Unlock instant, AI-driven research and patent intelligence for your innovation.

User behavior security authentication and log auditing method and system

A security authentication and security authentication module technology, applied in the field of project architecture design, can solve the problems of program content redundancy, violation of software simplicity, unfavorable extension and maintenance, etc., to achieve the goal of adding coupling, ensuring security and simplifying programs Effect

Active Publication Date: 2019-07-19
CHINA STANDARD SOFTWARE
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the following defects: first, the program content is very redundant, which violates the simplicity of the software; second, the security certification and log audit are not modularized, which is not conducive to future extension and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior security authentication and log auditing method and system
  • User behavior security authentication and log auditing method and system
  • User behavior security authentication and log auditing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to have a further understanding of the technical solution and beneficial effects of the present invention, the technical solution of the present invention and its beneficial effects will be described in detail below in conjunction with the accompanying drawings.

[0038] Tim Berners-Lee, the inventor of the WWW, said when talking about design principles, "Simplicity and modularity are the cornerstones of software engineering; distribution and fault tolerance are the life of the Internet." Therefore, based on the same concept, the present invention proposes a user behavior security authentication and log audit method and system based on a modular design concept.

[0039] Such as figure 2 As shown, it is an implementation flowchart of the security authentication and log audit method of user behavior of the present invention, including the following steps:

[0040] Step S1: create before hook (before hook function) and after hook (behind hook function) by using ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user behavior security authentication and log auditing method and system. The method comprises the following steps of creating a beform hook function module and an after hook function module by utilizing a hook technology; executing security authentication and log auditing on each application development interface api request, so that the program is greatly simplified, the functions are more modularized, the coupling between modules is added, meanwhile, it is ensured that security authentication and log auditing must be carried out every time calling is carried out,and the security of the system can be fully ensured.

Description

technical field [0001] The invention relates to the design of project architecture, in particular to a user behavior security authentication and log audit system. Background technique [0002] At present, with the extensive application of the network, both enterprises and individuals put a lot of information on the Internet, and the problem of network security has arisen. In order to ensure the security of the data, security authentication is usually performed on the user's operation behavior to determine whether the user has the corresponding authority and whether there is access control such as overreach. Therefore, the implementation of the security authentication module and the log audit module of the service platform is becoming more and more important, not only to ensure that the performance of the entire service is not affected, but also to ensure the simplicity of implementation. [0003] Such as figure 1 As shown, it is a flow chart of implementing the security au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F16/1734
Inventor 李山峰吴吉庆马立克马俊杰刘涛吴春光申利飞
Owner CHINA STANDARD SOFTWARE