Self-controllable database audit method and system based on access signature

A database and data manipulation technology, applied in the electronic field, can solve problems such as poor log record permissions, inability to operate content audit, lack of key information, etc., and achieve the effect of reducing system overhead

Active Publication Date: 2021-03-05
BEIJING XJ ELECTRIC +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the log audit solution based on the database system, since the log audit function is enabled, it not only has a great impact on the performance of the database, but also has poor fine-grained log records and lacks key information.
In the auditing solution based on network monitoring, since the auditing system is deployed on a dedicated hardware device and monitors the switch port, only session-level auditing can be realized, and operation content cannot be audited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-controllable database audit method and system based on access signature
  • Self-controllable database audit method and system based on access signature
  • Self-controllable database audit method and system based on access signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to illustrate a basis of the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] as attached figure 1 As shown, the database auditing scheme proposed in this scheme includes three stages, which are the permission initialization stage, user request parsing stage and database real-time auditing stage. The following will describe each stage in detail:

[0025] a) Permission initialization stage

[0026] Firstly, build the operation authority tree (OperationAuthorityTree, referred to as OAT), and the audit administrator divides the operation keywords according to different application logics, and constructs the corresponding logical operation subtree T 1 , T 2 , T 3 …T m(The number of subtrees m depends on the user's needs), and then according to the security requirements of the system, set the corresponding authority level for the operation keyword o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access feature marking-based autonomous controllable database audit method and system. The method comprises an operation authority tree (OAT) establishment step, a data authority tree (DAT) establishment step, an authority allocation step, a user request parsing step and a database audit step. The above-mentioned technical solution can carry out real-time database authority audit according to an operation set OP, a data authority set DF and an operation authority tree.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a self-controllable database auditing method and system based on access feature marks. Background technique [0002] With the development of information technology, more and more data is stored and sent in electronic form, so the encryption of data is directly related to the security of data. In order to ensure the security of stored data, the existing technology requires users to adopt a database audit mechanism to achieve certain purposes of pre-prevention, post-event data recovery, and responsibility determination. In the latest research on database security risk issues, users have too many unnecessary permissions are considered to be the biggest security risk of the database, and traditional popular database audit schemes are difficult to solve the contradiction between fine-grained permissions and excessive system overhead . At the same time, in order to reduce the sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/21G06F21/62
Inventor 缪燕刘红超杨利兵王继业曾楠王晋雄
Owner BEIJING XJ ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products