CN108924101A - A kind of operating method and relevant device of database - Google Patents

A kind of operating method and relevant device of database Download PDF

Info

Publication number
CN108924101A
CN108924101A CN201810638923.8A CN201810638923A CN108924101A CN 108924101 A CN108924101 A CN 108924101A CN 201810638923 A CN201810638923 A CN 201810638923A CN 108924101 A CN108924101 A CN 108924101A
Authority
CN
China
Prior art keywords
server
database
gateway
operation requests
new logo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810638923.8A
Other languages
Chinese (zh)
Inventor
马东辉
周俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Information Technology Co Ltd
Original Assignee
Beijing CHJ Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Information Technology Co Ltd filed Critical Beijing CHJ Information Technology Co Ltd
Priority to CN201810638923.8A priority Critical patent/CN108924101A/en
Publication of CN108924101A publication Critical patent/CN108924101A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/133Protocols for remote procedure calls [RPC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides the operating method and relevant device of a kind of database, and method includes:The operation requests for carrying certification mark that client is sent are received, operation requests are used to request to carry out object run to the database of server-side;Certification mark is authenticated by the gateway of server-side;In the case where gateway passes through certification ID authentication, object run is carried out to the database of server-side.In the disclosure, the mark of certification entrained by the operation requests sent by gateway to client authenticates, and when certification passes through the requested operation of operation requests could be carried out to database, database is reduced by the risk of illegal operation, promotes the safety of database.

