[go: up one dir, main page]

CN114036489A - Information security management method and system based on big data - Google Patents

Information security management method and system based on big data Download PDF

Info

Publication number
CN114036489A
CN114036489A CN202111330818.6A CN202111330818A CN114036489A CN 114036489 A CN114036489 A CN 114036489A CN 202111330818 A CN202111330818 A CN 202111330818A CN 114036489 A CN114036489 A CN 114036489A
Authority
CN
China
Prior art keywords
data
database
information
identity
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111330818.6A
Other languages
Chinese (zh)
Inventor
陈剑飞
孙强
赵丽娜
王聪
张桉童
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shandong Electric Power Co Ltd
Original Assignee
State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shandong Electric Power Co Ltd filed Critical State Grid Shandong Electric Power Co Ltd
Priority to CN202111330818.6A priority Critical patent/CN114036489A/en
Publication of CN114036489A publication Critical patent/CN114036489A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, and discloses an information security management method and system based on big data, which comprises an identity judgment module, a parallel processing module, a data reading and writing module and an information output module; by adopting the identity information and the access history information as the determined identity determination module, the accessed equipment can be verified through the multiple identity verification of the bidirectional data of the database and the terminal equipment, the safety control is effectively carried out on the equipment accessing the database, the safety of the database data is improved, and meanwhile, the parallel processing module is benefited from the setting, so that the terminal equipment cannot directly read and write the data with the database, the parallel processing module can be controlled to carry out data processing on the database only by generating and writing instructions, the outflow of the data, the implantation of malicious viruses and the like can be effectively avoided, and the safety of the data in the database is further protected.

Description

Information security management method and system based on big data
Technical Field
The invention relates to the technical field of information security, in particular to an information security management method and system based on big data.
Background
The rapid development of the internet technology brings great convenience to the production and life of people, and even gradually changes the production and life modes of people, but simultaneously, along with the rapid development of the internet technology, information is gradually changed from a storage mode of an entity independent carrier to an interconnected cloud storage mode, and the verification of the information is gradually changed into a cloud verification mode through the internet, so that the information security becomes one of important problems which must be faced and solved along with the rapid development of the internet technology, and especially, the significance and the influence of the information security management are very important for the security management of personal information, personal fund account information, enterprise databases and the like.
In the prior art, for security management of enterprise data, an intranet of a company is mostly adopted or a special data manager is arranged, and access of staff equipment and the like in the company to the data is strictly controlled, so that protection of the data is realized, and security of the data is improved.
However, in the prior art, some problems still exist, and a data security management mode that an intranet is not connected with an external network is adopted, so that work of employees is inconvenient, when the employees need to obtain some information through the external network for work, the work cannot be performed conveniently and quickly, an authority system is implemented for data access, and data access personnel are managed strictly, and some malicious data outflow behaviors cannot be avoided.
Disclosure of Invention
The present invention provides a method and a system for information security management based on big data, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an information security management system based on big data comprises the following steps:
the identity judgment module is used for receiving a database access signal, performing identity judgment on the terminal equipment which sends the database access signal according to the database access signal to generate an identity judgment result, and responding to the database access signal according to the identity judgment result, wherein the database access signal comprises identity information and access history information;
the parallel processing module is used for receiving and responding to a compiling operation instruction and generating a data reading and writing request according to the compiling operation instruction, wherein the compiling operation instruction comprises a compiling operation data segment and an extended content data segment, the compiling operation instruction is used for representing the step content executed by the terminal equipment, and the extended content data segment is used for representing the content of the terminal equipment added to the database;
the data reading and writing module is used for responding to a data reading and writing request and accessing the database according to the data reading and writing request, and the data reading and writing request is used for representing reading and writing operations of contents in the database;
and the information output module is used for generating and outputting processing image information in real time, and the processing image information is used for representing the execution process and content of the steps responding to the writing operation instruction.
As a further scheme of the invention: the identity information is used for representing equipment IPs of the terminal equipment, the equipment IPs correspond to the terminal equipment one by one, and each equipment IP is correspondingly provided with a data access range;
the access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
As a further scheme of the invention: the database specifically comprises a plurality of data area, each device IP corresponds to at least one data area, and the data areas are used for distinguishing data read-write permission of different terminal devices.
As a further scheme of the invention: the identity judgment module specifically comprises:
the checking and reading unit is used for receiving the database access information and reading the identity information and the access history information in the database access information;
the identity judging unit is used for traversing and comparing the identity information according to a preset identity information checking library, and if the identity information exists, the identity checking unit responds;
and the identity checking unit is used for accessing a database according to the identity information, acquiring a corresponding access history data backup, comparing and analyzing the access history data backup and the access history data to generate a comparison result, judging the comparison result and generating an identity judgment result.
As a further scheme of the invention: the data read-write module 500 includes a slice area connection unit;
the fragment area connection unit is configured to access a preset data fragment area access list according to the identity information, acquire a corresponding accessible fragment area, and access the database according to the accessible fragment area, where the data fragment area access list is used to record the accessible data fragment area of each device IP.
As a further scheme of the invention: the parallel processing module also comprises a data security unit;
and the data security unit is used for performing security judgment on the compiling operation instruction according to a preset data security judgment method to generate a judgment result, clearing the compiling operation instruction if the judgment result is unsafe, and executing the step of responding to the compiling operation instruction by the data security unit if the judgment result is safe.
The embodiment of the invention aims to provide an information security management method based on big data, which is characterized in that the epidemic situation monitoring device comprises:
receiving a database access signal, performing identity judgment on terminal equipment which sends the database access signal according to the database access signal to generate an identity judgment result, and responding to the database access signal according to the identity judgment result, wherein the database access signal comprises identity information and access history information;
receiving and responding to a writing operation instruction, and generating a data read-write request according to the writing operation instruction, wherein the writing operation instruction comprises a writing operation data segment and an extended content data segment, the writing operation instruction is used for representing the step content executed by the terminal equipment, and the extended content data segment is used for representing the content of the terminal equipment added to the database;
responding to a data read-write request, and accessing the database according to the data read-write request, wherein the data read-write request is used for representing the reading and writing operation of the content in the database;
and generating and outputting processing image information in real time, wherein the processing image information is used for representing the execution process and content of the steps responding to the writing operation instruction.
As a further scheme of the invention: the identity information is used for representing equipment IPs of the terminal equipment, the equipment IPs correspond to the terminal equipment one by one, and each equipment IP is correspondingly provided with a data access range;
the access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
As a further scheme of the invention: the database specifically comprises a plurality of data area, each device IP corresponds to at least one data area, and the data areas are used for distinguishing data read-write permission of different terminal devices.
Compared with the prior art, the invention has the beneficial effects that: by adopting the identity information and the access history information as the determined identity determination module, the accessed equipment can be verified through the multiple identity verification of the bidirectional data of the database and the terminal equipment, the safety control is effectively carried out on the equipment accessing the database, the safety of the database data is improved, and meanwhile, the parallel processing module is benefited from the setting, so that the terminal equipment cannot directly read and write the data with the database, the parallel processing module can be controlled to carry out data processing on the database only by generating and writing instructions, the outflow of the data, the implantation of malicious viruses and the like can be effectively avoided, and the safety of the data in the database is further protected.
Drawings
Fig. 1 is a block diagram of a big data-based information security management system.
Fig. 2 is a block diagram of an identity determination module in a big data-based information security management system.
Fig. 3 is a flow chart of a big data-based information security management method.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The following detailed description of specific embodiments of the present invention is provided in connection with specific embodiments.
As shown in fig. 1, an information security management system based on big data provided for an embodiment of the present invention includes:
