摘要 |
Disclosed are a database operation method and device. The method comprises: receiving a read/write request for an open source database of a first terminal; under the trigger of the read/write request, generating a first key for accessing the open source database; comparing the first key with a second key so as to determine whether the first key is consistent with the second key, wherein the second key is a key which is generated by the first terminal according to a feature code of the first terminal when the open source database is created; and according to a comparison result, determining whether it is permitted to conduct a read/write operation on the open source database, wherein if the comparison result indicates that the first key is consistent with the second key, it is permitted to conduct the read-write operation on the open source database, and if the comparison result indicates that the first key is inconsistent with the second key, it is prohibited to conduct the read/write operation on the open source database. By means of the present invention, the problem that the open source database has potential security risks is solved, so that user data written into the database can be protected on a system level, thereby avoiding the potential security risks and losses caused to a user by the illegal acquisition of these data. |