Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for accessing resources from server

A technology for accessing resources and servers, which is applied in the field of information systems, can solve problems such as unproposed solutions, unbearable cost and time, and inability to correctly analyze database security solutions, so as to achieve the effect of improving accuracy and accuracy

Inactive Publication Date: 2015-05-20
成都维远艾珏信息技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the initiator source information reflected in the track information recorded by the database system often only points to a certain middle-level system, rather than its initial access point, resulting in the inability of the database security solution to correctly analyze
[0004] In response to this problem, mainstream manufacturers have introduced special embedded monitoring modules to expand the underlying data communication prot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accessing resources from server
  • Method for accessing resources from server
  • Method for accessing resources from server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0018] figure 1 is a flowchart of a method for accessing resources from a server according to an embodiment of the present invention. One aspect of the present invention provides a method for accessing resources from a server, which i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for accessing resources from a server. The method comprises the following steps: performing statistical learning and parameter matching on a database access operation mode of a multilayer information platform; identifying a data access path based on a matching result to obtain the information of a final accessor. The method for accessing the resources from the server has the advantages that the accuracy of an identification method under a complicated system environment is improved, and the accuracy of parameter comparison is improved.

Description

technical field [0001] The invention relates to an information system, in particular to a method for accessing resources from a server. Background technique [0002] With the increasing dependence of the medical industry on information systems with medical quality as the core, the security of core information assets such as databases has attracted more and more attention from enterprises. In this context, various application layer-oriented database security solutions began to be applied. The general mode of these solutions is: first collect the initiator (information source) of each data access activity and its operating characteristics, and then identify and reproduce the activity sequence of each independent information source within a certain time window, that is, the access path. Perform in-depth behavioral analysis and anomaly discovery. [0003] For these security solutions, identifying the source information (including user identification information, terminal ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F17/30
Inventor 余哲旭赵大全
Owner 成都维远艾珏信息技术有限公司