CN102567499A - Safety management method for journal inquiry - Google Patents
Safety management method for journal inquiry Download PDFInfo
- Publication number
- CN102567499A CN102567499A CN2011104390703A CN201110439070A CN102567499A CN 102567499 A CN102567499 A CN 102567499A CN 2011104390703 A CN2011104390703 A CN 2011104390703A CN 201110439070 A CN201110439070 A CN 201110439070A CN 102567499 A CN102567499 A CN 102567499A
- Authority
- CN
- China
- Prior art keywords
- meant
- log query
- inquiry
- managing security
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a safety management method for journal inquiry, which is characterized by including: firstly inputting inquiry options, and clicking an 'inquiry' button to return to all corresponding inquiry results in a database. The journal category is chosen to be 'system manager journal', a user name sysadmin is input, starting time and blocking time are chosen, the 'inquiry' button is clicked, and all operations of the sysadmin in the database are returned. Journal inquiry further comprises the serial number, the user name, the operation time, the current level, the operation type, the concrete operation, the details and whether to allow options, and therefore the safety management method is very wide in application prospect.
Description
Technical field
The present invention relates to the method for managing security of log query.
Background technology
In conjunction with the sequence number that comprises in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to; The masses by vast accept; The present invention has substantive technical characterstic and significant technical progress, and therefore, its prospect of meeting the tendency is boundless.
Summary of the invention
The object of the invention is exactly the problems referred to above that exist in the prior art in order to solve, and a kind of method for managing security of log query is provided.
The object of the invention is realized through following technical scheme:
The method for managing security of log query, wherein: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
The method for managing security of above-mentioned log query; Wherein: described log query is meant in log category selects " system manager's daily record ", inputs user name sysadmin, selects zero-time and closing time; Click " inquiry " button, all operations of sysadmin in the return data storehouse.
Further, the method for managing security of above-mentioned log query, wherein: described log query comprise sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
Further, the method for managing security of above-mentioned log query, wherein: described sequence number is meant the sequence number of record of the audit, user name is meant user's on trial login name.
Further, the method for managing security of above-mentioned log query, wherein: the described running time is meant user's on trial writing time, and current rank is meant the residing rank of user on trial, and action type is meant the action type that shows user on trial.
Further, the method for managing security of above-mentioned log query, wherein: described concrete operations are meant the concrete operations that show user on trial.
Further; The method for managing security of above-mentioned log query, wherein: described system manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.
Further, the method for managing security of above-mentioned log query, wherein: whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Through the sequence number in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to is accepted by the vast masses, and the present invention has substantive technical characterstic and significant technical progress; Therefore, its prospect of meeting the tendency is boundless.
Embodiment
The method for managing security of log query, its special feature is: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
Further, described log query is meant in log category selects " system manager's daily record ", inputs user name sysadmin, selects zero-time and closing time, clicks " inquiry " button, all operations of sysadmin in the return data storehouse.
Further, described log query comprise again sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
Wherein, Described sequence number is meant the sequence number of record of the audit; User name is meant user's on trial login name, and the running time is meant user's on trial writing time, and current rank is meant the residing rank of user on trial; Action type is meant the action type that shows user on trial, and concrete operations are meant the concrete operations that show user on trial; System manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.Simultaneously, whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Through the sequence number in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to; The masses by vast accept, and therefore, its prospect of meeting the tendency is boundless.
Claims (8)
1. the method for managing security of log query is characterized in that: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
2. the method for managing security of log query according to claim 1; It is characterized in that: described log query is meant in log category selects " system manager's daily record "; Input user name sysadmin; Select zero-time and closing time, click " inquiry " button, all operations of sysadmin in the return data storehouse.
3. the method for managing security of log query according to claim 1 is characterized in that: described log query comprise sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
4. the method for managing security of log query according to claim 3, it is characterized in that: described sequence number is meant the sequence number of record of the audit, user name is meant user's on trial login name.
5. the method for managing security of log query according to claim 3; It is characterized in that: the described running time is meant user's on trial writing time; Current rank is meant the residing rank of user on trial, and action type is meant the action type that shows user on trial.
6. the method for managing security of log query according to claim 3 is characterized in that: described concrete operations are meant the concrete operations that show user on trial.
7. the method for managing security of log query according to claim 3 is characterized in that: described system manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.
8. the method for managing security of log query according to claim 3, it is characterized in that: whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104390703A CN102567499A (en) | 2011-12-26 | 2011-12-26 | Safety management method for journal inquiry |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104390703A CN102567499A (en) | 2011-12-26 | 2011-12-26 | Safety management method for journal inquiry |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102567499A true CN102567499A (en) | 2012-07-11 |
Family
ID=46412900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104390703A Pending CN102567499A (en) | 2011-12-26 | 2011-12-26 | Safety management method for journal inquiry |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102567499A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103678415A (en) * | 2012-09-25 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for processing project log data |
CN106484742A (en) * | 2015-09-01 | 2017-03-08 | 北京国双科技有限公司 | Log processing method and device |
CN110069463A (en) * | 2019-03-12 | 2019-07-30 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6564247B1 (en) * | 1999-11-18 | 2003-05-13 | International Business Machines Corporation | System and method for registering user identifiers |
CN101013482A (en) * | 2006-06-13 | 2007-08-08 | 蒋丽萍 | Online integrated management platform for archive and data of constructing project item |
CN101453388A (en) * | 2008-12-30 | 2009-06-10 | 公安部第三研究所 | Inspection method for Internet service operation field terminal safety control operation |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
-
2011
- 2011-12-26 CN CN2011104390703A patent/CN102567499A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6564247B1 (en) * | 1999-11-18 | 2003-05-13 | International Business Machines Corporation | System and method for registering user identifiers |
CN101013482A (en) * | 2006-06-13 | 2007-08-08 | 蒋丽萍 | Online integrated management platform for archive and data of constructing project item |
CN101453388A (en) * | 2008-12-30 | 2009-06-10 | 公安部第三研究所 | Inspection method for Internet service operation field terminal safety control operation |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103678415A (en) * | 2012-09-25 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method and device for processing project log data |
CN106484742A (en) * | 2015-09-01 | 2017-03-08 | 北京国双科技有限公司 | Log processing method and device |
CN110069463A (en) * | 2019-03-12 | 2019-07-30 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
CN110069463B (en) * | 2019-03-12 | 2021-07-16 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9092445B2 (en) | Predictive information topology modeling and visualization | |
De Rassenfosse et al. | An introduction to the Patstat database with example queries | |
CN103973668B (en) | Server-side personal privacy data protecting method in network information system | |
Marín-Ortega et al. | ELTA: new approach in designing business intelligence solutions in era of big data | |
CN106777227A (en) | Multidimensional data convergence analysis system and method based on cloud platform | |
CN108989150A (en) | A kind of login method for detecting abnormality and device | |
WO2007089786B1 (en) | Identifying unauthorized privilege escalations | |
US20110040805A1 (en) | Techniques for parallel business intelligence evaluation and management | |
CN101610190A (en) | Data network and system | |
CN110175819A (en) | A kind of online multiple person cooperational routine matter individuation service system and operating method | |
Sapegin et al. | Towards a system for complex analysis of security events in large-scale networks | |
US10268705B2 (en) | Identifying unused privileges in a database system | |
US20190050435A1 (en) | Object data association index system and methods for the construction and applications thereof | |
CN105913222A (en) | Intelligent business management method based on Internet big data | |
WO2016011874A1 (en) | Video conferencing system, right control method and apparatus therefor and computer storage medium | |
CN103455498B (en) | A kind of form keyword message localization method based on hypertext | |
CN109634802A (en) | Process monitoring method and terminal device | |
CN102567499A (en) | Safety management method for journal inquiry | |
Costante et al. | Hunting the unknown: White-box database leakage detection | |
Gagliardelli et al. | A big data platform exploiting auditable tokenization to promote good practices inside local energy communities | |
CN105138643A (en) | Patent retrieval system and retrieval method thereof | |
CN102930392A (en) | System for running information of transformer substation | |
US9876809B2 (en) | Standard metadata model for analyzing events with fraud, attack, or any other malicious background | |
CN117633879A (en) | Multi-type database security access control method, system and medium | |
Otgonbayar et al. | $ X-BAND $: Expiration Band for Anonymizing Varied Data Streams |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120711 |