Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data security management and control method and platform

A data security and control platform technology, applied in the field of data security, can solve problems such as harsh data protection, impact on business use, lack of security view, etc.

Active Publication Date: 2018-06-01
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the granularity of protection strategies for data assets is relatively coarse, and there are some unreasonable situations where some data protection is insufficient and some data protection is too harsh, which affects business use.
[0005] (2) The security protection products of enterprises only focus on the equipment they protect, lacking a unified security view
For example, firewalls only focus on network layer protection, terminal desk management security software only focuses on terminal protection, security protection products lack linkage, security views are fragmented, and lack a unified security management view for all devices on the entire network, making it impossible to know all devices An overall security protection situation of
[0006] (3) In the big data scenario, data faces different security risks at each stage of the life cycle and has different security protection requirements. However, at present, there is a lack of security protection for the entire life cycle of data, and it is impossible to generate, The unified security protection and management of the complete life cycle of access, transmission, recovery, and destruction cannot guarantee the security of data in all aspects of storage, transmission, use, and destruction.
[0007] (4) After a security violation event occurs, it is difficult to quickly and accurately locate the responsible person

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security management and control method and platform
  • A data security management and control method and platform
  • A data security management and control method and platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Embodiment 1 of the present invention: a data security management and control method, such as figure 1 shown, including the following steps:

[0065] 1. Divide data according to data category and confidentiality level

[0066] The data categories are divided according to the following methods: According to the content, type, department, business activity or business system relationship of the data itself, the data is divided into data categories, data subcategories, data subcategories and data, data categories , data subclass, data subclass and data respectively correspond to data domain, business function domain, business process domain and business activity.

[0067] Automatic classification and grading technology can be used, that is, natural language processing and text classification algorithms are used to associate data with one or more predefined categories according to the semantic characteristics and format of data content, and automatically assign specified d...

Embodiment 2

[0134] Embodiment 2 of the present invention: a data security management and control platform that implements the aforementioned method, such as Figure 5 shown, including:

[0135] Data classification and grading module 1, used to classify data according to data category and confidentiality level;

[0136] The security protection tool allocation module 2 is used to allocate corresponding security protection tools and carry out security protection for data encryption, identity authentication, access control, security audit, tracking and evidence collection according to the data division results;

[0137] The log collection and processing module 3 is used to collect log information generated by security protection tools and perform normalization processing to establish a security view of the full life cycle of data.

[0138] The data classification and grading module 1 includes a data classification module 11, which is used to classify data into major data categories, data sub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security management and control method and platform. The method includes: S1, dividing data according to data category and confidentiality level; S2, performing data encryption, identity authentication, access control, security audit and Tracking and forensics assign corresponding security protection tools and perform security protection; S3 collects log information generated by security protection tools and performs normalized processing to establish a security view of the full life cycle of data. The present invention can carry out fine-grained, differentiated, and full-life cycle protection on big data, improve the utilization rate of security protection tools, and track and collect evidence on big data.

Description

technical field [0001] The invention relates to a data security management and control method and platform, belonging to the technical field of data security. Background technique [0002] With the development of enterprise business and informatization, business data, as a kind of enterprise assets (data assets), presents the characteristics of large quantity, diversity and high value, and data assets have entered the era of big data. The significance of data security is not limited to the data itself, but also directly affects whether data can be upgraded to data assets to serve the business development of enterprises and the improvement of core competitiveness; in 2014, the state proposed that "information security is related to national security", and It shows that the data security of the enterprise is related to the security of the enterprise and the national security. [0003] However, the current security protection methods and technologies cannot meet the diverse an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06G06F17/30
Inventor 邹洪钱扬陈锐忠林强赵延帅李皓彭泽武冯歆尧林泽鑫唐亮亮
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products