Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing database auditing

A database and data operation technology, applied in the field of network communication, can solve problems such as low review efficiency, disorderly arrangement order, difficult audit work, etc., and achieve the effect of improving audit efficiency

Inactive Publication Date: 2016-12-07
HANGZHOU DPTECH TECH
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since different clients may access each database at the same time, the correspondingly generated session log information is also mixed with each other and stored in the log retention system, resulting in that when these session log information is displayed in the preset audit When using users, the arrangement order is chaotic, which brings great difficulties to the audit work, resulting in very low review efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing database auditing
  • Method and device for realizing database auditing
  • Method and device for realizing database auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0023] figure 1 It is a schematic diagram of a network architecture in related technologies, see figure 1 : The server is configured with databases, such as Oracle database, MySQL database and SQL server database, etc., and the server is also equipped with an audit gateway device, so that all clients such as client 1, client 2 and client 3 need to pass the audit The gateway device acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and a device for realizing database auditing. The method comprises the following steps: when a received message is matched with a predefined audit strategy, recording session identifiers of a database access session corresponding to the message; when session logs corresponding to the database access session are generated, adding the session identifiers of the database access session in the session logs; according to the session identifier included in each session log, grouping and displaying the obtained session logs. A preset audit user can conveniently and quickly search all focused session logs, especially when the access flow of a database is large, a large number of session logs can be generated, so that the auditing efficiency can be effectively improved according to the technical scheme.

Description

technical field [0001] This application relates to network communication technology, in particular to a method and device for realizing database auditing. Background technique [0002] At present, the databases used by some departments in our country have certain security risks. For example, malicious operations by internal users, abuse of resources or disclosure of corporate confidential information, coupled with human misoperation and hacker intrusion, have caused great losses to the database system. In order to reduce losses, the database security audit system collects, analyzes and identifies the data flow of accessing the database, stores, audits, queries and analyzes the relevant behaviors of accessing the database and the relevant content sent and received by the database, and records them to form session logs. Available for auditing by the default audit user. [0003] In a related technology, the audit gateway device judges whether to audit the initiator of the data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
CPCG06F16/211G06F16/338
Inventor 张晓东张欢
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products