CN104699683A - Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy - Google Patents

Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy Download PDF

Info

Publication number
CN104699683A
CN104699683A CN201310647389.4A CN201310647389A CN104699683A CN 104699683 A CN104699683 A CN 104699683A CN 201310647389 A CN201310647389 A CN 201310647389A CN 104699683 A CN104699683 A CN 104699683A
Authority
CN
China
Prior art keywords
data
storage district
cryptographic storage
keyword extraction
typing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310647389.4A
Other languages
Chinese (zh)
Inventor
王榕英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Original Assignee
DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd filed Critical DALIAN DONGPU MECHANICAL & ELECTRICAL Co Ltd
Priority to CN201310647389.4A priority Critical patent/CN104699683A/en
Publication of CN104699683A publication Critical patent/CN104699683A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for monitoring the risk of input encrypted storage region data, based on a keyword extraction strategy. The method is characterized by comprising the following steps: a main control unit monitors company intranet transmitted data in real time; an active unit finds out that cache data in a data cache server is new input encrypted storage region data and meanwhile sends the input encrypted storage region data to a keyword extraction server; the keyword extraction server performs keyword extraction on the input encrypted storage region data through a set keyword extraction algorithm, and once the active unit finds out that the input encrypted storage region data contains confidential information of company, the active unit immediately stops the transmission of the input encrypted storage region data; if a confidential information checking server does not find out that the input encrypted storage region data contains confidential information of company, the active unit sends the input encrypted storage region data to an encrypted storage region. The method has the characteristics of convenience in use, high processing speed, easiness in realizing the technology and the like.

Description

Based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring
Technical field
The present invention relates to based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring.
Background technology
Along with the popularity of modernization of business, the information such as product information, contract contact mutual, has abandoned paper document substantially, mostly adopts electronic data to transmit.Wherein a lot of information relates to great commercial or private secret, needs to guarantee its safety.The major product of current IP Security protection has: fire wall, networking xegregating unit, intrusion detection, anti-virus etc.; The major product of application layer security protection has: safety certification, uniform authorization etc.; The major product of server layer security protection has: server protection, anti-virus, intrusion detection, main frame audit etc.; The major product of data Layer security protection has: database security enhancing, database audit, document protection etc., data Layer security protection is last one security barriers of the data deposited in server itself, if the security protection of network layer, application layer and server layer is broken.Along with the development of electronic information technology, the software and hardware of a lot of spy's character is open to be peddled on the net.And therefore how enterprise is effectively protected by the data in data transmission procedure, be with settled problem at present.In addition, the confirmation of data security, should be accurate, guarantees quick again.
Key word is exactly word or word that user inputs when using search engine, that at utmost can summarize the information content that user will search, is generalization and the centralization of information.Unresolved the problems referred to above provide the possibility that technology realizes.
Summary of the invention
The present invention is directed to the proposition of above problem, and development is based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring.The technical solution used in the present invention is as follows:
Based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
Also comprise in step 4):
Main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
Owing to have employed technique scheme, method provided by the invention has: easy to use, processing speed, technology realize the features such as easy.In addition, the method is based on the realization of computer system, and only the method need be compiled into the upgrading that corresponding program can realize active computer, therefore its cost is very cheap is suitable for extensive popularization.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of system of the present invention;
Fig. 2 is realization flow figure of the present invention.
Embodiment
Comprising the steps: based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring as depicted in figs. 1 and 2
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
Also comprise in step 4): main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to according to technical scheme of the present invention and inventive concept thereof and replace or change, all should be encompassed within protection scope of the present invention.

Claims (2)

1., based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that comprising the steps:
1) main control unit is monitored in real time to company Intranet transmission data, and the typing cryptographic storage district data being sent to company Intranet are all first buffered in data cache server, and active cell is monitored in real time to the data of buffer memory in data cache server;
2) once active cell finds that the data of buffer memory in data cache server are new typing cryptographic storage district data, just stop the transmission of these data, these typing cryptographic storage district data are sent in keyword extraction server simultaneously;
3) described keyword extraction server carries out keyword extraction by the keyword extraction algorithms set to these typing cryptographic storage district data, then the data of extraction are sent to confidential information to check in server and carry out Data Integration analysis, once find that these typing cryptographic storage district data contain classified information, the transmission of active cell terminal this time typing cryptographic storage district data immediately, reports to the police simultaneously;
4) if confidential information checks server do not find that these typing cryptographic storage district data contain classified information, then typing cryptographic storage district data are sent in cryptographic storage district by active cell.
2. according to claim 1 a kind of based on the method for keyword extraction strategy to typing cryptographic storage district data Risk Monitoring, it is characterized in that also comprising in step 4):
Main control unit while typing cryptographic storage district data are sent to cryptographic storage district, to the step that typing cryptographic storage district data back up.
CN201310647389.4A 2013-12-04 2013-12-04 Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy Pending CN104699683A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310647389.4A CN104699683A (en) 2013-12-04 2013-12-04 Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310647389.4A CN104699683A (en) 2013-12-04 2013-12-04 Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy

Publications (1)

Publication Number Publication Date
CN104699683A true CN104699683A (en) 2015-06-10

Family

ID=53346821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310647389.4A Pending CN104699683A (en) 2013-12-04 2013-12-04 Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy

Country Status (1)

Country Link
CN (1) CN104699683A (en)

Similar Documents

Publication Publication Date Title
US11134087B2 (en) System identifying ingress of protected data to mitigate security breaches
CN104871484A (en) System and method for an endpoint hardware assisted network firewall in a security environment
CN106022080A (en) Cipher card based on PCIe (peripheral component interface express) interface and data encryption method of cipher card
US20160050205A1 (en) Preventing unauthorized access to an application server
Mohammad et al. Machine learning with big data analytics for cloud security
Mosca et al. Cloud security: Services, risks, and a case study on amazon cloud services
Sehgal et al. Future trends in cloud computing
GB2535579A (en) Preventing unauthorized access to an application server
CN104010021A (en) Network consultation platform
Neware et al. Survey on Security Issues in Mobile Cloud Computing and Preventive Measures
CN104702454A (en) Method for monitoring risks of QQ transmitted data based on keyword extraction strategy
CN104702451A (en) Method for monitoring risk of sent public mail based on keyword extraction strategy
CN104702456A (en) Method for monitoring local area network transmission data risk based on keyword extraction strategy
Srinivasan et al. State-of-the-art big data security taxonomies
CN104699703A (en) Method for monitoring risk of database received data, based on keyword extraction strategy
CN104700035A (en) Method for monitoring risk of USB interface copied data, based on keyword extraction strategy
Wang Application of blockchain technology in the field of network and information security
CN104700034A (en) Method for monitoring risk of uploaded network disk data, based on keyword extraction strategy
CN104699683A (en) Method for monitoring risk of input encrypted storage data, based on keyword extraction strategy
Zeng et al. Based on the role of Internet of Things security in the management of enterprise human resource information leakage
KN The Intelligent Information Integrity Model to Ensure the Database Protection Using Blockchain in Cloud Networking
Zhou Construction of Computer Network Security Defense System Based On Big Data
Priyadarshini A novel technique for IDS in distributed data environment using merkel based security mechanism for secure user allocation
CN104699680A (en) Method for monitoring risk of network updated data, based on keyword extraction strategy
CN104702640A (en) Method for monitoring risk of data copied into company server based on keyword extraction strategy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150610