[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112165463B - Audit data generation method, device, equipment and computer readable storage medium - Google Patents

Audit data generation method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN112165463B
CN112165463B CN202010959014.1A CN202010959014A CN112165463B CN 112165463 B CN112165463 B CN 112165463B CN 202010959014 A CN202010959014 A CN 202010959014A CN 112165463 B CN112165463 B CN 112165463B
Authority
CN
China
Prior art keywords
codes
audit data
database
maintenance protocol
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010959014.1A
Other languages
Chinese (zh)
Other versions
CN112165463A (en
Inventor
何佳林
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN202010959014.1A priority Critical patent/CN112165463B/en
Publication of CN112165463A publication Critical patent/CN112165463A/en
Application granted granted Critical
Publication of CN112165463B publication Critical patent/CN112165463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method, a device, equipment and a computer-readable storage medium for generating audit data. The generation method of the audit data comprises the following steps: obtaining audit operation information generated by operation and maintenance personnel in an audit process, wherein the audit operation information carries an operation and maintenance protocol and a code used in the audit process; matching an operation and maintenance protocol corresponding to the operation and maintenance protocol from the database; matching the codes corresponding to the codes from the database under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database; and under the condition that the codes corresponding to the codes are matched from the database, analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and the matched codes. Through the method and the device, the problem that messy codes exist in audit data in the related technology is solved, and the integrity of the audit data is guaranteed.

