CN116248406B - Information security storage method and information security device thereof - Google Patents

Information security storage method and information security device thereof Download PDF

Info

Publication number
CN116248406B
CN116248406B CN202310254993.4A CN202310254993A CN116248406B CN 116248406 B CN116248406 B CN 116248406B CN 202310254993 A CN202310254993 A CN 202310254993A CN 116248406 B CN116248406 B CN 116248406B
Authority
CN
China
Prior art keywords
information
information data
data
security
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310254993.4A
Other languages
Chinese (zh)
Other versions
CN116248406A (en
Inventor
江秋霞
江晓虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excellent Technology Co ltd
Original Assignee
Shenzhen Excellent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excellent Technology Co ltd filed Critical Shenzhen Excellent Technology Co ltd
Priority to CN202310254993.4A priority Critical patent/CN116248406B/en
Publication of CN116248406A publication Critical patent/CN116248406A/en
Application granted granted Critical
Publication of CN116248406B publication Critical patent/CN116248406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Abstract

The present invention relates to the field of information security communications technologies, and in particular, to an information security storage method and an information security device. The method comprises the following steps: the method comprises the steps of obtaining a gateway communication instruction set, utilizing the gateway communication instruction set to perform data transmission connection processing with an external information database, generating a transmission connection instruction, performing data security detection processing on the transmission connection instruction, and generating an information data transmission security connection instruction; the method comprises the steps of responding to an information data transmission security connection instruction to acquire and process information data of an external information database to obtain a preliminary information data set, and eliminating dangerous information data of the preliminary information data set to obtain a preliminary security information data set; carrying out standardized information data processing on the preliminary safety information data set to obtain a standard safety information data set; the invention solves the safety problem of information data storage in the prior art by carrying out safety collection, safety processing and safety storage on the information data.

Description

Information security storage method and information security device thereof
Technical Field
The present invention relates to the field of information security communications technologies, and in particular, to an information security storage method and an information security device.
Background
With the advent of the information age along with the advancement of technology, the demands and applications of mobile offices and mobile storage have increased. While security of data stored in the mobile storage device is also of concern. Because the data stored in the mobile storage device is stored in a plaintext form, the loss or discarding of the mobile storage device can cause some information security risks.
In addition, the piracy means are continuously developed, so that the technology considered safe today can not be guaranteed to become the inclusion of the pirate after a long time, the encryption means of information data transmission become the primary aim of the pirate, the information data protection products applied to various fields of various industries are continuously emerging, and various problems or omission in the information data protection field are solved from aspects. However, the traditional encryption means can be used for easily stealing the information data by hackers through physical encryption or storing the information data in a plaintext form in the encryption lock, or maliciously destroying the data when the information data is transmitted, and disturbing the information data received by the user to destroy the normal information data communication between the server and the client.
Disclosure of Invention
The invention provides a machine information security device of an information security storage method, which solves at least one of the technical problems
To achieve the above object, a method for securely storing information, the method comprising the steps of:
step S1: the method comprises the steps that a gateway communication instruction set is obtained, the information safety equipment performs data transmission connection with an external information database according to the gateway communication instruction set, generates a transmission connection instruction, and performs data security detection processing on the transmission connection instruction, so that an information data transmission security connection instruction is generated;
step S2: responding to an information data transmission security connection instruction, carrying out information data acquisition processing on an external information database to obtain a preliminary information data set, and carrying out dangerous information data elimination processing on the preliminary information data set to obtain a preliminary security information data set;
step S3: carrying out standardized information data processing on the preliminary safety information data set so as to obtain a standard safety information data set;
step S4: establishing an information data storage database for storing a standard safety information data set, and performing storage database safety improvement processing on the information data storage database so as to generate a safety information data storage database;
Step S5: and transmitting the standard safety information data set to a safety information data storage database for data storage processing, thereby obtaining the safety information storage file.
The gateway communication instruction can be acquired for the information security device to perform data communication with an external information database, and then a transmission instruction is established for data transmission according to the data communication, and since the normal data transmission cannot guarantee the safety of the data transmission, the security detection is performed on the transmission instruction, so that the security of the data transmission can be guaranteed, the data is prevented from being tampered or leaked by a third party in the transmission process, the data transmission efficiency is improved, the continuity of the data transmission is ensured, the accuracy of the data in the transmission process is ensured, and the consequences caused by data transmission errors are avoided; the method has the advantages that the information data transmission safety connection instruction is utilized to conduct data acquisition on an external information base, the influence of dangerous data on information safety equipment is avoided, therefore, the safety and reliability of a system are improved, the data can be processed in a standardized information data processing mode to obtain a more accurate, complete and safe data set, further processing and analysis on the data are facilitated, the standardized data are in a uniform format, the definition of data items is uniform, the consistency and comparability among the data can be guaranteed, the data are of higher quality, the requirements of information analysis, query and use can be better met, the stronger safety is achieved, the information data can be better protected from the influence of external threat, the utilization rate of the information data can be improved, the safety information data storage database can be established to conduct safety improvement processing on the information data storage database, the safety of the data can be improved, illegal access and falsification of the data are prevented, the inquireability of the data is improved, the safety information data can be conveniently managed and used, and the safety information data can be transmitted to the safety information storage database in a standard information data set, and the safety information storage database can be guaranteed. By storing the information data in the secure database, the information data can be better managed, the efficiency of data storage and access is improved, and the threat to the security of the information caused by factors such as data loss or leakage is avoided. Therefore, the information security storage method can prevent hackers from stealing information data or protect the information data during information data transmission, is the information data which we can normally receive, and protects the normal information data communication between the server and the client.
In one embodiment of the present specification, step S1 includes the steps of:
step S11: acquiring a gateway communication instruction set;
step S12: the gateway communication instruction set is used for carrying out data transmission connection processing with an external information database so as to generate a data transmission connection instruction;
step S13: performing data transmission connection asymmetric encryption processing on the data transmission connection instruction, thereby generating an encrypted data transmission instruction;
step S14: and carrying out data security detection processing on the encrypted data transmission instruction, and blocking data in an unsafe external information database when carrying out data transmission, so as to generate an information data transmission security connection instruction.
According to the embodiment, the safety of data transmission from an external information database can be ensured, information is prevented from being stolen by an asymmetric encryption, the safety of data is observed in real time when data security detection is carried out, when a transmission instruction is invaded, the data can be immediately detected, the safe data is prevented from being leaked or damaged in the transmission process, the integrity and the safety of the data are ensured, and the privacy and the safety of important data are protected.
In one embodiment of the present specification, step S2 includes the steps of:
Step S21: responding to the information data transmission security connection instruction to perform data acquisition on an external information database so as to generate a preliminary information data set;
step S22: performing information data security checking processing on the preliminary information data set by using an information data security checking formula, thereby obtaining a preprocessed security information data set;
step S23: carrying out dangerous information characteristic collection processing on the preprocessed safety information data set so as to generate a dangerous characteristic information data set;
step S24: establishing a model aiming at eliminating dangerous information in the safety information data set by utilizing the dangerous characteristic information data set to obtain a dangerous information elimination data model;
step S25: and transmitting the preprocessed safety information data set to a dangerous information elimination data model for dangerous information data elimination processing, so as to generate a preliminary safety information data set.
The embodiment relates to safety inspection and dangerous information elimination of information data, and aims to ensure the safety and effectiveness of the information data, and finally obtain a preliminary safe information data set by performing data acquisition, information data safety inspection, dangerous information characteristic collection, dangerous information data elimination and other processes, so that the safety level of the information data and the effectiveness of the information data can be improved, and the data safety and the data correctness can be protected.
In one embodiment of the present specification, the information data security inspection formula in step S22 is:
wherein Q is represented as an information security inspection index, Q is represented as characteristic information data extracted from the preliminary information data set,weight information of the abnormality information data expressed as the preliminary information data set, a expressed as abnormality characteristic information data extracted for each item of abnormality data in the preliminary information data set, c expressed as weight information conforming to the data standard of the preliminary information data set, and σexpressed as an abnormality correction item of the information security inspection index.
The embodiment is used for evaluating the safety of the preliminary information data set, and utilizing the characteristic information data q extracted by the preliminary information data set to weight information of abnormal information data of the preliminary information data setPerforming abnormal data elimination calculation with the abnormal characteristic information data a extracted from each item of abnormal data in the preliminary information data set to obtain +.>And the information security inspection index Q is adjusted by using the abnormal correction item of the information security inspection index, and the security of the information data is improved by analyzing the abnormal information and the characteristic information in the information security inspection index Q.
In one embodiment of the present specification, the information data processing in step S3 includes an information data blocking process, an information data cleansing process, an information data noise reduction process, and an information data classification process, and step S3 includes the steps of:
step S31: performing data blocking processing on the preliminary safety information data set so as to generate a block file safety information data set;
step S32: performing data cleaning processing on the preliminary safety information data set, and removing redundant data in the preliminary safety information data set so as to obtain a cleaning safety information data set;
step S33: performing data noise reduction processing on the cleaning safety information data set so as to generate a noise reduction safety information data set;
step S34: and carrying out information data classification processing with the same information category on the noise reduction safety information data set so as to obtain a standard safety information data set.
The embodiment can help to improve the quality and accuracy of data, the blocking processing can conveniently manage and process a large amount of information data, the cleaning processing can remove redundant data, the accuracy of the data is improved, the noise reduction processing can reduce the influence of noise on the data, and the classification processing can enable the information data of the same category to be easier to manage and process, so that standard safety information data with high quality and high accuracy is obtained, and safety data analysis and decision are better supported.
In one embodiment of the present specification, step S4 includes the steps of:
step S41: establishing an information data storage database for storing a standard safety information data set;
step S42: carrying out historical data extraction processing on the standard safety information data so as to obtain historical safety information data;
step S43: carrying out safety information data characteristic extraction processing by utilizing the historical safety information data to obtain historical characteristic safety information data;
step S44: setting a database security gateway by utilizing the historical characteristic security information data to obtain a security information data gateway instruction;
step S45: and carrying out storage database security improvement processing on the information data storage database by utilizing the security information data gateway instruction, thereby generating a security information data storage database.
The embodiment establishes a database for storing standard safety information data, is convenient for information management and use, obtains more valuable historical characteristic safety information data through historical data extraction processing and safety information data characteristic extraction processing, helps to improve the accuracy of safety assessment, and when new historical characteristic safety information data can improve the safety information data storage database, consolidates the safety information data storage database to improve the safety of the data, and improves the safety of the storage database by setting a database safety gateway and improving the safety of the storage database, thereby improving the safety protection level of the storage database and reducing the risk of safety information data.
In one embodiment of the present specification, step S5 includes the steps of:
step S51: transmitting the standard safety information data set to a safety information storage database for external dangerous interception processing of the database, so as to obtain safety pre-stored information data;
step S52: and carrying out data security storage periodic checking maintenance processing on the security pre-stored information data, thereby obtaining an information security storage file.
The embodiment can ensure that the standard safety information data set can be safely stored in the database, firstly intercept dangerous information outside the database, and periodically check and maintain the dangerous information to ensure the safety of the data, protect the information data from being accidentally lost or destroyed, and ensure the integrity and consistency of the data.
In one embodiment of the present specification, step S52 includes the steps of:
step S521: the method comprises the steps of performing periodic vulnerability scanning processing on database storage files on database interception storage information data, so as to generate vulnerability detection database storage information data;
step S522: performing data security storage periodic checking maintenance processing on the vulnerability detection database storage information data by utilizing a data information security level formula so as to obtain security information storage data or potential danger information storage data;
Step S523: presetting an information data integrity rate threshold;
step S524: extracting available data of the dangerous information part from the potential dangerous information storage data to obtain residual characteristic information data;
step S525: carrying out data deletion processing of the dangerous information part on the potential dangerous information storage data to obtain missing information storage data;
step S526: and comparing the data integrity rate by using the missing information storage data with the information data integrity rate threshold, judging that the information data can not be repaired when the integrity rate of the missing information storage file does not reach the information data integrity rate threshold, and judging that the information data can be repaired when the integrity rate of the missing information storage file reaches the information data integrity rate threshold.
Step S527: removing unrepairable stored information data, and performing supervised learning processing on the repairable stored information data based on the residual characteristic information data to recover incomplete information, so as to obtain recovered stored information data;
step S528: and carrying out information data integration processing on the safety information storage data and the recovery storage information data, thereby obtaining the safety information storage file.
The embodiment is beneficial to protecting the safety of information data stored in a database, periodically checking and maintaining the information, reducing the risk of data leakage, reducing the risk of invasion of a hacker on the database, repairing unsafe data, improving the safety level of the data, enabling the data to have potential safety hazards, periodically checking and maintaining the information to discover and process the problem of data leakage in time, improving the safety of the data, protecting privacy data of a user, preventing the privacy data from being acquired by unauthorized people, judging the threat level of the information data by utilizing a data information safety level formula, separating the safe data from the unsafe data in the information data, processing the data by utilizing a simple information safety device, distinguishing the unsafe information into irrecoverable unsafe information data and repairable unsafe information in a data information safety level formula, repairing the unsafe information by utilizing the dangerous information which is dropped in the unsafe information, clearing the needed information, feeding back to a terminal, thereby guaranteeing the integrity of the stored data of the safe information storage database, preventing a large amount of the data from being lost due to threat of the data, and conveniently integrating the stored data with the stored information and the management information. And further, the integrity and the reliability of the stored data are improved, and the safety risk is reduced. The generated safety information storage file can be backed up and restored conveniently, and the safety of the data is ensured.
In one embodiment of the present specification, the data information security level formula in step S523 is:
wherein Z is represented as a security level of the vulnerability detection database storing information data, r is represented as weight information of the dangerous information data intercepted in the security information data storing database, t is represented as weight information of the vulnerability data detected in the vulnerability detection database storing information data, b is represented as security information data in the vulnerability detection database storing information data,is expressed according to the current hole inspectionAnd (3) measuring the estimated security level generated by the stored information of the database, wherein z is represented as the expected security level generated according to the stored information data of the vulnerability detection database, p is represented as the weight information for adjusting the abnormal data in the stored information data of the vulnerability detection database, and τ is represented as the correction item of the security level of the stored information data of the abnormal vulnerability detection database.
The embodiment is used for checking the security level of the information data stored in the vulnerability detection database, and generating the dangerous information judging level e for the information data stored in the vulnerability detection database by utilizing the weight information r of the dangerous information data intercepted in the security information data storage database by the weight information t of the detected vulnerability data in the vulnerability detection database and the security information data b in the information data stored in the vulnerability detection database -rt sinbt, and then passing through a predicted security level generated according to the stored information of the current hole detection databaseThe security information expected level Z generated according to the vulnerability detection database storage information data and the weight information p for adjusting the abnormal data in the vulnerability detection database storage information data are used for carrying out level judgment on the vulnerability detection database storage information data, and the correction item tau of the security level of the vulnerability detection database storage information data is utilized for adjusting to obtain the security level Z of the vulnerability detection database storage information data.
In one embodiment of the present specification, an information security apparatus includes:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the information security storage method of any one of the above.
The embodiment provides information security equipment, which is characterized in that an information data transmission security connection instruction capable of carrying out security data communication with an external information database is established by utilizing a gateway communication connection instruction, the external information database is acquired by utilizing the information data transmission security connection instruction, the acquired data set is subjected to data processing, a security information data storage database is established for storing the data set obtained after the processing, the security information data storage database periodically checks whether stored data is secure or not, unsafe data is processed, and a reliable and safe data set storage file is obtained. By executing the information security storage method, the security of the data is ensured, the data is prevented from being revealed or illegally accessed, the complete data information is saved, the integrity and the reliability of the data are guaranteed, the performance and the efficiency of the system can be improved, and when the data are lost or damaged, the data recovery is supported, and the security of the data is guaranteed.
In the embodiment of the application, an information security storage method and an information security device thereof bring a safer and more reliable data storage mode, an acquired gateway communication command can be used for data communication between the information security device and an external information database, and the acquired data can not be well applied to follow-up steps due to the fact that normal data communication cannot guarantee the security of data. Thereby improving the reliability of the information data, preventing the information data from being illegally accessed and tampered, improving the inquireability of the information data, facilitating the management and use of the information data and ensuring the safety and the effectiveness of the information data. By storing the information data in the secure database, the information data can be better managed, the efficiency of data storage and access is improved, and the threat to the security of the information caused by factors such as data loss or leakage is avoided.
Drawings
FIG. 1 is a flow chart of steps of an information security storage method according to the present invention;
FIG. 2 is a flowchart illustrating the detailed implementation of step S2 in FIG. 1;
FIG. 3 is a flowchart illustrating the detailed implementation of step S3 in FIG. 1;
FIG. 4 is a flowchart illustrating the detailed implementation of step S4 in FIG. 1;
FIG. 5 is a schematic diagram of a method for obtaining a security information storage file after an information security device collects information data;
the achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The invention provides a machine information security device of an information security storage method, which solves at least one of the technical problems
To achieve the above object, a method for securely storing information, the method comprising the steps of:
step S1: the method comprises the steps that a gateway communication instruction set is obtained, the information safety equipment performs data transmission connection with an external information database according to the gateway communication instruction set, generates a transmission connection instruction, and performs data security detection processing on the transmission connection instruction, so that an information data transmission security connection instruction is generated;
step S2: responding to an information data transmission security connection instruction, carrying out information data acquisition processing on an external information database to obtain a preliminary information data set, and carrying out dangerous information data elimination processing on the preliminary information data set to obtain a preliminary security information data set;
Step S3: carrying out standardized information data processing on the preliminary safety information data set so as to obtain a standard safety information data set;
step S4: establishing an information data storage database for storing a standard safety information data set, and performing storage database safety improvement processing on the information data storage database so as to generate a safety information data storage database;
step S5: and transmitting the standard safety information data set to a safety information data storage database for data storage processing, thereby obtaining the safety information storage file.
The gateway communication instruction can be acquired for the information security device to perform data communication with an external information database, and then a transmission instruction is established for data transmission according to the data communication, and since the normal data transmission cannot guarantee the safety of the data transmission, the security detection is performed on the transmission instruction, so that the security of the data transmission can be guaranteed, the data is prevented from being tampered or leaked by a third party in the transmission process, the data transmission efficiency is improved, the continuity of the data transmission is ensured, the accuracy of the data in the transmission process is ensured, and the consequences caused by data transmission errors are avoided; the method has the advantages that the information data transmission safety connection instruction is utilized to conduct data acquisition on an external information base, the influence of dangerous data on information safety equipment is avoided, therefore, the safety and reliability of a system are improved, the data can be processed in a standardized information data processing mode to obtain a more accurate, complete and safe data set, further processing and analysis on the data are facilitated, the standardized data are in a uniform format, the definition of data items is uniform, the consistency and comparability among the data can be guaranteed, the data are of higher quality, the requirements of information analysis, query and use can be better met, the stronger safety is achieved, the information data can be better protected from the influence of external threat, the utilization rate of the information data can be improved, the safety information data storage database can be established to conduct safety improvement processing on the information data storage database, the safety of the data can be improved, illegal access and falsification of the data are prevented, the inquireability of the data is improved, the safety information data can be conveniently managed and used, and the safety information data can be transmitted to the safety information storage database in a standard information data set, and the safety information storage database can be guaranteed. By storing the information data in the secure database, the information data can be better managed, the efficiency of data storage and access is improved, and the threat to the security of the information caused by factors such as data loss or leakage is avoided. Therefore, the information security storage method can prevent hackers from stealing information data or protect the information data during information data transmission, is the information data which we can normally receive, and protects the normal information data communication between the server and the client.
In the embodiment of the present invention, as described with reference to fig. 1, a step flow diagram of an information security storage method of the present invention is provided, and in this example, the steps of the data processing method applied to a cloud platform include:
step S1: the method comprises the steps that a gateway communication instruction set is obtained, the information safety equipment performs data transmission connection with an external information database according to the gateway communication instruction set, generates a transmission connection instruction, and performs data security detection processing on the transmission connection instruction, so that an information data transmission security connection instruction is generated;
in the embodiment of the invention, for example, the network communication equipment is used for carrying out data communication connection with the bank information database, then an encryption algorithm is used for the data communication connection so as to prevent the data from being stolen in the transmission process, the digital signature is used for ensuring the integrity and the reliability of the data, and then a network layer firewall and an application layer firewall are added to prevent an attacker from entering the network, so that an information data transmission security connection instruction is generated.
Step S2: responding to an information data transmission security connection instruction, carrying out information data acquisition processing on an external information database to obtain a preliminary information data set, and carrying out dangerous information data elimination processing on the preliminary information data set to obtain a preliminary security information data set;
In the embodiment of the invention, for example, a bank information database is subjected to data acquisition by utilizing a data transmission security connection instruction to obtain bank customer information, bank manager information and the like, whether dangerous information exists in the data sets or not is detected, and the dangerous information is eliminated, so that the security of user information is ensured, and a preliminary security information data set is generated;
step S3: carrying out standardized information data processing on the preliminary safety information data set so as to obtain a standard safety information data set;
in the embodiment of the invention, for example, the primary safety information data collected by the bank is subjected to block processing, cleaning processing, noise reduction processing and classification processing to obtain the standard safety information data set which is used for organizing and processing all the customer account data according to the same format, so that the data set is easy to manage and analyze, and can be used for internal analysis and reporting of the bank and can also be used for providing information for customers and other related parties.
Step S4: establishing an information data storage database for storing a standard safety information data set, and performing storage database safety improvement processing on the information data storage database so as to generate a safety information data storage database;
In the embodiment of the invention, for example, the obtained standard safety information data set of the bank establishes a database for a storage target, and encryption algorithm, database audit and other technologies are added to the database to improve the safety of the storage database, so that the safety information data storage database is generated.
Step S5: and transmitting the standard safety information data set to a safety information data storage database for data storage processing, thereby obtaining the safety information storage file.
In the embodiment of the invention, the standard safety information data set obtained in the steps is transmitted to the safety information data storage database for data storage, and the safety information data storage database is periodically checked whether the data is dangerous or not, such as encryption storage, periodic backup and the like, and the safety information data storage database is also required to be checked during calling so as to ensure the integrity and the reliability of the data, thereby obtaining the safety information storage file.
In one embodiment of the present specification, step S1 includes the steps of:
step S11: acquiring a gateway communication instruction set;
step S12: the gateway communication instruction set is used for carrying out data transmission connection processing with an external information database so as to generate a data transmission connection instruction;
step S13: performing data transmission connection asymmetric encryption processing on the data transmission connection instruction, thereby generating an encrypted data transmission instruction;
Step S14: and carrying out data security detection processing on the encrypted data transmission instruction, and blocking data in an unsafe external information database when carrying out data transmission, so as to generate an information data transmission security connection instruction.
According to the embodiment, the safety of data transmission from an external information database can be ensured, information is prevented from being stolen by an asymmetric encryption, the safety of data is observed in real time when data security detection is carried out, when a transmission instruction is invaded, the data can be immediately detected, the safe data is prevented from being leaked or damaged in the transmission process, the integrity and the safety of the data are ensured, and the privacy and the safety of important data are protected.
In the embodiment of the invention, the gateway communication instruction of the equipment such as WIFI or an exchanger is obtained, the gateway communication instruction is utilized to carry out network communication connection with a bank information database, so as to generate a data transmission connection instruction, public key infrastructure is realized in the process of the data transmission instruction, the public key is used for encrypting the data transmission connection instruction, the private key is used for decrypting the encrypted data transmission instruction at a receiving end, the safety of data transmission is ensured, the safety detection is carried out on the data transmission instruction, interception and feedback are carried out if a hacker invades, and thus the information data transmission safety connection instruction is generated.
In one embodiment of the present specification, step S2 includes the steps of:
step S21: responding to the information data transmission security connection instruction to perform data acquisition on an external information database so as to generate a preliminary information data set;
step S22: performing information data security checking processing on the preliminary information data set by using an information data security checking formula, thereby obtaining a preprocessed security information data set;
step S23: carrying out dangerous information characteristic collection processing on the preprocessed safety information data set so as to generate a dangerous characteristic information data set;
step S24: establishing a model aiming at eliminating dangerous information in the safety information data set by utilizing the dangerous characteristic information data set to obtain a dangerous information elimination data model;
step S25: and transmitting the preprocessed safety information data set to a dangerous information elimination data model for dangerous information data elimination processing, so as to generate a preliminary safety information data set.
The embodiment relates to safety inspection and dangerous information elimination of information data, and aims to ensure the safety and effectiveness of the information data, and finally obtain a preliminary safe information data set by performing data acquisition, information data safety inspection, dangerous information characteristic collection, dangerous information data elimination and other processes, so that the safety level of the information data and the effectiveness of the information data can be improved, and the data safety and the data correctness can be protected.
As an example of the present invention, referring to fig. 2, a detailed implementation step flow diagram of step S2 in fig. 1 is shown, where the content in this example includes:
step S21: responding to the information data transmission security connection instruction to perform data acquisition on an external information database so as to generate a preliminary information data set;
