Self-controllable database audit method and system based on access signature
A database and data manipulation technology, applied in the electronic field, can solve problems such as poor log record permissions, inability to operate content audit, lack of key information, etc., and achieve the effect of reducing system overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to illustrate a basis of the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0024] as attached figure 1 As shown, the database auditing scheme proposed in this scheme includes three stages, which are the permission initialization stage, user request parsing stage and database real-time auditing stage. The following will describe each stage in detail:
[0025] a) Permission initialization stage
[0026] Firstly, build the operation authority tree (OperationAuthorityTree, referred to as OAT), and the audit administrator divides the operation keywords according to different application logics, and constructs the corresponding logical operation subtree T 1 , T 2 , T 3 …T m(The number of subtrees m depends on the user's needs), and then according to the security requirements of the system, set the corresponding authority level for the operation keyword o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com