CN115935440B - Database security management method and system - Google Patents

Database security management method and system Download PDF

Info

Publication number
CN115935440B
CN115935440B CN202310224593.9A CN202310224593A CN115935440B CN 115935440 B CN115935440 B CN 115935440B CN 202310224593 A CN202310224593 A CN 202310224593A CN 115935440 B CN115935440 B CN 115935440B
Authority
CN
China
Prior art keywords
request
data
database
verification
request object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310224593.9A
Other languages
Chinese (zh)
Other versions
CN115935440A (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Amax Heat Exchange Equipment Manufacturing Co ltd
Original Assignee
Beijing Amax Heat Exchange Equipment Manufacturing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Amax Heat Exchange Equipment Manufacturing Co ltd filed Critical Beijing Amax Heat Exchange Equipment Manufacturing Co ltd
Priority to CN202310224593.9A priority Critical patent/CN115935440B/en
Publication of CN115935440A publication Critical patent/CN115935440A/en
Application granted granted Critical
Publication of CN115935440B publication Critical patent/CN115935440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the related field of database management and discloses a database security management method and a system, wherein the database security management method comprises a data risk demarcation module, a data exchange bridging module, a request security judgment module and an offline communication link module; through the arrangement of the related modules, indirect data communication connection between the database and the request object is realized, meanwhile, security level marking is carried out on the data, accessible objects are limited, intermediate protection on the data can be effectively achieved, malicious access and damage of the malicious data to the database are filtered, and further, the device authority limit of the request object is used as a connection control condition, and the situation that data leakage threatens the security of the database due to access of third-party devices in the communication process can be avoided.

Description

Database security management method and system
Technical Field
The invention relates to the related field of database management, in particular to a database security management method and system.
Background
The database is a large storage device for storing information for user records in various industry fields, enterprises, groups and the like, and the security of the database is very important because the database can relate to important information of the enterprise groups, information records of a plurality of associated users and the like.
In the prior art, most of data access modes are account identity identification verification for logging in, so that the data access modes are connected with a database in a read-write interactive mode, certain safety is lacked, a more complex verification mode of equipment hardware address identification is partially adopted, and the problem that equipment is hijacked to access the database to cause the content of the database to be leaked also exists.
Disclosure of Invention
The invention aims to provide a database security management method and system for solving the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a database security management system, comprising:
the data risk demarcation module is used for carrying out risk grade assessment on the data in the database based on a preset data security grade division standard, and carrying out security grade marking on the data based on a risk grade assessment result, wherein the security grade marking is used for representing the importance level of the privacy risk content contained in the corresponding data;
the data exchange bridging module is used for responding to a data read-write request, establishing an interactive verification space with a request object based on the data read-write request, wherein the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request comprises a database data object, a data read-write type and identity information of the request object, and the identity information comprises basic information of the request object and risk authority levels corresponding to the request object and the data object;
the request security judging module is used for carrying out identity authentication of a request object based on the identity information, acquiring and verifying historical verification information through the request object if the request security judging module is matched with the security level mark of the data object, and generating an object verification result, wherein the historical verification information represents a historical data interaction record of the request object and the database;
and the offline communication link module is used for generating a connection establishment request and forwarding the connection establishment request to a request object when the object verification result is characterized as being accordant, acquiring the equipment authority state feedback of the request object, judging, and establishing communication connection between the interactive verification space and the request object and the database.
As a further aspect of the invention: the offline communication link module specifically comprises:
the verification request unit is used for judging the object verification result, if the object verification result represents that the history verification information is matched with the database history data interaction record, a connection establishment request is generated and forwarded to a request object, the connection establishment request comprises connection constraint conditions, and the connection constraint conditions are used for limiting network and equipment rights of the request object, so that the request object only keeps data interaction with an interaction verification space in a communication connection process;
and the feedback response unit is used for acquiring feedback information from the request object, if the feedback information characterizes that the connection constraint condition is met, establishing a data connection channel between the interactive verification space and the request object, simultaneously establishing a data connection channel between the interactive verification space and a data object corresponding to the database, and establishing direct communication interaction between the request object and the database without permission.
As still further aspects of the invention: the offline communication link module further comprises:
and the maintenance monitoring unit is used for monitoring the network and the equipment authority of the request object through a data connection channel, and interrupting the data connection channel if the network and the equipment authority state of the request equipment are changed.
As still further aspects of the invention: the request security judging module comprises a record checking unit for generating an object verification result;
the record checking unit is used for acquiring history verification information corresponding to the risk authority level through the request object, the history verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of the database in the past, the corresponding history interaction records in the database are compared and verified through the history verification information, and whether a verification result accords with a generated object verification result is based on whether the verification result is met or not.
As still further aspects of the invention: the security level indicia may be used to characterize the level of rights to the accessible data content of the corresponding user, and the risk level indicia may be used to characterize an authorized object having access to the data content of the corresponding user.
The embodiment of the invention aims to provide a database security management method, which comprises the following steps:
carrying out risk level assessment on data in a database based on a preset data security level division standard, and carrying out security level marking on the data based on a risk level assessment result, wherein the security level marking is used for representing the importance level of privacy risk content contained in the corresponding data;
responding to a data read-write request, and establishing an interactive verification space with a request object based on the data read-write request, wherein the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request comprises a database data object, a data read-write type and identity information of the request object, and the identity information comprises basic information of the request object and risk authority levels corresponding to the request object and the data object;
based on the identity information, carrying out identity authentication of a request object, and if the request object is matched with the security level mark of the data object, acquiring and verifying historical verification information through the request object to generate an object verification result, wherein the historical verification information represents a historical data interaction record of the request object and a database;
and when the object verification result is characterized as conforming, generating a connection establishment request and forwarding the connection establishment request to a request object, acquiring equipment authority state feedback of the request object, judging, and establishing communication connection between the interactive verification space and the request object and the database.
As a further aspect of the invention: and when the object verification result is characterized as being accordant, generating a connection establishment request and forwarding the connection establishment request to a request object, acquiring equipment authority state feedback of the request object and judging, wherein the step of establishing communication connection between the interactive verification space and the request object and the database specifically comprises the following steps of:
judging the object verification result, if the object verification result represents that the history verification information is matched with the database history data interaction record, generating a connection establishment request and forwarding the connection establishment request to a request object, wherein the connection establishment request comprises connection constraint conditions, and the connection constraint conditions are used for limiting network and equipment rights of the request object, so that the request object only keeps data interaction with an interaction verification space in a communication connection process;
and acquiring feedback information from the request object, if the feedback information characterizes that the connection constraint condition is met, establishing a data connection channel between the interactive verification space and the request object, and simultaneously, establishing a data connection channel between the interactive verification space and a data object corresponding to a database, wherein the request object has no authority to establish direct communication interaction with the database.
As still further aspects of the invention: the method also comprises the steps of:
and monitoring the network and the equipment authority of the request object through a data connection channel, and interrupting the data connection channel if the network and the equipment authority state of the request equipment are changed.
As still further aspects of the invention: the step of obtaining the history verification information through the request object and verifying the history verification information to generate an object verification result specifically comprises the following steps:
and acquiring historical verification information corresponding to the risk authority level through the request object, wherein the historical verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of a database in the past, comparing and verifying the corresponding historical interaction records in the database through the historical verification information, and generating an object verification result based on whether the verification result accords with the generated object verification result or not.
As still further aspects of the invention: the security level indicia may be used to characterize the level of rights to the accessible data content of the corresponding user, and the risk level indicia may be used to characterize an authorized object having access to the data content of the corresponding user.
Compared with the prior art, the invention has the beneficial effects that: through the arrangement of the related modules, indirect data communication connection between the database and the request object is realized, meanwhile, security level marking is carried out on the data, accessible objects are limited, intermediate protection on the data can be effectively achieved, malicious access and damage of the malicious data to the database are filtered, and further, the device authority limit of the request object is used as a connection control condition, and the situation that data leakage threatens the security of the database due to access of third-party devices in the communication process can be avoided.
Drawings
FIG. 1 is a block diagram of a database security management system.
FIG. 2 is a block diagram of an offline communication link module in a database security management system.
FIG. 3 is a flow chart diagram of a database security management method.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Specific implementations of the invention are described in detail below in connection with specific embodiments.
As shown in fig. 1, a database security management system according to an embodiment of the present invention includes:
the data risk demarcation module 100 is configured to perform risk level assessment on data in the database based on a preset data security level demarcation standard, and perform security level marking on the data based on a risk level assessment result, where the security level marking is used to characterize an importance level of the corresponding data including privacy risk content.
The data exchange bridging module 300 is configured to respond to a data read-write request, establish an interactive verification space with a request object based on the data read-write request, where the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request includes a database data object, a data read-write type and identity information of the request object, and the identity information includes basic information of the request object and a risk authority level corresponding to the request object and the data object.
The request security judging module 500 is configured to perform identity authentication of a request object based on the identity information, and if the request object is matched with the security level mark of the data object, obtain and verify historical verification information through the request object, and generate an object verification result, where the historical verification information represents a historical data interaction record of the request object and the database.
And the offline communication link module 700 is configured to generate a connection establishment request and forward the connection establishment request to a request object when the object verification result is characterized as being accordant, acquire device permission status feedback of the request object, judge the device permission status feedback, and establish communication connection between the interactive verification space and the request object and the database.
In the embodiment, a database security management system is provided, indirect data communication connection between a database and a request object is realized through setting of related modules, meanwhile, security level marking is carried out on data, accessible objects are limited, intermediate protection on the data can be effectively achieved, malicious access and damage of malicious data to the database are filtered, further, device permission limitation on the request object is used as a connection control condition, and data leakage threat to database security caused by access of third party devices in a communication process can be avoided; when the method is used, the interactive verification space is used as an intermediate medium to connect a database with a user (request object), the user is subjected to identity verification and safety judgment in the process of requesting data read-write by the user, the user is respectively connected with the database and the user after judging to be satisfied, and the intermediate exchange of data and the safety monitoring (including the scanning monitoring of data virus malicious programs and the like) of the data are performed, so that the user cannot directly read-write the content of the database, the rapid journey of the attack behavior of the database is reduced to a certain extent, the safety of the database is effectively protected, the limitation setting of the permission state of the device is used for preventing the third party device from attacking the database and acquiring the content through the user device with the permission, and the like, and the intervention of external device and the content in the data read-write interaction process is ensured through the limitation of the permission of the device when the user device and the database are performed.
As shown in fig. 2, as another preferred embodiment of the present invention, the offline communication link module 700 specifically includes:
and the verification request unit 701 is configured to determine the object verification result, if the object verification result characterizes that the history verification information is matched with the database history data interaction record, generate a connection establishment request and forward the connection establishment request to a request object, where the connection establishment request includes a connection constraint condition, and the connection constraint condition is used to limit network and device rights on the request object, so that the request object only maintains data interaction with an interaction verification space in a communication connection process.
And the feedback response unit 702 is configured to obtain feedback information from the request object, and if the feedback information characterizes that the connection constraint condition is satisfied, establish a data connection channel between the interactive verification space and the request object, and simultaneously establish a data connection channel between the interactive verification space and a data object corresponding to a database, where the request object has no authority to establish direct communication interaction with the database.
Further, the offline communication link module 700 further includes:
the maintenance monitoring unit 703 is configured to monitor the network and device rights of the request object through a data connection channel, and if the network and device rights status of the request device changes, interrupt the data connection channel.
In this embodiment, the offline communication link module 700 is further described, wherein the most important is the maintenance monitoring unit 703 for supplementary description, which has the main function of monitoring the maintenance state of the authority of the user equipment after establishing a connection with the user equipment, avoiding the change of the authority state in the data transmission process, resulting in the change of the security of the database and the data in the database, and thus, the data communication can be stopped timely.
As another preferred embodiment of the present invention, the request security judging module 500 includes a record checking unit for generating an object verification result;
the record checking unit is used for acquiring history verification information corresponding to the risk authority level through the request object, the history verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of the database in the past, the corresponding history interaction records in the database are compared and verified through the history verification information, and whether a verification result accords with a generated object verification result is based on whether the verification result is met or not.
Further, the security level indicia may be used to characterize the level of rights to the accessible data content of the corresponding user, and the risk level indicia may be used to characterize an authorized object having access to the data content of the corresponding user.
In this embodiment, a record checking module is supplemented through a refinement step and content, which is used for acquiring a history data interaction record under the authority of a user when a link is established, and comparing and verifying with a database end log, so as to further perform identity verification.
As shown in fig. 3, the present invention further provides a database security management method, which includes the steps of:
and S200, carrying out risk level assessment on the data in the database based on a preset data security level division standard, and carrying out security level marking on the data based on a risk level assessment result, wherein the security level marking is used for representing the importance level of the privacy risk content contained in the corresponding data.
S400, responding to a data read-write request, and establishing an interactive verification space with a request object based on the data read-write request, wherein the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request comprises a database data object, a data read-write type and identity information of the request object, and the identity information comprises basic information of the request object and risk authority levels corresponding to the request object and the data object.
S600, carrying out identity authentication of the request object based on the identity information, and if the request object is matched with the security level mark of the data object, acquiring and verifying historical verification information through the request object to generate an object verification result, wherein the historical verification information represents a historical data interaction record of the request object and the database.
And S800, when the object verification result is characterized as being accordant, generating a connection establishment request and forwarding the connection establishment request to a request object, acquiring equipment authority state feedback of the request object, judging, and establishing communication connection between the interactive verification space and the request object and the database.
As another preferred embodiment of the present invention, when the object verification result is characterized as being consistent, generating a connection establishment request and forwarding the connection establishment request to a request object, obtaining device permission status feedback of the request object, and determining, the step of establishing communication connection between the interactive verification space and the request object and the database specifically includes:
judging the object verification result, if the object verification result represents that the history verification information is matched with the database history data interaction record, generating a connection establishment request and forwarding the connection establishment request to a request object, wherein the connection establishment request comprises connection constraint conditions, and the connection constraint conditions are used for limiting network and equipment rights of the request object, so that the request object only keeps data interaction with an interaction verification space in a communication connection process.
And acquiring feedback information from the request object, if the feedback information characterizes that the connection constraint condition is met, establishing a data connection channel between the interactive verification space and the request object, and simultaneously, establishing a data connection channel between the interactive verification space and a data object corresponding to a database, wherein the request object has no authority to establish direct communication interaction with the database.
As another preferred embodiment of the present invention, further comprising the steps of:
and monitoring the network and the equipment authority of the request object through a data connection channel, and interrupting the data connection channel if the network and the equipment authority state of the request equipment are changed.
As another preferred embodiment of the present invention, the step of obtaining the history verification information through the request object and verifying the history verification information, and the step of generating the object verification result specifically includes:
and acquiring historical verification information corresponding to the risk authority level through the request object, wherein the historical verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of a database in the past, comparing and verifying the corresponding historical interaction records in the database through the historical verification information, and generating an object verification result based on whether the verification result accords with the generated object verification result or not.
As another preferred embodiment of the present invention, the security level indicia may be used to characterize the level of rights to the accessible data content of the corresponding user, and the risk level indicia may be correspondingly characterized as having authorization objects to view the data content of the corresponding user.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A database security management system, comprising:
the data risk demarcation module is used for carrying out risk grade assessment on the data in the database based on a preset data security grade division standard, and carrying out security grade marking on the data based on a risk grade assessment result, wherein the security grade marking is used for representing the importance level of the privacy risk content contained in the corresponding data;
the data exchange bridging module is used for responding to a data read-write request, establishing an interactive verification space with a request object based on the data read-write request, wherein the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request comprises a database data object, a data read-write type and identity information of the request object, and the identity information comprises basic information of the request object and risk authority levels corresponding to the request object and the data object;
the request security judging module is used for carrying out identity authentication of a request object based on the identity information, acquiring and verifying historical verification information through the request object if the request security judging module is matched with the security level mark of the data object, and generating an object verification result, wherein the historical verification information represents a historical data interaction record of the request object and the database;
and the offline communication link module is used for generating a connection establishment request and forwarding the connection establishment request to a request object when the object verification result is characterized as being accordant, acquiring the equipment authority state feedback of the request object, judging, and establishing communication connection between the interactive verification space and the request object and the database.
2. The database security management system of claim 1, wherein the offline communication link module specifically comprises:
the verification request unit is used for judging the object verification result, if the object verification result represents that the history verification information is matched with the database history data interaction record, a connection establishment request is generated and forwarded to a request object, the connection establishment request comprises connection constraint conditions, and the connection constraint conditions are used for limiting network and equipment rights of the request object, so that the request object only keeps data interaction with an interaction verification space in a communication connection process;
and the feedback response unit is used for acquiring feedback information from the request object, if the feedback information characterizes that the connection constraint condition is met, establishing a data connection channel between the interactive verification space and the request object, simultaneously establishing a data connection channel between the interactive verification space and a data object corresponding to the database, and establishing direct communication interaction between the request object and the database without permission.
3. The database security management system of claim 2, wherein the offline communication link module further comprises:
and the maintenance monitoring unit is used for monitoring the network and the equipment authority of the request object through the data connection channel, and interrupting the data connection channel if the state of the network and the equipment authority of the request equipment changes.
4. The database security management system according to claim 1, wherein the request security judgment module includes a record checking unit for generating an object verification result;
the record checking unit is used for acquiring history verification information corresponding to the risk authority level through the request object, the history verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of the database in the past, the corresponding history interaction records in the database are compared and verified through the history verification information, and whether a verification result accords with a generated object verification result is based on whether the verification result is met or not.
5. A database security management system as claimed in claim 4 wherein the security level indicia is operable to characterize the level of rights in the data content accessible to the corresponding user and, correspondingly, the risk rights level indicia characterizes the authorized object having access to the data content of the corresponding user.
6. A database security management method, comprising the steps of:
carrying out risk level assessment on data in a database based on a preset data security level division standard, and carrying out security level marking on the data based on a risk level assessment result, wherein the security level marking is used for representing the importance level of privacy risk content contained in the corresponding data;
responding to a data read-write request, and establishing an interactive verification space with a request object based on the data read-write request, wherein the interactive verification space is independent of a database and is used for bridging the database and the request object, the data read-write request comprises a database data object, a data read-write type and identity information of the request object, and the identity information comprises basic information of the request object and risk authority levels corresponding to the request object and the data object;
based on the identity information, carrying out identity authentication of a request object, and if the request object is matched with the security level mark of the data object, acquiring and verifying historical verification information through the request object to generate an object verification result, wherein the historical verification information represents a historical data interaction record of the request object and a database;
and when the object verification result is characterized as conforming, generating a connection establishment request and forwarding the connection establishment request to a request object, acquiring equipment authority state feedback of the request object, judging, and establishing communication connection between the interactive verification space and the request object and the database.
7. The method for database security management according to claim 6, wherein when the object verification result is characterized as being met, generating a connection establishment request and forwarding the connection establishment request to a request object, acquiring device permission status feedback of the request object and judging, and establishing communication connection between the interactive verification space and the request object and the database specifically comprises:
judging the object verification result, if the object verification result represents that the history verification information is matched with the database history data interaction record, generating a connection establishment request and forwarding the connection establishment request to a request object, wherein the connection establishment request comprises connection constraint conditions, and the connection constraint conditions are used for limiting network and equipment rights of the request object, so that the request object only keeps data interaction with an interaction verification space in a communication connection process;
and acquiring feedback information from the request object, if the feedback information characterizes that the connection constraint condition is met, establishing a data connection channel between the interactive verification space and the request object, and simultaneously, establishing a data connection channel between the interactive verification space and a data object corresponding to a database, wherein the request object has no authority to establish direct communication interaction with the database.
8. The database security management method according to claim 7, further comprising the steps of:
and monitoring the network and the equipment authority of the request object through a data connection channel, and interrupting the data connection channel if the state of the network and the equipment authority of the request equipment changes.
9. The method for database security management as claimed in claim 6, wherein the step of obtaining and verifying the history verification information by the request object, and generating the object verification result specifically comprises:
and acquiring historical verification information corresponding to the risk authority level through the request object, wherein the historical verification information is used for representing data interaction records of the request object under a security level mark corresponding to the request data of a database in the past, comparing and verifying the corresponding historical interaction records in the database through the historical verification information, and generating an object verification result based on whether the verification result accords with the generated object verification result or not.
10. A method of database security management according to claim 9 wherein the security level indicia is operable to characterize the level of rights in the data content accessible to the corresponding user and the risk level indicia is operable to characterize the authorized object having access to the data content of the corresponding user.
CN202310224593.9A 2023-03-10 2023-03-10 Database security management method and system Active CN115935440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310224593.9A CN115935440B (en) 2023-03-10 2023-03-10 Database security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310224593.9A CN115935440B (en) 2023-03-10 2023-03-10 Database security management method and system

Publications (2)

Publication Number Publication Date
CN115935440A CN115935440A (en) 2023-04-07
CN115935440B true CN115935440B (en) 2023-05-09

Family

ID=85822305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310224593.9A Active CN115935440B (en) 2023-03-10 2023-03-10 Database security management method and system

Country Status (1)

Country Link
CN (1) CN115935440B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114844673A (en) * 2022-03-25 2022-08-02 华能信息技术有限公司 Data security management method
CN115514585A (en) * 2022-11-23 2022-12-23 北京数字众智科技有限公司 Database security management method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190108256A1 (en) * 2017-10-09 2019-04-11 Switch Commerce, Llc System for scalable database security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114844673A (en) * 2022-03-25 2022-08-02 华能信息技术有限公司 Data security management method
CN115514585A (en) * 2022-11-23 2022-12-23 北京数字众智科技有限公司 Database security management method and system

Also Published As

Publication number Publication date
CN115935440A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN113221180A (en) Database security access system and method
CN115242488A (en) Domestic network security operation and maintenance system and method
CN114036489A (en) Information security management method and system based on big data
CN115935440B (en) Database security management method and system
CN113923207A (en) Computer network monitoring method and terminal
CN117131534B (en) Secret document security management and control method based on blockchain
CN112422527B (en) Threat assessment system, method and device for substation power monitoring system
CN114036480B (en) Security access control method and system for private application and readable storage medium
CN114218593B (en) Information security detection method based on office equipment
CN114520734B (en) Network data security management and control method and system based on bidirectional transmission
CN107315963A (en) A kind of financial management method with remote access function
CN114615030B (en) Identity authentication method and system based on industrial Internet platform
CN112070946A (en) Gate-based social application program control method, device, equipment and medium
CN115242545B (en) Security management method and system for equipment data of Internet of things
CN113660253A (en) Terminal controller, method and system based on remote desktop protocol
CN115442249B (en) Network automation operation and maintenance method and system based on big data and federal learning technology
CN117407928B (en) Storage device, data protection method for storage device, computer apparatus, and medium
CN118070341B (en) Big data management method and big data management system
CN113849796B (en) Intelligent communication water affair Internet of things remote monitoring control method, system and block chain system
CN113609883B (en) Elevator component management system, method, computer equipment and storage medium
CN115622782A (en) Encryption transmission method and system for power equipment
CN115426481B (en) 5G and artificial intelligence based gridding big data city monitoring method and system
CN115906023A (en) Data authority control method, computer equipment and storage medium
CN117852021A (en) Behavior management system, method, computer device and storage medium for trusted space

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant