Unlock instant, AI-driven research and patent intelligence for your innovation.

Security auditing method and device for efficient and credible structured database

A security audit and database technology, applied in the database field, can solve problems such as untrustworthy audit results, and achieve the effect of avoiding random erasure of operation behavior records and ensuring credibility

Pending Publication Date: 2022-07-15
敏于行(北京)科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a security audit method and device for an efficient and credible structured database to solve the problem of unreliable audit results caused by the random erasure of operational behavior records

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security auditing method and device for efficient and credible structured database
  • Security auditing method and device for efficient and credible structured database
  • Security auditing method and device for efficient and credible structured database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0024] It should be noted that the terms "first", "second", etc. in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security auditing method and device for an efficient and trusted structured database. The method comprises the following steps: collecting a log file by adopting a non-intrusive customizable configuration mode; calculating an abstract value of the operation behavior record in the log file by using an abstract algorithm, and constructing a block chain transaction; block chain transactions are subjected to description configuration, and a multi-element set mapping relation is established. The technical problem that the auditing result is not credible due to the fact that the operation behavior record is erased at will is solved; through combination of an information display device, a behavior mapper and a chain querier, collection auditing indexes can be configured in a user-defined manner for operation records of the structured database, so that malicious operation behaviors can be efficiently and accurately positioned; and by configuring an acquisition plug-in and an information display device, according to behavior operation auditing index requirements, a plurality of log formats of the database are converted into log files which are uniform in format, high in readability and capable of being configured in a user-defined mode, and the display effect is achieved.

Description

technical field [0001] The present application relates to the field of databases, and in particular, to a security auditing method and device for an efficient and trusted structured database. Background technique [0002] The inventor found that with the continuous improvement of the IT information system, the amount of logs generated by the structured database has become increasingly large, but there is a risk of tampering with the content of the log file, lack of operation fingerprints, and the situation of arbitrarily erasing the operation behavior records. , resulting in unreliable audit results. [0003] Aiming at the problem that the operation behavior records are arbitrarily erased in the related art, resulting in unreliable audit results, no effective solution has been proposed so far. SUMMARY OF THE INVENTION [0004] The main purpose of the present application is to provide a security auditing method and device for an efficient and trusted structured database, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/55G06F16/23G06F16/27
CPCG06F21/64G06F21/552G06F16/2358G06F16/27G06F2221/2151
Inventor 吕国新
Owner 敏于行(北京)科技有限公司