CN109299147A - Database access processing method, device, computer equipment and storage medium - Google Patents

Database access processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109299147A
CN109299147A CN201811122924.3A CN201811122924A CN109299147A CN 109299147 A CN109299147 A CN 109299147A CN 201811122924 A CN201811122924 A CN 201811122924A CN 109299147 A CN109299147 A CN 109299147A
Authority
CN
China
Prior art keywords
user
database
access
fingerprint
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811122924.3A
Other languages
Chinese (zh)
Other versions
CN109299147B (en
Inventor
尹恺雯
郑榕俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201811122924.3A priority Critical patent/CN109299147B/en
Publication of CN109299147A publication Critical patent/CN109299147A/en
Application granted granted Critical
Publication of CN109299147B publication Critical patent/CN109299147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

This application involves a kind of database access processing method, device, computer equipment and storage mediums.The method is related to database information safety, comprising: receives the access request message for requesting access to database, access request message carries user identity information;Inquire preset user filtering device;User identity information is calculated using user filtering device, obtains user fingerprints information corresponding with user identity information;The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint matching;When fingerprint matching result is consistent, access request message is responded, corresponding request data is obtained from database to be visited.Quick filtering to access request message is realized using this method, improves database for the treatment effeciency of access request.

Description

Database access processing method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of database access processing method, device, computer Equipment and storage medium.
Background technique
With the development of computer technology, more and more services and business are based on computer and are realized, such as finance clothes Business, shopping at network, social media etc. come into digital times now, and the scale of construction of data is increasing, for data depositary management The demand of reason, requirement are also higher and higher.
Currently, there is the technology realized by caching and quickly read data, the reading of database is alleviated to a certain extent Pressure, however as being increasing for invalid data request, the effect of caching is more and more limited, and the reading pressure of database increases Greatly, database is caused to reduce the treatment effeciency of request of data.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of place that can be improved database for access request Manage database access processing method, device, computer equipment and the storage medium of efficiency.
A kind of database access processing method, which comprises
The access request message for requesting access to database is received, access request message carries user identity information;
Inquire preset user filtering device;
User identity information is calculated using user filtering device, obtains user fingerprints corresponding with user identity information Information;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint Match;
When fingerprint matching result is consistent, access request message is responded, corresponding request is obtained from database to be visited Data.
In one of the embodiments, before the step of receiving the access request message for requesting access to database, Further include:
The data acquisition message for carrying user identity information is received, data acquisition message is for requesting from preset caching Obtain corresponding data to be obtained;Execute the step of inquiring preset user filtering device;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is being subjected to fingerprint After the step of matching, further includes: when fingerprint matching result is consistent, obtain message from response data, the acquisition pair from caching The data to be obtained answered.
In one of the embodiments, when fingerprint matching result is consistent, message is obtained from response data, is obtained from caching The step of taking corresponding data to be obtained include:
Data to be obtained are inquired in the buffer according to data acquisition message;
When query result in the buffer is empty, access request message is generated according to data acquisition message.
In one of the embodiments, before the step of inquiring preset user filtering device, further includes:
Determine the user identity information for meeting request response condition;
According to the business demand of the corresponding affiliated operation system of database to be visited, the user for meeting request response condition is marked Know information to classify;
Corresponding user fingerprints mapping condition is determined according to sorted user identity information;
According to sorted user identity information and user fingerprints mapping condition, corresponding user information fingerprint is obtained;
According to user fingerprints mapping condition and corresponding user information fingerprint, user filtering device is obtained.
In one of the embodiments, according to user fingerprints mapping condition and corresponding user information fingerprint, user is obtained The step of filter includes:
According to user fingerprints mapping condition and corresponding user information fingerprint, each sub- filter is constructed;
According to preset combination condition, each sub- filter is combined, user filtering device is obtained.
In one of the embodiments, when fingerprint matching result is consistent, access request message is responded, from data to be visited The step of corresponding request data is obtained in library include:
When fingerprint matching result is consistent, data to be visited are determined according to the corresponding access request message of user information fingerprint Library;
Inquire database to be visited;
According to access request message, the acquisition request data from database to be visited.
In one of the embodiments, after the step of receiving the access request message for requesting access to database, Further include:
Access request message is recorded into preset visitation frequency table, visitation frequency table record access request message is corresponding The database access frequency of user;
When the database access frequency meets default abnormality detection condition, code is carried out to access request message and is examined extremely It surveys;
When abnormality detection result is normal, into the step of inquiring preset user filtering device;Otherwise, interrupt response is visited It asks request message, and returns to abnormal prompt message.
A kind of database access processing unit, described device include:
Request message receiving module, for receiving the access request message for requesting access to database, access request disappears Breath carries user identity information;
Filter enquiry module, for inquiring preset user filtering device;
User fingerprints determining module is obtained and user for being calculated user identity information using user filtering device The corresponding user information fingerprint of identification information;
Fingerprint matching module, for believing the user for meeting request response condition in user information fingerprint and user filtering device It ceases fingerprint and carries out fingerprint matching;
Ask respond module, for access request message being responded, from database to be visited when fingerprint matching result is consistent It is middle to obtain corresponding request data.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
The access request message for requesting access to database is received, access request message carries user identity information;
Inquire preset user filtering device;
User identity information is calculated using user filtering device, obtains user fingerprints corresponding with user identity information Information;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint Match;
When fingerprint matching result is consistent, access request message is responded, corresponding request is obtained from database to be visited Data.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
The access request message for requesting access to database is received, access request message carries user identity information;
Inquire preset user filtering device;
User identity information is calculated using user filtering device, obtains user fingerprints corresponding with user identity information Information;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint Match;
When fingerprint matching result is consistent, access request message is responded, corresponding request is obtained from database to be visited Data.
