Internally-control safety method for information gateway-service support system

A business support and information network technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as the difficulty in supervising the information access behavior of support personnel, and the inability to implement the SQL log audit mechanism due to huge system overhead. , to ensure accuracy and completeness, strengthen access management, and reduce security risks.

Inactive Publication Date: 2009-01-28
CHINA MOBILE GROUP JIANGSU
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional support system implements a relatively open database model for support personnel, which makes it difficult to supervise the information access behavior of internal support personnel
[0003] 2. The built-in SQL log audit mechanism of the ORACLE database cannot be implemented due to the huge system overhead, and innovations in other means are needed to improve this internal control security capability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internally-control safety method for information gateway-service support system
  • Internally-control safety method for information gateway-service support system
  • Internally-control safety method for information gateway-service support system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] The information gateway of the embodiment of the present invention--the internal control security method of the business support system, comprises the following steps:

[0040] Step 1. Network segment isolation: blocking the communication between the client and the database at the network layer;

[0041] Step 2, setting up the information gateway agent system;

[0042] Step 3, client authentication and authentication;

[0043] Step 4, agent database connection and information forwarding;

[0044] Step 5. Intercept the communication packet, record the database connection behavior and information access behavior;

[0045] Step 6. Regularly conduct post-event security checks according to the security log, and take relevant security measures in a timely manner;

[0046] The technical features of the above-mentioned "Information Gateway-Internal C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for internal control security of an information gateway-service supporting system, the method adopts a TCP / IP message interception technology, carries out finite analysis to an ORACLE communication protocol, combines an IPC communication technology and a shared memory technology, realizes the aim of supervising the database access behavior from a network layer and provides means for afterward supervision of the data access, thereby improving an internal control mechanism of information security.

Description

technical field [0001] The invention belongs to the field of information system security construction of communication operators. It relates to a technical implementation method of data access security adopted in the construction of information system security, so as to improve the information security of the system. This invention can be directly applied to the field of information security construction of various communication operators for their business operation support systems, and can also be further extended to the field of information security construction of large-scale IT systems in banking, electric power, insurance and other industries. Background technique [0002] 1. Changzhou Branch of China Mobile Jiangsu Company is authorized to manage 2 million mobile user data and their call information. The security of these information is one of the core competitiveness of the enterprise. The traditional support system implements a relatively open database model for su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L12/66H04L12/56H04L29/06
Inventor 柴正一王新刚顾剑锋
Owner CHINA MOBILE GROUP JIANGSU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products