WO2018126381A1 - 数据库访问控制方法 - Google Patents

数据库访问控制方法 Download PDF

Info

Publication number
WO2018126381A1
WO2018126381A1 PCT/CN2017/070238 CN2017070238W WO2018126381A1 WO 2018126381 A1 WO2018126381 A1 WO 2018126381A1 CN 2017070238 W CN2017070238 W CN 2017070238W WO 2018126381 A1 WO2018126381 A1 WO 2018126381A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
database
information
control method
user
Prior art date
Application number
PCT/CN2017/070238
Other languages
English (en)
French (fr)
Inventor
王志全
Original Assignee
深圳市前海中康汇融信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市前海中康汇融信息技术有限公司 filed Critical 深圳市前海中康汇融信息技术有限公司
Priority to PCT/CN2017/070238 priority Critical patent/WO2018126381A1/zh
Publication of WO2018126381A1 publication Critical patent/WO2018126381A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of database access control, and in particular to a database access control method based on user rights.
  • Database is an important part of modern computer applications, and it is a tool for people to effectively store, share and process data.
  • the database access technology abstracts the process of communicating with the outside of the database, and simplifies the process of the client accessing the database by providing an access interface.
  • the data in the database may be more confidential. If the user's access to the database is not managed effectively, and the user is allowed to obtain the desired data at will, the security of the database is not guaranteed.
  • the present invention provides a database access control method, including: receiving access request information of a user, wherein the access request information includes an account, a password, and a target resource of the user; and the access request information and the access right The information is matched, and a matching result is generated; the target resource in the database is acquired according to the matching result, and the access result information is generated correspondingly; and the access result information is sent to the user.
  • the database access control method further includes: storing a plurality of access rights information corresponding to the plurality of users, wherein the plurality of access rights information is stored in the form of a rights list of roles and resource rights.
  • the step of acquiring the target resource in the database according to the matching result and generating the access result information correspondingly comprises: if the matching result indicates that the access request information matches the access right information And acquiring the target resource, and correspondingly generating the access result information that includes the target resource related information.
  • the database access control method further includes online backing up multiple access rights information corresponding to multiple users.
  • the database access control method further comprises: forming a resource tree by a plurality of database resources, the plurality of database resources including the target resource.
  • the step of acquiring the target resource in the database according to the matching result comprises: acquiring the target resource from the resource tree search according to a domain name or a keyword.
  • the access rights information includes administrator rights information, and if the matching result indicates that the user is an administrator, the user has access rights to all database resources.
  • the access rights information includes creator rights information, and if the matching result indicates that the user is a creator, the user has modification and access rights to all database resources.
  • the database access control method of the embodiment of the present invention can efficiently and quickly access target resources in the database, and perform access control according to the user's authority, thereby effectively securing the database.
  • FIG. 1 is a flow chart showing a database access control method according to an embodiment of the present invention.
  • FIG. 2 is a flow chart showing a database access control method according to another embodiment of the present invention.
  • FIG. 3 is a flow chart showing a database access control method according to still another embodiment of the present invention.
  • FIG. 1 is a flow chart of a database access control method 100 in accordance with an embodiment of the present invention. As shown in FIG. 1, the database access control method 100 can include the following steps:
  • Step 102 Receive access request information of a user, where the access request information includes an account, a password, and a target resource of the user.
  • Step 104 Match the access request information with the access right information, and generate a matching result (for example, the matching is successful or the matching is unsuccessful).
  • the database access control method 100 may further include the step of pre-storing access rights information, that is, storing a plurality of access rights information corresponding to a plurality of users, wherein the plurality of access rights information are roles and resources
  • the permissions are stored in the form of a list of permissions.
  • the plurality of access rights information may include administrator rights information, and if the matching result indicates that the user is an administrator, the user has access rights to all database resources.
  • the plurality of access rights information includes creator rights information, and if the matching result indicates that the user is a creator, the user has modification and access rights to all database resources.
  • Step 106 Acquire the target resource in the database according to the matching result, and generate access result information correspondingly.
  • step 106 may be specifically: if the matching result indicates that the access request information matches the access right information, acquiring the target resource, and correspondingly generating a location that includes the target resource related information. The access result information.
  • Step 108 Send the access result information to the user.
  • database access control method 200 in FIG. 2 is a flow diagram of a database access control method 200 in accordance with another embodiment of the present invention.
  • database access control method 200 in FIG. 2 is similar to database access control method 100 in FIG.
  • Step 102 Receive access request information of a user, where the access request information includes an account, a password, and a target resource of the user.
  • Step 104 Match the access request information with the access authority information, and generate a matching result
  • Step 106 Acquire the target resource in the database according to the matching result, and generate access result information correspondingly;
  • Step 108 Send the access result information to the user.
  • Step 210 Onlinely backing multiple access rights information corresponding to multiple users.
  • FIG. 3 is a flow diagram of a database access control method 300 in accordance with yet another embodiment of the present invention. In addition to steps 310 and 320, database access control method 300 in FIG. 3 is similar to database access control method 100 in FIG.
  • Step 310 Form a resource tree from a plurality of database resources, where the plurality of database resources include the target resource.
  • Step 102 Receive access request information of a user, where the access request information includes an account, a password, and a target resource of the user.
  • Step 104 Match the access request information with the access authority information, and generate a matching result
  • Step 106 Acquire the target resource in the database according to the matching result, and generate access result information correspondingly.
  • step 320 can be substituted for step 106.
  • Step 320 may include obtaining the target resource from the resource tree search according to a domain name or a keyword.
  • Step 108 Send the access result information to the user.
  • the database access control method of the embodiment of the present invention can efficiently and quickly access target resources in the database, and perform access control according to the user's authority, thereby effectively protecting the database. Security.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

一种数据库访问控制方法,包括:接收用户的访问请求信息(102),其中所述访问请求信息包括用户的账户、密码、和目标资源;将所述访问请求信息与访问权限信息匹配,并产生匹配结果(104);根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息(106);以及向用户发送所述访问结果信息(108)。所述方法能够有效保障数据库的访问安全。

Description

数据库访问控制方法 技术领域
本发明涉及数据库访问控制领域,并且特别涉及一种基于用户权限的数据库访问控制方法。
背景技术
数据库是现代计算机应用的一个重要组成部分,是人们有效地进行数据存储、共享和处理的工具。
数据库访问技术将数据库外部与其通信的过程抽象化,通过提供访问接口,简化了客户端访问数据库的过程。
然而,数据库中的数据可能是比较机密的。如果不对用户访问数据库的权限进行有效管理,而允许用户随意获取想要的数据,则数据库的安全得不到保障。
因此,需要一种改进的基于用户权限的数据库访问控制方法。
发明内容
本发明的目的在于提供一种改进的数据库访问控制方法。
为实现本目的,本发明提供一种数据库访问控制方法,包括:接收用户的访问请求信息,其中所述访问请求信息包括用户的账户、密码、和目标资源;将所述访问请求信息与访问权限信息匹配,并产生匹配结果;根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息;以及向用户发送所述访问结果信息。
优选地,所述数据库访问控制方法还包括:存储对应于多个用户的多个访问权限信息,其中所述多个访问权限信息是以角色和资源权限的权限列表的形式来存储。
优选地,所述根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息的步骤包括:如果所述匹配结果指示所述访问请求信息与所述访问权限信息匹配,则获取所述目标资源,并相应产生包含所述目标资源相关信息的所述访问结果信息。
优选地,所述数据库访问控制方法还包括:在线备份对应于多个用户的多个访问权限信息。
优选地,所述数据库访问控制方法还包括:由多个数据库资源形成资源树,所述多个数据库资源包括所述目标资源。
优选地,所述根据所述匹配结果来获取所述数据库中的所述目标资源的步骤包括:按照域名或关键词从所述资源树搜索获取所述目标资源。
优选地,所述访问权限信息包括管理员权限信息,如果所述匹配结果指示所述用户为管理员,则所述用户具有对所有数据库资源的访问权限。
优选地,所述访问权限信息包括创建者权限信息,如果所述匹配结果指示所述用户为创建者,则所述用户具有对所有数据库资源的修改和访问权限。
有利地,利用本发明实施例的数据库访问控制方法,能够高效快捷访问数据库中的目标资源,并且根据用户的权限来进行访问控制,有效保障了数据库的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1所示是根据本发明实施例的数据库访问控制方法的流程图。
图2所示是根据本发明另一实施例的数据库访问控制方法的流程图。
图3所示是根据本发明又一实施例的数据库访问控制方法的流程图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
图1所示是根据本发明实施例的数据库访问控制方法100的流程图。如图1所示,数据库访问控制方法100可包括以下步骤:
步骤102:接收用户的访问请求信息,其中所述访问请求信息包括用户的账户、密码、和目标资源。
步骤104:将所述访问请求信息与访问权限信息匹配,并产生匹配结果(例如,匹配成功或匹配不成功)。
在一个实施例中,数据库访问控制方法100还可包括预先存储访问权限信息的步骤,即:存储对应于多个用户的多个访问权限信息,其中所述多个访问权限信息是以角色和资源权限的权限列表的形式来存储。
所述多个访问权限信息可包括管理员权限信息,如果所述匹配结果指示所述用户为管理员,则所述用户具有对所有数据库资源的访问权限。
此外,所述多个访问权限信息包括创建者权限信息,如果所述匹配结果指示所述用户为创建者,则所述用户具有对所有数据库资源的修改和访问权限。
步骤106:根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息。
在一个实施例中,步骤106可具体为:如果所述匹配结果指示所述访问请求信息与所述访问权限信息匹配,则获取所述目标资源,并相应产生包含所述目标资源相关信息的所述访问结果信息。
步骤108:向用户发送所述访问结果信息。
图2所示是根据本发明另一实施例的数据库访问控制方法200的流程图。除了步骤210之外,图2中的数据库访问控制方法200类似于图1中的数据库访问控制方法100。
步骤102:接收用户的访问请求信息,其中所述访问请求信息包括用户的账户、密码、和目标资源。
步骤104:将所述访问请求信息与访问权限信息匹配,并产生匹配结果;
步骤106:根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息;以及
步骤108:向用户发送所述访问结果信息。
步骤210:在线备份对应于多个用户的多个访问权限信息。
图3所示是根据本发明又一实施例的数据库访问控制方法300的流程图。除了步骤310和320之外,图3中的数据库访问控制方法300类似于图1中的数据库访问控制方法100。
步骤310:由多个数据库资源形成资源树,所述多个数据库资源包括所述目标资源。
步骤102:接收用户的访问请求信息,其中所述访问请求信息包括用户的账户、密码、和目标资源。
步骤104:将所述访问请求信息与访问权限信息匹配,并产生匹配结果;
步骤106:根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息。
在一个实施例中,步骤320可代替步骤106。步骤320可包括:按照域名或关键词从所述资源树搜索获取所述目标资源。
步骤108:向用户发送所述访问结果信息。
有利地,利用本发明实施例的数据库访问控制方法,能够高效快捷访问数据库中的目标资源,并且根据用户的权限来进行访问控制,有效保障了数据库 的安全性。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (8)

  1. 一种数据库访问控制方法,包括:
    接收用户的访问请求信息,其中所述访问请求信息包括用户的账户、密码、和目标资源;
    将所述访问请求信息与访问权限信息匹配,并产生匹配结果;
    根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息;以及
    向用户发送所述访问结果信息。
  2. 如权利要求1所述的数据库访问控制方法,还包括:
    存储对应于多个用户的多个访问权限信息,其中所述多个访问权限信息是以角色和资源权限的权限列表的形式来存储。
  3. 如权利要求1所述的数据库访问控制方法,其特征在于,所述根据所述匹配结果来获取所述数据库中的所述目标资源,并相应产生访问结果信息的步骤包括:
    如果所述匹配结果指示所述访问请求信息与所述访问权限信息匹配,
    则获取所述目标资源,并相应产生包含所述目标资源相关信息的所述访问结果信息。
  4. 如权利要求1所述的数据库访问控制方法,还包括:
    在线备份对应于多个用户的多个访问权限信息。
  5. 如权利要求1所述的数据库访问控制方法,还包括:
    由多个数据库资源形成资源树,所述多个数据库资源包括所述目标资源。
  6. 如权利要求5所述的数据库访问控制方法,其特征在于,所述根据所述 匹配结果来获取所述数据库中的所述目标资源的步骤包括:
    按照域名或关键词从所述资源树搜索获取所述目标资源。
  7. 如权利要求1所述的数据库访问控制方法,其特征在于,所述访问权限信息包括管理员权限信息,如果所述匹配结果指示所述用户为管理员,则所述用户具有对所有数据库资源的访问权限。
  8. 如权利要求1所述的数据库访问控制方法,其特征在于,所述访问权限信息包括创建者权限信息,如果所述匹配结果指示所述用户为创建者,则所述用户具有对所有数据库资源的修改和访问权限。
PCT/CN2017/070238 2017-01-05 2017-01-05 数据库访问控制方法 WO2018126381A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/070238 WO2018126381A1 (zh) 2017-01-05 2017-01-05 数据库访问控制方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/070238 WO2018126381A1 (zh) 2017-01-05 2017-01-05 数据库访问控制方法

Publications (1)

Publication Number Publication Date
WO2018126381A1 true WO2018126381A1 (zh) 2018-07-12

Family

ID=62788861

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/070238 WO2018126381A1 (zh) 2017-01-05 2017-01-05 数据库访问控制方法

Country Status (1)

Country Link
WO (1) WO2018126381A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078859A (zh) * 2012-12-31 2013-05-01 普天新能源有限责任公司 业务系统权限管理方法、设备及系统
CN104219251A (zh) * 2014-09-26 2014-12-17 北京国双科技有限公司 获取网站数据的方法和装置
CN106059776A (zh) * 2016-07-07 2016-10-26 乐视控股(北京)有限公司 网站登录方法及装置
CN106209913A (zh) * 2016-08-30 2016-12-07 江苏天联信息科技发展有限公司 数据访问方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078859A (zh) * 2012-12-31 2013-05-01 普天新能源有限责任公司 业务系统权限管理方法、设备及系统
CN104219251A (zh) * 2014-09-26 2014-12-17 北京国双科技有限公司 获取网站数据的方法和装置
CN106059776A (zh) * 2016-07-07 2016-10-26 乐视控股(北京)有限公司 网站登录方法及装置
CN106209913A (zh) * 2016-08-30 2016-12-07 江苏天联信息科技发展有限公司 数据访问方法及装置

Similar Documents

Publication Publication Date Title
CN111488598B (zh) 访问控制方法、装置、计算机设备和存储介质
US10135796B2 (en) Masking and unmasking data over a network
US20180285591A1 (en) Document redaction with data isolation
US20160028699A1 (en) Encrypted network storage space
US11658982B2 (en) Efficient authentication in a file system with multiple security groups
US8621036B1 (en) Secure file access using a file access server
KR20140048879A (ko) 안전한 데이터 저장
US10178183B2 (en) Techniques for prevent information disclosure via dynamic secure cloud resources
CN109831435B (zh) 一种数据库操作方法、系统及代理服务器和存储介质
US9223949B1 (en) Secure transformable password generation
KR102137122B1 (ko) 보안 체크 방법, 장치, 단말기 및 서버
US10162950B2 (en) Methods and apparatus for using credentials to access computing resources
EP3697053B1 (en) Accessing encrypted user data at a multi-tenant hosted cloud service
US9619631B1 (en) Role-based permissions for accessing computing resources
US9621349B2 (en) Apparatus, method and computer-readable medium for user authentication
US20130305328A1 (en) Systems and methods for passing password information between users
CN111917711A (zh) 数据访问方法、装置、计算机设备和存储介质
WO2018126380A1 (zh) 数据库访问控制系统
JP6434390B2 (ja) 文書秘匿化システム
US20160335420A1 (en) Secure Document Management
WO2018126381A1 (zh) 数据库访问控制方法
WO2018126388A1 (zh) 数据库共享管理方法
WO2018126387A1 (zh) 数据库共享管理系统
US9183403B2 (en) Key retrieval
JP2006190050A (ja) マルチタスク実行システム及びマルチタスク実行方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17890440

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 06/11/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 17890440

Country of ref document: EP

Kind code of ref document: A1