Unlock instant, AI-driven research and patent intelligence for your innovation.

A Centralized Safe and Trustworthy Auditing Method

A credible and secure technology, applied in secure communication devices, encryption devices with shift registers/memory, digital transmission systems, etc., can solve problems such as inability to obtain audits, and achieve the effect of avoiding illegal operations

Active Publication Date: 2021-03-02
BEIJING INST OF COMP TECH & APPL
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Because the operation and maintenance personnel of the management side of the centralized management mode know the database access password, they can directly access the database, modify the database, and delete the records of certain malicious behaviors, which cannot be audited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Centralized Safe and Trustworthy Auditing Method
  • A Centralized Safe and Trustworthy Auditing Method
  • A Centralized Safe and Trustworthy Auditing Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0028] figure 2 Shown is the block diagram of the composition of the present invention's non-central safe and trusted auditing system, such as figure 2 As shown, each node of the management end can be deployed in different regions according to the needs, so as to prevent users from operating each management end host at the same time. Audit terminals, network devices, and administrator access route requests to a management node for processing through the access gateway. Since the audit terminal, network equipment and administrators do not know the specific address of the management terminal that responds to the request, it avoids the security risk of the user directly tampering with the information on the server term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a non-center safe and trusted auditing method, which includes: Step 1: Initialize the management terminal, and the management terminal forms a group of interrelated peers through strategies through several management terminal nodes; Step 2: For authentication and registration, the audited object registers the audit object information and administrator information to the management end, and the management end returns the anonymous identity and key information of the audited object and the administrator through the internal negotiation mechanism. The audited object includes audit terminals, network Device and user administrator; step 3: report the log, the audit terminal and network device encrypt the audit information with a key, calculate the summary value, and report it to the management terminal together with the identification information; step 4: store the log, the management terminal receives After the log is reported, it is synchronously backed up to each peer management end node for redundant backup and subsequent verification of tampering; Step 5: Perform log retrieval, and the registered administrator retrieves from the management end through the log retrieval function. Corresponding audit data; Step 6: Perform log audit, including legal access behavior audit and illegal behavior audit.

Description

technical field [0001] The invention belongs to the technical field of safety audit, and is a centerless safe and credible audit system. Background technique [0002] With the development of information technology, organizations such as enterprises and institutions have deployed auditing software for internal network security needs, which are used to centrally manage and audit internal network security equipment and security events generated by users' daily access, so as to monitor the overall security situation of the internal network . [0003] figure 1 Shown is the module diagram of the existing audit system, such as figure 1 As shown, the main function of the existing security audit software is to collect and analyze security events generated by security devices and various user access behaviors. Behaviors and remote access behaviors, network devices are responsible for auditing network security events and network access behaviors generated by users. The audit termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06H04L29/08
CPCH04L9/0643H04L9/3239H04L9/3249H04L63/0421H04L63/0428H04L63/0442H04L63/123H04L67/10H04L67/1095
Inventor 高景生孙宇施雪成
Owner BEIJING INST OF COMP TECH & APPL