CN109271809A - A kind of method, system and relevant apparatus that database is reinforced - Google Patents
A kind of method, system and relevant apparatus that database is reinforced Download PDFInfo
- Publication number
- CN109271809A CN109271809A CN201811468308.3A CN201811468308A CN109271809A CN 109271809 A CN109271809 A CN 109271809A CN 201811468308 A CN201811468308 A CN 201811468308A CN 109271809 A CN109271809 A CN 109271809A
- Authority
- CN
- China
- Prior art keywords
- database
- configuration information
- default
- knowledge base
- reinforced
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000003014 reinforcing effect Effects 0.000 claims abstract description 35
- 238000004422 calculation algorithm Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 7
- 238000013528 artificial neural network Methods 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims 1
- 230000002787 reinforcement Effects 0.000 abstract description 10
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 5
- 238000012550 audit Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000005034 decoration Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The method that a kind of database provided herein is reinforced, comprising: according to default assessment rule, the acquisition configuration information corresponding with default assessment rule from database;After judging the violation configuration information in configuration information, violation configuration information is matched with default knowledge base, obtains matching result;According to matching result, is obtained from default knowledge base and reinforce script;Execute the reinforcing for reinforcing script to complete database.It can be seen that, this method can obtain from default knowledge base and reinforce script, and then execute the reinforcing for reinforcing script to complete database, avoid relying on to obtain in specialized database technical staff and reinforce script, it can automate and carry out database reinforcement, and then improve working efficiency.The application also provides a kind of system, equipment and computer readable storage medium that database is reinforced, and all has above-mentioned beneficial effect.
Description
Technical field
This application involves database and information security field, in particular to method, system, equipment that a kind of database is reinforced
And computer readable storage medium.
Background technique
Data are the core assets of enterprise, and database is also the key foundation of information system, protect database safety and
Compliance avoids database from leaking, attacked and service disruption is that company information protects a particularly important content.Currently,
The method that database is reinforced is obtained dependent on specialized database technical staff and reinforces script, leads to not automation and carries out data
Library reinforcement, working efficiency are low.
Therefore, how to automate and carry out database reinforcement, and then improving working efficiency is those skilled in the art
Member's technical issues that need to address.
Summary of the invention
The purpose of the application is to provide a kind of method, system, equipment and computer readable storage medium that database is reinforced,
It can automate and carry out database reinforcement, and then improve working efficiency.
In order to solve the above technical problems, the application provides a kind of method that database is reinforced, comprising:
According to default assessment rule, acquired from database and the regular corresponding configuration information of the default assessment;
After judging the violation configuration information in the configuration information, by the violation configuration information and default knowledge base
It is matched, obtains matching result;
According to the matching result, is obtained from the default knowledge base and reinforce script;
The reinforcing script is executed to complete the reinforcing of the database.
Preferably, the default assessment rule of the basis, acquisition is corresponding with the default assessment rule from database matches
Confidence breath, comprising:
Obtain database compliance require information;
The database compliance require information is converted into the default assessment rule;
According to the default assessment rule, acquired from the database using regulation engine and the default assessment rule
Corresponding configuration information.
Preferably, described after judging the violation configuration information in the configuration information, by the violation configuration information
It is matched with default knowledge base, obtains matching result, comprising:
The configuration information is compared with the default assessment rule, utilizes the regulation engine and regular expression
Judge the violation configuration information in the configuration information;
The violation configuration information is matched with the default knowledge base, obtains the matching result.
Preferably, the method which reinforces further include:
The default knowledge base is updated using BP neural network algorithm.
The application also provides a kind of system that database is reinforced, comprising:
Configuration information acquisition module, for according to default assessment rule, acquisition to be advised with the default assessment from database
Then corresponding configuration information;
Information matches module, for after judging the violation configuration information in the configuration information, the violation to be matched
Confidence breath is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module, for being obtained from the default knowledge base and reinforcing script according to the matching result;
Script execution module is reinforced, for executing the reinforcing script to complete the reinforcing of the database.
Preferably, the configuration information acquisition module, comprising:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for the database compliance require information to be converted to the default assessment rule;
Configuration information acquisition unit, for regular according to the default assessment, from the database using regulation engine
It acquires and the regular corresponding configuration information of the default assessment.
Preferably, the information matches module, comprising:
Violation configuration information judging unit, for the configuration information to be compared with the default assessment rule, benefit
The violation configuration information in the configuration information is judged with the regulation engine and regular expression;
Information matching unit obtains described for matching the violation configuration information with the default knowledge base
Matching result.
Preferably, the system which reinforces further include:
Knowledge base update module, for being updated using BP neural network algorithm to the default knowledge base.
The application also provides a kind of equipment, comprising:
Memory and processor;Wherein, the memory is for storing computer program, and the processor is for executing institute
The step of method that database described above is reinforced is realized when stating computer program.
The application also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has computer
The step of program, the computer program realizes the method that database described above is reinforced when being executed by processor.
The method that a kind of database provided herein is reinforced, comprising: according to default assessment rule, adopted from database
Collect and the regular corresponding configuration information of the default assessment;It, will after judging the violation configuration information in the configuration information
The violation configuration information is matched with default knowledge base, obtains matching result;According to the matching result, preset from described
It is obtained in knowledge base and reinforces script;The reinforcing script is executed to complete the reinforcing of the database.
This method default assessment of basis before this is regular, acquisition and the regular corresponding configuration of the default assessment from database
Information, then after judging the violation configuration information in the configuration information, by the violation configuration information and default knowledge
Library is matched, and matching result is obtained, and further according to matching result, is obtained from the default knowledge base and is reinforced script, finally hold
Row is described to reinforce script to complete the reinforcing of the database.As it can be seen that this method can be obtained from default knowledge base reinforces script,
And then the reinforcing script is executed to complete the reinforcing of the database, it avoids relying on and adds in specialized database technical staff acquisition
Gu script can automate and carry out database reinforcement, and then improve working efficiency.The application also provides a kind of database and adds
Solid system, equipment and computer readable storage medium, all have above-mentioned beneficial effect, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart for the method that database is reinforced provided by the embodiment of the present application;
Fig. 2 is a kind of structural block diagram for the system that database is reinforced provided by the embodiment of the present application.
Specific embodiment
The core of the application is to provide a kind of method that database is reinforced, and can automate and carry out database reinforcement,
And then improve working efficiency.Another core of the application is to provide the system that a kind of database reinforces, equipment and computer-readable
Storage medium.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Data are the core assets of enterprise, and database is also the key foundation of information system, protect database safety and
Compliance avoids database from leaking, attacked and service disruption is that company information protects a particularly important content.Currently,
The method that database is reinforced is obtained dependent on specialized database technical staff and reinforces script, leads to not automation and carries out data
Library reinforcement, working efficiency are low.The embodiment of the present application, which can automate, carries out database reinforcement, and then improves work
Efficiency.Specifically referring to FIG. 1, Fig. 1 is a kind of flow chart for the method that database is reinforced, the number provided by the embodiment of the present application
It is specifically included according to the method that library reinforces:
S101, from database acquisition with default assessment rule corresponding configuration information regular according to default assessment;
Before this according to default assessment rule, acquisition is corresponding with default assessment rule from database matches the embodiment of the present application
Confidence breath, is not especially limited default assessment rule at this, should be made according to the actual situation by those skilled in the art corresponding
Setting.Since default assessment rule is not especially limited, therefore the configuration information acquired from database is also not especially limited,
But it need to guarantee that the configuration information of acquisition is corresponding with default assessment rule.For the sampling instrument of configuration information, herein
It is not especially limited, regulation engine can be used for example and acquire configuration information corresponding with default assessment rule from database.
In addition, being also not especially limited herein for the type of database, phase should be made according to the actual situation by those skilled in the art
The setting answered, database can be Oracle, SQL Server, MySQL, up to multiple mainstream vendor's databases such as dream database
Major version.
Further, the default assessment rule of above-mentioned basis, the acquisition configuration corresponding with default assessment rule from database
Information generally includes: obtaining database compliance require information;Database compliance require information is converted into default assessment rule
Then;According to default assessment rule, configuration information corresponding with default assessment rule is acquired from database using regulation engine.
Content of database compliance require information is not especially limited at this, it should be by those skilled in the art according to reality
Border situation makes corresponding setting, such as can be the requirement of database compliance or regulations.It is possible to further be supervised according to industry
Pipe wants summed data library application scenarios, and the specific requirement or regulations of input database compliance can satisfy user's special scenes
Compliance assess require.
For example, existing a set of oracle database for operating in the safe area II of electric power monitoring system, operation dispatching of power netwoks is certainly
Dynamicization main station system, need to according to the regulations such as National Energy Board and south electric network " electric power monitoring system safety protection technique specification " into
The compliance of row database is assessed and reinforcement.According to " electric power monitoring system safety protection technique specification ", database is pacified
The requirement of full compliance is as follows:
(1) the newest security patch of the database to timely update by test;
(2) to the database newly installed, the default password of all accounts of time update is answered;
(3) useless and permanent unused account is deleted in time;
(4) safe password policy is used, using 8 numbers above character mixed ciphers;
(5) secured account numbers strategy is used, authorizes corresponding permission on demand for different user accounts;
(6) reinforce database audits record, and inspect periodically database audits record;
(7) Runtime Library and development library should be separated in database.
In addition, user can be by the original text above code requirement of typing one by one in typing, it can also be by database professional technique people
Member's typing chief word, for example (1) article require can typing keyword " newest security patch " etc..
Above-mentioned that database compliance require information is converted to default assessment rule, i.e. the database by user's input closes rule
Property require and regulations be converted to the identifiable rule of system.Usual system uses regulation engine and regular expression, and user is defeated
The regulations and knowledge base keyword match entered, can also manually establish rule by database practitioner.
For example, the rule that the requirement of above-mentioned database security compliance can be exchanged into is respectively as follows:
(1) whether the newest security patch of installation database;
(2) default account whether uses default password;
(3) whether there is useless and permanent unused account;
(4) whether the password of all account numbers uses 8 numbers above character mixed ciphers;
(5) whether common account number has super authorities or the roles such as DBA, RESOURCE;
(6) database audits, newest audit logging content whether are enabled;
(7) it whether there is the account numbers, database object such as development library TEST, whether there is data completely of the same name under different account numbers
Library object.
Above according to default assessment rule, match corresponding with default assessment rule is acquired from database using regulation engine
Confidence breath specifically can be according to the compliance rule requirement that system is formed, acquisition database relevant configuration information.Default
It is the corresponding information collection script of every compliance rule match or program using regulation engine in knowledge base.
For example, corresponding information collection script or program are packaged and are executed, is worked as according to above-mentioned identified rule
Preceding database compliance configuration result.At this point, regulation engine is as shown in table 1, regulation engine table of comparisons when table 1 is information collection.
Regulation engine table of comparisons when 1 information collection of table
S102, after judging the violation configuration information in configuration information, by violation configuration information and default knowledge base into
Row matching, obtains matching result;
The embodiment of the present application is known after judging the violation configuration information in configuration information, by violation configuration information with default
Know library to be matched, obtains matching result.Content of default knowledge base is not especially limited at this, is generally included known mutual
It networks newest security breaches, patch, risk information, from industries compliance general specifications such as operator, finance, public security, electric power
It is required that the experience and expert's manual entry of previous successful item.It is possible to further secondary according to successfully reference to knowledge base entry
The several and frequency of failure carries out marking evaluation, deposit it is excellent rogue, realize self study, the self refresh of knowledge base.More to knowledge base at this
New method is not especially limited, and corresponding setting should be made according to the actual situation by those skilled in the art, usually can benefit
Knowledge base is updated with BP neural network algorithm.In addition, be also not especially limited herein for matching result, such as can be with
It is the analysis and suggestion of determination according to practical application scene.
Further, it above after judging the violation configuration information in configuration information, by violation configuration information and presets
Knowledge base is matched, and matching result is obtained, and is generally included: configuration information being compared with default assessment rule, utilizes rule
Then engine and regular expression judge the violation configuration information in configuration information;By violation configuration information and default knowledge base into
Row matching, obtains matching result.
For example, above-mentioned collected database compliance configuration result is compared with compliance rule, rule is utilized
Engine and regular expression find irregularity item.Further, it is also possible to provide irregularity report.At this point, regulation engine such as 2 institute of table
Show, regulation engine table of comparisons when table 2 is information evaluation.
Regulation engine table of comparisons when 2 information evaluation of table
In addition, carrying out analysis to irregularity item provides suggestion.Can have content matching irregularity item according to knowledge base, provide
Corresponding improving suggestions.Meanwhile to failing matched irregularity item and suggestion in knowledge base, can the customized addition of expert suggest,
And it is automatically replenished knowledge base.Improving suggestions are not especially limited at this, need to be determined according to practical application scene.For example,
Advise for above-mentioned irregularity item, as shown in table 3, table 3 is irregularity item and the suggestion table of comparisons.
3 irregularity item of table and the suggestion table of comparisons
S103, according to matching result, obtained from default knowledge base and reinforce script;
The embodiment of the present application is after obtaining matching result, according to matching result, obtains from default knowledge base and reinforces script.
From the foregoing, it can be understood that matching result can according to practical application scene and determination analysis and suggestion, it is possible to further according to point
Analysis suggests that the key generated for current data lab environment reinforces script or program, the key realized using the embodiment of the present application
The technical difficulty that function greatly reduces database reinforcing is reinforced, the efficiency and up to standard of database compliance work is improved
Rate has ensured the safe and reliable of database and information system.Stiffleg was successfully reinforced from knowledge base preset and in the past originally
Operation, user can check and edit script, and increases newly to knowledge base as optional program.Here, to the content of script is reinforced not
Make specific restriction, corresponding setting should be made according to the actual situation by those skilled in the art.In addition, part reinforces operation, such as
Installation patch executes after needing to download file, is completed using the semiautomatic fashion of artificial assistance.
S104, the reinforcing for reinforcing script to complete database is executed.
The embodiment of the present application executes after obtaining reinforcing script in default knowledge base and reinforces script to complete database
It reinforces.Further, user, which may be selected to execute at the appointed time, under permission, environment, reinforces script and program, completion database
Compliance assessment and reinforcement.After reinforcing successfully, this is reinforced into Successful Operation more new knowledge base respective entries, and be marked as
Function application record provides foundation for the reference of knowledge base next time.In addition, to avoid database caused by reinforcing failure or maloperation
Or application system failure, it reinforces script and program includes that corresponding backup and recovery operation, user can be retracted by rollback module
The reinforcing operation executed.
For the application before this according to default assessment rule, acquisition is corresponding with default assessment rule from database matches confidence
Breath, then after judging the violation configuration information in configuration information, violation configuration information is matched with default knowledge base,
Matching result is obtained, further according to matching result, is obtained from default knowledge base and reinforces script, finally executes and reinforces script to complete
The reinforcing of database.As it can be seen that this method can be obtained from default knowledge base reinforces script, and then executes and reinforce script to complete number
According to the reinforcing in library, avoids relying on to obtain in specialized database technical staff and reinforce script, can automate and carry out database reinforcing
Work, and then improve working efficiency.In addition, the default assessment rule of the application can be customized and be converted, it can advised by industry
Model requires or regulations carry out automatically rule conversion.Knowledge base built in system not only includes Sybase loophole, configuration core
It the contents such as looks into, by each assessment and the experience of project can also be reinforced learn and add to knowledge base automatically, form knowledge base
Foundation, use, inspection, improved closed loop process.The application automatically generates reinforcing script after can realizing assessment, and according to user
It is required that at the appointed time, permission, environment dispatching execute automatically, realize assessment it is integrated with reinforcing, automation.
Below to a kind of system, equipment and computer readable storage medium that database is reinforced provided by the embodiments of the present application
It is introduced, system, equipment and the computer readable storage medium and above-described data that database described below is reinforced
The method that library reinforces can correspond to each other reference.
Referring to FIG. 2, Fig. 2 is a kind of structural block diagram for the system that database is reinforced provided by the embodiment of the present application;It should
Database reinforce system include:
Configuration information acquisition module 201, for regular according to default assessment, acquisition and default assessment are regular from database
Corresponding configuration information;
Information matches module 202, for after judging the violation configuration information in configuration information, by violation configuration information
It is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module 203, for being obtained from default knowledge base and reinforcing script according to matching result;
Script execution module 204 is reinforced, for executing the reinforcing for reinforcing script to complete database.
Preferably, configuration information acquisition module 201, generally includes:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for database compliance require information to be converted to default assessment rule;
Configuration information acquisition unit is used to be acquired from database using regulation engine and pre- according to default assessment rule
If the corresponding configuration information of assessment rule.
Preferably, information matches module 202, generally includes:
Violation configuration information judging unit is drawn for being compared configuration information with default assessment rule using rule
Hold up the violation configuration information judged in configuration information with regular expression;
Information matching unit obtains matching result for matching violation configuration information with default knowledge base.
Preferably, the system which reinforces also typically includes:
Knowledge base update module, for being updated using BP neural network algorithm to default knowledge base.
The application also provides a kind of equipment, comprising: memory and processor;Wherein, memory is for storing computer journey
The step of sequence, processor is used to realize the method that the database of above-mentioned any embodiment is reinforced when executing computer program.
The application also provides a kind of computer readable storage medium, and computer-readable recording medium storage has computer journey
Sequence, realized when computer program is executed by processor above-mentioned any embodiment database reinforce method the step of.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For embodiment provide system and
Speech, since it is corresponding with the method that embodiment provides, so being described relatively simple, related place is referring to method part illustration
?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Method, system, equipment and the computer-readable storage medium that a kind of database provided herein is reinforced above
Matter is described in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above
The explanation of embodiment is merely used to help understand the present processes and its core concept.It should be pointed out that for the art
Those of ordinary skill for, under the premise of not departing from the application principle, can also to the application carry out it is several improvement and repair
Decorations, these improvement and modification are also fallen into the protection scope of the claim of this application.
Claims (10)
1. a kind of method that database is reinforced characterized by comprising
According to default assessment rule, acquired from database and the regular corresponding configuration information of the default assessment;
After judging the violation configuration information in the configuration information, the violation configuration information and default knowledge base are carried out
Matching, obtains matching result;
According to the matching result, is obtained from the default knowledge base and reinforce script;
The reinforcing script is executed to complete the reinforcing of the database.
2. the method that database according to claim 1 is reinforced, which is characterized in that the default assessment rule of the basis, from
It is acquired in database and the regular corresponding configuration information of the default assessment, comprising:
Obtain database compliance require information;
The database compliance require information is converted into the default assessment rule;
According to the default assessment rule, acquired from the database using regulation engine corresponding with the default assessment rule
Configuration information.
3. the method that database according to claim 2 is reinforced, which is characterized in that described to judge the configuration information
In violation configuration information after, the violation configuration information is matched with default knowledge base, obtains matching result, comprising:
The configuration information is compared with the default assessment rule, is judged using the regulation engine and regular expression
The violation configuration information in the configuration information out;
The violation configuration information is matched with the default knowledge base, obtains the matching result.
4. the method that database according to claim 1 is reinforced, which is characterized in that further include:
The default knowledge base is updated using BP neural network algorithm.
5. the system that a kind of database is reinforced characterized by comprising
Configuration information acquisition module, for according to default assessment rule, acquisition and the default assessment rule to be right from database
The configuration information answered;
Information matches module, for after judging the violation configuration information in the configuration information, confidence to be matched in the violation
Breath is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module, for being obtained from the default knowledge base and reinforcing script according to the matching result;
Script execution module is reinforced, for executing the reinforcing script to complete the reinforcing of the database.
6. the system that database according to claim 5 is reinforced, which is characterized in that the configuration information acquisition module, packet
It includes:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for the database compliance require information to be converted to the default assessment rule;
Configuration information acquisition unit, for being acquired from the database using regulation engine according to the default assessment rule
With the regular corresponding configuration information of the default assessment.
7. the system that database according to claim 6 is reinforced, which is characterized in that the information matches module, comprising:
Violation configuration information judging unit utilizes institute for the configuration information to be compared with the default assessment rule
It states regulation engine and regular expression judges the violation configuration information in the configuration information;
Information matching unit obtains the matching for matching the violation configuration information with the default knowledge base
As a result.
8. the system that database according to claim 5 is reinforced, which is characterized in that further include:
Knowledge base update module, for being updated using BP neural network algorithm to the default knowledge base.
9. a kind of equipment characterized by comprising
Memory and processor;Wherein, the memory is for storing computer program, the processor by execute it is described based on
The step of method such as the described in any item databases reinforcings of Claims 1-4 is realized when calculation machine program.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence realizes the method reinforced such as the described in any item databases of Claims 1-4 when the computer program is executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811468308.3A CN109271809A (en) | 2018-12-03 | 2018-12-03 | A kind of method, system and relevant apparatus that database is reinforced |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811468308.3A CN109271809A (en) | 2018-12-03 | 2018-12-03 | A kind of method, system and relevant apparatus that database is reinforced |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109271809A true CN109271809A (en) | 2019-01-25 |
Family
ID=65187389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811468308.3A Pending CN109271809A (en) | 2018-12-03 | 2018-12-03 | A kind of method, system and relevant apparatus that database is reinforced |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109271809A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306258A (en) * | 2011-09-23 | 2012-01-04 | 国网电力科学研究院 | UNIX host safety configuration auditing method based on configurable knowledge base |
CN104009869A (en) * | 2014-05-15 | 2014-08-27 | 华南理工大学 | Power secondary system information security level protection online compliance detection method |
CN104182234A (en) * | 2014-08-25 | 2014-12-03 | 杭州华为数字技术有限公司 | Business processing method and business system |
CN106845257A (en) * | 2017-02-09 | 2017-06-13 | 北京启明星辰信息安全技术有限公司 | One kind etc. is protected analysis method and waits guarantor's analysis system |
CN108647049A (en) * | 2018-03-18 | 2018-10-12 | 平安科技(深圳)有限公司 | Configurableization system, method, equipment and the storage medium of rule-based engine |
-
2018
- 2018-12-03 CN CN201811468308.3A patent/CN109271809A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306258A (en) * | 2011-09-23 | 2012-01-04 | 国网电力科学研究院 | UNIX host safety configuration auditing method based on configurable knowledge base |
CN104009869A (en) * | 2014-05-15 | 2014-08-27 | 华南理工大学 | Power secondary system information security level protection online compliance detection method |
CN104182234A (en) * | 2014-08-25 | 2014-12-03 | 杭州华为数字技术有限公司 | Business processing method and business system |
CN106845257A (en) * | 2017-02-09 | 2017-06-13 | 北京启明星辰信息安全技术有限公司 | One kind etc. is protected analysis method and waits guarantor's analysis system |
CN108647049A (en) * | 2018-03-18 | 2018-10-12 | 平安科技(深圳)有限公司 | Configurableization system, method, equipment and the storage medium of rule-based engine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9195936B1 (en) | System and method for updating or modifying an application without manual coding | |
CN109308285A (en) | Database script management method, device, computer equipment and storage medium | |
US20100058114A1 (en) | Systems and methods for automated management of compliance of a target asset to predetermined requirements | |
CN111680801B (en) | Operation verification method, device, equipment and storage medium | |
CN110471694A (en) | Annotation information processing method, device, computer equipment and storage medium | |
US11580096B2 (en) | System for uploading information into a metadata repository | |
CN107918799B (en) | Ship comprehensive guarantee management system based on BS framework | |
CN107194256A (en) | Riskless asset baseline reinforcement means and device | |
CN107992325B (en) | Method for checking and comparing file information through feature codes | |
JP2018505506A (en) | Machine-based instruction editing | |
CN112558946A (en) | Method, device and equipment for generating code and computer readable storage medium | |
CN109669977A (en) | Data cut-in method, device, computer equipment and the storage medium of integration across database | |
Ogheneovo | Software Maintenance and Evolution: The Implication for Software Development | |
CN109753767B (en) | Software distribution and updating method and device based on block chain, server and client | |
CN109271809A (en) | A kind of method, system and relevant apparatus that database is reinforced | |
CN109508203B (en) | Method, device and system for determining version consistency | |
CN114358748B (en) | BIM-based engineering construction informatization management method and device | |
CN110233758A (en) | A kind of safety encryption of service system, device and relevant device | |
CN110162324A (en) | DC control protects executable code update method, device and the medium in equipment | |
CN109542496A (en) | Incremental code determines method, apparatus and system | |
CN115600972A (en) | Method, device, equipment and storage medium for verifying and selling of bad assets | |
CN107563937A (en) | Hierarchical protection based on big data closes safely rule inspection method and system | |
CN109558153B (en) | Method, device and system for determining version consistency | |
CN107295078A (en) | A kind of patch distribution tracking and control system and method | |
CN109472132A (en) | Anti- brush machine guard method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |