Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Operation instruction management method and device

A technology of operation instructions and management methods, applied in the field of network security, can solve the problems of attacking cloud servers, inability to distinguish operation instructions, and inability to associate real-name users with operation instructions, so as to ensure security and reliability, and facilitate auditing and retrospective effects.

Pending Publication Date: 2021-03-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The operation instruction management method in the current technology can only record the local account when recording the source of the operation instruction, and cannot be connected with the real real-name user. If there are multiple real-name users logging in with the same local account, this method cannot distinguish between Which real user issued an operation instruction, this vulnerability is easily exploited by saboteurs to attack the cloud server, thus greatly affecting the information security of the cloud server
[0004] Therefore, the current operation instruction management method has technical problems such as operation instructions cannot be associated with real real-name users, which needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation instruction management method and device
  • Operation instruction management method and device
  • Operation instruction management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067]In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0068] In the description of the embodiments of the present application, it should be understood that the terms "first", "second", etc. in the specification, claims and drawings are used to distinguish similar sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments describe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an operation instruction management method and device, wherein the method comprises the steps: reading a locally stored real-name account identification after an operation instruction from an operation terminal is received, binding the operation instruction and the real-name account identification to generate audit data, and enabling the operation instruction to be stored inthe real-name account identification when an audit request of the audit terminal is received; analyzing the auditing request to determine target auditing data corresponding to the auditing request from the auditing data, and finally sending the target auditing data to an auditing terminal, so that the auditing terminal displays the target auditing data on an auditing page. When a user accesses the cloud server in a network access and identity verification mode, the real-name information and the operation instructions are bound to generate the audit data; and then the audit data is stored in the database, so that when the operation instructions are audited, real-name tracking can be carried out due to the fact that the audit data comprises the real-name information corresponding to the operation instructions; therefore, the security and reliability of cloud data are ensured.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method and device for managing operation instructions. Background technique [0002] With the rapid development of network and computer technology, cloud technology is more and more widely used in medical, security, banking, finance and other fields, so it is particularly important to ensure the security of cloud data management process. [0003] The operation instruction management method in the current technology can only record the local account when recording the source of the operation instruction, and cannot be connected with the real real-name user. If there are multiple real-name users logging in with the same local account, this method cannot distinguish between The operating instructions issued by real users, this kind of vulnerability is easy to be exploited by saboteurs to attack the cloud server, thus greatly affecting the information security of the cloud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/45
CPCH04L63/0807G06F21/45
Inventor 袁丽娜陈钦波刘涛王超
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products