Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access relationship carding method and system

An access relationship and access source technology, applied in the field of communication security, can solve problems such as inability to view and analyze, no access rights, and inability to discover and detect policy configuration omissions in access logs in time, achieving the effect of visual display

Inactive Publication Date: 2017-10-20
SANGFOR TECH INC
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are some inconveniences in the use of the existing log recording methods, such as the existing access log records or audit logs can only be displayed by query, and cannot be viewed and analyzed in a visual and intuitive way; the existing The access log or audit log only records access information, and there is no effective mechanism to detect illegal access. For example, an IP does not have access to port 3389 of the server, but there is actually access. The existing access log cannot detect and detect policies in time. configuration omissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access relationship carding method and system
  • Access relationship carding method and system
  • Access relationship carding method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention provide a method and system for sorting out access relationships, which are used for visually displaying access relationships recorded in access logs.

[0053] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention are clearly and completely described below. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0054] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access relationship carding method and system to visually demonstrate access relationships. The method provided by the embodiment of the invention comprises the steps that all access relationships are collected; the basic access information in each access relationship is determined; an access source and the access purpose in the basic access information are determined; and the access source and the access purpose are connected through lines and arrows to form a visual access relationship, wherein the lines represent the access relationship and the arrows represent the access direction. The embodiment of the invention further provides an access relationship carding system used for visually demonstrating access relationships.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular to a method and system for sorting out access relationships. Background technique [0002] In a complete information system, the log system is a very important functional component. It can record all the behaviors generated by the system and express them according to a certain specification. We can use the information recorded by the log system to troubleshoot the system, optimize the performance of the system, or adjust the behavior of the system based on this information. In the security field, logs can reflect many security attacks, such as login errors and abnormal access. Logs can also tell you a lot about what's happening on your network, including performance information, fault detection, and intrusion detection. Logs can be a good source of "forensic" information to find out "what happened" after an accident. Logs can be audit trailed for auditing....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/045H04L63/10
Inventor 吕晓滨
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products