Network data access auditing method, device and equipment and storage medium

A network data and data access technology, applied in the field of network security, can solve problems such as poor accuracy of user data access audit, achieve timely management and improve security

Active Publication Date: 2021-01-22
阳光保险集团股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing enterprise network environment is mostly in the form of public IP or DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol), the IP of the access source terminal cannot accurately represent a valid individual user, resulting in data access to the user Audit accuracy is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data access auditing method, device and equipment and storage medium
  • Network data access auditing method, device and equipment and storage medium
  • Network data access auditing method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be understood that the appended The figures are only for the purpose of illustration and description, and are not used to limit the protection scope of the present application. Additionally, it should be understood that the schematic drawings are not drawn to scale. The flowcharts used in this application illustrate operations implemented in accordance with some embodiments of the application. It should be understood that the operations of the flowcharts may be performed out of order, and steps that have no logical context may be performed in reverse order or concurrently. In addition, those skilled in the art may add one or more other operations t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network data access auditing method, device and equipment and a storage medium, and relates to the technical field of network security. The method comprises the following steps: constructing a mapping relationship between a session identifier corresponding to a target user and a user identifier of the target user according to first access data generated by an application login operation of the target user on a user terminal; obtaining a session identifier corresponding to the target user from the second access data, wherein the second access data is access data generated by application non-login operation of the target user in the user terminal; according to the session identifier corresponding to the target user and the mapping relationship between the session identifier corresponding to the target user and the user identifier of the target user, adding the user identifier corresponding to the session identifier to the second access data to obtain new second access data; and performing data access auditing on the target user identified by the user identifier according to the new second access data. According to the method, the access data can be associatedto the user, and the auditing accuracy is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a network data access auditing method, device, equipment and storage medium. Background technique [0002] With the continuous development of the network, various network applications are constantly favored by users. How to audit the user's network data access behavior while promoting network development, for example, how to audit the data access of internal employees to It is particularly important to realize group statistical analysis. [0003] Existing data access auditing, especially for http (HyperText Transfer Protocol, hypertext transfer protocol) traffic and http log auditing, is mainly based on the IP (Internet Protocol, Internet Interconnection Protocol) and destination IP of the access source terminal. , to determine the user's access data. [0004] However, the existing enterprise network environment is mostly in the form of public IP or DHCP (Dy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F16/28G06F16/2455
CPCH04L67/146H04L63/08H04L63/083G06F16/24552G06F16/284
Inventor 王玉东刘洋廖东升
Owner 阳光保险集团股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products