Description

Audit data generation method, device, equipment and computer readable storage medium
Technical Field
The present application relates to the field of information processing, and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for generating audit data.
Background
With the development of enterprises, more and more servers and applications of the enterprises are provided, more and more data, servers, switches, gateway equipment and the like which need to be audited are provided, and special codes of certain special characters or code layers may appear, so that a messy code condition appears when data is audited.
At present, an effective solution is not provided aiming at the problem of messy codes in audit data in the related technology.
Disclosure of Invention
The embodiment of the application provides a method, a device and equipment for generating audit data and a computer readable storage medium, which are used for at least solving the problem of messy codes in the audit data in the related technology.
In a first aspect, an embodiment of the present application provides a method for generating audit data, including:
obtaining auditing operation information generated by an operation and maintenance worker in an auditing process, wherein the auditing operation information carries an operation and maintenance protocol and a code used in the auditing process;
matching an operation and maintenance protocol corresponding to the operation and maintenance protocol from a database;
matching a code corresponding to the code from a database under the condition that an operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database;
and under the condition that the codes corresponding to the codes are matched from the database, analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and codes.
In some embodiments, after matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database, the method further includes:
and under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is not matched from the database, generating operation and maintenance protocol matching failure information, and sending the operation and maintenance protocol matching failure information to a preset object.
In some embodiments, in the case that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database, after matching the code corresponding to the code from the database, the method further includes:
and under the condition that the codes corresponding to the codes are not matched from the database, generating code matching failure information and sending the code matching failure information to a preset object.
In some embodiments, when a code corresponding to the code is matched from the database, after parsing the audit operation information according to the matched operation and maintenance protocol and code and generating audit data, the method further includes:
checking whether a messy code exists in the audit data according to a preset checking rule;
and displaying the audit data under the condition that the messy codes do not exist in the audit data.
In some embodiments, after checking whether a messy code exists in the audit data according to a preset checking rule, the method further includes:
and generating messy code alarm information and sending the messy code alarm information to a preset object under the condition that the messy code exists in the audit data.
In some embodiments, the preset object is pre-configured by a user, and the preset object includes at least one of: mail address, instant communication account address and short message address.
In some embodiments, before matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database, the method further includes:
and configuring an operation and maintenance protocol and codes in the database according to the input operation of the user.
In a second aspect, an embodiment of the present application further provides an apparatus for generating audit data, including:
the auditing device comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring auditing operation information generated by an operation and maintenance worker in an auditing process, and the auditing operation information carries an operation and maintenance protocol and a code used in the auditing process;
the first matching module is used for matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from a database;
the second matching module is used for matching the codes corresponding to the codes from the database under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database;
and the first generation module is used for analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and codes under the condition that the codes corresponding to the codes are matched from the database.
In a third aspect, an embodiment of the present application provides an apparatus for generating audit data, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor, when executing the computer program, implements the method for generating audit data as described in the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for generating audit data as described in the first aspect above.
Compared with the related art, the method, the device, the equipment and the computer readable storage medium for generating the audit data provided by the embodiment of the application acquire the audit operation information generated by the operation and maintenance personnel in the audit process, wherein the audit operation information carries the operation and maintenance protocol and the code used in the audit process; matching an operation and maintenance protocol corresponding to the operation and maintenance protocol from the database; matching the codes corresponding to the codes from the database under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database; under the condition that the codes corresponding to the codes are matched from the database, the audit operation information is analyzed and the audit data is generated according to the matched operation and maintenance protocol and the matched codes, so that the problem of messy codes in the audit data in the related technology is solved, and the integrity of the audit data is ensured.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more concise and understandable description of the application, and features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware configuration of a terminal of a method for generating audit data according to an embodiment of the present application;
FIG. 2 is a flow diagram of a method of generating audit data according to an embodiment of the present application;
FIG. 3 is a flow chart diagram of a method of generating audit data in accordance with a preferred embodiment of the present application;
fig. 4 is a block diagram of a structure of an audit data generation apparatus according to an embodiment of the present application;
fig. 5 is a schematic hardware configuration diagram of an audit data generation device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any creative effort belong to the protection scope of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of describing the invention (including a single reference) are to be construed in a non-limiting sense as indicating either the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method provided by the embodiment can be executed in a terminal, a computer or a similar operation device. Taking an example of the method running on a terminal, fig. 1 is a hardware structure block diagram of the terminal of the audit data generation method according to the embodiment of the present application. As shown in fig. 1, the terminal may include one or more processors 102 (only one is shown in fig. 1) (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.) and a memory 104 for storing data, and optionally, the terminal may further include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the terminal. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as a computer program corresponding to the audit data generation method in the embodiment of the present invention, and the processor 102 executes the computer program stored in the memory 104 to execute various functional applications and data processing, that is, to implement the above-mentioned method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 can further include memory located remotely from the processor 102, which can be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices via a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The embodiment also provides a generation method of the audit data, which can be applied to the bastion machine. Fig. 2 is a flowchart of a method for generating audit data according to an embodiment of the present application, where, as shown in fig. 2, the flowchart includes the following steps:
