CN115664845B - Security portrait method, equipment and medium based on multi-source data collaboration - Google Patents

Security portrait method, equipment and medium based on multi-source data collaboration Download PDF

Info

Publication number
CN115664845B
CN115664845B CN202211564859.6A CN202211564859A CN115664845B CN 115664845 B CN115664845 B CN 115664845B CN 202211564859 A CN202211564859 A CN 202211564859A CN 115664845 B CN115664845 B CN 115664845B
Authority
CN
China
Prior art keywords
data
preset
information
predetermined
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211564859.6A
Other languages
Chinese (zh)
Other versions
CN115664845A (en
Inventor
宁振宇
高磊
史保华
赵莹
张廷彪
崔鑫铭
石志国
赵章界
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Big Data Center
Original Assignee
Beijing Big Data Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Big Data Center filed Critical Beijing Big Data Center
Priority to CN202211564859.6A priority Critical patent/CN115664845B/en
Publication of CN115664845A publication Critical patent/CN115664845A/en
Application granted granted Critical
Publication of CN115664845B publication Critical patent/CN115664845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The disclosure provides a security portrait method based on multi-source data collaboration, comprising the following steps: identifying multi-source access data of a plurality of preset accounts to obtain access information of the preset accounts; identifying multi-source access data of a plurality of preset IP addresses to obtain access information of the plurality of IP addresses; identifying multi-source access data for accessing a preset data asset to obtain account information and IP address information for accessing the preset data asset; determining risk information of a plurality of preset accounts and risk information of a plurality of IP addresses according to access information of the preset accounts; and carrying out security portrait according to the risk information of the preset account numbers, the risk information of the IP addresses, the account number information for accessing the preset data assets and the IP address information. The present disclosure also provides an electronic device and a computer-readable medium.

Description

Security portrait method, equipment and medium based on multi-source data collaboration
Technical Field
The disclosure relates to the technical field of information security, in particular to a security portrait method based on multi-source data collaboration, an electronic device and a computer readable medium.
Background
With the development of information technology, network security is also becoming more and more important. In order to ensure network security, the method commonly adopted at present is to comb the identity account information and the authority information of the accessor, detect the system access behavior and the data access behavior of the accessor, and mainly identify the unauthorized access and abnormal access events of the sensitive data. Early warning is carried out in time when the data security risk is found. How to maintain network security well is a technical problem to be solved in the field.
Disclosure of Invention
Embodiments of the present disclosure provide a security portrait method, an electronic device, and a computer readable medium based on multi-source data collaboration.
As a first aspect of the present disclosure, there is provided a security portrait method based on multi-source data collaboration, including:
identifying multi-source access data of a plurality of preset accounts to obtain access information of the preset accounts;
identifying multi-source access data of a plurality of preset IP addresses to obtain access information of the plurality of IP addresses;
identifying multi-source access data for accessing a preset data asset to obtain account information and IP address information for accessing the preset data asset;
determining risk information of a plurality of preset accounts and risk information of a plurality of IP addresses according to access information of the preset accounts;
and carrying out security portrait according to the risk information of the preset account numbers, the risk information of the IP addresses, the account number information for accessing the preset data assets and the IP address information.
Optionally, the identifying the multi-source access data of the plurality of predetermined accounts includes:
fusing the multi-source access data of a plurality of preset accounts to obtain first fused data of each preset account;
and identifying the access information of the corresponding preset account number in each first fusion data.
Optionally, the access information of the predetermined account number includes at least one of the following information:
the account security risk index of the preset account, the access time of the preset account in a preset time period, the resources accessed by the preset account in the preset time period, the IP address used by the preset account in the preset time period and the number of violations of the preset account in the preset time period.
Optionally, the identifying the multi-source access data of the plurality of predetermined IP addresses includes:
fusing the multi-source access data of the plurality of preset IP addresses to obtain second fused data of each preset IP address;
and identifying access information corresponding to the preset IP address in each second fusion data.
Optionally, the access information of the plurality of predetermined IP addresses includes at least one of the following information:
the resource accessed by the preset IP address in a preset time period, the account number associated with the preset IP address in the preset time period and the risk trend of the preset IP address in the preset time period.
Optionally, the identifying the multi-source access data accessing the predetermined data asset to obtain account information accessing the predetermined data asset and IP address information includes:
fusing the multi-source access data accessing the predetermined data asset to obtain third fused data;
and identifying account information accessing the predetermined data asset and IP address information in the third converged data.
Optionally, the security portrait method further includes:
determining an access trend for accessing the predetermined data asset over a predetermined period of time;
determining an access frequency of an account number for accessing the predetermined data asset within a predetermined period of time;
an access frequency of an IP address for accessing the predetermined data asset for a predetermined period of time is determined.
Optionally, the method further comprises:
identifying a high-rights account number of the accounts accessing the predetermined data asset;
and identifying the sensitive operation behavior of the high-authority account.
As a second aspect of the present disclosure, there is provided an electronic apparatus including:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the secure portrait method provided according to the first aspect of the present disclosure.
As a third aspect of the present disclosure, there is provided a computer-readable medium having stored thereon a computer program which, when executed by a processor, implements the security portrait method provided according to the first aspect of the present disclosure.
For an enterprise, it is necessary to assign an account number to an employee that can access a data asset while the employee is working. The data assets of the enterprise may be at risk, either for external attacks or for access by internal accounts. Therefore, in the security portrait method provided by the present disclosure, the security portrait is performed in three dimensions of the predetermined account number, the predetermined IP address, and the predetermined data asset, so that risk information can be more comprehensively grasped, and the data asset can be better maintained.
Drawings
FIG. 1 is a flow chart of one embodiment of a security portrait method provided by a first aspect of the present disclosure;
FIG. 2 is a flow chart of one embodiment of step S110 of the security portrait method provided by the present disclosure;
FIG. 3 is a flow chart of one embodiment of step S120 of the security portrait method provided by the present disclosure;
FIG. 4 is a flow chart of one embodiment of step S130 of the security portrait method provided by the present disclosure;
FIG. 5 is a block diagram of one component of an electronic device in an embodiment of the present disclosure;
fig. 6 is a block diagram of one computer-readable medium in an embodiment of the present disclosure.
Detailed Description
For better understanding of the technical solutions of the present disclosure, the following describes in detail a secure portrait method, an electronic device, and a computer readable medium based on multi-source data collaboration provided in the present disclosure with reference to the accompanying drawings.
Example embodiments will be described more fully hereinafter with reference to the accompanying drawings, but may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Embodiments of the disclosure and features of embodiments may be combined with each other without conflict.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As a first aspect of the present disclosure, there is provided a security portrait method based on multi-source data collaboration, as shown in fig. 1, the security portrait method including:
in step S110, identifying multi-source access data of a plurality of preset accounts to obtain access information of the preset accounts;
in step S120, identifying multi-source access data of a plurality of predetermined IP addresses, to obtain access information of a plurality of the IP addresses;
in step S130, identifying multi-source access data for accessing a predetermined data asset, and obtaining account information for accessing the predetermined data asset and IP address information;
in step S140, risk information of a plurality of preset accounts and risk information of a plurality of IP addresses are determined according to access information of a plurality of preset accounts;
in step S150, a security portrait is performed based on risk information of the plurality of predetermined accounts, risk information of the plurality of IP addresses, account information for accessing the predetermined data asset, and IP address information.
For an enterprise, it is necessary to assign an account number to an employee that can access a data asset while the employee is working. The data assets of the enterprise may be at risk, either for external attacks or for access by internal accounts. Therefore, in the security portrait method provided by the present disclosure, the security portrait is performed in three dimensions of the predetermined account number, the predetermined IP address, and the predetermined data asset, so that risk information can be more comprehensively grasped, and the data asset can be better maintained.
When the access information of the preset account number is analyzed, the multi-source access data of the preset account number is taken as an analysis basis, so that the access information of the preset account number can be more comprehensively determined.
When analyzing the access information of the preset IP address, the multi-source access data of the preset IP address is taken as an analysis basis, so that the access information of the preset IP address can be more comprehensively determined.
In this disclosure, a "predetermined account number" may be an account number assigned to each employee, a "predetermined IP address" may be an IP address of each electronic device within the enterprise, and a "predetermined data asset" may be a data asset that is important to the enterprise.
