CN109583199A - A kind of access auditing method, system, equipment and the medium of storage management system - Google Patents
A kind of access auditing method, system, equipment and the medium of storage management system Download PDFInfo
- Publication number
- CN109583199A CN109583199A CN201811549666.7A CN201811549666A CN109583199A CN 109583199 A CN109583199 A CN 109583199A CN 201811549666 A CN201811549666 A CN 201811549666A CN 109583199 A CN109583199 A CN 109583199A
- Authority
- CN
- China
- Prior art keywords
- logging request
- access
- management system
- storage management
- auditing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000003860 storage Methods 0.000 title claims abstract description 65
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000007726 management method Methods 0.000 claims abstract description 50
- 238000012550 audit Methods 0.000 claims abstract description 42
- 238000004458 analytical method Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 4
- 238000012502 risk assessment Methods 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Abstract
This application discloses access auditing method, device and a kind of electronic equipment and computer readable storage medium of a kind of storage management system, this method comprises: determining the corresponding access credentials of the logging request after getting logging request;Judge whether the access credentials are correct, and determine whether to respond the logging request according to judging result, obtains login result;The corresponding solicited message of the logging request and the login result are recorded into audit log, to analyse whether dangerous operation using the audit log.The application passes through the record corresponding solicited message of user's logging request and corresponding login result, it will login successfully, the information of login failure is recorded into audit log, to judge whether storage management system is attempted attack, and attack source can be determined according to log-on message, it realizes risk analysis when system failure or loss of data, improves the safety of storage management system.
Description
Technical field
This application involves storage management system technical field of data security, more specifically to a kind of storage management system
Access auditing method, device and a kind of electronic equipment of system and a kind of computer readable storage medium.
Background technique
With the fast development of internet, data volume sharply increases, more and more large enterprises, government organs, silver
Row, even small business, educational institution are all using storage management system.For storage management system, due to system
The permission of administrator is big, and the irregularity operation of system manager may bring the data safety of storage management system very big
Risk.
In traditional storage management system, the operation of administrator can not be recorded, in loss of data or system failure
In the case where, reason cannot be analyzed by operation note, be also not easy to client and called to account.
Therefore, how to solve the above problems is that those skilled in the art need to pay close attention to.
Summary of the invention
A kind of access auditing method, device and a kind of electronic equipment for being designed to provide storage management system of the application
With a kind of computer readable storage medium, can be improved the safety of storage management system, and for storage management system damage or
Risk retrospect provides basis when loss of data.
To achieve the above object, this application provides a kind of access auditing methods of storage management system, comprising:
After getting logging request, the corresponding access credentials of the logging request are determined;
Judge whether the access credentials are correct, and determines whether to carry out the logging request according to judging result
Response, obtains login result;
The corresponding solicited message of the logging request and the login result are recorded into audit log, described in utilizing
Audit log analyses whether dangerous operation.
Optionally, the solicited message includes request ID, request time, request user and IP address requesting.
It is optionally, described to be determined whether after being responded to the logging request according to judging result, further includes:
After allowing to respond the logging request, session voucher is issued for the promoter of the logging request, with
The promoter is set to execute the operation after logging in using the session voucher.
Optionally, the session voucher is session key.
Optionally, further includes:
After getting operation requests after login, the session voucher in the operation requests is determined;
The corresponding user information of the session voucher is inquired using the session voucher, and is judged according to the user information
Whether active user side, which has permission, executes operation;
The information of the corresponding operating result of the operation requests and the operation requests is recorded into the audit log.
It is optionally, described to be inquired after the corresponding user information of the session voucher using the session voucher, further includes:
The user information is recorded into the audit log.
Optionally, after the session voucher in the determination operation requests, further includes:
Judge whether the session voucher is effective;
If it is not, then forbidding responding the operation requests, and record the corresponding information of presently described operation requests;
If it is, the starting step for inquiring the corresponding user information of the session voucher using the session voucher
Suddenly.
To achieve the above object, this application provides a kind of access audit devices of storage management system, comprising:
Voucher determining module, for after getting logging request, determining the corresponding access credentials of the logging request;
In response to determining that whether module, correct for judging the access credentials, and determined whether according to judging result
The logging request is responded, login result is obtained;
Information logging modle, for recording the corresponding solicited message of the logging request and the login result to audit
In log, to analyse whether dangerous operation using the audit log.
To achieve the above object, this application provides a kind of electronic equipment, comprising:
Memory, for storing computer program;
Processor realizes the access of aforementioned disclosed any storage management system when for executing the computer program
The step of auditing method.
To achieve the above object, this application provides a kind of computer readable storage medium, the computer-readable storages
Computer program is stored on medium, the computer program realizes aforementioned disclosed any storage tube when being executed by processor
The step of access auditing method of reason system.
By above scheme it is found that a kind of access auditing method of storage management system provided by the present application, comprising: when obtaining
After getting logging request, the corresponding access credentials of the logging request are determined;Judge whether the access credentials are correct, and according to
Judging result determines whether to respond the logging request, obtains login result;The logging request is corresponding
Solicited message and the login result are recorded into audit log, to analyse whether dangerous behaviour using the audit log
Make.The application will login successfully by the record corresponding solicited message of user's logging request and corresponding login result, log in mistake
The information lost is recorded into audit log, to judge whether storage management system is attempted attack, and can be according to login
Information determines attack source, realizes risk analysis when system failure or loss of data, improves the safety of storage management system
Property.Disclosed herein as well is the access audit device and a kind of electronic equipment and one kind of a kind of storage management system are computer-readable
Storage medium is equally able to achieve above-mentioned technical effect.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
Application.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the access auditing method of storage management system disclosed in the embodiment of the present application;
Fig. 2 is the flow chart of the access auditing method of another kind storage management system disclosed in the embodiment of the present application;
Fig. 3 is the flow chart of the access auditing method of another kind storage management system disclosed in the embodiment of the present application;
Fig. 4 is the flow chart of the access auditing method of another storage management system disclosed in the embodiment of the present application;
Fig. 5 is a kind of structure chart of the access audit device of storage management system disclosed in the embodiment of the present application;
Fig. 6 is the structure chart of a kind of electronic equipment disclosed in the embodiment of the present application;
Fig. 7 is the structure chart of another kind electronic equipment disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
In traditional storage management system, the operation of administrator can not be recorded, in loss of data or system failure
In the case where, reason cannot be analyzed by operation note, be also not easy to client and called to account.
The embodiment of the present application discloses a kind of access auditing method of storage management system, improves storage management system
Safety, and realize risk analysis when system failure or loss of data.
Referring to Fig. 1, a kind of flow chart of the access auditing method of storage management system, such as schemes disclosed in the embodiment of the present application
Shown in 1, comprising:
S101: after getting logging request, the corresponding access credentials of the logging request are determined;
In the present embodiment, after getting Client-initiated logging request, determine current logging request it is corresponding access with
Card, such as the verification informations such as login password.
S102: judge whether the access credentials are correct, and determine whether to ask the login according to judging result
It asks and is responded, obtain login result;
Judge whether the access credentials of active user are correct.If correct, allow to respond logging request, i.e., currently
User logins successfully;If mistake, forbid responding logging request, i.e. active user's login failure.
S103: the corresponding solicited message of the logging request and the login result are recorded into audit log, with benefit
Dangerous operation is analysed whether with the audit log.
Further, after above-mentioned register, the details of logging request and corresponding login result are remembered
It records to audit log.No matter log in whether to succeed as a result, and be described, after loss of data or storage management system damage, leads to
Retrospect log-on message is crossed, can analyze and whether be attempted attack.In addition, when system operates normally, it can also be by fixed
When check audit log, to check for risky operation.
Specifically, the corresponding solicited message of the logging request may include request ID, request time, request user and ask
Seek IP address.In addition to this it is possible to include the details such as login mode, user name, so as to true according to solicited message
Determine attack source.
By above scheme it is found that a kind of access auditing method of storage management system provided by the present application, comprising: when obtaining
After getting logging request, the corresponding access credentials of the logging request are determined;Judge whether the access credentials are correct, and according to
Judging result determines whether to respond the logging request, obtains login result;The logging request is corresponding
Solicited message and the login result are recorded into audit log, to analyse whether dangerous behaviour using the audit log
Make.The application will login successfully by the record corresponding solicited message of user's logging request and corresponding login result, log in mistake
The information lost is recorded into audit log, to judge whether storage management system is attempted attack, and can be according to login
Information determines attack source, realizes risk analysis when system failure or loss of data, improves the safety of storage management system
Property.
The embodiment of the present application discloses a kind of access auditing method of storage management system, relative to a upper embodiment, originally
Embodiment has made further instruction and optimization to technical solution.It is specific:
Referring to fig. 2, the flow chart of the access auditing method of another storage management system provided by the embodiments of the present application, such as
Shown in Fig. 2, comprising:
S201: after getting logging request, the corresponding access credentials of the logging request are determined;
S202: judge whether the access credentials are correct, and determine whether to ask the login according to judging result
It asks and is responded, obtain login result;
S203: after allowing to respond the logging request, for the logging request promoter issue session with
Card, so that the promoter executes the operation after logging in using the session voucher;
In the present embodiment, when access credentials are verified, after allowing to respond logging request, user is logined successfully,
The user currently to login successfully issues session voucher at this time, and subsequent user can issue operation requests with dialogue-based voucher.Tool
Body, the session voucher can be session key or token, it is not limited here.
