CN112241543A - Sensitive data combing method based on data middling stage - Google Patents
Sensitive data combing method based on data middling stage Download PDFInfo
- Publication number
- CN112241543A CN112241543A CN202011165608.1A CN202011165608A CN112241543A CN 112241543 A CN112241543 A CN 112241543A CN 202011165608 A CN202011165608 A CN 202011165608A CN 112241543 A CN112241543 A CN 112241543A
- Authority
- CN
- China
- Prior art keywords
- data
- carding
- center station
- combing
- data center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000009960 carding Methods 0.000 claims abstract description 59
- 238000007726 management method Methods 0.000 claims abstract description 20
- 238000004458 analytical method Methods 0.000 claims abstract description 19
- 238000002360 preparation method Methods 0.000 claims abstract description 10
- 238000005516 engineering process Methods 0.000 claims abstract description 7
- 238000011161 development Methods 0.000 claims abstract description 6
- 238000000586 desensitisation Methods 0.000 claims description 13
- 238000012544 monitoring process Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000005259 measurement Methods 0.000 claims description 6
- 238000011160 research Methods 0.000 claims description 6
- 238000007405 data analysis Methods 0.000 claims description 5
- 238000013523 data management Methods 0.000 claims description 4
- 238000013499 data model Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 claims description 3
- 230000003993 interaction Effects 0.000 claims description 3
- 230000010076 replication Effects 0.000 claims description 3
- 238000003860 storage Methods 0.000 claims description 3
- 230000000007 visual effect Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000013475 authorization Methods 0.000 abstract description 10
- 238000009826 distribution Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a sensitive data combing method based on a data center, which comprises the following steps: s1, a carding preparation stage, which is used for ensuring smooth and efficient implementation of the current carding work of the platforms in the data; s2, analyzing and discussing, and summarizing combing results; and S3, a combing summary and analysis stage, wherein the current situation of the stations in the data is summarized and analyzed according to the combing information combed by the stages S1 and S2. In the existing access control and authority management strategy, a development route of a security protection technology for clearing sensitive data is researched to study whether Maxcomputer and Dataworks have authorization control based on a data sensitive label mode and authorization control based on a sensitive data grade mode, or whether Maxcomputer and Dataworks have authorization control based on a data sensitive label mode and authorization control based on a sensitive data grade mode or whether Maxcomputer and Dataworks are supported by a third-party tool, authorization access control based on a sensitive label or a sensitive grade is realized through clearing sensitive data distribution conditions and classification grading conditions in a data center, and sensitive data is combed and integrated.
Description
Technical Field
The invention belongs to the technical field of big data middleboxes, and particularly relates to a sensitive data combing method based on a data middlebox.
Background
In recent years, digital economy is developed vigorously, and data not only become national basic strategic resources, but also are key production elements for promoting the innovative development of the economy and the society of enterprises. In the big data era, the types of massive original data in the data comprise personal privacy information (including information types such as customer names, identification card numbers, contact phones, bank card numbers, electric charge records, unit names, jobs and the like) of customers existing in key core systems of enterprises such as finance, marketing and the like, the user needs to be rapidly mined and guided in massive data, and services such as data assets, data monitoring, data analysis and the like are provided.
However, due to the aggregation of mass data, the transformation of data assets, and the efficient utilization of data analysis and mining, the value of company data has prompted brand-new industrial forms and business models, and the data creates great value for companies and faces severe data safety risks. With the prominent commercial value of data resources, the attacks of the data resources, such as lasso, stealing, abuse, tampering and the like, are continuously inundated, and the characteristics of industrialization, high-tech, transnational and the like are presented, so that a brand-new challenge is provided for the operation safety of national key information infrastructure and the enterprise data safety management capability. Important data security events of various industries occur frequently, the destructive power is extremely strong, and the method becomes an important security issue concerned by the whole society.
With the continuous promulgation of relevant policies, laws and the like in the aspect of data security in China and various industries, the attention degree of data security is continuously upgraded, and the data security is relevant to national security and enterprise security. The importance of data security as the "last mile" of cyberspace security tasks has been recognized by countries and enterprises. With the continuous expansion of the data in the company data and the continuous increase of data security threats, the company needs to combine the overall architecture and the current security protection situation of the data center, form the scientifically used 'systematic data security protection and security management capability' by using the sensitive data protection core and surrounding the sensitive data security key technology on the basis of the analysis and the security management of the sensitive data in the data center, and ensure that the sensitive data security continuously reaches the known, controllable, manageable and searchable construction target.
Disclosure of Invention
The invention aims to provide a sensitive data combing method based on a data center station, which aims to solve the problems in the prior art in the background technology.
In order to achieve the purpose, the invention adopts the following technical scheme:
a sensitive data combing method based on a data center comprises the following steps:
s1, a carding preparation stage, wherein in order to ensure smooth and efficient implementation of the current carding work of the platform in the data, the related current situation and requirements in the carding implementation process are comprehensively known and mastered, the project carding work is better implemented, and the starting, preparation and other works of the carding work are required before the carding work is comprehensively implemented, and the carding preparation stage comprises the following steps:
s1.1, firstly, determining a carding group, and confirming the carding range and time;
s1.2, implementing a carding mode, deeply discussing a carding group, determining a method for forming a research result by taking the carding of the basic condition of the data center as an objective basis and combining the safety situation of data inside and outside the industry and expert discussion opinions;
s1.3, thirdly, forming a data center station current situation carding table through the discussion and the perfection of the carding group, and developing the comprehensive discussion and carding work of the special subjects on the site of the user by the carding group;
s1.4, recovering, sorting and analyzing a carding table, and extracting conclusive information from a carding result through statistics and analysis by a carding group;
s2, in the analysis and discussion phase, the combing results are collected to form conclusive opinions, the key points of data security of a data center station are concerned, the data security situation in the industry is integrated, and the combing group experts discuss, analyze and summarize together with the experience, information and the like of users and the inside and outside of the industry in the aspects of data security management and data security protection technical measures;
and S3, a combing summarizing and analyzing stage, wherein the current situation of the data center station is summarized and analyzed according to combing information combed in the stages S1 and S2, combing feedback is collected, threats and risks are found, data security threats and risks are evaluated, sensitive data management key technical research indexes are obtained by combining the security requirements of the data center station, combing results are summarized and analyzed, a combing analysis report is formed, and suggestions are provided for the data security key problems in the data center station.
Preferably, the data center station comprises data access: various kinds of business data outside the data center station are converged to a data center station source layer through technical tools such as data replication (DTS), ETL (ETL) (dataworks), a data bus (DataHub) and the like, the data mainly comprise structured data, unstructured data, collected measurement data, format files and message data of specific protocols, and the source end can be various business systems, an internet of things platform, ubiquitous terminal equipment and an external third-party service provider
Preferably, the data center station comprises data storage computing: the storage computing capability is a data center data core processing engine, data generated by various source end systems are stored in the data center to form global data, the global data are processed, arranged and extracted into various subject data through a big data computing technology and a data model, and scenes such as data computing scene separation line computing, real-time computing, unstructured processing and the like are obtained.
Preferably, the data center station comprises data analysis: various analysis models and analysis algorithms are provided, and a tool set is provided for data reports, label portraits and visual display.
Preferably, the data center station includes data asset management: the method is used for comprehensively controlling models, catalogues, data labels, data quality and the like of a data asset system.
Preferably, the data center station comprises data operation management: the method provides various management support components for the use process of a data center station, performs parameter configuration on data service, desensitization rules and the like, performs safety monitoring and scheduling measurement on links, provides an online interaction function for data development, and is a basic component set for realizing the monitoring of the full life cycle of data.
Preferably, the data center station comprises a data service: the safe, friendly and controllable unified access to internal and external data services is realized through the data service directory, and the unified registration, management and scheduling of API service interfaces in various forms such as Restful are provided.
Preferably, the interface for externally providing data sharing for the data center is realized by a cloud shield-data security component, so that the external service Restful API is ensured to be called by a third party, the security of interface calling is ensured through API authentication and authentication, a secure transmission channel is provided, and the integrity requirement after data transmission is ensured.
The invention has the technical effects and advantages that: compared with the prior art, the sensitive data combing method based on the data center has the following advantages that:
in the existing access control and authority management strategy, a development route of a security protection technology for clearing sensitive data is researched to study whether Maxcomputer and Dataworks have authorization control based on a data sensitive label mode and authorization control based on a sensitive data grade mode, or whether Maxcomputer and Dataworks have authorization control based on a data sensitive label mode and authorization control based on a sensitive data grade mode or whether Maxcomputer and Dataworks are supported by a third-party tool, authorization access control based on a sensitive label or a sensitive grade is realized through clearing sensitive data distribution conditions and classification grading conditions in a data center, and sensitive data is combed and integrated.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. The specific embodiments described herein are merely illustrative of the invention and do not delimit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a sensitive data combing method based on a data center, which comprises the following steps:
s1, a carding preparation stage, wherein in order to ensure smooth and efficient implementation of the current carding work of the platform in the data, the related current situation and requirements in the carding implementation process are comprehensively known and mastered, the project carding work is better implemented, and the starting, preparation and other works of the carding work are required before the carding work is comprehensively implemented, and the carding preparation stage comprises the following steps:
s1.1, firstly, determining a carding group, and confirming the carding range and time;
s1.2, implementing a carding mode, deeply discussing a carding group, determining a method for forming a research result by taking the carding of the basic condition of the data center as an objective basis and combining the safety situation of data inside and outside the industry and expert discussion opinions;
s1.3, thirdly, forming a data center station current situation carding table through the discussion and the perfection of the carding group, and developing the comprehensive discussion and carding work of the special subjects on the site of the user by the carding group;
s1.4, recovering, sorting and analyzing a carding table, and extracting conclusive information from a carding result through statistics and analysis by a carding group;
s2, in the analysis and discussion phase, the combing results are collected to form conclusive opinions, the key points of data security of a data center station are concerned, the data security situation in the industry is integrated, and the combing group experts discuss, analyze and summarize together with the experience, information and the like of users and the inside and outside of the industry in the aspects of data security management and data security protection technical measures;
and S3, a combing summarizing and analyzing stage, wherein the current situation of the data center station is summarized and analyzed according to combing information combed in the stages S1 and S2, combing feedback is collected, threats and risks are found, data security threats and risks are evaluated, sensitive data management key technical research indexes are obtained by combining the security requirements of the data center station, combing results are summarized and analyzed, a combing analysis report is formed, and suggestions are provided for the data security key problems in the data center station.
Defining the range of sensitive data assets, defining sensitive level auditing and warning strategies for equipment such as database auditing and the like, considering the deployment of a data security situation perception platform, collecting data security equipment logs and warning information which mainly comprise data asset access and operation, and analyzing the attack trend and situation analysis in the aspect of data security based on the dimensionality of the data assets.
The external API interface on the data center platform realizes the calling and sharing of a data layer, if data is not desensitized, data leakage can be caused, for the API of the interface, the specification is recommended to carry out real-time desensitization on the sensitive data accessed by the API according to desensitization rules, and meanwhile, auditing and monitoring are carried out on the data access behavior of the API, so that abnormality can be found in time.
The data center station comprises data access: various kinds of business data outside the data center station are converged to a data center station source layer through technical tools such as data replication (DTS), ETL (ETL) (dataworks), a data bus (DataHub) and the like, the data mainly comprise structured data, unstructured data, collected measurement data, format files and message data of specific protocols, and the source end can be various business systems, an internet of things platform, ubiquitous terminal equipment and an external third-party service provider
The data center station comprises data storage calculation: the storage computing capability is a data center data core processing engine, data generated by various source end systems are stored in the data center to form global data, the global data are processed, arranged and extracted into various subject data through a big data computing technology and a data model, and scenes such as data computing scene separation line computing, real-time computing, unstructured processing and the like are obtained.
The data center station comprises data analysis: various analysis models and analysis algorithms are provided, and a tool set is provided for data reports, label portraits and visual display.
The data center station comprises data asset management: the method is used for comprehensively controlling models, catalogues, data labels, data quality and the like of a data asset system.
The data center station comprises data operation management: the method provides various management support components for the use process of a data center station, performs parameter configuration on data service, desensitization rules and the like, performs safety monitoring and scheduling measurement on links, provides an online interaction function for data development, and is a basic component set for realizing the monitoring of the full life cycle of data.
The data center station comprises data service: the safe, friendly and controllable unified access to internal and external data services is realized through the data service directory, and the unified registration, management and scheduling of API service interfaces in various forms such as Restful are provided.
The interface for externally providing data sharing by the console in the data is realized by a cloud shield-data security component, the calling of a third party is ensured in a mode of externally serving a Restful API, the safety of the interface calling is ensured through API authentication and authentication, a secure transmission channel is provided, and the integrity requirement after data transmission is ensured.
