Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information security comprehensive audit system and method

An information security and remote desktop technology, applied in the field of security access, can solve the problems of audit engine occupying system resources, huge workload caused by deployment, and normal operation of server-side computer systems, so as to simplify deployment tasks and avoid system resources. Effect

Active Publication Date: 2017-04-12
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] First of all, due to the need to deploy a specific audit engine on all managed server computers, deployment will bring a huge workload when the number of target computers is large
[0008] In addition, since the operation of the audit engine will occupy certain system resources, it may affect the normal operation of the server computer system when it is deployed on a server computer with a high load.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security comprehensive audit system and method
  • An information security comprehensive audit system and method
  • An information security comprehensive audit system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] In order to reduce the workload during deployment and avoid the resource occupation of the server-side computer, the embodiment of the present invention provides an information security comprehensive audit system, such as figure 1 shown, including:

[0046] The remote desktop proxy module 1 is used to receive the request from the remote desktop proxy client, after the remote desktop proxy request is authenticated, realize the data exchange between the r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security comprehensive audit system and method. The system comprises a remote desktop proxy module, a monitoring and auditing module and a remote desktop video playback module, wherein the remote desktop proxy module is used for receiving a request from a remote desktop proxy client, authenticating identity of a remote desktop proxy request, realizing data exchange between the remote desktop proxy client and the remote desktop proxy server and recording session content; the monitoring and auditing module is used for providing an interface for querying historical records and performing data statistics and recording graphic operation of a server in a video mode; and the remote desktop video playback module is used for playing back the graphic operation at the server recorded by the monitoring and auditing module. Since the information security comprehensive audit system in the embodiment is allocated in a computer in a network without installing a specific audit engine at the server, the allocation task is simplified. In addition, occupancy of system resource at the server is avoided.

Description

technical field [0001] The invention relates to the field of security access, in particular to an information security comprehensive audit system and method. Background technique [0002] In the enterprise, remote desktop access is the most commonly used remote access method, which allows users to remotely operate the server computer in real time through the client computer, including installing software on the server computer, running programs, etc., everything It seems to be operating directly on the server-side computer. At present, the main access methods of remote desktop include the following three types: [0003] Windows-based remote desktop (RDP), open-source virtual network connection (VNC), and Linux / UNIX-based graphical access protocol (X11). [0004] Remote desktop access brings great convenience to remote office and remote maintenance, but it also brings a series of security problems. Remote operations performed by RDP, VNC, and X11 may cause resource informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 张彩友王红凯张旭东陈建洪建光戴波刘摩西裴旭斌戚伟强龚小刚沈志豪盛华挺
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products