Description

A kind of operating method and relevant device of database
Technical field
This disclosure relates to the operating method and relevant device of database processing technical field more particularly to a kind of database.
Background technique
With the rapid development of network application, requirement of the people to the correctness and timeliness for obtaining information is also increasingly It is high.Database (Database, DB) is the warehouse for coming tissue, storage and management data according to data structure, it has also become is deposited at present The means of data, retrieval information convenience and high-efficiency the most are stored up, most enterprises all store information in database.Therefore, number It is most important according to the safety in library.
User can send operation requests to server by client (such as browser), to realize in database Data are read out data, write data, update or modification data or deletion data, etc..But due to by network security It influences, is easy to happen the illegal invasion person user end to server that disguises oneself as and sends operation requests, and cause to the number in database According to the event for carrying out illegal operation, so that the safety to database brings risk.
As it can be seen that presently, there are the data because being easy to happen database in server by the event of illegal operation, and cause to count According to the low problem of the safety in library.
Summary of the invention
The disclosure provides the operating method and relevant device of a kind of database, and to solve, presently, there are because frequently servicing The data of database are by the event of illegal operation in device, and the problem for causing the safety of database low.
In order to solve the above technical problems, the invention is realized in this way:
In a first aspect, the embodiment of the present disclosure provides a kind of operating method of database, it is applied to server-side, including:
The operation requests for carrying certification mark that client is sent are received, the operation requests are for requesting to the clothes The database at business end carries out object run;
Certification mark is authenticated by the gateway of the server-side;
In the case where the gateway passes through the certification ID authentication, described in the database progress to the server-side Object run.
In some embodiments, the certification mark includes default mark and the first more new logo;
After the step of gateway by the server-side authenticates certification mark, further include:
By the gateway to the client send the second more new logo, wherein the described second more new logo with it is described First more new logo is different;And described second more new logo be used for:It is replaced at the operation requests that the client is sent next time Change the described first more new logo.
In some embodiments, the described first more new logo and second update are identified as what the gateway generated at random Random code.
In some embodiments, the gateway by the server-side to the certification mark authenticate the step of it Before, further include:
The security level of the corresponding data of the object run is obtained by the gateway;
The step of gateway by the server-side authenticates certification mark, including:
In the case where the security level of the corresponding data of the object run is more than or equal to pre-set level, pass through institute Gateway is stated respectively to authenticate the default mark and the described first more new logo;
In the case where the security level of the corresponding data of the object run is less than the pre-set level, pass through the net Pass authenticates the default mark.
In some embodiments, before the step of database to the server-side carries out the object run, also Including:
In the case where the gateway passes through the certification ID authentication, the operation requests are obtained by the gateway Permissions data;
The permission of the object run is determined based on the permissions data;
The step of database to the server-side carries out the object run, including:
In the case where determining that the permission of the object run meets preset condition, the database of the server-side is carried out The object run.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
In some embodiments, the step of database to the server-side carries out the object run include:
The object run is carried out to the database by structured query language.
Second aspect, the embodiment of the present disclosure also provide a kind of operating method of database, are applied to client, and feature exists In, including:
The operation requests for carrying certification mark are sent to server-side, so that the server-side is recognized to certification mark In the case that card passes through, the requested object run of operation requests is carried out to the database of the server-side.
In some embodiments, the certification mark includes default mark and the first more new logo;
After described the step of sending the operation requests for carrying certification mark to server-side, further include:
Receive the second more new logo that the gateway of the server-side is sent;Wherein, the described second more new logo is used for:Institute The described first more new logo is replaced when stating the operation requests that client is sent next time.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
The third aspect, the embodiment of the present invention also provide a kind of server-side, including:
Receiving module, for receiving the operation requests for carrying certification mark of client transmission, the operation requests are used Object run is carried out in database of the request to the server-side;
Authentication module authenticates certification mark for the gateway by the server-side;
Processing module, in the case where the gateway passes through the certification ID authentication, to the server-side Database carries out the object run.
In some embodiments, the certification mark includes default mark and the first more new logo;
The server-side further includes:
Sending module, for sending the second more new logo to the client by the gateway, wherein described second more New logo is different from the described first more new logo;And described second more new logo be used for:It is sent next time in the client The described first more new logo is replaced when operation requests.
Fourth aspect, the embodiment of the present disclosure also provide a kind of client, including:
Sending module, for sending the operation requests for carrying certification mark to server-side, so that the server-side is right In the case that the certification ID authentication passes through, the requested target of operation requests is carried out to the database of the server-side Operation.
In some embodiments, the certification mark includes default mark and the first more new logo;
The client further includes:
Receiving module, the second more new logo that the gateway for receiving the server-side is sent;Wherein, described second updates Mark is used for:The described first more new logo is replaced at the operation requests that the client is sent next time.
5th aspect, the embodiment of the present disclosure also provide a kind of server device, including processor, memory and are stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing the operating method of database performed by above-mentioned server-side.
6th aspect, the embodiment of the present disclosure also provide a kind of client device, including processor, memory and are stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing the operating method of database performed by above-mentioned client.
7th aspect, the embodiment of the present disclosure also provide a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program realizes the operating method of above-mentioned database when being executed by processor The step of.
In the disclosure, the operation requests for carrying certification mark sent by receiving client, operation requests are for asking It asks and object run is carried out to the database of server-side;Certification mark is authenticated by the gateway of server-side;In gateway to recognizing In the case that card ID authentication passes through, object run is carried out to the database of server-side.In this way, being sent by gateway to client Operation requests entrained by certification mark authenticated, and when certification passes through could to database carry out operation requests be asked The operation asked reduces database by the risk of illegal operation, promotes the safety of database.
Detailed description of the invention
It, below will be in embodiment of the disclosure description in order to illustrate more clearly of the technical solution of embodiment of the disclosure Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the disclosure Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is the flow diagram of the operating method for the database that first embodiment provides;
Fig. 2 is the flow diagram of the operating method for the database that second embodiment provides;
Fig. 3 is one of the structural schematic diagram of server-side that 3rd embodiment provides;
Fig. 4 is the second structural representation for the server-side that 3rd embodiment provides;
