CN115329395A - Database data processing method, device, system, equipment and storage medium - Google Patents

Database data processing method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN115329395A
CN115329395A CN202210950281.1A CN202210950281A CN115329395A CN 115329395 A CN115329395 A CN 115329395A CN 202210950281 A CN202210950281 A CN 202210950281A CN 115329395 A CN115329395 A CN 115329395A
Authority
CN
China
Prior art keywords
database
structured query
query statement
data
integrity protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210950281.1A
Other languages
Chinese (zh)
Inventor
李祖金
严梓成
何子君
周添伟
罗新良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Guangdong Network Construction Co Ltd
Original Assignee
Digital Guangdong Network Construction Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Guangdong Network Construction Co Ltd filed Critical Digital Guangdong Network Construction Co Ltd
Priority to CN202210950281.1A priority Critical patent/CN115329395A/en
Publication of CN115329395A publication Critical patent/CN115329395A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data processing method, a device, a system, equipment and a storage medium of a database, wherein the method comprises the following steps: loading integrity protection rules set for the database; acquiring a structured query statement received by a database connection pool; extracting original data to be subjected to integrity protection from the structured query statement according to an integrity protection rule to serve as target data; signing the target data according to the integrity protection rule to obtain authentication information; writing the authentication information into a structured query statement; and transmitting the structured query statement to a database connection pool for execution so as to write the original data and the authentication information in the database. The software development kit is independent of the service layer, the stability of the service layer is maintained, and the database connection pool is low in invasion and less in change when being accessed into the software development kit, so that the transformation difficulty is greatly reduced, and the transformation cost is reduced.

Description

Data processing method, device, system, equipment and storage medium of database
Technical Field
The present invention relates to the field of security technologies, and in particular, to a method, an apparatus, a system, a device, and a storage medium for processing data in a database.
Background
With the gradual maturity of the specifications of the passwords for the information system, the password technology is required to ensure that the sensitive data stored in the database is subjected to data integrity protection.
Many business systems do not adopt related cryptographic techniques in the initial construction stage, and third parties have malicious tampering on the database, and the tampering is difficult to perceive and affects the business.
Considering that the service system can be stably operated and used on line for a long time, if the integrity protection transformation is directly carried out on the service system through a service logic layer, not only a certain risk is caused to the stability of the service system, but also a plurality of modules and databases of the service system are involved in the transformation, the transformation difficulty is large, and the transformation cost is high.
Disclosure of Invention
The invention provides a data processing method, a data processing device, a data processing system, data processing equipment and a storage medium of a database, which aim to solve the problem that integrity protection reconstruction is carried out on a service system under the condition of considering both the stability and the reconstruction cost of the service system.
According to an aspect of the present invention, there is provided a data processing method for a database, which is applied to a software development kit configured for a database connection pool, the method including:
loading an integrity protection rule set for a database, wherein the database connection pool is connected with the database;
acquiring a structured query statement received by the database connection pool, wherein the structured query statement is used for writing original data into the database;
extracting the original data to be subjected to integrity protection from the structured query statement according to the integrity protection rule to serve as target data;
signing the target data according to the integrity protection rule to obtain authentication information;
writing the authentication information into the structured query statement;
and transmitting the structured query statement to the database connection pool for execution so as to write the original data and the authentication information in the database.
According to another aspect of the present invention, there is provided a data processing apparatus for a database, which is applied to a software development kit configured for a connection pool of the database, the apparatus including:
the rule loading module is used for loading integrity protection rules set for a database, and the database connection pool is connected with the database;
a statement acquisition module, configured to acquire a structured query statement received by the database connection pool, where the structured query statement is used to write original data into the database;
the data extraction module is used for extracting the original data to be subjected to integrity protection from the structured query statement as target data according to the integrity protection rule;
the signature module is used for signing the target data according to the integrity protection rule to obtain authentication information;
the statement rewriting module is used for writing the authentication information into the structured query statement;
and the data protection module is used for transmitting the structured query statement to the database connection pool for execution so as to write the original data and the authentication information in the database.
According to another aspect of the present invention, a data processing system of a database is provided, the system includes a database and a database connection pool connected with each other, the database connection pool is configured with a software development kit;
the database connection pool includes:
the system comprises a statement receiving module, a statement generating module and a statement sending module, wherein the statement receiving module is used for receiving a structured query statement, and the structured query statement is used for writing original data into the database;
the statement transmission module is used for transmitting the structured query statement to the software development toolkit;
the software development kit includes:
the rule loading module is used for loading integrity protection rules set for the database;
the statement acquisition module is used for acquiring the structured query statement received by the database connection pool;
the data extraction module is used for extracting the original data to be subjected to integrity protection from the structured query statement as target data according to the integrity protection rule;
the signature module is used for signing the target data according to the integrity protection rule to obtain authentication information;
the statement rewriting module is used for writing the authentication information into the structured query statement;
the data protection module is used for transmitting the structured query statement to the database connection pool;
the database connection pool further comprises:
and the statement execution module is used for executing the structured query statement so as to write the original data and the authentication information in the database.
According to another aspect of the present invention, there is provided an electronic apparatus including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the method of data processing of a database according to any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing a computer program for causing a processor to implement a data processing method of a database according to any one of the embodiments of the present invention when the computer program is executed.
