CN102567848A - Realization method of audit administrator function - Google Patents
Realization method of audit administrator function Download PDFInfo
- Publication number
- CN102567848A CN102567848A CN2011104390864A CN201110439086A CN102567848A CN 102567848 A CN102567848 A CN 102567848A CN 2011104390864 A CN2011104390864 A CN 2011104390864A CN 201110439086 A CN201110439086 A CN 201110439086A CN 102567848 A CN102567848 A CN 102567848A
- Authority
- CN
- China
- Prior art keywords
- audit
- auditor
- function
- management person
- implementation method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The invention relates to a realization method of an audit administrator function. The method is characterized in that firstly authentication is required, then an auditor enters a query interface to perform querying according to query conditions, and both separate query or combined query can be performed; the auditor performs querying regularly to obtain an audit report; and simultaneously, if an audit administrator does not operate an audit process for a long time, the audit process exits, and administrate identity is required to be identified again; and finally log out is performed. By adopting the realization method, external intrusion can be processed, the behavior of access network by an internal user can also be monitored, the abnormal behavior of the internal user is simultaneously recorded, the security of the network and business data is guaranteed, and the method has a very wide application prospect.
Description
Technical field
The present invention relates to a kind of method, relate in particular to the implementation method of audit management person's function.
Background technology
Use network to carry out all processes in conjunction with audit as recording user, not only can discern the user of access system, can also point out the method for application of system, seek the abnormal behaviour in the access process with this.Simultaneously, the record of system event can be more rapidly with identification problem systematically, be the important evidence of accident treatment, can the evidence obtaining basis be provided for network crime behavior and the behavior of divulging a secret.Therefore, press for a kind of security means the problems referred to above are carried out effective monitoring and management.This product produces under such background just.
Summary of the invention
The object of the invention is exactly the problems referred to above that exist in the prior art in order to solve, and the implementation method of audit management person's function is provided.
The object of the invention is realized through following technical scheme:
The implementation method of audit management person's function, wherein: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
The implementation method of above-mentioned audit management person's function, wherein: described audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
Further, the implementation method of above-mentioned audit management person's function, wherein: described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.
Further, the implementation method of above-mentioned audit management person's function, wherein: described login name or password are correct, and the auditor gets into the audit interface and produces the auditor and logins daily record; If input login name or password bad provide information, the user confirms information, re-enters login name and password.
Further, the implementation method of above-mentioned audit management person's function, wherein: the auditor gets into query interface in the described audit function, inquires about according to querying condition, can inquire about separately, also can query composition.Querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
Further, the implementation method of above-mentioned audit management person's function, wherein: comprise that the auditor regularly inquires about in the described audit statement processing capacity, the form that is audited,
The auditor also can print audit statement; The auditor can also select statistical method according to the audit statement content.
Further, the implementation method of above-mentioned audit management person's function, wherein: in the heavy identification function of described identity, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity.
Further, the implementation method of above-mentioned audit management person's function, wherein: described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Can handle invasion from the outside; Also can monitor the behavior of inner customer access network; Simultaneously the abnormal behaviour of internal user is carried out record, guarantee the security of network and business datum, its application prospect is boundless.
Embodiment
The implementation method of audit management person's function, its special feature is: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
Wherein, audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
Further combine audit management person's function, described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.The auditor gets into query interface in the audit function, inquires about according to querying condition, can inquire about separately, also can query composition.Querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
At last, described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
After adopting this method, can handle the invasion from the outside, also can monitor the behavior of inner customer access network, simultaneously the abnormal behaviour of internal user carried out record, guarantee the security of network and business datum, its application prospect is boundless.
Claims (8)
1. the implementation method of audit management person's function is characterized in that: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
2. the implementation method of audit management person's function according to claim 1 is characterized in that: described audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
3. the implementation method of audit management person's function according to claim 1 is characterized in that: described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.
4. the implementation method of audit management person's function according to claim 3 is characterized in that: described login name or password are correct, and the auditor gets into the audit interface and produces the auditor and logins daily record; If input login name or password bad provide information, the user confirms information, re-enters login name and password.
5. the implementation method of audit management person's function according to claim 1; It is characterized in that: the auditor gets into query interface in the described audit function; Inquire about according to querying condition; Can inquire about separately, also can query composition, querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
6. the implementation method of audit management person's function according to claim 1 is characterized in that: comprise that the auditor regularly inquires about in the described audit statement processing capacity, and the form that is audited, the auditor also can print audit statement; The auditor can also select statistical method according to the audit statement content.
7. the implementation method of audit management person's function according to claim 1 is characterized in that: in the heavy identification function of described identity, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity.
8. the implementation method of audit management person's function according to claim 1 is characterized in that: described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104390864A CN102567848A (en) | 2011-12-26 | 2011-12-26 | Realization method of audit administrator function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104390864A CN102567848A (en) | 2011-12-26 | 2011-12-26 | Realization method of audit administrator function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102567848A true CN102567848A (en) | 2012-07-11 |
Family
ID=46413213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104390864A Pending CN102567848A (en) | 2011-12-26 | 2011-12-26 | Realization method of audit administrator function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102567848A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409849A (en) * | 2018-12-05 | 2019-03-01 | 广州中浩控制技术有限公司 | A kind of audit trail method and system of MES system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043388A (en) * | 2007-03-27 | 2007-09-26 | 杭州华为三康技术有限公司 | Method, equipment and system for detecting whether web access user terminal is on line |
CN102227116A (en) * | 2011-06-14 | 2011-10-26 | 苏州九州安华信息安全技术有限公司 | Safe local area network management method and local area network |
-
2011
- 2011-12-26 CN CN2011104390864A patent/CN102567848A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043388A (en) * | 2007-03-27 | 2007-09-26 | 杭州华为三康技术有限公司 | Method, equipment and system for detecting whether web access user terminal is on line |
CN102227116A (en) * | 2011-06-14 | 2011-10-26 | 苏州九州安华信息安全技术有限公司 | Safe local area network management method and local area network |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409849A (en) * | 2018-12-05 | 2019-03-01 | 广州中浩控制技术有限公司 | A kind of audit trail method and system of MES system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Greenwald | NSA collecting phone records of millions of Verizon customers daily | |
CN111898148A (en) | Information supervision method and device based on block chain | |
US10225249B2 (en) | Preventing unauthorized access to an application server | |
CN104239197A (en) | Method for discovering abnormal behaviors of management user based on big data log analysis | |
CN108270716A (en) | A kind of audit of information security method based on cloud computing | |
RU2622883C2 (en) | System and method for managing access to personal data | |
CN103413088A (en) | Computer document operational safety audit system | |
CN109711126A (en) | A kind of computer information safe management system and method | |
CN106534212A (en) | Adaptive safety protection method and system based on user behaviors and data states | |
CN109409849A (en) | A kind of audit trail method and system of MES system | |
CN104504014A (en) | Data processing method and device based on large data platform | |
AU2018220072A1 (en) | Systems and methods to control data access and usage | |
CN110618977B (en) | Login anomaly detection method, device, storage medium and computer equipment | |
Neghina et al. | Managing information technology security in the context of cyber crime trends | |
CN102567848A (en) | Realization method of audit administrator function | |
CN206332695U (en) | A kind of adaptive security guard system based on user behavior and data mode | |
KR102311997B1 (en) | Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis | |
CN116821928A (en) | Method and system for improving internal data security of power edge computing chip | |
US20100031316A1 (en) | System access log monitoring and reporting system | |
WO2019176080A1 (en) | Fraud detection system and fraud detection device | |
CN111931218A (en) | Client data safety protection device and protection method | |
CN102567499A (en) | Safety management method for journal inquiry | |
CN110543762A (en) | Privileged account threat analysis system | |
CN102404344A (en) | Realizing method of security administrator function | |
TWM564751U (en) | Hacker attack detection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120711 |