Fig. 5 is the third structural representation for the server-side that 3rd embodiment provides;
Fig. 6 is the four of the structural schematic diagram for the server-side that 3rd embodiment provides;
Fig. 7 is one of the structural schematic diagram of client that fourth embodiment provides;
Fig. 8 is the second structural representation for the client that fourth embodiment provides;
Fig. 9 is the hardware structural diagram for the server device that the 5th embodiment provides;
Figure 10 is the hardware structural diagram for the client device that sixth embodiment provides;
Figure 11 is the flow diagram of the operating method for the database that the 7th embodiment provides.
Specific embodiment
Below in conjunction with the attached drawing in embodiment of the disclosure, the technical solution in embodiment of the disclosure is carried out clear Chu is fully described by, it is clear that described embodiment is embodiment of the disclosure a part of the embodiment, rather than whole realities Apply example.Based on the embodiment in embodiment of the disclosure, those of ordinary skill in the art are not making creative work premise Lower acquired every other embodiment, belongs to the range of embodiment of the disclosure protection.
First embodiment
As shown in Figure 1, a kind of operating method of database, includes the following steps:
Step 101 receives the operation requests for carrying certification mark that client is sent, and operation requests are for requesting to clothes The database at business end carries out object run;
Step 102 authenticates certification mark by the gateway of server-side;
Step 103, in the case where gateway passes through certification ID authentication, target behaviour is carried out to the database of server-side Make.
It, in a step 101, can be in visitor when user needs to carry out object run to database in the embodiment of the present disclosure The browser etc. at family end is input operation instruction, and when client receives the operational order of user's input, is sent out to the gateway of server It send and is requested with the operational order respective operations of user's input, and carry certification mark in the operation requests.
Wherein, above-mentioned server-side receives client and sends operation requests, can be server-side reception client and passes through transmission The operation requests that control protocol (Transmission Control Protocol, TCP) is sent to server-side;Alternatively, can also be with It is the operation requests that server-side receives that client passes through remote procedure call (Remote Procedure Call, RPC) transmission, Etc..
Due in the prior art, when client sends operation requests to server-side, it usually needs fixed network message lattice Formula, and database (such as MySQL database, SQLServer database and the oracle database of different types of server-side Deng) workable for network message format usually have differences, the versatility so as to cause the database of server-side is poor.
And hypertext transfer protocol (Hyper Text Transfer Protocol, HTTP) or security socket layer are super Text transfer protocol (Hyper Text Transfer Protocol over Secure Socket Layer, HTTPS) is mutual The network protocol being most widely used in networking may be implemented general in different types of database.Thus, in this public affairs It opens in some embodiments, aforesaid operations request is the HTTP request based on hypertext transfer protocol HTTP, or is based on condom The HTTPS request of word layer Hyper text transfer HTTPS agreement is connect, i.e. above-mentioned steps 101 are to receive client to pass through the HTTP of agreement The operation requests that agreement or HTTPS agreement carry out, can receive visitor so as to promote the database of all types of server-sides The operation requests that family end is sent, promote the versatility of different types of database;Meanwhile http protocol or HTTPS agreement have Higher data transmission security, so as to further promoted server-side database safety.
And when aforesaid operations request is HTTP request or HTTPS request, the mark of certification entrained by operation requests is matched It is placed in HTTP text or HTTPS text, is usually the head position for being configured in HTTP text or HTTPS text, in this way To enable gateway to read certification mark at first when receiving HTTP text or HTTPS text.Certainly, above-mentioned certification mark Know the other positions for being also possible to be configured in HTTP text or HTTPS text, is not defined herein.
It is above-mentioned will certification mark be configured at the head position of HTTP text or HTTPS text when, can be client makes Ciphertext is calculated with the collision algorithm of agreement, and the ciphertext being calculated is added in HTTP text or HTTPS text, to make The certification of HTTP text or the configuration in HTTPS text mark is not easy to be acquired in transmission process, further promotes data The safety in library.
In addition, aforesaid operations request can be any operation that can be carried out to the data in the database of server-side, example Such as:Object run can be the increase for the library in database, table, row or column, carried out to data, deletion, modify, look into It looks for, sort, the operation such as duplicate removal or comparison, then optionally, the operation requests are used for the library in the database, table, row Perhaps column increased, deleted, being modified, being searched, being sorted, duplicate removal or the request compared, to promote client to database The operation that can be carried out.
It should be noted that above-mentioned certification mark can be any gateway that can be used in server-side and recognize client The mark of card can be at least one of field, symbol or icon etc.;And certification mark can be fixed mark Know, such as:Certification be identified as gateway receive for the first time client initiation mark application request when, gateway responds the mark application Request configures unique constant mark for the client;Alternatively, certification mark is also possible to variable mark, such as:Gateway After the operation requests for receiving client transmission every time, certification is sent to client and is identified, and adjacent send twice Certification be identified as different certification marks;Alternatively, certification mark is also possible to by fixed mark and variable mark group At mark, be not defined herein.
Such as:The head position that certification mark is configured in HTTP text can be as follows:
gwsign:Sign=% unique identification %;Hsign=md5 (% unique identification %+' n'+% random number %+'% Uri%');
Wherein, gwsign is that the first place http claims;
% unique identification % is the unique identification that gateway generates;
Md5 is one-way hash function (hash) function;
% random number % is the random number for last time gateway being requested to generate;
%uri% is the uniform resource identifier of service request;
Therefore, the unique identification (i.e. fixed mark) and last time request gateway that above-mentioned certification mark is generated by gateway generate Random number (i.e. variable mark) composition.
In the embodiment of the present disclosure, in above-mentioned steps 102, when server-side receives operation requests, the gateway of server-side is obtained Entrained certification mark in extract operation request, and certification mark is authenticated by identifying algorithm, passed through with obtaining certification Or the authentication result of authentification failure can be operated to keep gateway stringent to the certification of certification mark and complexity with accurate judgement Whether request is illegal operation request, to promote the safety of the database of server-side.
By taking certification mark is configured in the head position of HTTP text as an example, when gateway receives operation requests, first Whether verifying unique identification is legal and meets verifying authorization (whether the physical address that unique identification corresponds to client is legal), if at Function continues to verify collision algorithm, is calculated using identical algorithm, whether the plaintext for comparing random number is consistent, then verifies industry Business request operation whether permission is legal, and unique identification authenticate successfully, random number plain text comparison unanimously and service request permission In the case where legal, the authentication result that certification passes through is obtained;And in the ungratified situation of any of the above-described condition, it obtains certification and loses The authentication result lost.
And in some embodiments, certification mark includes default mark and the first more new logo;
After above-mentioned steps 102, further include:
The second more new logo is sent to client by gateway, wherein the second more new logo is different from the first more new logo; And second the more new logo operation requests that are used to sent next time in client replace the first more new logo.
Wherein, for client when sending operation requests to server-side next time, client will be entrained by the operation requests The first more new logo in certification mark replaces with the second more new logo, i.e., the certification operation requests sent next time entrained by Mark includes default mark and the second more new logo, when gateway receives the operation requests that client is sent next time, to pre- Bidding is known and the second more new logo is authenticated, and authenticates in the case where passing through in default mark and the second more new logo, Database is operated.
In this way, since the certification mark that client is sent includes default mark and more new logo, when gateway receives client When holding each operation requests sent, need simultaneously respectively to default mark and more new logo entrained in each operation requests It is verified, and in the case where presetting mark and more new logo all meets verification condition, executes subsequent step, therefore, gateway It is more stringent for the certification of client, and there is no associations for the authentication result of the different operation of same client request Property, further promote the safety of database.
Such as:The adjacent operation requests twice sent in client to server-side, i.e., in operation requests 1 and operation requests 2, Operation requests 1 carry default mark and more new logo 1, and operation requests 2 carry default mark and more new logo 2, if gateway Default mark and more new logo 1 are authenticated and passed through when receiving operation requests 1, and when receiving operation requests 2 to pre- Bidding is known and more new logo 2 authenticates and passes through, then server-side carries out the requested operation of operation requests 1 and operation to database Request 2 requested operations;If gateway authenticates and passes through to default mark and more new logo 1 when receiving operation requests 1, with And the default ID authentication in operation requests 2 is passed through but more 2 authentification failure of new logo, then server-side operates database 1 requested operation is requested, without executing to the requested operation of operation requests 2.
It should be noted that above-mentioned gateway sends the second more new logo to client, gateway confirmation certification mark can be Certification passes through, and database executes after carrying out object run to the corresponding data of operation requests, and database returns implementing result Gateway is returned to, after gateway carries out unified format, and the second more new logo and implementing result are returned into client together.
In addition, above-mentioned default mark can be gateway in advance and be the mark of the fixation of client configuration;And above-mentioned first more New logo and the second update are identified as gateway and receive the variable mark generated after operation every time, such as:In gateway in advance The more new logo sequence including several different updates mark is stored with, and gateway is after receiving operation every time, according to more New logo sequence successively selects more new logo and sends to client, etc..
Alternatively, the first more new logo and the second update are identified as what gateway generated at random in some embodiments of the disclosure Random code.Here, the first more new logo and the second update are identified as the random code that gateway is generated by random algorithm, due to having Randomness makes do not have association between the first more new logo and the second more new logo completely, to further promote database Safety.
In the case that the mark of the certification entrained by the operation requests that client is sent includes default mark and more new logo, Since gateway is required to authenticate default mark and more new logo respectively every time, the computation complexity of server-side is caused to increase Add, therefore, in some embodiments of the disclosure, before identifying the step of authenticating to certification by the gateway of server-side, also Including:
The security level of the corresponding data of object run is obtained by gateway;
The step of certification mark is authenticated by the gateway of server-side, including:
In the case where the security level of the corresponding data of object run is more than or equal to pre-set level, pass through gateway point It is other that default mark and the first more new logo are authenticated;
In the case where the security level of the corresponding data of object run is less than pre-set level, by gateway to default mark It is authenticated.
Here, gateway can request received operation requests after the operation requests for receiving client transmission The security level of the data of operation is compared with pre-set level, and requests the security level of the data of operation in operation requests Less than pre-set level, that is, in the case that the data significance level operated is not high, gateway is only to certification entrained by operation requests Default mark in mark is authenticated, and so as to reduce the computation complexity of server-side, saves computing resource, and improve Data manipulation efficiency.
In the embodiment of the present disclosure, in upper step 103, if certification entrained by the operation requests that gateway sends client ID authentication passes through, then gateway parsing operation requests use counter structure query language (Structured Query Language, SQL) it is sent to correspondence database, database, which is executed, executes the requested operation of operation requests to corresponding data.
And since different clients have different operating rights for the data in database, such as:Client 1 is for number According to the operating right that the data in library have modification and search, and client 2 has the data of database and increases, deletes, repairs Change and therefore the operating right searched, etc. in some embodiments of the disclosure, carries out target to the database of server-side Before the step of operation, further include:
In the case where gateway passes through certification ID authentication, the permissions data of certification mark is obtained by gateway;
The permission of object run is determined based on permissions data;
The step of operation corresponding with operation requests is carried out to the database in server-side, including:
In the case where determining that the operating right of operation requests meets preset condition, target is carried out to the database of server-side Operation.
Here, in the case that certification ID authentication entrained by the operation requests in gateway to client passes through, gateway is also The permissions data of certification mark, parses the permissions data of operation requests entrained by available operation requests, to determine operation The permission of requested operation is requested, and in the case where the permission of the requested operation of operation requests meets preset condition, side Object run can be carried out to the database of server-side, further promote the safety of database.
Wherein, the above-mentioned permission that object run is determined based on permissions data, can be gateway will be entrained by operation requests Permissions data is compared with preset permissions data corresponding with client, and the permissions data of operation requests with it is preset When permissions data corresponding with client is compared successfully, determine that the permission of object run meets preset condition.
Such as:Client only has the data of database the operating right of modification and lookup, receives in server-side In the case where the operation requests that the client is sent, if gateway determines the permissions data that the operation requests that client is sent carry, For the permissions data searched data, then server-side searches the data of database;And if gateway determines client The permissions data that the operation requests of transmission carry, for the permissions data deleted data, then server-side refuses absolute data library Execute the requested operation of operation requests.
It should be noted that being to realize to carry out target to database by database manipulation language in above-mentioned steps 103 Operation, the database manipulation language can be any language that can be realized and carry out object run to database.In some implementations In example, the step of above-mentioned database to the server-side carries out object run, includes:
Object run is carried out to database by structured query language.
Here, by providing structured query language (Structured Query Language, SQL) execution mechanism, and When server operates database, database is operated by SQL, the SQL language of correspondence database can be executed Speech, thus for disparate databases (such as MySQL database, SQLServer database and oracle database) can be promoted Between dialectal difference compatibility.
After above-mentioned steps 102, can also include:Recognize entrained by the operation requests of client transmission if gateway determines In the case that the permission of the failure of card ID authentication or the requested operation of the operation requests is unsatisfactory for preset condition, server No longer execute any operation or server refuse absolute data library and executes the requested operation of the operation requests, herein not into Row limits.
