Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Zombie account management method based on operation and maintenance auditing system

A technology of account management and account, which is applied in the field of zombie account management based on the operation and maintenance audit system, can solve problems such as difficult cleaning, ignorance of operation and maintenance audit system administrators, and influence on user management efficiency, so as to reduce the operation burden

Active Publication Date: 2020-02-21
CHENGDU DBAPP SECURITY
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Zombie account data continues to expand, affecting system query efficiency;
[0005] 2. Zombie account data continues to expand and is scattered in various places, affecting user management efficiency;
[0006] 3. Zombie account data may be recreated after being deleted on the server for a long time, but the operation and maintenance audit system administrator does not know about it, which poses a security risk;
[0007] 4. There is no difference between zombie accounts and ordinary accounts, and it is difficult to clean up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zombie account management method based on operation and maintenance auditing system
  • Zombie account management method based on operation and maintenance auditing system
  • Zombie account management method based on operation and maintenance auditing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] A zombie account management method based on the operation and maintenance audit system, such as figure 1 and image 3 As shown, after the operation and maintenance audit system is connected to the server to be detected, it scans all accounts in the server to be detected, and compares the scanned accounts with the accounts originally stored in the operation and maintenance audit system, and compares the accounts between the server and the operation and maintenance audit system The accounts that save the account information in both are marked as scanning accounts, and the accounts that are saved in the operation and maintenance audit system but have no account information in the server are marked as non-scanning accounts; The account logged in the server is a non-real account; the last use time of the non-real account is determined, and the zombie account is screened out for cleaning; the zombie account refers to an account that meets the following conditions at the same ...

Embodiment 2

[0033] On the basis of above-mentioned embodiment 1, in order to realize the present invention better, combine figure 1 and figure 2 As shown, further, the password login detection specifically refers to: the operation and maintenance audit system uses the account information stored in the operation and maintenance audit system of the non-scanning account to connect to the server to be detected; Result; if the account login name of the scanning account saved in the operation and maintenance audit system, the account password are inconsistent with the server to be detected and the connection fails, then return the result of the connection failure; the account information includes IP address, SSH port, Account login name, account password; when the connection timeout occurs due to an error in the IP address and SSH port during the password login detection process, the non-scanning account that has timed out will be reconnected; if the connection is still timed out after three r...

Embodiment 3

[0038] On the basis of any one of the above-mentioned embodiments 1-2, in order to better realize the present invention, further, the determination of the last use time of the non-real account specifically refers to: first setting a longest non-login period , and then use the current time to subtract the last use time of the non-real account for the last use time judgment to obtain the actual non-login interval time, and finally compare the actual non-login time with the longest non-login time to filter out zombie accounts.

[0039] Working principle: After determining condition 1 in embodiment 2, determine whether those non-real accounts that meet condition 1 meet condition 2; the longest login period is freely set by the administrator, and the administrator can set it according to actual needs. Set a certain maximum non-login period. If the actual non-login interval is greater than the maximum non-login period, it will be identified as a zombie account. Otherwise, it will not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a zombie account management method based on an operation and maintenance auditing system. The zombie account management method comprises the following steps of screening out anon-scanning account which is not stored in a to-be-detected server but is stored in the operation and maintenance auditing system by scanning the to-be-detected server; further determining that the non-scanning account indeed does not exist in the server through the password login verification, and defining the determined non-scanning account that indeed does not exist the server as a non-real account; judging the longest non-login time limit of the non-real account; and identifying the non-real account of which the interval between the final login time and the current time is greater than the longest non-login time limit as a zombie account. Through the zombie account management method, managers can screen and sort out the zombie accounts which are distributed in a scattered mode and clean or modify the zombie accounts in a unified mode, and meanwhile the potential safety hazards caused by account logout and reconstruction in the server are avoided through the periodical cleaning.

Description

technical field [0001] The invention belongs to the field of computer account management, and in particular relates to a zombie account management method based on an operation and maintenance audit system. Background technique [0002] With the development of the enterprise, the server resources of each enterprise will continue to expand and change, among which the account of the server is changed frequently, including temporary maintenance personnel, the entry and exit of the company's own employees, will be accompanied by the creation and deletion of server accounts , with the access of the operation and maintenance audit system, those accounts that have been deleted on the server but still have account data in the operation and maintenance audit system are zombie accounts of the operation and maintenance audit system. [0003] The zombie account of the operation and maintenance audit system will cause the following problems: [0004] 1. Zombie account data continues to e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083H04L63/205
Inventor 陈柏全范渊吴永越郑学新刘韬
Owner CHENGDU DBAPP SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products