In the present disclosure, there is no particular limitation on how to identify multi-source data. For example, the multi-source data may be fused such that the data of different sources has a uniform format, thereby facilitating identification.
In the present disclosure, in order to obtain multi-source access data, a multi-source data cooperative network needs to be built. The security portrait method provided by the present disclosure is executed by a central node, and the multi-source access data is acquired through a proxy node.
In the present disclosure, there is no particular limitation on how to build the multi-source data cooperative network.
For example, a listening port may be configured on the current hub node and a proxy node may be deployed at the data source. The IP address and port address of the central node are sent to each proxy node.
For the central node, before identifying the multi-source access data for the plurality of predetermined accounts, the security portrait method further includes:
in response to a registration request, determining identification information of each proxy node sending the registration request;
transmitting data cooperative parameters to each registered proxy node so that each proxy node periodically transmits data to a current central node according to the data cooperative parameters;
and determining the source of the data according to the identification information carried in the received data, and obtaining the multi-source access data.
In the present disclosure, the proxy node may periodically send heartbeat signals and status information to the central node in heartbeat packets.
In the present disclosure, there is no particular limitation on how the central node configures the data system parameters. For example, the security portrait method may include:
and configuring data collaboration parameters.
Optionally, the coordination data coordination parameters may include:
determining a selected data source, checking the state of a corresponding data source server, and indicating that only a server with normal state can be selected as the data source (namely, a proxy node);
configuring a task mode, wherein the task mode is selected from one of a disposable task and a periodic task;
configuring date and time of data collaboration;
the configuration requires a coordinated data type, amount.
Optionally, as shown in fig. 2, the identifying the multi-source access data of the plurality of predetermined accounts includes:
in step S111, the multi-source access data of the plurality of preset accounts are fused, so as to obtain first fusion data of each preset account;
in step S112, access information of a corresponding predetermined account is identified in each of the first fusion data.
As an alternative embodiment, the access information of the predetermined account number includes at least one of the following information:
the account security risk index of the preset account, the access time of the preset account in a preset time period, the resources accessed by the preset account in the preset time period, the IP address used by the preset account in the preset time period and the number of violations of the preset account in the preset time period.
In the present disclosure, no particular limitation is made on how to identify the access information of the plurality of predetermined account numbers in the first fusion data. As an optional implementation manner, for each predetermined account, identifying access information of a plurality of the predetermined accounts in the first fusion data includes:
performing feature recognition on the first fusion data to obtain a plurality of first feature queues;
and carrying out cluster analysis on the plurality of first feature queues to obtain access information of the preset account.
In the present disclosure, there is no particular limitation on how to identify the multi-source access data of the predetermined IP. Optionally, as shown in fig. 3, the identifying the multi-source access data of the plurality of predetermined IP addresses includes:
in step S121, the multisource access data of a plurality of predetermined IP addresses are fused, so as to obtain second fused data of each predetermined IP address;
in step S122, access information corresponding to the predetermined IP address is identified in each of the second fusion data.
As an alternative embodiment, the access information of the plurality of predetermined IP addresses includes at least one of the following information:
the resource accessed by the preset IP address in a preset time period, the account number associated with the preset IP address in the preset time period and the risk trend of the preset IP address in the preset time period.
In the present disclosure, the access information of how to identify the plurality of predetermined IP addresses in the second fusion data is not particularly limited. As an alternative embodiment, identifying access information of a plurality of the predetermined IP addresses in the second converged data for each predetermined IP address includes:
performing feature recognition on the second fusion data to obtain a plurality of second feature queues;
and performing cluster analysis on the plurality of second feature queues to obtain access information of the preset IP address.
In the present disclosure, there is no particular limitation on how to specifically execute step S130, and optionally, as shown in fig. 4, the identifying the multi-source access data accessing the predetermined data asset to obtain account information and IP address information for accessing the predetermined data asset may include:
in step S131, the multi-source access data accessing the predetermined data asset is fused to obtain third fused data;
in step S132, account information for accessing the predetermined data asset, and IP address information are identified in the third fused data.
In the present disclosure, in how to perform step S150, an access trend of accessing the predetermined data asset for a predetermined period of time may be determined; determining an access frequency of an account number for accessing the predetermined data asset within a predetermined period of time; an access frequency of an IP address for accessing the predetermined data asset for a predetermined period of time is determined.
To further secure the predetermined data asset, optionally, the method further comprises:
determining an access trend for accessing the predetermined data asset over a predetermined period of time;
determining an access frequency of an account number for accessing the predetermined data asset within a predetermined period of time;
an access frequency of an IP address for accessing the predetermined data asset for a predetermined period of time is determined.
Further, the security portrait method further includes:
identifying a high-rights account number of the accounts accessing the predetermined data asset;
and identifying the sensitive operation behavior of the high-authority account.
The "high-authority account" may be an "operation and maintenance account". Through the steps, the sensitive operation behavior of the high-authority account can be identified, and illegal operation by non-operation and maintenance personnel through the operation and maintenance account can be timely prevented.
As a second aspect of the present disclosure, there is provided an electronic device, as shown in fig. 5, including:
one or more processors 101;
a memory 102 having one or more programs stored thereon, which when executed by the one or more processors 101, cause the one or more processors to implement a security portrait method according to a first aspect of the present disclosure.
Optionally, the electronic device may further include one or more I/O interfaces 103 connected between the processor and the memory and configured to enable information interaction of the processor with the memory.
Wherein the processor 101 is a device having data processing capabilities, including but not limited to a Central Processing Unit (CPU) or the like; memory 102 is a device with data storage capability including, but not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically charged erasable programmable read-only memory (EEPROM), FLASH memory (FLASH); an I/O interface (read/write interface) 103 is connected between the processor 101 and the memory 102 to enable information interaction between the processor 101 and the memory 102, including but not limited to a data Bus (Bus) or the like.
In some embodiments, processor 101, memory 102, and I/O interface 103 are connected to each other via bus 104, and thus to other components of the computing device.
As a third aspect of the present disclosure, as shown in fig. 6, there is provided a computer-readable medium having stored thereon a computer program which, when executed by a processor, implements the security portrait method according to the first aspect of the present disclosure.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted in a generic and descriptive sense only and not for purpose of limitation. In some instances, it will be apparent to one skilled in the art that features, characteristics, and/or elements described in connection with a particular embodiment may be used alone or in combination with other embodiments unless explicitly stated otherwise. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure as set forth in the appended claims.

Claims (8)

1. A security portrait method based on multi-source data collaboration, comprising:
identifying multi-source access data of a plurality of preset accounts to obtain access information of the preset accounts;
identifying multi-source access data of a plurality of preset IP addresses to obtain access information of the plurality of IP addresses;
identifying multi-source access data for accessing a preset data asset to obtain account information and IP address information for accessing the preset data asset;
determining risk information of a plurality of preset accounts and risk information of a plurality of IP addresses according to access information of the preset accounts;
performing security imaging according to risk information of a plurality of preset accounts, risk information of a plurality of IP addresses, account information for accessing the preset data assets and IP address information;
the identifying the multi-source access data of the plurality of preset account numbers comprises the following steps: fusing the multi-source access data of a plurality of preset accounts to obtain first fused data of each preset account; identifying access information of a corresponding preset account number in each first fusion data;
the access information of the predetermined account number includes at least one of the following information: an account security risk index of the predetermined account, an access time of the predetermined account within a predetermined time period, a resource accessed by the predetermined account within the predetermined time period, an IP address used by the predetermined account within the predetermined time period, and a number of violations of the predetermined account within the predetermined time period;
the identifying the multi-source access data accessing the preset data asset to obtain account information and IP address information accessing the preset data asset comprises the following steps:
fusing the multi-source access data accessing the predetermined data asset to obtain third fused data;
and identifying account information accessing the predetermined data asset and IP address information in the third converged data.
2. The security portrait method of claim 1 wherein said identifying multi-source access data for a plurality of predetermined IP addresses includes:
fusing the multi-source access data of the plurality of preset IP addresses to obtain second fused data of each preset IP address;
and identifying access information corresponding to the preset IP address in each second fusion data.
3. The security portrait method of claim 2 wherein access information for a plurality of said predetermined IP addresses includes at least one of:
the resource accessed by the preset IP address in a preset time period, the account number associated with the preset IP address in the preset time period and the risk trend of the preset IP address in the preset time period.
4. A security portrait method as claimed in any one of claims 1 to 3 wherein the security portrait method further comprises:
determining an access trend for accessing the predetermined data asset over a predetermined period of time;
determining an access frequency of an account number for accessing the predetermined data asset within a predetermined period of time;
an access frequency of an IP address for accessing the predetermined data asset for a predetermined period of time is determined.
5. The security portrait method of claim 4 where said security portrait method further comprises:
identifying a high-rights account number of the accounts accessing the predetermined data asset;
and identifying the sensitive operation behavior of the high-authority account.
6. A security portrait method as claimed in any one of claims 1 to 3 wherein prior to identifying the multi-source access data for a plurality of predetermined account numbers, the security portrait method further comprises:
in response to a registration request, determining identification information of each proxy node sending the registration request;
transmitting data cooperative parameters to each registered proxy node so that each proxy node periodically transmits data to a current central node according to the data cooperative parameters;
and determining the source of the data according to the identification information carried in the received data, and obtaining the multi-source access data.
7. An electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors cause the one or more processors to implement the secure portrait method according to any one of claims 1 to 6.
8. A computer readable medium having stored thereon a computer program which when executed by a processor implements a security portrait method according to any one of claims 1 to 6.
CN202211564859.6A 2022-12-07 2022-12-07 Security portrait method, equipment and medium based on multi-source data collaboration Active CN115664845B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211564859.6A CN115664845B (en) 2022-12-07 2022-12-07 Security portrait method, equipment and medium based on multi-source data collaboration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211564859.6A CN115664845B (en) 2022-12-07 2022-12-07 Security portrait method, equipment and medium based on multi-source data collaboration

Publications (2)

Publication Number Publication Date
CN115664845A CN115664845A (en) 2023-01-31
CN115664845B true CN115664845B (en) 2023-05-23

Family

ID=85017019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211564859.6A Active CN115664845B (en) 2022-12-07 2022-12-07 Security portrait method, equipment and medium based on multi-source data collaboration

Country Status (1)

Country Link
CN (1) CN115664845B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241461A (en) * 2018-08-10 2019-01-18 新华三信息安全技术有限公司 A kind of user draws a portrait construction method and device
CN113794276A (en) * 2021-08-11 2021-12-14 国网辽宁省电力有限公司电力科学研究院 Power distribution network terminal safety behavior monitoring system and method based on artificial intelligence
CN114338171A (en) * 2021-12-29 2022-04-12 中国建设银行股份有限公司 Black product attack detection method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11282017B2 (en) * 2015-07-11 2022-03-22 RiskRecon Inc. Systems and methods for monitoring information security effectiveness

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241461A (en) * 2018-08-10 2019-01-18 新华三信息安全技术有限公司 A kind of user draws a portrait construction method and device
CN113794276A (en) * 2021-08-11 2021-12-14 国网辽宁省电力有限公司电力科学研究院 Power distribution network terminal safety behavior monitoring system and method based on artificial intelligence
CN114338171A (en) * 2021-12-29 2022-04-12 中国建设银行股份有限公司 Black product attack detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张杨燚等.面向城市数据画像构建的多源数据需求与融合方法研究.情报理论与实践.2020,43(6),全文. *

Also Published As

Publication number Publication date
CN115664845A (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN113574838B (en) System and method for filtering internet traffic through client fingerprint
US10965547B1 (en) Methods and systems to manage data objects in a cloud computing environment
US11456965B2 (en) Network service request throttling system
CN110249314B (en) System and method for cloud-based operating system event and data access monitoring
US10467426B1 (en) Methods and systems to manage data objects in a cloud computing environment
US9083720B2 (en) Managing security objects
US10140453B1 (en) Vulnerability management using taxonomy-based normalization
CN110069941A (en) A kind of interface access authentication method, apparatus and computer-readable medium
US8516586B1 (en) Classification of unknown computer network traffic
US10341355B1 (en) Confidential malicious behavior analysis for virtual computing resources
US10965680B2 (en) Authority management method and device in distributed environment, and server
US20170359243A1 (en) Compute node cluster management
US20180069881A1 (en) Forensic analysis
CN110457223B (en) Gray test drainage method, device, proxy server and readable storage medium
CN109151075B (en) Log processing method and device and electronic equipment
CN111835788B (en) Information data distribution method and device
US9456001B2 (en) Attack notification
CN108156127B (en) Network attack mode judging device, judging method and computer readable storage medium thereof
US11522884B1 (en) Subscription and key management system
CN115664845B (en) Security portrait method, equipment and medium based on multi-source data collaboration
US11588678B2 (en) Generating incident response action recommendations using anonymized action implementation data
AU2022200807A1 (en) Systems and Methods for Understanding Identity and Organizational Access to Applications within an Enterprise Environment
CN111859363B (en) Method and device for identifying unauthorized access of application and electronic equipment
WO2023020067A1 (en) Identifying credential attacks on encrypted network traffic
CN117201195B (en) Process network policy limiting method and device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant