CN110049021A - Data of information system safety protecting method and system - Google Patents

Data of information system safety protecting method and system Download PDF

Info

Publication number
CN110049021A
CN110049021A CN201910238005.0A CN201910238005A CN110049021A CN 110049021 A CN110049021 A CN 110049021A CN 201910238005 A CN201910238005 A CN 201910238005A CN 110049021 A CN110049021 A CN 110049021A
Authority
CN
China
Prior art keywords
data
sensitive
checked
request
protecting method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910238005.0A
Other languages
Chinese (zh)
Inventor
李凌
刘育辰
吴国华
宋小芹
张亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI filed Critical China Electric Power Research Institute Co Ltd CEPRI
Priority to CN201910238005.0A priority Critical patent/CN110049021A/en
Publication of CN110049021A publication Critical patent/CN110049021A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a kind of data of information system safety protecting method and systems, including measurement information to be checked is obtained from examining system to be checked;Classify to the measurement information to be checked of acquisition, and all kinds of sensitive datas are marked;When using sorted data, all kinds of sensitive datas occur to using terminal and transmission are monitored, block, and in data sharing and transmission, every request that user is issued or is submitted by authentication rules judge user department rank and requested data content identity authority whether real-time matching, if matching, allow to request, and to allow by it is rear response return data equally carry out matching discrimination by authentication rules, if mismatching, refuse to request.The present invention effectively prevent leaking data, advantageously ensures that data safety.

