Unlock instant, AI-driven research and patent intelligence for your innovation.

User access monitoring method and system

A user and monitoring module technology, applied in the field of communication, can solve problems such as bastion machine failure, inability to intuitively see what operations the user has performed, and unreadable data

Inactive Publication Date: 2021-02-26
杭州米络星科技(集团)有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a monitoring method and system for user access, so as to alleviate the technical problems in the prior art that it is impossible to intuitively see what operations the user has done, and the data cannot be read after the bastion host fails or hangs up

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access monitoring method and system
  • User access monitoring method and system
  • User access monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0058] An embodiment of the present invention provides a monitoring system for user access. The monitoring system for user access is mainly used to implement the method for monitoring user access provided in Embodiment 1. The following describes the monitoring system for user access provided by the embodiment of the present invention Make a specific introduction.

[0059] Figure 4 It is a schematic structural diagram of a monitoring system accessed by users provided by an embodiment of the present invention. like Figure 4 As shown, it mainly includes: monitoring module 11, screen recording module 12 and virtual interface 13, wherein:

[0060] The monitoring module 11 is used to generate a virtual interface 13 at the start moment of the session; wherein, the time attribute of the session includes the start moment and the end moment, and the start moment is the start moment when the user accesses the target server through the client, and the virtual interface 13 is used for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user access monitoring method and system, and relates to the technical field of communication, and the method comprises the steps: firstly generating a virtual interface through a monitoring module at the start moment of a session, wherein the time attribute of the session comprises a starting moment and an ending moment, the starting moment is the starting moment when theuser accesses the target server through the client, and the virtual interface is used for recording the real operation of the user; and then acquiring the image frame from the virtual interface through a screen recording module, and recording the image frame into a corresponding video file until the end time, so that a third party acquires the video file. According to the method, the corresponding video file can be directly generated in the mode that the screen recording module obtains the image frames from the virtual interface, the video file can visually display which operations the user does, the video file does not depend on the bastion host, and even if the bastion host breaks down or is hung up, the video file can still be normally read.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a monitoring method and system for user access. Background technique [0002] The existing bastion machine is provided with a monitoring module and a database, wherein the monitoring module is used to monitor the user on the bastion machine after logging in the domain name of the bastion machine through the springboard machine to access the session data generated by a specific server in the server cluster in the local area network (comprising user input instructions). and the data fed back by the server), and then store the session data in the database after encrypting key information (such as passwords, accounts, etc.). On the one hand, since the data itself is not a video file, but a bunch of programs, even if it is called out, it is impossible to intuitively see what operations the user has done. On the other hand, since the encrypted data depends on the bastion host i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N5/76H04N21/433H04L29/06H04L9/32
CPCH04N5/76H04N21/4334H04L63/08H04L63/10H04L9/321H04L63/30
Inventor 陈飞
Owner 杭州米络星科技(集团)有限公司