Above-mentioned database access processing method, device, computer equipment and storage medium, according to preset user filtering device The corresponding user information fingerprint of received access request message is calculated, and will be in the user information fingerprint and user filtering device The user information fingerprint of the satisfaction request response condition of record carries out fingerprint matching, when fingerprint matching result is consistent, response pair The access request message answered realizes the quick filtering to access request message, improves database for the place of access request Manage efficiency.
Detailed description of the invention
Fig. 1 is the application scenario diagram of database access processing method in one embodiment;
Fig. 2 is the flow diagram of database access processing method in one embodiment;
Fig. 3 is flow diagram the step of constructing user filtering device in one embodiment;
Fig. 4 is the flow diagram of database access processing method in another embodiment;
Fig. 5 is the structural block diagram of database access processing unit in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Database access processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, Terminal 102 is communicated with server 104 by network by network.Terminal 102 sends the access for carrying user identity information Request message, the access request message is for requesting access to database, when server 104 receives access request message, according to The corresponding user information fingerprint of received access request message is calculated in preset user filtering device, and the user information is referred to The user information fingerprint of the satisfaction request response condition recorded in line and user filtering device carries out fingerprint matching, when fingerprint matching knot When fruit is consistent, corresponding access request message is responded, corresponding request data is obtained from database to be visited, it finally will request Data distributing is to terminal 102.Wherein, terminal 102 can be, but not limited to be various personal computers, laptop, intelligent hand Machine, tablet computer and portable wearable device, server 104 can be formed with the either multiple servers of independent server Server cluster realize.
In one embodiment, as shown in Fig. 2, providing a kind of database access processing method, it is applied in this way It is illustrated for server 104 in Fig. 1, comprising the following steps:
Step S201: receiving the access request message for requesting access to database, and access request message carries user's mark Know information.
Wherein, the message for requesting access to database that access request message can send for terminal 102, carries User identity information, user identity information can be, but not limited to for user account, terminals physical address etc. it is corresponding with terminal user User's characteristic information.Generally, when obtaining data, can first inquire the data in the buffer, if caching in check in as a result, Required data are then directly obtained from caching, if required data are not present in caching, are further inquired and are corresponded to from database Data.By the caching technology, it can will read frequent data and be synchronized in caching, to avoid frequent access database, delay Solve the reading pressure of database.In the present embodiment, access request message can be to generate after failed to caching query data To database request access message.
Step S203: preset user filtering device is inquired.
User filtering device is for being filtered the message for requesting access to database or access cache, for being unsatisfactory for Preset condition directly interrupts its request such as the message that the terminal user not in response user list issues.User filtering Device can be correspondingly arranged according to the business demand of each database combination operation system, can be, but not limited to include preset satisfaction Terminal user's list of response condition.
In specific implementation, user filtering device can be Bloom filter, be a very long binary vector and one Serial random mapping function, Bloom filter can be used for retrieving an element whether in a set.Compared to others Data structure, Bloom filter have a big advantage in terms of room and time, Bloom filter memory space and are inserted into/look into Asking the time is all constant.Moreover, the Hash function used in Bloom filter is not related between each other, it is convenient by hardware concurrent It realizes, while Bloom filter does not need storage element itself, it is advantageous in the certain pairs of very strict occasions of security requirements.It is logical Cross the quick filtering for the terminal user that Bloom filter may be implemented to transmission access request message, it is ensured that the place of user filtering Manage efficiency.
Step S205: calculating user identity information using user filtering device, obtains corresponding with user identity information User fingerprints information.
Wherein, user fingerprints information is to be calculated according to the mapping algorithm in user filtering device in conjunction with user identity information It arrives, by carrying out pair the user fingerprints information in the corresponding user fingerprints information of user identity information and response user list Than that can determine whether the corresponding terminal user of user identity information is the terminal user responded in user list.Specifically, it looks into Ask after obtaining preset user filtering device, user identity information calculated by user filtering device, thus obtain with The corresponding user fingerprints information of family identification information.
In a particular application, user filtering device can be Bloom filter, then the mapping algorithm in Bloom filter can be with Including Hash function, the terminal user of response condition can be preset according in Bloom filter for satisfaction by responding user list The user fingerprints information set that Hash function is calculated.When being calculated using user filtering device user identity information, User identity information can be calculated according to Hash function, obtain user fingerprints information corresponding with user identity information.
Step S207: will meet in user information fingerprint and user filtering device the user information fingerprint of request response condition into Row fingerprint matching.
It is calculated after the corresponding user information fingerprint of user identity information extracted in access request message, by the use The user information fingerprint for meeting request response condition in family information fingerprint and user filtering device carries out fingerprint matching, so that judgement should Whether whether the corresponding terminal traffic user of user identity information meets default request response condition, i.e., be in response user list Terminal traffic user.In the concrete realization, it when user filtering device is Bloom filter, can will be calculated according to Hash function The user information fingerprint for meeting request response condition in obtained user information fingerprint and Bloom filter compares verification, real Now to the fingerprint matching of user information fingerprint.
Step S209: when fingerprint matching result is consistent, responding access request message, the acquisition pair from database to be visited The request data answered.
If fingerprint matching result is consistent, show that the corresponding terminal user of user identity information meets request response condition, Corresponding access request message is then responded, obtains corresponding request data from database to be visited, and by the number of request of acquisition According to the terminal for being back to transmission access request message.On the other hand, if fingerprint matching result is inconsistent, show corresponding end End subscriber is unsatisfactory for request response condition, then directly interrupts corresponding access request message, it is avoided to treat the reading of access data Take access.
