CN109583199A - A kind of access auditing method, system, equipment and the medium of storage management system - Google Patents

A kind of access auditing method, system, equipment and the medium of storage management system Download PDF

Info

Publication number
CN109583199A
CN109583199A CN201811549666.7A CN201811549666A CN109583199A CN 109583199 A CN109583199 A CN 109583199A CN 201811549666 A CN201811549666 A CN 201811549666A CN 109583199 A CN109583199 A CN 109583199A
Authority
CN
China
Prior art keywords
logging request
access
management system
storage management
auditing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811549666.7A
Other languages
Chinese (zh)
Inventor
邵宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811549666.7A priority Critical patent/CN109583199A/en
Publication of CN109583199A publication Critical patent/CN109583199A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Abstract

This application discloses access auditing method, device and a kind of electronic equipment and computer readable storage medium of a kind of storage management system, this method comprises: determining the corresponding access credentials of the logging request after getting logging request;Judge whether the access credentials are correct, and determine whether to respond the logging request according to judging result, obtains login result;The corresponding solicited message of the logging request and the login result are recorded into audit log, to analyse whether dangerous operation using the audit log.The application passes through the record corresponding solicited message of user's logging request and corresponding login result, it will login successfully, the information of login failure is recorded into audit log, to judge whether storage management system is attempted attack, and attack source can be determined according to log-on message, it realizes risk analysis when system failure or loss of data, improves the safety of storage management system.

