Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Monitoring method, device and system, auditing method, device and system

A technology for monitoring results and permissions, applied in the computer field, can solve the problems of poor audit efficiency and high labor cost, and achieve the effect of making up for identification errors, improving effectiveness and accuracy, and improving audit efficiency.

Pending Publication Date: 2021-12-03
DINGTALK HLDG CAYMAN LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiments of the present invention provide a monitoring and auditing method, device and system to solve the problem of using a manual method to audit the authentication results of the authority system in the prior art, which consumes a lot of labor costs, resulting in auditing Technical problems with poor efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method, device and system, auditing method, device and system
  • Monitoring method, device and system, auditing method, device and system
  • Monitoring method, device and system, auditing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. The singular forms "a", "said" and "the" used in the embodiments of the present invention and the appended claims are also intended to include plural forms, unless the conte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a monitoring method, device and system, an auditing method, device and system. The monitoring method comprises the following steps: detecting an authority processing event initiated by a target user; monitoring a processing process of the permission processing event by a permission system to obtain a monitoring result; and if the monitoring result is abnormal, determining that the permission system is abnormal. According to the embodiment of the invention, the monitoring efficiency and accuracy are improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a monitoring and auditing method, device and system. Background technique [0002] Authentication refers to the authority system to verify whether the user has the right to perform an operation. Usually, when a user wants to perform a target operation on a target object, he can apply to the authority system for authentication. According to the authentication request initiated by the target user, the permission system queries whether the target user has the right to perform the target operation on the target object. If yes, it returns the existing permission to enable the user to perform the target operation on the target object. If not, it returns the non-existent permission. so that the user cannot perform the targeted action on the targeted object. For example, the target object may include: a database, a software system, an application program, or an enterprise organizatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/62G06F16/245
CPCG06F21/31G06F21/6227G06F16/245
Inventor 胡兵张诚哲虞雷谢记年
Owner DINGTALK HLDG CAYMAN LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products