In above-mentioned database access processing method, received access request is calculated according to preset user filtering device and is disappeared Corresponding user information fingerprint is ceased, and the satisfaction recorded in the user information fingerprint and user filtering device is requested into response condition User information fingerprint carries out fingerprint matching and responds corresponding access request message when fingerprint matching result is consistent, realizes pair The quick filtering of access request message improves database for the treatment effeciency of access request.
In one embodiment, it before the step of receiving the access request message for requesting access to database, also wraps It includes: receiving the data acquisition message for carrying user identity information, data acquisition message is obtained from preset caching for requesting Corresponding data to be obtained;Execute the step of inquiring preset user filtering device;By user information fingerprint and user filtering device After the step of middle user information fingerprint for meeting request response condition carries out fingerprint matching, further includes: when fingerprint matching result When consistent, message is obtained from response data, corresponding data to be obtained are obtained from caching.
User filtering device is used to be filtered the message for requesting access to database or access cache, i.e. user filtering Device can both carry out user filtering before access cache, and user filtering can also be carried out before database to be visited.Specifically answering User filtering device can be only arranged in used time before caching or before database, can also be arranged before caching and before database simultaneously Different user filtering device, to realize the classified filtering to user.
In the present embodiment, receiving for requesting the data for obtaining corresponding data to be obtained from preset caching to obtain When taking message, the user identity information of its carrying is extracted from the data acquisition message, and inquires preset user filtering device.Again The user identity information extracted in data acquisition message is calculated using the user filtering device that inquiry obtains, is obtained and user Then the corresponding user fingerprints information of identification information will meet request response condition in user information fingerprint and user filtering device User information fingerprint carries out fingerprint matching, judges whether the corresponding terminal traffic user of the user identity information meets default request Whether response condition is the terminal traffic user responded in user list.If fingerprint matching result is consistent, show that user marks Know the corresponding terminal user of information and meet request response condition, then responds corresponding data acquisition message, the acquisition pair from caching The data to be obtained answered, and the request data of acquisition is back to the terminal for sending access request message.If matching result is different It causes, then shows that corresponding terminal user is unsatisfactory for request response condition, then directly interrupt corresponding data acquisition message, avoid it To the read access of caching, while also avoiding the subsequent read access for treating access data.
In the present embodiment, before data acquisition message request access cache, disappeared by the acquisition of user filtering device combined data Breath judges whether its corresponding terminal user meets request response condition, to realize before access cache to terminal user's Filtering, can effectively avoid the rogue attacks of illegal terminal user, it is ensured that the normal operation of caching and database.
In one embodiment, when fingerprint matching result is consistent, message is obtained from response data, the acquisition pair from caching The step of data to be obtained answered includes: to inquire data to be obtained in the buffer according to data acquisition message;When in the buffer When query result is empty, access request message is generated according to data acquisition message.
After data acquisition message request passes through the user filtering device before caching, it is judged as that responding the data acquisition message asks When asking, corresponding data to be obtained are inquired according to the data acquisition message request in the buffer, if successful inquiring in the buffer, The data to be obtained of acquisition are back to terminal;If query result in the buffer is empty, that is, show required number to be obtained It according to not being synchronized in caching, needs to access database and is inquired, then access request message is generated according to data acquisition message, The carrying user identity information, for requesting access to database.If there are required data to be obtained in the database, from number According to the data to be obtained are returned in library to terminal, further, it is also possible to the data to be obtained are synchronized in caching, so as to subsequent fast Fast reading takes calling.
In the present embodiment, response data is obtained in message process, if in caching there is no needed for data acquisition message to When obtaining data, access request message is generated to access the data to be obtained needed for database is read, it is ensured that data acquisition The inquiry and return of required data to be obtained in message.
It in one embodiment, further include building as shown in figure 3, before the step of inquiring preset user filtering device It the step of user filtering device, specifically includes:
Step S301: the user identity information for meeting request response condition is determined.
User filtering device is for being filtered the message for requesting access to database or access cache comprising meets Request terminal user's list of response condition.In the present embodiment, user filtering device includes user fingerprints mapping condition, and according to The use that user fingerprints mapping condition user identity information corresponding with the request terminal user of response condition is met is calculated Family information fingerprint set.When constructing user filtering device, the user identity information for meeting request response condition is first determined.Wherein, Request response condition is set according to operation system for each terminal user, and such as requesting response condition can be to have become function registration Terminal user, and record the corresponding user identity information of terminal user.
Step S303: according to the business demand of the corresponding affiliated operation system of database to be visited, it will meet and request response item The user identity information of part is classified.
It for different business systems, may include a variety of different business demands, can be directed to according to each business demand Property the corresponding user filtering device of building, to realize the multistage filtering to terminal user.Specifically, it is corresponding to inquire database to be visited The business demand of affiliated operation system, business demand can be, but not limited to pass through the body to terminal user for user identity rank Whether part is responsible consumer judgement, to classify to terminal user.In the present embodiment, according to the business demand of operation system, To meet request response condition the corresponding terminal user of user identity information classify, it is subsequent can be according to use of all categories Corresponding user filtering device is arranged in family identification information, realizes the multistage filtering to terminal user.
Step S305: corresponding user fingerprints mapping condition is determined according to sorted user identity information.
After classifying to the user identity information for meeting request response condition, according to sorted user identity information Determine corresponding user fingerprints mapping condition.Wherein, user fingerprints mapping condition is used for the calculating of user information fingerprint, can be with For mapping function, such as Hash function, user identity information can be mapped to obtain corresponding user information by Hash function and referred to Line.In specific implementation, if the user filtering device of building is Bloom filter, user fingerprints mapping condition is Hash function, then Its corresponding user information fingerprint can be calculated by Hash function according to the user identity information for meeting request response condition, and The corresponding storage location of Bloom filter is set to 1, to obtain a binary vector.The binary vector has recorded satisfaction The corresponding user information fingerprint of user identity information of request response condition may be implemented by the binary vector to user The fingerprint matching of information fingerprint, to realize the user filtering function of user filtering device.
Step S307: according to sorted user identity information and user fingerprints mapping condition, corresponding user's letter is obtained Cease fingerprint.
After determining user fingerprints mapping condition, it is based on the user fingerprints mapping condition, calculates sorted user identifier letter Cease corresponding user information fingerprint.After user information fingerprint is summarized, the available terminal user for meeting request response condition User information fingerprint set fingerprint matching can be carried out by the user information fingerprint set, with judge issue access request Whether the corresponding terminal user of message meets request response condition.
Step S309: according to user fingerprints mapping condition and corresponding user information fingerprint, user filtering device is obtained.
User filtering device includes user fingerprints mapping condition and is rung according to the user fingerprints mapping condition and satisfaction request The user information fingerprint set for answering the corresponding user identity information of the terminal user of condition to be calculated.Specifically, expired After the corresponding user information fingerprint of terminal user of foot request response condition, the user information fingerprint can be summarized to obtain user Information fingerprint set, which can be binary vector, then pass through the user information fingerprint set and use Family fingerprint mapping condition, building obtain corresponding user filtering device.Obtained user filtering device can be mapped based on user fingerprints Condition calculates the corresponding user fingerprints information of user identity information in the access request message that receives, and by the user fingerprints Information user information fingerprint set corresponding with the request terminal user of response condition is met carries out fingerprint matching, realizes to terminal The user filtering of user.
In one embodiment, according to user fingerprints mapping condition and corresponding user information fingerprint, user filtering is obtained The step of device includes: to construct each sub- filter according to user fingerprints mapping condition and corresponding user information fingerprint;According to default Combination condition, each sub- filter is combined, user filtering device is obtained.
The number of user filtering device can be correspondingly arranged according to the actual business demand of operation system.In the present embodiment, when According to business demand, the user identity information for meeting request response condition is classified into the user identity information for obtaining several classifications Afterwards, corresponding user fingerprints mapping condition is determined according to user identity information of all categories, further constructs corresponding sub- filtering Device.Specifically, the user information fingerprint of classification is corresponded to according to user fingerprints mapping condition and the user fingerprints mapping condition, Corresponding sub- filter is constructed, each sub- filter is combined according still further to preset combination condition, obtains user filtering device.Its In, the combination condition of sub- filter can be configured according to the corresponding business demand of user identity information of all categories, be passed through The combination condition can determine the filtering sequence of each sub- filter, and finally combination obtains complete user filtering device.
In the present embodiment, corresponding sub- filter is constructed for different business demand, and each sub- filter is combined to obtain Complete user filtering device, may be implemented the diversified facilities of filter, carry out stratification processing to business demand, can be effective Improve the treatment effeciency of database access.
In one embodiment, when fingerprint matching result is consistent, access request message is responded, from database to be visited The step of obtaining corresponding request data includes: when fingerprint matching result is consistent, according to the corresponding access of user information fingerprint Request message determines database to be visited;Inquire database to be visited;According to access request message, obtained from database to be visited Take request data.
When carrying out user filtering to the corresponding terminal user of the access request message of receiving by user filtering device, according to Meet in the user information fingerprint and user filtering device that the user identity information extracted in access request message is calculated and requests When the fingerprint matching result of the user information fingerprint of response condition is inconsistent, show the corresponding terminal user of the user identity information For illegal user, then the access request is directly interrupted.If fingerprint matching result is consistent, show that the user identity information is corresponding Terminal user meet request response condition, be legitimate user, then respond its access request.Specifically, referred to according to user information The corresponding access request message of line determines database to be visited, and the acquisition request data from the database to be visited.Ask After seeking data, which can be back to terminal.
In one embodiment, it after the step of receiving the access request message for requesting access to database, also wraps It includes: access request message is recorded into preset visitation frequency table, visitation frequency table record access request message corresponds to user The database access frequency;When the database access frequency meets default abnormality detection condition, is carried out to access request message generation Code abnormality detection;When abnormality detection result is normal, into the step of inquiring preset user filtering device;Otherwise, it interrupts and rings Access request message is answered, and returns to abnormal prompt message.
Terminal user is carried out except through user filtering device to count the number of terminal user except legitimacy filtering According to library access frequency, judge whether counterpart terminal user is malicious access according to the database access frequency, such as a certain terminal The database access frequency of user is increased sharply suddenly, then shows that the terminal user may attempted to attack data by virus control If library can interrupt the access request of the terminal user judge terminal user for malicious access, and feed back interruption prompt and disappear Breath carries out checking and killing virus processing with prompt terminal.
Specifically, after receiving the access request message for requesting access to database, access request message is recorded To in preset visitation frequency table, which corresponds to the database access frequency of user, when When monitoring that the data access frequency meets default abnormality detection condition, when being such as more than preset Anomalous frequency threshold value, to access Request message carries out code abnormality detection.Code abnormality detection can be by the message of parsing access request message, to sentence Disconnected counterpart terminal whether virus infection.If abnormality detection result is normal, show that the access request message is normal, then executes logical Cross the step of user filtering device carries out user filtering to the corresponding terminal user of access request message;If abnormality detection result is different Chang Shi shows that the terminal for sending access request message may then interrupt the access request message, and return to exception by virus control Prompting message, the abnormal prompt message access request message that it sends for prompt terminal is abnormal, needs to carry out at checking and killing virus Reason, and access request message is retransmitted to request access to database.
In the present embodiment, by monitoring the database access frequency of same terminal user, if the database access frequency meets When default abnormality detection condition, code abnormality detection is carried out to it, with judge terminal whether virus infection, so as to send out in advance Existing malicious access request, can be avoided database and is attacked, it is ensured that the normal work of database.
In one embodiment, as shown in figure 4, providing a kind of database access processing method, comprising the following steps:
Step S401: the data acquisition message for carrying user identity information is received, data acquisition message is for requesting from pre- If caching in obtain corresponding data to be obtained;
Step S402: data to be obtained are inquired according to data acquisition message in the buffer;
Step S403: when query result in the buffer is empty, access request message is generated according to data acquisition message.
In the present embodiment, receiving for requesting the data for obtaining corresponding data to be obtained from preset caching to obtain When taking message, corresponding data to be obtained are inquired according to the data acquisition message request in the buffer, if inquiring into the buffer The data to be obtained of acquisition are then back to terminal by function;If query result in the buffer is empty, that is, show required wait obtain Access needs to access database and is inquired according to not being synchronized in caching, then generates access request according to data acquisition message Message, the carrying user identity information, for requesting access to database.
Step S404: receiving the access request message for requesting access to database, and access request message carries user's mark Know information;
Step S405: access request message is recorded into preset visitation frequency table, and visitation frequency table record access is asked Message is asked to correspond to the database access frequency of user;
Step S406: when the database access frequency meets default abnormality detection condition, is carried out to access request message generation Code abnormality detection.
In the present embodiment, terminal user is carried out except through user filtering device also to pass through statistics except legitimacy filtering The database access frequency of terminal user judges whether counterpart terminal user is that malice is visited according to the database access frequency It asks.Specifically, after receiving the access request message for requesting access to database, access request message is recorded to default Visitation frequency table in, which corresponds to the database access frequency of user, when monitoring When the data access frequency meets default abnormality detection condition, when being such as more than preset Anomalous frequency threshold value, disappear to access request Breath carries out code abnormality detection.
If abnormality detection result is normal, show that the access request message is normal, then executes and pass through user filtering device pair The step of corresponding terminal user of access request message carries out user filtering;If abnormality detection result is abnormal, show to send The terminal of access request message may then interrupt the access request message by virus control, and return to abnormal prompt message, abnormal The prompting message access request message that it sends for prompt terminal is abnormal, needs to carry out checking and killing virus processing, and retransmit Access request message is to request access to database.
By monitoring the database access frequency of same terminal user, if the database access frequency meets default abnormality detection When condition, code abnormality detection is carried out to it, with judge terminal whether virus infection, so as to find that malicious access is asked in advance It asks, can be avoided database and attacked, it is ensured that the normal work of database.
Step S407: when abnormality detection result is normal, preset user filtering device is inquired;
Step S408: calculating user identity information using user filtering device, obtains corresponding with user identity information User fingerprints information;
Step S409: will meet in user information fingerprint and user filtering device the user information fingerprint of request response condition into Row fingerprint matching;
Step S410: it when fingerprint matching result is consistent, is determined according to the corresponding access request message of user information fingerprint Database to be visited;
Step S411: database to be visited is inquired;
Step S412: according to access request message, the acquisition request data from database to be visited.
When abnormality detection result is normal, show that the access request message is normal, then executes and pass through user filtering device pair The step of corresponding terminal user of access request message carries out user filtering.Specifically, preset user filtering device, this reality are inquired It applies in example, user filtering device is Bloom filter, and the mapping algorithm in Bloom filter may include Hash function, responds user The user that list can be calculated to meet the terminal user of default response condition according to the Hash function in Bloom filter Set of fingerprint information.User identity information is calculated according to Hash function, obtains user corresponding with user identity information Finger print information, and request response condition will be met in the user information fingerprint being calculated according to Hash function and Bloom filter User information fingerprint compare verification, realize the fingerprint matching to user information fingerprint.
If fingerprint matching result is consistent, show that the corresponding terminal user of user identity information meets request response condition, Corresponding access request message is then responded, corresponding request data is obtained from database to be visited, specifically, comprising: according to The corresponding access request message of user information fingerprint determines database to be visited;Inquire database to be visited;According to access request Message, the acquisition request data from database to be visited.The request data of acquisition is finally back to transmission access request message Terminal.If fingerprint matching result is inconsistent, show corresponding terminal user be unsatisfactory for request response condition, then directly in Break corresponding access request message, it is avoided to treat the read access of access data.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of database access processing unit, comprising: request message connects Receive module 501, filter enquiry module 503, user fingerprints determining module 505, fingerprint matching module 507 and ask respond module 509, in which:
Request message receiving module 501, for receiving the access request message for requesting access to database, access request Message carries user identity information;
Filter enquiry module 503, for inquiring preset user filtering device;
User fingerprints determining module 505 is obtained and is used for being calculated using user filtering device user identity information The corresponding user information fingerprint of family identification information;
Fingerprint matching module 507, for the use of request response condition will to be met in user information fingerprint and user filtering device Family information fingerprint carries out fingerprint matching;
Ask respond module 509, for access request message being responded, from number to be visited when fingerprint matching result is consistent According to obtaining corresponding request data in library.
Above-mentioned database access processing unit is calculated by user fingerprints determining module according to preset user filtering device The corresponding user information fingerprint of received access request message, and by fingerprint matching module by the user information fingerprint and user The user information fingerprint of the satisfaction request response condition recorded in filter carries out fingerprint matching, by ask respond module in fingerprint When matching result is consistent, corresponding access request message is responded, the quick filtering to access request message is realized, improves number According to library for the treatment effeciency of access request.
It in one embodiment, further include data acquisition message module and caching respond module, in which: data acquisition message Module, for receiving the data acquisition message for carrying user identity information, data acquisition message is for requesting from preset caching It is middle to obtain corresponding data to be obtained, execute the step of inquiring preset user filtering device;Cache responses module, for working as fingerprint When matching result is consistent, message is obtained from response data, corresponding data to be obtained are obtained from caching.
In one embodiment, cache responses module includes caching query unit and access request generation unit, in which: slow Query unit is deposited, for inquiring data to be obtained in the buffer according to data acquisition message;Access request generation unit, for working as When query result in the buffer is empty, access request message is generated according to data acquisition message.
It in one embodiment, further include that user identifier determining module, user identifier categorization module, fingerprint mapping condition are true Cover half block, fingerprint computing module and filter construct module, in which: user identifier determining module, for determining that meeting request rings Answer the user identity information of condition;User identifier categorization module, for according to the corresponding affiliated operation system of database to be visited Business demand classifies the user identity information for meeting request response condition;Fingerprint mapping condition determining module is used for root Corresponding user fingerprints mapping condition is determined according to sorted user identity information;Fingerprint computing module, after according to classification User identity information and user fingerprints mapping condition, obtain corresponding user information fingerprint;Filter constructs module, is used for root According to user fingerprints mapping condition and corresponding user information fingerprint, user filtering device is obtained.
In one embodiment, filter building module includes sub- filter construction unit and filter construction unit, In: sub- filter construction unit, for constructing each sub- filtering according to user fingerprints mapping condition and corresponding user information fingerprint Device;Filter construction unit, for each sub- filter being combined, user filtering device is obtained according to preset combination condition.
In one embodiment, ask respond module 509 includes database determination unit, data base querying unit and data Library access unit, in which: database determination unit, for being corresponded to according to user information fingerprint when fingerprint matching result is consistent Access request message determine database to be visited;Data base querying unit, for inquiring database to be visited;Database access Unit is used for according to access request message, the acquisition request data from database to be visited.
It in one embodiment, further include visitation frequency logging modle, code abnormality detection module and testing result feedback Module, in which: visitation frequency logging modle, for recording access request message into preset visitation frequency table, access frequency Secondary table record access request message corresponds to the database access frequency of user;Code abnormality detection module, for being visited when database When asking that the frequency meets default abnormality detection condition, code abnormality detection is carried out to access request message;Testing result feedback module, For when abnormality detection result be it is normal when, into inquire preset user filtering device the step of;Otherwise, interrupt response access is asked Message is sought, and returns to abnormal prompt message.
Specific restriction about database access processing unit may refer to above for database access processing method Restriction, details are not described herein.Modules in above-mentioned database access processing unit can be fully or partially through software, hard Part and combinations thereof is realized.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, It can also be stored in a software form in the memory in computer equipment, execute the above modules in order to which processor calls Corresponding operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment includes processor, memory and the network interface connected by system bus. Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system and computer program.The built-in storage Operation for operating system and computer program in non-volatile memory medium provides environment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize a kind of database when the computer program is executed by processor Access processing method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of when executing computer program
The access request message for requesting access to database is received, access request message carries user identity information;
Inquire preset user filtering device;
User identity information is calculated using user filtering device, obtains user fingerprints corresponding with user identity information Information;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint Match;
When fingerprint matching result is consistent, access request message is responded, corresponding request is obtained from database to be visited Data.
In one embodiment, reception is also performed the steps of when processor executes computer program carries user identifier The data acquisition message of information, data acquisition message obtain corresponding data to be obtained for requesting from preset caching;It holds Row inquires the step of preset user filtering device;When fingerprint matching result is consistent, message is obtained from response data, from caching Obtain corresponding data to be obtained.
In one embodiment, it also performs the steps of when processor executes computer program according to data acquisition message Data to be obtained are inquired in the buffer;When query result in the buffer is empty, access is generated according to data acquisition message and is asked Seek message.
In one embodiment, it is also performed the steps of when processor executes computer program and determines that meeting request responds The user identity information of condition;According to the business demand of the corresponding affiliated operation system of database to be visited, request response will be met The user identity information of condition is classified;Corresponding user fingerprints mapping item is determined according to sorted user identity information Part;According to sorted user identity information and user fingerprints mapping condition, corresponding user information fingerprint is obtained;According to user Fingerprint mapping condition and corresponding user information fingerprint, obtain user filtering device.
In one embodiment, it also performs the steps of when processor executes computer program and is mapped according to user fingerprints Condition and corresponding user information fingerprint construct each sub- filter;According to preset combination condition, each sub- filter is subjected to group It closes, obtains user filtering device.
In one embodiment, it also performs the steps of when processor executes computer program when fingerprint matching result one When cause, database to be visited is determined according to the corresponding access request message of user information fingerprint;Inquire database to be visited;According to Access request message, the acquisition request data from database to be visited.
In one embodiment, it is also performed the steps of when processor executes computer program and remembers access request message Into preset visitation frequency table, visitation frequency table record access request message corresponds to the database access frequency of user for record;When When the database access frequency meets default abnormality detection condition, code abnormality detection is carried out to access request message;When abnormal inspection When survey result is normal, into the step of inquiring preset user filtering device;Otherwise, interrupt response access request message, and return Return abnormal prompt message.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
The access request message for requesting access to database is received, access request message carries user identity information;
Inquire preset user filtering device;
User identity information is calculated using user filtering device, obtains user fingerprints corresponding with user identity information Information;
The user information fingerprint for meeting request response condition in user information fingerprint and user filtering device is subjected to fingerprint Match;
When fingerprint matching result is consistent, access request message is responded, corresponding request is obtained from database to be visited Data.
In one embodiment, reception is also performed the steps of when computer program is executed by processor carries user's mark Know the data acquisition message of information, data acquisition message obtains corresponding data to be obtained for requesting from preset caching; Execute the step of inquiring preset user filtering device;When fingerprint matching result is consistent, message is obtained from response data, from caching It is middle to obtain corresponding data to be obtained.
In one embodiment, it also performs the steps of when computer program is executed by processor and is disappeared according to data acquisition Breath inquires data to be obtained in the buffer;When query result in the buffer is empty, is generated and accessed according to data acquisition message Request message.
In one embodiment, it is also performed the steps of when computer program is executed by processor and determines that meeting request rings Answer the user identity information of condition;According to the business demand of the corresponding affiliated operation system of database to be visited, request will be met and rung The user identity information of condition is answered to classify;Corresponding user fingerprints mapping item is determined according to sorted user identity information Part;According to sorted user identity information and user fingerprints mapping condition, corresponding user information fingerprint is obtained;According to user Fingerprint mapping condition and corresponding user information fingerprint, obtain user filtering device.
In one embodiment, it also performs the steps of when computer program is executed by processor and is reflected according to user fingerprints Condition and corresponding user information fingerprint are penetrated, each sub- filter is constructed;According to preset combination condition, each sub- filter is carried out Combination, obtains user filtering device.
In one embodiment, it also performs the steps of when computer program is executed by processor when fingerprint matching result When consistent, database to be visited is determined according to the corresponding access request message of user information fingerprint;Inquire database to be visited;Root According to access request message, the acquisition request data from database to be visited.
In one embodiment, it also performs the steps of when computer program is executed by processor by access request message For record into preset visitation frequency table, visitation frequency table record access request message corresponds to the database access frequency of user; When the database access frequency meets default abnormality detection condition, code abnormality detection is carried out to access request message;Work as exception When testing result is normal, into the step of inquiring preset user filtering device;Otherwise, interrupt response access request message, and Return to abnormal prompt message.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of database access processing method, which comprises
The access request message for requesting access to database is received, the access request message carries user identity information;
Inquire preset user filtering device;
The user identity information is calculated using the user filtering device, is obtained corresponding with the user identity information User fingerprints information;
The user information fingerprint is referred to the user information fingerprint for meeting request response condition in the user filtering device Line matching;
When fingerprint matching result is consistent, the access request message is responded, corresponding request is obtained from database to be visited Data.
2. the method according to claim 1, wherein being asked in the reception for requesting access to the access of database Before the step of seeking message, further includes:
The data acquisition message for carrying the user identity information is received, the data acquisition message is for requesting from preset slow Deposit the corresponding data to be obtained of middle acquisition;The step of executing the inquiry preset user filtering device;
In the user information fingerprint that will meet request response condition in the user information fingerprint and the user filtering device After the step of carrying out fingerprint matching, further includes: when fingerprint matching result is consistent, from responding the data acquisition message, from Corresponding data to be obtained are obtained in the caching.
3. according to the method described in claim 2, it is characterized in that, described when fingerprint matching result is consistent, described in response Data acquisition message, the step of obtaining corresponding data to be obtained from the caching include:
The data to be obtained are inquired in the caching according to the data acquisition message;
When the query result in the caching is empty, the access request message is generated according to the data acquisition message.
4. the method according to claim 1, wherein the inquiry preset user filtering device the step of it Before, further includes:
Determine the user identity information for meeting request response condition;
According to the business demand of the corresponding affiliated operation system of the database to be visited, the user for meeting request response condition is marked Know information to classify;
The corresponding user fingerprints mapping condition is determined according to sorted user identity information;
According to the sorted user identity information and the user fingerprints mapping condition, obtains corresponding user information and refer to Line;
According to the user fingerprints mapping condition and the corresponding user information fingerprint, the user filtering device is obtained.
5. according to the method described in claim 4, it is characterized in that, described according to the user fingerprints mapping condition and described right The user information fingerprint answered, the step of obtaining the user filtering device include:
According to the user fingerprints mapping condition and the corresponding user information fingerprint, each sub- filter is constructed;
According to preset combination condition, each sub- filter is combined, the user filtering device is obtained.
6. according to claim 1 to method described in 5 any one, which is characterized in that it is described when fingerprint matching result is consistent, The step of responding the access request message, obtaining corresponding request data from database to be visited include:
When fingerprint matching result is consistent, according to the corresponding access request message of the user information fingerprint determine it is described to Access database;
Inquire the database to be visited;
According to the access request message, the request data is obtained from the database to be visited.
7. according to the method described in claim 6, it is characterized in that, disappearing receiving for requesting access to the access request of database After the step of breath, further includes:
The access request message is recorded into preset visitation frequency table, the visitation frequency table records the access request Message corresponds to the database access frequency of user;
When the database access frequency meets default abnormality detection condition, it is abnormal that code is carried out to the access request message Detection;
When abnormality detection result is normal, the step of into the inquiry preset user filtering device;Otherwise, interrupt response institute Access request message is stated, and returns to abnormal prompt message.
8. a kind of database access processing unit, which is characterized in that described device includes:
Request message receiving module, for receiving the access request message for requesting access to database, the access request disappears Breath carries user identity information;
Filter enquiry module, for inquiring preset user filtering device;
User fingerprints determining module, for being calculated the user identity information using the user filtering device, obtain with The corresponding user information fingerprint of the user identity information;
Fingerprint matching module, for the use of request response condition will to be met in the user information fingerprint and the user filtering device Family information fingerprint carries out fingerprint matching;
Ask respond module, for the access request message being responded, from database to be visited when fingerprint matching result is consistent It is middle to obtain corresponding request data.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811122924.3A 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium Active CN109299147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811122924.3A CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811122924.3A CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109299147A true CN109299147A (en) 2019-02-01
CN109299147B CN109299147B (en) 2024-04-05

Family

ID=65164156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811122924.3A Active CN109299147B (en) 2018-09-26 2018-09-26 Database access processing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109299147B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008681A (en) * 2019-03-12 2019-07-12 阿里巴巴集团控股有限公司 Access control method, equipment and system
CN110162529A (en) * 2019-05-27 2019-08-23 广州华多网络科技有限公司 A kind of data processing method, service server and data processing system
CN110210251A (en) * 2019-06-17 2019-09-06 阿里巴巴集团控股有限公司 Data query method, apparatus, equipment and computer readable storage medium
CN113806131A (en) * 2021-09-23 2021-12-17 深圳市元征软件开发有限公司 Access control method and device for fault code library, electronic equipment and storage medium
CN115085957A (en) * 2021-03-12 2022-09-20 中国电信股份有限公司 Malicious access data determination method, device, medium and electronic equipment
CN116186767A (en) * 2023-01-12 2023-05-30 北京万里开源软件有限公司 Method and device for marking row level in database

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891826A (en) * 2011-06-27 2013-01-23 成都市华为赛门铁克科技有限公司 Control method, equipment and system for webpage access
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104572727A (en) * 2013-10-22 2015-04-29 阿里巴巴集团控股有限公司 Data querying method and device
US20150370906A1 (en) * 2014-06-18 2015-12-24 Electronics And Telecommunications Research Institute System and method for mapping identifier with locator using bloom filter
CN106161451A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 The method of defence CC attack, Apparatus and system
CN107888659A (en) * 2017-10-12 2018-04-06 北京京东尚科信息技术有限公司 The processing method and system of user's request
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891826A (en) * 2011-06-27 2013-01-23 成都市华为赛门铁克科技有限公司 Control method, equipment and system for webpage access
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104572727A (en) * 2013-10-22 2015-04-29 阿里巴巴集团控股有限公司 Data querying method and device
US20150370906A1 (en) * 2014-06-18 2015-12-24 Electronics And Telecommunications Research Institute System and method for mapping identifier with locator using bloom filter
CN106161451A (en) * 2016-07-19 2016-11-23 青松智慧(北京)科技有限公司 The method of defence CC attack, Apparatus and system
CN108280365A (en) * 2017-09-19 2018-07-13 平安科技(深圳)有限公司 Data access authority management method, device, terminal device and storage medium
CN107888659A (en) * 2017-10-12 2018-04-06 北京京东尚科信息技术有限公司 The processing method and system of user's request

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
樊重俊 等: "《大数据分析与应用》", 立信会计出版社, pages: 104 - 105 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008681A (en) * 2019-03-12 2019-07-12 阿里巴巴集团控股有限公司 Access control method, equipment and system
CN110008681B (en) * 2019-03-12 2023-04-07 创新先进技术有限公司 Access control method, device and system
CN110162529A (en) * 2019-05-27 2019-08-23 广州华多网络科技有限公司 A kind of data processing method, service server and data processing system
CN110210251A (en) * 2019-06-17 2019-09-06 阿里巴巴集团控股有限公司 Data query method, apparatus, equipment and computer readable storage medium
CN115085957A (en) * 2021-03-12 2022-09-20 中国电信股份有限公司 Malicious access data determination method, device, medium and electronic equipment
CN113806131A (en) * 2021-09-23 2021-12-17 深圳市元征软件开发有限公司 Access control method and device for fault code library, electronic equipment and storage medium
CN116186767A (en) * 2023-01-12 2023-05-30 北京万里开源软件有限公司 Method and device for marking row level in database
CN116186767B (en) * 2023-01-12 2023-10-03 北京万里开源软件有限公司 Method and device for marking row level in database

Also Published As

Publication number Publication date
CN109299147B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
CN109299147A (en) Database access processing method, device, computer equipment and storage medium
CN108829781B (en) Client information query method, device, computer equipment and storage medium
CN108304704B (en) Authority control method and device, computer equipment and storage medium
CN112364311B (en) Identity management method and device on blockchain
WO2019144549A1 (en) Vulnerability testing method and device, computer equipment, and storage medium
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN110245505A (en) Tables of data access method, device, computer equipment and storage medium
KR20180052527A (en) Systems and methods to verify ownership of a telephone number and to track ownership reassignments
CN109743294A (en) Interface access control method, device, computer equipment and storage medium
CN113179266A (en) Service request processing method and device, electronic equipment and storage medium
CN110858831B (en) Safety protection method and device and safety protection equipment
CN113572793B (en) Access request capturing method and device, computer equipment and storage medium
US11552985B2 (en) Method for predicting events using a joint representation of different feature types
CN109831521B (en) Cache instance management method and device, computer equipment and storage medium
EP3048821A1 (en) User verification
CN110781500A (en) Data wind control system and method
CN113590180B (en) Detection strategy generation method and device
CN108650249A (en) POC attack detection methods, device, computer equipment and storage medium
CN111970250B (en) Method for identifying account sharing, electronic device and storage medium
CN111258860B (en) Data alarm method, device, computer equipment and storage medium
CN114244519A (en) Password verification method and device, computer equipment and storage medium
CN108108310A (en) A kind of data processing method, device and server
CN114095936A (en) Short message verification code request method, attack defense method, device, medium and equipment
CN114826777B (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN117134999B (en) Safety protection method of edge computing gateway, storage medium and gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant