CN102567848A - Realization method of audit administrator function - Google Patents

Realization method of audit administrator function Download PDF

Info

Publication number
CN102567848A
CN102567848A CN2011104390864A CN201110439086A CN102567848A CN 102567848 A CN102567848 A CN 102567848A CN 2011104390864 A CN2011104390864 A CN 2011104390864A CN 201110439086 A CN201110439086 A CN 201110439086A CN 102567848 A CN102567848 A CN 102567848A
Authority
CN
China
Prior art keywords
audit
auditor
function
management person
implementation method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104390864A
Other languages
Chinese (zh)
Inventor
宦奕奕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Original Assignee
SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD filed Critical SUZHOU STYLE INFORMATION TECHNOLOGY CO LTD
Priority to CN2011104390864A priority Critical patent/CN102567848A/en
Publication of CN102567848A publication Critical patent/CN102567848A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention relates to a realization method of an audit administrator function. The method is characterized in that firstly authentication is required, then an auditor enters a query interface to perform querying according to query conditions, and both separate query or combined query can be performed; the auditor performs querying regularly to obtain an audit report; and simultaneously, if an audit administrator does not operate an audit process for a long time, the audit process exits, and administrate identity is required to be identified again; and finally log out is performed. By adopting the realization method, external intrusion can be processed, the behavior of access network by an internal user can also be monitored, the abnormal behavior of the internal user is simultaneously recorded, the security of the network and business data is guaranteed, and the method has a very wide application prospect.

Description

The implementation method of audit management person's function
Technical field
The present invention relates to a kind of method, relate in particular to the implementation method of audit management person's function.
Background technology
Use network to carry out all processes in conjunction with audit as recording user, not only can discern the user of access system, can also point out the method for application of system, seek the abnormal behaviour in the access process with this.Simultaneously, the record of system event can be more rapidly with identification problem systematically, be the important evidence of accident treatment, can the evidence obtaining basis be provided for network crime behavior and the behavior of divulging a secret.Therefore, press for a kind of security means the problems referred to above are carried out effective monitoring and management.This product produces under such background just.
Summary of the invention
The object of the invention is exactly the problems referred to above that exist in the prior art in order to solve, and the implementation method of audit management person's function is provided.
The object of the invention is realized through following technical scheme:
The implementation method of audit management person's function, wherein: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
The implementation method of above-mentioned audit management person's function, wherein: described audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
Further, the implementation method of above-mentioned audit management person's function, wherein: described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.
Further, the implementation method of above-mentioned audit management person's function, wherein: described login name or password are correct, and the auditor gets into the audit interface and produces the auditor and logins daily record; If input login name or password bad provide information, the user confirms information, re-enters login name and password.
Further, the implementation method of above-mentioned audit management person's function, wherein: the auditor gets into query interface in the described audit function, inquires about according to querying condition, can inquire about separately, also can query composition.Querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
Further, the implementation method of above-mentioned audit management person's function, wherein: comprise that the auditor regularly inquires about in the described audit statement processing capacity, the form that is audited,
The auditor also can print audit statement; The auditor can also select statistical method according to the audit statement content.
Further, the implementation method of above-mentioned audit management person's function, wherein: in the heavy identification function of described identity, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity.
Further, the implementation method of above-mentioned audit management person's function, wherein: described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
The outstanding substantive distinguishing features and the obvious improvement of technical scheme of the present invention is mainly reflected in: after adopting this method; Can handle invasion from the outside; Also can monitor the behavior of inner customer access network; Simultaneously the abnormal behaviour of internal user is carried out record, guarantee the security of network and business datum, its application prospect is boundless.
Embodiment
The implementation method of audit management person's function, its special feature is: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
Wherein, audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
Further combine audit management person's function, described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.The auditor gets into query interface in the audit function, inquires about according to querying condition, can inquire about separately, also can query composition.Querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
At last, described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
After adopting this method, can handle the invasion from the outside, also can monitor the behavior of inner customer access network, simultaneously the abnormal behaviour of internal user carried out record, guarantee the security of network and business datum, its application prospect is boundless.

