By-pass intercepting and reducing method for database access
A database and bypass technology, applied in the direction of preventing unauthorized use of memory, protecting stored content from loss, etc., can solve problems such as damaging the system and tampering with data, and achieve self-safety, normal operation, and complete information records Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described through the following embodiments in conjunction with the accompanying drawings.
[0049] The bypass database access interception and restoration method is applied in an Oracle database audit system 3 . Such as figure 1 As shown, the network environment is 100M Ethernet, the equipment includes database user 1, Oracle database server 2, and database audit system 3, and the operating platform is Linux. The database audit system 3 is equipped with 100M network detection equipment 31, audit center software 32 and audit management software 33, and is equipped with a MS SQL SERVER database for audit data access. The 100M network detection device 31 is equipped with two 100M network cards, one of which has no IP address and is set to promiscuous mode to listen to data packets in the network, and the other network card is connected to the Oracle database server 2 to keep the internal communication of the audit system normal .
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com