Data access exception detection method, device, storage medium and computer equipment

A data access and detection method technology, applied in the field of data processing, can solve problems such as data access abnormalities that cannot be effectively tracked, data access security risks, etc., to facilitate data monitoring and data management, improve security, and track accurately

Active Publication Date: 2020-09-15
HANGZHOU DT DREAM TECH
View PDF16 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In this way, only the data of a single application is audited and controlled. When the data is transferred multiple times through the data link, the exceptions of data access cannot be effectively tracked, which may easily lead to security risks of data access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access exception detection method, device, storage medium and computer equipment
  • Data access exception detection method, device, storage medium and computer equipment
  • Data access exception detection method, device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0027] figure 1 It is a schematic flowchart of a method for detecting abnormal data access proposed by an embodiment of the present invention.

[0028] In this embodiment, the method for detecting abnormal data access is configured as an apparatus for detecting abnormal data access for illustration.

[0029] The method for detecting abnormal data access in this embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data access exception detection method, a device, a storage medium and computer equipment. The method comprises the steps of determining data blood relationship information, data circulation information and data access information in a data sharing platform; forming a data circulation topological graph of the data dimension according to the data blood relationship information and the data circulation information; forming a data flow topological graph of the access dimension according to the data blood relationship information and the data access information; and detecting data access exception according to the data transfer topological graph of the data dimension and the data transfer topological graph of the access dimension in combination with a set data transferrule. According to the invention, full-process tracking can be carried out on the circulation process of the data, the exception of data access can be accurately tracked, data monitoring and data management are facilitated, and the safety of data access is effectively improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method, device, storage medium and computer equipment for detecting abnormal data access. Background technique [0002] The biggest feature of data resources is that they are reusable and value-added. Effective data can create great value for departments. database etc. By building a data sharing platform, it is possible to fully integrate existing government resources, provide a strong guarantee for cross-departmental business systems, and completely break down information islands to meet the needs of various business departments for information interconnection, sharing and exchange, and serve the government, enterprises and society. The public provides all-round, real-time updated basic information services, and in the application scenario of managing data through the data sharing platform, the authority management of data is particularly important. [0003] In relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F16/25G06F16/27G06F16/28
CPCG06F11/302G06F16/27G06F16/284G06F16/254
Inventor 王占群
Owner HANGZHOU DT DREAM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products