Description

Data of information system safety protecting method and system
Technical field
The present invention relates to the technical field of information retrieval, refers in particular to a kind of data of information system safety protecting method and be System.
Background technique
With the extensive use of cyberspace being surging forward with information technology, it is being greatly facilitated economy and society development Meanwhile ongoing Security risk and challenge complicated and changeable are brought to us.In recent years, data theft, information leakage event layers It is not poor out.The global common data issued in the recent period according to Gemalto is revealed severity index and is shown, 945 since 2018 Secondary event leads to 4,500,000,000 information leakages, causes economic loss multi-million dollar.To find out its cause, " IBM X-Force prestige in 2018 Side of body information index " survey report shows that having 2/3rds in the event of 2017 annual datas leakage is that organization internal personnel are unintentional Stolen or inside threat causes network attack to cause.
Data resource interconnects, shares opening, so that preventing based on boundary, for the traditional human system of outside invasion I be unequal to it is anti-because these defense systems can not protect the internal leaking data of the formation such as stealing, abuse, neglecting.In addition, with data Encryption and decryption is that the security protection of means can not cope with the mass data processing in explosive growth.Meanwhile simple data are leakage-preventing (DLP) do not accomplish data safety yet, because needing to protect which data on earth, how to accomplish full protection, technology and strategy, system How degree, mechanism cooperate, and these problems solve not yet.
In order to overcome the above problem, Chinese invention patent (CN105516141A) discloses a kind of peace based on operation system Full control platform, the safety control platform include authentication module, access control module, security audit module, have communicated Whole property module, communication security module and data security module.Although the above-mentioned safety that can make operating information system enhances, But the events such as still there is leaking data, distort, seriously affect the privacy and reliability of data.
Summary of the invention
For this purpose, technical problem to be solved by the present invention lies in overcome the problems, such as it is existing there are leaking data, distort, thus One kind is provided and effectively prevent leaking data, data tampering, realizes data safety, controllable data of information system safety protecting method And system.
In order to solve the above technical problems, a kind of data of information system safety protecting method of the invention, includes the following steps: Measurement information to be checked is obtained from examining system to be checked;Classify to the measurement information to be checked of acquisition, and sensitive data is marked; To sorted data in use, all kinds of sensitive datas occur to using terminal and transmission are monitored, block;? When data sharing and transmission, the every request for issuing or submitting to user judges user department rank and institute by authentication rules The identity authority of the data content of request whether real-time matching, if matching, allow to request, and to allow by rear response return Data equally carry out matching discrimination by authentication rules, if mismatch, refuse to request.
In one embodiment of the invention, the data are before use, store sorted data, and store When data are monitored.
In one embodiment of the invention, the data encrypt data, including and be not limited in storage Bright encryption and decryption, dynamic encryption and decryption, fine granularity control extension, ciphertext index, Encryption Algorithm and cipher key technique.
In one embodiment of the invention, the data carry out desensitization process to sensitive data when sharing.
In one embodiment of the invention, after the data are transmitted, data are destroyed, and to destruction data Carry out sensitive data inspection.
In one embodiment of the invention, the data are in use, sharing and transmission link, number leakage-preventing to data It traces to the source according to tracking and the data of every sensitive data inspection acquisition is analyzed, summarize abnormal phenomenon, abnormal behaviour is carried out Monitoring.
In one embodiment of the invention, described when all kinds of sensitive datas are marked, including to structural data Watermark and watermark to unstructured data.
It in one embodiment of the invention, further include that credible tracking, distribution circulation are carried out to marked sensitive data Monitoring and leakage are traced to the source, the embeddable multiple network equipment of sensitivity label means of identification.
In one embodiment of the invention, when the measurement information to be checked of described pair of acquisition is classified, according to the more of data Dimensional feature and its logic association of mutual objective reality are classified.
The invention also discloses a kind of data of information system security protection systems, including data capture unit, data classification Hierarchical policy unit and anti-data-leakage unit, wherein the data capture unit with examining system to be checked for connecting and from institute It states and obtains measurement information to be checked at examining system to be checked;The data classification hierarchical policy unit be used for the measurement information to be checked of acquisition into Row classification, and all kinds of sensitive datas are marked;The anti-data-leakage unit is included in and uses sorted data When, all kinds of sensitive datas occur to using terminal and transmission are monitored, block;It is right in data sharing and transmission Every request that user issues or submits is judged the body of user department rank Yu requested data content by authentication rules Part permission whether real-time matching, if matching, allows to request, and to allowing the data returned by rear response equally to advise by authentication Matching discrimination is then carried out, if mismatching, refuses to request.
The above technical solution of the present invention has the following advantages over the prior art:
Data of information system safety protecting method of the present invention and system, to sorted data in use, to using All kinds of sensitive datas that terminal occurs and transmission are monitored, block;In data sharing and transmission, user is issued Or the every request submitted by authentication rules judge user department rank and requested data content identity authority whether Real-time matching, to realize that the fine granularity permission for accessing data to each user of service of information system controls, due to from acquisition, converging Always, it in the landing safeguard procedures on each node such as use, sharing, transmission, realizes to sensitivity numbers all kinds of in data Life cycle According to it is comprehensive control, it is leakage-preventing, thus formed a closed-loop data security protection system, effectively prevent leaking data, data to usurp The events such as change to occur, realizes the safely controllable of data.
Detailed description of the invention
In order to make the content of the present invention more clearly understood, it below according to specific embodiments of the present invention and combines Attached drawing, the present invention is described in further detail, wherein
Fig. 1 is the flow chart of data of information system safety protecting method of the present invention;
Fig. 2 is the schematic diagram of data of information system security protection system of the present invention.
Figure of description description of symbols: 11- data capture unit, 12- data classification hierarchical policy unit, 13- data are anti- Leakage unit.
Specific embodiment
Embodiment one
As shown in Figure 1, including the following steps: step S1 the present embodiment provides a kind of data of information system safety protecting method: from Measurement information to be checked is obtained at examining system to be checked;Step S2: classifying to the measurement information to be checked of acquisition, and carries out to sensitive data Label;Step S3: to sorted data in use, to using terminal occur and transmission all kinds of sensitive datas carry out Monitoring blocks;In data sharing and transmission, the every request for issuing or submitting to user judges user by authentication rules The identity authority of department's rank and requested data content whether real-time matching, if matching, allows to request, and to allowing to lead to Later the data for responding return equally carry out matching discrimination by authentication rules, if mismatching, refuse to request.
Data of information system safety protecting method described in the present embodiment in the step S1, obtains from examining system to be checked Measurement information to be checked, to be conducive to collect data;In the step S2, classify to the measurement information to be checked of acquisition, and to quick Sense data are marked, and are conducive to raising system general safety protective capacities, guarantee electric power monitoring system, personal sensitive data etc. The safety of significant data;In the step S3, to sorted data in use, occur to using terminal and transmission All kinds of sensitive datas are monitored, block;In data sharing and transmission, the every request for issuing or submitting to user is by mirror Power rule judge whether real-time matching is permitted if matching for the identity authority of user department rank and requested data content Perhaps it requests, and to allowing the data returned by rear response equally to carry out matching discrimination by authentication rules, further determines that data The permission of access is refused to request if mismatching, to realize that the fine granularity for accessing data to each user of service of information system is weighed Limit control, due to from acquiring, summarize, use, sharing, in the landing safeguard procedures on each node such as transmission, realize complete to data The comprehensive of all kinds of sensitive datas manages, is leakage-preventing in life cycle, to form a closed-loop data security protection system, effectively It prevents the events such as leaking data, data tampering from occurring, realizes the safely controllable of data.
The data need to classify to the measurement information to be checked of acquisition after the completion of acquisition.Specifically, according to data Multidimensional characteristic and its logic association of mutual objective reality are classified.And data are done classify when, need to be according to data Principle of classification is cross-border to multi-disciplinary data sharing, data etc. to take the different precautionary measures, the protection of Lai Tigao system general safety Ability guarantees the safety of the significant datas such as electric power monitoring system, personal sensitive data.In addition, in the measurement information to be checked to acquisition When being classified, need that all kinds of sensitive datas are marked.Specifically, described when all kinds of sensitive datas are marked, packet The watermark to structural data and the watermark to unstructured data are included, to track and to trace to the source.The data are anti- Leakage unit further includes carrying out credible tracking, distribution circulation monitoring and leakage to marked sensitive data to trace to the source, sensitivity label The embeddable multiple network equipment of means of identification, including each DLP equipment and all kinds of checking tools.
The data are before use, also need to store sorted data, and while storing is monitored data, To it is advantageously ensured that all kinds of sensitive informations store compliance.Specifically, link is stored in data, to database, application service The content stored in the equipment such as device, big data storage, cloud storage is monitored.The sorted data are stored in network data Leakage protective net is shut (abbreviation network DLP), and the network DLP is mainly used for bypass (or concatenation) and is mounted on network exit, Pass through and monitor Email (smtp protocol, IMAP protocol), WEB(HTTP agreement), file transmission (File Transfer Protocol) and network share It transmitting (SMB agreement), monitoring network, identification sensitive data forms risk case and is uploaded to uniform data management platform, And leaking data is operated and implements to block, to be conducive to ensure data storage security.
In addition, sensitive data transmits in a network, the security threats such as man-in-the-middle attack, data eavesdropping, identity forgery are faced. In order to guarantee transmission safety of the data on network, between large data center and I and II system pushing system, enlarging system, region To guarantee secure communication between the difference security domain of inside and outside.Data are transmitted using special line, external network portion core application can be with It is accessed using VPN, https agreement is supported in WEB access.
In order to prevent leakage of data caused by stored in clear, break through Border Protection external hackers attack, from inside The data theft and bypass valid application system of high permission user directly accesses the database, and solves the leakage of database sensitive data Problem, the data encrypt data in storage, including and are not limited to transparent encryption and decryption, dynamic encryption and decryption, fine granularity Control extension, ciphertext index, Encryption Algorithm and cipher key technique, the control of flexible permission and decentralized management.It is wherein described transparent Encryption means that encryption does not need too many additional management, is mainly reflected in two aspects: firstly, application program is transparent, user Or developer does not need to do application program any transformation;Followed by encryption and decryption is transparent, for having ciphertext access authority User carries out encryption and decryption automatically, for lacking user's denied access of ciphertext access authority;The dynamic encryption and decryption is to being stored in Data in database carry out flexible automation dynamic encryption decryption in real time, do not need artificially to interfere, fully achieve to data Secure storage, safe handling, prevent information concerning security matters.User time is both saved in this way, has also achieved the purpose that protect file.Only User is wanted to have the operation to encryption data, then encryption data will be automatically encrypted or decrypt, user is imperceptible plus solves The presence of close process;In the fine granularity control extension, data base encryption rank flexibly configurable encrypts for whole library, table encrypts, Row encryption, is based on the various ways such as specified conditions encryption at column encryption.User can flexible choice encryption side according to actual needs Formula, system find optimal balance point between the safety and database performance of data, while guaranteeing that sensitive data is safe, It ensure that the performance of database to the greatest extent;In the ciphertext index, index will be ineffective in plain text after data encryption, causes Even if only inquiring a data to be also required to once be decrypted all data, this undoubtedly increases the time of inquiry.System is adopted With ciphertext index, inquiry operation be decrypted, which may not necessarily to all data, can inquire corresponding data, greatly improve Cryptogram search speed;It, can flexible choice 3DES, AES, SM4 scheduling algorithm in the Encryption Algorithm and cipher key technique.System is using more Grade cipher key technique.Each field possesses different, independent, unique column keys, carries out encrypting and decrypting control to field.Institute Column key be to be generated by master key, control column key encrypting and decrypting.Master key is stored within hardware, and guarantee will not be stolen It takes and destroys, column key is stored in encrypted database.Guarantee that encryption data will not be broken by double secret key technology Solution increases safety.
To sorted data in use, occur to the using terminal and all kinds of sensitive datas of transmission are monitored, Including entering mail transmission/reception and various external equipments such as USB flash disk, CD, printer, camera, screenshotss etc. channel to sensitive data Monitoring and blocking.In addition, the target of security protection is to ensure that data are being accessed within the scope of authority, are handling, prevent data from meeting with It steals, leak, damage.To realize this target, specifically, for database access: database account management is database peace The wide-scale distribution of one of full greateset risk, database account password can bring high security risk.Database must use Complicated password and regular Change Password strategy reinforce database access safety comprehensively.For not entering for the first time or for a long time The Association Identity feature of database carries out risk alarm, the Database Intrusion behavior having found that it is likely that at the first time.For sensitive number According to can also be with automatic sensing and covering: using all kinds of sensitive informations rules, (passing through scanning number in such a way that automatically scanning is found According to field, obtain field contents sampling matching sensitive information Rule sensitive information) efficiently, conveniently, comprehensively obtain it is sensitive Information.
The data also need to carry out desensitization process to sensitive data when sharing.When carrying out desensitization process to sensitive data: When carrying out electric network data displaying, application system needs to carry out Fuzzy processing to sensitive data, especially to name, cell-phone number The individual subscribers sensitive information such as code, identification card number is needed when needing to inquire original sensitive information using the secondary mirror of progress Power.Operation system or background management system need to have data desensitization function in display data, or the special data of insertion take off Quick technical tool.When exploitation, test, training or the data mining algorithm that quasi- production district carries out system are verified, need to production Data carry out batch desensitization, import quasi- production district environment.The data desensitization of logarithm and text type is realized by desensitization technology, Support a variety of desensitization modes, including irreversible encryption, random, the mask replacement in section etc..Desensitization technology needs can automatically scanning hair Existing sensitive information realizes that efficiently, conveniently, accurately information desensitizes.
In addition, in data sharing link, establishes complete data authentication rule and advantageously form information safety defense, and institute Authentication rules are stated to belong on data authentication mechanism framework.Specifically, data authentication mechanism framework setting each application server it Between data safety network gateway on, control the mutual access between each application.The user identity and facility information for issuing request can bands Application server where crossing enters the data authentication mechanism on data safety network gateway, cooperates the data classification mark being embedded in advance Library, data automatic grading rule base, system identity authority library and authentication rules library, with user right and place equipment, using and The security level classification of Service Privileges real-time matching requested data content is made by authentication rules and being sentenced to the response of user's request And guide gateway to execute determined response, and to allowing the data returned by rear response equally to carry out by authentication rules surely With discrimination, realize that the accurate permission to each user of service of information system, equipment, application access in data content granularity controls. Response judgement in authentication rules includes: complete opening, fractional open, desensitizing opens, decrypt open, encryption, do not open and (refuse Absolutely) etc., response execution mechanism is directed toward corresponding association handling device.
It is described in data sharing, it is also necessary to guarantee data integrity and trackability, electronic signature and time can be used The relevant technologies such as stamp are realized.Generally acknowledged reliable electronic signature is realized based on PKI and eap-message digest technology at present, passes through number Word signature and the service for checking credentials can ensure the integrality of data itself, realize the resisting denying of related service operation.
The data are in use, sharing and transmission link, and, data tracing leakage-preventing to data is traced to the source and every sensitive data It checks that the data obtained are analyzed, summarizes abnormal phenomenon, abnormal behaviour is monitored, to be conducive to find peace in time Full hidden danger.After the data are transmitted, data are destroyed, and carry out sensitive data inspection to data are destroyed, is realized thorough It destroys without hidden danger at bottom.
Embodiment two
As shown in Fig. 2, the present embodiment provides a kind of data of information system security protection system, including data capture unit 11, number According to classification hierarchical policy unit 12 and anti-data-leakage unit 13, wherein the data capture unit 11 is used for and system to be detected System connection simultaneously obtains measurement information to be checked from the examining system to be checked;The data classification hierarchical policy unit 12 is used for acquisition Measurement information to be checked classify, and all kinds of sensitive datas are marked;The anti-data-leakage unit 13, be included in point Data after class are in use, all kinds of sensitive datas occur to using terminal and transmission are monitored, block, and in number When according to sharing and transmission, the every request for issuing or submitting to user is judged user department rank and is asked by authentication rules The identity authority for the data content asked whether real-time matching, if matching, allow to request, and to allow by it is rear response return Data equally carry out matching discrimination by authentication rules, if mismatching, refuse to request.
Data of information system security protection system described in the present embodiment, including the classification of data capture unit 11, data classification Policy unit 12 and anti-data-leakage unit 13, wherein the data capture unit 11 for connect with examining system to be checked and from Measurement information to be checked is obtained at the examining system to be checked, to be conducive to collect data;The data classification hierarchical policy unit 12 For classifying to the measurement information to be checked of acquisition, and all kinds of sensitive datas are marked, are conducive to raising system and integrally pacify Full protection ability guarantees the safety of the significant datas such as electric power monitoring system, personal sensitive data;The anti-data-leakage unit 13, including to sorted data in use, to using terminal occur and transmission all kinds of sensitive datas be monitored, It blocks, and in data sharing and transmission, the every request for issuing or submitting to user judges user by authentication rules Whether real-time matching allows to ask identity authority between department's rank and requested data content classification if matching It asks, and to allowing the data returned by rear response equally to carry out matching discrimination by authentication rules, if mismatching, refusal is asked Ask, to realize that the fine granularity permission for accessing data to each user of service of information system controls, due to from acquire, summarize, using, Share, in the landing safeguard procedures on each node such as transmission, realize in data Life cycle all kinds of sensitive datas it is comprehensive It manages, is leakage-preventing, to form a closed-loop data security protection system, effectivelying prevent the events such as leaking data, data tampering Occur, realizes the safely controllable of data.
The data capture unit 11 is mainly used for being acquired data, can be computer or server.
Obviously, the above embodiments are merely examples for clarifying the description, does not limit the embodiments.For For those of ordinary skill in the art, other different form variations can also be made on the basis of the above description or are become It is dynamic.There is no necessity and possibility to exhaust all the enbodiments.And obvious variation extended from this or change It moves still within the protection scope of the invention.

Claims (10)

1. a kind of data of information system safety protecting method, which comprises the steps of:
Step S1: measurement information to be checked is obtained from examining system to be checked;
Step S2: classify to the measurement information to be checked of acquisition, and sensitive data is marked;
Step S3: to sorted data in use, to using terminal occur and transmission all kinds of sensitive datas carry out Monitoring blocks;In data sharing and transmission, the every request for issuing or submitting to user judges user by authentication rules The identity authority of department's rank and requested data content whether real-time matching, if matching, allows to request, and to allowing to lead to Later the data for responding return equally carry out matching discrimination by authentication rules, if mismatching, refuse to request.
2. data of information system safety protecting method according to claim 1, it is characterised in that: the data are using Before, data are monitored when storing, and storing to sorted data.
3. data of information system safety protecting method according to claim 2, it is characterised in that: the data are storing When, data are encrypted, including and be not limited to transparent encryption and decryption, dynamic encryption and decryption, fine granularity control extension, ciphertext index, Encryption Algorithm and cipher key technique.
4. data of information system safety protecting method according to claim 1, it is characterised in that: the data are being shared When, desensitization process is carried out to sensitive data.
5. data of information system safety protecting method according to claim 1, it is characterised in that: the data are transmitted Afterwards, data are destroyed, and carry out sensitive data inspection to data are destroyed.
6. data of information system safety protecting method according to claim 1, it is characterised in that: the data use, Share and transmission link, the data that, data tracing leakage-preventing to data is traced to the source and every sensitive data inspection obtains analyzed, Abnormal phenomenon is summarized, abnormal behaviour is monitored.
7. data of information system safety protecting method according to claim 1, it is characterised in that: described to all kinds of sensitive numbers When according to being marked, including the watermark to structural data and to the watermark of unstructured data.
8. data of information system safety protecting method according to claim 1, it is characterised in that: further include to marked Sensitive data carries out credible tracking, distribution circulation monitoring and leakage and traces to the source, and the embeddable multiple network of sensitivity label means of identification is set It is standby.
9. data of information system safety protecting method according to claim 1, it is characterised in that: described pair acquisition it is to be checked When measurement information is classified, classify according to the multidimensional characteristic of data and its logic association of mutual objective reality.
10. a kind of data of information system security protection system, it is characterised in that: be classified including data capture unit, data classification Policy unit and anti-data-leakage unit, wherein the data capture unit for connect with examining system to be checked and from it is described to Measurement information to be checked is obtained at detection system;The data classification hierarchical policy unit is for dividing the measurement information to be checked of acquisition Class, and all kinds of sensitive datas are marked;The anti-data-leakage unit, is included in sorted data in use, right All kinds of sensitive datas that using terminal occurs and transmission are monitored, block;In data sharing and transmission, to user The every request for issuing or submitting is judged the identity authority of user department rank Yu requested data content by authentication rules Whether real-time matching, if matching, allow to request, and to allow by it is rear response return data equally carried out by authentication rules Matching distinguishes, if mismatching, refuses to request.
CN201910238005.0A 2019-03-27 2019-03-27 Data of information system safety protecting method and system Pending CN110049021A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910238005.0A CN110049021A (en) 2019-03-27 2019-03-27 Data of information system safety protecting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910238005.0A CN110049021A (en) 2019-03-27 2019-03-27 Data of information system safety protecting method and system

Publications (1)

Publication Number Publication Date
CN110049021A true CN110049021A (en) 2019-07-23

Family

ID=67275402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910238005.0A Pending CN110049021A (en) 2019-03-27 2019-03-27 Data of information system safety protecting method and system

Country Status (1)

Country Link
CN (1) CN110049021A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851864A (en) * 2019-11-08 2020-02-28 国网浙江省电力有限公司信息通信分公司 Sensitive data automatic identification and processing method and system
CN111046405A (en) * 2019-12-12 2020-04-21 国家电网有限公司大数据中心 Data processing method, device, equipment and storage medium
CN111079174A (en) * 2019-11-21 2020-04-28 中国电力科学研究院有限公司 Power consumption data desensitization method and system based on anonymization and differential privacy technology
CN111083135A (en) * 2019-12-12 2020-04-28 深圳天源迪科信息技术股份有限公司 Method for processing data by gateway and security gateway
CN111191231A (en) * 2019-12-30 2020-05-22 绵阳师范学院 Safety protection method and system for sensitive information
CN111756732A (en) * 2020-06-23 2020-10-09 北京明朝万达科技股份有限公司 Data scanning and control method and device, electronic equipment and readable storage medium
CN111787029A (en) * 2020-07-29 2020-10-16 浙江德迅网络安全技术有限公司 Advanced network security threat mitigation for https protocol deep monitoring
CN111914300A (en) * 2020-09-21 2020-11-10 安徽长泰信息安全服务有限公司 Document encryption device and method for preventing file leakage
CN111914035A (en) * 2020-09-21 2020-11-10 安徽长泰信息安全服务有限公司 Data interaction encryption system of distributed database
CN112115438A (en) * 2020-09-15 2020-12-22 安徽长泰信息安全服务有限公司 Data security protection device for data dynamic fuzzification server
CN112115493A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data leakage protection system based on data acquisition
CN112231715A (en) * 2020-11-11 2021-01-15 福建有度网络安全技术有限公司 Data leakage warning method and related device
CN112487458A (en) * 2020-12-09 2021-03-12 浪潮云信息技术股份公司 Implementation method and system using government affair open sensitive data
CN112560027A (en) * 2020-12-18 2021-03-26 福建中信网安信息科技有限公司 Data safety monitoring system
CN112580110A (en) * 2020-12-23 2021-03-30 国家电网有限公司大数据中心 Data resource sharing safety method based on watermark technology
CN112613069A (en) * 2020-12-23 2021-04-06 国家电网有限公司大数据中心 Automatic desensitization method based on negative list data resources
CN112637142A (en) * 2020-12-08 2021-04-09 中国南方电网有限责任公司超高压输电公司 Security threat tracing method and system based on power network environment
CN113095234A (en) * 2021-04-15 2021-07-09 泉州文学士信息科技有限公司 Safety technology prevention monitoring identification information system and method thereof
CN113727345A (en) * 2021-08-30 2021-11-30 展讯半导体(成都)有限公司 Wireless network connection access control method, device, storage medium and terminal
CN113988753A (en) * 2021-10-27 2022-01-28 中国人民解放军国防大学联合勤务学院联合勤务管理系 Cross-network data exchange system and method based on network isolation state
CN115001856A (en) * 2022-07-18 2022-09-02 国网浙江省电力有限公司杭州供电公司 Network security portrait and attack prediction method based on data processing
WO2023279837A1 (en) * 2021-07-09 2023-01-12 华为云计算技术有限公司 Method and apparatus for adding watermark in data, and related device
CN116257862A (en) * 2022-12-21 2023-06-13 上海云砺信息科技有限公司 Data storage system based on data hierarchical classification and database transparent encryption and decryption method
CN116796335A (en) * 2023-06-20 2023-09-22 广东网安科技有限公司 Intelligent protection method for network security
CN113988753B (en) * 2021-10-27 2024-05-17 中国人民解放军国防大学联合勤务学院联合勤务管理系 Cross-network data exchange system and method based on network isolation state

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796290A (en) * 2015-04-24 2015-07-22 广东电网有限责任公司信息中心 Data security control method and data security control platform
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
CN105681276A (en) * 2015-12-25 2016-06-15 亿阳安全技术有限公司 Sensitive information leakage active monitoring and responsibility confirmation method and device
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 A kind of data leakage prevention method based on key technology
US20180343257A1 (en) * 2017-05-25 2018-11-29 Bank Of America Coporation Data Leakage and Information Security Using Access Control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796290A (en) * 2015-04-24 2015-07-22 广东电网有限责任公司信息中心 Data security control method and data security control platform
CN104809405A (en) * 2015-04-24 2015-07-29 广东电网有限责任公司信息中心 Structural data asset leakage prevention method based on hierarchical classification
CN105681276A (en) * 2015-12-25 2016-06-15 亿阳安全技术有限公司 Sensitive information leakage active monitoring and responsibility confirmation method and device
US20180343257A1 (en) * 2017-05-25 2018-11-29 Bank Of America Coporation Data Leakage and Information Security Using Access Control
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 A kind of data leakage prevention method based on key technology

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851864A (en) * 2019-11-08 2020-02-28 国网浙江省电力有限公司信息通信分公司 Sensitive data automatic identification and processing method and system
CN111079174A (en) * 2019-11-21 2020-04-28 中国电力科学研究院有限公司 Power consumption data desensitization method and system based on anonymization and differential privacy technology
CN111046405B (en) * 2019-12-12 2023-07-07 国家电网有限公司大数据中心 Data processing method, device, equipment and storage medium
CN111046405A (en) * 2019-12-12 2020-04-21 国家电网有限公司大数据中心 Data processing method, device, equipment and storage medium
CN111083135A (en) * 2019-12-12 2020-04-28 深圳天源迪科信息技术股份有限公司 Method for processing data by gateway and security gateway
CN111191231A (en) * 2019-12-30 2020-05-22 绵阳师范学院 Safety protection method and system for sensitive information
CN111756732A (en) * 2020-06-23 2020-10-09 北京明朝万达科技股份有限公司 Data scanning and control method and device, electronic equipment and readable storage medium
CN111756732B (en) * 2020-06-23 2022-07-12 北京明朝万达科技股份有限公司 Data scanning and control method and device, electronic equipment and readable storage medium
CN111787029A (en) * 2020-07-29 2020-10-16 浙江德迅网络安全技术有限公司 Advanced network security threat mitigation for https protocol deep monitoring
CN111787029B (en) * 2020-07-29 2023-03-17 浙江德迅网络安全技术有限公司 Advanced network security threat mitigation for https protocol deep monitoring
CN112115438A (en) * 2020-09-15 2020-12-22 安徽长泰信息安全服务有限公司 Data security protection device for data dynamic fuzzification server
CN112115493A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data leakage protection system based on data acquisition
CN111914035A (en) * 2020-09-21 2020-11-10 安徽长泰信息安全服务有限公司 Data interaction encryption system of distributed database
CN111914300A (en) * 2020-09-21 2020-11-10 安徽长泰信息安全服务有限公司 Document encryption device and method for preventing file leakage
CN112231715A (en) * 2020-11-11 2021-01-15 福建有度网络安全技术有限公司 Data leakage warning method and related device
CN112637142A (en) * 2020-12-08 2021-04-09 中国南方电网有限责任公司超高压输电公司 Security threat tracing method and system based on power network environment
CN112487458B (en) * 2020-12-09 2023-01-20 浪潮云信息技术股份公司 Implementation method and system using government affair open sensitive data
CN112487458A (en) * 2020-12-09 2021-03-12 浪潮云信息技术股份公司 Implementation method and system using government affair open sensitive data
CN112560027A (en) * 2020-12-18 2021-03-26 福建中信网安信息科技有限公司 Data safety monitoring system
CN112580110A (en) * 2020-12-23 2021-03-30 国家电网有限公司大数据中心 Data resource sharing safety method based on watermark technology
CN112613069A (en) * 2020-12-23 2021-04-06 国家电网有限公司大数据中心 Automatic desensitization method based on negative list data resources
CN113095234A (en) * 2021-04-15 2021-07-09 泉州文学士信息科技有限公司 Safety technology prevention monitoring identification information system and method thereof
WO2023279837A1 (en) * 2021-07-09 2023-01-12 华为云计算技术有限公司 Method and apparatus for adding watermark in data, and related device
CN113727345A (en) * 2021-08-30 2021-11-30 展讯半导体(成都)有限公司 Wireless network connection access control method, device, storage medium and terminal
CN113988753A (en) * 2021-10-27 2022-01-28 中国人民解放军国防大学联合勤务学院联合勤务管理系 Cross-network data exchange system and method based on network isolation state
CN113988753B (en) * 2021-10-27 2024-05-17 中国人民解放军国防大学联合勤务学院联合勤务管理系 Cross-network data exchange system and method based on network isolation state
CN115001856A (en) * 2022-07-18 2022-09-02 国网浙江省电力有限公司杭州供电公司 Network security portrait and attack prediction method based on data processing
CN115001856B (en) * 2022-07-18 2022-10-21 国网浙江省电力有限公司杭州供电公司 Network security portrait and attack prediction method based on data processing
CN116257862A (en) * 2022-12-21 2023-06-13 上海云砺信息科技有限公司 Data storage system based on data hierarchical classification and database transparent encryption and decryption method
CN116257862B (en) * 2022-12-21 2023-10-20 上海云砺信息科技有限公司 Data storage system based on data hierarchical classification and database transparent encryption and decryption method
CN116796335A (en) * 2023-06-20 2023-09-22 广东网安科技有限公司 Intelligent protection method for network security
CN116796335B (en) * 2023-06-20 2024-02-13 广东网安科技有限公司 Intelligent protection method for network security

Similar Documents

Publication Publication Date Title
CN110049021A (en) Data of information system safety protecting method and system
US20210328969A1 (en) Systems and methods to secure api platforms
CN112560027A (en) Data safety monitoring system
CN115733681A (en) Data security management platform for preventing data loss
CN103310161A (en) Protection method and system for database system
CN112905965B (en) Financial big data processing system based on block chain
CN106982204A (en) Credible and secure platform
CN112329042A (en) Big data secure storage system and method
CN111046405B (en) Data processing method, device, equipment and storage medium
CN112100662A (en) Regional data safety monitoring system
CN114218194A (en) Data bank safety system
CN117333026A (en) Risk identification method based on energy big data
CN201805447U (en) Electronic information management platform system of Intranet
CN115643573A (en) Privileged account authentication method and system based on dynamic security environment
CN112380544A (en) Data security protection method of software system
Pan et al. PLC Protection System Based on Verification Separation.
CN112000953A (en) Big data terminal safety protection system
CN113839922B (en) Information safety protection system and method for video monitoring system
CN108134781A (en) A kind of important information data confidentiality monitoring system
National Computer Security Center (US) Glossary of Computer Security Terms
Periasamy et al. Guarding Against Data Breach
CN117272349A (en) Method, system and storage medium for protecting security of relational database
Yao How is Big Data related to information security-A literature review
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
CN116861411A (en) Secure sandbox data protection method and system based on Seccomp mechanism

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190723