Big data-based information security monitoring method and system and cloud platform

A technology of information security and big data, applied in digital data information retrieval, digital data protection, electronic digital data processing, etc., can solve problems such as user troubles

Inactive Publication Date: 2021-09-07
广州云博互联网技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the relevant information includes personal privacy or confidential information, and if the information is leaked, it will bring huge troubles to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data-based information security monitoring method and system and cloud platform
  • Big data-based information security monitoring method and system and cloud platform
  • Big data-based information security monitoring method and system and cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0049] In order to facilitate the elaboration of the above information security monitoring method, system and cloud platform based on big data, please refer to figure 1 , provides a schematic diagram of the communication architecture of the big data-based information security monitoring system 100 disclosed in the embodiment of the present application. Wherein, the information security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a big data-based information security monitoring method and system and a cloud platform. The method comprises the steps of determining a security coefficient group of various identification content description features for a real-time feature set and a reference description feature set of various object identification contents through real-time user communication information and reference user communication information, acquiring target information monitoring security associated with exchange information of a reference user, determining description feature sets after security identification according to various description feature sets of target information monitoring security for the object identification contents and the security coefficient group of the description features of the identification contents, and according to the description feature sets after security identification, performing safety degree identification on each transmission track in the target information monitoring security, and determining the target information monitoring security after the security degree identification, thereby solving the problem that related information is not secure in information transmission of the target information.

Description

technical field [0001] The present disclosure relates to the field of big data and monitoring technologies, in particular to a method, system and cloud platform for information security monitoring based on big data. Background technique [0002] With the entry into the information age, relevant information is transmitted through the network or directly stored on the network hard disk, so that the relevant information can be transmitted more quickly or can be directly obtained through the network hard disk. Further, The efficiency of information transmission is improved, and time cost is effectively saved. [0003] However, the content of relevant information includes personal privacy or confidential information, and if the information is leaked, it will bring huge troubles to users. Therefore, how to ensure the security of user-related information is a technical issue that needs to be considered at present. Contents of the invention [0004] In order to improve the techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/9032G06F21/62G06F16/903
CPCG06F16/90332G06F21/6245G06F16/90335
Inventor 种道春许希杰陈伟宗
Owner 广州云博互联网技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products