Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Database security audit record storage method

A security audit and database technology, applied in database design/maintenance, digital data protection, secure communication devices, etc., can solve problems such as damaged audit files, wrong changes, etc., and achieve the effect of ensuring security

Inactive Publication Date: 2020-05-12
TIANJIN NANKAI UNIV GENERAL DATA TECH
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Authorized users can open audit files, which may be altered or damaged by mistake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database security audit record storage method
  • Database security audit record storage method
  • Database security audit record storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0038] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner", "outer", etc. are based on the orientation or positional relationships shown in the drawings, and are only for the convenience of describing the present invention Creation and simplification of description, rather than indicating or implying that the device or element referred to must have a specific orientation, be constructed and operate in a specific orientation, and therefore should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database security audit record storage method. The method comprises the following steps of S1 when a database server identifies an auditable event and generates a database security audit record, identifying the database security audit records by using the hash values to enable each database security audit record to correspond to a unique hash value; S2, packaging the plurality of database security audit records into a database security audit record block; and S3, performing encryption transmission on the database security audit record block by adopting a point-to-pointprotocol for directly performing network communication between the two nodes, and verifying the ownership of the database security audit record block. The method has the advantages that through an encryption mechanism and a consensus mechanism, the storage of the database security audit records is achieved in the point-to-point network, and it is guaranteed that the database security audit records cannot be tampered and forged.

Description

technical field [0001] The invention belongs to the field of computer applications, and in particular relates to a method for storing database security audit records. Background technique [0002] China National Standard GB / T 25069-2010 (Information Security Technical Terminology) Definition: Security audit is to detect, collect and analyze various events and behaviors of information systems, and take corresponding actions for specific events and behaviors. [0003] The database security auditing feature allows user activity to be monitored for any malicious activity by unauthorized users. As long as users know that their activities may be subject to security audits, database security audit mechanisms can deter unwanted activities. [0004] Whenever the database server encounters an auditable event, it generates a database security audit record and records it in the audit file under the specified directory in the computer network. Authorized users can open audit files, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/62
CPCG06F21/552G06F21/6218G06F16/21H04L9/3239H04L9/3297H04L9/50G06F16/2246G06F16/1734G06F11/1451G06F11/1464G06F11/1469G06F2201/80H04L9/0637H04L9/0825H04L9/3236H04L67/104
Inventor 贾欣泉陈文亭王雪松吕迅
Owner TIANJIN NANKAI UNIV GENERAL DATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products