Safety audit log playing method and device

A technology of security auditing and broadcasting method, which is applied in computing, structured data retrieval, transmission system, etc. It can solve problems affecting customer experience, inability to quickly locate, and slow positioning speed of fixed-point playback, so as to reduce system resources and reduce computing time Effect

Active Publication Date: 2015-03-25
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the VNC protocol in the prior art is a protocol based on regional image updates, and what is recorded in the security audit log file is a partial image update (except for the first image update), so when the log is played back, each The pre-packet is analyzed and drawn, resulting in slow positioning speed of fixed-point playback, unable to quickly locate, and affecting customer experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety audit log playing method and device
  • Safety audit log playing method and device
  • Safety audit log playing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0021] The embodiment of the present invention is applicable to a VNC (Virtual Network Computing, virtual network computer) system, and is especially applicable to a VNC system composed of at least one client (Client), one server (Sever) and one graphics agent. The client, server and graphics agent in the embodiments of the present invention can all run on any computer device.

[0022] An embodiment of the present invention provide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a safety audit log playing method and device and relates to the field of safety audits. The operation time spent for safety audit log fixed point playback is shortened, and system resources occupied by graph drawing are reduced. When fixed point playback needs to be carried out on a pregenerated safety audit log, and a log segment with the time most approximate to the time starting point T is determined according to the time starting point T when playback needs to be carried out and the updating time of each full-screen graphic datum in the safety audit log; the safety audit log is composed of log segments; each log segment is within each preset time threshold value and is composed of one full-screen graphic datum and a plurality of local graphic data by using the full-screen graphic datum as the demarcation point; according to the full-screen graphic datum and the local graphic data in each determined log segment, a graph is drawn. Accordingly, the problems are solved.

Description

technical field [0001] The invention relates to the field of security auditing, in particular to a method and device for playing security auditing logs. Background technique [0002] The bastion machine, that is, in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, it uses various technical means to collect and monitor the system status of each component in the network environment in real time, A technical means for centralized alarming, recording, analysis, and processing of security events and network activities. The bastion machine cuts off the direct access of the operation and maintenance personnel to the server by adopting the protocol proxy method for the commonly used operation and maintenance protocols (RDP (Remote Desktop Protocol, Remote Desktop Protocol), VNC (Virtual Network Computing, virtual network computer), etc.). All operations and maintenance operations need to go through ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24G06F17/30
CPCG06F16/23H04L63/1425H04L67/025H04L69/328
Inventor 李毅为
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products