Method and device for obtaining user login information based on enterprise application system

A login information and enterprise application technology, applied in the field of obtaining user login information based on enterprise application systems, can solve problems such as difficulty in implementation and increased risk, and achieve simple and reliable implementation

Inactive Publication Date: 2011-05-18
深圳市易聆科信息技术股份有限公司
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the information system of the enterprise is often provided by a third party, a little transformation and change will lead to a great increase in the difficulty and risk of implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for obtaining user login information based on enterprise application system
  • Method and device for obtaining user login information based on enterprise application system
  • Method and device for obtaining user login information based on enterprise application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] A method and device for obtaining user login information based on an enterprise application system provided by the present invention are used in account security auditing. In order to make the purpose, technical solution and advantages of the present invention clearer and clearer, the following examples are given with reference to the accompanying drawings The present invention is further described in detail. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] A method for obtaining user login information based on an enterprise application system provided by an embodiment of the present invention mainly uses bypass monitoring technology to filter network behaviors based on key URLs and keywords to discover and identify login actions and collect user login information. Information, user login log audit. Since the current application systems are basically WEB app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for obtaining user login information based on an enterprise application system, relating to the technical field of networks. Because of adopting a bypass surveillance process, the method and the device for obtaining user login information based on the enterprise application system realize network behavior filter according to key a URL (Uniform Resource Locator) and a keyword to find and identify login action, collect user login information and carry out user login journal audition. The method and the device have the following advantages that: (1) bypass surveillance is a monitoring program of a network layer, can also restore the HTTP (Hyper Text Transport Protocol) request of an application layer, can analyze and identify the content of the HTTP request and judge a login result according to the content; and (2) a bypass surveillance method has no affect on the operation of the traditional system, does not change the traditional operation environment, and is simple and reliable to apply.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method and device for acquiring user login information based on an enterprise application system. Background technique [0002] With the rapid development of enterprise business, the enterprise application system has changed from closed to open, from local area network to the Internet. Facing the security problems of internal and external networks, the original method of enterprise resource information access control based on account password can no longer meet the current and future business needs. requirements. Identity authentication and authorization management cannot avoid the destruction or leakage of information resources caused by account theft. [0003] The importance of corporate accounts, as the identification or pass for employees to obtain company resources, is becoming more and more prominent. The demand for account security supervision is increasing day...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30
Inventor 李久进
Owner 深圳市易聆科信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products