FIELD: computing systems.
SUBSTANCE: invention relates to computing systems and methods for data migration and replication using secure database access technology. The method consists in the fact that on the basis of the generated dictionary of configuration data, there is a sequential formation of requests to receive data from a remote database, supplement the received data with attributes of access descriptors and to enter the final data into the local database. The formation of these queries occurs until the last record in the remote database is reached. In this case, at all stages of information exchange, the result of the request is converted by the coding method in accordance with the specified conversion function by the key received from the Certification Center.
EFFECT: expansion of functionality, implementation of the function of network migration of data from heterogeneous databases, using means of protecting access to databases, reducing the computational load, improving the security of information in the database from internal and external intruders.
1 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
SECURE METHOD OF ACCESS TO DATABASE | 2019 |
|
RU2709288C1 |
METHOD OF PROTECTING RELATIONAL DATABASE DESCRIPTORS | 2021 |
|
RU2774098C1 |
SYSTEMS AND METHODS FOR CONTROL REALISED BY MEANS OF ACCESS AT LEVEL OF MINOR STRUCTURAL UNITS OVER DATA STORED IN RELATIONAL DATABASES | 2004 |
|
RU2373571C2 |
METHOD FOR REPLICATION OF INFORMATION IN DATABASES WITH ENCODING WITH SIMPLE SYNTACTIC REPLACEMENT BASED ON DIRECT REPLACEMENT TABLE | 2021 |
|
RU2787143C2 |
DEPERSONALISATION AND MIGRATION SYSTEM OF USER PERSONAL DATA ON WEBSITES BASED ON BACKUP TECHNOLOGY | 2018 |
|
RU2731110C2 |
SYSTEM FOR PROTECTING PERSONAL DATA OF USERS IN AN INFORMATION SYSTEM BASED ON DEPERSONALIZATION AND MIGRATION TO A SECURE ENVIRONMENT | 2017 |
|
RU2698412C2 |
LAWFUL ACCESS; STORED DATA HANDOVER ENHANCED ARCHITECTURE | 2006 |
|
RU2434343C2 |
ROBUST AND SECURE HARDWARE-COMPUTER SYSTEM IN CLOUD COMPUTING ENVIRONMENT | 2013 |
|
RU2557476C2 |
METHOD FOR SIMULATION OF THE PROCESS OF FUNCTIONING OF AUTOMATED SYSTEMS | 2022 |
|
RU2787986C1 |
METHOD OF IMPLEMENTING SECURITY POLICY RULES IN PEER-TO-PEER COMMUNICATION NETWORKS OF CYBER PHYSICAL DEVICES | 2019 |
|
RU2714217C1 |
Authors
Dates
2021-03-30—Published
2020-07-08—Filed