CN102567499A - Safety management method for journal inquiry - Google Patents

Safety management method for journal inquiry Download PDF

Info

Publication number
CN102567499A
CN102567499A CN2011104390703A CN201110439070A CN102567499A CN 102567499 A CN102567499 A CN 102567499A CN 2011104390703 A CN2011104390703 A CN 2011104390703A CN 201110439070 A CN201110439070 A CN 201110439070A CN 102567499 A CN102567499 A CN 102567499A
Authority
CN
China
Prior art keywords
meant
log query
inquiry
managing security
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104390703A
Other languages
Chinese (zh)
Inventor
宦奕奕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Original Assignee
SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD filed Critical SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Priority to CN2011104390703A priority Critical patent/CN102567499A/en
Publication of CN102567499A publication Critical patent/CN102567499A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a safety management method for journal inquiry, which is characterized by including: firstly inputting inquiry options, and clicking an 'inquiry' button to return to all corresponding inquiry results in a database. The journal category is chosen to be 'system manager journal', a user name sysadmin is input, starting time and blocking time are chosen, the 'inquiry' button is clicked, and all operations of the sysadmin in the database are returned. Journal inquiry further comprises the serial number, the user name, the operation time, the current level, the operation type, the concrete operation, the details and whether to allow options, and therefore the safety management method is very wide in application prospect.

Description

The method for managing security of log query
Technical field
The present invention relates to the method for managing security of log query.
Background technology
In conjunction with the sequence number that comprises in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to; The masses by vast accept; The present invention has substantive technical characterstic and significant technical progress, and therefore, its prospect of meeting the tendency is boundless.
Summary of the invention
The object of the invention is exactly the problems referred to above that exist in the prior art in order to solve, and a kind of method for managing security of log query is provided.
The object of the invention is realized through following technical scheme:
The method for managing security of log query, wherein: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
The method for managing security of above-mentioned log query; Wherein: described log query is meant in log category selects " system manager's daily record ", inputs user name sysadmin, selects zero-time and closing time; Click " inquiry " button, all operations of sysadmin in the return data storehouse.
Further, the method for managing security of above-mentioned log query, wherein: described log query comprise sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
Further, the method for managing security of above-mentioned log query, wherein: described sequence number is meant the sequence number of record of the audit, user name is meant user's on trial login name.
Further, the method for managing security of above-mentioned log query, wherein: the described running time is meant user's on trial writing time, and current rank is meant the residing rank of user on trial, and action type is meant the action type that shows user on trial.
Further, the method for managing security of above-mentioned log query, wherein: described concrete operations are meant the concrete operations that show user on trial.
Further; The method for managing security of above-mentioned log query, wherein: described system manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.
Further, the method for managing security of above-mentioned log query, wherein: whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Through the sequence number in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to is accepted by the vast masses, and the present invention has substantive technical characterstic and significant technical progress; Therefore, its prospect of meeting the tendency is boundless.
Embodiment
The method for managing security of log query, its special feature is: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
Further, described log query is meant in log category selects " system manager's daily record ", inputs user name sysadmin, selects zero-time and closing time, clicks " inquiry " button, all operations of sysadmin in the return data storehouse.
Further, described log query comprise again sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
Wherein, Described sequence number is meant the sequence number of record of the audit; User name is meant user's on trial login name, and the running time is meant user's on trial writing time, and current rank is meant the residing rank of user on trial; Action type is meant the action type that shows user on trial, and concrete operations are meant the concrete operations that show user on trial; System manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.Simultaneously, whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Through the sequence number in the log query, user name, running time, current rank, action type, concrete operations, in detail, option such as whether allow; The multiple inquiry that is convenient for people to; The masses by vast accept, and therefore, its prospect of meeting the tendency is boundless.

Claims (8)

1. the method for managing security of log query is characterized in that: input inquiry option at first, click " inquiry " button, i.e. all corresponding Query Results in the return data storehouse.
2. the method for managing security of log query according to claim 1; It is characterized in that: described log query is meant in log category selects " system manager's daily record "; Input user name sysadmin; Select zero-time and closing time, click " inquiry " button, all operations of sysadmin in the return data storehouse.
3. the method for managing security of log query according to claim 1 is characterized in that: described log query comprise sequence number, user name, running time, current rank, action type, concrete operations, in detail, whether allow option.
4. the method for managing security of log query according to claim 3, it is characterized in that: described sequence number is meant the sequence number of record of the audit, user name is meant user's on trial login name.
5. the method for managing security of log query according to claim 3; It is characterized in that: the described running time is meant user's on trial writing time; Current rank is meant the residing rank of user on trial, and action type is meant the action type that shows user on trial.
6. the method for managing security of log query according to claim 3 is characterized in that: described concrete operations are meant the concrete operations that show user on trial.
7. the method for managing security of log query according to claim 3 is characterized in that: described system manager's concrete operations comprise login, withdraw from, revise password, heavily login, configuration log server, dispose audit server, backup path be set, the configuration switch controller, append and import white list, locking/releasing user name, abnormal alarm etc. is set.
8. the method for managing security of log query according to claim 3, it is characterized in that: whether the described detail operations that is meant display system keeper and safety officer in detail allows to be meant whether display operation is allowed to or accepts.
CN2011104390703A 2011-12-26 2011-12-26 Safety management method for journal inquiry Pending CN102567499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104390703A CN102567499A (en) 2011-12-26 2011-12-26 Safety management method for journal inquiry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104390703A CN102567499A (en) 2011-12-26 2011-12-26 Safety management method for journal inquiry

Publications (1)

Publication Number Publication Date
CN102567499A true CN102567499A (en) 2012-07-11

Family

ID=46412900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104390703A Pending CN102567499A (en) 2011-12-26 2011-12-26 Safety management method for journal inquiry

Country Status (1)

Country Link
CN (1) CN102567499A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678415A (en) * 2012-09-25 2014-03-26 腾讯科技(深圳)有限公司 Method and device for processing project log data
CN106484742A (en) * 2015-09-01 2017-03-08 北京国双科技有限公司 Log processing method and device
CN110069463A (en) * 2019-03-12 2019-07-30 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6564247B1 (en) * 1999-11-18 2003-05-13 International Business Machines Corporation System and method for registering user identifiers
CN101013482A (en) * 2006-06-13 2007-08-08 蒋丽萍 Online integrated management platform for archive and data of constructing project item
CN101453388A (en) * 2008-12-30 2009-06-10 公安部第三研究所 Inspection method for Internet service operation field terminal safety control operation
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6564247B1 (en) * 1999-11-18 2003-05-13 International Business Machines Corporation System and method for registering user identifiers
CN101013482A (en) * 2006-06-13 2007-08-08 蒋丽萍 Online integrated management platform for archive and data of constructing project item
CN101453388A (en) * 2008-12-30 2009-06-10 公安部第三研究所 Inspection method for Internet service operation field terminal safety control operation
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678415A (en) * 2012-09-25 2014-03-26 腾讯科技(深圳)有限公司 Method and device for processing project log data
CN106484742A (en) * 2015-09-01 2017-03-08 北京国双科技有限公司 Log processing method and device
CN110069463A (en) * 2019-03-12 2019-07-30 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium
CN110069463B (en) * 2019-03-12 2021-07-16 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US9092445B2 (en) Predictive information topology modeling and visualization
De Rassenfosse et al. An introduction to the Patstat database with example queries
CN103973668B (en) Server-side personal privacy data protecting method in network information system
Marín-Ortega et al. ELTA: new approach in designing business intelligence solutions in era of big data
CN106777227A (en) Multidimensional data convergence analysis system and method based on cloud platform
CN108989150A (en) A kind of login method for detecting abnormality and device
WO2007089786B1 (en) Identifying unauthorized privilege escalations
US20110040805A1 (en) Techniques for parallel business intelligence evaluation and management
CN101610190A (en) Data network and system
CN110175819A (en) A kind of online multiple person cooperational routine matter individuation service system and operating method
Sapegin et al. Towards a system for complex analysis of security events in large-scale networks
US10268705B2 (en) Identifying unused privileges in a database system
US20190050435A1 (en) Object data association index system and methods for the construction and applications thereof
CN105913222A (en) Intelligent business management method based on Internet big data
WO2016011874A1 (en) Video conferencing system, right control method and apparatus therefor and computer storage medium
CN103455498B (en) A kind of form keyword message localization method based on hypertext
CN109634802A (en) Process monitoring method and terminal device
CN102567499A (en) Safety management method for journal inquiry
Costante et al. Hunting the unknown: White-box database leakage detection
Gagliardelli et al. A big data platform exploiting auditable tokenization to promote good practices inside local energy communities
CN105138643A (en) Patent retrieval system and retrieval method thereof
CN102930392A (en) System for running information of transformer substation
US9876809B2 (en) Standard metadata model for analyzing events with fraud, attack, or any other malicious background
CN117633879A (en) Multi-type database security access control method, system and medium
Otgonbayar et al. $ X-BAND $: Expiration Band for Anonymizing Varied Data Streams

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120711