step S201, obtaining audit operation information generated by operation and maintenance personnel in an audit process, wherein the audit operation information carries operation and maintenance protocols and codes used in the audit process.
In this step, the audit operation information may be obtained in real time or may be obtained in a database of audit operation information.
The operation and maintenance protocol may be a protocol used by an operation and maintenance worker in an auditing process, for example, a telent protocol, an FTP protocol, and the like, but the application is not limited to the protocol in the examples. The code may be a code used by the operation and maintenance personnel during the audit process, such as UTF-8, gbk, and the like, but the present application is not limited to the example code.
The Telnet protocol is a member of the TCP/IP suite of protocols, and is the standard protocol and the main mode for Internet Telnet services. It provides the user with the ability to do remote host work on the local computer. The telnet program is used on the end user's computer and is used to connect to the server. The end user can enter commands in the telnet program that will run on the server as if entered directly on the server's console. The server can be controlled locally. To start a telnet session, a username and password must be entered to log in to the server.
FTP (File Transfer Protocol) is one of the protocols in the TCP/IP suite. The FTP protocol includes two components, one being an FTP server and the other being an FTP client. Wherein the FTP server is used for storing files, and the user can use the FTP client to access resources located on the FTP server through the FTP protocol. When a Web site is developed, web pages or programs are typically transferred to a Web server using the FTP protocol. In addition, since FTP is very efficient in transmission, the protocol is also generally used when large files are transmitted over a network.
UTF-8 (8 bit, universal Character Set/Unicode Transformation Format) is a variable length Character encoding for Unicode. It can be used to represent any character in the Unicode standard, and the first byte in its code is still compatible with ASCII, so that the original software for processing ASCII characters can be used continuously without or after only a few modifications. Therefore, it is becoming a preferred encoding for use in e-mail, web pages, and other text storage or delivery applications.
GBK is totally named as Chinese character Internal Code extension Specification (GBK is the first letter of Chinese phonetic alphabet of 'national standard' and 'extension', and English name is Chinese Internal Code Specification), is formulated by the PRC (national information technology standardization and technology Committee), manufactured by 12.1.1995, and is determined as a technical Specification instructive document by combining the standardization department of the State technical supervision agency, the science and technology department of the electronic industry and the quality supervision department, in 12.15.1995, in a form of a technical supervision function No. 1995 229 document. This version of the GBK specification is version 1.0.
And step S202, matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database.
In step S203, when the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database, the code corresponding to the code is matched from the database.
In step S202 and step S203, the operation and maintenance protocol and the code may be configured in the database in advance by the user, so that the operation and maintenance protocol and the code are matched in step S202 and step S203.
In some embodiments, before step S202, the operation and maintenance protocol and the code may be configured in the database according to the input operation of the user. By the method, the configuration of the operation and maintenance protocol and the codes is realized.
And step S204, under the condition that the codes corresponding to the codes are matched from the database, analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and codes.
Based on the steps S201 to S204, the integrity of the audit data is ensured, meanwhile, the validity of the audit data is also promoted, and the problem of messy codes in the audit data in the related technology is solved by acquiring the audit operation information generated by the operation and maintenance personnel in the audit process, matching the operation and maintenance protocol and the code corresponding to the operation and maintenance personnel from the database according to the operation and maintenance protocol and the code carried in the audit operation information, and analyzing the audit operation information according to the matched operation protocol and code under the matched condition to obtain the corresponding audit data.
In some embodiments, after the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched in the database, the operation and maintenance protocol matching failure information may be generated and sent to the preset object when the operation and maintenance protocol corresponding to the operation and maintenance protocol is not matched in the database. By the method, the user can conveniently carry out timely emergency treatment according to the operation and maintenance protocol matching failure information.
In some embodiments, the operation and maintenance protocol matching information may also be saved in the storage unit, so that the user may view the operation and maintenance protocol matching failure information later.
In some embodiments, when the operation and maintenance protocol corresponding to the operation and maintenance protocol is not matched from the database, the operation and maintenance protocol corresponding to the operation and maintenance protocol may be matched again in the database.
In some embodiments, after the code corresponding to the code is matched from the database in the case that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database, the code matching failure information may be generated and sent to the preset object in the case that the code corresponding to the code is not matched from the database. By the method, the user can conveniently carry out timely emergency treatment according to the code matching failure information.
In some embodiments, the code matching information may also be saved to a storage unit to facilitate a user to subsequently view the code matching failure information.
In some embodiments, in the case that the code corresponding to the code is not matched from the database, the code corresponding to the code may also be matched again in the database.
In some embodiments, when the codes corresponding to the codes are matched from the database, after the audit operation information is analyzed and the audit data is generated according to the matched operation and maintenance protocol and codes, whether the messy codes exist in the audit data can be verified according to a preset verification rule; and displaying the audit data under the condition that the messy codes do not exist in the audit data after verification. By the method, the accuracy of the audit data is further determined, and meanwhile, a user can conveniently monitor the audit data.
In some embodiments, after checking whether the messy codes exist in the audit data according to the preset checking rule, the messy code warning information can be generated and sent to the preset object under the condition that the messy codes exist in the audit data. By the mode, the user can conveniently carry out timely emergency treatment according to the messy code warning information.
In some embodiments, the preset object in the foregoing embodiments may be pre-configured by a user, and the preset object includes at least one of: mail address, instant communication account address and short message address.
The embodiments of the present application are described and illustrated below by way of preferred embodiments.
Fig. 3 is a flow chart of a generation method of audit data according to the preferred embodiment of the application, and the generation method of the audit data can be applied to a bastion machine, wherein the bastion machine can comprise: the system comprises a terminal acquisition module, a sending module, a protocol analysis module and a verification module. As shown in fig. 3, the preferred process flow includes the following steps:
and S301, acquiring an operation and maintenance protocol and related codes used by an operation and maintenance worker in an auditing process through a terminal acquisition module.
In the steps, an operation and maintenance person logs in the bastion machine, operation and maintenance operation is carried out on the server through the bastion machine, corresponding audit operation information is generated in the process, and the audit operation information carries an operation and maintenance protocol and codes.
The code may be utf-8, gbk, or the like.
Step S302, the terminal acquisition module submits the acquired information to the sending module, and the sending module sends the operation and maintenance protocol and the code to the protocol analysis module.
And step S303, after receiving the operation and maintenance protocol and the code transmitted by the transmitting module, the protocol analyzing module matches the protocol and the code related to the operation and maintenance protocol and the code, analyzes the operation and maintenance auditing process under the condition of matching the related protocol and the code, and generates auditing data.
And step S304, the generated audit data is verified through a verification module, and whether messy codes exist in the audit data is detected. If not, step S305 is executed, and if yes, step S306 is executed.
And step S305, displaying the audit data under the condition that the messy codes do not exist in the audit data.
And S306, generating messy code alarm information and sending the messy code alarm information to a preset object under the condition that the messy code is detected in the audit data.
In the steps, various coding verification mechanisms can be built in the bastion machine, when a user logs in the bastion machine auditing server, the protocol mode used in the auditing process is actively detected, and the auditing protocol is self-adapted.
Meanwhile, audit operation information can be obtained through a protocol agent in the audit process, and the obtained audit operation information is analyzed and verified.
Based on the embodiment, the method is more accurate, reliable and active self-adaptive, solves the problem that messy codes appear in the current audit video and does not have active self-adaptation aiming at the problem that messy codes appear in the audit data.
The present embodiment further provides a device for generating audit data, where the device is used to implement the foregoing embodiment and the preferred embodiment, and details of which have been already described are not described again. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a structure of an apparatus for generating audit data according to an embodiment of the present application, and as shown in fig. 4, the apparatus includes:
the obtaining module 41 is configured to obtain audit operation information generated by an operation and maintenance worker in an audit process, where the audit operation information carries an operation and maintenance protocol and a code used in the audit process;
the first matching module 42 is coupled to the obtaining module 41 and configured to match the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database;
a second matching module 43, coupled to the first matching module 42, for matching the codes corresponding to the codes from the database in case of matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database;
and the first generating module 44 is coupled to the second matching module 43, and in the case that the code corresponding to the code is matched from the database, the auditing operation information is parsed according to the matched operation and maintenance protocol and code, and auditing data is generated.
In some of these embodiments, the apparatus further comprises: and the second generation module is used for generating operation and maintenance protocol matching failure information under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is not matched in the database, and sending the operation and maintenance protocol matching failure information to the preset object.
In some of these embodiments, the apparatus further comprises: and the third generation module is used for generating code matching failure information under the condition that the codes corresponding to the codes are not matched in the database, and sending the code matching failure information to the preset object.
In some of these embodiments, the apparatus further comprises: the verification module is used for verifying whether the messy codes exist in the audit data or not according to a preset verification rule; and the display module is used for displaying the audit data under the condition that the messy codes do not exist in the audit data.
In some of these embodiments, the apparatus further comprises: and the fourth generation module is used for generating the messy code alarm information and sending the messy code alarm information to the preset object under the condition that the messy code exists in the audit data.
In some embodiments, the preset object is pre-configured by the user, and the preset object includes at least one of: mail address, instant communication account address and short message address.
In some of these embodiments, the apparatus further comprises: and the configuration module is used for configuring the operation and maintenance protocol and the codes in the database according to the input operation of the user.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
In addition, the generation method of the audit data of the embodiment of the application described in conjunction with fig. 2 can be implemented by the generation device of the audit data. Fig. 5 is a hardware configuration diagram of an audit data generation device according to an embodiment of the present application.
The generating device of audit data may include a processor 51 and a memory 52 storing computer program instructions.
In particular, the processor 51 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 52 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, the memory 52 may include a Hard Disk Drive (Hard Disk Drive, abbreviated HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 52 may include removable or non-removable (or fixed) media, where appropriate. The memory 52 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 52 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, memory 52 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 52 may be used to store or cache various data files that need to be processed and/or used for communication, as well as possible computer program instructions that are executed by the processor 51.
The processor 51 may implement any one of the above-described audit data generation methods by reading and executing computer program instructions stored in the memory 52.
In some of these embodiments, the generation device of audit data may also include a communication interface 53 and bus 50. As shown in fig. 5, the processor 51, the memory 52, and the communication interface 53 are connected via the bus 50 to complete mutual communication.
The communication interface 53 is used for implementing communication between various modules, apparatuses, units and/or devices in the embodiments of the present application. The communication interface 53 may also enable communication with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
Bus 50 includes hardware, software, or both that couple the components of the generating device of the audit data to each other. Bus 50 includes, but is not limited to, at least one of the following: data Bus (Data Bus), address Bus (Address Bus), control Bus (Control Bus), expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example and not limitation, bus 50 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industrial Standard Architecture (EISA) Bus, a Front-Side Bus (Front Side Bus), a Hypertransport (HT) Interconnect, an Industry Standard Architecture (ISA) Bus, a wireless bandwidth (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (Micro Channel Architecture, PCI) Bus, a PCI-Express (PCI-Express) Bus, a Serial Advanced Technology Attachment (vladvanced Technology, SATA) Bus, a Video Association (Video Association) Bus, or a combination of two or more of these or other suitable electronic buses. Bus 50 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the present application, any suitable buses or interconnects are contemplated by the present application.
The generation device of the audit data can execute the generation method of the audit data in the embodiment of the application based on the obtained audit operation information generated by the operation and maintenance staff in the audit process, so that the generation method of the audit data described in combination with fig. 2 is realized.
In addition, in combination with the generation method of the audit data in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement a method of generating audit data as in any of the above embodiments.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent application shall be subject to the appended claims.

Claims (9)

1. A method for generating audit data, comprising:
obtaining auditing operation information generated by an operation and maintenance worker in an auditing process, wherein the auditing operation information carries an operation and maintenance protocol and a code used in the auditing process;
matching an operation and maintenance protocol corresponding to the operation and maintenance protocol from a database;
matching a code corresponding to the code from a database under the condition that an operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database;
under the condition that codes corresponding to the codes are matched from the database, the audit operation information is analyzed and audit data is generated according to the matched operation and maintenance protocol and codes;
under the condition that the codes corresponding to the codes are matched from the database, the method further comprises the following steps of analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and codes:
checking whether a messy code exists in the audit data according to a preset checking rule;
and displaying the audit data under the condition that the messy codes do not exist in the audit data.
2. The method for generating audit data according to claim 1, wherein after matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database, the method further comprises:
and under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is not matched from the database, generating operation and maintenance protocol matching failure information, and sending the operation and maintenance protocol matching failure information to a preset object.
3. The method for generating audit data according to claim 1, wherein when an operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from a database, after a code corresponding to the code is matched from the database, the method further comprises:
and under the condition that the codes corresponding to the codes are not matched from the database, generating code matching failure information and sending the code matching failure information to a preset object.
4. The method for generating the audit data according to claim 1, wherein after checking whether a messy code exists in the audit data according to a preset check rule, the method further comprises:
and generating messy code alarm information and sending the messy code alarm information to a preset object under the condition that the messy code exists in the audit data.
5. The method for generating audit data according to claim 2, 3 or 4, wherein the preset object is pre-configured by a user, and the preset object comprises at least one of the following: mail address, instant communication account address and short message address.
6. The method of claim 1, wherein before matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from the database, the method further comprises:
and configuring an operation and maintenance protocol and codes in the database according to the input operation of the user.
7. An apparatus for generating audit data, comprising:
the auditing device comprises an acquisition module, a processing module and a control module, wherein the acquisition module is used for acquiring auditing operation information generated by an operation and maintenance worker in an auditing process, and the auditing operation information carries an operation and maintenance protocol and a code used in the auditing process;
the first matching module is used for matching the operation and maintenance protocol corresponding to the operation and maintenance protocol from a database;
the second matching module is used for matching the codes corresponding to the codes from the database under the condition that the operation and maintenance protocol corresponding to the operation and maintenance protocol is matched from the database;
the first generation module is used for analyzing the audit operation information and generating audit data according to the matched operation and maintenance protocol and codes under the condition that the codes corresponding to the codes are matched from the database;
under the condition that the codes corresponding to the codes are matched from the database, after the audit operation information is analyzed and the audit data is generated according to the matched operation and maintenance protocol and the codes, the method further comprises the following steps:
checking whether a messy code exists in the audit data according to a preset checking rule;
and displaying the audit data under the condition that the messy codes do not exist in the audit data.
8. An apparatus for generating audit data comprising a memory, a processor and a computer program stored on the memory and run on the processor, wherein the processor when executing the computer program implements a method of generating audit data according to any of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which program, when executed by a processor, implements a method of generating audit data according to any one of claims 1 to 6.
CN202010959014.1A 2020-09-14 2020-09-14 Audit data generation method, device, equipment and computer readable storage medium Active CN112165463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010959014.1A CN112165463B (en) 2020-09-14 2020-09-14 Audit data generation method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010959014.1A CN112165463B (en) 2020-09-14 2020-09-14 Audit data generation method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112165463A CN112165463A (en) 2021-01-01
CN112165463B true CN112165463B (en) 2023-04-18

Family

ID=73858483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010959014.1A Active CN112165463B (en) 2020-09-14 2020-09-14 Audit data generation method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112165463B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114115833B (en) * 2022-01-25 2022-06-28 北京安帝科技有限公司 Automatic protocol audit code generation method and device
CN116028313B (en) * 2023-03-30 2023-06-09 北京久安世纪科技有限公司 Terminal auditing method, system and storage medium based on VT sequence

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036910A (en) * 2013-01-05 2013-04-10 北京网康科技有限公司 Method and device for controlling user web access behaviors
CN111586058A (en) * 2020-05-09 2020-08-25 成都安恒信息技术有限公司 Mixed protocol agent system and method for operation and maintenance audit system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101551792A (en) * 2008-04-03 2009-10-07 鸿富锦精密工业(深圳)有限公司 Messy code recovery system and method
US9971802B2 (en) * 2011-08-17 2018-05-15 International Business Machines Corporation Audit record transformation in a dispersed storage network
CN104424165B (en) * 2013-09-06 2018-05-25 北大方正集团有限公司 A kind of text document mess code detection method and system
CN104917826A (en) * 2015-05-26 2015-09-16 浪潮电子信息产业股份有限公司 Method for accessing FTP (File transfer protocol) in heterogeneous environment in automatic code conversion mode
CN105139139B (en) * 2015-08-31 2018-12-21 国家电网公司 Data processing method and device and system for O&M audit
CN106656919B (en) * 2015-10-30 2019-08-06 中国科学院声学研究所 A kind of session analytic method and system based on Telnet agreement
CN106354100B (en) * 2016-11-18 2019-03-12 北京网御星云信息技术有限公司 A kind of operation audit method and device applied to numerically-controlled machine tool
CN107086942B (en) * 2017-04-25 2019-12-03 北京锐安科技有限公司 A kind of Web content service provider ICP reported data inspection method and device
CN108933678A (en) * 2017-05-19 2018-12-04 南京骏腾信息技术有限公司 O&M auditing system
CN108091354A (en) * 2017-12-13 2018-05-29 深圳市沃特沃德股份有限公司 Onboard system lyrics analysis method and device
CN110430187B (en) * 2019-08-01 2021-07-06 英赛克科技(北京)有限公司 Communication message security audit method, equipment and storage medium in industrial control system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036910A (en) * 2013-01-05 2013-04-10 北京网康科技有限公司 Method and device for controlling user web access behaviors
CN111586058A (en) * 2020-05-09 2020-08-25 成都安恒信息技术有限公司 Mixed protocol agent system and method for operation and maintenance audit system

Also Published As

Publication number Publication date
CN112165463A (en) 2021-01-01

Similar Documents

Publication Publication Date Title
CN109495870B (en) Bluetooth test method and device
US20180343214A1 (en) Information Exchange Method, Client, and Apparatus
CN112165463B (en) Audit data generation method, device, equipment and computer readable storage medium
CN109388417B (en) Communication protocol updating method, system and terminal equipment
CN111628967B (en) Log data transmission method and device, computer equipment and storage medium
CN106330483B (en) Information acquisition method, client device and server device
CN109889521B (en) Memory, communication channel multiplexing implementation method, device and equipment
CN110290015B (en) Remote deployment method, device and storage medium
CN110769009B (en) User identity authentication method and system
CN101741846A (en) File downloading method, file downloading device and file downloading system
CN115208951B (en) Request processing method, request processing device, electronic equipment and computer readable storage medium
CN104301875A (en) Short message processing method and device
CN113660250B (en) Defense method, device and system based on WEB application firewall and electronic device
CN109150913B (en) Method and device for accessing application under micro-service architecture, storage medium and server
CN112087475A (en) Message pushing method and device for cloud platform component application and message server
CN111045934A (en) Page analysis method, device, client, storage medium and electronic equipment
CN112910876B (en) Login method and device and electronic equipment
CN114221866A (en) Method, device and medium for upgrading terminal
JP2011024179A (en) Method and apparatus for decoding hangul or japanese words in http packet and method for analyzing hangul or japanese web contents using the same
CN109286665B (en) Real-time mobile game long link processing method and device
CN104734939A (en) Session keep-alive method and device
US8792519B2 (en) Method for transferring network event protocol messages
CN110213310B (en) Method, device and storage medium for acquiring path of network service
CN112434231B (en) Data processing method and device and electronic equipment
CN112989315B (en) Fingerprint generation method, device and equipment for terminal of Internet of things and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant