Data auditing method and device, computer device and storage medium

A data audit and database technology, applied in the database field, can solve the problem of long time-consuming database security audit

Inactive Publication Date: 2018-08-17
深圳小蝉文化传媒股份有限公司
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a data audit method, device, computer equipment an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data auditing method and device, computer device and storage medium
  • Data auditing method and device, computer device and storage medium
  • Data auditing method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Embodiment 1 of the present invention provides a data audit method. The method can be executed by a data audit system, wherein the device can be implemented by software and / or hardware, and can generally be integrated in an audit system configured with a database. figure 1 A schematic flow chart of the data audit method provided in Embodiment 1 of the present invention, as shown in figure 1 As shown, the method includes:

[0029] S101. Obtain and parse the login request when it is detected that the data acquisition terminal sends a login request to the database, and the login request includes database information, sending time, and acquisition terminal information.

[0030] Wherein, the login request can be understood as a request sent to the database when the data acquisition terminal logs in to the database. In this embodiment, whether the data acquisition terminal sends a login request to the database can be monitored in real time or according to a set period. The...

Embodiment 2

[0049] figure 2It is a schematic flowchart of the data auditing method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments. Further, the data audit method provided by this embodiment may further include: if the locally stored legal obtainer list corresponding to the database contains the obtainer information, then After the data acquisition terminal completes the login, obtain the data request sent by the data acquisition terminal to the database, and find the operation authority level to which the data request belongs; determine the data acquisition terminal according to the information of the acquisition terminal. The scope of the authority level in the database; if the operation authority level is outside the scope of the authority level, the data acquisition terminal is determined as an illegal acquisition terminal, an alarm message is generated and the alarm information is sent to all auditors o...

Embodiment 3

[0082] Embodiment 3 of the present invention provides a data auditing device. The device can be implemented by software and / or hardware, and generally can be integrated in an audit system configured with a database, and audit data can be implemented by implementing a data audit method. image 3 The structural block diagram of the data auditing device provided for the third embodiment of the present invention, such as image 3 As shown, the device includes:

[0083] The login request acquisition module 301 is configured to acquire and parse the login request when it is detected that the data acquisition terminal sends a login request to the database, and the login request includes database information, sending time and acquisition terminal information;

[0084] The record calling module 302 is configured to search for a locally stored management account according to the database information when the information on the acquiring terminal includes encrypted information, and afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data auditing method and device, a computer device and a storage medium. The method includes the steps of obtaining and parsing a login request sent by a data acquisition side to a database, wherein the login request includes database information, sending time and acquisition side information; if the acquisition side information includes encrypted information, searching for locally stored management accounts according to the database information, and after the management accounts are used for logging into the corresponding database, calling login request records corresponding to the sending time; according to non-encrypted information in the acquisition side information, searching for information content corresponding to the encrypted information in the login request records after decryption to determine the acquisition side information; if the acquisition side information is not included in a legal acquisition side list corresponding to the locally stored database, determining the data acquisition side as an illegal acquisition side, generating alarm information and sending the alarm information to an auditor of the database. According to the embodiment,by adopting the technical scheme above, accurate locating of the data acquisition side can be achieved.

Description

technical field [0001] The invention relates to the field of databases, in particular to a data audit method, device, computer equipment and storage medium. Background technique [0002] In recent years, due to the emergence of various data security incidents (such as the loss of funds caused by internal bank data leakage, credit card forgery caused by theft of credit card information, and the decline in competitiveness caused by corporate internal confidential data leakage, etc.), database security has also been recognized by people. More and more attention. At present, in order to improve the security of data information stored in the database, it is generally necessary to use a database security audit system to monitor and audit user operations of the database. [0003] In the process of using the data security audit system to audit the database, it is necessary to obtain the acquisition terminal information of the user who operates the database, so as to determine the l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218
Inventor 刘晨赵春燕
Owner 深圳小蝉文化传媒股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products