In this embodiment, the general level has the specification and control on data flow, but the monitoring on sensitive data flow is not used, and the data flow mainly involves data flow of several levels, and the following aspects are mainly implemented:
the first is data interface: the data interface provided by the data center station to the application layer is realized by a data works component data service module. The interface calls the unsafe data input to carry out the operations of escape, filtration and the like; recording all access behaviors to the data interface, wherein the provided interface uses an encryption channel;
secondly, batch data sharing: the interface shared by external batch is realized by a cloud shield-data security component;
thirdly, data management and operation use: and the permission control and monitoring of data operation are realized by the components such as Maxcomputer, and the access quantity, the access trend, the derived quantity, the derived details and the like of the sensitive data configured based on the rules are displayed in real time.
And fourthly, data desensitization uses a data protection umbrella desensitization component to mainly provide sensitive information identification and sensitive information desensitization functions.
The desensitization specification of the sensitive data is determined, a third-party desensitization component is promoted or deployed to achieve desensitization processing of the sensitive data, and data desensitization in the flow can be achieved in a desensitization API interface sharing mode.
The data security situation perception platform can be considered to be deployed, data security equipment logs and alarm information which mainly comprise data asset access and operation are collected, and attack trends and situation analysis in the aspect of data security are analyzed based on dimensionality of the data assets, so that process detection of sensitive data flowing is achieved.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.
Claims (8)
1. A sensitive data combing method based on a data center station is characterized in that: the method comprises the following steps:
s1, a carding preparation stage, wherein in order to ensure smooth and efficient implementation of the current carding work of the platform in the data, the related current situation and requirements in the carding implementation process are comprehensively known and mastered, the project carding work is better implemented, and the starting, preparation and other works of the carding work are required before the carding work is comprehensively implemented, and the carding preparation stage comprises the following steps:
s1.1, firstly, determining a carding group, and confirming the carding range and time;
s1.2, implementing a carding mode, deeply discussing a carding group, determining a method for forming a research result by taking the carding of the basic condition of the data center as an objective basis and combining the safety situation of data inside and outside the industry and expert discussion opinions;
s1.3, thirdly, forming a data center station current situation carding table through the discussion and the perfection of the carding group, and developing the comprehensive discussion and carding work of the special subjects on the site of the user by the carding group;
s1.4, recovering, sorting and analyzing a carding table, and extracting conclusive information from a carding result through statistics and analysis by a carding group;
s2, in the analysis and discussion phase, the combing results are collected to form conclusive opinions, the key points of data security of a data center station are concerned, the data security situation in the industry is integrated, and the combing group experts combine the experience and information of users and the inside and outside of the industry in the aspects of data security management and data security protection technical measures to jointly discuss, analyze and summarize;
and S3, a combing summarizing and analyzing stage, wherein the current situation of the data center station is summarized and analyzed according to combing information combed in the stages S1 and S2, combing feedback is collected, threats and risks are found, data security threats and risks are evaluated, sensitive data management key technical research indexes are obtained by combining the security requirements of the data center station, combing results are summarized and analyzed, a combing analysis report is formed, and suggestions are provided for the data security key problems in the data center station.
2. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data access: various kinds of business data outside the data center station are converged to a data center station source layer through data replication (DTS), ETL (ETL) (data works) and data bus (DataHub) technical tools, the data mainly comprise structured data, unstructured data, collected measurement data, format files and message data of specific protocols, and the source end can be various business systems, an internet of things platform, ubiquitous terminal equipment and an external third-party service provider.
3. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data storage calculation: the storage computing capability is a data center data core processing engine, data generated by various source end systems are stored in the data center to form global data, the global data are processed, arranged and extracted into various subject data through a big data computing technology and a data model, and a data computing scene is subjected to split line computing, real-time computing and unstructured processing scenes.
4. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data analysis: various analysis models and analysis algorithms are provided, and a tool set is provided for data reports, label portraits and visual display.
5. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data asset management: the method is used for comprehensively controlling the model, the catalogue, the data label and the data quality of a data asset system.
6. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data operation management: the method provides various management support components for the use process of a data center station, performs parameter configuration on data service and desensitization rules, performs safety monitoring and scheduling measurement on links, provides an online interaction function for data development, and is a basic component set for realizing the monitoring of the full life cycle of data.
7. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the data center station comprises data service: the safe, friendly and controllable unified access to internal and external data services is realized through the data service directory, and the unified registration, management and scheduling of API service interfaces in various forms of Restful are provided.
8. The sensitive data combing method based on the data center station as claimed in claim 1, characterized in that: the interface for externally providing data sharing by the console in the data is realized by a cloud shield-data security component, the calling of a third party is ensured in a mode of externally serving a Restful API, the safety of the interface calling is ensured through API authentication and authentication, a secure transmission channel is provided, and the integrity requirement after data transmission is ensured.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011165608.1A CN112241543A (en) | 2020-10-27 | 2020-10-27 | Sensitive data combing method based on data middling stage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011165608.1A CN112241543A (en) | 2020-10-27 | 2020-10-27 | Sensitive data combing method based on data middling stage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112241543A true CN112241543A (en) | 2021-01-19 |
Family
ID=74170014
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011165608.1A Pending CN112241543A (en) | 2020-10-27 | 2020-10-27 | Sensitive data combing method based on data middling stage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112241543A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112883001A (en) * | 2021-01-28 | 2021-06-01 | 国网冀北电力有限公司智能配电网中心 | Data processing method, device and medium based on marketing and distribution through data visualization platform |
CN113986656A (en) * | 2021-10-14 | 2022-01-28 | 南京南瑞信息通信科技有限公司 | Power grid data safety monitoring system based on data center |
CN114866532A (en) * | 2022-04-25 | 2022-08-05 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
WO2022166070A1 (en) * | 2021-02-05 | 2022-08-11 | 深圳市爱云信息科技有限公司 | Aiot daas digital twin cloud platform |
CN115114647A (en) * | 2022-08-26 | 2022-09-27 | 湖南华菱电子商务有限公司 | Customer information management method and system for constructing customer portrait based on digital middlebox |
CN115550236A (en) * | 2022-08-31 | 2022-12-30 | 国网江西省电力有限公司信息通信分公司 | Data protection method for routing optimization of security middlebox resource pool |
CN115794804A (en) * | 2023-02-07 | 2023-03-14 | 北京至臻云智能科技有限公司 | Engineering internal control data visualization processing system and method based on big data technology |
CN116522095A (en) * | 2023-06-30 | 2023-08-01 | 中交第四航务工程勘察设计院有限公司 | Main data management method based on data center |
CN116541382A (en) * | 2023-02-23 | 2023-08-04 | 广东东联信创信息技术有限公司 | Data management method and system based on data security identification level |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010139167A1 (en) * | 2009-06-05 | 2010-12-09 | 深圳市脑库计算机系统有限公司 | Expert support application system platform for government affair and business affair decision-making and its construction method |
CN106855962A (en) * | 2015-12-09 | 2017-06-16 | 星际空间(天津)科技发展有限公司 | A kind of method for building government affairs big data platform |
CN107705011A (en) * | 2017-09-29 | 2018-02-16 | 广东电力交易中心有限责任公司 | Electricity market risk management system and method |
CN111008197A (en) * | 2019-11-20 | 2020-04-14 | 王锦志 | Data center design method for power marketing service system |
-
2020
- 2020-10-27 CN CN202011165608.1A patent/CN112241543A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010139167A1 (en) * | 2009-06-05 | 2010-12-09 | 深圳市脑库计算机系统有限公司 | Expert support application system platform for government affair and business affair decision-making and its construction method |
CN106855962A (en) * | 2015-12-09 | 2017-06-16 | 星际空间(天津)科技发展有限公司 | A kind of method for building government affairs big data platform |
CN107705011A (en) * | 2017-09-29 | 2018-02-16 | 广东电力交易中心有限责任公司 | Electricity market risk management system and method |
CN111008197A (en) * | 2019-11-20 | 2020-04-14 | 王锦志 | Data center design method for power marketing service system |
Non-Patent Citations (3)
Title |
---|
王玉娟: ""基于阿里云的商业银行数据中台建设实践"", 《金融科技时代》 * |
肖良武 等, 徐州:中国矿业大学出版社 * |
郑磊: "《开放的数林 政府数据开放的中国故事》", 31 August 2018, 上海:上海人民出版社 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112883001A (en) * | 2021-01-28 | 2021-06-01 | 国网冀北电力有限公司智能配电网中心 | Data processing method, device and medium based on marketing and distribution through data visualization platform |
WO2022166070A1 (en) * | 2021-02-05 | 2022-08-11 | 深圳市爱云信息科技有限公司 | Aiot daas digital twin cloud platform |
CN113986656A (en) * | 2021-10-14 | 2022-01-28 | 南京南瑞信息通信科技有限公司 | Power grid data safety monitoring system based on data center |
CN113986656B (en) * | 2021-10-14 | 2023-12-19 | 南京南瑞信息通信科技有限公司 | Power grid data safety monitoring system based on data center platform |
CN114866532B (en) * | 2022-04-25 | 2023-11-10 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
CN114866532A (en) * | 2022-04-25 | 2022-08-05 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
CN115114647A (en) * | 2022-08-26 | 2022-09-27 | 湖南华菱电子商务有限公司 | Customer information management method and system for constructing customer portrait based on digital middlebox |
CN115114647B (en) * | 2022-08-26 | 2022-11-11 | 湖南华菱电子商务有限公司 | Customer information management method and system for constructing customer portrait based on digital middlebox |
CN115550236A (en) * | 2022-08-31 | 2022-12-30 | 国网江西省电力有限公司信息通信分公司 | Data protection method for routing optimization of security middlebox resource pool |
CN115550236B (en) * | 2022-08-31 | 2024-04-30 | 国网江西省电力有限公司信息通信分公司 | Data protection method oriented to security middle station resource pool route optimization |
CN115794804A (en) * | 2023-02-07 | 2023-03-14 | 北京至臻云智能科技有限公司 | Engineering internal control data visualization processing system and method based on big data technology |
CN116541382A (en) * | 2023-02-23 | 2023-08-04 | 广东东联信创信息技术有限公司 | Data management method and system based on data security identification level |
CN116541382B (en) * | 2023-02-23 | 2023-11-14 | 邵阳学院 | Data management method and system based on data security identification level |
CN116522095B (en) * | 2023-06-30 | 2023-09-08 | 中交第四航务工程勘察设计院有限公司 | Main data management method based on data center |
CN116522095A (en) * | 2023-06-30 | 2023-08-01 | 中交第四航务工程勘察设计院有限公司 | Main data management method based on data center |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112241543A (en) | Sensitive data combing method based on data middling stage | |
Kim et al. | Data governance framework for big data implementation with NPS Case Analysis in Korea | |
CN115733681A (en) | Data security management platform for preventing data loss | |
Kim et al. | Data governance framework for big data implementation with a case of Korea | |
CN111079174A (en) | Power consumption data desensitization method and system based on anonymization and differential privacy technology | |
JP2006504178A (en) | Comprehensive infringement accident response system in IT infrastructure and its operation method | |
Yang et al. | Towards big data governance in cybersecurity | |
KR102509748B1 (en) | System for providing pseudonymization processing service using metadata and deeplearning security control | |
CN111177480A (en) | Block chain directory file system | |
CN115174205B (en) | Network space safety real-time monitoring method, system and computer storage medium | |
CN113034028A (en) | Responsibility traceability confirmation system | |
CN111931239A (en) | Data leakage prevention system for database security protection | |
CN115630374A (en) | Testing method and device of credible numerical control system, computer equipment and storage medium | |
Manikandakumar et al. | Security and Privacy Challenges in Big Data Environment | |
CN111339050A (en) | Centralized security audit method and system based on big data platform | |
Yadav et al. | Big data hadoop: Security and privacy | |
CN113709170A (en) | Asset safe operation system, method and device | |
Zhen-Yuan | Personal Data Security and Supervision in the Age of Large Data. | |
Lu et al. | One intrusion detection method based on uniformed conditional dynamic mutual information | |
CN115208641A (en) | Software method based on safe operation of Internet data | |
Lan et al. | Brief Analysis for Network Security Issues in Computing Power Network | |
Singh et al. | A Study on Big Data Privacy in Cross-Industrial Challenges and Legal Implications | |
Adharsh et al. | Prevention of Data Breach by Machine Learning Techniques | |
Keshu et al. | RETRACTED: Personal Information Security Crisis in the Era of Big Data | |
Tian et al. | Application of Big Data Technology in Information Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210119 |
|
RJ01 | Rejection of invention patent application after publication |