Claims (8)

1. the implementation method of audit management person's function is characterized in that: at first need authentication; Subsequently, the auditor gets into query interface, inquires about according to querying condition, can inquire about separately, also can query composition; Then the auditor regularly inquires about, and form is audited; Simultaneously, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity; Log off at last.
2. the implementation method of audit management person's function according to claim 1 is characterized in that: described audit management person's function comprises that authentication, audit, audit statement are handled, identity is heavily differentiated and exit function.
3. the implementation method of audit management person's function according to claim 1 is characterized in that: described authentication function at first wants the auditor to start the audit application program; Application program gets into login interface then, and login interface provides login name, password for the user; Then the auditor inputs login name and password, clicks definite when input is accomplished; Can the edit box of username and password be emptied through the replacement button.
4. the implementation method of audit management person's function according to claim 3 is characterized in that: described login name or password are correct, and the auditor gets into the audit interface and produces the auditor and logins daily record; If input login name or password bad provide information, the user confirms information, re-enters login name and password.
5. the implementation method of audit management person's function according to claim 1; It is characterized in that: the auditor gets into query interface in the described audit function; Inquire about according to querying condition; Can inquire about separately, also can query composition, querying condition comprises: user name, user role, user class, operation behavior, running time, unusual rank, alert levels.
6. the implementation method of audit management person's function according to claim 1 is characterized in that: comprise that the auditor regularly inquires about in the described audit statement processing capacity, and the form that is audited, the auditor also can print audit statement; The auditor can also select statistical method according to the audit statement content.
7. the implementation method of audit management person's function according to claim 1 is characterized in that: in the heavy identification function of described identity, audit management person not to the auditing procedure operation, then withdraws from auditing procedure for a long time, needs to differentiate again the management identity.
8. the implementation method of audit management person's function according to claim 1 is characterized in that: described exit function is that the auditor closes auditing procedure, logs off, and produces the audit log that withdraws from.
CN2011104390864A 2011-12-26 2011-12-26 Realization method of audit administrator function Pending CN102567848A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104390864A CN102567848A (en) 2011-12-26 2011-12-26 Realization method of audit administrator function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104390864A CN102567848A (en) 2011-12-26 2011-12-26 Realization method of audit administrator function

Publications (1)

Publication Number Publication Date
CN102567848A true CN102567848A (en) 2012-07-11

Family

ID=46413213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104390864A Pending CN102567848A (en) 2011-12-26 2011-12-26 Realization method of audit administrator function

Country Status (1)

Country Link
CN (1) CN102567848A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409849A (en) * 2018-12-05 2019-03-01 广州中浩控制技术有限公司 A kind of audit trail method and system of MES system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043388A (en) * 2007-03-27 2007-09-26 杭州华为三康技术有限公司 Method, equipment and system for detecting whether web access user terminal is on line
CN102227116A (en) * 2011-06-14 2011-10-26 苏州九州安华信息安全技术有限公司 Safe local area network management method and local area network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043388A (en) * 2007-03-27 2007-09-26 杭州华为三康技术有限公司 Method, equipment and system for detecting whether web access user terminal is on line
CN102227116A (en) * 2011-06-14 2011-10-26 苏州九州安华信息安全技术有限公司 Safe local area network management method and local area network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409849A (en) * 2018-12-05 2019-03-01 广州中浩控制技术有限公司 A kind of audit trail method and system of MES system

Similar Documents

Publication Publication Date Title
Greenwald NSA collecting phone records of millions of Verizon customers daily
CN111898148A (en) Information supervision method and device based on block chain
US10225249B2 (en) Preventing unauthorized access to an application server
CN104239197A (en) Method for discovering abnormal behaviors of management user based on big data log analysis
CN108270716A (en) A kind of audit of information security method based on cloud computing
RU2622883C2 (en) System and method for managing access to personal data
CN103413088A (en) Computer document operational safety audit system
CN109711126A (en) A kind of computer information safe management system and method
CN106534212A (en) Adaptive safety protection method and system based on user behaviors and data states
CN109409849A (en) A kind of audit trail method and system of MES system
CN104504014A (en) Data processing method and device based on large data platform
AU2018220072A1 (en) Systems and methods to control data access and usage
CN110618977B (en) Login anomaly detection method, device, storage medium and computer equipment
Neghina et al. Managing information technology security in the context of cyber crime trends
CN102567848A (en) Realization method of audit administrator function
CN206332695U (en) A kind of adaptive security guard system based on user behavior and data mode
KR102311997B1 (en) Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis
CN116821928A (en) Method and system for improving internal data security of power edge computing chip
US20100031316A1 (en) System access log monitoring and reporting system
WO2019176080A1 (en) Fraud detection system and fraud detection device
CN111931218A (en) Client data safety protection device and protection method
CN102567499A (en) Safety management method for journal inquiry
CN110543762A (en) Privileged account threat analysis system
CN102404344A (en) Realizing method of security administrator function
TWM564751U (en) Hacker attack detection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120711