Data auditing system
A data auditing and data technology, applied in database indexing, electrical digital data processing, structured data retrieval, etc., can solve the problems of lack of power information system elaboration, unable to meet the security requirements of power information database system, etc. level, ensure security, and ensure the effect of efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] The invention discloses a data audit system. The data audit system builds the main body of the system through the audit management module. On the basis of the construction of the audit management module, the infinite expansion of the function module and the bottom layer construction of the multi-level interactive security protection framework are carried out. In order to achieve a comprehensive and accurate audit of the database.
Embodiment 2
[0026] Such as figure 1 As shown, the audit management module includes a data collection module, a data reorganization module, an audit protocol analysis module, an audit rule generation module, an audit policy adaptation module, and a display module, specifically:
[0027] The data acquisition module implements the setting of the hardware required by the system, mainly the image setting of the core switch and the call of the data capture function.
[0028] The data flow reorganization of this system first requires the data acquisition module to collect the data, and then sorts and outputs the collected out-of-order data packets. The data acquisition module can be completed by calling library functions on the basis of hardware settings. Out-of-order data Packet sorting output needs to be completed through design and programming. In order to avoid the omission of data packets sent to the system, the system sets the network card to promiscuous mode (realized by executing ifconfi...
Embodiment 3
[0040] The audit protocol parsing module mainly realizes parsing the obtained reliable data packets.
[0041] In the process of accessing the SQLSERVER database, the visitor needs to go through the information negotiation phase and the statement execution phase. In the information negotiation stage, it is necessary to obtain the client address, server address, transmission rules, etc. of the visitor through analysis; in the statement execution stage, it is necessary to obtain the executed operations and returned results through analysis, so as to ensure that the database management personnel can grasp the database access in real time The situation, and match with the audit policy, so as to determine whether the audit rules are violated.
[0042] The audit protocol analysis module includes the login stage and the communication stage. In the login stage, the server ID, client IP address, port and data table information are obtained by analyzing the obtained data packets; in the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com