The embodiment is applied to a software development kit configured for a database connection pool, and the integrity protection rule set for the database is loaded, wherein the database connection pool is connected with the database; acquiring a structured query statement received by a database connection pool, wherein the structured query statement is used for writing original data into a database; extracting original data to be integrity protected from the structured query statement according to an integrity protection rule to serve as target data; signing the target data according to the integrity protection rule to obtain authentication information; writing the authentication information into a structured query statement; and transmitting the structured query statement to a database connection pool for execution so as to write the original data and the authentication information in the database. The software development kit is independent of the service layer, integrity protection can be realized through one-time integration and one-time configuration, no transformation and no invasion are caused to the service layer, and therefore the stability of the service layer is maintained.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a data processing method of a database according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a business system according to an embodiment of the present invention;
FIG. 3 is an exemplary diagram of a rule tree provided in accordance with an embodiment of the present invention;
FIG. 4 is an exemplary diagram of a syntax tree provided in accordance with an embodiment of the present invention;
FIG. 5 is an exemplary diagram of a modified syntax tree according to an embodiment of the present invention;
FIG. 6 is a flowchart of a data processing method of a database according to a second embodiment of the present invention;
fig. 7 is a flowchart of a data processing method of a database according to a third embodiment of the present invention;
fig. 8 is a schematic structural diagram of a data processing apparatus of a database according to a fourth embodiment of the present invention;
FIG. 9 is a block diagram of a database processing system according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an electronic device implementing the data processing method of the database according to the embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
Fig. 1 is a flowchart of a data processing method for a database according to an embodiment of the present invention, where this embodiment is applicable to a case where a Software Development Kit (SDK) is configured for a database connection pool, and data to be written into the database is integrity protected by the SDK, the method may be executed by a data processing apparatus of the database, and in particular, the method is applied to the SDK configured for the database connection pool, the data processing apparatus of the database may be implemented in a hardware and/or Software form, and the data processing apparatus of the database may be configured in an electronic device.
As shown in fig. 1, the method includes:
step 101, loading integrity protection rules set for the database.
The database is configured in the service system, and the data generated by the service system is stored in the structured data table, so that various information resources are effectively managed.
The type of the database may be set according to the storage requirement of the service system, and specifically may include a relational database (such as SQLite, oracle, mySQL, and the like), a non-relational database (such as MongoDB, redis, hbase, and the like), a key-value database (such as Dynamo, levelDB, and the like), and the like.
In JDBC (Java Database Connectivity) programming, when a connection is established between a Java program and a Database, a Database side verifies a user name and a password, and allocates resources for the connection, and the Java program needs to load a connection object java.sql.connection representing the connection into a memory, so that each time a connection object connection is created and disconnected, a certain amount of time and I/O (input/output) resources are consumed, and especially, the overhead is large when a large amount of concurrent accesses are performed.
As shown in fig. 2, in order to avoid frequent creation of database connections, a database connection pool is provided, which is responsible for allocating, managing and releasing connection connections of a database, and which allows a client used by a user to reuse the connection connections of an existing database.
The method comprises the steps that a database connection pool is connected with a database during initialization, a certain number of database connection connections are created and put into the database connection pool, when a client of a user accesses the database, one database connection is applied to the database connection pool, and the client uses the database connection in the database connection pool to communicate with the database. After the use is finished, the database connection pool recovers the database connection and delivers the database connection to other threads for use, so that the times of creating and disconnecting the database connection are reduced, and the access efficiency of the database is improved.
The type of the database connection pool is different according to different requirements of the business system, and in order to make those skilled in the art better understand the embodiment, the droid is illustrated as an example of the database connection pool.
The Druid is an open source big data system designed for OLAP (on-line analytical processing) query requirements, and provides low-latency data insertion and real-time data query.
The Druid is developed by using Java, provides a Rest service of HTTP (Hyper Text Transfer Protocol) based on Jetty, and also provides a toolkit of Java/Python and other languages.
The Rruid is a cluster system, and zookeeper is used for node management and event monitoring.
On the basis that a database and database connection pool is provided in a service system, the embodiment performs secondary development through the expansibility of the database connection pool, and develops an SDK for implementing integrity protection, where the SDK may be a set of function modules for performing integrity protection operation on data in the database, and the SDK provides multiple interfaces for the database connection pool to call.
In a specific implementation, a developer may preset a mode of integrity protection for a service condition of data to be integrity protected in a database, record the service condition in a configuration file or the like, and record the service condition as an integrity protection rule, where the integrity protection rule has a prefix to identify, such as sign.
Further, integrity protection is a technical means to protect the integrity of data and to ensure that data is not tampered with by unauthorized or can be discovered quickly after tampering. When the database connection pool is started, a Software Development Kit (SDK) is loaded, and when the SDK is started, an integrity protection rule can be loaded.
And 102, acquiring the structured query statement received by the database connection pool.
When a client or a background person of a business system executes a business operation, waiting for writing Data into a database, and recording the Data as original Data for distinguishing, at this time, SQL (Structured Query Language) may be received from a database connection pool, that is, the Structured Query statement SQL may be used to write the original Data into the database, and thus the Structured Query statement SQL is a DML (Data management Language).
Writing raw data to a database may result in data changes, at which point integrity protection may be triggered.
Further, writing raw data to a database can be distinguished as inserting insert raw data to the database or updating update raw data to the database, and thus, the structured query statement SQL can be used to insert raw data to the database or update raw data to the database.
In a specific implementation, an extended interface provided by the database connection pool is determined, the extended interface is a self-defined interface reserved in the database connection pool, such as a filter event adapter (event filter adapter) interface of draid, and the database connection pool traverses a method for calling an implementation class of the extended interface when receiving a structured query statement SQL that changes data.
When the database connection pool calls the extension interface, the software development kit SDK can obtain the structured query statement SQL, which is received by the database connection pool, through the extension interface.
And 103, extracting original data to be subjected to integrity protection from the structured query statement according to an integrity protection rule to serve as target data.
And the software development tool kit SDK executes the integrity protection rule, analyzes the structured query statement SQL, identifies the original data to be subjected to integrity protection from all the original data of the structured query statement SQL, and records the original data as target data.
Illustratively, the integrity protection rule includes a form (represented by name, etc.) and a field (represented by name, etc.) to be integrity protected, and the form and the field to be integrity protected can be set by a developer according to business requirements.
Further, the information indicating the table may be a name of the table itself, or a name having a specific meaning (e.g., all tables, tables in a certain set), which is not limited in this embodiment.
The information indicating the field may be a name of the field itself, or may be a name having a specific meaning (e.g., all fields, fields in a certain set), which is not limited in this embodiment.
In general, in the integrity protection rule, a table may be identified by an independent tag, the tag may be a name of the table, and a field may also be identified by an independent tag, such as sign _ column.
Further, the tables and fields in the integrity protection rule can be represented in a tree format, and are denoted as a rule tree.
For example, as shown in fig. 3, the table to be integrity protected in the integrity protection rule includes address _ book _ person and tb _ user, the field to be integrity protected in the table address _ book _ person includes account, mobile, and certificate _ number, and the field to be integrity protected in the table tb _ user includes all, that is, all fields are integrity protected.
In this example, the structured query statement SQL is semantically and syntactically parsed based on an Abstract Syntax Tree (AST), thereby converting the structured query statement SQL into a Syntax Tree including a name of a table, a list of field names to be written (e.g., inserted, updated, etc.), and a list of values of fields to be written (e.g., inserted, updated, etc.).
For example, as shown in fig. 4, a structured query statement SQL is converted into a syntax tree, wherein the table to be operated on is tb _ user, which includes four fields, the names of the fields are id, mobile, password, and certificate _ number, respectively, and the field values are 1, 12345678912, 123456, and 987654321, respectively.
The table is searched in the syntax tree, i.e., whether there is a table whose name is the same as the table in the integrity protection rule is searched in the syntax tree.
If the table is searched, it indicates that the table is a table to be integrity protected, and at this time, a field may be further searched in the table of the syntax tree, that is, whether a field having the same name as a field in the integrity protection rule exists in a field associated with the table of the syntax tree.
If the field is searched, it indicates that the field is a field to be integrity protected, and at this time, the original data located in the field may be extracted as the target data.
In this embodiment, the form and the field to be subjected to integrity protection can be configured according to the service requirement, the flexibility is high, the integrity protection of part of the form and part of the field can be realized, and the occupation of the subsequent signature information on the storage space is reduced.
Since the services of the service systems are different, the types of the target data are also different, and this embodiment does not limit this.
Illustratively, the target data includes at least one of:
audit data and log data.
In this example, the forms and fields of the persistent audit data and the log data are different, and the structures and fields of the forms are fixed, so that the forms and fields with integrity protection can be identified in advance and added into the integrity protection rule, and the positioning of the audit data and the log data can be realized.
And 104, signing the target data according to the integrity protection rule to obtain authentication information.
And executing an integrity protection rule by the SDK, and signing the target data to obtain authentication information.
In a specific implementation, the integrity protection rule includes a sorting manner (expressed by name, ID, etc.), a signature manner (expressed by name, ID, etc.), where the signature manner may include a one-way encryption Algorithm, for example, SHA (Secure Hash Algorithm), HMAC (Hash-based Message Authentication Code), and so on, and the so-called one-way encryption may refer to only being used for data decryption and not being decrypted.
Then, the target data is sorted according to a sorting mode (for example, sorted by ascending or descending order of first letter or last letter) and the sorted target data is spliced to obtain a data sequence, and a one-way encryption operation is performed on the data sequence according to a signature mode to obtain authentication information.
In the integrity protection rule, the sorting manner and the signature manner may be identified by independent tags, or may be identified by the same tag, such as order, which is not limited in this embodiment.
For example, matching the rule tree in fig. 3 with the syntax tree in fig. 4, and the matching result indicates that all fields of the table tb _ user are integrity protected, then sorting the field id, mobile, password, and certificate _ number of the tb _ user table in ascending order of initials to obtain the data sequence certificate _ number =987654321id =1mobile =12345678912password =123456, and performing an encryption operation on the data sequence by using HMAC to obtain the authentication information 90ijf20fje f23jf09j234rf0.
And 105, writing the authentication information into the structured query statement.
If the software development kit SDK completes signing the target data, the authentication information obtained by signing may be written into the structured query statement SQL according to the specification of the structured query statement SQL, that is, the structured query statement SQL is rewritten according to the specification of the structured query statement SQL, and a syntax tree corresponding to the rewritten structured query statement SQL may also have a change.
For example, as shown in fig. 5, a node sign _ text indicating a field name of the authentication information may be added to the syntax tree, and a node 90ijf20fje f23jf09j234rf0 indicating a field value of the authentication information may be added.
In specific implementation, the type of the structured query statement SQL can be queried, and the operation modes of different types of structured query statements SQL are different, so that the authentication information can be written into the structured query statement SQL according to the operation modes corresponding to the types to obtain the rewritten structured query language.
In one example, if the type of the structured query statement SQL is to insert original data into a database, a key area and a value area are queried in the structured query statement, wherein the key area is an area for recording field names, and the value area is an area for recording field values.
And adding a field name of the authentication information in the key area and a field value of the authentication information in the value area, wherein the position of the field name of the authentication information in the key area corresponds to the position of the field value of the authentication information in the value area.
For example, the structured query statement SQL before rewriting is as follows:
insert into tb_user(id,mobile,password,certificate_number)value(1,12345678912,123456,987654321)
the rewritten structured query statement SQL follows:
insert into tb_user(id,mobile,password,certificate_number,sign_text)value(1,12345678912,123456,987654321,90ijf20fje90f23jf09j234rf0)
in another example, if the type of the structured query statement SQL is to update original data to a database, a key value region is queried in the structured query statement SQL, where the key value region is a region in which key value pairs are recorded.
And generating a key value pair key/value by taking the field name of the authentication information as a key and the field value of the authentication information as a value, and inserting the key value pair into the key value region.
For example, the structured query statement SQL before rewriting is as follows:
UPDATE tb_user SET id=2,mobile=‘12345678913’,password=‘1234567’,certificate_number=‘76543211’WHERE id=1
the rewritten structured query statement SQL follows:
UPDATE tb_user SET id=2,mobile=‘12345678913’,password=‘1234567’,certificate_number=‘76543211’,sign_text=‘90ijf20fje90f23jf09j234rf0’WHERE id=1
and step 106, transmitting the structured query statement to a database connection pool for execution so as to write original data and authentication information into the database.
If the software development kit SDK completes writing the authentication information in the structured query statement SQL, the structured query statement SQL may be transmitted to the data connection pool, and the database connection pool executes the structured query statement SQL to write the original data and the authentication information into the database.
In general, the database connection pool writes the original data and the authentication information into the same row of data in the database.
If the software development kit SDK communicates with the database connection pool through an extended interface (e.g., filter eventtapper of Druid), the software development kit SDK may transmit the structured query statement SQL to the database connection pool through the extended interface (e.g., filter eventtapper of Druid) for execution, so as to write the original data and the authentication information in the database.
The embodiment is applied to a software development kit configured for a database connection pool, and the integrity protection rule set for the database is loaded, wherein the database connection pool is connected with the database; acquiring a structured query statement received by a database connection pool, wherein the structured query statement is used for writing original data into a database; extracting original data to be integrity protected from the structured query statement according to an integrity protection rule to serve as target data; signing the target data according to the integrity protection rule to obtain authentication information; writing the authentication information into a structured query statement; and transmitting the structured query statement to a database connection pool for execution so as to write the original data and the authentication information in the database. The software development kit is independent of the service layer, integrity protection can be realized through one-time integration and one-time configuration, no transformation and no invasion are caused to the service layer, and therefore the stability of the service layer is maintained.
Example two
Fig. 6 is a flowchart of a data processing method of a database according to a second embodiment of the present invention, where the present embodiment adds an operation of a configuration switch on the basis of the second embodiment. As shown in fig. 6, the method includes:
step 601, loading integrity protection rules set for the database.
In this embodiment, the software development kit SDK may implement a plug-in supporting hot plug-in, which is recorded as a connection pool plug-in engine plug-in driver engine, and the connection pool plug-in engine may implement an integrity protection function, so as to ensure the stability of the software development kit SDK on line.
When loading the software development kit SDK, a connection pool plugin driver engine may be created, in which integrity protection rules are loaded.
Step 602, obtaining a structured query statement received by a database connection pool.
In the software development kit SDK, the structured query statement SQL provided by the database connection pool may be received by the connection pool plugin driver engine.
Step 603, checking the configuration options of the software development kit.
In this embodiment, configuration options may be set for the software development kit SDK to enable and disable the integrity protection function, thereby ensuring online compatibility of the software development kit SDK.
Further, the configuration option may be implemented by the plug-in driver engine of the connection pool, and when the configuration option is on, the integrity protection function is turned on, and when the configuration option is off, the integrity protection function is disabled.
And step 604, if the configuration option is to start the integrity protection function, extracting the original data to be subjected to integrity protection from the structured query statement according to the integrity protection rule to serve as target data.
If the configuration option is to start the integrity protection function, the plug-in engine PluginDruidEngine of the connection pool extracts the original data to be integrity protected from the structured query statement according to the integrity protection rule, and the original data is used as target data.
Step 605, signing the target data according to the integrity protection rule to obtain the authentication information.
And the connection pool plug-in engine PluginDruidEngine signs the target data according to the integrity protection rule to obtain authentication information.
Step 606, writing the authentication information into the structured query statement.
The method comprises the steps that a syntax parsing method of a plurality of structured query statements SQL are customized in a PluginDruidEngine, and corresponding syntax parsing methods are called according to the types of the structured query statements SQL to write authentication information into the structured query statements SQL, so that the structured query statements SQL are rewritten.
In one example, the syntax parsing method comprises an insertion parsing method InsertVisitor, and when the type of the structured query statement SQL is insertion of insert original data into a database, the insertion parsing method InsertVisitor is called to write authentication information into the structured query statement.
In another example, the syntax parsing method includes an update parsing method updatereceiver, which is called to write authentication information into the structured query statement when the type of the structured query statement SQL is to update original data to a database.
Step 607, the structured query statement is transmitted to the database connection pool to be executed, so as to write the original data and the authentication information in the database.
The connection pool plug-in engine PluginDruidEngine calls an expansion interface provided by the database connection pool, transmits the rewritten structured query statement SQL to the database connection pool, executes the rewritten structured query statement SQL, and writes original data and authentication information into the database.
Step 608, if the configuration option is to close the integrity protection function, transmitting the structured query statement to the database connection pool for execution, so as to write the original data into the database.
If the configuration option is to close the integrity protection function, the structured query statement SQL is processed according to the original logic, that is, the software development kit SDK may transmit the structured query statement SQL to the database connection pool through the expansion interface, and the database connection pool executes the structured query statement SQL to write the original data in the database.
Further, if the configuration option is to turn off the integrity protection function, the connection pool plugin driver engine does not perform the above steps 604-607, but directly transmitting the structured query statement SQL to a database connection pool through an expansion interface, and executing the structured query statement SQL by the database connection pool to write original data into the database.
In addition, considering that the software development kit SDK may fail, the database connection pool performs a timing operation and times a preset time period when transmitting the structured query statement SQL to the software development kit SDK through the expansion interface.
In the process of timing operation, if the database connection pool receives the structured query statement SQL fed back by the software development kit SDK, the database connection pool directly executes the structured query statement SQL fed back by the software development kit SDK, wherein the structured query statement SQL may be the structured query statement SQL written with the authentication information or the structured query statement SQL not written with the authentication information.
When the timing operation is finished (namely overtime), if the database connection pool does not receive the structured query statement SQL fed back by the software development kit SDK, the structured query statement SQL received by the database connection pool is executed to ensure normal execution of the service.
EXAMPLE III
Fig. 7 is a flowchart of a data processing method of a database according to a third embodiment of the present invention, where the third embodiment of the present invention adds an operation of verifying data integrity on the basis of the first embodiment of the present invention. As shown in fig. 7, the method includes:
step 701, calling a database connection pool to traverse the original data stored in the database.
In this embodiment, the software development kit SDK may trigger a verification operation of data integrity through a daily audit (timing) or a spot check, and at this time, call the database connection pool to traverse the original data stored in the database.
If a certain row of original data associated with authentication information (identified by field names and the like) is polled to represent target data with integrity protection in the row of original data, a verification operation of data integrity can be executed on the target data.
Step 702, querying an integrity protection rule configured for the original data.
In this embodiment, the integrity protection rule is already loaded in the plug-in pool engine plug-driver engine of the software development kit SDK, so that the plug-in pool engine plug-driver engine of the software development kit SDK can read the integrity protection rule when the verification operation of the data integrity is performed.
And 703, extracting target data to be subjected to integrity protection from the original data according to an integrity protection rule.
In a specific implementation, the integrity protection rule includes a form and a field to be integrity protected; then the plug-in pool engine PluginDruidEngine of the software development kit SDK can convert the raw data into a syntax tree; searching a table in the syntax tree; if the table is searched, searching fields in the table of the syntax tree; and if the field is searched, extracting the original data positioned in the field as target data.
In this embodiment, since the manner of extracting the target data is basically similar to the application of the first and second embodiments, the description is simple, and the relevant points can be referred to the partial description of the first and second embodiments, which is not described in detail herein.
And 704, signing the target data according to the integrity protection rule to obtain the reference information.
In a specific implementation, the integrity protection rule includes a sorting mode and a signature mode; then, a plug-in engine PluginDruidEngine of a connection pool of the SDK can sort the target data according to a sorting mode and splice the sorted target data to obtain a data sequence; and performing one-way encryption operation on the data sequence according to a signature mode to obtain reference information.
In the present embodiment, since the signature manner is basically similar to the application of the first and second embodiments, the description is relatively simple, and reference may be made to the description of the first and second embodiments for relevant points, which is not described in detail herein.
Step 705, comparing the reference information with the authentication information to determine the integrity of the target data.
In this embodiment, the plug-in pool engine plug-in driver of the software development kit SDK compares the reference information with the authentication information, and determines the integrity of the target data according to the comparison result.
And if the reference information is the same as the authentication information, determining that the target data is not tampered.
And if the reference information is different from the authentication information, determining that the target data is tampered.
Step 706, if the target data is tampered, writing the target data into a preset abnormal data table.
In this embodiment, a table may be preset and recorded as an exception data table, where the exception data table is used to record tampered target data.
If the target data are confirmed to be tampered, the target data can be extracted, the target data are written into an abnormal data table, alarm information is generated, a manager is informed that the target data in the row are abnormal, and the manager waits for calling the target data in the abnormal data table to check.
Step 707, rolling back the original data to the last backup state.
The database can be backed up according to a certain frequency, if the target data is confirmed to be tampered, a data rollback operation can be executed, the original data is rolled back to the last backup state, and the verification operation of the integrity of the data is continuously executed until the target data is restored to the state which is not tampered.
Example four
Fig. 8 is a schematic structural diagram of a data processing apparatus of a database according to a fourth embodiment of the present invention. As shown in fig. 8, the apparatus is applied to a software development kit configured for a database connection pool, and particularly to a connection pool plug-in engine of the software development kit, and the apparatus includes:
a rule loading module 801, configured to load an integrity protection rule set for a database, where the database connection pool is connected to the database;
a statement obtaining module 802, configured to obtain a structured query statement received by the database connection pool, where the structured query statement is used to write original data into the database;
a data extracting module 803, configured to extract, according to the integrity protection rule, the original data to be integrity protected from the structured query statement, as target data;
a signature module 804, configured to sign the target data according to the integrity protection rule, so as to obtain authentication information;
a statement rewriting module 805 configured to write the authentication information into the structured query statement;
a data protection module 806, configured to transmit the structured query statement to the database connection pool for execution, so as to write the original data and the authentication information in the database.
In an embodiment of the present invention, the statement obtaining module 802 is further configured to:
determining an expansion interface provided by the database connection pool;
and when the database connection pool calls the expansion interface, acquiring that the database connection pool receives the structured query statement through the expansion interface.
In an embodiment of the present invention, the data protection module 806 is further configured to:
and transmitting the structured query statement to the database connection pool through the expansion interface for execution so as to write the original data and the authentication information into the database.
In one embodiment of the invention, the integrity protection rule comprises a table and a field to be integrity protected;
the data extraction module 803 is further configured to:
converting the structured query statement into a syntax tree;
searching the table in the syntax tree;
if the table is searched, searching the field in the table of the syntax tree;
and if the field is searched, extracting the original data positioned in the field as target data.
In an embodiment of the present invention, the integrity protection rule includes a sorting mode and a signature mode;
the signature module 804 is further configured to:
sequencing the target data according to the sequencing mode and splicing the sequenced target data to obtain a data sequence;
and performing one-way encryption operation on the data sequence according to the signature mode to obtain authentication information.
In an embodiment of the present invention, the statement rewriting module 805 is further configured to:
querying the type of the structured query statement;
and writing the authentication information into the structured query statement according to the type to obtain a target structured query language.
In an embodiment of the present invention, the statement rewriting module 805 is further configured to:
if the type of the structured query statement is that original data are inserted into the database, a key area and a value area are queried in the structured query statement;
adding a field name of the authentication information to the key area, and adding a field value of the authentication information to the value area;
or
If the type of the structured query statement is that original data is updated to the database, inquiring a key value area in the structured query statement;
generating a key value pair by taking the field name of the authentication information as a key and the field value of the authentication information as a value;
and inserting the key value pair in the key value region.
In a specific implementation, the target data includes at least one of:
audit data and log data.
In one embodiment of the invention, the apparatus further comprises:
the configuration option checking module is used for checking the configuration options of the software development kit; if the configuration option is to start the integrity protection function, the data extraction module 803 is called, and if the configuration option is to close the integrity protection function, the original processing module is called;
and the original processing module is used for transmitting the structured query statement to the database connection pool for execution so as to write the original data into the database.
In one embodiment of the invention, the apparatus further comprises:
the database traversing module is used for calling the database connection pool to traverse the original data stored in the database, and the original data is associated with authentication information;
a rule query module, configured to query the integrity protection rule configured for the raw data;
the data verification module is used for extracting target data to be subjected to integrity protection from the original data according to the integrity protection rule;
the reference signature module is used for signing the target data according to the integrity protection rule to obtain reference information;
and the integrity determining module is used for comparing the reference information with the authentication information to determine the integrity of the target data.
In one embodiment of the invention, the integrity protection rule comprises a table and a field to be integrity protected;
the data verification module is further configured to:
converting the raw data into a syntax tree;
searching the table in the syntax tree;
if the table is searched, searching the field in the table of the syntax tree;
and if the field is searched, extracting the original data positioned in the field as target data.
In an embodiment of the present invention, the integrity protection rule includes a sorting mode and a signature mode;
the reference signature module is further to:
sequencing the target data according to the sequencing mode and splicing the sequenced target data to obtain a data sequence;
and performing one-way encryption operation on the data sequence according to the signature mode to obtain reference information.
In an embodiment of the invention, the integrity determination module is further configured to:
if the reference information is the same as the authentication information, determining that the target data is not tampered;
and if the reference information is different from the authentication information, determining that the target data is tampered.
In one embodiment of the present invention, the zhanghan further comprises:
the abnormal data recording module is used for writing the target data into a preset abnormal data table if the target data is tampered;
and the original data rollback module is used for rolling back the original data to the last backup state.
The data processing device of the database provided by the embodiment of the invention can execute the data processing method of the database provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the data processing method of the database.
EXAMPLE five
Fig. 9 is a schematic structural diagram of a data processing system of a database according to a fifth embodiment of the present invention. As shown in fig. 9, the system includes a database 901 and a database connection pool 902 connected to each other, where the database connection pool 902 is configured with a software development kit 903;
the database connection pool 902 includes:
a statement receiving module, configured to receive a structured query statement, where the structured query statement is used to write original data into the database 901;
a statement transmission module, configured to transmit the structured query statement to the software development kit 903;
the software development kit 903 comprises:
a rule loading module, configured to load integrity protection rules set for the database 901;
the statement acquisition module is used for acquiring the structured query statement received by the database connection pool;
the data extraction module is used for extracting the original data to be subjected to integrity protection from the structured query statement as target data according to the integrity protection rule;
the signature module is used for signing the target data according to the integrity protection rule to obtain authentication information;
the statement rewriting module is used for writing the authentication information into the structured query statement;
the data protection module is used for transmitting the structured query statement to the database connection pool;
the database connection pool 902 further includes:
and the statement execution module is used for executing the structured query statement so as to write the original data and the authentication information in the database.
In one embodiment of the present invention, the database connection pool 902 further comprises:
a timing module, configured to execute a timing operation when the structured query statement is transmitted to the software development kit 903;
the statement execution module is further configured to execute the local structured query statement to write the original data into the database when the timing operation is ended and the structured query statement fed back by the software development kit 903 is not received.
The data processing system of the database provided by the embodiment of the invention can execute the data processing method of the database provided by any embodiment of the invention, and has the corresponding functional modules and the beneficial effects of the data processing method of the database.
EXAMPLE six
FIG. 10 illustrates a schematic diagram of an electronic device 10 that may be used to implement embodiments of the present invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 10, the electronic device 10 includes at least one processor 11, and a memory communicatively connected to the at least one processor 11, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from a storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data necessary for the operation of the electronic apparatus 10 may also be stored. The processor 11, the ROM 12, and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A number of components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, or the like; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The processor 11 performs the various methods and processes described above, such as a data processing method of a database.
In some embodiments, the data processing method of the database may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into the RAM 13 and executed by the processor 11, one or more steps of the data processing method of the database described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the data processing method of the database by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Computer programs for implementing the methods of the present invention can be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (15)

1. A data processing method of a database is applied to a software development kit configured for a database connection pool, and the method comprises the following steps:
loading an integrity protection rule set for a database, wherein the database connection pool is connected with the database;
acquiring a structured query statement received by the database connection pool, wherein the structured query statement is used for writing original data into the database;
extracting the original data to be subjected to integrity protection from the structured query statement according to the integrity protection rule to serve as target data;
signing the target data according to the integrity protection rule to obtain authentication information;
writing the authentication information into the structured query statement;
and transmitting the structured query statement to the database connection pool for execution so as to write the original data and the authentication information in the database.
2. The method of claim 1,
the obtaining the structured query statement received by the database connection pool includes:
determining an expansion interface provided by the database connection pool;
when the database connection pool calls the expansion interface, acquiring a structured query statement received by the database connection pool through the expansion interface;
the transmitting the structured query statement to the database connection pool for execution to write the original data and the authentication information in the database includes:
and transmitting the structured query statement to the database connection pool through the expansion interface for execution so as to write the original data and the authentication information in the database.
3. The method of claim 1, wherein the integrity protection rule comprises a table and a field to be integrity protected;
extracting the original data to be integrity-protected from the structured query statement according to the integrity protection rule as target data, wherein the extracting comprises:
converting the structured query statement into a syntax tree;
searching the table in the syntax tree;
if the table is searched, searching the field in the table of the syntax tree;
and if the field is searched, extracting the original data positioned in the field as target data.
4. The method of claim 1, wherein the integrity protection rules include a sorting mode, a signature mode;
the signing the target data according to the integrity protection rule to obtain authentication information includes:
sequencing the target data according to the sequencing mode and splicing the sequenced target data to obtain a data sequence;
and performing one-way encryption operation on the data sequence according to the signature mode to obtain authentication information.
5. The method of claim 1, wherein writing the authentication information into the structured query statement to obtain a structured query statement comprises:
querying the type of the structured query statement;
and writing the authentication information into the structured query statement according to the type to obtain a target structured query.
6. The method of claim 5, wherein the writing the authentication information into the structured query statement according to the type to obtain a target structured query statement comprises:
if the type of the structured query statement is that original data are inserted into the database, a key region and a value region are queried in the structured query statement;
adding a field name of the authentication information to the key area, and adding a field value of the authentication information to the value area;
or
If the type of the structured query statement is that original data is updated to the database, inquiring a key value area in the structured query statement;
generating a key value pair by taking the field name of the authentication information as a key and the field value of the authentication information as a value;
and inserting the key value pair in the key value region.
7. The method of claim 1, wherein the target data comprises at least one of:
audit data and log data.
8. The method of claim 1, wherein after the extracting the original data to be integrity-protected from the structured query statement as target data according to the integrity protection rule, the method further comprises:
checking configuration options of the software development kit;
if the configuration option is to start an integrity protection function, executing the original data to be subjected to integrity protection extracted from the structured query statement according to the integrity protection rule to serve as target data;
and if the configuration option is to close the integrity protection function, transmitting the structured query statement to the database connection pool for execution so as to write the original data into the database.
9. The method according to any one of claims 1-8, further comprising:
calling the database connection pool to traverse the original data stored in the database, wherein the original data is associated with authentication information;
querying the integrity protection rule configured for the original data;
extracting target data to be subjected to integrity protection from the original data according to the integrity protection rule;
signing the target data according to the integrity protection rule to obtain reference information;
comparing the reference information with the authentication information to determine the integrity of the target data.
10. The method of claim 9, wherein comparing the reference information with the authentication information to determine the integrity of the target data comprises:
if the reference information is the same as the authentication information, determining that the target data is not tampered;
and if the reference information is different from the authentication information, determining that the target data is tampered.
11. The method of claim 9, further comprising:
if the target data is tampered, writing the target data into a preset abnormal data table;
and rolling back the original data to the last backup state.
12. A data processing apparatus of a database, applied to a software development kit configured for a connection pool of the database, the apparatus comprising:
the rule loading module is used for loading integrity protection rules set for a database, and the database connection pool is connected with the database;
the statement acquisition module is used for acquiring the structured query statement received by the database connection pool, wherein the structured query statement is used for writing original data into the database;
the data extraction module is used for extracting the original data to be subjected to integrity protection from the structured query statement as target data according to the integrity protection rule;
the signature module is used for signing the target data according to the integrity protection rule to obtain authentication information;
the statement rewriting module is used for writing the authentication information into the structured query statement;
and the data protection module is used for transmitting the structured query statement to the database connection pool for execution so as to write the original data and the authentication information in the database.
13. The data processing system of the database is characterized by comprising the database and a database connection pool which are connected with each other, wherein the database connection pool is provided with a software development kit;
the database connection pool includes:
the system comprises a statement receiving module, a statement searching module and a database processing module, wherein the statement receiving module is used for receiving a structured query statement, and the structured query statement is used for writing original data into the database;
the statement transmission module is used for transmitting the structured query statement to the software development toolkit;
the software development kit includes:
the rule loading module is used for loading integrity protection rules set for the database;
the statement acquisition module is used for acquiring the structured query statement received by the database connection pool;
the data extraction module is used for extracting the original data to be subjected to integrity protection from the structured query statement as target data according to the integrity protection rule;
the signature module is used for signing the target data according to the integrity protection rule to obtain authentication information;
the statement rewriting module is used for writing the authentication information into the structured query statement;
the data protection module is used for transmitting the structured query statement to the database connection pool;
the database connection pool further comprises:
and the statement execution module is used for executing the structured query statement so as to write the original data and the authentication information in the database.
14. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the data processing method of the database of any one of claims 1-11.
15. A computer-readable storage medium, characterized in that it stores a computer program for causing a processor, when executing, to carry out a method of data processing of a database according to any one of claims 1-11.
CN202210950281.1A 2022-08-09 2022-08-09 Database data processing method, device, system, equipment and storage medium Pending CN115329395A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210950281.1A CN115329395A (en) 2022-08-09 2022-08-09 Database data processing method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210950281.1A CN115329395A (en) 2022-08-09 2022-08-09 Database data processing method, device, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115329395A true CN115329395A (en) 2022-11-11

Family

ID=83922497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210950281.1A Pending CN115329395A (en) 2022-08-09 2022-08-09 Database data processing method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115329395A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116738495A (en) * 2023-08-16 2023-09-12 北京遥感设备研究所 Access control processing method based on purpose self-adaption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116738495A (en) * 2023-08-16 2023-09-12 北京遥感设备研究所 Access control processing method based on purpose self-adaption
CN116738495B (en) * 2023-08-16 2024-01-02 北京遥感设备研究所 Access control processing method based on purpose self-adaption

Similar Documents

Publication Publication Date Title
CN109558748B (en) Data processing method and device, electronic equipment and storage medium
CN108228814B (en) Data synchronization method and device
KR20190060725A (en) SQL review methods, devices, servers, and storage media
CN111225073B (en) Service code distribution method and device, storage medium and computer system
WO2022267769A1 (en) Method and apparatus for generating graph data
CN109885431A (en) Method and apparatus for Backup Data
CN113792274A (en) Information management method, management system and storage medium
CN115329395A (en) Database data processing method, device, system, equipment and storage medium
CN116701053B (en) Method, device, equipment and medium for restoring data backup of production environment database
CN115086047B (en) Interface authentication method and device, electronic equipment and storage medium
CN116644122A (en) Data transaction processing method, device, computer equipment and storage medium
CN108628909B (en) Information pushing method and device
US9201936B2 (en) Rapid provisioning of information for business analytics
CN114615025A (en) Method and device for synchronously processing secret keys
CN111552703B (en) Data processing method and device
CN116136844A (en) Entity identification information generation method, device, medium and electronic equipment
CN109582330B (en) Data model upgrading method, device, equipment and readable storage medium
CN112612817A (en) Data processing method and device, terminal equipment and computer readable storage medium
CN112732471A (en) Error correction method and error correction device for interface return data
CN117131071B (en) Data processing method, device, electronic equipment and computer readable medium
US11768819B2 (en) Data unblocking in application platforms
CN117610059B (en) Authority data storage method, device, equipment and storage medium
CN118069539B (en) Data processing method, device, electronic equipment and storage medium
CN116881284A (en) Data retrieval method, device and equipment for structured query statement and storage medium
CN115333821A (en) Database-based data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination