Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Construction Method of Log Database of Campus Network Authentication System

A technology of authentication system and construction method, which is applied in the field of database design, can solve the problems of difficult retrieval and analysis, failure to fully consider the large amount of log data, interconnection of various types of hierarchical data, and unreasonable storage of log data, etc. Achieve the effect of improving retrieval efficiency, improving efficiency, and reducing storage load

Active Publication Date: 2020-11-24
HUAZHONG UNIV OF SCI & TECH
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current management method of log data in the campus network authentication system is to simply and directly store the log data in a certain database table, without fully considering the large amount of log data, its hierarchy, and the interaction of various types of data. Correlation characteristics, so the storage of log data is unreasonable, and retrieval and analysis are difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Construction Method of Log Database of Campus Network Authentication System
  • A Construction Method of Log Database of Campus Network Authentication System
  • A Construction Method of Log Database of Campus Network Authentication System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0051] The construction method of the log database of the campus network authentication system provided by the present invention, such as figure 1 As shown, it includes: business log database, authentication log database and log backup database; the business log database is located on the first floor and is used to record the network operation status of the campus network authentication system d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a campus network authentication system log database construction method. The method comprises a service log database, an authentication log database, and a log backup database;the service log database is located on the first layer and is used to record the network operating status of the campus network authentication system during use; the authentication log database is located on the second layer and is used to record user authentication requests and authentication results. The main point is that when the authentication fails, the corresponding abnormal authenticationlog data is generated by analyzing the service log data according to different causes; the log backup database is located on the third layer and is used to periodically back up and delete log data inthe service log database and authentication log database, and generate file index information at the same time. The invention can make full use of the characteristics of the log data, effectively manage, store and back up the log data, and at the same time improve the retrieval efficiency of the log data.

Description

technical field [0001] The invention belongs to the field of database design, and more specifically relates to a method for constructing a log database of a campus network authentication system. Background technique [0002] The campus network is the largest experimental teaching network in colleges and universities, and has become an important information infrastructure, Internet research platform and talent training base for the school. As the primary link for users to access the campus network, the campus network authentication system can protect the application resources of the campus network from attacks, ensure the legality of user use, prevent campus network information from being tampered with and abuse, and ensure the reliability of information data. The campus network uses effective means of security. During the operation of the campus network authentication system, a large number of authentication log data such as authentication processing logs, online detailed l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/21G06F16/22G06F16/215H04L29/06H04L12/24
CPCG06F16/21G06F16/215G06F16/2228G06F16/2282H04L41/069H04L63/08
Inventor 张洁卉
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products