CN100586123C - Security audit method and system based on role management - Google Patents
Security audit method and system based on role management Download PDFInfo
- Publication number
- CN100586123C CN100586123C CN200610114101A CN200610114101A CN100586123C CN 100586123 C CN100586123 C CN 100586123C CN 200610114101 A CN200610114101 A CN 200610114101A CN 200610114101 A CN200610114101 A CN 200610114101A CN 100586123 C CN100586123 C CN 100586123C
- Authority
- CN
- China
- Prior art keywords
- access
- role
- protected
- user
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012550 audit Methods 0.000 title claims abstract description 36
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000007726 management method Methods 0.000 title claims abstract description 14
- 238000012544 monitoring process Methods 0.000 claims abstract description 8
- 238000004374 forensic analysis Methods 0.000 claims abstract 2
- 230000004044 response Effects 0.000 claims description 5
- 101001094649 Homo sapiens Popeye domain-containing protein 3 Proteins 0.000 claims description 2
- 101000608234 Homo sapiens Pyrin domain-containing protein 5 Proteins 0.000 claims description 2
- 101000578693 Homo sapiens Target of rapamycin complex subunit LST8 Proteins 0.000 claims description 2
- 102100027802 Target of rapamycin complex subunit LST8 Human genes 0.000 claims description 2
- 101710163698 Norsolorinic acid synthase Proteins 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000004458 analytical method Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000008521 reorganization Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101000911390 Homo sapiens Coagulation factor VIII Proteins 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000012467 final product Substances 0.000 description 1
- 102000057593 human F8 Human genes 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 229940047431 recombinate Drugs 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Landscapes
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及一种作为重要的网络安全产品之一的网络安全审计系统(NSAS:Network Security Audit System)的核心关键技术——基于角色管理的安全审计方法及系统。特征是在监控网络数据的基础上,依据基于角色的审计策略对主体的访问行为进行审计,对客体进行保护,并根据管理员设定的规则记录TCP会话内容,以便事后取证分析。该系统可以定义信任用户、信任子网、认证用户三类用户,可以指定需要保护的主机和主机上需要保护的服务,可以根据应用层协议制定细粒度的访问规则,可以根据对保护资源访问控制的需要制定角色,将已定义的访问规则封装到角色中,将角色指派给已定义的用户,对受保护的资源实现基于角色的安全审计。
The present invention relates to a core key technology of a Network Security Audit System (NSAS: Network Security Audit System), which is one of the important network security products—a security audit method and system based on role management. The feature is that on the basis of monitoring network data, the access behavior of the subject is audited according to the role-based audit strategy, the object is protected, and the content of the TCP session is recorded according to the rules set by the administrator for subsequent forensic analysis. The system can define three types of users: trusted users, trusted subnets, and authenticated users. It can specify the hosts that need to be protected and the services that need to be protected on the hosts. It can formulate fine-grained access rules according to the application layer protocol. It is necessary to formulate roles, encapsulate defined access rules into roles, assign roles to defined users, and implement role-based security auditing on protected resources.
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610114101A CN100586123C (en) | 2006-10-27 | 2006-10-27 | Security audit method and system based on role management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610114101A CN100586123C (en) | 2006-10-27 | 2006-10-27 | Security audit method and system based on role management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1953454A CN1953454A (en) | 2007-04-25 |
CN100586123C true CN100586123C (en) | 2010-01-27 |
Family
ID=38059570
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200610114101A Expired - Fee Related CN100586123C (en) | 2006-10-27 | 2006-10-27 | Security audit method and system based on role management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100586123C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409842A (en) * | 2018-11-06 | 2019-03-01 | 中共四川天府新区成都纪律检查工作委员会 | Online audit system and method |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101426008B (en) * | 2007-10-30 | 2011-06-22 | 北京启明星辰信息技术股份有限公司 | Audit method and system based on back display |
CN101534300B (en) * | 2009-04-17 | 2012-05-30 | 公安部第一研究所 | System protection framework combining multi-access control mechanism and method thereof |
CN103795726A (en) * | 2014-02-14 | 2014-05-14 | 浪潮通信信息系统有限公司 | Depth protection method for virtual data safety access |
CN103929426B (en) * | 2014-04-22 | 2017-04-19 | 清华大学 | Access control method for applications in social cloud service system |
US20200020425A1 (en) * | 2018-07-10 | 2020-01-16 | Koninklijke Philips N.V. | Method and apparatus for hybrid trust management for health records unit |
CN109885554A (en) * | 2018-12-20 | 2019-06-14 | 顺丰科技有限公司 | Database security audit method, system and computer readable storage medium |
CN114205118B (en) * | 2021-11-17 | 2023-10-27 | 南方电网数字电网研究院有限公司 | Data access control analysis method based on data security method category |
CN119337434A (en) * | 2024-12-20 | 2025-01-21 | 易联云计算(杭州)有限责任公司 | A business security audit method and system |
-
2006
- 2006-10-27 CN CN200610114101A patent/CN100586123C/en not_active Expired - Fee Related
Non-Patent Citations (2)
Title |
---|
信息网络中的认证、授权与审计方案. 袁中兰,温巧燕,杨义先.电子科学技术评论,第3期. 2005 * |
网络处理器平台下基于角色的分片审计研究. 高磊,张德运,李金库,李庆海.西安交通大学学报,第39卷第6期. 2005 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409842A (en) * | 2018-11-06 | 2019-03-01 | 中共四川天府新区成都纪律检查工作委员会 | Online audit system and method |
Also Published As
Publication number | Publication date |
---|---|
CN1953454A (en) | 2007-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100586123C (en) | Security audit method and system based on role management | |
US11489879B2 (en) | Method and apparatus for centralized policy programming and distributive policy enforcement | |
DE60307736T2 (en) | Server architecture for secure plug-ins in digital rights management systems | |
JP4667359B2 (en) | Digital asset usage accountability by journalizing events | |
US10148637B2 (en) | Secure authentication to provide mobile access to shared network resources | |
US8769605B2 (en) | System and method for dynamically enforcing security policies on electronic files | |
US8959613B2 (en) | System and method for managing access to a plurality of servers in an organization | |
Viega | Building security requirements with CLASP | |
CN113946839A (en) | Data access method, data access device, storage medium and electronic device | |
US8095963B2 (en) | Securing resource stores with claims-based security | |
US20060248599A1 (en) | Cross-domain security for data vault | |
US20050108526A1 (en) | Query server system security and privacy access profiles | |
CA2868741A1 (en) | Method and system for detecting unauthorized access to and use of network resources with targeted analytics | |
US11809592B2 (en) | Data processing apparatus and methods | |
GB2392517A (en) | Providing secure access to a database | |
Ahmed et al. | A Method for Eliciting Security Requirements from the Business Process Models. | |
CN103069767B (en) | Consigning authentication method | |
Alsmadi | Identity management | |
Haber et al. | Privileged Access Management (PAM) | |
US12360800B2 (en) | Distributed attribute based access control as means of data protection and collaboration in sensitive (personal) digital record and activity trail investigations | |
Simpson et al. | Use case based access control | |
US8977691B2 (en) | Implementation of an extranet server from within an intranet | |
Batra et al. | Autonomous multilevel policy based security configuration in distributed database | |
US12430466B2 (en) | Data processing apparatus and methods for the controlled sharing of data | |
US20250306981A1 (en) | Distributed Attribute Based Access Control as means of Data Protection and Collaboration in Sensitive (Personal) Digital Record and Activity Trail Investigations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: BEIJING QIMINGXINCHEN INFORMATION SECURITY TECHNOL |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 100081 NO 188, NO.12, ZHONGGUANCUN SOUTH AVENUE, HAIDIAN DISTRICT, BEIJING CITY TO: 100193 QIMINGXINGCHEN BUILDING, BUILDING 21, ZHONGGUANCUN SOFTWARE PARK, NO.8, DONGBEIWANG WEST ROAD, HAIDIAN DISTRICT, BEIJING CITY |
|
TR01 | Transfer of patent right |
Effective date of registration: 20100507 Address after: 100193 Beijing city Haidian District Dongbeiwang qimingxingchenmansionproject Building No. 21 West Road No. 8 Zhongguancun Software Park Co-patentee after: Beijing Venusense Information Security Technology Co., Ltd. Patentee after: Beijing Venus Information Technology Co., Ltd. Address before: 100081 No. 12 South Avenue, Haidian District, Zhongguancun, No. 188, Beijing Patentee before: Beijing Venus Information Technology Co., Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100127 Termination date: 20151027 |
|
EXPY | Termination of patent right or utility model |