the identity determination module 100 is configured to receive a database access signal, perform identity determination on a terminal device that sends the database access signal according to the database access signal, generate an identity determination result, and respond to the database access signal according to the identity determination result, where the database access signal includes identity information and access history information.
In this embodiment, the identity determination module 100 is used for determining the identity of the terminal device, and in data security, it is a very important point to guarantee data security for strict management of the identity of the access device, and only strict control is performed on data security, so that good guarantee can be achieved on the security of the data to a certain extent.
The parallel processing module 300 is configured to receive and respond to a writing operation instruction, and generate a data read-write request according to the writing operation instruction, where the writing operation instruction includes a writing operation data segment and an extended content data segment, the writing operation instruction is used to represent content of a step executed by the terminal device, and the extended content data segment is used to represent content of the terminal device added to the database.
In this embodiment, the parallel processing module 300 is a module that is parallel to the terminal device and can restore the operation steps of the terminal device, where data transmission between the two modules is unidirectional, that is, the terminal device can only send data to the parallel processing module 100 but cannot read the data, therefore, the data in the parallel processing module 300 is always greater in number than the terminal device and cannot be read by the terminal device, and all executed in this case can be understood as mirror image, that is, after the parallel processing module obtains part of the data by writing an operation instruction, the same operation content as that of the middle-stage water device is executed, so that data leakage that may be generated when the data in the database directly enters the terminal device can be effectively avoided, and meanwhile, based on this, the parallel processing module can also realize more intrusion blocking in software and operation, and avoid destructive behavior through related software, further protecting the security of the database.
And the data reading and writing module 500 is configured to respond to a data reading and writing request, and access the database according to the data reading and writing request, where the data reading and writing request is used to represent reading and writing operations on contents in the database.
In this embodiment, this step is to connect the module 300 and the database, and when the module 300 executes the relevant data processing step, it needs to access and read part of the data in the database, and this step is performed by the data read/write module 500, and the data read/write module 500 is divided from the parallel processing module 300, so that the data security of the database can be further protected, and the data security can be further improved by setting a secondary relevant security determination unit for the data read/write module 500 to perform the determination of the data security.
And the information output module 700 is configured to generate and output processed image information in real time, where the processed image information is used to represent an execution process and content of the steps in response to the writing operation instruction.
In this embodiment, the image processing information here may be understood as image information output to a display when a host is used in a computer for operation, so that an operator can know the execution situation of an operation and a related instruction in real time and how to perform the next operation.
As another preferred embodiment of the present invention, the identity information is used to characterize device IPs of the terminal device, the device IPs correspond to the terminal device one to one, and each device IP is correspondingly provided with a data access range.
The access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
As another preferred embodiment of the present invention, the database specifically includes a plurality of data slice areas, each device IP corresponds to at least one of the data slice areas, and the data slice areas are used for distinguishing data read-write permissions of different terminal devices.
In this embodiment, the device IP refers to a hardware IP address, the identity of the terminal device can be uniquely determined by the device IP, different systems with similar access levels are set according to the staff and the like corresponding to each device in the company, that is, data in the database is divided into a plurality of data fragment areas corresponding to different job levels, and each different terminal device can only access data in a certain data fragment area, so that the data can be well protected, and the data security is further improved.
As shown in fig. 2, as another preferred embodiment of the present invention, the identity determination module 100 specifically includes:
and the checking and reading unit 101 is configured to receive the database access information, and read the identity information and the access history information in the database access information.
An identity determination unit 102, configured to perform traversal comparison on the identity information according to a preset identity information check library, and if the identity information exists, perform traversal comparison on the identity information
The identity checking unit 103 is configured to access a database according to the identity information and obtain a corresponding access history data backup, compare the access history data backup with the access history data to generate a comparison result, determine the comparison result, and generate an identity determination result.
In this embodiment, the specific description is determined for the identity determination module, and the identity authentication mainly includes two stages of identity authentication, that is, the terminal device being accessed is determined to be one of the devices in the white list, that is, one of the devices in the company, through the initial identity authentication of the device IP, and then the access history of the device is subjected to bidirectional acquisition authentication to further confirm security, because the access record of the device in the database cannot be directly acquired from the external device, even if the device IP is used or utilized, the identity can be further determined through the determination of the access record, so as to ensure data security.
As another preferred embodiment of the present invention, the data read/write module 500 includes a slice connection unit;
the fragment area connection unit is configured to access a preset data fragment area access list according to the identity information, acquire a corresponding accessible fragment area, and access the database according to the accessible fragment area, where the data fragment area access list is used to record the accessible data fragment area of each device IP.
In this embodiment, the partition connecting unit is used to manage access to the terminal device, so as to ensure that a certain terminal device can only access the corresponding data partition.
As another preferred embodiment of the present invention, the parallel processing module further includes a data security unit;
and the data security unit is used for performing security judgment on the compiling operation instruction according to a preset data security judgment method to generate a judgment result, clearing the compiling operation instruction if the judgment result is unsafe, and executing the step of responding to the compiling operation instruction by the data security unit if the judgment result is safe.
As shown in fig. 3, the present invention further provides a big data-based information security management method, which includes:
s200, receiving a database access signal, performing identity judgment on the terminal equipment which sends the database access signal according to the database access signal to generate an identity judgment result, and responding to the database access signal according to the identity judgment result, wherein the database access signal comprises identity information and access history information.
S400, receiving and responding to a writing operation instruction, and generating a data reading and writing request according to the writing operation instruction, wherein the writing operation instruction comprises a writing operation data segment and an extended content data segment, the writing operation instruction is used for representing the step content executed by the terminal equipment, and the extended content data segment is used for representing the content of the terminal equipment added to the database.
S600, responding to a data read-write request, and accessing the database according to the data read-write request, wherein the data read-write request is used for representing the reading and writing operation of the content in the database.
And S800, generating and outputting processing image information in real time, wherein the processing image information is used for representing the execution process and content of the step responding to the writing operation instruction.
As another preferred embodiment of the present invention, the identity information is used to characterize device IPs of the terminal device, the device IPs correspond to the terminal device one to one, and each device IP is correspondingly provided with a data access range.
The access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
As another preferred embodiment of the present invention, the database specifically includes a plurality of data slice areas, each device IP corresponds to at least one of the data slice areas, and the data slice areas are used for distinguishing data read-write permissions of different terminal devices.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (9)

1. An information security management system based on big data is characterized by comprising the following steps:
the identity judgment module is used for receiving a database access signal, performing identity judgment on the terminal equipment which sends the database access signal according to the database access signal to generate an identity judgment result, and responding to the database access signal according to the identity judgment result, wherein the database access signal comprises identity information and access history information;
the parallel processing module is used for receiving and responding to a compiling operation instruction and generating a data reading and writing request according to the compiling operation instruction, wherein the compiling operation instruction comprises a compiling operation data segment and an extended content data segment, the compiling operation instruction is used for representing the step content executed by the terminal equipment, and the extended content data segment is used for representing the content of the terminal equipment added to the database;
the data reading and writing module is used for responding to a data reading and writing request and accessing the database according to the data reading and writing request, and the data reading and writing request is used for representing reading and writing operations of contents in the database;
and the information output module is used for generating and outputting processing image information in real time, and the processing image information is used for representing the execution process and content of the steps responding to the writing operation instruction.
2. The big data-based information security management system according to claim 1, wherein the identity information is used to represent device IPs of the terminal device, the device IPs correspond to the terminal device one to one, and each device IP is correspondingly provided with a data access range;
the access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
3. The big-data-based information security management system according to claim 2, wherein the database specifically includes a plurality of data slice areas, each device IP corresponds to at least one of the data slice areas, and the data slice areas are used for distinguishing data read-write permissions of different terminal devices.
4. The big data-based information security management system according to claim 3, wherein the identity determination module specifically comprises:
the checking and reading unit is used for receiving the database access information and reading the identity information and the access history information in the database access information;
the identity judging unit is used for traversing and comparing the identity information according to a preset identity information checking library, and if the identity information exists, the identity checking unit responds;
and the identity checking unit is used for accessing a database according to the identity information, acquiring a corresponding access history data backup, comparing and analyzing the access history data backup and the access history data to generate a comparison result, judging the comparison result and generating an identity judgment result.
5. The big data-based information security management system according to claim 3, wherein the data read/write module includes a slice connection unit;
the fragment area connection unit is configured to access a preset data fragment area access list according to the identity information, acquire a corresponding accessible fragment area, and access the database according to the accessible fragment area, where the data fragment area access list is used to record the accessible data fragment area of each device IP.
6. The big data-based information security management system according to claim 1, wherein the parallel processing module further comprises a data security unit;
and the data security unit is used for performing security judgment on the compiling operation instruction according to a preset data security judgment method to generate a judgment result, clearing the compiling operation instruction if the judgment result is unsafe, and executing the step of responding to the compiling operation instruction by the data security unit if the judgment result is safe.
7. An information security management method based on big data is characterized by comprising the following steps:
receiving a database access signal, performing identity judgment on terminal equipment which sends the database access signal according to the database access signal to generate an identity judgment result, and responding to the database access signal according to the identity judgment result, wherein the database access signal comprises identity information and access history information;
receiving and responding to a writing operation instruction, and generating a data read-write request according to the writing operation instruction, wherein the writing operation instruction comprises a writing operation data segment and an extended content data segment, the writing operation instruction is used for representing the step content executed by the terminal equipment, and the extended content data segment is used for representing the content of the terminal equipment added to the database;
responding to a data read-write request, and accessing the database according to the data read-write request, wherein the data read-write request is used for representing the reading and writing operation of the content in the database;
and generating and outputting processing image information in real time, wherein the processing image information is used for representing the execution process and content of the steps responding to the writing operation instruction.
8. The big data-based information security management method according to claim 7, wherein the identity information is used to represent device IPs of the terminal device, the device IPs correspond to the terminal device one to one, and each device IP is correspondingly provided with a data access range;
the access history information is access information of the terminal device to a history database, and the access history information is correspondingly stored in the database and the terminal device.
9. The big-data-based information security management method according to claim 8, wherein the database specifically includes a plurality of data slice areas, each device IP corresponds to at least one of the data slice areas, and the data slice areas are used for distinguishing data read-write permissions of different terminal devices.
CN202111330818.6A 2021-11-11 2021-11-11 Information security management method and system based on big data Pending CN114036489A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111330818.6A CN114036489A (en) 2021-11-11 2021-11-11 Information security management method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111330818.6A CN114036489A (en) 2021-11-11 2021-11-11 Information security management method and system based on big data

Publications (1)

Publication Number Publication Date
CN114036489A true CN114036489A (en) 2022-02-11

Family

ID=80143966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111330818.6A Pending CN114036489A (en) 2021-11-11 2021-11-11 Information security management method and system based on big data

Country Status (1)

Country Link
CN (1) CN114036489A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225387A (en) * 2022-07-21 2022-10-21 济宁简约信息技术有限公司 Data security tamper-proof method and system based on big data and cloud platform
CN116975076A (en) * 2023-07-28 2023-10-31 深圳市丕微科技企业有限公司 Multi-terminal interactive data transmission control method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384027A (en) * 2016-09-05 2017-02-08 四川长虹电器股份有限公司 User identity recognition system and recognition method thereof
CN110430179A (en) * 2019-07-26 2019-11-08 西安交通大学 A kind of control method and system for intranet and extranet secure access
CN111756752A (en) * 2020-06-24 2020-10-09 北京金山云网络技术有限公司 Method and device for controlling access authority of database and electronic equipment
CN112202811A (en) * 2020-10-26 2021-01-08 国网四川省电力公司信息通信公司 Data safety transmission method and system for information communication system
CN112597463A (en) * 2020-12-31 2021-04-02 中国工商银行股份有限公司 Database data processing method, device and system
CN113158153A (en) * 2021-05-19 2021-07-23 杭州市电力设计院有限公司余杭分公司 Reading authentication management system based on intelligent power grid database

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384027A (en) * 2016-09-05 2017-02-08 四川长虹电器股份有限公司 User identity recognition system and recognition method thereof
CN110430179A (en) * 2019-07-26 2019-11-08 西安交通大学 A kind of control method and system for intranet and extranet secure access
CN111756752A (en) * 2020-06-24 2020-10-09 北京金山云网络技术有限公司 Method and device for controlling access authority of database and electronic equipment
CN112202811A (en) * 2020-10-26 2021-01-08 国网四川省电力公司信息通信公司 Data safety transmission method and system for information communication system
CN112597463A (en) * 2020-12-31 2021-04-02 中国工商银行股份有限公司 Database data processing method, device and system
CN113158153A (en) * 2021-05-19 2021-07-23 杭州市电力设计院有限公司余杭分公司 Reading authentication management system based on intelligent power grid database

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
赵立新: "《移动互联网时代的智能硬件安全探析》", 30 June 2019, 中国财富出版社 *
马睿: "《大话云计算》", 31 October 2020, 机械工业出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225387A (en) * 2022-07-21 2022-10-21 济宁简约信息技术有限公司 Data security tamper-proof method and system based on big data and cloud platform
CN116975076A (en) * 2023-07-28 2023-10-31 深圳市丕微科技企业有限公司 Multi-terminal interactive data transmission control method and system
CN116975076B (en) * 2023-07-28 2024-05-07 深圳市丕微科技企业有限公司 Multi-terminal interactive data transmission control method and system

Similar Documents

Publication Publication Date Title
US11700264B2 (en) Systems and methods for role-based computer security configurations
CN110414268B (en) Access control method, device, equipment and storage medium
CN111416811A (en) Unauthorized vulnerability detection method, system, equipment and storage medium
CN111865885B (en) An access control method, apparatus, device and storage medium
US20190124100A1 (en) Robotic process automation resource insulation system
CN114036489A (en) Information security management method and system based on big data
KR101552950B1 (en) direct access management system for a server and network device
CN111031014B (en) Method, device and equipment for evaluating host risk of network security system
CN111444093B (en) Method and device for determining quality of project development process and computer equipment
CN112231232B (en) Method, device and equipment for determining test data model and generating test data
US10089463B1 (en) Managing security of source code
CN105049445B (en) A kind of access control method and free-standing access controller
KR102304237B1 (en) compliance management system through automatic diagnosis of infrastructure asset threat and method therefor
CN113923207B (en) Computer network monitoring method and terminal
US20250086298A1 (en) Tamper-proof data protection method and system
CN101324913B (en) Method and apparatus for protecting computer file
US11533315B2 (en) Data transfer discovery and analysis systems and related methods
US20230410125A1 (en) Blockchain-based transparent supply chain authentication method and apparatus, and device and medium
KR102488337B1 (en) Method and apparatus for managing digital information using digital forensic
CN114218593B (en) Information security detection method based on office equipment
CN115374430B (en) Information leakage detection method and device, storage medium and electronic device
US12079096B2 (en) Data restore testing
CN117786724A (en) Rule-based network sensitive data encryption method and system
CN115964741A (en) Privacy calculation method, device, equipment and medium based on secure memory
CN116244733A (en) Data processing method and device based on zero trust model and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination