CN115630079A - Database request combining method and device - Google Patents
Database request combining method and device Download PDFInfo
- Publication number
- CN115630079A CN115630079A CN202211329443.6A CN202211329443A CN115630079A CN 115630079 A CN115630079 A CN 115630079A CN 202211329443 A CN202211329443 A CN 202211329443A CN 115630079 A CN115630079 A CN 115630079A
- Authority
- CN
- China
- Prior art keywords
- request
- sql
- database
- server
- requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
Abstract
The application provides a database request combining method and device. When the method is executed, a request forwarding unit receives a first Sql request sent by a client and forwards the first Sql request to a plurality of server terminals; then, each server end in the plurality of server ends forwards the first Sql request to a corresponding source database; and then the request combining unit receives the first Sql request sent by the server of each source database, after the plurality of first Sql requests are combined and screened, one Sql request in the screened plurality of first Sql requests is used as a second Sql request, and finally the request combining unit sends the second Sql request to the target database. By respectively forwarding the Sql requests sent by the client to the plurality of service terminals, when the plurality of first Sql requests are combined and screened, if one of the service terminals is attacked, the first Sql requests are different from the first Sql requests of other servers and are removed, so that the safety of the user request process is improved.
Description
Technical Field
The present application relates to the field of database security, and in particular, to a database request combining method and apparatus.
Background
With the development of computer and network technologies, the application of internet information systems is more and more widespread. The database is used as the core and the foundation of the service platform information technology and bears more and more key data, the safe and stable operation of the database also directly determines whether the service system can be normally used, and the database of the platform often stores the extremely important and sensitive information.
In the prior art, network hackers utilize various approaches, various attack tools, and various deception means to obtain their desired information. For example: the SQL command is inserted into a Web form to submit or input a query character string of a domain name or page request, and finally the purpose of deceiving a server to execute the malicious SQL command is achieved, so that the request of a user becomes unsafe.
Disclosure of Invention
In view of this, embodiments of the present application provide a database request combining method and apparatus, which aim to improve security of a user request process.
In a first aspect, an embodiment of the present application provides a database request combining method, where the method includes:
the request forwarding unit receives a first Sql request sent by a client;
the request forwarding unit forwards the first Sql request to a plurality of server terminals;
each server side in the plurality of server sides forwards the first Sql request to a corresponding source database;
the server of each source database respectively sends the first Sql request to a request combining unit;
the request combining unit receives the first Sql request sent by the server of each source database, and after combining and screening a plurality of first Sql requests, one Sql request in the screened first Sql requests is used as a second Sql request;
and the request combining unit sends the second Sql request to a target database.
Optionally, if the first Sql request is a read request, after the request combining unit sends the second Sql request to a target database, the method further includes:
the request combining unit receives a reading result returned by the target database, wherein the reading result is obtained by processing the reading request by the target database;
the request combining unit sends the reading result to the request forwarding unit;
and the request forwarding unit forwards the reading result to the client.
Optionally, before the request forwarding unit forwards the read result to the client, the method further includes:
the request forwarding unit checks the reading result to obtain a checking result corresponding to the reading result;
and the request forwarding unit forwards the check result to the client.
Optionally, after each of the multiple server terminals forwards the first Sql request to a corresponding source database, the method further includes:
and adding different labels to the keywords of the first Sql request in each source database, wherein the labels are obtained according to preset parameters corresponding to each source database.
Optionally, after the multiple first Sql requests are combined and screened, before one of the screened multiple first Sql requests is used as a second Sql request, the method further includes:
and the request combining unit carries out label removal processing on the plurality of first Sql requests and reserves the label of one Sql request.
In a second aspect, an embodiment of the present application provides a database request combining apparatus, where the apparatus includes:
the request forwarding unit is used for receiving a first Sql request sent by a client; forwarding the first Sql request to a plurality of server terminals;
the server ends are used for forwarding the first Sql request to the corresponding source database;
the source database servers are used for respectively sending the first Sql requests to the request combining unit;
the request combining unit is used for receiving the first Sql requests sent by the server of each source database, combining and screening a plurality of first Sql requests, and then taking one Sql request in the screened plurality of first Sql requests as a second Sql request; and sending the second Sql request to a target database.
Optionally, if the first Sql request is a read request, the request combining unit is further configured to receive a read result returned by the target database, where the read result is obtained by the target database processing the read request; sending the read result to the request forwarding unit; and the request forwarding unit forwards the reading result to the client.
Optionally, before the request forwarding unit forwards the read result to the client, the request forwarding unit is further configured to check the read result to obtain a check result corresponding to the read result; and forwarding the checking result to the client.
In a third aspect, an embodiment of the present application provides an electronic device, where the electronic device includes:
a memory for storing one or more programs;
a processor; the one or more programs, when executed by the processor, implement the database request combining method of any of the preceding first aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, where a program is stored, and when the program is executed by a processor, the database request combining method described in any one of the foregoing first aspects is implemented.
The technical scheme has the following beneficial effects:
the embodiment of the application provides a database request combining method and device. When the method is executed, a request forwarding unit receives a first Sql request sent by a client and forwards the first Sql request to a plurality of server terminals; then, each server end in the plurality of server ends forwards the first Sql request to a corresponding source database; then the server of each source database sends the first Sql request to a request combining unit respectively; and then the request combining unit receives the first Sql request sent by the server of each source database, combines and screens a plurality of first Sql requests, then takes one Sql request in the screened first Sql requests as a second Sql request, and finally the request combining unit sends the second Sql request to a target database.
In this way, by respectively forwarding the Sql requests sent by the client to the multiple servers, when a plurality of first Sql requests are combined and screened, if one of the servers is attacked, the first Sql requests will be different from the first Sql requests of the other servers and will be rejected. And one Sql request in the screened first Sql requests is used as a second Sql request to be sent to a target database, so that the safety of the user request process is improved.
Drawings
To illustrate the technical solutions in the present embodiment or the prior art more clearly, the drawings needed to be used in the description of the embodiment or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method of a database request combining method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a database request combining device according to an embodiment of the present disclosure.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It should be apparent that the described embodiments are only a few embodiments of the present application, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
With the development of computer and network technologies, the application of internet information systems is becoming more and more widespread. The database is used as the core and the foundation of the service platform information technology and bears more and more key data, the safe and stable operation of the database also directly determines whether the service system can be normally used, and the database of the platform often stores the extremely important and sensitive information.
The inventor finds out through research that in the prior art, network hackers acquire information they want by using various approaches, various attack tools and various deception means. For example: the SQL command is inserted into a Web form to submit or input a query character string of a domain name or page request, and finally the purpose of deceiving a server to execute the malicious SQL command is achieved, so that the request of a user becomes unsafe.
In order to overcome the technical problem, embodiments of the present application provide a database request combining method, which may be performed by a database request combining apparatus, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a server or a terminal device.
Referring to fig. 1, fig. 1 is a flowchart of a method for database request combining according to an embodiment of the present application, where the method may include:
step S101: the request forwarding unit receives a first Sql request sent by a client.
The Structured Query Language (Sql) is a database Query and programming Language used for accessing data and querying, updating, and managing a relational database system.
In the embodiment of the application, the first Sql request is formed by the client according to an operation instruction of a user, but is not sent to the destination database but sent to the request forwarding unit, and the request forwarding unit receives the first Sql request sent by the client.
It is to be understood that the first Sql request may be a write request or a read request, and is not limited herein.
Step S102: and the request forwarding unit forwards the first Sql request to a plurality of server terminals.
In the embodiment of the present application, through step S101, after the request forwarding unit receives the first Sql request sent by the client, the request forwarding unit forwards the first Sql request to the plurality of server sides.
It should be noted that the plurality of server ends is at least three web server ends.
Step S103: each server side in the plurality of server sides forwards the first Sql request to a corresponding source database; wherein, each source database is respectively connected with different incremental log analysis units.
In the embodiment of the application, after the request forwarding unit forwards the first Sql request to the plurality of server terminals, each server terminal in the plurality of server terminals forwards the first Sql request to the source database corresponding to each server terminal; wherein, each source database is respectively connected with different incremental log analysis units.
As a possible implementation manner, after each of the plurality of server sides forwards the first Sql request to the corresponding source database, the method includes: and adding different labels to the keywords of the first Sql request in each source database, wherein the labels are obtained according to preset parameters corresponding to each source database.
One of the source databases is used for illustration: for example, the first Sql request in a source database is "select from info 8230," and after tagging, the first Sql request becomes "xxtag select from info 8230," where "xxtag" is the tag.
It should be noted that the label is obtained according to a preset parameter corresponding to each source database, and the preset parameter may be set by a user according to an actual requirement, which is not limited herein.
It can be understood that different labels are added to the keywords of the first Sql request in each source database, and if the incremental log parsing unit parses the first Sql request subsequently and the first Sql request is not labeled, it can be considered that the server may have been attacked, so as to further improve the security of the user request process.
Step S104: and the server of each source database respectively sends the first Sql request to a request combining unit.
In this embodiment of the application, through step S103, after each server of the multiple server sides forwards the first Sql request to the corresponding source database, the server of each source database sends the first Sql request to the request combining unit, so that the subsequent request combining unit can combine and screen the multiple first Sql requests.
It should be noted that, in one possible implementation, each source database is connected to a different incremental log parsing unit. Each incremental log analysis unit analyzes the log of the source database to obtain a first Sql request, and sends the first Sql request to a server of the source database corresponding to the incremental log analysis unit.
Step S105: the request combining unit receives the first Sql request sent by the server of each source database, and after combining and screening a plurality of first Sql requests, one Sql request in the screened first Sql requests is used as a second Sql request.
In the embodiment of the application, the request combining unit receives a first Sql request sent by a server of each source database, and after combining and screening a plurality of first Sql requests, takes one of the screened plurality of first Sql requests as a second Sql request.
It can be understood that, if the server of one of the source databases is attacked, the first Sql request is different from the first Sql request sent by the server of the source database, so that the Sql request of the server of the source database is eliminated, and the user is reminded that the server of the source database is attacked.
Correspondingly, the request combining unit takes one of the screened first Sql requests as a second Sql request.
In a possible implementation manner, after the combining and screening is performed on the plurality of first Sql requests, before one of the screened plurality of first Sql requests is used as the second Sql request, the method further includes:
the request combining unit carries out label removing processing on the plurality of first Sql requests and reserves the label of one of the Sql requests.
Specifically, after receiving the plurality of first Sql requests, the request combining unit performs label removal processing on the plurality of first Sql requests, and only retains a label of one of the plurality of first Sql requests.
In practical application, after receiving the first Sql request sent by the server of each source database, the request combining unit performs Sql injection attack detection on the plurality of first Sql requests, thereby improving the security of the user request process.
Step S106: and the request combining unit sends the second Sql request to a target database.
According to the technical scheme, the request forwarding unit receives a first Sql request sent by a client and forwards the first Sql request to a plurality of server sides; then, each server end in the plurality of server ends forwards the first Sql request to a corresponding source database; then the server of each source database sends the first Sql request to a request combining unit respectively; and then the request combining unit receives the first Sql request sent by the server of each source database, performs combined screening on a plurality of first Sql requests, takes one of the screened first Sql requests as a second Sql request, and finally sends the second Sql request to a target database.
In this way, by respectively forwarding the Sql requests sent by the client to the multiple servers, when the multiple first Sql requests are combined and screened, if one of the servers is attacked, the first Sql requests will be different from the first Sql requests of the other servers and will be rejected. And one Sql request in the screened first Sql requests is used as a second Sql request to be sent to a target database, so that the safety of the user request process is improved.
As a possible implementation manner, if the first Sql request is a read request, after the request combining unit sends the second Sql request to a target database, the method further includes: a request combining unit receives a reading result returned by a target database, wherein the reading result is obtained by processing the reading request by the target database; the request combining unit sends the reading result to the request forwarding unit; and the request forwarding unit forwards the reading result to the client.
In this embodiment of the present application, when the first Sql request is a read request, after the request combining unit sends the second Sql request to the target database, the request combining unit receives a read result returned by the target database, and the read result is obtained by processing the read request by the target database.
Correspondingly, the request combining unit sends the read result to the request forwarding unit, and the request forwarding unit forwards the read result to the client, so as to ensure the normal operation of the service.
As a possible implementation manner, before the request forwarding unit forwards the read result to the client, the method further includes: the request forwarding unit checks the reading result to obtain a checking result corresponding to the reading result; and the request forwarding unit forwards the check result to the client.
Specifically, after the request combining unit sends the read result to the request forwarding unit, the request forwarding unit checks the read result, for example: and (4) performing arbitration on the read result or performing Sql injection check on the read result. And then the request combining unit forwards the check result to the client, so that the security of the user request process is ensured.
The foregoing provides some specific implementation manners of the database request combining method provided in the embodiment of the present application, and based on this, the present application also provides a corresponding apparatus. The device provided by the embodiment of the present application will be described in terms of functional modularity.
Referring to fig. 2, an exemplary structure of a database request combining apparatus includes a request forwarding unit 100, a plurality of server sides 200, a plurality of source database servers 300, and a request combining unit 400.
A request forwarding unit 100, configured to receive a first Sql request sent from a client; forwarding the first Sql request to a plurality of server terminals;
the server ends 200 are used for forwarding the first Sql request to the corresponding source database; wherein, each source database is respectively connected with different incremental log analysis units;
the source database servers 300 are configured to send the first Sql requests to the request combining unit respectively;
a request combining unit 400, configured to receive the first Sql request sent by the server of each source database, combine and screen multiple first Sql requests, and then use one of the screened multiple first Sql requests as a second Sql request; and sending the second Sql request to a target database.
Optionally, if the first Sql request is a read request, the request combining unit is further configured to receive a read result returned by the target database, where the read result is obtained by the target database processing the read request; sending the read result to the request forwarding unit; and the request forwarding unit forwards the reading result to the client.
Optionally, before the request forwarding unit forwards the read result to the client, the request forwarding unit is further configured to check the read result to obtain a check result corresponding to the read result; and forwarding the checking result to the client.
As can be seen from the above technical solutions, in the request of the embodiment of the present application, the request forwarding unit first receives a first Sql request sent from a client, and forwards the first Sql request to a plurality of server sides; then, each server end in the plurality of server ends forwards the first Sql request to a corresponding source database; then the server of each source database sends the first Sql request to a request combining unit respectively; and then the request combining unit receives the first Sql request sent by the server of each source database, performs combined screening on a plurality of first Sql requests, takes one of the screened first Sql requests as a second Sql request, and finally sends the second Sql request to a target database.
In this way, by respectively forwarding the Sql requests sent by the client to the multiple servers, when the multiple first Sql requests are combined and screened, if one of the servers is attacked, the first Sql requests will be different from the first Sql requests of the other servers and will be rejected. And one Sql request in the screened first Sql requests is used as a second Sql request to be sent to a target database, so that the safety of the user request process is improved.
An embodiment of the present application further provides an electronic device, including: a memory for storing one or more programs;
a processor; the one or more programs, when executed by the processor, implement the database request combining method in the above embodiments.
The embodiment of the application also provides a computer storage medium, wherein the computer storage medium stores a program, and when the program is executed by a processor, the database request combining method in the embodiment is realized.
In the embodiments of the present application, the names "first" and "second" (if present) in the names "first" and "second" are used for name identification, and do not represent the first and second in sequence.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Those skilled in the art can understand that the flowchart shown in the figure is only one example in which the embodiments of the present application can be implemented, and the application scope of the embodiments of the present application is not limited in any aspect by the flowchart.
In the several embodiments provided in the present application, it should be understood that the disclosed method, apparatus, and device may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A database request combining method is characterized by comprising the following steps:
a request forwarding unit receives a first Sql request sent by a client;
the request forwarding unit forwards the first Sql request to a plurality of server terminals;
each server side in the plurality of server sides forwards the first Sql request to a corresponding source database;
the server of each source database respectively sends the first Sql request to a request combining unit;
the request combining unit receives the first Sql requests sent by the server of each source database, performs combining screening on a plurality of first Sql requests, and takes one Sql request in the screened first Sql requests as a second Sql request;
and the request combining unit sends the second Sql request to a target database.
2. The method of claim 1, wherein if the first Sql request is a read request, after the request combining unit sends the second Sql request to a target database, the method further comprises:
the request combining unit receives a reading result returned by the target database, wherein the reading result is obtained by processing the reading request by the target database;
the request combining unit sends the reading result to the request forwarding unit;
and the request forwarding unit forwards the reading result to the client.
3. The method of claim 2, wherein before the request forwarding unit forwards the read result to the client, the method further comprises:
the request forwarding unit checks the reading result to obtain a checking result corresponding to the reading result;
and the request forwarding unit forwards the check result to the client.
4. The method as claimed in claim 1, wherein after each of the plurality of server terminals forwards the first Sql request to the corresponding source database, the method further comprises:
and adding different labels to the keywords of the first Sql request in each source database, wherein the labels are obtained according to preset parameters corresponding to each source database.
5. The method of claim 4, wherein after the screening the plurality of first Sql requests in combination, before the one of the screened plurality of first Sql requests is used as the second Sql request, the method further comprises:
the request combining unit carries out label removing processing on the plurality of first Sql requests and reserves the label of one of the Sql requests.
6. A database request combining apparatus, comprising:
the request forwarding unit is used for receiving a first Sql request sent by a client; forwarding the first Sql request to a plurality of server terminals;
the server ends are used for forwarding the first Sql request to the corresponding source database;
the source database servers are used for respectively sending the first Sql requests to the request combining unit;
the request combining unit is used for receiving the first Sql request sent by the server of each source database, combining and screening a plurality of first Sql requests, and then taking one Sql request in the screened first Sql requests as a second Sql request; and sending the second Sql request to a target database.
7. The apparatus of claim 6, wherein if the first Sql request is a read request, the request combining unit is further configured to receive a read result returned by the target database, where the read result is obtained by the target database processing the read request; sending the read result to the request forwarding unit; and the request forwarding unit forwards the reading result to the client.
8. The method according to claim 6, wherein before the request forwarding unit forwards the read result to the client, the request forwarding unit is further configured to check the read result to obtain a check result corresponding to the read result; and forwarding the checking result to the client.
9. An electronic device, comprising:
a memory for storing one or more programs;
a processor; the one or more programs, when executed by the processor, implement the method of any of claims 1-5.
10. A storage medium, characterized in that the storage medium has a program stored thereon, which when executed by a processor implements the method of any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211329443.6A CN115630079A (en) | 2022-10-27 | 2022-10-27 | Database request combining method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211329443.6A CN115630079A (en) | 2022-10-27 | 2022-10-27 | Database request combining method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115630079A true CN115630079A (en) | 2023-01-20 |
Family
ID=84906249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211329443.6A Pending CN115630079A (en) | 2022-10-27 | 2022-10-27 | Database request combining method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115630079A (en) |
-
2022
- 2022-10-27 CN CN202211329443.6A patent/CN115630079A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103744802B (en) | Method and device for identifying SQL injection attacks | |
EP3251031B1 (en) | Techniques for compact data storage of network traffic and efficient search thereof | |
US9444793B2 (en) | System, apparatus and method for encryption and decryption of data transmitted over a network | |
US8051484B2 (en) | Method and security system for indentifying and blocking web attacks by enforcing read-only parameters | |
US11030203B2 (en) | Machine learning detection of database injection attacks | |
CA2786058C (en) | System, apparatus and method for encryption and decryption of data transmitted over a network | |
US10324896B2 (en) | Method and apparatus for acquiring resource | |
CN107239701B (en) | Method and device for identifying malicious website | |
CN111638908A (en) | Interface document generation method and device, electronic equipment and medium | |
CN112150113A (en) | Method, device and system for borrowing file data and method for borrowing data | |
CN110636038A (en) | Account number analysis method, account number analysis device, security gateway and system | |
CN112528181A (en) | Two-dimensional code management method and device, computer equipment and readable storage medium | |
CN111680303A (en) | Vulnerability scanning method and device, storage medium and electronic equipment | |
CN115630079A (en) | Database request combining method and device | |
US20030051056A1 (en) | Method and system for transmitting compacted text data | |
CN109858289A (en) | The mobile storage device management method and device used suitable for corporate intranet | |
CN113468579A (en) | Data access method, device, equipment and storage medium | |
CN111901299A (en) | Application authentication method and device, electronic equipment and storage medium | |
CN116647412B (en) | Security defense method and system of Web server | |
EP1965305A1 (en) | Information authentication gateway, information acquisition system using the information authentication gateway, and information acquisition method | |
CN112764974B (en) | Information asset online management method and system | |
CN115632868A (en) | Authority verification method and device based on annotation, electronic equipment and storage medium | |
CN115687385A (en) | Data query method and system | |
CN113760932A (en) | Locking method and device for database table, storage medium and electronic equipment | |
CN115292409A (en) | Data sharing exchange system, method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |