CN115640606A - Data visualization method and system based on safety - Google Patents

Data visualization method and system based on safety Download PDF

Info

Publication number
CN115640606A
CN115640606A CN202211333710.7A CN202211333710A CN115640606A CN 115640606 A CN115640606 A CN 115640606A CN 202211333710 A CN202211333710 A CN 202211333710A CN 115640606 A CN115640606 A CN 115640606A
Authority
CN
China
Prior art keywords
data
sensitive
field
fields
desensitization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211333710.7A
Other languages
Chinese (zh)
Inventor
杨虎军
王煜
王志刚
林文辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202211333710.7A priority Critical patent/CN115640606A/en
Publication of CN115640606A publication Critical patent/CN115640606A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a data visualization method and a system based on safety, wherein the method comprises the steps of identifying a data field in data to be processed, and automatically setting a sensitive data label or a sensitive data grade of a sensitive field in the data field based on an identification result; extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching a desensitization rule corresponding to the extracted sensitive data label of the sensitive field, and performing dynamic desensitization on the sensitive field based on the desensitization rule to acquire a desensitization data field associated with the sensitive field; and displaying the data field, the sensitive field and the desensitization data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitization data field.

Description

Data visualization method and system based on safety
Technical Field
The invention relates to the technical field of data security processing, in particular to a data visualization method and system based on security.
Background
With the explosive growth of user data in modern society, the data has various characteristics, and massive data processing becomes possible by big data. When the big data era comes, data is not only transmitted to a display end to be displayed to a user, but also massive data information needs to be efficiently processed and analyzed. On the other hand, as the breadth and depth of social activities continue to expand, the amount of data generated increases and the data dimensions continue to expand, the data sources are scattered and inconsistent, the data quality is poor, and management is poor.
Prior art 1 (CN 110955897A) discloses a software development safety management and control visualization method and system based on big data, where prior art 1 collects safety data of node input and output objects by manually monitoring or setting a data acquisition probe for a node of software to be developed; and storing the collected safety data in a safety database unit in a standardized manner through a safety data model, extracting the safety data, calculating a safety value according to the safety data model, and graphically displaying the safety value. In the prior art 1, manual participation is needed for processing data, and the safety of the data is difficult to ensure.
Prior art 2 (CN 110007989A) discloses a data visualization platform system, which presents different types of data in various and appropriate ways through a constructed visualization platform, and can effectively realize communication between people and data. The scheme disclosed in reference 2 does not perform secure processing on data, and cannot ensure the security of the data.
Prior art 3 (CN 109377439A) discloses a system and a method for managing city safety information and a data processing center, which are used to solve the problem of low accuracy of the existing city safety analysis results. The scheme disclosed in reference 3 does not relate to security of processing data.
Therefore, a technique is needed to enable security-based data visualization.
Disclosure of Invention
The technical scheme of the invention provides a data visualization method and system based on safety, which aim to solve the problem of safely visualizing data.
In order to solve the above problem, the present invention provides a security-based data visualization method, including:
identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and displaying the data field, the sensitive field and the desensitization data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitization data field.
Preferably, the method further comprises the following steps:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, the identifying data fields in the data to be processed includes:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
Preferably, the method further comprises encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
Preferably, the displaying of the tree structure for the data field, the sensitive field and the desensitized data field includes:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
In another aspect of the invention, the invention provides a security-based data visualization system, the system comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
the data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and the sensitive data monitoring unit is used for displaying the tree structures of the data fields, the sensitive fields and the desensitized data fields based on the incidence relation among the data fields, the sensitive fields and the desensitized data fields.
Preferably, the sensitive data setting unit is further configured to:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, the sensitive data setting unit is configured to identify a data field in the data to be processed, and is further configured to:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
Preferably, the system further comprises a data asset encryption unit for:
encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
Preferably, the sensitive data monitoring unit is configured to perform tree structure exhibition on the data field, the sensitive field, and the desensitization data field, and is further configured to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
The technical scheme of the invention provides a data visualization method and a system based on safety, wherein the method comprises the steps of identifying a data field in data to be processed, and automatically setting a sensitive data label or a sensitive data grade of a sensitive field in the data field based on an identification result; extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the sensitive data labels of the extracted sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields; and displaying the tree structure of the data field, the sensitive field and the desensitization data field based on the incidence relation among the data field, the sensitive field and the desensitization data field. The technical scheme of the invention can process and analyze data under any scene service, and simultaneously ensure the safety of the data. The technical scheme of the invention not only realizes the visualization of the data, but also ensures the safety of the data in the process of processing and displaying the data. According to the technical scheme, the processes of data acquisition, processing, extraction and display do not need manual direct monitoring, but data desensitization and encryption are realized in a program compiling mode, so that the situation that an ordinary user cannot operate and process data in the system using process is ensured, and the safety of the data is ensured. The user can check and analyze the data in different dimensions in the visualization module.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
FIG. 1 is a flow diagram of a security-based data visualization method according to a preferred embodiment of the present invention;
FIG. 2 is a block diagram of a security-based data visualization system in accordance with a preferred embodiment of the present invention;
FIG. 3 is a flow chart of sensitive data identification according to a preferred embodiment of the present invention;
FIG. 4 is a flow diagram of data desensitization according to a preferred embodiment of the present invention; and
fig. 5 is a schematic diagram of a group optimization structure according to a preferred embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings are not intended to limit the present invention. In the drawings, the same unit/element is denoted by the same reference numeral.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 shows a security-based data visualization method according to an embodiment of the present invention, in which modules such as sensitive data monitoring and analysis, sensitive data distribution, and the like are combined with a graph by using the modules in a coordinated manner, so that dimensional data can be edited and viewed comprehensively and conveniently. At present, data visualization is realized on the market mainly based on technologies such as Echarts and AntV-X6 graph editing engines, and the technologies have good stability and expression effect after long-term use and verification. By adopting desensitization, encryption algorithm and open source visualization technology, the invention not only ensures the data security, but also can look up and analyze data such as sensitive data monitoring, sensitive data access logs and the like, and is convenient for users to efficiently manage the data.
As shown in fig. 1, the present invention provides a security-based data visualization method, which includes:
step 101: identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
preferably, the method further comprises the following steps:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
Preferably, identifying the data field in the data to be processed includes:
and whether the sensitive field is in compliance or not is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
The invention firstly obtains the log information of enterprise users such as tax numbers, addresses and the like, stores the log information in a data warehouse, and acquires, cleans, standardizes and extracts user data through an acquisition module. And finally, displaying the data for the user in a graphical image mode. The data security management runs through the whole data management process, various data security management measures such as encryption, desensitization, fuzzification processing, database authorization monitoring and the like of private data are provided, the safe operation of the data is guaranteed in an all-round mode, and the structure diagram of the data security management system is shown in figure 2.
The sensitive data setting module comprises a sensitive data label, sensitive level setting and sensitive data identification. Firstly, data is labeled, a sensitive data label is set for a field, the value of the field can be intelligently scanned, and rules corresponding to the sensitive label are matched for batch encryption and desensitization. And data identification and marking can be carried out according to the set sensitivity level and the set sensitivity label. The method comprises the following steps: manual marking, which can perform condition filtering on the data to be filtered; the sensitive data needing to be marked are automatically identified and intelligently identified, and the sensitive data identification process is shown as the attached figure 3.
The method can manually mark the sensitive data to be marked, select the corresponding data assets, perform condition filtering on the data to be filtered, and manually identify the data by adding the sensitive data label to be marked.
The method can intelligently identify the sensitive data to be marked, select the corresponding data asset and add the sensitive data label to be marked, and the system can determine the sensitive data label with the matching degree of more than 70% with 16 built-in sensitive data labels according to the built-in matching rules, and can intelligently identify the sensitive data label by clicking and scanning.
Step 102: extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
step 103: matching desensitization rules corresponding to the sensitive data labels of the extracted sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields;
the sensitive data desensitization module encrypts the data assets according to the sensitive level or picks up the data assets in batches according to the sensitive data labels, and picks up all sensitive fields meeting the sensitive data requirements under the asset catalogues. Dynamic desensitization is then performed according to the rules of the sensitivity level or sensitive data tags. And an automatic identification algorithm is adopted for the user identity card number, the telephone number, the tax number and the like, and the identification is provided for the regulatory information. An identity card: three recognition algorithms isValidate18IdCard, isIdCard, ishmtIdCard are provided. Wherein the isValidate18IdCard recognizes the qualified inward-oriented identification number before desensitization, the isIdCard recognizes the inward-oriented identification number after desensitization, and the ishMtIdCard recognizes the identification numbers of the Australian Hongkong district before and after desensitization, and the desensitization process is shown in figure 4.
The invention can build or check all desensitization rules, and build desensitization rules corresponding to specific sensitive data labels, and desensitization rules with the same name can not be set under the same sensitive data label.
The invention sets a group on the main interface, and can put the data of the same series under one group.
Newly created desensitization data desensitizes individual data. And selecting a data asset set needing desensitization, selecting a desensitization rule, and clicking to view data after storage to see desensitization effect. For example, the desensitization rule is set to four x's in the middle of the cell number.
Step 104: and displaying the tree structure of the data field, the sensitive field and the desensitization data field based on the incidence relation among the data field, the sensitive field and the desensitization data field.
Preferably, the method further comprises encrypting the sensitive data:
and selecting sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
The sensitive data encryption module dynamically encrypts assets through a built-in algorithm, and can selectively encrypt certain roles and users during encryption. A reserved format encryption algorithm is used. For an 11-digit mobile phone number in the form of 13801110543, the number remains 11 after encryption. The initial three digits of the mobile phone number are 130-199, and the rest 8 digits are random. The specific reserved format encryption algorithm is implemented as follows, and the following is a specific function description:
public long fpe_tel_encrypt(int m,int round,long input,String key)
public long fpe_tel_decrypt(int m,int round,long input,String key)
inputting a description:
int m: the category parameters of the format encryption algorithm are reserved, and the algorithm needs to be set to be an odd number;
int round: encryption and decryption rounds, wherein encryption and decryption parameters need to be consistent;
long input: data to be operated on;
string key: the SM4 algorithm uses a secret key, a 32-bit 16-ary number.
Preferably, the tree structure presentation of the data field, the sensitive field and the desensitized data field includes:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
The sensitive data monitoring module adopts an open-source AntV-X6 graph editing engine, uses a layout algorithm provided by AntV-X6 to realize the optimization of the group, and realizes the layout, rendering and sideline linkage of father and son group nodes by combining the group on the basis of hierarchical layout. In the process of data standardization processing, a large amount of metadata, data assets and relevance among sensitive data fields exist, and in order to facilitate display for users, the dependency relationship among different dimensional data is displayed in a tree structure form by adopting the technology. Meanwhile, the metadata can be subjected to root tracing, full-chain analysis and relevance analysis, and the group optimization structure is shown in the attached figure 5.
The invention ensures the safety and integrity of the data in the whole life cycle process of collecting, processing and extracting and displaying the data; the invention solves the problems that the safety data in the existing collected metadata are disordered and have no relevance among the safety data; the invention adopts a layout algorithm provided by open source AntV-X6, realizes the optimization of the group, and realizes the layout, rendering and sideline linkage of the nodes of the father-son-grandson group by combining the group on the basis of hierarchical layout.
According to the invention, through a safe data visualization program, visualization can be realized on data, and the safety of the data is also ensured. According to the invention, from the business scene of an enterprise user operation management mode, user data is acquired, cleaned, processed in a standardized manner and extracted and displayed through modules such as data acquisition, data processing and data visualization. The method not only treats mass data, but also ensures the accuracy of the data. The modules are matched for use, so that modules such as data assets and sensitive data monitoring are combined, dimensional data are edited and checked comprehensively and conveniently, and enterprise user management and operation efficiency is greatly improved.
Fig. 2 is a block diagram of a security-based data visualization system according to a preferred embodiment of the present invention.
As shown in fig. 2, the present invention provides a security-based data visualization system, comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
preferably, the sensitive data setting unit is further configured to:
and performing condition filtering on the data fields in the data to be processed, and setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on the condition filtering result.
Preferably, the sensitive data setting unit is configured to identify a data field in the data to be processed, and is further configured to:
whether the sensitive field is in compliance is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
The data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to obtain desensitization data fields associated with the sensitive fields;
the sensitive data monitoring unit is used for displaying the tree structure of the data field, the sensitive field and the desensitized data field based on the incidence relation among the data field, the sensitive field and the desensitized data field.
Preferably, the sensitive data monitoring unit is configured to perform tree structure exhibition on the data field, the sensitive field, and the desensitized data field, and is further configured to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
Preferably, the system further comprises a data asset encryption unit for:
encrypting the sensitive data:
and selecting sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
The security-based data visualization system provided by the embodiment of the invention corresponds to the security-based data visualization method provided by the embodiment of the invention, and details are not repeated here.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the invention can be realized by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a// the [ device, component, etc ]" are to be interpreted openly as at least one instance of a device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

Claims (10)

1. A security-based data visualization method, the method comprising:
identifying data fields in the data to be processed, and automatically setting sensitive data labels or sensitive data levels of sensitive fields in the data fields based on identification results;
extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels;
matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and displaying the data field, the sensitive field and the desensitized data field in a tree structure based on the incidence relation among the data field, the sensitive field and the desensitized data field.
2. The method of claim 1, further comprising:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
3. The method of claim 1, the identifying data fields in the data to be processed comprising:
and whether the sensitive field is in compliance is identified based on an identification algorithm, and when the sensitive field is in compliance, a sensitive data label or a sensitive data level of the sensitive field in the data field is automatically set based on an identification result.
4. The method of claim 1, further comprising encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
5. The method of claim 1, the exposing of the data field, the sensitive field, and the desensitized data field to a tree structure, comprising:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
6. A security-based data visualization system, the system comprising:
the sensitive data setting unit is used for identifying the data field in the data to be processed and automatically setting the sensitive data label or the sensitive data grade of the sensitive field in the data field based on the identification result;
the data asset desensitization unit is used for extracting corresponding sensitive fields in batches based on the sensitive data labels or the sensitive data levels; matching desensitization rules corresponding to the extracted sensitive data labels of the sensitive fields, and dynamically desensitizing the sensitive fields based on the desensitization rules to acquire desensitization data fields associated with the sensitive fields;
and the sensitive data monitoring unit is used for displaying the tree structures of the data fields, the sensitive fields and the desensitized data fields based on the incidence relation among the data fields, the sensitive fields and the desensitized data fields.
7. The system of claim 6, the sensitive data setting unit further to:
and performing condition filtering on the data fields in the data to be processed, and setting the sensitive data labels or sensitive data levels of the sensitive fields in the data fields based on the condition filtering result.
8. The system of claim 6, the sensitive data setting unit to identify a data field in the data to be processed, and further to:
and identifying whether the sensitive field is in compliance or not based on an identification algorithm, and automatically setting a sensitive data label or a sensitive data level of the sensitive field in the data field based on an identification result when the sensitive field is in compliance.
9. The system of claim 6, further comprising a data asset encryption unit to:
encrypting the sensitive data:
and selecting the sensitive data of the target object, and encrypting the sensitive data based on a preset algorithm.
10. The system of claim 6, the sensitive data monitoring unit to perform tree-structured presentation of the data field, the sensitive field, and the desensitized data field, and further to:
and determining the layout of the tree structure based on an open source AntV-X6 graph editing engine by using a layout algorithm provided by AntV-X6.
CN202211333710.7A 2022-10-28 2022-10-28 Data visualization method and system based on safety Pending CN115640606A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211333710.7A CN115640606A (en) 2022-10-28 2022-10-28 Data visualization method and system based on safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211333710.7A CN115640606A (en) 2022-10-28 2022-10-28 Data visualization method and system based on safety

Publications (1)

Publication Number Publication Date
CN115640606A true CN115640606A (en) 2023-01-24

Family

ID=84947746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211333710.7A Pending CN115640606A (en) 2022-10-28 2022-10-28 Data visualization method and system based on safety

Country Status (1)

Country Link
CN (1) CN115640606A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116541382A (en) * 2023-02-23 2023-08-04 广东东联信创信息技术有限公司 Data management method and system based on data security identification level

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116541382A (en) * 2023-02-23 2023-08-04 广东东联信创信息技术有限公司 Data management method and system based on data security identification level
CN116541382B (en) * 2023-02-23 2023-11-14 邵阳学院 Data management method and system based on data security identification level

Similar Documents

Publication Publication Date Title
CN106572117B (en) A kind of detection method and device of WebShell file
CN110336838B (en) Account abnormity detection method, device, terminal and storage medium
CN105283852A (en) Obfuscating trace data
CN108710564A (en) Source code comprehensive evaluating platform based on big data
CN112446637A (en) Building construction quality safety online risk detection method and system
CN115640606A (en) Data visualization method and system based on safety
CN112765673A (en) Sensitive data statistical method and related device
CN115658080A (en) Method and system for identifying open source code components of software
CN109711849B (en) Ether house address portrait generation method and device, electronic equipment and storage medium
CN113900955A (en) Automatic testing method, device, equipment and storage medium
CN113918467A (en) Financial system testing method, device, equipment and storage medium
CN115758435A (en) External sharing security processing method for company marketing data and related equipment
Acosta et al. City safety perception model based on visual content of street images
CN107430590A (en) Data compare
CN112508541A (en) Portable mobile phone acquisition software system based on training trainee information data acquisition
CN111046382A (en) Database auditing method, device, storage medium and device
CN115828243A (en) Static code flow analysis method based on scanning scheme
CN106528644B (en) Remote sensing data retrieval method and device
CN114416806A (en) Method and device for acquiring power safety knowledge data and computer equipment
CN113221162A (en) Private disease-specific big data privacy protection method and system based on block chain
CN110688645A (en) Big data analysis system based on computer verification code technology
CN112685389A (en) Data management method, data management device, electronic device, and storage medium
CN114630314B (en) Updating method, device, equipment and storage medium of terminal information base
CN116541382B (en) Data management method and system based on data security identification level
CN113344744B (en) Personalized business function calculation method and device for power system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination