CN104699683A - Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy - Google Patents
Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy Download PDFInfo
- Publication number
- CN104699683A CN104699683A CN201310647389.4A CN201310647389A CN104699683A CN 104699683 A CN104699683 A CN 104699683A CN 201310647389 A CN201310647389 A CN 201310647389A CN 104699683 A CN104699683 A CN 104699683A
- Authority
- CN
- China
- Prior art keywords
- data
- storage district
- cryptographic storage
- keyword extraction
- typing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for monitoring the risk of input encrypted storage region data, based on a keyword extraction strategy. The method is characterized by comprising the following steps: a main control unit monitors company intranet transmitted data in real time; an active unit finds out that cache data in a data cache server is new input encrypted storage region data and meanwhile sends the input encrypted storage region data to a keyword extraction server; the keyword extraction server performs keyword extraction on the input encrypted storage region data through a set keyword extraction algorithm, and once the active unit finds out that the input encrypted storage region data contains confidential information of company, the active unit immediately stops the transmission of the input encrypted storage region data; if a confidential information checking server does not find out that the input encrypted storage region data contains confidential information of company, the active unit sends the input encrypted storage region data to an encrypted storage region. The method has the characteristics of convenience in use, high processing speed, easiness in realizing the technology and the like.
Description
Technical field
The present invention relates to based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring.
Background technology
Along with the popularity of modernization of business, the information such as product information, contract contact mutual, has abandoned paper document substantially, mostly adopts electronic data to transmit.Wherein a lot of information relates to great commercial or private secret, needs to guarantee its safety.The major product of current IP Security protection has: fire wall, networking xegregating unit, intrusion detection, anti-virus etc.; The major product of application layer security protection has: safety certification, uniform authorization etc.; The major product of server layer security protection has: server protection, anti-virus, intrusion detection, main frame audit etc.; The major product of data Layer security protection has: database security enhancing, database audit, document protection etc., data Layer security protection is last one security barriers of the data deposited in server itself, if the security protection of network layer, application layer and server layer is broken.Along with the development of electronic information technology, the software and hardware of a lot of spy's character is open to be peddled on the net.And therefore how enterprise is effectively protected by the data in data transmission procedure, be with settled problem at present.In addition, the confirmation of data security, should be accurate, guarantees quick again.
Key word is exactly word or word that user inputs when using search engine, that at utmost can summarize the information content that user will search, is generalization and the centralization of information.Unresolved the problems referred to above provide the possibility that technology realizes.
Summary of the invention
The present invention is directed to the proposition of above problem, and development is based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring.The technical solution used in the present invention is as follows:
Based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
Also comprise in step 4):
Main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
Owing to have employed technique scheme, method provided by the invention has: easy to use, processing speed, technology realize the features such as easy.In addition, the method is based on the realization of computer system, and only the method need be compiled into the upgrading that corresponding program can realize active computer, therefore its cost is very cheap is suitable for extensive popularization.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of system of the present invention;
Fig. 2 is realization flow figure of the present invention.
Embodiment
Comprising the steps: based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring as depicted in figs. 1 and 2
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
Also comprise in step 4): main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to according to technical scheme of the present invention and inventive concept thereof and replace or change, all should be encompassed within protection scope of the present invention.
Claims (2)
1., based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
2. according to claim 1 a kind of based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that also comprising in step 4):
Main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310647389.4A CN104699683A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310647389.4A CN104699683A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104699683A true CN104699683A (en) | 2015-06-10 |
Family
ID=53346821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310647389.4A Pending CN104699683A (en) | 2013-12-04 | 2013-12-04 | Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104699683A (en) |
-
2013
- 2013-12-04 CN CN201310647389.4A patent/CN104699683A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11134087B2 (en) | System identifying ingress of protected data to mitigate security breaches | |
CN104871484A (en) | System and method for an endpoint hardware assisted network firewall in a security environment | |
CN106022080A (en) | Cipher card based on PCIe (peripheral component interface express) interface and data encryption method of cipher card | |
US20160050205A1 (en) | Preventing unauthorized access to an application server | |
Mohammad et al. | Machine learning with big data analytics for cloud security | |
Mosca et al. | Cloud security: Services, risks, and a case study on amazon cloud services | |
Sehgal et al. | Future trends in cloud computing | |
GB2535579A (en) | Preventing unauthorized access to an application server | |
CN104010021A (en) | Network consultation platform | |
Neware et al. | Survey on Security Issues in Mobile Cloud Computing and Preventive Measures | |
CN104702454A (en) | Method for monitoring risks of QQ transmitted data based on keyword extraction strategy | |
CN104702451A (en) | Method for monitoring risk of sent public mail based on keyword extraction strategy | |
CN104702456A (en) | Method for monitoring local area network transmission data risk based on keyword extraction strategy | |
Srinivasan et al. | State-of-the-art big data security taxonomies | |
CN104699703A (en) | Method for monitoring risk of database received data, based on keyword extraction strategy | |
CN104700035A (en) | Method for monitoring risk of USB interface copied data, based on keyword extraction strategy | |
Wang | Application of blockchain technology in the field of network and information security | |
CN104700034A (en) | Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy | |
CN104699683A (en) | Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy | |
Zeng et al. | Based on the role of Internet of Things security in the management of enterprise human resource information leakage | |
KN | The Intelligent Information Integrity Model to Ensure the Database Protection Using Blockchain in Cloud Networking | |
Zhou | Construction of Computer Network Security Defense System Based On Big Data | |
Priyadarshini | A novel technique for IDS in distributed data environment using merkel based security mechanism for secure user allocation | |
CN104699680A (en) | Method for monitoring risk of network updated data, based on keyword extraction strategy | |
CN104702640A (en) | Method for monitoring risk of data copied into company server based on keyword extraction strategy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150610 |