User behavior security authentication and log auditing method and system
A security authentication and security authentication module technology, applied in the field of project architecture design, can solve the problems of program content redundancy, violation of software simplicity, unfavorable extension and maintenance, etc., to achieve the goal of adding coupling, ensuring security and simplifying programs Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to have a further understanding of the technical solution and beneficial effects of the present invention, the technical solution of the present invention and its beneficial effects will be described in detail below in conjunction with the accompanying drawings.
[0038] Tim Berners-Lee, the inventor of the WWW, said when talking about design principles, "Simplicity and modularity are the cornerstones of software engineering; distribution and fault tolerance are the life of the Internet." Therefore, based on the same concept, the present invention proposes a user behavior security authentication and log audit method and system based on a modular design concept.
[0039] Such as figure 2 As shown, it is an implementation flowchart of the security authentication and log audit method of user behavior of the present invention, including the following steps:
[0040] Step S1: create before hook (before hook function) and after hook (behind hook function) by using ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


