WO2019242112A1 - 审计字段信息获取方法、装置、计算机设备和存储介质 - Google Patents

审计字段信息获取方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2019242112A1
WO2019242112A1 PCT/CN2018/104606 CN2018104606W WO2019242112A1 WO 2019242112 A1 WO2019242112 A1 WO 2019242112A1 CN 2018104606 W CN2018104606 W CN 2018104606W WO 2019242112 A1 WO2019242112 A1 WO 2019242112A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
database
node
audit field
audit
Prior art date
Application number
PCT/CN2018/104606
Other languages
English (en)
French (fr)
Inventor
刘四根
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019242112A1 publication Critical patent/WO2019242112A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures

Definitions

  • the present application relates to a method, an apparatus, a computer device, and a storage medium for acquiring audit field information.
  • the audit field information can clearly observe the data source and read-write records in the database .
  • the database operator is operating the database, without uploading the audit field information, the source and operation of the data cannot be confirmed accurately, which may easily lead to the confusion of the management of the database and the low security of the database.
  • a method, an apparatus, a computer device, and a storage medium for acquiring audit field information are provided.
  • This behavior information is identified as audit field information.
  • An information detection module is used to detect whether there is corresponding audit field information in the written data when it is detected that data is written in the database;
  • An information retrieval module configured to retrieve source information associated with the written data in the database when the audit field information is not detected;
  • An information extraction module for extracting behavior information from the retrieved source information
  • An assignment module is used to identify the behavior information as audit field information.
  • a computer device includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more Processors implement the steps of the audit field information acquisition method provided in any one of the embodiments of the present application.
  • One or more non-transitory computer-readable storage media storing computer-readable instructions that, when executed by one or more processors, cause the one or more processors to implement any of the present application Steps of the method for acquiring audit field information provided in one embodiment.
  • FIG. 1 is an application scenario diagram of a method for acquiring audit field information according to one or more embodiments.
  • FIG. 2 is a schematic flowchart of a method for acquiring audit field information according to one or more embodiments.
  • FIG. 3 is a schematic flowchart of steps after identifying behavior information as audit field information according to one or more embodiments.
  • FIG. 4 is a schematic flowchart of a method for acquiring audit field information in another embodiment.
  • FIG. 5 is a block diagram of an audit field information acquiring apparatus according to one or more embodiments.
  • FIG. 6 is a block diagram of a computer device according to one or more embodiments.
  • the method for obtaining audit field information provided in this application can be applied to the application environment shown in FIG. 1.
  • the terminal 110 communicates with the database 130 through a network.
  • the server 120 communicates with the database 130 through a network or a cable.
  • the server 120 detects that data of the terminal 110 is written in the database 130, it detects whether the data written by the terminal 110 contains corresponding audit field information.
  • the server 120 does not detect the audit field information, it retrieves the source information associated with the written data in the database, extracts behavior information from the retrieved source information, and identifies the behavior information as audit field information.
  • the terminal 110 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
  • the server 120 may be implemented by an independent server or a server cluster composed of multiple servers.
  • the database 130 may be implemented by an independent database server or a database mounted on the server 120.
  • a method for obtaining audit field information is provided.
  • the method is applied to the server in FIG. 1 as an example, and includes the following steps:
  • a database is a warehouse that organizes, stores, and manages data according to the data structure.
  • the database in this embodiment may be specifically used to organize, store, and manage audit field information. It is detected that data is written in the database.
  • the database trigger (trigger) embedded in the database can be used by the server to monitor the data write in the database.
  • Database triggers are a way to provide database services to programmers and data analysts to ensure data integrity.
  • the audit field information is data recorded by a database audit (Database Audit).
  • Database audit is a compliance management that can record database activities on the network in real time, perform fine-grained audits of database operations, alert the database to risky behaviors, and block attacks. Detecting whether the written data contains the corresponding audit field information, specifically, the server can detect whether the written data contains the corresponding audit field information through a database trigger embedded in the database.
  • the database write trigger in the database detects that the database has written data, and triggers an audit field detection trigger.
  • the audit field detection trigger detects audit field information from the written data. If the audit field information is detected, the detected audit field information is sent to the server; if the audit field information is not detected, a prompt message is sent to the server.
  • the server when the server detects that the database has data export, the server monitors the data exported by the database through a database trigger, and assigns the detected database operator to the audit field information.
  • the audit field information that is not detected can be the prompt information sent by the server when receiving the audit field detection trigger.
  • the prompt information indicates that there is no audit field information in the data written to the database, or it is not retrieved when the server directly retrieves the database Audit field information into the data written to the database.
  • the source information is information associated with the written data.
  • the written data and the corresponding source information may be data written by the same database operator.
  • the source information may be other data written by the database operator, or the identity information of the database operator.
  • retrieve source information associated with the written data in the database Specifically, the server can retrieve other data corresponding to the data operation type in the database according to the type of data operation in the written data, and confirm the other data retrieved. For source information.
  • Behavior information is information used to describe the operation of the database by the database operator.
  • the behavior information is specifically the audit field information of the database operator in other operations. Other operations may specifically be operations performed by the database operator at different times.
  • the behavior information is extracted from the retrieved source information.
  • the server can detect the source information and extract the detected audit field information as behavior information.
  • the behavior information is identified as audit field information.
  • the server may classify the extracted behavior information and assign a value of the classified behavior information to the corresponding classified audit field information.
  • Assignment is the process of assigning a certain value to a variable.
  • a certain variable may specifically be audit field information.
  • the server assigns the extracted behavior information to the audit field information, it still detects that some of the fields in the audit field information are empty, and then marks the audit field information where the fields are empty.
  • the source information associated with the written data needs to be retrieved from the database. Because the database operator may perform multiple operations on the database, the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information uploaded by the database operator in other operations will be retrieved, the behavior information is extracted from the source information, and the behavior information is identified as the audit field Information, you can get the audit field information of this operation. In this way, the source and operation of the data can be accurately confirmed according to the obtained audit field information, thereby strengthening the organization of the database management, effectively tracing the data source of the database, and improving the security of the database.
  • the retrieving source information associated with the written data in the database includes: retrieving data adjacent to the written data in the database; Extract source information from the data.
  • the server can retrieve 50 lines of code adjacent to the written data, or it can retrieve 1kb (Kilobyte, thousand Bytes) of code.
  • the server searches from the 100 lines of code adjacent to the written data.
  • the database operation information corresponding to the audit field information is identified, and the identified database operation information is retrieved. Extracted as source information.
  • the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information may be uploaded in other operations.
  • retrieving source information associated with the written data in the database includes: retrieving operator-specific information in the written data; and determining corresponding database operation information according to the operator-specific information Extract source information from the database operation information.
  • the operator designation information is information specifying the operator who operates the database.
  • the operator can be a user account of the database, an administrator account of the database, or a database automation tool with the authority to operate the database.
  • Database operation information is specific information for operating the database.
  • the database operation information may be at least one of writing data, deleting data, copying data, exporting data, modifying data, the account number of the database operator, the associated system number of the database operation, the designated account number and operation time of the batch operation Species.
  • the server when the server detects that the database has exported data in batches, and the operator field in the audit field information is empty, the address information of the data export is identified, and the identified address information is assigned to the audit field information.
  • the operator specified information in the written data is retrieved, and the corresponding database operation information is determined according to the operator specified information.
  • the source information extracted from the database operation information can record the operation information of the operator, so that Obtain audit field information based on source information.
  • the method further includes: connecting with the corresponding operator according to the operator-specific information; sending an information acquisition instruction to the operator, the The information acquisition instruction is used to acquire audit field information; and receive audit field information fed back by the operator.
  • the server can obtain the operator's URL (Uniform Resoure Locator, uniform resource locator) according to the operator-specified information, and establish a TCP (Transmission Control Protocol (Transmission Control Protocol) connection.
  • the information acquisition instruction is specifically an instruction to acquire audit field information from an operator.
  • the server after retrieving the operator-specific information, obtains the URL of the operator according to the identity information of the operator in the operator-specific information, and establishes a TCP connection with the operator according to the URL of the operator, and sends the The operator sends an information acquisition instruction.
  • the server does not obtain the audit field information fed back by the operator within a preset time, it directly assigns the identity information of the operator to the audit field information, and marks the audit field information not obtained by the operator.
  • the information acquisition instruction can be directly sent to the operator, and the audit field information can be obtained from the operator.
  • the audit field information obtained from the operator can guarantee the actual operation of the operator. , Which can effectively trace the data source of the database, thereby improving the security of the database.
  • a database audit tree is stored in the database; after identifying the behavior information as audit field information in step S208, the method further includes: S302, writing the audit field information to The trunk node of the database audit tree; S304, when the audit field correction instruction is received, the trunk node specified by the audit field correction instruction is adjusted to a branch node; S306, after the trunk node connected to the adjusted trunk node Re-create the backbone node; the backbone node connected to the adjusted backbone node is arranged in the database audit tree before the adjusted backbone node; S308, according to the audit field correction instruction, modify the adjusted backbone node The audit field information of the node; S310, write the revised audit field information to the re-created backbone node.
  • the database audit tree is a tree-like data collection that records audit field information in the database.
  • the backbone node is a data node that records the audit field information that is confirmed to be valid on the database audit tree.
  • the branch node is a data node that records the audit field information that is confirmed to be invalid on the database audit tree. Specifically, when the server confirms that the audit field information on the backbone node is invalid, it adjusts the backbone node to a branch node.
  • the audit field correction instruction is an instruction to correct the audit field information and adjust the backbone node.
  • the server when the server receives the data reset instruction, the server determines a corresponding backbone node and a branch node according to the data reset instruction, resets the branch node to the main node, and resets the main node to the branch node. .
  • the audit field information is recorded through the database audit tree, and the relationship between the backbone node and the branch nodes can be clearly recorded through the tree structure of the database audit tree.
  • an error in the audit field information is detected, not only can the audit field information on the backbone node be modified for quick correction, but also the audit field information before correction can be written into the branch node to achieve the effect of data traceability, thereby improving Database security.
  • the method further includes: when receiving an instruction to retrieve source information associated with the written data, determining a backbone node corresponding to the written data; and determining The backbone node and the branch node are connected to retrieve the source information associated with the written data.
  • the server can determine the corresponding backbone node according to the corresponding writing time of the written data, or the server can retrieve the matching backbone node according to the key fields in the written data. .
  • the server after confirming the corresponding backbone node of the written data, the server first retrieves the source information from the backbone node connected to the confirmed backbone node. If the source information is not retrieved, retrieve source information from branch nodes connected to the backbone node.
  • the method further includes: when the backbone node is adjusted to a branch node, writing the node information of the backbone node and the node information of the branch node into the blockchain.
  • the blockchain can be a private chain built on the internal network.
  • the node information may specifically be at least one of creation time, modification time, access time, location information, size of occupied space, creator account number, modifier account number, and visitor account number of the backbone node and branch node.
  • the backbone node when the backbone node is adjusted to a branch node, by writing the node information of the backbone node and the node information of the branch node into the blockchain, the backbone node and the branch can be recorded according to the non-tamperable characteristics of the blockchain.
  • the adjustment of the nodes prevents the trunk nodes and branch nodes from being tampered with, so as to ensure that the audit field information in the trunk nodes is accurate, thereby improving the security of the database.
  • a method for acquiring audit field information is also provided.
  • the method specifically includes the following steps:
  • S416 Re-create the backbone node after the backbone node connected to the adjusted backbone node.
  • the order of the backbone nodes connected to the adjusted backbone node is arranged before the adjusted backbone node in the database audit tree.
  • S418 Correct the audit field information of the adjusted backbone node according to the audit field correction instruction.
  • the source information associated with the written data needs to be retrieved from the database. Because the database operator may perform multiple operations on the database, the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information uploaded by the database operator in other operations will be retrieved, the behavior information is extracted from the source information, and the behavior information is identified as the audit field Information, you can get the audit field information of this operation. In this way, the source and operation of the data can be accurately confirmed according to the obtained audit field information, thereby strengthening the organization of the database management, effectively tracing the data source of the database, and improving the security of the database.
  • steps in the flowcharts of FIGS. 2-4 are sequentially displayed in accordance with the directions of the arrows, these steps are not necessarily performed in the order indicated by the arrows. Unless explicitly stated in this document, the execution of these steps is not strictly limited, and these steps can be performed in other orders. Moreover, at least a part of the steps in Figure 2-4 may include multiple sub-steps or stages. These sub-steps or stages are not necessarily performed at the same time, but may be performed at different times. These sub-steps or stages The execution order of is not necessarily performed sequentially, but may be performed in turn or alternately with at least a part of another step or a sub-step or stage of another step.
  • an audit field information acquisition device 500 including: an information detection module 502, an information retrieval module 504, an information extraction module 506, and an assignment module 508, of which: the information detection module 502 is used to detect whether there is corresponding audit field information in the written data when it is detected that data is written in the database; the information retrieval module 504 is used to retrieve the audit field information when the audit field information is not detected Source information associated with the written data in the database; information extraction module 506 is used to extract behavior information from the retrieved source information; and assignment module 508 is used to identify the behavior information as audit field information.
  • the above-mentioned audit field information acquiring device 500 detects that data is written in the database, it detects whether the written data contains audit field information.
  • the source information associated with the written data needs to be retrieved from the database. Because the database operator may perform multiple operations on the database, the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information uploaded by the database operator in other operations will be retrieved, the behavior information is extracted from the source information, and the behavior information is identified as the audit field Information, you can get the audit field information of this operation. In this way, the source and operation of the data can be accurately confirmed according to the obtained audit field information, thereby strengthening the organization of the database management, effectively tracing the data source of the database, and improving the security of the database.
  • the information retrieval module 504 is further configured to retrieve data adjacent to the written data in the database; and the information extraction module 506 is further configured to retrieve data adjacent to the written data. Extract source information from the data.
  • the information retrieval module 504 is further configured to retrieve operator-specific information in the written data; the device further includes: an information determination module configured to determine a corresponding database according to the operator-specific information Operation information; the information extraction module 506 is further configured to extract source information from the database operation information.
  • the device further includes: a device connection module for connecting to the corresponding operator according to the information specified by the operator; and an instruction sending module for sending an information acquisition instruction to the operator, the information acquisition instruction Used to obtain audit field information; an information receiving module is used to receive audit field information fed back by the operator.
  • the database stores a database audit tree; the device further includes: an information writing module for writing audit field information to a main node of the database audit tree; a node adjustment module for receiving When the audit field correction instruction is reached, the trunk node specified by the audit field correction instruction is adjusted to a branch node; the node creation module is used to re-create the trunk node after the trunk node connected to the adjusted trunk node; The adjusted backbone node is connected to the backbone node in an order in the database audit tree before the adjusted backbone node; an information correction module is used to modify the audit field of the adjusted backbone node according to the audit field correction instruction Information; the information writing module is also used to write the revised audit field information to the re-created backbone node.
  • the apparatus further includes: a node determining module, configured to determine a backbone node corresponding to the written data when an instruction for retrieving source information associated with the written data is received; the information
  • the retrieval module 504 is further configured to retrieve source information associated with the written data from a backbone node and a branch node connected to the determined backbone node.
  • the information writing module is further configured to write the node information of the backbone node and the node information of the branch node into the blockchain when the backbone node is adjusted to a branch node.
  • Each module in the audit field information acquiring device may be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above-mentioned modules may be embedded in the hardware in or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 6.
  • the computer device includes a processor, a memory, a network interface, and a database connected through a system bus.
  • the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer-readable instructions, and a database.
  • This internal memory provides an environment for the operation of the operating system and computer-readable instructions in a non-volatile storage medium.
  • the computer equipment database is used to store audit field information.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection. When the computer-readable instructions are executed by a processor, a method for acquiring audit field information is implemented.
  • FIG. 6 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied.
  • the specific computer equipment may be Include more or fewer parts than shown in the figure, or combine certain parts, or have a different arrangement of parts.
  • a computer device includes a memory and one or more processors.
  • Computer-readable instructions are stored in the memory.
  • the one or more processors implement any one of the applications Steps of the method for acquiring audit field information provided in the embodiment.
  • the above computer equipment detects that data is written in the database, it detects whether the written data contains audit field information.
  • the source information associated with the written data needs to be retrieved from the database. Because the database operator may perform multiple operations on the database, the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information uploaded by the database operator in other operations will be retrieved, the behavior information is extracted from the source information, and the behavior information is identified as the audit field Information, you can get the audit field information of this operation. In this way, the source and operation of the data can be accurately confirmed according to the obtained audit field information, thereby strengthening the organization of the database management, effectively tracing the data source of the database, and improving the security of the database.
  • One or more non-transitory computer-readable storage media storing computer-readable instructions.
  • the one or more processors implement one of the embodiments of the present application. Provides the steps of the audit field information acquisition method.
  • the above non-volatile computer-readable storage medium detects that data is written in the database, it detects whether the written data contains audit field information.
  • the source information associated with the written data needs to be retrieved from the database. Because the database operator may perform multiple operations on the database, the audit field information is not uploaded in this operation, and the audit field information may be uploaded in other operations.
  • the audit field information uploaded by the database operator in other operations will be retrieved, the behavior information is extracted from the source information, and the behavior information is identified as the audit field Information, you can get the audit field information of this operation. In this way, the source and operation of the data can be accurately confirmed according to the obtained audit field information, thereby strengthening the organization of the database management, effectively tracing the data source of the database, and improving the security of the database.
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM is available in various forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种审计字段信息获取方法,包括:当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;当未检测到该审计字段信息时,则检索该数据库中与写入的数据相关联的来源信息;从检索出的来源信息中提取行为信息;及将该行为信息识别为审计字段信息。

Description

审计字段信息获取方法、装置、计算机设备和存储介质
本申请要求于2018年06月22日提交中国专利局,申请号为2018106492351,申请名称为“审计字段信息获取方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及一种审计字段信息获取方法、装置、计算机设备和存储介质。
背景技术
随着互联网技术的发展,数据库被广泛地应用,将数据存储在数据库中可以保证数据的安全,而且整理数据也很方便。
而由于数据库需要记录很多用户的数据,为了保证数据库中记录的数据的来源,就需要记录数据库中数据的审计字段信息,通过审计字段信息可以清楚地观测到数据库中数据的来源和读写记录等。
然而,发明人意识到,传统的数据库审计方法仅能够在数据库操作方上传了审计字段信息时准确进行数据库审计。在数据库操作方在操作数据库时,没有上传审计字段信息,就不能够准确地确认数据的来源和操作,容易导致数据库的管理混乱,从而导致数据库的安全性很低。
发明内容
根据本申请公开的各种实施例,提供一种审计字段信息获取方法、装置、计算机设备和存储介质。
一种审计字段信息获取方法包括:
当监测到数据库中有数据写入时,则
检测写入的数据中是否包含相应的审计字段信息;
当未检测到该审计字段信息时,则
检索该数据库中与写入的数据相关联的来源信息;
从检索出的来源信息中提取行为信息;及
将该行为信息识别为审计字段信息。
一种审计字段信息获取装置包括:
信息检测模块,用于当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;
信息检索模块,用于当未检测到该审计字段信息时,则检索该数据库中与写入的数据相关联的来源信息;
信息提取模块,用于从检索出的来源信息中提取行为信息;及
赋值模块,用于将该行为信息识别为审计字段信息。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器实现本申请任意一个实施例中提供的审计字段信息获取方法的步骤。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器实现本申请任意一个实施例中提供的审计字段信息获取方法的步骤。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中审计字段信息获取方法的应用场景图。
图2为根据一个或多个实施例中审计字段信息获取方法的流程示意图。
图3为根据一个或多个实施例中将行为信息识别为审计字段信息之后步骤的流程示意图。
图4为另一个实施例中审计字段信息获取方法的流程示意图。
图5为根据一个或多个实施例中审计字段信息获取装置的框图。
图6为根据一个或多个实施例中计算机设备的框图。
具体实施方式
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的审计字段信息获取方法,可以应用于如图1所示的应用环境中。终端110通过网络与数据库130进行通信。服务器120通过网络或线缆与数据库130进行通信。服务器120监测到数据库130中有终端110的数据写入时,则检测终端110写入的数据中是否包含相应的审计字段信息。当服务器120未检测到审计字段信息时,则检索数据库中与写入到数据相关联的来源信息,从检索出的来源信息中提取行为信息,将该行为信息识别为审计字段信息。终端110可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,服务器120可以用独立的服务器或者是多个服务器组成的服务器集群来实现。数据库130可以用独立的数据库服务器或是搭载在服务器120上的数 据库来实现。
在其中一个实施例中,如图2所示,提供了一种审计字段信息获取方法,以该方法应用于图1中的服务器为例进行说明,包括以下步骤:
S202,当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息。
数据库(Database)是按照数据结构来组织、存储和管理数据的仓库。本实施例中的数据库具体可以用于组织、存储和管理审计字段信息。监测到数据库中有数据写入,具体可以是服务器通过数据库埋入的数据库触发器(trigger),监测数据库中的数据写入。数据库触发器是有数据库服务提供给程序员和数据分析员来保证数据完整性的一种方法。
审计字段信息是数据库审计(Database Audit)所记录的数据。数据库审计是能够实时记录网络上的数据库活动,对数据库操作进行细粒度审计的合规性管理,对数据库遭受到的风险行为进行告警,对攻击行为进行阻断的操作。检测写入的数据中是否包含相应的审计字段信息,具体可以是服务器通过数据库中埋入的数据库触发器,检测写入的数据中是否包含相应的审计字段信息。
在其中一个实施例中,数据库中的数据库写入触发器监测到数据库有数据写入时,触发审计字段检测触发器。审计字段检测触发器从写入的数据中检测审计字段信息。若检测到审计字段信息,则将检测到的审计字段信息发送至服务器;若未检测到审计字段信息,则向服务器发送提示信息。
在其中一个实施例中,服务器监测到数据库有数据导出时,通过数据库的过滤触发器监测数据库导出的数据,并将检测到的数据库操作方赋值给审计字段信息。
S204,当未检测到该审计字段信息时,则检索该数据库中与写入的数据相关联的来源信息。
未检测到审计字段信息具体可以是服务器接收到审计字段检测触发器发送的提示信息,该提示信息表示写入数据库的数据中没有审计字段信息,也可以是服务器直接在数据库中检索时,未检索到写入数据库的数据中的审计字段信息。
来源信息是与写入的数据相关联的信息,例如写入的数据和相应的来源信息可以是同一个数据库操作方写入的数据。来源信息具体可以是数据库操作方写入的其它数据,也可以是数据库操作方的身份信息。检索数据库中与写入的数据相关联的来源信息,具体可以是服务器根据写入的数据中的数据操作类型,在数据库中检索与该数据操作类型相应的其它数据,将检索到的其它数据确认为来源信息。
S206,从检索出的来源信息中提取行为信息。
行为信息为用于描述数据库操作方对数据库进行操作的信息。行为信息具体是数据库操作方在其它操作中的审计字段信息。其它操作具体可以是数据库操作方在不同时间上进行的操作。
从检索出的来源信息中提取行为信息,具体可以是服务器检测来源信息,将检测出的 审计字段信息作为行为信息提取出来。
S208,将该行为信息识别为审计字段信息。
将该行为信息识别为审计字段信息,具体可以是服务器对提取出的行为信息进行分类,并将分类后的行为信息的数值赋值给相应分类的审计字段信息。赋值是将确定的数值赋给某个变量的过程。本实施例中,某个变量具体可以是审计字段信息。
在其中一个实施例中,服务器将提取出的行为信息赋值给审计字段信息后,仍检测到审计字段信息中有部分字段为空,则标注字段为空的审计字段信息。
上述审计字段信息获取方法中,在监测到数据库中有数据写入时,就检测写入的数据中是否包含审计字段信息。在未检测到审计字段信息时,就需要在数据库中检索与写入的数据相关联的来源信息。由于数据库操作方可能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。在检索与写入的数据相关联的来源信息时,就会检索到数据库操作方在其它的操作中上传的审计字段信息,再从来源信息中提取行为信息,并将该行为信息识别为审计字段信息,就可以获取到本次操作的审计字段信息。这样就可以根据获取的审计字段信息准确地确认数据的来源和操作,从而加强数据库管理的条理性,能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
在其中一个实施例中,该检索该数据库中与写入的数据相关联的来源信息,包括:检索该数据库中与该写入的数据相邻的数据;从与该写入的数据相邻的数据中提取来源信息。
检索该数据库中与该写入的数据相邻的数据,具体可以是服务器检索与写入的数据相邻的50行代码,也可以是服务器检索与写入的数据相邻的1kb(Kilobyte,千字节)的代码。
在其中一个实施例中,服务器从与写入的数据相邻的100行代码中进行检索,当检索到审计字段信息时,识别该审计字段信息相应的数据库操作信息,将识别出的数据库操作信息作为来源信息提取出来。
本实施例中,由于数据库操作方可以能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。通过检索数据库中与写入的数据相邻的数据,就可能检索到与审计字段信息相关联的来源信息,从而可以根据提取的来源信息获取审计字段信息。
在其中一个实施例中,该检索该数据库中与写入的数据相关联的来源信息,包括:检索该写入的数据中的操作方指定信息;根据该操作方指定信息确定相应的数据库操作信息;从该数据库操作信息中提取来源信息。
操作方指定信息是指定对数据库进行操作的操作方的信息。操作方具体可以是数据库的用户帐户,也可以是数据库的管理员帐户,还可以是拥有操作数据库的权限的数据库自动工具。数据库操作信息是对数据库进行操作的具体信息。数据库操作信息具体可以是写 入数据、删除数据、复制数据、导出数据、修改数据、数据库操作方的帐户编号、数据库操作的关联系统编号、批量操作的指定帐户编号和操作时间等中的至少一种。
在其中一个实施例中,当服务器监测到数据库有数据批量导出,且审计字段信息中的操作方字段为空,则识别数据导出的地址信息,将识别到的地址信息赋值给审计字段信息。
本实施例中,通过检索写入的数据中的操作方指定信息,根据操作方指定信息确定相应的数据库操作信息,而从数据库操作信息中提取的来源信息可以记录操作方的操作信息,从而可以根据来源信息来获取审计字段信息。
在其中一个实施例中,该检索该写入的数据中的操作方指定信息之后,该方法还包括:根据该操作方指定信息与相应的操作方连接;向该操作方发送信息获取指令,该信息获取指令用于获取审计字段信息;接收该操作方反馈的审计字段信息。
根据操作方指定信息与相应的操作方连接,具体可以是服务器根据操作方指定信息获取操作方的URL(Uniform Resoure Locator,统一资源定位符),并根据获取的URL与操作方建立TCP(Transmission Control Protocol,传输控制协议)连接。信息获取指令具体是从操作方获取审计字段信息的指令。
在其中一个实施例中,服务器在检索到操作方指定信息后,根据操作方指定信息中的操作方身份信息,获取操作方的URL,并根据操作方的URL与操作方建立TCP连接后,向操作方发送信息获取指令。服务器在预设时间内未获取到操作方反馈的审计字段信息时,则直接将操作方身份信息赋值给审计字段信息,并标注未获取到操作方反馈的审计字段信息。
本实施例中,通过根据操作方指定信息与操作方连接,可以直接向操作方发送信息获取指令,从操作方获取审计字段信息,从操作方获取的审计字段信息可以保证记录操作方的实际操作,从而能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
如图3所示,在其中一个实施例中,该数据库中存储有数据库审计树;在步骤S208该将该行为信息识别为审计字段信息之后,该方法还包括:S302,将审计字段信息写入该数据库审计树的主干节点;S304,当接收到审计字段修正指令时,则将该审计字段修正指令所指定的主干节点调整为分支节点;S306,在与被调整的主干节点连接的主干节点后重新创建主干节点;该与被调整的主干节点连接的主干节点,在该数据库审计树上的次序排列在该被调整的主干节点之前;S308,根据该审计字段修正指令,修正该被调整的主干节点的审计字段信息;S310,将修正后的审计字段信息写入重新创建的主干节点。
数据库审计树是数据库中记录审计字段信息的树状数据集合。主干节点是数据库审计树上记载被确认有效的审计字段信息的数据节点。分支节点是数据库审计树上记载被确认无效的审计字段信息的数据节点。具体的,当服务器确认主干节点上的审计字段信息无效时,则将该主干节点调整为分支节点。审计字段修正指令是修正审计字段信息和调整主干节点的指令。
在其中一个实施例中,服务器在接收到数据重置指令时,根据数据重置指令确定相应 的主干节点和分支节点,将该分支节点重置为主干节点,并将主干节点重置为分支节点。
本实施例中,通过数据库审计树记录审计字段信息,可以通过数据库审计树的树状结构很清楚地记载主干节点和分支节点的关系。而在检测出审计字段信息出现错误时,不仅可以通过修改主干节点上的审计字段信息来进行快速修正,还可以将修正前的审计字段信息写入分支节点中,达到数据追溯的效果,从而提高数据库的安全性。
在其中一个实施例中,该步骤S310之后,该方法还包括:当接收到检索与写入的数据相关联的来源信息的指令时,则确定该写入的数据相应的主干节点;从与确定的主干节点相连接的主干节点和分支节点中检索该写入的数据相关联的来源信息。
确定写入的数据相应的主干节点,具体可以是服务器根据写入的数据相应的写入时间确定相应的主干节点,也可以是服务器根据写入的数据中关键字段检索到相匹配的主干节点。
在其中一个实施例中,服务器在确认了写入的数据相应的主干节点后,先在与确认的主干节点相连接的主干节点中检索来源信息,若未检索到来源信息,再从与确认的主干节点相连接的分支节点中检索来源信息。
本实施例中,在检索与写入的数据相关联的来源信息时,通过确认写入的数据相应的主干节点,就可以快速查找到与主干节点相连接的其它主干节点和分支节点,从其它主干节点和分支节点中就更容易检索到来源信息,从而能够快速地获取审计字段信息。
在其中一个实施例中,该步骤S304之后,该方法还包括:当主干节点被调整为分支节点时,则将主干节点的节点信息和分支节点的节点信息写入区块链中。
区块链可以是搭建在内部网络的私有链。节点信息具体可以是主干节点和分支节点的创建时间、修改时间、访问时间、位置信息、占用空间大小、创建者帐户编号、修改者帐户编号和访问者帐户编号等中的至少一种。
本实施例中,在主干节点被调整为分支节点时,通过将主干节点的节点信息和分支节点的节点信息写入区块链,可以根据区块链不可篡改的特性,记录下主干节点和分支节点的调整情况,避免主干节点和分支节点被随意篡改,从而保证主干节点中的审计字段信息是准确的,进而提高了数据库的安全性。
如图4所示,在其中一个实施例中,还提供了一种审计字段信息获取方法,该方法具体包括以下的步骤:
S402,当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息。
S404,当未检测到该审计字段信息时,则检索该数据库中与该写入的数据相邻的数据。
S406,从与该写入的数据相邻的数据中提取来源信息。
S408,从检索出的来源信息中提取行为信息。
S410,将提取出的行为信息赋值给审计字段信息。
S412,将审计字段信息写入该数据库审计树的主干节点。
S414,当接收到审计字段修正指令时,则将该审计字段修正指令所指定的主干节点调整为分支节点。
S416,在与被调整的主干节点连接的主干节点后重新创建主干节点。该与被调整的主干节点连接的主干节点,在该数据库审计树上的次序排列在该被调整的主干节点之前。
S418,根据该审计字段修正指令,修正该被调整的主干节点的审计字段信息。
S420,将修正后的审计字段信息写入重新创建的主干节点。
上述审计字段信息获取方法,在监测到数据库中有数据写入时,就检测写入的数据中是否包含审计字段信息。在未检测到审计字段信息时,就需要在数据库中检索与写入的数据相关联的来源信息。由于数据库操作方可能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。在检索与写入的数据相关联的来源信息时,就会检索到数据库操作方在其它的操作中上传的审计字段信息,再从来源信息中提取行为信息,并将该行为信息识别为审计字段信息,就可以获取到本次操作的审计字段信息。这样就可以根据获取的审计字段信息准确地确认数据的来源和操作,从而加强数据库管理的条理性,能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
应该理解的是,虽然图2-4的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2-4中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在其中一个实施例中,如图5所示,提供了一种审计字段信息获取装置500,包括:信息检测模块502、信息检索模块504、信息提取模块506和赋值模块508,其中:信息检测模块502,用于当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;信息检索模块504,用于当未检测到该审计字段信息时,则检索该数据库中与写入的数据相关联的来源信息;信息提取模块506,用于从检索出的来源信息中提取行为信息;赋值模块508,用于将该行为信息识别为审计字段信息。
上述审计字段信息获取装置500,在监测到数据库中有数据写入时,就检测写入的数据中是否包含审计字段信息。在未检测到审计字段信息时,就需要在数据库中检索与写入的数据相关联的来源信息。由于数据库操作方可能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。在检索与写入的数据相关联的来源信息时,就会检索到数据库操作方在其它的操作中上传的审计字段信息,再从来源信息中提取行为信息,并将该行为信息识别为审计字段信息,就可以获取到 本次操作的审计字段信息。这样就可以根据获取的审计字段信息准确地确认数据的来源和操作,从而加强数据库管理的条理性,能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
在其中一个实施例中,该信息检索模块504,还用于检索该数据库中与该写入的数据相邻的数据;该信息提取模块506,还用于从与该写入的数据相邻的数据中提取来源信息。
在其中一个实施例中,该信息检索模块504,还用于检索该写入的数据中的操作方指定信息;该装置还包括:信息确定模块,用于根据该操作方指定信息确定相应的数据库操作信息;该信息提取模块506,还用于从该数据库操作信息中提取来源信息。
在其中一个实施例中,该装置还包括:设备连接模块,用于根据该操作方指定信息与相应的操作方连接;指令发送模块,用于向该操作方发送信息获取指令,该信息获取指令用于获取审计字段信息;信息接收模块,用于接收该操作方反馈的审计字段信息。
在其中一个实施例中,该数据库中存储有数据库审计树;该装置还包括:信息写入模块,用于将审计字段信息写入该数据库审计树的主干节点;节点调整模块,用于当接收到审计字段修正指令时,则将该审计字段修正指令所指定的主干节点调整为分支节点;节点创建模块,用于在与被调整的主干节点连接的主干节点后重新创建主干节点;该与被调整的主干节点连接的主干节点,在该数据库审计树上的次序排列在该被调整的主干节点之前;信息修正模块,用于根据该审计字段修正指令,修正该被调整的主干节点的审计字段信息;该信息写入模块,还用于将修正后的审计字段信息写入重新创建的主干节点。
在其中一个实施例中,该装置还包括:节点确定模块,用于当接收到检索与写入的数据相关联的来源信息的指令时,则确定该写入的数据相应的主干节点;该信息检索模块504,还用于从与确定的主干节点相连接的主干节点和分支节点中检索该写入的数据相关联的来源信息。
在其中一个实施例中,该信息写入模块,还用于当主干节点被调整为分支节点时,则将主干节点的节点信息和分支节点的节点信息写入区块链中。
关于审计字段信息获取装置的具体限定可以参见上文中对于审计字段信息获取方法的限定,在此不再赘述。上述审计字段信息获取装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图6所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环 境。该计算机设备的数据库用于存储审计字段信息。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种审计字段信息获取方法。
本领域技术人员可以理解,图6中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器实现本申请任意一个实施例中提供的审计字段信息获取方法的步骤。
上述计算机设备,在监测到数据库中有数据写入时,就检测写入的数据中是否包含审计字段信息。在未检测到审计字段信息时,就需要在数据库中检索与写入的数据相关联的来源信息。由于数据库操作方可能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。在检索与写入的数据相关联的来源信息时,就会检索到数据库操作方在其它的操作中上传的审计字段信息,再从来源信息中提取行为信息,并将该行为信息识别为审计字段信息,就可以获取到本次操作的审计字段信息。这样就可以根据获取的审计字段信息准确地确认数据的来源和操作,从而加强数据库管理的条理性,能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器实现本申请任意一个实施例中提供的审计字段信息获取方法的步骤。
上述非易失性计算机可读存储介质,在监测到数据库中有数据写入时,就检测写入的数据中是否包含审计字段信息。在未检测到审计字段信息时,就需要在数据库中检索与写入的数据相关联的来源信息。由于数据库操作方可能会对数据库进行多次操作,在本次的操作中未上传审计字段信息,而在其它的操作中就可能上传了审计字段信息。在检索与写入的数据相关联的来源信息时,就会检索到数据库操作方在其它的操作中上传的审计字段信息,再从来源信息中提取行为信息,并将该行为信息识别为审计字段信息,就可以获取到本次操作的审计字段信息。这样就可以根据获取的审计字段信息准确地确认数据的来源和操作,从而加强数据库管理的条理性,能够有效地追溯数据库的数据来源,进而提高数据库的安全性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、 可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种审计字信息段获取方法,包括:
    当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;
    当未检测到所述审计字段信息时,则检索所述数据库中与写入的数据相关联的来源信息;
    从检索出的来源信息中提取行为信息;及
    将所述行为信息识别为审计字段信息。
  2. 根据权利要求1所述的方法,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述数据库中与所述写入的数据相邻的数据;及
    从与所述写入的数据相邻的数据中提取来源信息。
  3. 根据权利要求1所述的方法,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述写入的数据中的操作方指定信息;
    根据所述操作方指定信息确定相应的数据库操作信息;及
    从所述数据库操作信息中提取来源信息。
  4. 根据权利要求3所述的方法,其特征在于,还包括:
    根据所述操作方指定信息与相应的操作方连接;
    向所述操作方发送信息获取指令,所述信息获取指令用于获取审计字段信息;及
    接收所述操作方反馈的审计字段信息。
  5. 根据权利要求1所述的方法,其特征在于,所述数据库中存储有数据库审计树;所述将所述行为信息识别为审计字段信息之后,所述方法还包括:
    将审计字段信息写入所述数据库审计树的主干节点;
    当接收到审计字段修正指令时,则将所述审计字段修正指令所指定的主干节点调整为分支节点;
    在与被调整的主干节点连接的主干节点后重新创建主干节点;所述与被调整的主干节点连接的主干节点,在所述数据库审计树上的次序排列在所述被调整的主干节点之前;
    根据所述审计字段修正指令,修正所述被调整的主干节点的审计字段信息;及
    将修正后的审计字段信息写入重新创建的主干节点。
  6. 根据权利要求5所述的方法,其特征在于,还包括:
    当接收到检索与写入的数据相关联的来源信息的指令时,则确定所述写入的数据相应的主干节点;及
    从与确定的主干节点相连接的主干节点和分支节点中检索所述写入的数据相关联的来源信息。
  7. 根据权利要求5所述的方法,其特征在于,还包括:
    当主干节点被调整为分支节点时,则将主干节点的节点信息和分支节点的节点信息写入区块链中。
  8. 一种审计字段信息获取装置,包括:
    信息检测模块,用于当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;
    信息检索模块,用于当未检测到所述审计字段信息时,则检索所述数据库中与写入的数据相关联的来源信息;
    信息提取模块,用于从检索出的来源信息中提取行为信息;及
    赋值模块,用于将所述行为信息识别为审计字段信息。
  9. 根据权利要求8所述的装置,其特征在于,所述信息检索模块,还用于检索所述数据库中与所述写入的数据相邻的数据;及
    所述信息提取模块,还用于从与所述写入的数据相邻的数据中提取来源信息。
  10. 根据权利要求8所述的装置,其特征在于,还包括:信息确定模块;
    所述信息检索模块,还用于检索所述写入的数据中的操作方指定信息;
    所述信息确定模块,用于根据所述操作方指定信息确定相应的数据库操作信息;及
    所述信息提取模块,还用于从所述数据库操作信息中提取来源信息。
  11. 根据权利要求10所述的装置,其特征在于,还包括:设备连接模块、指令发送模块和信息接收模块;
    所述设备连接模块,用于根据所述操作方指定信息与相应的操作方连接;
    所述指令发送模块,用于向所述操作方发送信息获取指令,所述信息获取指令用于获取审计字段信息;及
    所述信息接收模块,用于接收所述操作方反馈的审计字段信息。
  12. 根据权利要求8所述的装置,其特征在于,所述数据库中存储有数据库审计树;所述装置还包括:信息写入模块、节点调整模块、节点创建模块和信息修正模块;
    所述信息写入模块,用于将审计字段信息写入所述数据库审计树的主干节点;
    所述节点调整模块,用于当接收到审计字段修正指令时,则将所述审计字段修正指令所指定的主干节点调整为分支节点;
    所述节点创建模块,用于在与被调整的主干节点连接的主干节点后重新创建主干节点;所述与被调整的主干节点连接的主干节点,在所述数据库审计树上的次序排列在所述被调整的主干节点之前;
    所述信息修正模块,用于根据所述审计字段修正指令,修正所述被调整的主干节点的审计字段信息;及
    所述信息写入模块,还用于将修正后的审计字段信息写入重新创建的主干节点。
  13. 根据权利要求12所述的装置,其特征在于,还包括:节点确定模块;
    所述节点确定模块,用于当接收到检索与写入的数据相关联的来源信息的指令时,则确定所述写入的数据相应的主干节点;及
    所述信息检索模块,还用于从与确定的主干节点相连接的主干节点和分支节点中检索所述写入的数据相关联的来源信息。
  14. 根据权利要求12所述的装置,其特征在于,所述信息写入模块,还用于当主干节点被调整为分支节点时,则将主干节点的节点信息和分支节点的节点信息写入区块链中。
  15. 一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;
    当未检测到所述审计字段信息时,则检索所述数据库中与写入的数据相关联的来源信息;
    从检索出的来源信息中提取行为信息;及
    将所述行为信息识别为审计字段信息。
  16. 根据权利要求15所述的计算机设备,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述数据库中与所述写入的数据相邻的数据;及
    从与所述写入的数据相邻的数据中提取来源信息。
  17. 根据权利要求15所述的计算机设备,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述写入的数据中的操作方指定信息;
    根据所述操作方指定信息确定相应的数据库操作信息;及
    从所述数据库操作信息中提取来源信息。
  18. 一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    当监测到数据库中有数据写入时,则检测写入的数据中是否包含相应的审计字段信息;
    当未检测到所述审计字段信息时,则检索所述数据库中与写入的数据相关联的来源信息;
    从检索出的来源信息中提取行为信息;及
    将所述行为信息识别为审计字段信息。
  19. 根据权利要求18所述的存储介质,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述数据库中与所述写入的数据相邻的数据;及
    从与所述写入的数据相邻的数据中提取来源信息。
  20. 根据权利要求18所述的存储介质,其特征在于,所述检索所述数据库中与写入的数据相关联的来源信息,包括:
    检索所述写入的数据中的操作方指定信息;
    根据所述操作方指定信息确定相应的数据库操作信息;及
    从所述数据库操作信息中提取来源信息。
PCT/CN2018/104606 2018-06-22 2018-09-07 审计字段信息获取方法、装置、计算机设备和存储介质 WO2019242112A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810649235.1A CN108959486B (zh) 2018-06-22 2018-06-22 审计字段信息获取方法、装置、计算机设备和存储介质
CN201810649235.1 2018-06-22

Publications (1)

Publication Number Publication Date
WO2019242112A1 true WO2019242112A1 (zh) 2019-12-26

Family

ID=64491746

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/104606 WO2019242112A1 (zh) 2018-06-22 2018-09-07 审计字段信息获取方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN108959486B (zh)
WO (1) WO2019242112A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711540B (zh) * 2020-06-16 2022-06-17 中国联合网络通信集团有限公司 政企业务告警识别方法和装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107003930A (zh) * 2017-01-25 2017-08-01 深圳前海达闼云端智能科技有限公司 用户信息记录方法、装置及电子设备
CN107515817A (zh) * 2017-08-01 2017-12-26 无锡天脉聚源传媒科技有限公司 一种智能收集用户操作信息的方法及装置
CN107644103A (zh) * 2017-10-16 2018-01-30 北京锐安科技有限公司 一种可追溯信息来源的信息存储的方法和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806143B1 (en) * 2009-10-09 2014-08-12 Netapp, Inc. Queuing received write blocks for reducing file fragmentation
JP6122557B2 (ja) * 2014-09-26 2017-04-26 華為技術有限公司Huawei Technologies Co.,Ltd. ファイルマイグレーション方法及び装置、並びにストレージデバイス
CN107609136B (zh) * 2017-09-19 2021-03-05 北京许继电气有限公司 基于访问特征标示的自主可控数据库审计方法和系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107003930A (zh) * 2017-01-25 2017-08-01 深圳前海达闼云端智能科技有限公司 用户信息记录方法、装置及电子设备
CN107515817A (zh) * 2017-08-01 2017-12-26 无锡天脉聚源传媒科技有限公司 一种智能收集用户操作信息的方法及装置
CN107644103A (zh) * 2017-10-16 2018-01-30 北京锐安科技有限公司 一种可追溯信息来源的信息存储的方法和系统

Also Published As

Publication number Publication date
CN108959486A (zh) 2018-12-07
CN108959486B (zh) 2023-04-18

Similar Documents

Publication Publication Date Title
CN110209652B (zh) 数据表迁移方法、装置、计算机设备和存储介质
CN109446068B (zh) 接口测试方法、装置、计算机设备和存储介质
CN109558440B (zh) 数据批量处理方法、装置、计算机设备及存储介质
CN109474578B (zh) 报文消息校验方法、装置、计算机设备和存储介质
WO2020181839A1 (zh) 页面数据测试方法、装置、计算机设备和存储介质
WO2021003980A1 (zh) 黑名单共享方法、装置、计算机设备和存储介质
WO2020233352A1 (zh) 区块链数据入链方法、装置、计算机设备和存储介质
WO2020232883A1 (zh) 脚本缺陷扫描方法、装置、计算机设备和存储介质
CN111970236B (zh) 跨网数据传输方法和装置
CN111078559B (zh) java代码中函数调用的提取方法、装置、介质及计算机设备
CN111475376A (zh) 处理测试数据的方法、装置、计算机设备和存储介质
CN110990362A (zh) 日志查询处理方法、装置、计算机设备和存储介质
CN112395157A (zh) 审计日志的获取方法、装置、计算机设备和存储介质
WO2021120628A1 (zh) 基于区块链的敏感词检测方法、装置、计算机设备和计算机可读存储介质
CN111242317A (zh) 管理应用的方法、装置、计算机设备和存储介质
CN112559526A (zh) 数据表导出方法、装置、计算机设备及存储介质
CN111310195A (zh) 一种安全漏洞管理方法、装置、系统、设备和存储介质
CN111353143A (zh) 敏感权限检测方法、装置及存储介质
CN115357590A (zh) 针对数据变更的记录方法、装置、电子设备及存储介质
US20160004850A1 (en) Secure download from internet marketplace
WO2019242112A1 (zh) 审计字段信息获取方法、装置、计算机设备和存储介质
CN116644250B (zh) 页面检测方法、装置、计算机设备和存储介质
CN112862449A (zh) 结构化工单生成方法、装置、计算机设备和存储介质
CN115658794A (zh) 数据查询方法、装置、计算机设备和存储介质
CN113553344A (zh) 一种业务数据管理方法、系统、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18923517

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18923517

Country of ref document: EP

Kind code of ref document: A1