Password authority management scheme and implementation in the three-level database application
Hu Yu
Abstract: A new type of password authority management scheme based on three-level database application ideas and its implementation methods in highway toll database management systems. Keywords: three-level database encryption password authority
This paper is aimed at the management information system for security requirements - highway large-scale charging database management systems, proposes a new type of three-level password authority management program. The database in the toll station servers uses SQL Server 6.5, the front desk uses Visual FoxPro 5.0 development user interface applications for financial data inquiry, tolls, financial statements, printing, pass ticket management, system maintenance, etc., using Visual C 5.0 development of background data communication applications, communicating with lanes and enters the database. The toll station users can use the Visual FoxPro 5.0 environment, the ISQL environment, etc., can also be associated with the database, or can log in to the database through the application, and can also log in to the database system to operate, the toll branch center and the center user pass the city or ISDN. Line Remote Access Server Login Database. Since the database is stored in the database, its importance is self-evident. In order to effectively standardize the operation permission of various users, ensure the safety of the system, a reliable data security management program is required. 1 System Design Thoughts 1.1 Layer 2 Database Application Design Existing Domestic Large Database Application System Multi-use Customer / Server (Client / Server) application structure, whose password management is more than 1 user or group with one password, user input Database directly after passwords. This mode of work is essentially based on the second layer of database application mode, which is the structure of directly oriented data. The advantage is that the structure is simple and easy to achieve, but it has a significant shortcomings: (1) security difference: Determine its permissions through passwords of all kinds of personnel, leaks prone, may have illegal personnel to log in. (2) Data Integrity: Data is incomplete when the direct operation of the data may cause an abnormal situation interrupt operation. (3) Low efficiency: All kinds of users are randomly submitted to SQL Server with a single SQL statement to increase the burden on the network. 1.2 Three-level database application system design three-level database application structure refers to the three-level application structure of "Client / Application / Server), which is shown in Figure 1. Client | Server --------------------------------------------------------------------------------------------------------------------------------- ------- | -------------------------------- User service request <------ -> Processed into a complete SQL event <---- | ------> SQL Server 1. Representation layer isql 2. Application layer ODBC 3. Data layer