CN109271809A - A kind of method, system and relevant apparatus that database is reinforced - Google Patents

A kind of method, system and relevant apparatus that database is reinforced Download PDF

Info

Publication number
CN109271809A
CN109271809A CN201811468308.3A CN201811468308A CN109271809A CN 109271809 A CN109271809 A CN 109271809A CN 201811468308 A CN201811468308 A CN 201811468308A CN 109271809 A CN109271809 A CN 109271809A
Authority
CN
China
Prior art keywords
database
configuration information
default
knowledge base
reinforced
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811468308.3A
Other languages
Chinese (zh)
Inventor
陈华军
吕华辉
杜金燃
徐欢
明哲
刘振
樊凯
蒙家晓
黄建理
陈霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Co Ltd
Research Institute of Southern Power Grid Co Ltd
Original Assignee
China Southern Power Grid Co Ltd
Research Institute of Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Co Ltd, Research Institute of Southern Power Grid Co Ltd filed Critical China Southern Power Grid Co Ltd
Priority to CN201811468308.3A priority Critical patent/CN109271809A/en
Publication of CN109271809A publication Critical patent/CN109271809A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The method that a kind of database provided herein is reinforced, comprising: according to default assessment rule, the acquisition configuration information corresponding with default assessment rule from database;After judging the violation configuration information in configuration information, violation configuration information is matched with default knowledge base, obtains matching result;According to matching result, is obtained from default knowledge base and reinforce script;Execute the reinforcing for reinforcing script to complete database.It can be seen that, this method can obtain from default knowledge base and reinforce script, and then execute the reinforcing for reinforcing script to complete database, avoid relying on to obtain in specialized database technical staff and reinforce script, it can automate and carry out database reinforcement, and then improve working efficiency.The application also provides a kind of system, equipment and computer readable storage medium that database is reinforced, and all has above-mentioned beneficial effect.

Description

A kind of method, system and relevant apparatus that database is reinforced
Technical field
This application involves database and information security field, in particular to method, system, equipment that a kind of database is reinforced And computer readable storage medium.
Background technique
Data are the core assets of enterprise, and database is also the key foundation of information system, protect database safety and Compliance avoids database from leaking, attacked and service disruption is that company information protects a particularly important content.Currently, The method that database is reinforced is obtained dependent on specialized database technical staff and reinforces script, leads to not automation and carries out data Library reinforcement, working efficiency are low.
Therefore, how to automate and carry out database reinforcement, and then improving working efficiency is those skilled in the art Member's technical issues that need to address.
Summary of the invention
The purpose of the application is to provide a kind of method, system, equipment and computer readable storage medium that database is reinforced, It can automate and carry out database reinforcement, and then improve working efficiency.
In order to solve the above technical problems, the application provides a kind of method that database is reinforced, comprising:
According to default assessment rule, acquired from database and the regular corresponding configuration information of the default assessment;
After judging the violation configuration information in the configuration information, by the violation configuration information and default knowledge base It is matched, obtains matching result;
According to the matching result, is obtained from the default knowledge base and reinforce script;
The reinforcing script is executed to complete the reinforcing of the database.
Preferably, the default assessment rule of the basis, acquisition is corresponding with the default assessment rule from database matches Confidence breath, comprising:
Obtain database compliance require information;
The database compliance require information is converted into the default assessment rule;
According to the default assessment rule, acquired from the database using regulation engine and the default assessment rule Corresponding configuration information.
Preferably, described after judging the violation configuration information in the configuration information, by the violation configuration information It is matched with default knowledge base, obtains matching result, comprising:
The configuration information is compared with the default assessment rule, utilizes the regulation engine and regular expression Judge the violation configuration information in the configuration information;
The violation configuration information is matched with the default knowledge base, obtains the matching result.
Preferably, the method which reinforces further include:
The default knowledge base is updated using BP neural network algorithm.
The application also provides a kind of system that database is reinforced, comprising:
Configuration information acquisition module, for according to default assessment rule, acquisition to be advised with the default assessment from database Then corresponding configuration information;
Information matches module, for after judging the violation configuration information in the configuration information, the violation to be matched Confidence breath is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module, for being obtained from the default knowledge base and reinforcing script according to the matching result;
Script execution module is reinforced, for executing the reinforcing script to complete the reinforcing of the database.
Preferably, the configuration information acquisition module, comprising:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for the database compliance require information to be converted to the default assessment rule;
Configuration information acquisition unit, for regular according to the default assessment, from the database using regulation engine It acquires and the regular corresponding configuration information of the default assessment.
Preferably, the information matches module, comprising:
Violation configuration information judging unit, for the configuration information to be compared with the default assessment rule, benefit The violation configuration information in the configuration information is judged with the regulation engine and regular expression;
Information matching unit obtains described for matching the violation configuration information with the default knowledge base Matching result.
Preferably, the system which reinforces further include:
Knowledge base update module, for being updated using BP neural network algorithm to the default knowledge base.
The application also provides a kind of equipment, comprising:
Memory and processor;Wherein, the memory is for storing computer program, and the processor is for executing institute The step of method that database described above is reinforced is realized when stating computer program.
The application also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has computer The step of program, the computer program realizes the method that database described above is reinforced when being executed by processor.
The method that a kind of database provided herein is reinforced, comprising: according to default assessment rule, adopted from database Collect and the regular corresponding configuration information of the default assessment;It, will after judging the violation configuration information in the configuration information The violation configuration information is matched with default knowledge base, obtains matching result;According to the matching result, preset from described It is obtained in knowledge base and reinforces script;The reinforcing script is executed to complete the reinforcing of the database.
This method default assessment of basis before this is regular, acquisition and the regular corresponding configuration of the default assessment from database Information, then after judging the violation configuration information in the configuration information, by the violation configuration information and default knowledge Library is matched, and matching result is obtained, and further according to matching result, is obtained from the default knowledge base and is reinforced script, finally hold Row is described to reinforce script to complete the reinforcing of the database.As it can be seen that this method can be obtained from default knowledge base reinforces script, And then the reinforcing script is executed to complete the reinforcing of the database, it avoids relying on and adds in specialized database technical staff acquisition Gu script can automate and carry out database reinforcement, and then improve working efficiency.The application also provides a kind of database and adds Solid system, equipment and computer readable storage medium, all have above-mentioned beneficial effect, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart for the method that database is reinforced provided by the embodiment of the present application;
Fig. 2 is a kind of structural block diagram for the system that database is reinforced provided by the embodiment of the present application.
Specific embodiment
The core of the application is to provide a kind of method that database is reinforced, and can automate and carry out database reinforcement, And then improve working efficiency.Another core of the application is to provide the system that a kind of database reinforces, equipment and computer-readable Storage medium.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Data are the core assets of enterprise, and database is also the key foundation of information system, protect database safety and Compliance avoids database from leaking, attacked and service disruption is that company information protects a particularly important content.Currently, The method that database is reinforced is obtained dependent on specialized database technical staff and reinforces script, leads to not automation and carries out data Library reinforcement, working efficiency are low.The embodiment of the present application, which can automate, carries out database reinforcement, and then improves work Efficiency.Specifically referring to FIG. 1, Fig. 1 is a kind of flow chart for the method that database is reinforced, the number provided by the embodiment of the present application It is specifically included according to the method that library reinforces:
S101, from database acquisition with default assessment rule corresponding configuration information regular according to default assessment;
Before this according to default assessment rule, acquisition is corresponding with default assessment rule from database matches the embodiment of the present application Confidence breath, is not especially limited default assessment rule at this, should be made according to the actual situation by those skilled in the art corresponding Setting.Since default assessment rule is not especially limited, therefore the configuration information acquired from database is also not especially limited, But it need to guarantee that the configuration information of acquisition is corresponding with default assessment rule.For the sampling instrument of configuration information, herein It is not especially limited, regulation engine can be used for example and acquire configuration information corresponding with default assessment rule from database. In addition, being also not especially limited herein for the type of database, phase should be made according to the actual situation by those skilled in the art The setting answered, database can be Oracle, SQL Server, MySQL, up to multiple mainstream vendor's databases such as dream database Major version.
Further, the default assessment rule of above-mentioned basis, the acquisition configuration corresponding with default assessment rule from database Information generally includes: obtaining database compliance require information;Database compliance require information is converted into default assessment rule Then;According to default assessment rule, configuration information corresponding with default assessment rule is acquired from database using regulation engine.
Content of database compliance require information is not especially limited at this, it should be by those skilled in the art according to reality Border situation makes corresponding setting, such as can be the requirement of database compliance or regulations.It is possible to further be supervised according to industry Pipe wants summed data library application scenarios, and the specific requirement or regulations of input database compliance can satisfy user's special scenes Compliance assess require.
For example, existing a set of oracle database for operating in the safe area II of electric power monitoring system, operation dispatching of power netwoks is certainly Dynamicization main station system, need to according to the regulations such as National Energy Board and south electric network " electric power monitoring system safety protection technique specification " into The compliance of row database is assessed and reinforcement.According to " electric power monitoring system safety protection technique specification ", database is pacified The requirement of full compliance is as follows:
(1) the newest security patch of the database to timely update by test;
(2) to the database newly installed, the default password of all accounts of time update is answered;
(3) useless and permanent unused account is deleted in time;
(4) safe password policy is used, using 8 numbers above character mixed ciphers;
(5) secured account numbers strategy is used, authorizes corresponding permission on demand for different user accounts;
(6) reinforce database audits record, and inspect periodically database audits record;
(7) Runtime Library and development library should be separated in database.
In addition, user can be by the original text above code requirement of typing one by one in typing, it can also be by database professional technique people Member's typing chief word, for example (1) article require can typing keyword " newest security patch " etc..
Above-mentioned that database compliance require information is converted to default assessment rule, i.e. the database by user's input closes rule Property require and regulations be converted to the identifiable rule of system.Usual system uses regulation engine and regular expression, and user is defeated The regulations and knowledge base keyword match entered, can also manually establish rule by database practitioner.
For example, the rule that the requirement of above-mentioned database security compliance can be exchanged into is respectively as follows:
(1) whether the newest security patch of installation database;
(2) default account whether uses default password;
(3) whether there is useless and permanent unused account;
(4) whether the password of all account numbers uses 8 numbers above character mixed ciphers;
(5) whether common account number has super authorities or the roles such as DBA, RESOURCE;
(6) database audits, newest audit logging content whether are enabled;
(7) it whether there is the account numbers, database object such as development library TEST, whether there is data completely of the same name under different account numbers Library object.
Above according to default assessment rule, match corresponding with default assessment rule is acquired from database using regulation engine Confidence breath specifically can be according to the compliance rule requirement that system is formed, acquisition database relevant configuration information.Default It is the corresponding information collection script of every compliance rule match or program using regulation engine in knowledge base.
For example, corresponding information collection script or program are packaged and are executed, is worked as according to above-mentioned identified rule Preceding database compliance configuration result.At this point, regulation engine is as shown in table 1, regulation engine table of comparisons when table 1 is information collection.
Regulation engine table of comparisons when 1 information collection of table
S102, after judging the violation configuration information in configuration information, by violation configuration information and default knowledge base into Row matching, obtains matching result;
The embodiment of the present application is known after judging the violation configuration information in configuration information, by violation configuration information with default Know library to be matched, obtains matching result.Content of default knowledge base is not especially limited at this, is generally included known mutual It networks newest security breaches, patch, risk information, from industries compliance general specifications such as operator, finance, public security, electric power It is required that the experience and expert's manual entry of previous successful item.It is possible to further secondary according to successfully reference to knowledge base entry The several and frequency of failure carries out marking evaluation, deposit it is excellent rogue, realize self study, the self refresh of knowledge base.More to knowledge base at this New method is not especially limited, and corresponding setting should be made according to the actual situation by those skilled in the art, usually can benefit Knowledge base is updated with BP neural network algorithm.In addition, be also not especially limited herein for matching result, such as can be with It is the analysis and suggestion of determination according to practical application scene.
Further, it above after judging the violation configuration information in configuration information, by violation configuration information and presets Knowledge base is matched, and matching result is obtained, and is generally included: configuration information being compared with default assessment rule, utilizes rule Then engine and regular expression judge the violation configuration information in configuration information;By violation configuration information and default knowledge base into Row matching, obtains matching result.
For example, above-mentioned collected database compliance configuration result is compared with compliance rule, rule is utilized Engine and regular expression find irregularity item.Further, it is also possible to provide irregularity report.At this point, regulation engine such as 2 institute of table Show, regulation engine table of comparisons when table 2 is information evaluation.
Regulation engine table of comparisons when 2 information evaluation of table
In addition, carrying out analysis to irregularity item provides suggestion.Can have content matching irregularity item according to knowledge base, provide Corresponding improving suggestions.Meanwhile to failing matched irregularity item and suggestion in knowledge base, can the customized addition of expert suggest, And it is automatically replenished knowledge base.Improving suggestions are not especially limited at this, need to be determined according to practical application scene.For example, Advise for above-mentioned irregularity item, as shown in table 3, table 3 is irregularity item and the suggestion table of comparisons.
3 irregularity item of table and the suggestion table of comparisons
S103, according to matching result, obtained from default knowledge base and reinforce script;
The embodiment of the present application is after obtaining matching result, according to matching result, obtains from default knowledge base and reinforces script. From the foregoing, it can be understood that matching result can according to practical application scene and determination analysis and suggestion, it is possible to further according to point Analysis suggests that the key generated for current data lab environment reinforces script or program, the key realized using the embodiment of the present application The technical difficulty that function greatly reduces database reinforcing is reinforced, the efficiency and up to standard of database compliance work is improved Rate has ensured the safe and reliable of database and information system.Stiffleg was successfully reinforced from knowledge base preset and in the past originally Operation, user can check and edit script, and increases newly to knowledge base as optional program.Here, to the content of script is reinforced not Make specific restriction, corresponding setting should be made according to the actual situation by those skilled in the art.In addition, part reinforces operation, such as Installation patch executes after needing to download file, is completed using the semiautomatic fashion of artificial assistance.
S104, the reinforcing for reinforcing script to complete database is executed.
The embodiment of the present application executes after obtaining reinforcing script in default knowledge base and reinforces script to complete database It reinforces.Further, user, which may be selected to execute at the appointed time, under permission, environment, reinforces script and program, completion database Compliance assessment and reinforcement.After reinforcing successfully, this is reinforced into Successful Operation more new knowledge base respective entries, and be marked as Function application record provides foundation for the reference of knowledge base next time.In addition, to avoid database caused by reinforcing failure or maloperation Or application system failure, it reinforces script and program includes that corresponding backup and recovery operation, user can be retracted by rollback module The reinforcing operation executed.
For the application before this according to default assessment rule, acquisition is corresponding with default assessment rule from database matches confidence Breath, then after judging the violation configuration information in configuration information, violation configuration information is matched with default knowledge base, Matching result is obtained, further according to matching result, is obtained from default knowledge base and reinforces script, finally executes and reinforces script to complete The reinforcing of database.As it can be seen that this method can be obtained from default knowledge base reinforces script, and then executes and reinforce script to complete number According to the reinforcing in library, avoids relying on to obtain in specialized database technical staff and reinforce script, can automate and carry out database reinforcing Work, and then improve working efficiency.In addition, the default assessment rule of the application can be customized and be converted, it can advised by industry Model requires or regulations carry out automatically rule conversion.Knowledge base built in system not only includes Sybase loophole, configuration core It the contents such as looks into, by each assessment and the experience of project can also be reinforced learn and add to knowledge base automatically, form knowledge base Foundation, use, inspection, improved closed loop process.The application automatically generates reinforcing script after can realizing assessment, and according to user It is required that at the appointed time, permission, environment dispatching execute automatically, realize assessment it is integrated with reinforcing, automation.
Below to a kind of system, equipment and computer readable storage medium that database is reinforced provided by the embodiments of the present application It is introduced, system, equipment and the computer readable storage medium and above-described data that database described below is reinforced The method that library reinforces can correspond to each other reference.
Referring to FIG. 2, Fig. 2 is a kind of structural block diagram for the system that database is reinforced provided by the embodiment of the present application;It should Database reinforce system include:
Configuration information acquisition module 201, for regular according to default assessment, acquisition and default assessment are regular from database Corresponding configuration information;
Information matches module 202, for after judging the violation configuration information in configuration information, by violation configuration information It is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module 203, for being obtained from default knowledge base and reinforcing script according to matching result;
Script execution module 204 is reinforced, for executing the reinforcing for reinforcing script to complete database.
Preferably, configuration information acquisition module 201, generally includes:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for database compliance require information to be converted to default assessment rule;
Configuration information acquisition unit is used to be acquired from database using regulation engine and pre- according to default assessment rule If the corresponding configuration information of assessment rule.
Preferably, information matches module 202, generally includes:
Violation configuration information judging unit is drawn for being compared configuration information with default assessment rule using rule Hold up the violation configuration information judged in configuration information with regular expression;
Information matching unit obtains matching result for matching violation configuration information with default knowledge base.
Preferably, the system which reinforces also typically includes:
Knowledge base update module, for being updated using BP neural network algorithm to default knowledge base.
The application also provides a kind of equipment, comprising: memory and processor;Wherein, memory is for storing computer journey The step of sequence, processor is used to realize the method that the database of above-mentioned any embodiment is reinforced when executing computer program.
The application also provides a kind of computer readable storage medium, and computer-readable recording medium storage has computer journey Sequence, realized when computer program is executed by processor above-mentioned any embodiment database reinforce method the step of.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For embodiment provide system and Speech, since it is corresponding with the method that embodiment provides, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Method, system, equipment and the computer-readable storage medium that a kind of database provided herein is reinforced above Matter is described in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above The explanation of embodiment is merely used to help understand the present processes and its core concept.It should be pointed out that for the art Those of ordinary skill for, under the premise of not departing from the application principle, can also to the application carry out it is several improvement and repair Decorations, these improvement and modification are also fallen into the protection scope of the claim of this application.

Claims (10)

1. a kind of method that database is reinforced characterized by comprising
According to default assessment rule, acquired from database and the regular corresponding configuration information of the default assessment;
After judging the violation configuration information in the configuration information, the violation configuration information and default knowledge base are carried out Matching, obtains matching result;
According to the matching result, is obtained from the default knowledge base and reinforce script;
The reinforcing script is executed to complete the reinforcing of the database.
2. the method that database according to claim 1 is reinforced, which is characterized in that the default assessment rule of the basis, from It is acquired in database and the regular corresponding configuration information of the default assessment, comprising:
Obtain database compliance require information;
The database compliance require information is converted into the default assessment rule;
According to the default assessment rule, acquired from the database using regulation engine corresponding with the default assessment rule Configuration information.
3. the method that database according to claim 2 is reinforced, which is characterized in that described to judge the configuration information In violation configuration information after, the violation configuration information is matched with default knowledge base, obtains matching result, comprising:
The configuration information is compared with the default assessment rule, is judged using the regulation engine and regular expression The violation configuration information in the configuration information out;
The violation configuration information is matched with the default knowledge base, obtains the matching result.
4. the method that database according to claim 1 is reinforced, which is characterized in that further include:
The default knowledge base is updated using BP neural network algorithm.
5. the system that a kind of database is reinforced characterized by comprising
Configuration information acquisition module, for according to default assessment rule, acquisition and the default assessment rule to be right from database The configuration information answered;
Information matches module, for after judging the violation configuration information in the configuration information, confidence to be matched in the violation Breath is matched with default knowledge base, obtains matching result;
It reinforces script and obtains module, for being obtained from the default knowledge base and reinforcing script according to the matching result;
Script execution module is reinforced, for executing the reinforcing script to complete the reinforcing of the database.
6. the system that database according to claim 5 is reinforced, which is characterized in that the configuration information acquisition module, packet It includes:
Information acquisition unit, for obtaining database compliance require information;
Information conversion unit, for the database compliance require information to be converted to the default assessment rule;
Configuration information acquisition unit, for being acquired from the database using regulation engine according to the default assessment rule With the regular corresponding configuration information of the default assessment.
7. the system that database according to claim 6 is reinforced, which is characterized in that the information matches module, comprising:
Violation configuration information judging unit utilizes institute for the configuration information to be compared with the default assessment rule It states regulation engine and regular expression judges the violation configuration information in the configuration information;
Information matching unit obtains the matching for matching the violation configuration information with the default knowledge base As a result.
8. the system that database according to claim 5 is reinforced, which is characterized in that further include:
Knowledge base update module, for being updated using BP neural network algorithm to the default knowledge base.
9. a kind of equipment characterized by comprising
Memory and processor;Wherein, the memory is for storing computer program, the processor by execute it is described based on The step of method such as the described in any item databases reinforcings of Claims 1-4 is realized when calculation machine program.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence realizes the method reinforced such as the described in any item databases of Claims 1-4 when the computer program is executed by processor The step of.
CN201811468308.3A 2018-12-03 2018-12-03 A kind of method, system and relevant apparatus that database is reinforced Pending CN109271809A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811468308.3A CN109271809A (en) 2018-12-03 2018-12-03 A kind of method, system and relevant apparatus that database is reinforced

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811468308.3A CN109271809A (en) 2018-12-03 2018-12-03 A kind of method, system and relevant apparatus that database is reinforced

Publications (1)

Publication Number Publication Date
CN109271809A true CN109271809A (en) 2019-01-25

Family

ID=65187389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811468308.3A Pending CN109271809A (en) 2018-12-03 2018-12-03 A kind of method, system and relevant apparatus that database is reinforced

Country Status (1)

Country Link
CN (1) CN109271809A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306258A (en) * 2011-09-23 2012-01-04 国网电力科学研究院 UNIX host safety configuration auditing method based on configurable knowledge base
CN104009869A (en) * 2014-05-15 2014-08-27 华南理工大学 Power secondary system information security level protection online compliance detection method
CN104182234A (en) * 2014-08-25 2014-12-03 杭州华为数字技术有限公司 Business processing method and business system
CN106845257A (en) * 2017-02-09 2017-06-13 北京启明星辰信息安全技术有限公司 One kind etc. is protected analysis method and waits guarantor's analysis system
CN108647049A (en) * 2018-03-18 2018-10-12 平安科技(深圳)有限公司 Configurableization system, method, equipment and the storage medium of rule-based engine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306258A (en) * 2011-09-23 2012-01-04 国网电力科学研究院 UNIX host safety configuration auditing method based on configurable knowledge base
CN104009869A (en) * 2014-05-15 2014-08-27 华南理工大学 Power secondary system information security level protection online compliance detection method
CN104182234A (en) * 2014-08-25 2014-12-03 杭州华为数字技术有限公司 Business processing method and business system
CN106845257A (en) * 2017-02-09 2017-06-13 北京启明星辰信息安全技术有限公司 One kind etc. is protected analysis method and waits guarantor's analysis system
CN108647049A (en) * 2018-03-18 2018-10-12 平安科技(深圳)有限公司 Configurableization system, method, equipment and the storage medium of rule-based engine

Similar Documents

Publication Publication Date Title
US9195936B1 (en) System and method for updating or modifying an application without manual coding
CN109308285A (en) Database script management method, device, computer equipment and storage medium
US20100058114A1 (en) Systems and methods for automated management of compliance of a target asset to predetermined requirements
CN111680801B (en) Operation verification method, device, equipment and storage medium
CN110471694A (en) Annotation information processing method, device, computer equipment and storage medium
US11580096B2 (en) System for uploading information into a metadata repository
CN107918799B (en) Ship comprehensive guarantee management system based on BS framework
CN107194256A (en) Riskless asset baseline reinforcement means and device
CN107992325B (en) Method for checking and comparing file information through feature codes
JP2018505506A (en) Machine-based instruction editing
CN112558946A (en) Method, device and equipment for generating code and computer readable storage medium
CN109669977A (en) Data cut-in method, device, computer equipment and the storage medium of integration across database
Ogheneovo Software Maintenance and Evolution: The Implication for Software Development
CN109753767B (en) Software distribution and updating method and device based on block chain, server and client
CN109271809A (en) A kind of method, system and relevant apparatus that database is reinforced
CN109508203B (en) Method, device and system for determining version consistency
CN114358748B (en) BIM-based engineering construction informatization management method and device
CN110233758A (en) A kind of safety encryption of service system, device and relevant device
CN110162324A (en) DC control protects executable code update method, device and the medium in equipment
CN109542496A (en) Incremental code determines method, apparatus and system
CN115600972A (en) Method, device, equipment and storage medium for verifying and selling of bad assets
CN107563937A (en) Hierarchical protection based on big data closes safely rule inspection method and system
CN109558153B (en) Method, device and system for determining version consistency
CN107295078A (en) A kind of patch distribution tracking and control system and method
CN109472132A (en) Anti- brush machine guard method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190125