Audit configuration method and audit configuration system for database

A configuration method and configuration system technology, applied in the field of database security, can solve problems such as cumbersome audit rules for configuration mode objects, achieve flexible and free audit configuration, improve work efficiency, and improve audit configuration performance.

Inactive Publication Date: 2013-04-17
HUAWEI TECH CO LTD
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a database audit configuration method and a related system, which solves the problem of cumbersome audit rules for configuration mode objects existing in the database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audit configuration method and audit configuration system for database
  • Audit configuration method and audit configuration system for database
  • Audit configuration method and audit configuration system for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0055] see figure 1 , figure 1 It is a flow chart of the database audit configuration method provided by the embodiment of the present application. The database audit configuration method provided in this embodiment is described from the perspective of a system for managing the database, such as figure 1 As shown, the audit configuration method of the database provided in this embodiment includes:

[0056] S110. Obtain a first request. The first request is used to indicate the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an audit configuration method and an audit configuration system for a database. The audit configuration method includes acquiring an audit grade of a configured mode object to acquire an audit configuration strategy corresponding to the audit grade; generating a plurality of audit rules according to the audit configuration strategy; generating an audit configuration table according to the audit rules; and configuring audit rules of the mode object by means of loading the audit configuration table. The audit configuration method and the audit configuration system have the advantages that audit configuration for the mode object can be automatically completed without manually setting the audit rules in the audit configuration table, the labor cost is saved, high workload of auditors is reduced, and the work efficiency of the auditors is improved.

Description

technical field [0001] The application relates to the technical field of database security, in particular to a database audit configuration method and system. Background technique [0002] Database auditing refers to the process of recording information such as the actions (or events) that occur in the database system, the operation objects corresponding to the actions, and the operation time. This auditing function automatically records all operations of the user on the database and puts them into the audit log. The database management system can use the audit trail information to reproduce a series of events that lead to the current state of the database, and find out who, when and what is illegally accessing data. Database auditing can be divided into four categories: server-level auditing, system authority level auditing, statement-level auditing, and schema object-level auditing. For a database system, only auditors have the right to perform auditing settings. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30
Inventor 吴标强苏志华徐文韬
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products