Method for acquiring linkage information in database safety audit

A technology for connecting information and security auditing, which is applied in the network field and can solve problems such as leaking secrets and generating security risks

Inactive Publication Date: 2014-03-26
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, you can decrypt the obtained ciphertext by exporting the private key of the certificate of the database server, so as to obtain the plaintext information of the connection, but this method needs to export the private key, which will cause security risks and risks of leaking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for acquiring linkage information in database safety audit
  • Method for acquiring linkage information in database safety audit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0015] In order to solve the shortcomings or insufficiencies in the security of decrypting the connection information of the access database in the prior art, the present invention adopts a method of directly obtaining the connection information from the database and matching the existing connection, thereby realizing the effective identification of the connection user while ensuring security sex.

[0016] Principle of the present invention:

[0017] 1. The source...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for acquiring linkage information in database safety audit. A database audit system in the method acquires a user address in a bypass packet capture mode, then, user information is inquired in a system table of a database, and thus the query result is linked to the current linkage. With the method, a linkage user can be effectively identified, the risk of information leakage is avoided, and the method can be achieved easily and stably.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for acquiring connection information in database security audit. Background technique [0002] Database auditing is mainly used to monitor and record various operations on the database server. Through the analysis of network data, various operations on the database server can be analyzed in real time and intelligently, and recorded in the audit database for future query and analysis. , filtering, to monitor and audit user operations on the target database system. It can monitor and audit users' creation, modification and deletion of database tables, views, sequences, packages, stored procedures, functions, libraries, indexes, synonyms, snapshots, triggers, etc. in the database. It can also intelligently judge the behavior of operating the database in violation of the rules according to the set rules, and record and alarm the violations. Since the database audit works ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/62H04L29/06
CPCG06F16/245G06F16/21G06F21/6218H04L63/10
Inventor 柯宗贵杨育斌周炎华黄建富
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products