CN111651756A - Automatic substitution and filling method applied to operation and maintenance audit navicat - Google Patents

Automatic substitution and filling method applied to operation and maintenance audit navicat Download PDF

Info

Publication number
CN111651756A
CN111651756A CN202010500851.8A CN202010500851A CN111651756A CN 111651756 A CN111651756 A CN 111651756A CN 202010500851 A CN202010500851 A CN 202010500851A CN 111651756 A CN111651756 A CN 111651756A
Authority
CN
China
Prior art keywords
maintenance
navicat
substitution
target asset
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010500851.8A
Other languages
Chinese (zh)
Other versions
CN111651756B (en
Inventor
王继洪
范渊
吴永越
郑学新
刘韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN202010500851.8A priority Critical patent/CN111651756B/en
Publication of CN111651756A publication Critical patent/CN111651756A/en
Application granted granted Critical
Publication of CN111651756B publication Critical patent/CN111651756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses an automatic substitution and filling method applied to operation and maintenance audit navicat, which comprises the following steps: 1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance; 2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext; 3) the operation and maintenance URI starts a substitution and filling tool and transmits the related information ciphertext of the target asset to the substitution and filling tool; 4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and starts a Navicat client; 5) the Navicat client directly pulls the related information ciphertext of the target asset from the Windows registry, restores the real password, and the operation and maintenance auditing system is accessed to the target asset needing operation and maintenance to form a passage with the Navicat client. The method and the device can effectively solve the problem of account information leakage caused by contact of an operation and maintenance person with an asset password in a Windows operation and maintenance environment, reduce operation and maintenance steps of the operation and maintenance person and improve working efficiency.

Description

Automatic substitution and filling method applied to operation and maintenance audit navicat
Technical Field
The invention relates to the technical field of technical network information, in particular to an automatic substitution and filling method applied to operation and maintenance audit navicat.
Background
The operation and maintenance auditing system is a new generation of operation and maintenance safety auditing product, can carry out fine-grained authorization, operation record and control of the whole process, omnibearing operation auditing and support the function of replaying the operation process afterwards on the access process of operation and maintenance personnel, realizes 'precaution, control in the process and audit afterwards' in the operation and maintenance process, simplifies operation and maintenance operation, comprehensively solves the operation and maintenance safety problems in various complex environments and improves the IT operation and maintenance management level of enterprises. The Navicat is a set of database management tools which are rapid, reliable and quite cheap, and is specially designed for simplifying the management of the database and reducing the management cost of the system. Navicat is built with an intuitive graphical user interface that allows you to create, organize, access, and share information in a secure and simple manner. The traditional Navicat operation and maintenance model mainly adopts the manual configuration of the target asset address and the operation and maintenance auditing system address. The mode of carrying out operation and maintenance through the manual configuration of an operation and maintenance person has numerous drawbacks, for example, the asset password has a leakage risk, and the operation and maintenance person logs in the target asset and has obtained the asset password, so it is difficult to ensure the security and reliability of the operated and maintained asset password, and in addition, the traditional operation and maintenance cost is large: when the operation and maintenance personnel need to perform operation and maintenance, account password configuration needs to be performed on the target asset account and the operation and maintenance auditing system account respectively, and the configuration cost is high and the operation is complicated.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide the automatic replacement filling method applied to the operation and maintenance audit navicat, which can effectively solve the problem of account information leakage caused by the fact that an operation and maintenance person contacts an asset password in a Windows operation and maintenance environment, reduce the operation and maintenance steps of the operation and maintenance person and improve the working efficiency.
In order to achieve the purpose, the invention is realized by the following technical scheme: an automatic substitution and filling method applied to operation and maintenance audit navicat comprises the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
In order to better implement the method of the present invention, further, in step (1), when a replacement filling tool is deployed in advance, firstly, the resolving capability of the operation and maintenance uri in the operation and maintenance auditing system needs to be registered in the windows system registry of the current user.
In order to better implement the method of the present invention, further, in step (1), the pre-deployed agent can actively discover the Navicat client deployed on the default path, and if the agent cannot be actively discovered during the deployment process, a popup prompt is generated to require the user to actively specify the position of the Navicat client.
In order to better implement the method of the present invention, further, in step (1), the pre-deployed fill-in tool needs to grant the right to access the registry of the windows system.
In order to better implement the method of the present invention, further, the target asset information ciphertext in the operation and maintenance URI in step (2) is formed by a binary stream encoded by Base64, wherein the target asset information ciphertext contains an account password ciphertext of the target asset.
In order to better implement the method of the present invention, further, the target asset information ciphertext is calculated by using the same encryption algorithm as that of the Navicat client.
In order to better implement the method of the present invention, in the step (4), the filling tool includes a Base64 decoding module and a character extracting module, the Base64 decoding module can decode the binary stream encoded by the Base64 in the operation and maintenance URI, convert it into characters, and then the characters are scanned and extracted by the character extracting module, where the extracted data includes the type of the database and the parameter values of the database.
In order to better implement the method of the present invention, further, the extracted database type includes at least one of Mysql, Oracle, SQL Server, and Postgresql.
In order to better implement the method of the present invention, further, in step (4), the extracted related information is configured in the windows registry, and a specific process of forming the session content is as follows: and writing the substitute filling tool into the corresponding position of each type of database in the windows registry according to the extracted database type and the parameter value of the database according to the session configuration format of the Navicat client, thereby forming the session content configured by the substitute filling tool.
In order to better implement the method of the present invention, further, in the step (5), the session configuration parameters at the corresponding positions in the Windows registry are prepared and generated by a substitution tool in advance, the assets to be operated and maintained at this time can be directly pulled, the passwords are stored in the registry in a form of ciphertext, and as the password ciphertext sent by the operation and maintenance auditing system is encrypted by using the encryption mode of Navicat, the Navicat can restore the real passwords of the assets through the encryption and decryption module of the client.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the invention adopts an automatic replacement filling mode, can well solve the complicated process that the user needs to manually carry out operation and maintenance access, and avoids the possible leakage risk caused by the direct perception of asset passwords by an operation and maintenance operator;
(2) the invention carries out the same encryption processing aiming at Navicat through the same password, and carries out the substitution filling operation on the substitution filling tool by taking the password as a starting parameter through the URI protocol in a ciphertext mode when the password goes out of the operation and maintenance management system, thereby avoiding the leakage problem caused by stealing the password in the transmission process;
(3) compared with the traditional method for automatically filling the secret key, the method can directly select the target asset needing operation and maintenance only by obtaining authorization, the Navicat client is accessed into the operation and maintenance auditing system to operate and maintain the target asset, an operation and maintenance person cannot sense the operation and maintenance auditing system in the whole encryption process, the safety performance is high, the operation and maintenance access operation steps of the operation and maintenance person are obviously reduced, the operation and maintenance efficiency is greatly improved, and the method is suitable for wide popularization and application.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The present invention will be described in further detail with reference to the following examples for the purpose of making clear the objects, process conditions and advantages of the present invention, but the embodiments of the present invention are not limited thereto, and various substitutions and modifications can be made according to the common technical knowledge and the conventional means in the art without departing from the technical idea of the present invention described above, and the specific examples described herein are only for explaining the present invention and are not intended to limit the present invention.
Some module names and definitions are as follows:
automatic replacement filling: method for automatically writing parameters into input box appointed in advance by setting parameters
Navicat client: a set of fast, reliable and cheap database management tools is provided for simplifying the management of database and reducing the management cost of system. Navicat is built with an intuitive graphical user interface that allows you to create, organize, access, and share information in a secure and simple manner.
Operation and maintenance auditing system: the new generation of operation and maintenance safety audit product can carry out fine-grained authorization, operation recording and control in the whole process, omnibearing operation audit and support the function of replaying the operation process afterwards on the access process of operation and maintenance personnel, realizes 'precaution, control in the process and audit afterwards' in the operation and maintenance process, comprehensively solves the operation and maintenance safety problems in various complex environments while simplifying operation and maintenance operation, and improves the IT operation and maintenance management level of enterprises.
Example 1:
as shown in fig. 1, the main workflow of this embodiment includes the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
The specific process for the operation and maintenance of the user is as follows:
and (4) logging in the operation and maintenance auditing system in the browser by an operation and maintenance worker, selecting the assets needing to be operated and maintained, and clicking the operation and maintenance.
The operation and maintenance clicking operation is captured by an operation and maintenance auditing system, and an operation and maintenance URI (Uniform Resource identifier) is generated aiming at the currently selected asset; the operation and maintenance URI comprises a starting parameter serialized in a Base64 format, and the parameter comprises an account password ciphertext of the target asset; the cipher text of the asset is calculated by adopting the same encryption algorithm as that of the Navicat client, so that the Navicat client can read the cipher text conveniently and directly; the replacement filling tool which is deployed in advance locally can be started through the URI Protocol operation and maintenance auditing system, and meanwhile, the operation and maintenance auditing system information and the ciphertext of the target asset information are transmitted to the replacement filling tool.
The fill-in tool parses the binary stream encoded by Base64 passed by the operation and maintenance auditing system. And analyzing the characters and then extracting the parameters again. Currently, parsing of multiple database parameter types is supported, including databases such as Mysql, Oracle, SQLServer, Postgresql, and the like. After the parameter analysis is finished, writing the parameter into the corresponding position of each type of database in the registry according to the Navicat session configuration format; the parameter analysis work is decoded by a Base64 decoding tool, after the binary stream is converted into characters by the decoding tool, the characters are scanned and extracted once again to confirm the database type and the parameter values thereof; when the replacement filling tool is written into the registry, if the same-name table entries exist, the replacement filling tool is firstly deleted and then the current operation and maintenance asset information is added again, so that the problem of failure of the current operation and maintenance authentication caused by old redundant information is solved; and after the completion of all the steps is detected, the replacement filling work of the operation and maintenance is completed. And the filling tool starts a Navicat client according to the path configured during deployment so as to enable an operation and maintenance worker to start operation and maintenance operation.
After the process of starting the Navicat through the filling tool is finished, the configured session content is pulled to the corresponding position in the Windows registry; the session configuration parameters at the corresponding positions in the Windows registry are prepared and generated by a substitution tool in advance, and the assets to be operated and maintained at this time can be directly pulled. The password is stored in the registry in a form of ciphertext, and as the password ciphertext sent by the operation and maintenance auditing system is encrypted in a Navicat encryption mode, the Navicat can restore the real password of the asset through an encryption and decryption module of the client. The operation and maintenance personnel cannot sense the whole encryption and decryption process; when the session configured by the filling tool is detected, the Navicat client displays the configured session content in the foreground, and the operation and maintenance staff can directly operate and maintain without any manual configuration.
The Navicat accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the assets to be operated and maintained to form a channel with the Navicat.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to these embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. An automatic substitution and filling method applied to operation and maintenance audit navicat is characterized by comprising the following steps:
(1) deploying a substitution tool in a windows system with an operation and maintenance operating system in advance;
(2) capturing a target asset to be operated and maintained through an operation and maintenance auditing system, and generating an operation and maintenance URI (Uniform resource identifier) containing a target asset information ciphertext;
(3) the operation and maintenance URI starts a pre-deployed substitution filling tool and transmits the related information ciphertext of the target asset to the substitution filling tool;
(4) the substitution and filling tool analyzes the received target asset related information ciphertext, extracts related information, configures the related information in a windows registry to form session content, and then starts a Navicat client by the substitution and filling tool;
(5) the Navicat client directly pulls the target asset related information ciphertext from the Windows registry and restores the target asset related information ciphertext into the real password of the target asset related information, then the Navicat client accesses the operation and maintenance auditing system through the session content configured by the filling tool, and the operation and maintenance auditing system accesses the target asset needing operation and maintenance and forms a passage with the Navicat client.
2. The automatic filling method applied to operation audit navicat according to claim 1, in the step (1), when a filling tool is deployed in advance, firstly, the resolving capability of an operation uri in the operation audit system needs to be registered in a windows system registry of a current user.
3. The automatic substitution and filling method applied to operation and maintenance audit Navicat according to claim 2, wherein in the step (1), a substitution and filling tool deployed in advance can actively discover a Navicat client deployed on a default path, and if the substitution and filling tool fails to actively discover in a deployment process, a popup prompt is generated to prompt a user to actively specify a position of the Navicat client.
4. The automatic substitution method applied to the operation and maintenance audit navicat according to the claim 3, characterized in that in the step (1), the substitution tool deployed in advance needs to grant the right to access the registry of the windows system.
5. The automatic substitution and filling method applied to the operation and maintenance audit navicat as claimed in claim 4, wherein the target asset information ciphertext in the operation and maintenance URI in the step (2) is formed by a binary stream encoded by Base64, and the account password ciphertext of the target asset is contained therein.
6. The automatic substitution and filling method applied to the operation and maintenance audit Navicat according to claim 5, wherein the target asset information ciphertext is calculated by using the same encryption algorithm as the Navicat client.
7. The automatic filling method applied to the operation and maintenance audit navicat in the step (4), wherein the filling tool includes a Base64 decoding module and a character extracting module, the Base64 decoding module can decode the binary stream encoded by the Base64 in the operation and maintenance URI, convert it into characters, and the characters are scanned and extracted by the character extracting module, and the extracted data includes the type of the database and the parameter values of the database.
8. The automatic substitution and filling method applied to operation and maintenance audit navicat according to claim 7, wherein the extracted database type includes at least one of Mysql, Oracle, SQL Server, and Postgresql.
9. The automatic substitution and filling method applied to operation and maintenance audit navicat according to claim 8, wherein in the step (4), the extracted relevant information is configured into a windows registry, and the specific process of forming the session content is as follows: and writing the substitute filling tool into the corresponding position of each type of database in the windows registry according to the extracted database type and the parameter value of the database according to the session configuration format of the Navicat client, thereby forming the session content configured by the substitute filling tool.
10. The automatic padding method for operation and maintenance audit Navicat according to claim 9, wherein in the step (5), the session configuration parameters at the corresponding location in the Windows registry are prepared and generated by a padding tool in advance, the asset to be operated and maintained at this time can be directly pulled, the password is stored in the registry in a form of a ciphertext, and the password ciphertext sent from the operation and maintenance audit system is encrypted by using the encryption method of Navicat, so that the Navicat can restore the real password of the asset through the encryption and decryption module of the client.
CN202010500851.8A 2020-06-04 2020-06-04 Automatic substitution and filling method applied to operation and maintenance audit navicat Active CN111651756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010500851.8A CN111651756B (en) 2020-06-04 2020-06-04 Automatic substitution and filling method applied to operation and maintenance audit navicat

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010500851.8A CN111651756B (en) 2020-06-04 2020-06-04 Automatic substitution and filling method applied to operation and maintenance audit navicat

Publications (2)

Publication Number Publication Date
CN111651756A true CN111651756A (en) 2020-09-11
CN111651756B CN111651756B (en) 2022-05-31

Family

ID=72347080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010500851.8A Active CN111651756B (en) 2020-06-04 2020-06-04 Automatic substitution and filling method applied to operation and maintenance audit navicat

Country Status (1)

Country Link
CN (1) CN111651756B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150168A (en) * 2022-06-30 2022-10-04 北京天融信网络安全技术有限公司 Filling replacing method and device and electronic equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110055593A1 (en) * 2009-08-25 2011-03-03 Lurey Craig B Method and apparatus for protecting account numbers and passwords
CN103413202A (en) * 2013-08-21 2013-11-27 成都安恒信息技术有限公司 Automatic authorization relation collection method applied to operation and maintenance auditing system
US20140040855A1 (en) * 2011-07-28 2014-02-06 National Instruments Corporation Optimization of a Data Flow Program Based on Access Pattern Information
CN103856345A (en) * 2012-12-06 2014-06-11 华为技术有限公司 Server account number and password management method and system and server
CN103973681A (en) * 2014-04-29 2014-08-06 上海上讯信息技术股份有限公司 Secondary-layer password on-behalf filling method and module for operation and maintenance management auditing system
CN105139139A (en) * 2015-08-31 2015-12-09 国家电网公司 Data processing method, device and system for operation and maintenance audit
CN106909826A (en) * 2017-02-23 2017-06-30 北京天融信网络安全技术有限公司 Password is for action and system
WO2017127850A1 (en) * 2016-01-24 2017-07-27 Hasan Syed Kamran Computer security based on artificial intelligence
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN109614169A (en) * 2018-12-29 2019-04-12 上海上讯信息技术股份有限公司 Window client application program automatic operation method based on pixel coordinate mode
CN110620814A (en) * 2019-09-10 2019-12-27 西安交大捷普网络科技有限公司 Control method and system for operation and maintenance login of Web browser
CN110704856A (en) * 2019-10-09 2020-01-17 成都安恒信息技术有限公司 Secret sharing method based on operation and maintenance auditing system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110055593A1 (en) * 2009-08-25 2011-03-03 Lurey Craig B Method and apparatus for protecting account numbers and passwords
US20140040855A1 (en) * 2011-07-28 2014-02-06 National Instruments Corporation Optimization of a Data Flow Program Based on Access Pattern Information
CN103856345A (en) * 2012-12-06 2014-06-11 华为技术有限公司 Server account number and password management method and system and server
CN103413202A (en) * 2013-08-21 2013-11-27 成都安恒信息技术有限公司 Automatic authorization relation collection method applied to operation and maintenance auditing system
CN103973681A (en) * 2014-04-29 2014-08-06 上海上讯信息技术股份有限公司 Secondary-layer password on-behalf filling method and module for operation and maintenance management auditing system
CN105139139A (en) * 2015-08-31 2015-12-09 国家电网公司 Data processing method, device and system for operation and maintenance audit
WO2017127850A1 (en) * 2016-01-24 2017-07-27 Hasan Syed Kamran Computer security based on artificial intelligence
CN106909826A (en) * 2017-02-23 2017-06-30 北京天融信网络安全技术有限公司 Password is for action and system
CN107122674A (en) * 2017-04-12 2017-09-01 成都安恒信息技术有限公司 A kind of access method of oracle database applied to O&M auditing system
CN109614169A (en) * 2018-12-29 2019-04-12 上海上讯信息技术股份有限公司 Window client application program automatic operation method based on pixel coordinate mode
CN110620814A (en) * 2019-09-10 2019-12-27 西安交大捷普网络科技有限公司 Control method and system for operation and maintenance login of Web browser
CN110704856A (en) * 2019-10-09 2020-01-17 成都安恒信息技术有限公司 Secret sharing method based on operation and maintenance auditing system

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
AHMET TALHA OZCAN: "BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications", 《FC2015:FINANCIAL CRYPTOGRAGHY AND DATA SECURITY》 *
CARLOS LUEVANOS: "Analysis on the Security and Use of Password Managers", 《2017 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT)》 *
姜婷: "基于应用虚拟化的运维审计系统的设计与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *
安盟电子信息安全有限责任公司: "安恒运维审计与风险控制系统启用安盟身份认证系统( 堡垒机 + 身份认证系统)", 《WWW.ANMENG.COM.CN/FILEDOWNLOAD/195879》 *
平林艳: "基于webservice的运维审计系统信息同步的应用", 《数字化应用》 *
张飞等: "集中授权式服务器运维审计系统设计与部署", 《中国报业》 *
海安市审计局: "巧用Navicat软件实施审计数据统一管理和大数据分析", 《HTTPS://SJJ.NANTONG.GOV.CN/NTSSJJ/YJZY/CONTENT.CBA398BC-BDFE-4A06-95F2-2AF0832F3F8E.HTML》 *
范柯等: "黄委政务外网统一用户与访问管理的技术实现", 《办公自动化》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150168A (en) * 2022-06-30 2022-10-04 北京天融信网络安全技术有限公司 Filling replacing method and device and electronic equipment
CN115150168B (en) * 2022-06-30 2023-12-01 北京天融信网络安全技术有限公司 Substitution filling method and electronic equipment

Also Published As

Publication number Publication date
CN111651756B (en) 2022-05-31

Similar Documents

Publication Publication Date Title
JP5344109B1 (en) Database encryption system, method and program
WO2013069770A1 (en) Database device, method and program
WO2009136258A1 (en) Method and apparatus for dump and log anonymization (dala)
CN110084599B (en) Key processing method, device, equipment and storage medium
DE112005002955T5 (en) Electrical transmission system in a secret environment between virtual disks and associated electrical transmission method
CN107483495B (en) Big data cluster host management method, management system and server
CN102325026A (en) Account password secure encryption system
US20130332728A1 (en) Electronic file access control system and method
CN114207615A (en) System and method for maintaining an immutable data access log with privacy
JP2007028015A (en) Program, system and method for time stamp verification, and time stamp generation request method
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN111651756B (en) Automatic substitution and filling method applied to operation and maintenance audit navicat
JP6391823B2 (en) RDP data collection apparatus and method
CN110598193B (en) Audit offline document management system
CN103259689B (en) A kind of method of equipment being carried out to password change and password recovery after breaking down
CN107370733A (en) A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
CN111988148A (en) Automatic login equipment and method based on biological authentication
CN110968881A (en) System authentication and data encryption method based on artificial intelligence
CN115347675A (en) Smart power grid data secure access method and system
CN111489462A (en) Personal Bluetooth key system
CN113315629B (en) Cloud storage and verification system for business passwords
CN109788249B (en) Video monitoring control method based on industrial internet operating system
CN113127841A (en) Method, device, equipment and storage medium for remotely managing software user
CN106453273A (en) Cloud technology based information security management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant