Database forensics method and device
A database and specific data technology, applied in the database field, can solve problems such as low operation efficiency and complex process of the target database, and achieve the effect of improving operation efficiency, solving complex process, and simplifying operation process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] figure 1 It shows the working flow diagram of the database forensics method provided by the embodiment of the present invention, and the method includes:
[0035] Step 101, according to the database structure of the target database and the table structure of each table included in the target database, establish and save a blank result database having the same structure as the target database;
[0036] Specifically, for the target database in the offline device, the database export file and / or the database backup file and / or the database file in the target database can be loaded through a preset interface to obtain the database structure of the target database and each database included in the target database. The table structure of the table; for the online target database, it can be connected to the online target database through the preset interface according to the address information of the target database, and based on the known authentication information or author...
Embodiment 2
[0047] figure 2 Another work flow diagram of the database forensics method provided by the embodiment of the present invention is shown, the method includes:
[0048] Step 201, according to the database structure of the target database and the table structure of each table included in the target database, establish and save a blank result database having the same structure as the target database;
[0049] Similar to the above step 101, the structure of the target database can be obtained by loading the target database to access the target database in the offline device, or access the online target database through a preset interface, and establish the result database according to the obtained target database structure;
[0050] Establish and save the result database with the same structure as the target database, and be able to obtain and save the structural characteristics of the target database;
[0051] Step 202, check the target database to obtain the check value of the ...
Embodiment 3
[0067] The embodiment of the present invention also provides a database forensics method, the method is based on the first or second embodiment, such as image 3 As shown, the following processing is also included:
[0068] Step 301, acquiring and saving user information and log information of the target database;
[0069] Wherein, the log information includes one or a combination of the following: login log, operation log, SQL log, import and export log, backup log, error log, alarm log, and the log information may also include other types of log information;
[0070] Obtaining and saving log information can replicate the operation of the target database, and can provide reference for subsequent analysis and processing in application scenarios such as electronic data forensics;
[0071] Step 302, respectively verifying the acquired user information and log information to obtain the verification value of the user information and the verification value of the log information, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 