on restricted data that originates from multiple independent multiple sources | |
US8468146B2 (en) | System and method for creating search index on cloud database | |
CA2957674C (en) | Testing insecure computing environments using random data sets generated from characterizations of real data sets | |
WO2016003427A1 (en) | Automatic generation of sub-queries | |
EP2619718A1 (en) | Processing of categorized product information cross reference to other applications | |
CN110033206A (en) | Bill of materials automatic Check method and device | |
CN107480260B (en) | Big data real-time analysis method and device, computing equipment and computer storage medium | |
US20140298286A1 (en) | Systems and Methods for Automatically Associating Software Elements and Automatic Gantt Chart Creation | |
CN108776678B (en) | Index creation method and device based on mobile terminal NoSQL database | |
US20150081690A1 (en) | Network sourced enrichment and categorization of media content | |
CN106663106A (en) | Security trimming of search suggestions | |
CN104484392A (en) | Method and device for generating database query statement | |
CN106648568B (en) | Method and device for adding check box on table | |
CN106960008A (en) | Method and browser that a kind of browser is scanned for | |
CN114090695A (en) | Query optimization method and device for distributed database | |
CN106570035B (en) | Database authorization method and device | |
US8689324B2 (en) | Techniques to explain authorization origins for protected resource objects in a resource object domain | |
CN105608195B (en) | A kind of official website addition web graph calibration method and system in search result | |
EP3009900B1 (en) | Dynamic recommendation of elements suitable for use in an engineering configuration | |
US9824122B2 (en) | Requests for source code text | |
CN115795521B (en) | Access control method, device, electronic equipment and storage medium | |
US20160117350A1 (en) | Column group selection method and apparatus for efficiently storing data in mixed olap/oltp workload environment | |
US9208178B2 (en) | Gesture-based image shape filtering | |
CN106202412A (en) | Data retrieval method and device | |
CN114201498A (en) | Data processing method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing Applicant after: Beijing Guoshuang Technology Co.,Ltd. Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing Applicant before: Beijing Guoshuang Technology Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |