Campus network authentication system log database construction method

A technology of authentication system and construction method, which is applied in database design/maintenance, transmission system, data exchange network, etc., can solve the problem of not fully considering the large amount of log data and the interrelatedness, retrieval and analysis of various types of data. Difficulties, unreasonable storage of log data, etc., to achieve the effect of improving retrieval efficiency, reducing storage load, and improving efficiency

Active Publication Date: 2018-04-10
HUAZHONG UNIV OF SCI & TECH
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current management method of log data in the campus network authentication system is to simply and directly store the log data in a certain database table, without fully considering t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Campus network authentication system log database construction method
  • Campus network authentication system log database construction method
  • Campus network authentication system log database construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

[0051] The method for constructing the log database of the campus network authentication system provided by the present invention, such as figure 1 As shown, it includes: business log database, authentication log database, and log backup database; business log database is located on the first layer, used to record the network operation status of the campus network authentication system during use; authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a campus network authentication system log database construction method. The method comprises a service log database, an authentication log database, and a log backup database;the service log database is located on the first layer and is used to record the network operating status of the campus network authentication system during use; the authentication log database is located on the second layer and is used to record user authentication requests and authentication results. The main point is that when the authentication fails, the corresponding abnormal authenticationlog data is generated by analyzing the service log data according to different causes; the log backup database is located on the third layer and is used to periodically back up and delete log data inthe service log database and authentication log database, and generate file index information at the same time. The invention can make full use of the characteristics of the log data, effectively manage, store and back up the log data, and at the same time improve the retrieval efficiency of the log data.

Description

Technical field [0001] The invention belongs to the field of database design, and more specifically, relates to a method for constructing a log database of a campus network authentication system. Background technique [0002] The campus network is the largest experimental teaching network in colleges and universities, and has become an important information infrastructure, Internet research platform and talent training base for the school. As the primary link for users to access the campus network, the campus network authentication system can protect the application resources of the campus network from attacks, ensure the legitimacy of users, prevent campus network information from being tampered with and abuse, and ensure the reliability of information and data. The campus network uses safe and effective means. During the operation of the campus network authentication system, a large number of authentication log data, such as authentication processing logs, Internet detailed lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30H04L29/06H04L12/24
CPCG06F16/21G06F16/215G06F16/2228G06F16/2282H04L41/069H04L63/08
Inventor 张洁卉
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products