in the embodiment of the invention, the information data transmission security connection instruction in the steps is utilized to perform data acquisition on a bank information management system, so as to obtain customer information, staff information and the like of a bank, integrate the information and mark the integrated data set as a preliminary information data set.
Step S22: performing information data security checking processing on the preliminary information data set by using an information data security checking formula, thereby obtaining a preprocessed security information data set;
in the embodiment of the invention, as dangerous information data possibly exist in the preliminary information data set and are disguised as normal data, an information data security checking formula is needed to check the preliminary information data set, and whether the dangerous information data is mixed with the data is checked, and the dangerous information data is mixed with the dangerous information data for dangerous information marking, so that a preprocessed security information data set is obtained;
Step S23: carrying out dangerous information characteristic collection processing on the preprocessed safety information data set so as to generate a dangerous characteristic information data set;
in the embodiment of the invention, the characteristic information such as interception, disguise, interruption and the like used in the dangerous information marked in the step of preprocessing the safety information data set is collected, so that the dangerous characteristic information data set is generated.
Step S24: establishing a model aiming at eliminating dangerous information in the safety information data set by utilizing the dangerous characteristic information data set to obtain a dangerous information elimination data model;
in the embodiment of the invention, the dangerous characteristic information data set is utilized to establish a dangerous information elimination data model aiming at dangerous information data in the preprocessed safe information data set, and dangerous information in the data set can be eliminated after the preprocessed safe information data set is transmitted into the dangerous information elimination data module.
Step S25: and transmitting the preprocessed safety information data set to a dangerous information elimination data model for dangerous information data elimination processing, so as to generate a preliminary safety information data set.
In the embodiment of the invention, the preprocessed safety information data are transmitted to the danger elimination information data model, and the danger elimination information data model can detect and eliminate the danger information in the primary safety information data set according to the characteristic information of the danger information, so as to generate the primary safety information data set.
In one embodiment of the present specification, the information data security inspection formula in step S22 is:
wherein Q is represented as an information security inspection index, Q is represented as characteristic information data extracted from the preliminary information data set,weight information of the abnormality information data expressed as the preliminary information data set, a expressed as abnormality characteristic information data extracted for each item of abnormality data in the preliminary information data set, c expressed as weight information conforming to the data standard of the preliminary information data set, and σexpressed as an abnormality correction item of the information security inspection index.
The embodiment is used for evaluating the safety of the preliminary information data set, and utilizing the characteristic information data q extracted by the preliminary information data set to weight information of abnormal information data of the preliminary information data setPerforming abnormal data elimination calculation with the abnormal characteristic information data a extracted from each item of abnormal data in the preliminary information data set to obtain +.>And the information security inspection index Q is adjusted by using the abnormal correction item of the information security inspection index, and the security of the information data is improved by analyzing the abnormal information and the characteristic information in the information security inspection index Q.
In one embodiment of the present specification, the information data processing in step S3 includes an information data blocking process, an information data cleansing process, an information data noise reduction process, and an information data classification process, and step S3 includes the steps of:
step S31: performing data blocking processing on the preliminary safety information data set so as to generate a block file safety information data set;
step S32: performing data cleaning processing on the preliminary safety information data set, and removing redundant data in the preliminary safety information data set so as to obtain a cleaning safety information data set;
step S33: performing data noise reduction processing on the cleaning safety information data set so as to generate a noise reduction safety information data set;
step S34: and carrying out information data classification processing with the same information category on the noise reduction safety information data set so as to obtain a standard safety information data set.
The embodiment can help to improve the quality and accuracy of data, the blocking processing can conveniently manage and process a large amount of information data, the cleaning processing can remove redundant data, the accuracy of the data is improved, the noise reduction processing can reduce the influence of noise on the data, and the classification processing can enable the information data of the same category to be easier to manage and process, so that standard safety information data with high quality and high accuracy is obtained, and safety data analysis and decision are better supported.
As an example of the present invention, referring to fig. 3, a flowchart illustrating a detailed implementation step of step S3 in fig. 1 is shown, where the content in this example includes:
step S31: performing data blocking processing on the preliminary safety information data set so as to generate a block file safety information data set;
in the embodiment of the invention, for example, if the data volume obtained from the bank information database is too large, the data is subjected to block processing, and is divided into different block files and then is subjected to parallel processing, so that the speed of running the data is increased, and a block file safety information data set is generated.
Step S32: performing data cleaning processing on the preliminary safety information data set, and removing redundant data in the preliminary safety information data set so as to obtain a cleaning safety information data set;
in the embodiment of the invention, because the data has a plurality of redundant data or null data and the like, the data is required to be cleaned, the redundant data is cleared, the null data is filled with the average value, the accuracy of the data is improved, and the overlarge error caused by the data in the final result is prevented.
Step S33: performing data noise reduction processing on the cleaning safety information data set so as to generate a noise reduction safety information data set;
In the embodiment of the invention, the noise data in the data are cleared, the accuracy of the data in use is improved, and the influence of the clutter data on the result is prevented, so that the noise reduction safety information data set is generated.
Step S34: and carrying out information data classification processing with the same information category on the noise reduction safety information data set so as to obtain a standard safety information data set.
In the embodiment of the invention, the client information data, the transaction information data, the account information data and the like in the bank information data set are respectively classified to generate the client information data set, the transaction information data set, the account information data set and the like, so that the client information data, the transaction information data set, the account information data set and the like are easier to store, manage and search in the information data storage database, and the classification can help to prevent omission and errors of the information data, thereby obtaining the standard safety information data set.
In one embodiment of the present specification, step S4 includes the steps of:
step S41: establishing an information data storage database for storing a standard safety information data set;
step S42: carrying out historical data extraction processing on the standard safety information data so as to obtain historical safety information data;
step S43: carrying out safety information data characteristic extraction processing by utilizing the historical safety information data to obtain historical characteristic safety information data;
Step S44: setting a database security gateway by utilizing the historical characteristic security information data to obtain a security information data gateway instruction;
step S45: and carrying out storage database security improvement processing on the information data storage database by utilizing the security information data gateway instruction, thereby generating a security information data storage database.
The embodiment establishes a database for storing standard safety information data, is convenient for information management and use, obtains more valuable historical characteristic safety information data through historical data extraction processing and safety information data characteristic extraction processing, helps to improve the accuracy of safety assessment, and when new historical characteristic safety information data can improve the safety information data storage database, consolidates the safety information data storage database to improve the safety of the data, and improves the safety of the storage database by setting a database safety gateway and improving the safety of the storage database, thereby improving the safety protection level of the storage database and reducing the risk of safety information data.
As an example of the present invention, referring to fig. 4, a flowchart illustrating a detailed implementation step of step S4 in fig. 1 is shown, where the content in this example includes:
Step S41: establishing an information data storage database for storing a standard safety information data set;
in the embodiment of the invention, the information data storage database for storing the standard safety information data set is established in the information safety equipment, and the information data storage database can also effectively organize and manage data and can be used for analyzing and solving the problems more easily.
Step S42: carrying out historical data extraction processing on the standard safety information data so as to obtain historical safety information data;
in the embodiment of the invention, the data in the appointed time period is selected from the standard safety information data obtained by the bank information management system, the obtained historical safety information data of the bank information better knows the trend of the historical safety information, improves the safety precaution measure and provides data support for decision making
Step S43: carrying out safety information data characteristic extraction processing by utilizing the historical safety information data to obtain historical characteristic safety information data;
in the embodiment of the invention, the important attribute and relation of the historical safety information data are extracted, so that the key characteristics of the safety information are obtained, and the obtained historical characteristic safety information data can be used as the basis for analysis and decision of other safety data.
Step S44: setting a database security gateway by utilizing the historical characteristic security information data to obtain a security information data gateway instruction;
in the embodiment of the invention, the safety gateway of the database is set by utilizing the characteristics extracted from the past safety information data, and if the stored data does not accord with the standard of the safety data, the data is prevented from entering the database, so that the safety of the database can be improved by analyzing the characteristics of the historical data, and the safety information data gateway instruction is generated.
