Check patentability & draft patents in minutes with Patsnap Eureka AI!

Sql sentence audit method and system for oracle database binding variable

A technology for binding variables and databases, which is applied in the field of SQL statement auditing to achieve high extraction efficiency, simple implementation and good performance.

Inactive Publication Date: 2011-05-11
BEIJING VENUS INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to overcome the deficiencies of the existing network business audit system in the operation of the oracle database using the binding variable method for the extraction of variables in the sql statement and the audit function of assignment, the present invention provides an accurate audit of the sql statement of the oracle database binding variable method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sql sentence audit method and system for oracle database binding variable
  • Sql sentence audit method and system for oracle database binding variable
  • Sql sentence audit method and system for oracle database binding variable

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] This embodiment is the basic mode of the audit method of the sql statement of the oracle database binding variable. The system used is shown in Figure 1. Including database type identification locator, sql statement location and variable extractor, variable assignment extractor and audit system, the operation process is shown in Figure 2. Said method comprises the following steps:

[0025] Database type identification and positioning step;

[0026] SQL statement positioning and variable extraction steps;

[0027] Variable assignment extraction step;

[0028] audit steps.

[0029] ① Database type identification and positioning steps. Different databases use different communication protocols, for example, Sybase database and sqlserver database use TDS protocol, Oracle database uses TNS protocol, Informix database uses its self-designed informix protocol, and so on. These databases will exchange some system information with each other during the initial connection an...

Embodiment 2

[0034] This embodiment is a preferred solution for the step of identifying and locating database types in Embodiment 1. The sub-steps included in the database type identification and location step:

[0035] Use the data packets exchanged during the initial connection interaction between the database client and the server used in the actual network environment to determine whether the current environment is an oracle database;

[0036] The output of this stage is used as the premise of sql statement positioning and variable extraction in the next stage.

[0037] The basic idea of ​​this embodiment is:

[0038] Firstly, during the connection process between the database client and the server, use the protocol analysis method to find as much information as possible that can identify the database type and host status, including the static characteristics and ports of the protocol used. Because these information are unique identifiers of each database, and generally do not have t...

Embodiment 3

[0040] This embodiment is an optimal solution for the sql statement location and variable extraction steps in the first or second embodiment. The sub-steps in the sql statement positioning and variable extraction steps include:

[0041] Using the multi-pattern matching method to extract the sql statement that identifies the database operation behavior for the actually captured oracle database interaction data message;

[0042] In the extracted sql statement, a multi-pattern matching algorithm is used to extract the included variables;

[0043] Output the extracted sql statement containing variables and variable names as the operation object of in-depth audit.

[0044] This embodiment is carried out on the premise that the database type used in the current network environment has been determined to be an oracle database in the phase of identifying and locating the database type. In the process of data interaction between the database client and the server, the operation infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for accurately auditing of sql statement of an oracle database binding variable, in particular to a method and a system for variable extraction, valuation and in-depth audit of the sql statement of the binding variable used in the oracle database operation process of network business audit products. The system comprises a database type identification locator, an sql statement locating and variable extractor, and a variable valuation extractor and an audit system. The method is characterized in that the method comprises the steps of database typeidentification and locating, sql statement locating and variable extraction, and variable valuation extraction and audit. The invention solves the problem of the accuracy of the sql statement audit of the binding variable during the oracle database operation audit carried out by the prior audit product. In addition, the system and the method also have high efficiency and can be widely applied to the network business audit products.

Description

technical field [0001] The present invention relates to a sql statement auditing method and system for oracle database binding variables, which is an electrical processing method and system for the network, and is a method for oracle database operation process based on the characteristics of the message in the network data flow. A method and system for identifying and accurately auditing variable assignments using sql statements bound to variables. Background technique [0002] The network business audit system is an important means of network security protection that is increasingly widely used at present. It analyzes, records, and analyzes the network activities of trusted personnel in the business system to help managers plan and prevent in advance, monitor in real time, and violate regulations. Behavior prevention and post-event investigation of network operation accidents can help users strengthen internal and external network behavior supervision, avoid loss of core as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24G06F17/30
Inventor 孙海波骆拥政叶润国张辉李新鹏
Owner BEIJING VENUS INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More