CN102968600A - Full life-cycle management method for sensitive data file based on fingerprint information implantation - Google Patents

Full life-cycle management method for sensitive data file based on fingerprint information implantation Download PDF

Info

Publication number
CN102968600A
CN102968600A CN2012104240715A CN201210424071A CN102968600A CN 102968600 A CN102968600 A CN 102968600A CN 2012104240715 A CN2012104240715 A CN 2012104240715A CN 201210424071 A CN201210424071 A CN 201210424071A CN 102968600 A CN102968600 A CN 102968600A
Authority
CN
China
Prior art keywords
sensitive data
sensitive
finger print
print information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104240715A
Other languages
Chinese (zh)
Other versions
CN102968600B (en
Inventor
从正海
杨维永
刘金锁
黄益彬
朱世顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Nari Technology Co Ltd
State Grid Electric Power Research Institute
Original Assignee
State Grid Corp of China SGCC
Nanjing NARI Group Corp
State Grid Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Nanjing NARI Group Corp, State Grid Electric Power Research Institute filed Critical State Grid Corp of China SGCC
Priority to CN201210424071.5A priority Critical patent/CN102968600B/en
Publication of CN102968600A publication Critical patent/CN102968600A/en
Priority to PCT/CN2013/086011 priority patent/WO2014067428A1/en
Application granted granted Critical
Publication of CN102968600B publication Critical patent/CN102968600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a full life-cycle management method for a sensitive data file based on fingerprint information implantation. The method comprises the steps of: implanting the pre-defined fingerprint information to an electronic data file through a file filter driver and uploading the implanting condition of the fingerprint information to a database of a sensitive data management platform; and monitoring and displaying the full life-cycle of the sensitive file through the sensitive data management platform. The method provided by the invention is mainly used to monitor and manage the full life-cycle process of the sensitive data such as generation, storage, operation, transmission and destroy, so that the effects of monitoring and managing the full life-cycle of the sensitive data file is realized and the sensitive information is prevented from being diffused disorderly and missing through the data file, so as to realize the effect of controlling the sensitive information. A missing generation source of the sensitive data can be traced through a fingerprint information management platform and the compliance of operation of the sensitive file is traced to take the evidence for investigating associated persons in charge, so as to monitor the sensitive information completely.

Description

A kind of full life cycle management method of the sensitive data file of implanting based on finger print information
Technical field
The present invention relates to the data security protection of field of information security technology, particularly relate to a kind of full life cycle management method of the sensitive data file of implanting based on finger print information.
Background technology
Along with the develop rapidly of computer technology, information system is used deeply extensively, and is applied to every field.But thereupon produced the safety problem that sensitive data is revealed, the e-file with sensitive data is produced, transmits, circulates and can't manage and control.
In concerning security matters unit or large enterprise, implemented widely safety prevention measure, comprise computer room safety, Network Isolation, fire wall, intrusion detection, encrypted transmission identity authorization system etc.But the safety problem with sensitive information data but can not get due attention always.Simultaneously, also lack effective sensitive data full life cycle management method on before the market.
Summary of the invention
For the deficiencies in the prior art, what the present invention proposed is a kind of sensitive data full life cycle management method of implanting based on finger print information, can prevent that sensitive information from passing through data file and disorderly passing and loss, can grasp the Life cycle state of this sensitive document by sensitive data management platform and the finger print information of implanting file comprehensively, reach the controlled effect to sensitive information.
The technical scheme that the present invention realizes is as follows:
A kind of sensitive data full life cycle management method of implanting based on finger print information, setting up under sensitive data management service end and the terminal monitoring client, in the client deploy filter Driver on FSD of processing the sensitive data file, its method is, at first, and the finger print information that pre-defines, when file writes or revises, filter Driver on FSD is resolved this document form, and content is scanned comprehensively, in case find responsive key word then generate the fingerprint rule according to the sensitive data operating strategy.Determine the position that fingerprint is implanted and carry out implant procedure according to the concrete form of file, then relevant information is sent to background data base behind the finger print information implantation success, realize the monitoring of sensitive document Life cycle by the sensitive document management platform, and show.
Finger print information implantation period for when the sensitive data file produces, when sensitive data is operated, the sensitive data transmission implants when landing or when the sensitive data storage.Can grasp the Life cycle state of this sensitive document by the finger print information of sensitive data management platform and implantation file comprehensively.
Further scheme of the present invention can be: described implantation finger print information hereof should comprise the key elements such as summary, terminal IP and MAC, identity information, the behavioural information of sensitive data part.
Further scheme of the present invention can be: the finger print information of described host-host protocol adopts the special purpose system algorithm to be encrypted.
Further scheme of the present invention can be: described fingerprint implantation position should reach is not maliciously deleted, is distorted, is forged texts, can seek a plurality of implantation positions and use dynamic algorithm to carry out the selection of implantation position.
Further scheme of the present invention can be: the finger print information of described implantation carried out completeness check before file uses, then file can't use when finger print information is destroyed.
The inventive method can realize following safe effect:
The present invention identifies and retrieval by responsive key word and keyword relevance linkage information, can prevent that sensitive information from passing through data file and disorderly passing and loss, reaches the controlled effect to sensitive information; In case the sensitive data File lose can be reviewed sensitive data by the finger print information management platform and lose generating source, review the compliance of sensitive document operation, be used for the evidence obtaining of investigating the responsible person concerned; And the implantation by finger print information, can grasp dynamically the distribution of the whole network sensitive information, reached comprehensive supervision of sensitive information; And by the association between the finger print information, can fully understand that this sensitive data file produces place, biography loser, recipient, user and final storage location, has reached the effect of sensitive data file Life cycle security management and control and supervision.
Description of drawings
Fig. 1 schematic flow sheet of the present invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach purpose and effect is easy to understand, below in conjunction with embodiment, further set forth the present invention.
Referring to Fig. 1, the full life cycle management method of the sensitive data file of implanting based on finger print information of the present invention is mainly used in monitoring and management sensitive data in lifecycle process such as generation, storage, operation, transmission and destructions.It comprises operational module, and this operational module comprises representing of filter Driver on FSD, keyword scan engine, finger print information generation, finger print information embedding, fingerprint information data storehouse and Life cycle.Setting up under sensitive data management service end and the terminal monitoring client, disposing client control software in terminal, carrying out on the one hand the strategy that service end pushes, on the other hand sensitive document is being carried out the fingerprint implantation and carries out information reporting.Dispose database service and set up corresponding database table in service end, dispose Web Application Server and be used for inquiry and obtain the relevant data information that the monitoring of data Life cycle is showed.Process the client deploy filter Driver on FSD of sensitive data file, by implant finger print information in the sensitive data file, the circulation process of tracking and monitoring fingerprint reaches the Life cycle monitoring of sensitive data file and the effect of management with this.Its step is as follows:
At first, the analyzing step of operation file; When operation file write or revises, filter Driver on FSD was resolved this operation file form; In the present embodiment, file system filter driver calls scanning engine, and scanning engine is determined file layout and resolve that next is inquired about responsive keyword scan demand and content is identified automatically.
Then, the generation step of fingerprint rule; Scan when filter Driver on FSD is resolved this operation file form and to content comprehensively, then carry out related information scanning if find the responsive key word that pre-defines, generate the fingerprint rule according to the sensitive data operating strategy, otherwise finish the implantation of finger print information.
Again, finger print information implantation step; Determine the position that finger print information is implanted and carry out implant procedure according to the concrete form of file; This implant procedure is to call fingerprint to implant the implantation that interface routine is finished finger print information, and the position that fingerprint is implanted has a plurality of, adopts dynamic algorithm to calculate implantation position, is not maliciously deleted, distorts and forge texts to reach; Wherein, the finger print information of host-host protocol adopts the special purpose system algorithm to be encrypted.The finger print information of implanting carried out completeness check before operation file uses, then operation file can't use when finger print information is destroyed.
In the present embodiment, finger print information comprises the summary info of sensitive data file, responsive rank, behavioural information, terminal wealth information (comprising IP, MAC, system's account), user's assets information (comprising address name, person in charge, user unit one belongs to and department) etc.The period that finger print information is implanted for when the sensitive data file produces, when sensitive data is operated, the sensitive data transmission implants when landing or when the sensitive data storage.
At last, uploading data storehouse and monitoring sensitive document Life cycle step; Then relevant information is sent to the database of sensitive data management platform behind the finger print information implantation success, and realize the monitoring of sensitive document Life cycle by the sensitive document management platform, and show.The database that this sensitive document management platform is the user by upper layer application supervisory routine and sensitive data management platform carries out alternately, realizes the Life cycle monitoring and management of sensitive data file.
Above-mentioned finger print information is implanted and specifically be may further comprise the steps:
1) terminal user operates the sensitive data file;
2) file system filter driver calls responsive keyword scan engine;
3) responsive keyword scan engine is automatically determined file layout and is resolved;
4) the responsive keyword scan demand of inquiry and content identified scanning;
5) have responsive key word then to the related information scanning of responsive key word as finding, go on foot otherwise carry out the 8th;
6) determine the sensitive document rank, query fingerprints creating info rules storehouse generates finger print information, and calls the functional interface of implanting finger print information by filter Driver on FSD;
7) with finger print information uploading data storehouse;
8) finishing finger print information implants.
The concrete operating procedure of client control software is as follows:
1) user's downloading service system data, generation sensitive data, editor's sensitivity data;
2) the client control software probe is to new data file;
3) the responsive keyword recognition of client control Bootload and search engine;
4) client control Bootload key word strategy and search strategy;
5) carry out keyword recognition and information retrieval;
6) according to result for retrieval, automatic acquisition terminal identity information and assets information;
7) according to the fingerprint create-rule, produce fingerprint;
8) implant fingerprint at the file assigned address;
9) generate the supplementary that is associated with fingerprint according to finger print information;
10) asynchronous finger print information and the supplementary uploaded is in the service end database.
For elaborating said method, now lift a typical interactive examples of present embodiment: when user's downloading service system data, operation sensitive data, client control software is implanted in the file according to content information and user's assets information generation finger print information, and in the database of the management end that reports.The system manager signs in to data security management and control platform and clicks inquiry system, can recognize which sensitive document is arranged in the current network, sensitive document at which station terminal circulated, and finally fell which station terminal, and whether the terminal that circulated exists sensitive document.
The present invention is by setting up sensitive data management service end and terminal monitoring client, sensitive data management service end is finished the management and control of the Life cycle of sensitive data, be used for issuing of strategy, issuing of rule, the analysis of finger print information etc., the terminal monitoring client is mainly used in carrying out the strategy that service end pushes, the operation of monitoring file, finger print information is installed, finger print information is uploaded etc., can grasp the Life cycle state of this sensitive document by the finger print information of sensitive data management platform and implantation file comprehensively, prevent that effectively sensitive information from passing through data file and disorderly passing and loss, reach the controlled effect to sensitive information; And review sensitive data by the finger print information management platform and lose generating source, review the compliance of sensitive document operation, be used for the evidence obtaining of investigating the responsible person concerned; And the implantation by finger print information, can grasp dynamically the distribution of the whole network sensitive information, reached comprehensive supervision of sensitive information; And by the association between the finger print information, can fully understand that this sensitive data file produces place, biography loser, recipient, user and final storage location, has reached the effect of sensitive data file Life cycle security management and control and supervision.
More than show and described ultimate principle of the present invention and principal character and advantage of the present invention.The technician of the industry should understand; the present invention is not restricted to the described embodiments; that describes in above-described embodiment and the instructions just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and equivalent thereof.

Claims (5)

1. the management method of the Life cycle of a sensitive data file of implanting based on finger print information, setting up under sensitive data management service end and the terminal monitoring client, in the client deploy filter Driver on FSD of processing the sensitive data file, it is characterized in that, its method is: at first, and the analyzing step of operation file; When operation file write or revises, filter Driver on FSD was resolved this operation file form;
Then, the generation step of fingerprint rule; Scan when described filter Driver on FSD is resolved this operation file form and to content comprehensively, then carry out related information scanning if find the responsive key word that pre-defines, generate the fingerprint rule according to the sensitive data operating strategy, otherwise finish the implantation of finger print information;
Again, finger print information implantation step; Determine the position that finger print information is implanted and carry out implant procedure according to the concrete form of file;
At last, uploading data storehouse and monitoring sensitive document Life cycle step; Then relevant information is sent to the database of sensitive data management platform behind the finger print information implantation success, and realize the monitoring of sensitive document Life cycle by the sensitive document management platform, and show.
2. the management method of the Life cycle of the sensitive data file of implanting based on finger print information according to claim 1, it is characterized in that, in the analyzing step of described operation file, described filter Driver on FSD is by calling responsive keyword scan engine, and responsive keyword scan engine is automatically determined the operation file form and resolved.
3. the management method of the Life cycle of the sensitive data file of implanting based on finger print information according to claim 2, it is characterized in that, in the generation step of described fingerprint rule, the responsive key word of responsive keyword scan engine queries and scanning demand are also identified the operation file content; Then carry out related information scanning if find responsive key word, again determine the sensitive document rank and generate the finger print information of this document.
4. according to claim 1 or the management method of the Life cycle of the 3 described sensitive data files of implanting based on finger print information, it is characterized in that, in the described finger print information implantation step, produce finger print information according to the scanning result of carrying out related information scanning and fingerprint production rule, call fingerprint and implant the implantation that interface routine is finished finger print information.
5. the management method of the Life cycle of the sensitive data file of implanting based on finger print information according to claim 1, it is characterized in that, in above-mentioned uploading data storehouse and the monitoring sensitive document Life cycle step, the user is undertaken alternately by the database of upper layer application supervisory routine and sensitive data management platform, realizes the Life cycle monitoring and management of sensitive data file.
CN201210424071.5A 2012-10-30 2012-10-30 Full life-cycle management method for sensitive data file based on fingerprint information implantation Active CN102968600B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210424071.5A CN102968600B (en) 2012-10-30 2012-10-30 Full life-cycle management method for sensitive data file based on fingerprint information implantation
PCT/CN2013/086011 WO2014067428A1 (en) 2012-10-30 2013-10-25 Full life-cycle management method for sensitive data file based on fingerprint information implantation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210424071.5A CN102968600B (en) 2012-10-30 2012-10-30 Full life-cycle management method for sensitive data file based on fingerprint information implantation

Publications (2)

Publication Number Publication Date
CN102968600A true CN102968600A (en) 2013-03-13
CN102968600B CN102968600B (en) 2017-02-15

Family

ID=47798736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210424071.5A Active CN102968600B (en) 2012-10-30 2012-10-30 Full life-cycle management method for sensitive data file based on fingerprint information implantation

Country Status (2)

Country Link
CN (1) CN102968600B (en)
WO (1) WO2014067428A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514390A (en) * 2013-09-18 2014-01-15 吴先洪 Method and device for data self-destroying and digital device
WO2014067428A1 (en) * 2012-10-30 2014-05-08 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN103973708A (en) * 2014-05-26 2014-08-06 中电长城网际系统应用有限公司 Determination method and system for data breach event
CN105824812A (en) * 2015-01-04 2016-08-03 北京神州泰岳信息安全技术有限公司 File type sensitive data automatic identification method and device
CN106446215A (en) * 2016-09-30 2017-02-22 广州特道信息科技有限公司 Internet big data evidence collecting system
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 Data leakage prevention method based on keyword technology
CN108292350A (en) * 2015-10-23 2018-07-17 甲骨文国际公司 That supports Syndicating search is automatically brought into operation detection to protected field
CN108449324A (en) * 2018-02-14 2018-08-24 北京明朝万达科技股份有限公司 The secure exchange method and system of data between a kind of net
CN108632318A (en) * 2017-03-21 2018-10-09 腾讯科技(深圳)有限公司 A kind of data verification method, data transmission method for uplink, relevant apparatus and system
CN108900474A (en) * 2018-06-05 2018-11-27 苏州科达科技股份有限公司 The transmission method of sensitive information, device and electronic equipment
CN109522423A (en) * 2018-11-01 2019-03-26 深圳市商舟网科技有限公司 Fingerprint implantation and information identifying method, device, computer equipment and storage medium
CN109697346A (en) * 2018-11-29 2019-04-30 合肥工业大学 A kind of government affairs file management system based on big data
CN110135128A (en) * 2019-05-22 2019-08-16 北京明朝万达科技股份有限公司 A kind of document handling method and device
CN110704873A (en) * 2019-09-25 2020-01-17 全球能源互联网研究院有限公司 Method and system for preventing sensitive data from being leaked
CN111159703A (en) * 2019-12-31 2020-05-15 奇安信科技集团股份有限公司 Virtual machine data leakage detection method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9892269B2 (en) 2015-06-11 2018-02-13 Qualcomm Incorporated Techniques for data monitoring to mitigate transitive problem in object-oriented contexts

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101401061A (en) * 2005-05-09 2009-04-01 普罗维拉公司 Cascading security architecture
US20090106835A1 (en) * 2007-10-22 2009-04-23 Ann Mead Corrao Method and apparatus for protecting sensitive information on a publicly accessed data processing system
CN101430752A (en) * 2008-12-22 2009-05-13 哈尔滨工业大学 Sensitive data switching control module and method for computer and movable memory device
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7444355B1 (en) * 2003-09-30 2008-10-28 Emc Corporation System and method for assigning management responsibility for manageable entities
CN102004883B (en) * 2010-12-03 2012-06-13 中国软件与技术服务股份有限公司 Trace tracking method for electronic files
CN102054027A (en) * 2010-12-13 2011-05-11 宇龙计算机通信科技(深圳)有限公司 Storing and searching method of mobile terminal file, system and mobile terminal
CN102968600B (en) * 2012-10-30 2017-02-15 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101401061A (en) * 2005-05-09 2009-04-01 普罗维拉公司 Cascading security architecture
US20090106835A1 (en) * 2007-10-22 2009-04-23 Ann Mead Corrao Method and apparatus for protecting sensitive information on a publicly accessed data processing system
CN101430752A (en) * 2008-12-22 2009-05-13 哈尔滨工业大学 Sensitive data switching control module and method for computer and movable memory device
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014067428A1 (en) * 2012-10-30 2014-05-08 国网电力科学研究院 Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN103514390A (en) * 2013-09-18 2014-01-15 吴先洪 Method and device for data self-destroying and digital device
CN103973708A (en) * 2014-05-26 2014-08-06 中电长城网际系统应用有限公司 Determination method and system for data breach event
CN105824812A (en) * 2015-01-04 2016-08-03 北京神州泰岳信息安全技术有限公司 File type sensitive data automatic identification method and device
CN105824812B (en) * 2015-01-04 2019-07-30 北京神州泰岳信息安全技术有限公司 The automatic identifying method and device of file type sensitive data
CN108292350A (en) * 2015-10-23 2018-07-17 甲骨文国际公司 That supports Syndicating search is automatically brought into operation detection to protected field
CN106446215A (en) * 2016-09-30 2017-02-22 广州特道信息科技有限公司 Internet big data evidence collecting system
CN108632318A (en) * 2017-03-21 2018-10-09 腾讯科技(深圳)有限公司 A kind of data verification method, data transmission method for uplink, relevant apparatus and system
CN108632318B (en) * 2017-03-21 2022-02-22 腾讯科技(深圳)有限公司 Data verification method, data sending method, related device and system
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium
CN107483422B (en) * 2017-08-03 2020-10-27 深信服科技股份有限公司 Data leakage tracing method and device and computer readable storage medium
CN107577939A (en) * 2017-09-12 2018-01-12 中国石油集团川庆钻探工程有限公司 Data leakage prevention method based on keyword technology
CN108449324A (en) * 2018-02-14 2018-08-24 北京明朝万达科技股份有限公司 The secure exchange method and system of data between a kind of net
CN108900474A (en) * 2018-06-05 2018-11-27 苏州科达科技股份有限公司 The transmission method of sensitive information, device and electronic equipment
CN109522423B (en) * 2018-11-01 2020-12-11 深圳市商舟网科技有限公司 Fingerprint implanting and information identifying method, device, computer equipment and storage medium
CN109522423A (en) * 2018-11-01 2019-03-26 深圳市商舟网科技有限公司 Fingerprint implantation and information identifying method, device, computer equipment and storage medium
CN109697346A (en) * 2018-11-29 2019-04-30 合肥工业大学 A kind of government affairs file management system based on big data
CN110135128A (en) * 2019-05-22 2019-08-16 北京明朝万达科技股份有限公司 A kind of document handling method and device
CN110704873A (en) * 2019-09-25 2020-01-17 全球能源互联网研究院有限公司 Method and system for preventing sensitive data from being leaked
CN111159703A (en) * 2019-12-31 2020-05-15 奇安信科技集团股份有限公司 Virtual machine data leakage detection method and device

Also Published As

Publication number Publication date
WO2014067428A1 (en) 2014-05-08
CN102968600B (en) 2017-02-15

Similar Documents

Publication Publication Date Title
CN102968600A (en) Full life-cycle management method for sensitive data file based on fingerprint information implantation
CN100555266C (en) Email message transmission method and system
CN109005142B (en) Website security detection method, device, system, computer equipment and storage medium
CN101187994A (en) File printing management and control system and method
CN113326081A (en) Static resource processing method and device, computer equipment and storage medium
CN107358122A (en) The access management method and system of a kind of data storage
CN113742776A (en) Data verification method and device based on biological recognition technology and computer equipment
CN112035437A (en) Method and device for transmitting medical record data, computer equipment and storage medium
CN114090408A (en) Data monitoring and analyzing method and device, computer equipment and storage medium
KR102022058B1 (en) Method and system for detecting counterfeit of web page
CN114885334B (en) High-concurrency short message processing method
CN113642039A (en) Configuration method and device of document template, computer equipment and storage medium
CN107292770A (en) A kind of construction information management method and system based on planar bar code technology
US11976634B2 (en) Method and assembly for accessing SCADA data of wind turbines
CN112650659B (en) Buried point setting method and device, computer equipment and storage medium
CN113672654B (en) Data query method, device, computer equipment and storage medium
CN114036117A (en) Log viewing method and device, computer equipment and storage medium
CN113434588B (en) Data mining analysis method and device based on mobile communication ticket
CN112308542B (en) Method and system for realizing intelligent and non-inductive data input
CN113918609A (en) Test paper creating method and device, computer equipment and storage medium
CN101931525A (en) Information security management resource positioning method and system
CN106802821A (en) Recognition application installs the method and device in source
CN114398441A (en) Data export method, data export device, computer equipment and storage medium
CN113191146B (en) Appeal data distribution method and device, computer equipment and storage medium
CN115225636A (en) Request processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20171127

Address after: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Co-patentee after: NARI Technology Development Co., Ltd.

Patentee after: State Grid Electric Power Research Insititute

Co-patentee after: State Grid Corporation of China

Address before: Nan Shui Road Gulou District of Nanjing city of Jiangsu Province, No. 8 210003

Co-patentee before: Nanjing Nari Co., Ltd.

Patentee before: State Grid Electric Power Research Insititute

Co-patentee before: State Grid Corporation of China

TR01 Transfer of patent right