Unlock instant, AI-driven research and patent intelligence for your innovation.

Interception auditing method and system for data access

A data access and database technology, applied in the field of communications, can solve the problems of difficulty in implementation, difficult to promote, and increase the cost of interception and audit implementation, and achieve the effect of low transformation cost and easy promotion.

Pending Publication Date: 2021-04-09
AGRICULTURAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the application system in this method needs to be connected with the audit system. Therefore, the application system needs to be modified to a certain extent, which is not only difficult to implement and difficult to promote, but also increases the implementation cost of interception audit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interception auditing method and system for data access
  • Interception auditing method and system for data access
  • Interception auditing method and system for data access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to help better understand the solutions provided by the embodiments of this application, before introducing the methods provided by the embodiments of this application, some nouns appearing in the embodiments of this application are first explained:

[0040] JDBC (Java Database Connectivity, Java database connection) driver: It is a software package that follows the JDBC standard and is provided by each database manufacturer. When the application program accesses the database, it sends the access command to the database through the JDBC driver, and receives the execution result returned by the database. The Driver, Connection and Statement in the embodiment of this application are all components of the JDBC driver.

[0041] Application system: In the embodiment of this application, it refers to various software systems that can access the database.

[0042] Reflection: Java's reflection mechanism. It refers to the mechanism of dynamically obtaining program in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an interception auditing method for data access. The method comprises the following steps that an agent execution module receives an access instruction transmitted by an application system when the agent execution module is started; the agent execution module audits the access instruction; when the auditing is passed, the agent execution module sends an access instruction to the database connection driver; and the database connection driver is used for accessing a target database corresponding to the access instruction. Therefore, according to the technical scheme, the embedded module is installed in the application system, and under the condition that the application system is not modified, the agent execution module which is generated according to the embedded module and has the auditing function is used for replacing an execution module in an original application system to auditing the access instruction. Thus, according to the method provided by the embodiment of the invention, the application system does not need to be transformed under the effect of intercepting and auditing the access instruction in real time, so that the method provided by the invention is easy to popularize and relatively low in transformation cost.

Description

technical field [0001] The present application relates to the communication field, and in particular to a method and system for intercepting and auditing data access. Background technique [0002] The application system generally accesses the database through access instructions, but if the access instructions do not meet the specifications, it may put a lot of pressure on the database. Currently, there are generally two systems for reviewing access instructions: [0003] Such as figure 1 As shown, one of them is to detect the completed or executing access instructions, analyze the abnormal access instructions, and then optimize the application system according to the analysis results. However, this method can only provide analytical data support for the improvement of database access, and cannot intercept and audit access instructions in real time. [0004] Such as figure 2 As shown, another method is that the application system sends the access instruction to a third-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/25
CPCG06F16/252
Inventor 郝博周文韬
Owner AGRICULTURAL BANK OF CHINA