Unlock instant, AI-driven research and patent intelligence for your innovation.

Three-layer auditing method for database

A technology of database and three-tier architecture, which is applied in the fields of electrical digital data processing, special data processing applications, computing, etc., and can solve problems such as insufficient accuracy of database access associations

Inactive Publication Date: 2014-10-22
蓝盾信息安全技术有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the shortcoming or insufficiency of the lack of accurate association between the three-tier database audit user request and the database access in the prior art, the present invention proposes a three-tier audit method for the database, which adopts the association through the return value, thereby realizing accurate association The purpose of actual operation users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-layer auditing method for database
  • Three-layer auditing method for database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] Aiming at the deficiencies of the prior art, the present invention provides a method for database three-tier auditing, which can accurately associate WEB requests with database access requests in the three-tier architecture, and obtain the actual initiation of database access through this association. Requested end users, and this method will not affect existing business systems.

[0022] Principle of the present invention:

[0023] 1) If the user's request...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-layer auditing method for a database. The three-layer auditing method for the database includes that associating a WEB request with a database accessing request in a three-layer architecture, acquiring a terminal user who actually sends the database accessing request through the association, and generating auditing information. The three-layer auditing method for the database is capable of performing the precise three-layer accessing auditing for the database without changing the running environment of the user and correcting the business system of the user and does not influence an existing business system.

Description

technical field [0001] The invention relates to the technical field of database auditing, in particular to a method for three-layer auditing of a database. Background technique [0002] In the existing database audit system, usually the user terminal directly sends a SQL request to the database server, and the system analyzes the SQL statement through the information in the data packet requested by the user, and can directly associate the request for accessing the database with the actual user to generate audit information. [0003] However, in some application environments, the user sends a request to the WEB server through the browser, and then the WEB server sends an access request to the database. In this case, the user's request usually does not carry SQL information. The method of directly auditing the information in the user request data packet is invalid. It is necessary to associate the user request with the database access request in order to accurately audit the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F17/30G06F11/00
Inventor 柯宗贵杨育斌周炎华
Owner 蓝盾信息安全技术有限公司