CN107563221A - A kind of certification decoding security management system for encrypting database - Google Patents
A kind of certification decoding security management system for encrypting database Download PDFInfo
- Publication number
- CN107563221A CN107563221A CN201710786526.0A CN201710786526A CN107563221A CN 107563221 A CN107563221 A CN 107563221A CN 201710786526 A CN201710786526 A CN 201710786526A CN 107563221 A CN107563221 A CN 107563221A
- Authority
- CN
- China
- Prior art keywords
- module
- certification
- access
- database
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of certification decoding security management system for encrypting database, it is related to technical field of network security.Including the encrypting database for file encryption;Authentication module for certification user right;Decoder module for file decryption;For monitoring the monitoring modular of authentication module operation;For managing encrypted database and the administrator module of authentication module;User to the file in encrypting database by deciphering module after authentication module by being decrypted browse operation.The present invention is by setting AES to be encrypted for database file; pass through authentication module certification user right; browse operation file after could being decrypted by user after checking by decoder module; and recorded by the access of monitoring module monitors user; the access of abnormal user is limited by administrator module; the security information of enterprise is effectively protected, risk of divulging a secret is reduced, prevents information leakage from causing damage.
Description
Technical field
The invention belongs to technical field of network security, more particularly to a kind of certification decoding security for encrypting database
Management system.
Background technology
From the perspective of from the network operation and manager's angle, it is desirable to which the operation such as access, read-write to local network information is protected
And control, avoid the occurrence of " trapdoor ", virus, illegal access, refusal service and Internet resources and illegally occupy and the prestige such as illegally control
The side of body, prevent the attack with defending against network hacker.For safe and secret department, they are wished to illegal, harmful or be related to
The information of state secret carry out filtering and it is anti-blocking, avoid confidential information leakage, avoid to society produce harm, country is caused huge
Big loss.
With developing rapidly for computer technology, the business handled on computers also by the mathematical operation based on unit,
File process, interior business processing, office automation based on the internal network simply connected etc. is developed into based in complexity
Portion's net (Intranet), extranet (Extranet), the enterprise-class computers processing system of Global Internet (Internet)
System and worldwide information sharing and business processing.
Therefore computer security issue, it should as the fire-proof and theft-proof problem of every household, accomplish to be preventive from possible trouble.Very
When will not extremely expecting that yourself can also turn into target, threat has just occurred, once occurring, is usually caught unprepared, makes
Into great loss.
Security work is the basic guarantee for promoting enterprise's orderly development concerning the safety and interests of enterprise, the life with enterprise
Extremely live or die closely bound up.For enterprise, the security of whole system depends on the security intensity of weakest link, occurs once
The leakage of a state or party secret will cause all safe and secret work all to be fallen short of success for lack of final effort, and the leakage of a state or party secret is also to estimate to the loss that enterprise brings
Amount.So enterprise strengthens security work to improving its self-protection ability, ensureing that core competitiveness etc. plays an important role.
The classified document for protecting enterprise is the first step for preventing enterprise from divulging a secret, and present enterprise document is largely preserved in calculating
In machine or server, it is particularly important for the encrypting database and solution code system of classified document, it is currently designed a kind of to use
In the certification decoding security management system of encrypting database, by the authority of authentication module authentication-access user, reduce and divulge a secret
Risk.
The content of the invention
It is an object of the invention to provide a kind of certification decoding security management system for encrypting database, pass through setting
AES is encrypted for database file, by authentication module certification user right, could be passed through by user after checking
Browse operation file after decoder module decryption, and recorded by the access of monitoring module monitors user, limited by administrator module
The access of abnormal user processed, the security information of enterprise is effectively protected, reduces risk of divulging a secret, prevent information leakage from causing to damage
Lose.
In order to solve the above technical problems, the present invention is achieved by the following technical solutions:
The present invention is a kind of certification decoding security management system for encrypting database, including for adding to classified document
Close encrypting database;
The authentication module of the user right of database is accessed for certification;The authentication module by account log in unit and
Short-message verification unit verifies user right;
For the decoder module to encryption file decryption;The decoder module will be transferred to access use after encrypting file decryption
Family browses;
For monitoring the monitoring modular of authentication module operation;The monitoring modular includes recording unit and alarm unit;Institute
State the authentication record that recording unit is used for record access user;The alarm unit is used to send police in unauthorized users to access
Report;
For managing encrypted database and the administrator module of authentication module;The administrator module is stepped on by keeper
Record module verification administrator right.