S204: the corresponding solicited message of the logging request and the login result are recorded into audit log, with benefit
Dangerous operation is analysed whether with the audit log.
On the basis of the above embodiments, the embodiment of the present application discloses the access auditing party of another storage management system
Method, shown in Figure 3, method includes:
S301: after getting operation requests after login, the session voucher in the operation requests is determined;
In the present embodiment, after the operation requests initiated after getting user and successfully logging in, determines in operation requests and include
Session voucher.
S302: the corresponding user information of the session voucher is inquired using the session voucher, and is believed according to the user
Breath judges whether active user side has permission and executes operation;
Specifically, the corresponding user name of current initiation user, IP address, user login side are inquired by session voucher
The user informations such as formula, user role, to judge whether active user has permission execution corresponding operation according to user information.
S303: the information of the corresponding operating result of the operation requests and the operation requests was recorded to the audit day
In will.
It is understood that responding operation requests if active user has permission execution corresponding operation, operation knot is obtained
Fruit;If active user does not have permission to execute corresponding operation, forbid responding operation requests.Whether will further operate successfully,
The information update of corresponding operating result and operation requests is recorded into audit log, and follow-up audit personnel can be careful by checking
It counts log and carries out risk investigation and detection.
The embodiment of the present application discloses a kind of access auditing method of storage management system, relative to a upper embodiment, originally
Embodiment has made further instruction and optimization to technical solution.It is specific:
Referring to fig. 4, the flow chart of the access auditing method of another storage management system provided by the embodiments of the present application, such as
Shown in Fig. 4, comprising:
S401: after getting operation requests after login, the session voucher in the operation requests is determined;
S402: judge whether the session voucher is effective;
S403: if it is not, then forbidding responding the operation requests, and the corresponding information of presently described operation requests is recorded;
S404: if it is, inquiring the corresponding user information of the session voucher using the session voucher, and according to institute
It states user information and judges whether active user side has permission and execute operation;
In the present embodiment, before inquiring corresponding user information using session voucher, whether session voucher is first determined whether
Effectively.If current sessions voucher is invalid, forbid responding operation requests, or directly ignore this operation requests, and record and work as
The information of preceding operation requests.If current sessions voucher is effective, corresponding user information further can be inquired according to session voucher, from
And it judges whether there is permission and executes operation.
S405: the information of the user information, the corresponding operating result of the operation requests and the operation requests is remembered
Record is into the audit log.
Further, by the user information obtained according to session voucher, the corresponding operating result of current operation and operation
The essential information of request is recorded into audit log.Specifically, the essential information of operation requests may include request ID, operation ginseng
Number etc., user information may include the information such as user name, role.
A kind of access audit device of storage management system provided by the embodiments of the present application is introduced below, is hereafter retouched
The access audit device and a kind of above-described access auditing method of storage management system for a kind of storage management system stated
It can be cross-referenced.
Referring to Fig. 5, a kind of structure chart of the access audit device of storage management system provided by the embodiments of the present application is such as schemed
Shown in 5, comprising:
Voucher determining module 100, for after getting logging request, determine the logging request it is corresponding access with
Card;
In response to determining that whether module 200, correct for judging the access credentials, and determine whether to permit according to judging result
Perhaps the logging request is responded, obtains login result;
Information logging modle 300, for by the corresponding solicited message of the logging request and the login result record to
In audit log, to analyse whether dangerous operation using the audit log.
Present invention also provides a kind of electronic equipment, referring to Fig. 6, the knot of a kind of electronic equipment provided by the embodiments of the present application
Composition, as shown in Figure 6, comprising:
Memory 11, for storing computer program;
Step provided by above-described embodiment may be implemented in processor 12 when for executing the computer program.
Specifically, memory 11 includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with
Operating system and computer-readable instruction, the built-in storage are the operating system and computer-readable in non-volatile memory medium
The operation of instruction provides environment.Processor 12 can be a central processing unit (Central in some embodiments
Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, mentioned for electronic equipment
Aforementioned any embodiment may be implemented when executing the computer program saved in the memory 11 for calculating and control ability
The step of access auditing method of disclosed storage management system.
On the basis of the above embodiments, preferably, referring to Fig. 7, the electronic equipment further include:
Input interface 13 is connected with processor 12, for obtaining computer program, parameter and the instruction of external importing, warp
The control of processor 12 is saved into memory 11.The input interface 13 can be connected with input unit, receive user and be manually entered
Parameter or instruction.The input unit can be the touch layer covered on display screen, be also possible to be arranged in terminal enclosure by
Key, trace ball or Trackpad are also possible to keyboard, Trackpad or mouse etc..
Display unit 14 is connected with processor 12, for the data of the processing of video-stream processor 12 and for showing visually
The user interface of change.The display unit 14 can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display and OLED
(Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..
The network port 15 is connected with processor 12, for being communicatively coupled with external each terminal device.The communication connection
The used communication technology can be cable communicating technology or wireless communication technique, such as mobile high definition chained technology (MHL), general
Universal serial bus (USB), high-definition media interface (HDMI), adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption bluetooth
The communication technology, communication technology based on IEEE802.11s etc..
Fig. 7 illustrates only the electronic equipment with component 11-15, it will be appreciated by persons skilled in the art that Fig. 7 is shown
Structure do not constitute the restriction to electronic equipment, may include more certain than illustrating less perhaps more components or combination
Component or different component layouts.
Present invention also provides a kind of computer readable storage medium, the storage medium may include: USB flash disk, mobile hard disk,
Read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic
The various media that can store program code such as dish or CD.Computer program, the calculating are stored on the storage medium
Machine program realizes the step of access auditing method of storage management system disclosed in aforementioned any embodiment when being executed by processor.
The application passes through the record corresponding solicited message of user's logging request and corresponding login result, will login successfully,
The information of login failure is recorded into audit log, to judge whether storage management system is attempted attack, and can root
Attack source is determined according to log-on message, is realized risk analysis when system failure or loss of data, is improved storage management system
Safety.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration
?.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, also
Can to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application
It is interior.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (10)
1. a kind of access auditing method of storage management system characterized by comprising
After getting logging request, the corresponding access credentials of the logging request are determined;
Judge whether the access credentials are correct, and determines whether to ring the logging request according to judging result
It answers, obtains login result;
The corresponding solicited message of the logging request and the login result are recorded into audit log, to utilize the audit
Log analysis whether there is risky operation.
2. access auditing method according to claim 1, which is characterized in that the solicited message includes request ID, request
Time, request user and IP address requesting.
3. access auditing method according to claim 1, which is characterized in that described to be determined whether according to judging result
After being responded to the logging request, further includes:
After allowing to respond the logging request, session voucher is issued for the promoter of the logging request, so that institute
It states promoter and executes the operation after logging in using the session voucher.
4. access auditing method according to claim 3, which is characterized in that the session voucher is session key.
5. access auditing method according to claim 3 or 4, which is characterized in that further include:
After getting operation requests after login, the session voucher in the operation requests is determined;
The corresponding user information of the session voucher is inquired using the session voucher, and is judged currently according to the user information
Whether user side, which has permission, executes operation;
The information of the corresponding operating result of the operation requests and the operation requests is recorded into the audit log.
6. access auditing method according to claim 5, which is characterized in that described using described in session voucher inquiry
After the corresponding user information of session voucher, further includes:
The user information is recorded into the audit log.
7. access auditing method according to claim 5, which is characterized in that described in the determination operation requests
After session voucher, further includes:
Judge whether the session voucher is effective;
If it is not, then forbidding responding the operation requests, and record the corresponding information of presently described operation requests;
If it is, the step of starting the user information corresponding using the session voucher inquiry session voucher.
8. a kind of access audit device of storage management system characterized by comprising
Voucher determining module, for after getting logging request, determining the corresponding access credentials of the logging request;
In response to determining that module, for judging whether the access credentials are correct, and determines whether according to judging result to institute
It states logging request to be responded, obtains login result;
Information logging modle, for recording the corresponding solicited message of the logging request and the login result to audit log
In, to analyse whether dangerous operation using the audit log.
9. a kind of electronic equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the storage management system as described in any one of claim 1 to 7 when for executing the computer program
The step of accessing auditing method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the visit of the storage management system as described in any one of claim 1 to 7 when the computer program is executed by processor
The step of asking auditing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811549666.7A CN109583199A (en) | 2018-12-18 | 2018-12-18 | A kind of access auditing method, system, equipment and the medium of storage management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811549666.7A CN109583199A (en) | 2018-12-18 | 2018-12-18 | A kind of access auditing method, system, equipment and the medium of storage management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109583199A true CN109583199A (en) | 2019-04-05 |
Family
ID=65930820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811549666.7A Withdrawn CN109583199A (en) | 2018-12-18 | 2018-12-18 | A kind of access auditing method, system, equipment and the medium of storage management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109583199A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274461A (en) * | 2020-01-14 | 2020-06-12 | 深信服科技股份有限公司 | Data auditing method, data auditing device and storage medium |
CN112084512A (en) * | 2020-08-27 | 2020-12-15 | 山东英信计算机技术有限公司 | Access control method, device, equipment and computer readable storage medium |
CN112613029A (en) * | 2021-01-06 | 2021-04-06 | 深信服科技股份有限公司 | Weak password detection method and device, computer storage medium and equipment |
CN113364744A (en) * | 2021-05-19 | 2021-09-07 | 北京中睿天下信息技术有限公司 | Method and system for detecting domain user login authentication abnormity based on windows log |
CN113608907A (en) * | 2021-07-21 | 2021-11-05 | 阿里巴巴(中国)有限公司 | Database auditing method, device, equipment, system and storage medium |
CN115051824A (en) * | 2022-03-30 | 2022-09-13 | 杭州默安科技有限公司 | Vertical override detection method, system, equipment and storage medium |
-
2018
- 2018-12-18 CN CN201811549666.7A patent/CN109583199A/en not_active Withdrawn
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274461A (en) * | 2020-01-14 | 2020-06-12 | 深信服科技股份有限公司 | Data auditing method, data auditing device and storage medium |
CN112084512A (en) * | 2020-08-27 | 2020-12-15 | 山东英信计算机技术有限公司 | Access control method, device, equipment and computer readable storage medium |
CN112613029A (en) * | 2021-01-06 | 2021-04-06 | 深信服科技股份有限公司 | Weak password detection method and device, computer storage medium and equipment |
CN113364744A (en) * | 2021-05-19 | 2021-09-07 | 北京中睿天下信息技术有限公司 | Method and system for detecting domain user login authentication abnormity based on windows log |
CN113608907A (en) * | 2021-07-21 | 2021-11-05 | 阿里巴巴(中国)有限公司 | Database auditing method, device, equipment, system and storage medium |
CN113608907B (en) * | 2021-07-21 | 2024-03-29 | 阿里巴巴(中国)有限公司 | Database auditing method, device, equipment, system and storage medium |
CN115051824A (en) * | 2022-03-30 | 2022-09-13 | 杭州默安科技有限公司 | Vertical override detection method, system, equipment and storage medium |
CN115051824B (en) * | 2022-03-30 | 2024-04-02 | 杭州默安科技有限公司 | Vertical override detection method, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109583199A (en) | A kind of access auditing method, system, equipment and the medium of storage management system | |
US11159554B2 (en) | Correlating threat information across sources of distributed computing systems | |
CN111416811B (en) | Unauthorized vulnerability detection method, system, equipment and storage medium | |
US10620751B2 (en) | Management of a touchscreen interface of a device | |
US10587612B2 (en) | Automated detection of login sequence for web form-based authentication | |
US11361063B2 (en) | Access control policy simulation and testing | |
US9177129B2 (en) | Devices, systems, and methods for monitoring and asserting trust level using persistent trust log | |
US20180196875A1 (en) | Determining repeat website users via browser uniqueness tracking | |
US10362046B1 (en) | Runtime behavior of computing resources of a distributed environment | |
US20180315024A1 (en) | Systems and Methods Enabling Secure Transactions from Terminal Window | |
CN111954998B (en) | System and method for anonymizing user accounts | |
US11218469B2 (en) | Systems and methods for controlling personal information on online services | |
CN104270391A (en) | Method and device for processing access request | |
CN113761552A (en) | Access control method, device, system, server and storage medium | |
US11201888B2 (en) | Methods and systems for discovering network security gaps | |
US9405890B1 (en) | Easy login on wearable device and wearable device applications | |
CN115828256B (en) | Unauthorized and unauthorized logic vulnerability detection method | |
US10904011B2 (en) | Configuration updates for access-restricted hosts | |
US10855777B2 (en) | Declarative security management plugins | |
US20230224146A1 (en) | Quorum-based authorization | |
US11321481B1 (en) | Method for determining to grant or deny a permission request based on empirical data aggregation | |
US10193880B1 (en) | Systems and methods for registering user accounts with multi-factor authentication schemes used by online services | |
US10708282B2 (en) | Unauthorized data access detection based on cyber security images | |
CN111800286A (en) | Detection method and device of intranet assets and electronic equipment | |
US9848000B2 (en) | Resource access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190405 |