Description

A kind of access auditing method, system, equipment and the medium of storage management system
Technical field
This application involves storage management system technical field of data security, more specifically to a kind of storage management system Access auditing method, device and a kind of electronic equipment of system and a kind of computer readable storage medium.
Background technique
With the fast development of internet, data volume sharply increases, more and more large enterprises, government organs, silver Row, even small business, educational institution are all using storage management system.For storage management system, due to system The permission of administrator is big, and the irregularity operation of system manager may bring the data safety of storage management system very big Risk.
In traditional storage management system, the operation of administrator can not be recorded, in loss of data or system failure In the case where, reason cannot be analyzed by operation note, be also not easy to client and called to account.
Therefore, how to solve the above problems is that those skilled in the art need to pay close attention to.
Summary of the invention
A kind of access auditing method, device and a kind of electronic equipment for being designed to provide storage management system of the application With a kind of computer readable storage medium, can be improved the safety of storage management system, and for storage management system damage or Risk retrospect provides basis when loss of data.
To achieve the above object, this application provides a kind of access auditing methods of storage management system, comprising:
After getting logging request, the corresponding access credentials of the logging request are determined;
Judge whether the access credentials are correct, and determines whether to carry out the logging request according to judging result Response, obtains login result;
The corresponding solicited message of the logging request and the login result are recorded into audit log, described in utilizing Audit log analyses whether dangerous operation.
Optionally, the solicited message includes request ID, request time, request user and IP address requesting.
It is optionally, described to be determined whether after being responded to the logging request according to judging result, further includes:
After allowing to respond the logging request, session voucher is issued for the promoter of the logging request, with The promoter is set to execute the operation after logging in using the session voucher.
Optionally, the session voucher is session key.
Optionally, further includes:
After getting operation requests after login, the session voucher in the operation requests is determined;
The corresponding user information of the session voucher is inquired using the session voucher, and is judged according to the user information Whether active user side, which has permission, executes operation;
The information of the corresponding operating result of the operation requests and the operation requests is recorded into the audit log.
It is optionally, described to be inquired after the corresponding user information of the session voucher using the session voucher, further includes:
The user information is recorded into the audit log.
Optionally, after the session voucher in the determination operation requests, further includes:
Judge whether the session voucher is effective;
If it is not, then forbidding responding the operation requests, and record the corresponding information of presently described operation requests;
If it is, the starting step for inquiring the corresponding user information of the session voucher using the session voucher Suddenly.
To achieve the above object, this application provides a kind of access audit devices of storage management system, comprising:
Voucher determining module, for after getting logging request, determining the corresponding access credentials of the logging request;
In response to determining that whether module, correct for judging the access credentials, and determined whether according to judging result The logging request is responded, login result is obtained;
Information logging modle, for recording the corresponding solicited message of the logging request and the login result to audit In log, to analyse whether dangerous operation using the audit log.
To achieve the above object, this application provides a kind of electronic equipment, comprising:
Memory, for storing computer program;
Processor realizes the access of aforementioned disclosed any storage management system when for executing the computer program The step of auditing method.
To achieve the above object, this application provides a kind of computer readable storage medium, the computer-readable storages Computer program is stored on medium, the computer program realizes aforementioned disclosed any storage tube when being executed by processor The step of access auditing method of reason system.
By above scheme it is found that a kind of access auditing method of storage management system provided by the present application, comprising: when obtaining After getting logging request, the corresponding access credentials of the logging request are determined;Judge whether the access credentials are correct, and according to Judging result determines whether to respond the logging request, obtains login result;The logging request is corresponding Solicited message and the login result are recorded into audit log, to analyse whether dangerous behaviour using the audit log Make.The application will login successfully by the record corresponding solicited message of user's logging request and corresponding login result, log in mistake The information lost is recorded into audit log, to judge whether storage management system is attempted attack, and can be according to login Information determines attack source, realizes risk analysis when system failure or loss of data, improves the safety of storage management system Property.Disclosed herein as well is the access audit device and a kind of electronic equipment and one kind of a kind of storage management system are computer-readable Storage medium is equally able to achieve above-mentioned technical effect.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Application.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the access auditing method of storage management system disclosed in the embodiment of the present application;
Fig. 2 is the flow chart of the access auditing method of another kind storage management system disclosed in the embodiment of the present application;
Fig. 3 is the flow chart of the access auditing method of another kind storage management system disclosed in the embodiment of the present application;
Fig. 4 is the flow chart of the access auditing method of another storage management system disclosed in the embodiment of the present application;
Fig. 5 is a kind of structure chart of the access audit device of storage management system disclosed in the embodiment of the present application;
Fig. 6 is the structure chart of a kind of electronic equipment disclosed in the embodiment of the present application;
Fig. 7 is the structure chart of another kind electronic equipment disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
In traditional storage management system, the operation of administrator can not be recorded, in loss of data or system failure In the case where, reason cannot be analyzed by operation note, be also not easy to client and called to account.
The embodiment of the present application discloses a kind of access auditing method of storage management system, improves storage management system Safety, and realize risk analysis when system failure or loss of data.
Referring to Fig. 1, a kind of flow chart of the access auditing method of storage management system, such as schemes disclosed in the embodiment of the present application Shown in 1, comprising:
S101: after getting logging request, the corresponding access credentials of the logging request are determined;
In the present embodiment, after getting Client-initiated logging request, determine current logging request it is corresponding access with Card, such as the verification informations such as login password.
S102: judge whether the access credentials are correct, and determine whether to ask the login according to judging result It asks and is responded, obtain login result;
Judge whether the access credentials of active user are correct.If correct, allow to respond logging request, i.e., currently User logins successfully;If mistake, forbid responding logging request, i.e. active user's login failure.
S103: the corresponding solicited message of the logging request and the login result are recorded into audit log, with benefit Dangerous operation is analysed whether with the audit log.
Further, after above-mentioned register, the details of logging request and corresponding login result are remembered It records to audit log.No matter log in whether to succeed as a result, and be described, after loss of data or storage management system damage, leads to Retrospect log-on message is crossed, can analyze and whether be attempted attack.In addition, when system operates normally, it can also be by fixed When check audit log, to check for risky operation.
Specifically, the corresponding solicited message of the logging request may include request ID, request time, request user and ask Seek IP address.In addition to this it is possible to include the details such as login mode, user name, so as to true according to solicited message Determine attack source.
By above scheme it is found that a kind of access auditing method of storage management system provided by the present application, comprising: when obtaining After getting logging request, the corresponding access credentials of the logging request are determined;Judge whether the access credentials are correct, and according to Judging result determines whether to respond the logging request, obtains login result;The logging request is corresponding Solicited message and the login result are recorded into audit log, to analyse whether dangerous behaviour using the audit log Make.The application will login successfully by the record corresponding solicited message of user's logging request and corresponding login result, log in mistake The information lost is recorded into audit log, to judge whether storage management system is attempted attack, and can be according to login Information determines attack source, realizes risk analysis when system failure or loss of data, improves the safety of storage management system Property.
The embodiment of the present application discloses a kind of access auditing method of storage management system, relative to a upper embodiment, originally Embodiment has made further instruction and optimization to technical solution.It is specific:
Referring to fig. 2, the flow chart of the access auditing method of another storage management system provided by the embodiments of the present application, such as Shown in Fig. 2, comprising:
S201: after getting logging request, the corresponding access credentials of the logging request are determined;
S202: judge whether the access credentials are correct, and determine whether to ask the login according to judging result It asks and is responded, obtain login result;
S203: after allowing to respond the logging request, for the logging request promoter issue session with Card, so that the promoter executes the operation after logging in using the session voucher;
In the present embodiment, when access credentials are verified, after allowing to respond logging request, user is logined successfully, The user currently to login successfully issues session voucher at this time, and subsequent user can issue operation requests with dialogue-based voucher.Tool Body, the session voucher can be session key or token, it is not limited here.
S204: the corresponding solicited message of the logging request and the login result are recorded into audit log, with benefit Dangerous operation is analysed whether with the audit log.
On the basis of the above embodiments, the embodiment of the present application discloses the access auditing party of another storage management system Method, shown in Figure 3, method includes:
S301: after getting operation requests after login, the session voucher in the operation requests is determined;
In the present embodiment, after the operation requests initiated after getting user and successfully logging in, determines in operation requests and include Session voucher.
S302: the corresponding user information of the session voucher is inquired using the session voucher, and is believed according to the user Breath judges whether active user side has permission and executes operation;
Specifically, the corresponding user name of current initiation user, IP address, user login side are inquired by session voucher The user informations such as formula, user role, to judge whether active user has permission execution corresponding operation according to user information.
S303: the information of the corresponding operating result of the operation requests and the operation requests was recorded to the audit day In will.
It is understood that responding operation requests if active user has permission execution corresponding operation, operation knot is obtained Fruit;If active user does not have permission to execute corresponding operation, forbid responding operation requests.Whether will further operate successfully, The information update of corresponding operating result and operation requests is recorded into audit log, and follow-up audit personnel can be careful by checking It counts log and carries out risk investigation and detection.
The embodiment of the present application discloses a kind of access auditing method of storage management system, relative to a upper embodiment, originally Embodiment has made further instruction and optimization to technical solution.It is specific:
Referring to fig. 4, the flow chart of the access auditing method of another storage management system provided by the embodiments of the present application, such as Shown in Fig. 4, comprising:
S401: after getting operation requests after login, the session voucher in the operation requests is determined;
S402: judge whether the session voucher is effective;
S403: if it is not, then forbidding responding the operation requests, and the corresponding information of presently described operation requests is recorded;
S404: if it is, inquiring the corresponding user information of the session voucher using the session voucher, and according to institute It states user information and judges whether active user side has permission and execute operation;
In the present embodiment, before inquiring corresponding user information using session voucher, whether session voucher is first determined whether Effectively.If current sessions voucher is invalid, forbid responding operation requests, or directly ignore this operation requests, and record and work as The information of preceding operation requests.If current sessions voucher is effective, corresponding user information further can be inquired according to session voucher, from And it judges whether there is permission and executes operation.
S405: the information of the user information, the corresponding operating result of the operation requests and the operation requests is remembered Record is into the audit log.
Further, by the user information obtained according to session voucher, the corresponding operating result of current operation and operation The essential information of request is recorded into audit log.Specifically, the essential information of operation requests may include request ID, operation ginseng Number etc., user information may include the information such as user name, role.
A kind of access audit device of storage management system provided by the embodiments of the present application is introduced below, is hereafter retouched The access audit device and a kind of above-described access auditing method of storage management system for a kind of storage management system stated It can be cross-referenced.
Referring to Fig. 5, a kind of structure chart of the access audit device of storage management system provided by the embodiments of the present application is such as schemed Shown in 5, comprising:
Voucher determining module 100, for after getting logging request, determine the logging request it is corresponding access with Card;
In response to determining that whether module 200, correct for judging the access credentials, and determine whether to permit according to judging result Perhaps the logging request is responded, obtains login result;
Information logging modle 300, for by the corresponding solicited message of the logging request and the login result record to In audit log, to analyse whether dangerous operation using the audit log.
Present invention also provides a kind of electronic equipment, referring to Fig. 6, the knot of a kind of electronic equipment provided by the embodiments of the present application Composition, as shown in Figure 6, comprising:
Memory 11, for storing computer program;
Step provided by above-described embodiment may be implemented in processor 12 when for executing the computer program.
Specifically, memory 11 includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with Operating system and computer-readable instruction, the built-in storage are the operating system and computer-readable in non-volatile memory medium The operation of instruction provides environment.Processor 12 can be a central processing unit (Central in some embodiments Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, mentioned for electronic equipment Aforementioned any embodiment may be implemented when executing the computer program saved in the memory 11 for calculating and control ability The step of access auditing method of disclosed storage management system.
On the basis of the above embodiments, preferably, referring to Fig. 7, the electronic equipment further include:
Input interface 13 is connected with processor 12, for obtaining computer program, parameter and the instruction of external importing, warp The control of processor 12 is saved into memory 11.The input interface 13 can be connected with input unit, receive user and be manually entered Parameter or instruction.The input unit can be the touch layer covered on display screen, be also possible to be arranged in terminal enclosure by Key, trace ball or Trackpad are also possible to keyboard, Trackpad or mouse etc..
Display unit 14 is connected with processor 12, for the data of the processing of video-stream processor 12 and for showing visually The user interface of change.The display unit 14 can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display and OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..
The network port 15 is connected with processor 12, for being communicatively coupled with external each terminal device.The communication connection The used communication technology can be cable communicating technology or wireless communication technique, such as mobile high definition chained technology (MHL), general Universal serial bus (USB), high-definition media interface (HDMI), adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption bluetooth The communication technology, communication technology based on IEEE802.11s etc..
Fig. 7 illustrates only the electronic equipment with component 11-15, it will be appreciated by persons skilled in the art that Fig. 7 is shown Structure do not constitute the restriction to electronic equipment, may include more certain than illustrating less perhaps more components or combination Component or different component layouts.
Present invention also provides a kind of computer readable storage medium, the storage medium may include: USB flash disk, mobile hard disk, Read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic The various media that can store program code such as dish or CD.Computer program, the calculating are stored on the storage medium Machine program realizes the step of access auditing method of storage management system disclosed in aforementioned any embodiment when being executed by processor.
The application passes through the record corresponding solicited message of user's logging request and corresponding login result, will login successfully, The information of login failure is recorded into audit log, to judge whether storage management system is attempted attack, and can root Attack source is determined according to log-on message, is realized risk analysis when system failure or loss of data, is improved storage management system Safety.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, also Can to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application It is interior.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (10)

1. a kind of access auditing method of storage management system characterized by comprising
After getting logging request, the corresponding access credentials of the logging request are determined;
Judge whether the access credentials are correct, and determines whether to ring the logging request according to judging result It answers, obtains login result;
The corresponding solicited message of the logging request and the login result are recorded into audit log, to utilize the audit Log analysis whether there is risky operation.
2. access auditing method according to claim 1, which is characterized in that the solicited message includes request ID, request Time, request user and IP address requesting.
3. access auditing method according to claim 1, which is characterized in that described to be determined whether according to judging result After being responded to the logging request, further includes:
After allowing to respond the logging request, session voucher is issued for the promoter of the logging request, so that institute It states promoter and executes the operation after logging in using the session voucher.
4. access auditing method according to claim 3, which is characterized in that the session voucher is session key.
5. access auditing method according to claim 3 or 4, which is characterized in that further include:
After getting operation requests after login, the session voucher in the operation requests is determined;
The corresponding user information of the session voucher is inquired using the session voucher, and is judged currently according to the user information Whether user side, which has permission, executes operation;
The information of the corresponding operating result of the operation requests and the operation requests is recorded into the audit log.
6. access auditing method according to claim 5, which is characterized in that described using described in session voucher inquiry After the corresponding user information of session voucher, further includes:
The user information is recorded into the audit log.
7. access auditing method according to claim 5, which is characterized in that described in the determination operation requests After session voucher, further includes:
Judge whether the session voucher is effective;
If it is not, then forbidding responding the operation requests, and record the corresponding information of presently described operation requests;
If it is, the step of starting the user information corresponding using the session voucher inquiry session voucher.
8. a kind of access audit device of storage management system characterized by comprising
Voucher determining module, for after getting logging request, determining the corresponding access credentials of the logging request;
In response to determining that module, for judging whether the access credentials are correct, and determines whether according to judging result to institute It states logging request to be responded, obtains login result;
Information logging modle, for recording the corresponding solicited message of the logging request and the login result to audit log In, to analyse whether dangerous operation using the audit log.
9. a kind of electronic equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the storage management system as described in any one of claim 1 to 7 when for executing the computer program The step of accessing auditing method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the visit of the storage management system as described in any one of claim 1 to 7 when the computer program is executed by processor The step of asking auditing method.
CN201811549666.7A 2018-12-18 2018-12-18 A kind of access auditing method, system, equipment and the medium of storage management system Withdrawn CN109583199A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811549666.7A CN109583199A (en) 2018-12-18 2018-12-18 A kind of access auditing method, system, equipment and the medium of storage management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811549666.7A CN109583199A (en) 2018-12-18 2018-12-18 A kind of access auditing method, system, equipment and the medium of storage management system

Publications (1)

Publication Number Publication Date
CN109583199A true CN109583199A (en) 2019-04-05

Family

ID=65930820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811549666.7A Withdrawn CN109583199A (en) 2018-12-18 2018-12-18 A kind of access auditing method, system, equipment and the medium of storage management system

Country Status (1)

Country Link
CN (1) CN109583199A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274461A (en) * 2020-01-14 2020-06-12 深信服科技股份有限公司 Data auditing method, data auditing device and storage medium
CN112084512A (en) * 2020-08-27 2020-12-15 山东英信计算机技术有限公司 Access control method, device, equipment and computer readable storage medium
CN112613029A (en) * 2021-01-06 2021-04-06 深信服科技股份有限公司 Weak password detection method and device, computer storage medium and equipment
CN113364744A (en) * 2021-05-19 2021-09-07 北京中睿天下信息技术有限公司 Method and system for detecting domain user login authentication abnormity based on windows log
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN115051824A (en) * 2022-03-30 2022-09-13 杭州默安科技有限公司 Vertical override detection method, system, equipment and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274461A (en) * 2020-01-14 2020-06-12 深信服科技股份有限公司 Data auditing method, data auditing device and storage medium
CN112084512A (en) * 2020-08-27 2020-12-15 山东英信计算机技术有限公司 Access control method, device, equipment and computer readable storage medium
CN112613029A (en) * 2021-01-06 2021-04-06 深信服科技股份有限公司 Weak password detection method and device, computer storage medium and equipment
CN113364744A (en) * 2021-05-19 2021-09-07 北京中睿天下信息技术有限公司 Method and system for detecting domain user login authentication abnormity based on windows log
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN113608907B (en) * 2021-07-21 2024-03-29 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN115051824A (en) * 2022-03-30 2022-09-13 杭州默安科技有限公司 Vertical override detection method, system, equipment and storage medium
CN115051824B (en) * 2022-03-30 2024-04-02 杭州默安科技有限公司 Vertical override detection method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109583199A (en) A kind of access auditing method, system, equipment and the medium of storage management system
US11159554B2 (en) Correlating threat information across sources of distributed computing systems
CN111416811B (en) Unauthorized vulnerability detection method, system, equipment and storage medium
US10620751B2 (en) Management of a touchscreen interface of a device
US10587612B2 (en) Automated detection of login sequence for web form-based authentication
US11361063B2 (en) Access control policy simulation and testing
US9177129B2 (en) Devices, systems, and methods for monitoring and asserting trust level using persistent trust log
US20180196875A1 (en) Determining repeat website users via browser uniqueness tracking
US10362046B1 (en) Runtime behavior of computing resources of a distributed environment
US20180315024A1 (en) Systems and Methods Enabling Secure Transactions from Terminal Window
CN111954998B (en) System and method for anonymizing user accounts
US11218469B2 (en) Systems and methods for controlling personal information on online services
CN104270391A (en) Method and device for processing access request
CN113761552A (en) Access control method, device, system, server and storage medium
US11201888B2 (en) Methods and systems for discovering network security gaps
US9405890B1 (en) Easy login on wearable device and wearable device applications
CN115828256B (en) Unauthorized and unauthorized logic vulnerability detection method
US10904011B2 (en) Configuration updates for access-restricted hosts
US10855777B2 (en) Declarative security management plugins
US20230224146A1 (en) Quorum-based authorization
US11321481B1 (en) Method for determining to grant or deny a permission request based on empirical data aggregation
US10193880B1 (en) Systems and methods for registering user accounts with multi-factor authentication schemes used by online services
US10708282B2 (en) Unauthorized data access detection based on cyber security images
CN111800286A (en) Detection method and device of intranet assets and electronic equipment
US9848000B2 (en) Resource access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190405