Further, the encrypting database is carried out all files being stored in encrypting database by AES
Encryption.
Further, the authentication module is used for the file browsed in encrypting database for limiting disabled user;
Wherein, the account logs in the access and operation that unit is used to shield non-registered users;
Wherein, the short-message verification unit is used for after account number cipher loss by the temporary visit of short-message verification unit and kept away
Exempt from the unauthorized access after account number cipher is stolen.
Further, the monitoring modular is used for the running situation for monitoring authentication module, passes through recording unit records user
Access situation, and alarm is sent by alarm unit when abnormal access occurs;
Wherein, the access record in recording unit records 30 days, and real-time Transmission is to administrator module;
Wherein, the alarm unit sends alarm after account logs in 3 login failures of unit, and record is transmitted to pipe
Reason person's module, keeper is reminded to pay close attention to the access situation of the account.
Further, the decoder module supports the use with AES, when encrypting database changes AES, institute
State decoder module while change corresponding decipherment algorithm.
Further, the administrator module is used for the operation of managing encrypted database and authentication module, the management
Member's module is verified by keeper's login module authentic administrator authority, keeper's login module using fingerprint authentication module
Log in;The administrator module can change the AES of encrypting database, and the certification list of authentication module, and root
According to the access of the record limitation abnormal user of monitoring modular.
The invention has the advantages that:
The present invention is by setting AES to be encrypted for database file, by authentication module certification user right,
Browse operation file after could being decrypted by user after checking by decoder module, and pass through the access of monitoring module monitors user
Record, the access of abnormal user is limited by administrator module, the security information of enterprise is effectively protected, reduces wind of divulging a secret
Danger, prevents information leakage from causing damage.
Certainly, any product for implementing the present invention it is not absolutely required to reach all the above advantage simultaneously.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, used required for being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is a kind of system block diagram of certification decoding security management system for encrypting database.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained all other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Referring to shown in Fig. 1, the present invention is a kind of certification decoding security management system for encrypting database, including with
In the encrypting database encrypted to classified document;
The authentication module of the user right of database is accessed for certification;Authentication module logs in unit and short message by account
Authentication unit verifies user right;
For the decoder module to encryption file decryption;Decoder module will encrypt file decryption after be transferred to access user it is clear
Look at;
For monitoring the monitoring modular of authentication module operation;Monitoring modular includes recording unit and alarm unit;Record
Member is used for the authentication record of record access user;Alarm unit is used to send alarm in unauthorized users to access;
For managing encrypted database and the administrator module of authentication module;Administrator module logs in mould by keeper
Block authentic administrator authority.
Wherein, all files being stored in encrypting database are encrypted by AES for encrypting database.
Wherein, authentication module is used for the file browsed in encrypting database for limiting disabled user;
Wherein, account logs in the access and operation that unit is used to shield non-registered users;
Wherein, short-message verification unit is used for after account number cipher loss by the temporary visit of short-message verification unit and avoids account
Unauthorized access after number password is stolen.
Wherein, monitoring modular is used for the running situation for monitoring authentication module, and situation is accessed by recording unit records user,
And alarm is sent by alarm unit when abnormal access occurs;
Wherein, the access record in recording unit records 30 days, and real-time Transmission is to administrator module;
Wherein, alarm unit sends alarm after account logs in 3 login failures of unit, and record is transmitted to keeper
Module, keeper is reminded to pay close attention to the access situation of the account.
Wherein, decoder module supports the use with AES, and when encrypting database changes AES, decoder module is same
The corresponding decipherment algorithms of Shi Genghuan.
Wherein, administrator module is used for the operation of managing encrypted database and authentication module, and administrator module passes through pipe
Reason person's login module authentic administrator authority, keeper's login module are logged in using fingerprint authentication module checking;Administrator module
The AES of encrypting database, and the certification list of authentication module can be changed, and is limited according to the record of monitoring modular
The access of abnormal user processed.
In the description of this specification, the description of reference term " one embodiment ", " example ", " specific example " etc. means
At least one implementation of the present invention is contained in reference to specific features, structure, material or the feature that the embodiment or example describe
In example or example.In this manual, identical embodiment or example are not necessarily referring to the schematic representation of above-mentioned term.
Moreover, specific features, structure, material or the feature of description can close in any one or more embodiments or example
Suitable mode combines.
Present invention disclosed above preferred embodiment is only intended to help and illustrates the present invention.Preferred embodiment is not detailed
All details are described, it is only described embodiment also not limit the invention.Obviously, according to the content of this specification,
It can make many modifications and variations.This specification is chosen and specifically describes these embodiments, is to preferably explain the present invention
Principle and practical application so that skilled artisan can be best understood by and utilize the present invention.The present invention is only
Limited by claims and its four corner and equivalent.
Claims (6)
- A kind of 1. certification decoding security management system for encrypting database, it is characterised in that:Including:For the encrypting database encrypted to classified document;The authentication module of the user right of database is accessed for certification;The authentication module logs in unit and short message by account Authentication unit verifies user right;For the decoder module to encryption file decryption;The decoder module will encrypt file decryption after be transferred to access user it is clear Look at;For monitoring the monitoring modular of authentication module operation;The monitoring modular includes recording unit and alarm unit;The note Record the authentication record that unit is used for record access user;The alarm unit is used to send alarm in unauthorized users to access;For managing encrypted database and the administrator module of authentication module;The administrator module logs in mould by keeper Block authentic administrator authority.
- A kind of 2. certification decoding security management system for encrypting database according to claim 1, it is characterised in that All files being stored in encrypting database are encrypted by AES for the encrypting database.
- A kind of 3. certification decoding security management system for encrypting database according to claim 1, it is characterised in that The authentication module is used for the file browsed in encrypting database for limiting disabled user;Wherein, the account logs in the access and operation that unit is used to shield non-registered users;Wherein, the short-message verification unit is used for after account number cipher loss by the temporary visit of short-message verification unit and avoids account Unauthorized access after number password is stolen.
- A kind of 4. certification decoding security management system for encrypting database according to claim 1, it is characterised in that The monitoring modular is used for the running situation for monitoring authentication module, accesses situation by recording unit records user, and occurring Alarm is sent by alarm unit during abnormal access;Wherein, the access record in recording unit records 30 days, and real-time Transmission is to administrator module;Wherein, the alarm unit sends alarm after account logs in 3 login failures of unit, and record is transmitted to keeper Module, keeper is reminded to pay close attention to the access situation of the account.
- A kind of 5. certification decoding security management system for encrypting database according to claim 1, it is characterised in that The decoder module supports the use with AES.
- A kind of 6. certification decoding security management system for encrypting database according to claim 1, it is characterised in that The administrator module is used for the operation of managing encrypted database and authentication module, and the administrator module is stepped on by keeper Module verification administrator right is recorded, keeper's login module is logged in using fingerprint authentication module checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710786526.0A CN107563221A (en) | 2017-09-04 | 2017-09-04 | A kind of certification decoding security management system for encrypting database |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710786526.0A CN107563221A (en) | 2017-09-04 | 2017-09-04 | A kind of certification decoding security management system for encrypting database |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107563221A true CN107563221A (en) | 2018-01-09 |
Family
ID=60979061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710786526.0A Pending CN107563221A (en) | 2017-09-04 | 2017-09-04 | A kind of certification decoding security management system for encrypting database |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563221A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111163087A (en) * | 2019-12-30 | 2020-05-15 | 南宁一站网网络技术有限公司 | Database safety protection system based on data acquisition |
CN111491023A (en) * | 2020-04-10 | 2020-08-04 | 西咸新区予果微码生物科技有限公司 | Microbial detection system based on CRISPR technology |
CN112199700A (en) * | 2020-10-14 | 2021-01-08 | 北京理工大学 | Safety management method and system for MES data system |
CN116127510A (en) * | 2023-01-10 | 2023-05-16 | 广州集联信息技术有限公司 | Encryption communication system of internet of things data |
CN116232577A (en) * | 2023-01-09 | 2023-06-06 | 江苏恒德网络科技有限公司 | Firewall application structure of enterprise management software |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102299920A (en) * | 2011-08-01 | 2011-12-28 | 句容市盛世软件有限公司 | Electronic document safety management system |
CN102799831A (en) * | 2012-08-28 | 2012-11-28 | 无锡华御信息技术有限公司 | Information safety protection system of application system based on database and information safety protection method |
CN103312518A (en) * | 2013-06-28 | 2013-09-18 | 宁夏新航信息科技有限公司 | Security management method for database information |
CN103455763A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet surfing log recording system and method capable of protecting personal privacies of users |
CN103916254A (en) * | 2012-12-29 | 2014-07-09 | 中国移动通信集团黑龙江有限公司 | Analysis method and system for dynamic authentication behavior |
CN105468939A (en) * | 2015-11-24 | 2016-04-06 | 苏州铭冠软件科技有限公司 | Safety protection system of mobile terminal |
CN105610671A (en) * | 2016-01-11 | 2016-05-25 | 北京奇虎科技有限公司 | Terminal data protection method and device |
CN106203168A (en) * | 2016-07-06 | 2016-12-07 | 杨炳 | Database security accesses system |
-
2017
- 2017-09-04 CN CN201710786526.0A patent/CN107563221A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102299920A (en) * | 2011-08-01 | 2011-12-28 | 句容市盛世软件有限公司 | Electronic document safety management system |
CN102799831A (en) * | 2012-08-28 | 2012-11-28 | 无锡华御信息技术有限公司 | Information safety protection system of application system based on database and information safety protection method |
CN103916254A (en) * | 2012-12-29 | 2014-07-09 | 中国移动通信集团黑龙江有限公司 | Analysis method and system for dynamic authentication behavior |
CN103312518A (en) * | 2013-06-28 | 2013-09-18 | 宁夏新航信息科技有限公司 | Security management method for database information |
CN103455763A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet surfing log recording system and method capable of protecting personal privacies of users |
CN105468939A (en) * | 2015-11-24 | 2016-04-06 | 苏州铭冠软件科技有限公司 | Safety protection system of mobile terminal |
CN105610671A (en) * | 2016-01-11 | 2016-05-25 | 北京奇虎科技有限公司 | Terminal data protection method and device |
CN106203168A (en) * | 2016-07-06 | 2016-12-07 | 杨炳 | Database security accesses system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111163087A (en) * | 2019-12-30 | 2020-05-15 | 南宁一站网网络技术有限公司 | Database safety protection system based on data acquisition |
CN111163087B (en) * | 2019-12-30 | 2020-08-21 | 南宁一站网网络技术有限公司 | Database safety protection system based on data acquisition |
CN111491023A (en) * | 2020-04-10 | 2020-08-04 | 西咸新区予果微码生物科技有限公司 | Microbial detection system based on CRISPR technology |
CN112199700A (en) * | 2020-10-14 | 2021-01-08 | 北京理工大学 | Safety management method and system for MES data system |
CN112199700B (en) * | 2020-10-14 | 2022-07-19 | 北京理工大学 | Safety management method and system for MES data system |
CN116232577A (en) * | 2023-01-09 | 2023-06-06 | 江苏恒德网络科技有限公司 | Firewall application structure of enterprise management software |
CN116232577B (en) * | 2023-01-09 | 2024-03-08 | 天翼安全科技有限公司 | Firewall application structure of enterprise management software |
CN116127510A (en) * | 2023-01-10 | 2023-05-16 | 广州集联信息技术有限公司 | Encryption communication system of internet of things data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7295068B2 (en) | Federated key management | |
KR102055116B1 (en) | Data security service | |
CN107563221A (en) | A kind of certification decoding security management system for encrypting database | |
US7895452B2 (en) | Technique for protecting a database from an ongoing threat | |
CN101923678A (en) | Data security protection method of enterprise management software | |
CN101098224B (en) | Method for encrypting/deciphering dynamically data file | |
WO2002023797A1 (en) | System for establishing an audit trail to protect objects distributed over a network | |
CN105740725A (en) | File protection method and system | |
CN102299920A (en) | Electronic document safety management system | |
CN104219077A (en) | Information management system for middle and small-sized enterprises | |
CN104376270A (en) | File protection method and system | |
CN109495488A (en) | A kind of safety defense method and system based on Cookie encryption | |
Patil Madhubala | Survey on security concerns in Cloud computing | |
CN117040741A (en) | Method and device for safely transmitting data based on FTTR networking mode | |
CN101197822B (en) | System for preventing information leakage and method based on the same | |
CN106685912A (en) | Secure access method of application system | |
Min et al. | Practices of agile manufacturing enterprise data security and software protection | |
CN110933042B (en) | Data security messenger method and system suitable for alliance chain | |
Wang et al. | MobileGuardian: A security policy enforcement framework for mobile devices | |
CN100594484C (en) | Web site server system | |
CN111683042A (en) | Power grid data safety communication transmission system and method | |
CN112769784A (en) | Text processing method and device, computer readable storage medium and processor | |
CN113407984A (en) | System and method for providing security protection for database | |
Zhang et al. | Application strategy of data encryption technology in computer network security | |
CN111079154A (en) | Kernel reinforcing system for protecting kernel of operating system from being damaged by external program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |
|
RJ01 | Rejection of invention patent application after publication |