Step S45: and carrying out storage database security improvement processing on the information data storage database by utilizing the security information data gateway instruction, thereby generating a security information data storage database.
In the embodiment of the invention, the information data storage database can be improved by utilizing the safety information data gateway instruction, dangerous information is prevented from entering the database, the safety of the storage database is improved, and a safety information data storage database is generated.
In one embodiment of the present specification, step S5 includes the steps of:
step S51: transmitting the standard safety information data set to a safety information storage database for external dangerous interception processing of the database, so as to obtain safety pre-stored information data;
Step S52: and carrying out data security storage periodic checking maintenance processing on the security pre-stored information data, thereby obtaining an information security storage file.
The embodiment can ensure that the standard safety information data set can be safely stored in the database, firstly intercept dangerous information outside the database, and periodically check and maintain the dangerous information to ensure the safety of the data, protect the information data from being accidentally lost or destroyed, and ensure the integrity and consistency of the data.
In the embodiment of the invention, standard safety information data is stored in the safety information storage database, the safety information storage database intercepts external information, and the obtained safety pre-stored information data can have dangerous data due to the stored data or the safety information storage database can be attacked by external threat, so that the safety information database is checked regularly, and when dangerous information or external threat attack occurs, a stand horse is maintained, so that the information data is protected from being lost or destroyed accidentally.
In one embodiment of the present specification, step S52 includes the steps of:
step S521: the method comprises the steps of performing periodic vulnerability scanning processing on database storage files on database interception storage information data, so as to generate vulnerability detection database storage information data;
Step S522: performing data security storage periodic checking maintenance processing on the vulnerability detection database storage information data by utilizing a data information security level formula so as to obtain security information storage data or potential danger information storage data;
step S523: presetting an information data integrity rate threshold;
step S524: extracting available data of the dangerous information part from the potential dangerous information storage data to obtain residual characteristic information data;
step S525: carrying out data deletion processing of the dangerous information part on the potential dangerous information storage data to obtain missing information storage data;
step S526: and comparing the data integrity rate by using the missing information storage data with the information data integrity rate threshold, judging that the information data can not be repaired when the integrity rate of the missing information storage file does not reach the information data integrity rate threshold, and judging that the information data can be repaired when the integrity rate of the missing information storage file reaches the information data integrity rate threshold.
Step S527: removing unrepairable stored information data, and performing supervised learning processing on the repairable stored information data based on the residual characteristic information data to recover incomplete information, so as to obtain recovered stored information data;
Step S528: and carrying out information data integration processing on the safety information storage data and the recovery storage information data, thereby obtaining the safety information storage file.
The embodiment is beneficial to protecting the safety of information data stored in a database, periodically checking and maintaining the information, reducing the risk of data leakage, reducing the risk of invasion of a hacker on the database, repairing unsafe data, improving the safety level of the data, enabling the data to have potential safety hazards, periodically checking and maintaining the information to discover and process the problem of data leakage in time, improving the safety of the data, protecting privacy data of a user, preventing the privacy data from being acquired by unauthorized people, judging the threat level of the information data by utilizing a data information safety level formula, separating the safe data from the unsafe data in the information data, processing the data by utilizing a simple information safety device, distinguishing the unsafe information into irrecoverable unsafe information data and repairable unsafe information in a data information safety level formula, repairing the unsafe information by utilizing the dangerous information which is dropped in the unsafe information, clearing the needed information, feeding back to a terminal, thereby guaranteeing the integrity of the stored data of the safe information storage database, preventing a large amount of the data from being lost due to threat of the data, and conveniently integrating the stored data with the stored information and the management information. And further, the integrity and the reliability of the stored data are improved, and the safety risk is reduced. The generated safety information storage file can be backed up and restored conveniently, and the safety of the data is ensured.
In the embodiment of the invention, when standard safety information data is stored in a safety information storage database, database loophole scanning is periodically carried out to identify whether the standard safety information data stored in the database or the safety information storage database has safety loopholes, the loophole detection database storage information data is generated, the loophole detection database storage information data is periodically checked by utilizing a data information safety level formula, the data with the unqualified safety level is marked as potential safety information storage data, the data with the unqualified safety level is marked as safety information storage data, available data extraction is carried out on dangerous information in the unsafe information data, usable information data is extracted, then dangerous information in the unsafe information data is deleted, other data sets or databases are prevented from being damaged, the degree that the dangerous information data can be recovered after the unsafe information data is deleted is judged, the recoverable storage information data is monitored, learned and recovered to be incomplete information by utilizing residual characteristic information data, the safe information storage data and the recovered storage information data are obtained, and the information data is conveniently managed and integrated, and the safety information storage file is obtained.
In one embodiment of the present specification, the data information security level formula in step S523 is:
wherein Z is represented as a security level of the vulnerability detection database storing information data, r is represented as weight information of the dangerous information data intercepted in the security information data storing database, t is represented as weight information of the vulnerability data detected in the vulnerability detection database storing information data, b is represented as security information data in the vulnerability detection database storing information data,the estimated security level is represented as an estimated security level generated according to the current hole detection database storage information, z is represented as a security information expected level generated according to the vulnerability detection database storage information data, p is represented as weight information for adjusting abnormal data in the vulnerability detection database storage information data, and τ is represented as a correction term of the security level of the abnormal vulnerability detection database storage information data.
The embodiment is used for the vulnerability detection databaseThe security level of the information data inspection data, the weight information r of the intercepted dangerous information data in the security information data storage database and the security information data b in the vulnerability detection database storage information data are generated by utilizing the weight information t of the detected vulnerability data in the vulnerability detection database storage information data to generate a dangerous information judgment level e of the vulnerability detection database storage information data -rt sinbt, and then passing through a predicted security level generated according to the stored information of the current hole detection databaseThe security information expected level Z generated according to the vulnerability detection database storage information data and the weight information p for adjusting the abnormal data in the vulnerability detection database storage information data are used for carrying out level judgment on the vulnerability detection database storage information data, and the correction item tau of the security level of the vulnerability detection database storage information data is utilized for adjusting to obtain the security level Z of the vulnerability detection database storage information data.
In one embodiment of the present specification, an information security apparatus includes:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the information security storage method of any one of the above.
The embodiment provides information security equipment, which is characterized in that an information data transmission security connection instruction capable of carrying out security data communication with an external information database is established by utilizing a gateway communication connection instruction, the external information database is acquired by utilizing the information data transmission security connection instruction, the acquired data set is subjected to data processing, a security information data storage database is established for storing the data set obtained after the processing, the security information data storage database periodically checks whether stored data is secure or not, unsafe data is processed, and a reliable and safe data set storage file is obtained. By executing the information security storage method, the security of the data is ensured, the data is prevented from being revealed or illegally accessed, the complete data information is saved, the integrity and the reliability of the data are guaranteed, the performance and the efficiency of the system can be improved, and when the data are lost or damaged, the data recovery is supported, and the security of the data is guaranteed.
In an embodiment of the present invention, an information security device includes:
the data acquisition function is used for acquiring information of an external information database;
a data processing function for processing the acquired information data set;
The method comprises the steps of establishing a database function for constructing a safety information storage database;
and a data storage function for storing the information data set in a secure information storage database.
As an example of the present invention, referring to fig. 5, a schematic diagram of a method for obtaining a secure information storage file after an information security device collects information data is shown, in this example, the method includes:
after the information safety equipment is in reliable data communication connection with an external information database, data of safety communication is acquired on an information data set of the external information database to obtain a preliminary safety information data set, standard safety information data set is obtained by standardized data processing on the preliminary safety information data set, a safety information data storage database is constructed, and a safety information storage file is obtained by storing the standard safety information data set by the safety information data storage database.
The invention provides an information security storage method and an information security device thereof, which are characterized in that a gateway communication instruction set is acquired and then is in transmission connection with an external information database, in order to ensure reliable data transmission, security inspection is carried out on data transmission, so that data is not tampered or leaked by a third party in the transmission process, when the information security device carries out data acquisition on the external information database, whether the acquired information data is dangerous to the information security device is judged, the dangerous information data is prevented from being subjected to data acquisition, normal data acquisition is carried out on normal information data, the information security device obtains a safe information data set, data processing is carried out on the information data set, data blocking is carried out on the information data set, the method has the advantages that the data processing speed is increased, the data cleaning and the data noise reduction processing are carried out on the information data set, the data application efficiency is improved, the result caused by the information data set is more accurate, the information data set is more conveniently called, a safe information data storage database for storing the information data set is built, illegal access and tampering of the information data are prevented, dangerous information data can be blocked outside the database by the aid of the function of the safe information data storage database, the information data set is regularly checked by the safe information data storage database, and whether the information data in the safe information data storage database have dangerous data camouflaged into normal data or the safety information data storage database have dangers exist. By storing the information data in the secure database, the information data can be better managed, the efficiency of data storage and access is improved, and the threat to the security of the information caused by factors such as data loss or leakage is avoided.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for securely storing information, the method comprising the steps of:
step S1: the method comprises the steps that a gateway communication instruction set is obtained, the information safety equipment performs data transmission connection with an external information database according to the gateway communication instruction set, generates a transmission connection instruction, and performs data security detection processing on the transmission connection instruction, so that an information data transmission security connection instruction is generated;
step S2: responding to an information data transmission security connection instruction, carrying out information data acquisition processing on an external information database to obtain a preliminary information data set, and carrying out dangerous information data elimination processing on the preliminary information data set to obtain a preliminary security information data set;
Step S3: carrying out standardized information data processing on the preliminary safety information data set so as to obtain a standard safety information data set;
step S4: establishing an information data storage database for storing a standard safety information data set, and performing storage database safety improvement processing on the information data storage database so as to generate a safety information data storage database;
step S5: and transmitting the standard safety information data set to a safety information data storage database for data storage processing, thereby obtaining the safety information storage file.
2. The information security storage method according to claim 1, wherein the step S1 includes the steps of:
step S11: acquiring a gateway communication instruction set;
step S12: the gateway communication instruction set is used for carrying out data transmission connection processing with an external information database so as to generate a data transmission connection instruction;
step S13: performing data transmission connection asymmetric encryption processing on the data transmission connection instruction, thereby generating an encrypted data transmission instruction;
step S14: and carrying out data security detection processing on the encrypted data transmission instruction, and blocking data in an unsafe external information database when carrying out data transmission, so as to generate an information data transmission security connection instruction.
3. The information security storage method according to claim 2, wherein the step S2 includes the steps of:
step S21: responding to the information data transmission security connection instruction to perform data acquisition on an external information database so as to generate a preliminary information data set;
step S22: performing information data security checking processing on the preliminary information data set by using an information data security checking formula, thereby obtaining a preprocessed security information data set;
step S23: carrying out dangerous information characteristic collection processing on the preprocessed safety information data set so as to generate a dangerous characteristic information data set;
step S24: establishing a model aiming at eliminating dangerous information in the safety information data set by utilizing the dangerous characteristic information data set to obtain a dangerous information elimination data model;
step S25: and transmitting the preprocessed safety information data set to a dangerous information elimination data model for dangerous information data elimination processing, so as to generate a preliminary safety information data set.
4. The information security storage method according to claim 3, wherein the information data security inspection formula in step S23 is:
wherein Q is represented as an information security inspection index, Q is represented as characteristic information data extracted from the preliminary information data set, Weight information of the abnormality information data expressed as the preliminary information data set, a expressed as abnormality characteristic information data extracted for each item of abnormality data in the preliminary information data set, c expressed as weight information conforming to the data standard of the preliminary information data set, and σexpressed as an abnormality correction item of the information security inspection index.
5. The information security storage method according to claim 3, wherein the information data processing in step S3 includes information data blocking processing, information data cleaning processing, information data noise reduction processing, and information data classification processing, and step S3 includes the steps of:
step S31: performing data blocking processing on the preliminary safety information data set so as to generate a block file safety information data set;
step S32: performing data cleaning processing on the preliminary safety information data set, and removing redundant data in the preliminary safety information data set so as to obtain a cleaning safety information data set;
step S33: performing data noise reduction processing on the cleaning safety information data set so as to generate a noise reduction safety information data set;
step S34: and carrying out information data classification processing with the same information category on the noise reduction safety information data set so as to obtain a standard safety information data set.
6. The information security storage method of claim 5, wherein step S4 comprises the steps of:
step S41: establishing an information data storage database for storing a standard safety information data set;
step S42: carrying out historical data extraction processing on the standard safety information data so as to obtain historical safety information data;
step S43: carrying out safety information data characteristic extraction processing by utilizing the historical safety information data to obtain historical characteristic safety information data;
step S44: setting a database security gateway by utilizing the historical characteristic security information data to obtain a security information data gateway instruction;
step S45: and carrying out storage database security improvement processing on the information data storage database by utilizing the security information data gateway instruction, thereby generating a security information data storage database.
7. The information security storage method of claim 6, wherein step S5 includes the steps of:
step S51: transmitting the standard safety information data set to a safety information storage database for external dangerous interception processing of the database, so as to obtain safety pre-stored information data;
step S52: and carrying out data security storage periodic checking maintenance processing on the security pre-stored information data, thereby obtaining an information security storage file.
8. The information security storage method of claim 7, wherein step S52 includes the steps of:
step S521: the method comprises the steps of performing periodic vulnerability scanning processing on database storage files on database interception storage information data, so as to generate vulnerability detection database storage information data;
step S522: performing data security storage periodic checking maintenance processing on the vulnerability detection database storage information data by utilizing a data information security level formula so as to obtain security information storage data or potential danger information storage data;
step S523: presetting an information data integrity rate threshold;
step S524: extracting available data of the dangerous information part from the potential dangerous information storage data to obtain residual characteristic information data;
step S525: carrying out data deletion processing of the dangerous information part on the potential dangerous information storage data to obtain missing information storage data;
step S526: comparing the data integrity rate by using the missing information storage data with the information data integrity rate threshold, judging that the information data can not be repaired when the integrity rate of the missing information storage file does not reach the information data integrity rate threshold, and judging that the information data can be repaired when the integrity rate of the missing information storage file reaches the information data integrity rate threshold;
Step S527: removing unrepairable stored information data, and performing supervised learning processing on the repairable stored information data based on the residual characteristic information data to recover incomplete information, so as to obtain recovered stored information data;
step S528: and carrying out information data integration processing on the safety information storage data and the recovery storage information data, thereby obtaining the safety information storage file.
9. The information security storage method according to claim 1, wherein the data information security level formula in step S523 is:
wherein z represents the security level of the vulnerability detection database storing information data, r represents the weight information of the dangerous information data intercepted in the security information data storing database, t represents the weight information of the vulnerability data detected in the vulnerability detection database storing information data, b represents the security information data in the vulnerability detection database storing information data,the estimated security level is represented as an estimated security level generated according to the current hole detection database storage information, z is represented as a security information expected level generated according to the vulnerability detection database storage information data, p is represented as weight information for adjusting abnormal data in the vulnerability detection database storage information data, and τ is represented as a correction term of the security level of the abnormal vulnerability detection database storage information data.
10. An information security device, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the information security storage method of any one of claims 1 to 9.
CN202310254993.4A 2023-03-08 2023-03-08 Information security storage method and information security device thereof Active CN116248406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310254993.4A CN116248406B (en) 2023-03-08 2023-03-08 Information security storage method and information security device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310254993.4A CN116248406B (en) 2023-03-08 2023-03-08 Information security storage method and information security device thereof

Publications (2)

Publication Number Publication Date
CN116248406A CN116248406A (en) 2023-06-09
CN116248406B true CN116248406B (en) 2023-09-01

Family

ID=86624127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310254993.4A Active CN116248406B (en) 2023-03-08 2023-03-08 Information security storage method and information security device thereof

Country Status (1)

Country Link
CN (1) CN116248406B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116797267B (en) * 2023-08-23 2023-11-24 深空间发展投资控股(湖北)有限公司 Distributed market data acquisition management system for equity investment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2045752A2 (en) * 2007-10-02 2009-04-08 Sony Corporation Recording system, information processing apparatus, storage apparatus, recording method, and program
CN109495482A (en) * 2018-11-23 2019-03-19 江苏华存电子科技有限公司 A kind of network data information safe transmission method
CN109660526A (en) * 2018-12-05 2019-04-19 国网江西省电力有限公司信息通信分公司 A kind of big data analysis method applied to information security field
CN111046405A (en) * 2019-12-12 2020-04-21 国家电网有限公司大数据中心 Data processing method, device, equipment and storage medium
CN112100634A (en) * 2020-09-17 2020-12-18 广州皓品科技有限公司 Data information security protection method
CN112636921A (en) * 2020-12-16 2021-04-09 江苏商贸职业学院 Method and system for improving network information transmission security
CN113839956A (en) * 2021-09-28 2021-12-24 平安医疗健康管理股份有限公司 Data security evaluation method, device, equipment and storage medium
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis
CN115277143A (en) * 2022-07-19 2022-11-01 中天动力科技(深圳)有限公司 Data secure transmission method, device, equipment and storage medium
CN115659351A (en) * 2022-10-24 2023-01-31 南京鼎山信息科技有限公司 Information security analysis method, system and equipment based on big data office

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20210090505A (en) * 2020-01-10 2021-07-20 삼성전자주식회사 Memory controller, storage device including the same

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2045752A2 (en) * 2007-10-02 2009-04-08 Sony Corporation Recording system, information processing apparatus, storage apparatus, recording method, and program
CN109495482A (en) * 2018-11-23 2019-03-19 江苏华存电子科技有限公司 A kind of network data information safe transmission method
CN109660526A (en) * 2018-12-05 2019-04-19 国网江西省电力有限公司信息通信分公司 A kind of big data analysis method applied to information security field
CN111046405A (en) * 2019-12-12 2020-04-21 国家电网有限公司大数据中心 Data processing method, device, equipment and storage medium
CN112100634A (en) * 2020-09-17 2020-12-18 广州皓品科技有限公司 Data information security protection method
CN112636921A (en) * 2020-12-16 2021-04-09 江苏商贸职业学院 Method and system for improving network information transmission security
CN113839956A (en) * 2021-09-28 2021-12-24 平安医疗健康管理股份有限公司 Data security evaluation method, device, equipment and storage medium
CN114826691A (en) * 2022-04-02 2022-07-29 深圳市博博信息咨询有限公司 Network information safety intelligent analysis early warning management system based on multi-dimensional analysis
CN115277143A (en) * 2022-07-19 2022-11-01 中天动力科技(深圳)有限公司 Data secure transmission method, device, equipment and storage medium
CN115659351A (en) * 2022-10-24 2023-01-31 南京鼎山信息科技有限公司 Information security analysis method, system and equipment based on big data office

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"面向云存储数据安全共享的密码协议研究";苏烨;《中国博士学位论文全文数据库信息科技辑》;全文 *

Also Published As

Publication number Publication date
CN116248406A (en) 2023-06-09

Similar Documents

Publication Publication Date Title
US10949534B2 (en) Method for predicting and characterizing cyber attacks
US10599872B2 (en) Systems and methods of determining compromised identity information
US20170161520A1 (en) Systems and Methods of Determining Compromised Identity Information
US9008617B2 (en) Layered graphical event mapping
CN110581827B (en) Detection method and device for brute force cracking
CN102546641B (en) Method and system for carrying out accurate risk detection in application security system
CN112787992A (en) Method, device, equipment and medium for detecting and protecting sensitive data
CN116248406B (en) Information security storage method and information security device thereof
CN112804212A (en) Information security assessment system
CN113852633A (en) Method for generating implementation case for information security assessment
CN112100662A (en) Regional data safety monitoring system
CN112422527B (en) Threat assessment system, method and device for substation power monitoring system
CN117113199A (en) File security management system and method based on artificial intelligence
CN116886335A (en) Data security management system
CN116094817A (en) Network security detection system and method
CN115600189A (en) Commercial password application security evaluation system
Pires et al. Cyber Threat Analysis Using Pearson and Spearman Correlation Via Exploratory Data Analysis
CN110750795B (en) Information security risk processing method and device
CN113542186A (en) Monitoring system based on network security and early warning method thereof
CN111726355A (en) Network security situation perception system based on big data
CN117541318B (en) Offline consumption intelligent evaluation and supervision method, system and medium
Zhao Development of Electric Power Information Communication in the Era of Big Data
Sri Sumanth et al. Pragmatic Reform to Ameliorate Insider Data Theft Detection
CN109361652B (en) Car insurance claim settlement safety protection system
CN117592109A (en) Enterprise financial information safety management method and system based on deep learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant