View library security auditing system and method
A security audit and view technology, applied in the computer field, can solve the problems of complex unstructured data information, unable to solve unstructured data retrieval such as pictures and view library deployment and control behavior auditing, etc., to achieve proper processing and operation and maintenance burden small effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0062] A view library security audit system, comprising: a data acquisition module, a protocol analysis module and an alarm management module, wherein:
[0063] The data acquisition module is used to obtain the data traffic requested by all the view retrieval queries in the network, and forward the requested data traffic such as the view retrieval query to the protocol analysis module;
[0064] The protocol analysis module obtains th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