The operating method of the database of the embodiment of the present disclosure, the behaviour for carrying certification mark sent by receiving client It requests, operation requests are used to request to carry out object run to the database of server-side;Certification is marked by the gateway of server-side Knowledge is authenticated;In the case where gateway passes through certification ID authentication, object run is carried out to the database of server-side.This Sample, the mark of certification entrained by the operation requests sent by gateway to client authenticate, and could when certification passes through The requested operation of operation requests is carried out to database, database is reduced by the risk of illegal operation, promotes the safety of database Property.
Second embodiment
As shown in Fig. 2, a kind of operating method of database, is applied to client, includes the following steps:
Step 201 sends the operation requests for carrying certification mark to server-side, so that server-side is to certification ID authentication In the case where, the requested object run of operation requests is carried out to the database of server-side.
In some embodiments, certification mark includes default mark and the first more new logo;
After above-mentioned steps 201, further include:
Receive the second more new logo that the gateway of server-side is sent;Wherein, the described second more new logo is used for:In the visitor The described first more new logo is replaced when the operation requests that family end is sent next time.
In some embodiments, operation requests are the HTTP request based on Hyper text transfer http protocol, or based on peace The HTTPS request of full socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
It should be noted that embodiment of the embodiment of the present disclosure as corresponding client in embodiment one, specific Embodiment may refer to the related description in embodiment one, and can reach identical beneficial effect, in order to avoid repeating to say Bright, details are not described herein again.
3rd embodiment
As shown in figure 3, a kind of server-side 300, including:
Receiving module 301, for receiving the operation requests for carrying certification mark of client transmission, the operation requests For requesting the database to the server-side to carry out object run;
Authentication module 302 authenticates certification mark for the gateway by the server-side;
Processing module 303, in the case where the gateway passes through the certification ID authentication, to the server-side Database carry out the object run.
In some embodiments, the certification mark includes default mark and the first more new logo;
As shown in figure 4, the server-side 300, further includes:
Sending module 304, for by the gateway to the client the second more new logo of transmission, wherein described the Two more new logos are different from the described first more new logo;And described second more new logo be used for:It is sent out next time in the client The described first more new logo is replaced when the operation requests sent.
In some embodiments, the described first more new logo and second update are identified as what the gateway generated at random Random code.
In some embodiments, as shown in figure 5, the server-side 300, further includes:
Security level obtains module 305, for obtaining the safety of the corresponding data of the object run by the gateway Rank;
The authentication module 302 is also used to be more than or equal in the security level of the corresponding data of the object run In the case where pre-set level, the default mark and the described first more new logo are authenticated respectively by the gateway;? In the case that the security level of the corresponding data of the object run is less than the pre-set level, by the gateway to described pre- Bidding, which is known, to be authenticated.
In some embodiments, as shown in fig. 6, the server-side 300, further includes:
Permissions data obtains module 306, for passing through in the case where the gateway passes through the certification ID authentication The gateway obtains the permissions data of the certification mark;
Permission determining module 307, for determining the permission of the object run based on the permissions data;
The processing module 303 is also used to determining the case where operating right of the operation requests meets preset condition Under, the object run is carried out to the database of the server-side.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
In some embodiments, the processing module 303, is also used to:
The object run is carried out to the database by structured query language.
It should be noted that above-mentioned server-side 300 can be any embodiment party in embodiment of the method in the embodiment of the present disclosure The server-side of formula, any embodiment of server-side can be by the above-mentioned server-side in the embodiment of the present disclosure in embodiment of the method 400 are realized, and reach identical beneficial effect, and to avoid repeating, details are not described herein again.
3rd embodiment
As shown in fig. 7, a kind of client 700, including:
Sending module 701, for sending the operation requests for carrying certification mark to server-side, so that the server-side exists In the case where passing through to the certification ID authentication, the requested mesh of operation requests is carried out to the database of the server-side Mark operation.
In some embodiments, the certification mark includes default mark and the first more new logo;
As shown in figure 8, the client 700, further includes:
Receiving module 702, the second more new logo that the gateway for receiving the server-side is sent;Wherein, described second More new logo is used for:The described first more new logo is replaced at the operation requests that the client is sent next time.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
It should be noted that above-mentioned client 700 can be any embodiment party in embodiment of the method in the embodiment of the present disclosure The client of formula, any embodiment of client can be by the above-mentioned client in the embodiment of the present disclosure in embodiment of the method 700 are realized, and reach identical beneficial effect, and to avoid repeating, details are not described herein again.
5th embodiment
As shown in figure 9, server device 900 includes memory 901, processor 902 and is stored on memory 901 and can The computer program run on processor 902;Processor 902 is realized when executing described program:
The operation requests for carrying certification mark that client is sent are received, the operation requests are for requesting to the clothes The database at business end carries out object run;
Certification mark is authenticated by the gateway of the server-side;
In the case where the gateway passes through the certification ID authentication, described in the database progress to the server-side Object run.
In Fig. 9, bus architecture may include the bus and bridge of any number of interconnection, specifically be represented by processor 902 One or more processors and the various circuits of memory that represent of memory 901 link together.Bus architecture can be with Various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like are linked together, these are all these Well known to field, therefore, it will not be further described herein.Bus interface provides interface.Processor 902 is responsible for pipe Bus architecture and common processing are managed, memory 901 can store the used data when executing operation of processor 902.
Optionally, processor 902 executes acquisition file corresponding with file request each in the hyperlink request, packet It includes:
In some embodiments, the certification mark includes default mark and the first more new logo;
Processor 902 also executes:
By the gateway to the client send the second more new logo, wherein the described second more new logo with it is described First more new logo is different;And described second more new logo be used for:It is replaced at the operation requests that the client is sent next time Change the described first more new logo.
In some embodiments, the described first more new logo and second update are identified as what the gateway generated at random Random code.
In some embodiments, processor 902 also executes:
The security level of the corresponding data of the object run is obtained by the gateway;
In the case where the security level of the corresponding data of the object run is more than or equal to pre-set level, pass through institute Gateway is stated respectively to authenticate the default mark and the described first more new logo;
In the case where the security level of the corresponding data of the object run is less than the pre-set level, pass through the net Pass authenticates the default mark.
In some embodiments, processor 902 also execute:
In the case where the gateway passes through the certification ID authentication, the operation requests are obtained by the gateway Permissions data;
The permission of the object run is determined based on the permissions data;
In the case where determining that the permission of the object run meets preset condition, the database of the server-side is carried out The object run.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
In some embodiments, processor 902 also execute:
The object run is carried out to the database by structured query language.
In addition, server device 900 further includes some unshowned functional modules, details are not described herein.
The server device 900 that embodiment of the disclosure provides can be realized server-side in the embodiment of the method for Fig. 1 and Fig. 2 The each process realized, and reach identical beneficial effect, to avoid repeating, which is not described herein again.
The server device 900 of embodiment of the disclosure, the behaviour for carrying certification mark sent by receiving client It requests, operation requests are used to request to carry out object run to the database of server-side;Certification is marked by the gateway of server-side Knowledge is authenticated;In the case where gateway passes through certification ID authentication, object run is carried out to the database of server-side.This Sample, the mark of certification entrained by the operation requests sent by gateway to client authenticate, and could when certification passes through The requested operation of operation requests is carried out to database, database is reduced by the risk of illegal operation, promotes the safety of database Property.
Embodiment of the disclosure also provides a kind of computer readable storage medium, is stored on computer readable storage medium Computer program, the computer program realize the operating method embodiment of database in above-mentioned Fig. 1 and Fig. 2 when being executed by processor Each process, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer can Storage medium is read, such as read-only memory (Read-OnlyMemory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
Sixth embodiment
As shown in Figure 10, client device 1000 including memory 1001, processor 1002 and is stored in memory 1001 Computer program that is upper and being run on processor 1002;Processor 1002 is realized when executing described program:
The operation requests for carrying certification mark are sent to server-side, so that the server-side is recognized to certification mark In the case that card passes through, the requested object run of operation requests is carried out to the database of the server-side.
In Figure 10, bus architecture may include the bus and bridge of any number of interconnection, specifically by 1002 generation of processor The various circuits for the memory that the one or more processors and memory 1001 of table represent link together.Bus architecture may be used also To link together various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like, these are all It is known in the art, therefore, it will not be further described herein.Bus interface provides interface.Processor 1002 is negative Duty management bus architecture and common processing, memory 1001 can store the used number when executing operation of processor 1002 According to.
In some embodiments, the certification mark includes default mark and the first more new logo;
Processor 1002 also executes:
Receive the second more new logo that the gateway of the server-side is sent;Wherein, the described second more new logo is used for:Institute The described first more new logo is replaced when stating the operation requests that client is sent next time.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
In addition, client device 1000 further includes some unshowned functional modules, details are not described herein.
The client device 1000 that embodiment of the disclosure provides can be realized client in the embodiment of the method for Fig. 1 and Fig. 2 Each process that end equipment is realized, and reach identical beneficial effect, to avoid repeating, which is not described herein again.
Embodiment of the disclosure also provides a kind of computer readable storage medium, is stored on computer readable storage medium Computer program, the computer program realize the operating method embodiment of database in above-mentioned Fig. 1 and Fig. 1 when being executed by processor Each process, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer can Storage medium is read, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
7th embodiment
As shown in figure 11, a kind of operating method of database, including:
Step 1101, client send the operation requests for carrying certification mark to server-side, and the operation requests are used for It requests to carry out object run to the database of the server-side;
Step 1102, server-side receive the operation requests for carrying certification mark that client is sent;
Step 1103, server-side authenticate certification mark by the gateway of the server-side;
Step 1104, server-side are in the case where the gateway passes through the certification ID authentication, to the server-side Database carry out the object run.
In some embodiments, the certification mark includes default mark and the first more new logo;
After the step of server-side authenticates certification mark by the gateway of the server-side, also wrap It includes:
Server-side sends the second more new logo to the client by the gateway, wherein the described second more new logo It is different from the described first more new logo;And described second more new logo be used for:It is asked in the operation that the client is sent next time The described first more new logo is replaced when asking.
In some embodiments, the described first more new logo and second update are identified as what the gateway generated at random Random code.
In some embodiments, the server-side authenticates the certification mark by the gateway of the server-side Before step, further include:
Server-side obtains the security level of the corresponding data of the object run by the gateway;
The step of server-side authenticates certification mark by the gateway of the server-side, including:
Server-side the security level of the corresponding data of the object run be more than or equal to pre-set level in the case where, The default mark and the described first more new logo are authenticated respectively by the gateway;
Server-side passes through in the case where the security level of the corresponding data of the object run is less than the pre-set level The gateway authenticates the default mark.
In some embodiments, the step of server-side carries out the object run to the database of the server-side it Before, further include:
Server-side obtains the behaviour in the case where the gateway passes through the certification ID authentication, through the gateway Make the permissions data requested;
Server-side determines the permission of the object run based on the permissions data;
The step of database to the server-side carries out the object run, including:
Server-side is in the case where the permission for determining the object run meets preset condition, to the data of the server-side Library carries out the object run.
In some embodiments, the operation requests are the HTTP request based on Hyper text transfer http protocol, Huo Zheji In the HTTPS request of security socket layer Hyper text transfer HTTPS agreement.
In some embodiments, the operation requests are used to increase the library in the database, table, row or column Add, delete, modifying, searching, sorting, duplicate removal or the request compared.
In some embodiments, the certification mark includes default mark and the first more new logo;
In some embodiments, the step of database to the server-side carries out the object run include:
The object run is carried out to the database by structured query language.
After the client sends the step of operation requests for carrying certification mark to server-side, further include:
Client receives the second more new logo that the gateway of the server-side is sent;Wherein, the described second more new logo is used In:The described first more new logo is replaced at the operation requests that the client is sent next time.
It should be noted that the operating method pair of the present embodiment and database in above-described embodiment one and above-described embodiment two It answers, therefore, may refer to the related description in above-described embodiment one and above-described embodiment two, and can achieve identical beneficial to effect Fruit.In order to avoid repeated explanation, details are not described herein.
In addition, the embodiment of the present disclosure also provides a kind of operating system of database, the operating system of the database includes upper State the client 700 in the server-side 300 and above-mentioned fourth embodiment in 3rd embodiment.Due to above-mentioned 3rd embodiment In for server-side 300 be described and above-mentioned fourth embodiment in client 700 has been described, in order to keep away Exempt from repeated explanation, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, the technical solution of embodiment of the disclosure is substantially in other words to existing The part for having technology to contribute can be embodied in the form of software products, which is stored in one and deposits In storage media (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal (it can be mobile phone, computer, Server device, air conditioner or network equipment etc.) execute method described in each embodiment of embodiment of the disclosure.
The above, the only specific embodiment of embodiment of the disclosure, but the protection scope of embodiment of the disclosure It is not limited thereto, anyone skilled in the art, can in the technical scope that embodiment of the disclosure discloses Change or replacement are readily occurred in, should all be covered within the protection scope of embodiment of the disclosure.Therefore, embodiment of the disclosure Protection scope should be subject to the protection scope in claims.

Claims (19)

1. a kind of operating method of database is applied to server-side, which is characterized in that including:
The operation requests for carrying certification mark that client is sent are received, the operation requests are for requesting to the server-side Database carry out object run;
Certification mark is authenticated by the gateway of the server-side;
In the case where the gateway passes through the certification ID authentication, the target is carried out to the database of the server-side Operation.
2. the method according to claim 1, wherein certification mark includes that default mark and first update mark Know;
After the step of gateway by the server-side authenticates certification mark, further include:
The second more new logo is sent to the client by the gateway, wherein the described second more new logo and described first More new logo is different;And described second more new logo be used for:Institute is replaced at the operation requests that the client is sent next time State the first more new logo.
3. according to the method described in claim 2, it is characterized in that, the described first more new logo and second update are identified as The random code that the gateway generates at random.
4. according to the method described in claim 2, it is characterized in that, the gateway by the server-side marks the certification Before the step of knowledge is authenticated, further include:
The security level of the corresponding data of the object run is obtained by the gateway;
The step of gateway by the server-side authenticates certification mark, including:
In the case where the security level of the corresponding data of the object run is more than or equal to pre-set level, pass through the net It closes and the default mark and the described first more new logo is authenticated respectively;
In the case where the security level of the corresponding data of the object run is less than the pre-set level, pass through the gateway pair The default mark is authenticated.
5. method according to claim 1 to 4, which is characterized in that the database to the server-side Before the step of carrying out the object run, further include:
In the case where the gateway passes through the certification ID authentication, the power of the operation requests is obtained by the gateway Limit data;
The permission of the object run is determined based on the permissions data;
The step of database to the server-side carries out the object run, including:
In the case where determining that the permission of the object run meets preset condition, described in the database progress to the server-side Object run.
6. method according to claim 1 to 4, which is characterized in that the operation requests are based on hypertext The HTTP request of transport protocol HTTP, or the HTTPS request based on security socket layer Hyper text transfer HTTPS agreement.
7. method according to claim 1 to 4, which is characterized in that the operation requests are used for the number According to the library in library, table, row or column, is increased, deleted, being modified, being searched, being sorted, duplicate removal or the request compared.
8. method according to claim 1 to 4, which is characterized in that the database to the server-side The step of carrying out the object run include:
The object run is carried out to the database by structured query language.
9. a kind of operating method of database is applied to client, which is characterized in that including:
The operation requests for carrying certification mark are sent to server-side, so that the server-side is logical to the certification ID authentication In the case where crossing, the requested object run of operation requests is carried out to the database of the server-side.
10. operating method according to claim 9, which is characterized in that the certification mark includes default mark and first More new logo;
After described the step of sending the operation requests for carrying certification mark to server-side, further include:
Receive the second more new logo that the gateway of the server-side is sent, wherein the described second more new logo is used for:In the visitor The described first more new logo is replaced when the operation requests that family end is sent next time.
11. according to method described in claim 9 or 10, which is characterized in that the operation requests are based on Hyper text transfer The HTTP request of http protocol, or the HTTPS request based on security socket layer Hyper text transfer HTTPS agreement.
12. according to method described in claim 9 or 10, which is characterized in that the operation requests are used for the database In library, table, row or column, increased, deleted, being modified, being searched, being sorted, duplicate removal or the request compared.
13. a kind of server-side, which is characterized in that including:
Receiving module, for receiving the operation requests for carrying certification mark of client transmission, the operation requests are for asking It asks and object run is carried out to the database of the server-side;
Authentication module authenticates certification mark for the gateway by the server-side;
Processing module, in the case where the gateway passes through the certification ID authentication, to the data of the server-side Library carries out the object run.
14. server-side according to claim 13, which is characterized in that the certification mark includes default identifies with first more New logo;
The server-side further includes:
Sending module, for sending the second more new logo to the client by the gateway, wherein described second updates mark Know different from the described first more new logo;And described second more new logo be used for:In the operation that the client is sent next time The described first more new logo is replaced when request.
15. a kind of client, which is characterized in that including:
Sending module, for sending the operation requests for carrying certification mark to server-side, so that the server-side is to described In the case that certification ID authentication passes through, the requested target of the operation requests is carried out to the database of the server-side and is grasped Make.
16. client according to claim 15, which is characterized in that the certification mark includes default identifies with first more New logo;
The client further includes:
Receiving module, the second more new logo that the gateway for receiving the server-side is sent;Wherein, the described second more new logo For:The described first more new logo is replaced at the operation requests that the client is sent next time.
17. a kind of server device, which is characterized in that including processor, memory and be stored on the memory and can be The computer program run on the processor realizes such as claim 1 when the computer program is executed by the processor To database described in any one of 8 operating method the step of.
18. a kind of client device, which is characterized in that including processor, memory and be stored on the memory and can be The computer program run on the processor realizes such as claim 9 when the computer program is executed by the processor To database described in any one of 12 operating method the step of.
19. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the behaviour of the database as described in any one of claims 1 to 12 when the computer program is executed by processor The step of making method.
CN201810638923.8A 2018-06-20 2018-06-20 A kind of operating method and relevant device of database Pending CN108924101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810638923.8A CN108924101A (en) 2018-06-20 2018-06-20 A kind of operating method and relevant device of database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810638923.8A CN108924101A (en) 2018-06-20 2018-06-20 A kind of operating method and relevant device of database

Publications (1)

Publication Number Publication Date
CN108924101A true CN108924101A (en) 2018-11-30

Family

ID=64420053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810638923.8A Pending CN108924101A (en) 2018-06-20 2018-06-20 A kind of operating method and relevant device of database

Country Status (1)

Country Link
CN (1) CN108924101A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071932A (en) * 2019-04-29 2019-07-30 云深互联(北京)科技有限公司 A kind of security access system and method
CN110457897A (en) * 2019-07-17 2019-11-15 福建龙田网络科技有限公司 A kind of database security detection method based on communication protocol and SQL syntax

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130893A (en) * 2010-01-18 2011-07-20 上海启电信息科技有限公司 Safety protection method and system for network accounts
CN103310161A (en) * 2012-03-14 2013-09-18 北京海泰方圆科技有限公司 Protection method and system for database system
CN104092652A (en) * 2013-12-25 2014-10-08 腾讯数码(天津)有限公司 Data processing system and method
CN104636920A (en) * 2015-02-06 2015-05-20 西安酷派软件科技有限公司 Data interaction method, equipment and system
US9043473B1 (en) * 2009-06-25 2015-05-26 Sprint Spectrum L.P. Methods and systems for authenticating a device with multiple network access identifiers
CN106656946A (en) * 2015-11-03 2017-05-10 东莞酷派软件技术有限公司 Dynamic authentication method and device
CN106850232A (en) * 2017-02-28 2017-06-13 南方电网科学研究院有限责任公司 Authorization management method and system that state keeps
CN106878264A (en) * 2016-12-21 2017-06-20 重庆华龙艾迪信息技术有限公司 A kind of data managing method and server
CN107682376A (en) * 2017-11-21 2018-02-09 北京顶象技术有限公司 Air control data interactive method and device
CN107968788A (en) * 2017-12-07 2018-04-27 湖州华科信息咨询有限公司 A kind of method and apparatus for working document safety management
CN108011862A (en) * 2016-10-31 2018-05-08 中兴通讯股份有限公司 The mandate of mirror image warehouse, access, management method and server and client side

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043473B1 (en) * 2009-06-25 2015-05-26 Sprint Spectrum L.P. Methods and systems for authenticating a device with multiple network access identifiers
CN102130893A (en) * 2010-01-18 2011-07-20 上海启电信息科技有限公司 Safety protection method and system for network accounts
CN103310161A (en) * 2012-03-14 2013-09-18 北京海泰方圆科技有限公司 Protection method and system for database system
CN104092652A (en) * 2013-12-25 2014-10-08 腾讯数码(天津)有限公司 Data processing system and method
CN104636920A (en) * 2015-02-06 2015-05-20 西安酷派软件科技有限公司 Data interaction method, equipment and system
CN106656946A (en) * 2015-11-03 2017-05-10 东莞酷派软件技术有限公司 Dynamic authentication method and device
CN108011862A (en) * 2016-10-31 2018-05-08 中兴通讯股份有限公司 The mandate of mirror image warehouse, access, management method and server and client side
CN106878264A (en) * 2016-12-21 2017-06-20 重庆华龙艾迪信息技术有限公司 A kind of data managing method and server
CN106850232A (en) * 2017-02-28 2017-06-13 南方电网科学研究院有限责任公司 Authorization management method and system that state keeps
CN107682376A (en) * 2017-11-21 2018-02-09 北京顶象技术有限公司 Air control data interactive method and device
CN107968788A (en) * 2017-12-07 2018-04-27 湖州华科信息咨询有限公司 A kind of method and apparatus for working document safety management

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071932A (en) * 2019-04-29 2019-07-30 云深互联(北京)科技有限公司 A kind of security access system and method
CN110071932B (en) * 2019-04-29 2021-10-08 云深互联(北京)科技有限公司 Safety access system and method
CN110457897A (en) * 2019-07-17 2019-11-15 福建龙田网络科技有限公司 A kind of database security detection method based on communication protocol and SQL syntax

Similar Documents

Publication Publication Date Title
US20200285978A1 (en) Model training system and method, and storage medium
US10055561B2 (en) Identity risk score generation and implementation
US10135796B2 (en) Masking and unmasking data over a network
CN103581363B (en) To malice domain name and the control method and device of unauthorized access
US8051484B2 (en) Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
CN106487744B (en) Shiro verification method based on Redis storage
US20120117644A1 (en) System and Method for Internet Security
CN109768992B (en) Webpage malicious scanning processing method and device, terminal device and readable storage medium
CN110753944B (en) System and method for blockchain-based data management
US11296881B2 (en) Using IP heuristics to protect access tokens from theft and replay
CN105119973B (en) User information processing method and server
US20110047610A1 (en) Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication
CN104396220A (en) Method and device for secure content retrieval
CA3032682C (en) Method for managing information using tree structure based on blockchain, server and terminal using the same
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
CN112118269A (en) Identity authentication method, system, computing equipment and readable storage medium
CN106911684A (en) A kind of method for authenticating and system
CN110175439A (en) User management method, device, equipment and computer readable storage medium
CN108924101A (en) A kind of operating method and relevant device of database
CN110443039A (en) Detection method, device and the electronic equipment of plug-in security
CN107493250A (en) A kind of method that web-page requests are authenticated, client and server
Shimamoto et al. Towards further formal foundation of web security: expression of temporal logic in Alloy and its application to a security model with cache
CN103701844B (en) The method and system of managing user information
CN114329611A (en) Permission management method, system and device applied to federal learning and electronic equipment
CN112784235B (en) Method for automatically distributing link tracking system permission based on CMDB project related information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130