Unlock instant, AI-driven research and patent intelligence for your innovation.

Database user behavior management system and database user behavior management method

A technology of management system and management method, which is applied in the field of database user behavior management and database user behavior management system, which can solve the problems of cumbersome backtracking and determination of responsibilities, low matching accuracy rate, and inability to judge whether user operations are legal in real time, etc.

Active Publication Date: 2016-01-27
CHINA MOBILE GRP GUANGDONG CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is extremely cumbersome to retrospectively determine responsibility from a large number of logs, and the audit workload is huge, resulting in problems such as low matching accuracy between actual operation content and approval content, low efficiency, and low success rate of illegal operation discovery.
[0005] Obviously, using the current 4A solution, it is impossible to analyze user behavior in real time (Analyse), it is impossible to judge whether the user operation is legal in real time, and it is impossible to intercept illegal operation behavior in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database user behavior management system and database user behavior management method
  • Database user behavior management system and database user behavior management method
  • Database user behavior management system and database user behavior management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The root cause of the 4A solution in the prior art is that the user’s illegal operation cannot be found and intercepted in real time because the database system transparently transmits all operation instructions. In the embodiment of the present invention, all operation instructions input by the user are analyzed , to judge whether the operation instruction is legal, and to intercept the illegal operation instruction in real time, so as to fundamentally solve the problem of the current database security operation and maintenance management and control work.

[0061] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0062] Such as figure 2 Shown is a schematic structural diagram of a database user behavior management system according to an embodiment of the present invention. The database user behavior management system includes:

[0063] The operation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database user behavior management system and a database user behavior management method. The database user behavior management system comprises an operating instruction acquiring module for acquiring an operating instruction input by a user, an operating instruction analyzing module for analyzing the operating instruction so as to obtain the corresponding instruction operation range of the operating instruction, a legitimacy judging module for judging whether the instruction operation range exceeds the permitted operation range of the user's operation or not, an operating instruction transmitting module for transmitting the operating instruction to a database when the instruction operation range does not exceed the permitted operation range of the user's operation, and an operating instruction intercepting module for intercepting the operating instruction when the instruction operation range exceeds the permitted operation range of the user's operation. The management system is capable of analyzing the user's operation, adjusting whether the user's operation is legitimate or not, and intercepting illegal operation in real time.

Description

technical field [0001] The invention relates to the field of business support and management information systems, in particular to a database user behavior management system and a database user behavior management method. Background technique [0002] At present, database information security is the focus of major enterprises. If database users illegally operate sensitive data in the database through the background, resulting in sensitive data being leaked or maliciously modified, it will bring huge economic losses to the enterprise and seriously affect the brand image. [0003] The current solution is: use the 4A (Authentication, Account Account, Authorization, Audit) system to perform post-audit on user operations. like figure 1 Shown is a schematic diagram of the overall architecture of the database system in the prior art, the database system includes: 4A system, BOSS (Business Operation Support System, BusSineSS&OperationSupportSystem) bastion machine and BOSS databas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F17/30
Inventor 冯允熊刚李启文蒋迎锋梅铁勇
Owner CHINA MOBILE GRP GUANGDONG CO LTD