Security auditing method based on aspect oriented programming (AOP) and annotation information system

An annotation information and security audit technology, applied in the field of security audit based on AOP and annotation information system, can solve problems such as complex processing, high coupling, and reduced code readability, so as to reduce workload, shorten construction period, and solve speed reduction effect

Active Publication Date: 2014-02-05
FUJIAN YIRONG INFORMATION TECH
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the security audit interface is called in the business logic, the business logic and the security audit cannot be separated, and the coupling degree is high
[0008] Chinese invention patent 201110143035.7 discloses a method for recording logs. By proposing an interception based on AOP, applying it to design a general audit log and then organizing and processing log information in AOP, this processing will be very complicated, and in the business class Does not identify audited business information, is not humane enough, and code readability is greatly reduced
[0009] Chinese invention patent 201110321921.4 discloses a method based on AOP technology to intercept and process business general logic. This method can be applied to the design of general audit logs. However, if the business attributes of audit logs only provide an attribute identification, and then process them in AOP, It will lead to this kind of processing is very complicated, and the identification in the business class is not humanized enough, and the readability of the code is greatly reduced
[0010] No matter which of the above solutions can solve the coupling degree and unified security audit requirements at the same time, the use of memory cache logs or hadoop for distributed analysis does not solve the problem of business and code decoupling, and the pure use of AOP only solves the problem of high coupling However, in AOP, it is impossible to obtain business-related audit information according to the specific business, resulting in too strong technical audit information, insufficient humanization, and too high technical requirements for audit administrators.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security auditing method based on aspect oriented programming (AOP) and annotation information system
  • Security auditing method based on aspect oriented programming (AOP) and annotation information system
  • Security auditing method based on aspect oriented programming (AOP) and annotation information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In the present invention, all application systems uniformly store their safety audit information on the safety audit platform, such as figure 1 Shown. Business systems (such as collaborative office, quality system, etc.) no longer continue to store security audit logs; the security audit log platform provides external security audit log services (only add and query interfaces are provided), and the security audit log platform also provides user-oriented security Audit log query service (that is, you can directly query the security audit log through the query interface provided by the security audit log platform). Due to the centralized management of security audit logs, the audit logs need to be managed in a sub-system. For example, an audit administrator in a collaborative office cannot retrieve the audit logs of the quality system or other application systems. Each application system does not need to build a security audit module, but only needs to introduce a security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security auditing method based on aspect oriented programming (AOP) and an annotation information system includes the following steps: designing an auditing annotation class according to an auditing requirement; adding auditing annotation into a business class; intercepting business operation through the AOP; submitting an auditing log to an auditing platform through a hyper text transport protocol (HTTP). By means of combination of the AOP and an annotation technology, the method solves the problem of decoupling of security audit and business and can provide humanized safety audit information.

Description

【Technical Field】 [0001] The invention relates to the technical field of computer software, in particular to a security audit method based on AOP and annotated information system. 【Background technique】 [0002] The understanding of computer information security is to ensure the confidentiality, integrity, controllability, availability and non-repudiation (non-repudiation) of information in a computer information system, referred to as the "five characteristics". Security audit is one of the important guarantees of the "five natures". It conducts security audits on all network resources in the computer information system (including databases, hosts, operating systems, security equipment, etc.), records all occurrences, and provides them to the system The administrator serves as the basis for system maintenance and security protection. Once there is an emergency, you can quickly check the entry and exit records and behavior records to determine the problem and take corresponding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34G06F9/44G06F21/60
Inventor 倪时龙苏江文洪顺淋
Owner FUJIAN YIRONG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products