CN117220992A - Cloud security management monitoring method and system supporting commercial cryptographic algorithm - Google Patents

Cloud security management monitoring method and system supporting commercial cryptographic algorithm Download PDF

Info

Publication number
CN117220992A
CN117220992A CN202311321723.7A CN202311321723A CN117220992A CN 117220992 A CN117220992 A CN 117220992A CN 202311321723 A CN202311321723 A CN 202311321723A CN 117220992 A CN117220992 A CN 117220992A
Authority
CN
China
Prior art keywords
information
acquiring
authentication
potential
target object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311321723.7A
Other languages
Chinese (zh)
Other versions
CN117220992B (en
Inventor
陈燕
陈一方
孙佳宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youzhan Intelligent Technology Co ltd
Original Assignee
Shanghai Youzhan Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Youzhan Intelligent Technology Co ltd filed Critical Shanghai Youzhan Intelligent Technology Co ltd
Priority to CN202311321723.7A priority Critical patent/CN117220992B/en
Publication of CN117220992A publication Critical patent/CN117220992A/en
Application granted granted Critical
Publication of CN117220992B publication Critical patent/CN117220992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The application discloses a cloud security management monitoring method and a cloud security management monitoring system supporting a commercial cryptographic algorithm, which comprise an intelligent acquisition unit, a personnel authentication management unit and an information output unit, relate to the technical field of information communication management, and solve the technical problem that whether potential hazards exist or not can not be identified according to operation behaviors of users and further information leakage can be caused.

Description

Cloud security management monitoring method and system supporting commercial cryptographic algorithm
Technical Field
The application relates to the technical field of information communication management, in particular to a cloud security management monitoring method and system supporting a commercial cryptographic algorithm.
Background
With the rapid development of information network technology, cloud-based wireless networks are also spreading to various domestic families and public places, and people have begun to enjoy the convenience brought by wireless networks to work and life. However, this convenience also brings a multiplicative opportunity for lawbreakers, and more network illegal activities are started to be performed through the wireless network of the public place.
According to the patent display of application number CN202211400767.4, the remote real-time management of the monitoring equipment is realized through an interactive mode, the monitoring equipment is convenient for users and operation and maintenance personnel to manage, meanwhile, the supported lightweight publishing/subscribing type message transmission is adopted, reliable network service is provided for the monitoring equipment in a low-bandwidth and unstable network environment, mass connection, high concurrency and low-time delay stable monitoring equipment access service is provided, data encryption is supported, a high-safety monitoring equipment data transmission channel is provided, monitoring equipment information is screened and forwarded, asynchronous execution is realized through sending the information, so that the response speed of a system is improved, the monitoring cloud platform is supported to issue monitoring equipment instructions, and state information of the monitoring equipment is acquired according to different instructions.
When the existing network information is managed and monitored, on one hand, the information is monitored by encrypting the data, and on the other hand, the log, the user operation and the loopholes in the cloud server are managed and monitored, but whether potential hazards exist can not be identified according to the operation behaviors of the user in the process of management and monitoring, and further potential hazards exist, so that the potential hazards of information leakage can be caused to the whole.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides a cloud security management monitoring method and a cloud security management monitoring system supporting a commercial cryptographic algorithm, which solve the problem that whether potential danger exists or not can not be identified according to the operation behaviors of users and further information leakage can be caused.
In order to achieve the above purpose, the application is realized by the following technical scheme: a cloud security management system supporting a business cryptographic algorithm, comprising:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information;
the personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the specific mode of transmitting the authentication correct information and the authentication error information to the cloud security management monitoring unit and transmitting the authentication error information to the information output unit and generating the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information. Firstly, verifying and authenticating basic information of an operation user, directly not allowing access to the basic information without verification, and performing access right verification analysis to the basic information after verification;
the cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the method comprises the steps of transmitting a potential danger signal and a normal signal to a potential danger analysis unit, and transmitting the normal signal to an information output unit, wherein the specific mode for generating supervision information is as follows:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, classifying the user operation times to obtain normal operation times and dangerous operation times, respectively marking the normal operation times and the dangerous operation times as ZC and XC, and substituting the normal operation times and the dangerous operation times into a formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator. The dangerous occupation ratio is expressed as the occupation ratio of the abnormal operation, the operation times of the user in the history information are expressed as the operation times corresponding to the same abnormal operation, and whether the current operation of the user has potential danger is judged by judging the occupation ratio of the same abnormal operation;
the potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and combining the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, and transmitting the analysis results to the information output unit, wherein the specific mode for generating the analysis results is as follows:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object; here, the reference numeral i denotes a classification type, 1 and 2 denote types, and a specific classification type may be used.
A1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, the potential hazards matched with each other are acquired, highlighting processing is carried out on the potential hazards, meanwhile, operation behavior information of a target object is acquired, and specific screening is carried out according to operation time in the operation behavior information, wherein the specific screening mode is as follows:
a31: acquiring all corresponding operation time of the potential hazards of the same type classification, then calculating an operation time average value of the whole potential hazards of the same type classification as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed; it should be noted that the potential risk to be analyzed is represented as the two operation times are matched with each other, and the potential risk to be analyzed is of a general type.
A32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit. Here, the generated analysis result is expressed as an influence caused by the potential danger, and the analysis result is generated by integrating the influence and combining the corresponding operation behaviors.
And the information output unit is used for acquiring the transmitted supervision information and analysis results and displaying the supervision information and the analysis results to an operator through the display equipment.
Advantageous effects
The application provides a cloud security management monitoring method and system supporting a commercial cryptographic algorithm. Compared with the prior art, the method has the following beneficial effects:
according to the application, whether the operation user has access right is judged by carrying out authentication verification on basic information of the operation user, the operation user without the access right is directly not allowed to access, the current operation of the operation user with the access right is analyzed and monitored, whether the current operation has potential danger is judged, data analysis is carried out on the operation with the potential danger, specific potential danger analysis is carried out by combining historical data, the potential danger is displayed in a materialized mode, the operation user is convenient to watch and correct subsequent operation, and meanwhile, potential problems can be found timely, so that the influence of the occurrence of the potential problems on subsequent information storage is avoided.
Drawings
FIG. 1 is a flow chart of a system of the present application;
FIG. 2 is a flow chart of the method of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the present application provides a cloud security management system supporting a commercial cryptographic algorithm, including:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information.
The personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the specific mode of transmitting the authentication correct information and the authentication error information to the cloud security management monitoring unit and transmitting the authentication error information to the information output unit and generating the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information. The method includes that firstly, verification authentication is carried out on basic information of an operation user, access is not allowed for the basic information without verification, and access authority verification analysis is carried out for the basic information after verification.
The cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the method comprises the steps of transmitting a potential danger signal to a potential danger analysis unit, transmitting a normal signal to an information output unit, and generating supervision information in the following specific modes:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, and classifying the user operation times to obtain normal operation times and dangerous operation timesThe times are recorded as ZC and XC respectively, and then the two are substituted into the formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator. It should be noted that, the dangerous occupation ratio is represented by an occupation ratio of abnormal operation, and the number of user operations in the history information is represented by the number of operations corresponding to the same abnormal operation, and whether the current operation of the user has a potential danger is judged by judging the occupation ratio of the same abnormal operation to have the abnormality.
And the information output unit is used for acquiring the transmitted supervision information and displaying the supervision information to an operator through the display equipment.
In the second embodiment, the second embodiment of the present application is different from the first embodiment in that the potentially dangerous signal transmitted is acquired and analyzed by the potentially dangerous analyzing unit.
The potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and combining the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, transmitting the analysis results to the information output unit, and generating the analysis results in the following specific mode:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object; here, the reference numeral i denotes a classification type, 1 and 2 denote types, and a specific classification type may be used.
A1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, acquiring the potential hazards matched with each other, carrying out highlighting treatment on the potential hazards, acquiring the operation behavior information of the target object, and carrying out specific screening according to the operation time in the operation behavior information, wherein the specific screening mode is as follows:
a31: acquiring all corresponding operation time of the same type of classified potential hazards, then calculating the operation time average value of the whole classified potential hazards as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed; it should be noted that the potential risk to be analyzed is represented as the two operation times are matched with each other, and the potential risk to be analyzed is of a general type.
A32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit. Here, the generated analysis result is expressed as an influence caused by the potential danger, and the analysis result is generated by integrating the influence and combining the corresponding operation behaviors.
And the information output unit is used for acquiring the transmitted analysis result and displaying the analysis result to an operator through the display equipment.
Embodiment III as embodiment III of the present application, the emphasis is on combining the implementation procedures of embodiment I and embodiment II.
Specifically, when the whole system monitors and manages data, the data is encrypted through a commercial cryptographic algorithm, wherein the commercial cryptographic algorithm comprises: common cryptographic algorithms comprise three kinds of symmetric cryptographic algorithms, public key cryptographic algorithms and hash algorithms, common symmetric algorithms comprise ZUC, SM1, SM4, SM7 and DES, TDES, AES, common asymmetric algorithms comprise SM2, SM9, RSA, ECC and the like, common cryptographic hash algorithms comprise SM3, SHA1, SHA256, SHA512, MD5 and the like, and the SM9 in the asymmetric algorithms adopted in the application is particularly used for encrypting data and transmitting and storing the encrypted data for supervision.
A cloud security monitoring method supporting a commercial cryptographic algorithm specifically comprises the following steps:
step one: acquiring personnel information of an operation user, checking the personnel information, and then authenticating the access authority of the operation user passing the check to generate authentication correct information and authentication error information;
step two: then, operation behavior information corresponding to the operation user corresponding to the authentication correct information is obtained, and the operation behavior is identified by combining a behavior model established by the historical information to obtain normal operation and abnormal operation;
step three: secondly, analyzing the abnormal operation, and generating a corresponding normal signal and a corresponding potential dangerous signal by calculating the dangerous occupation ratio of the abnormal operation and comparing the dangerous occupation ratio with a preset value;
step four: and finally, analyzing the potential danger signals, classifying the potential hazards, and matching the classified potential hazards with the abnormal operation of the user to generate an analysis result.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.

Claims (7)

1. A cloud security management system supporting a business cryptographic algorithm, comprising:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information;
the personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the authentication correct information and the authentication error information are transmitted to the cloud security management monitoring unit at the same time, and the authentication error information is transmitted to the information output unit;
the cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the potential danger signal and the normal signal are transmitted to the potential danger analysis unit at the same time, and the normal signal is transmitted to the information output unit;
the potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, and transmitting the analysis results to the information output unit.
2. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the specific manner in which the person authentication management unit generates the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information.
3. The cloud security management system supporting a commercial cryptographic algorithm according to claim 1, wherein the specific manner in which the cloud security management monitoring unit generates the supervision information is as follows:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, classifying the user operation times to obtain normal operation times and dangerous operation times, respectively marking the normal operation times and the dangerous operation times as ZC and XC, and substituting the normal operation times and the dangerous operation times into a formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator.
4. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the specific manner in which the potentially dangerous analysis unit generates the analysis result is as follows:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object;
a1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, the potential hazards matched with each other are acquired, highlighting processing is carried out on the potential hazards, meanwhile, operation behavior information of a target object is acquired, and specific screening is carried out according to operation time in the operation behavior information.
5. The cloud security management system supporting a commercial cryptographic algorithm according to claim 4, wherein the specific screening method in A3 is as follows:
a31: acquiring all corresponding operation time of the potential hazards of the same type classification, then calculating an operation time average value of the whole potential hazards of the same type classification as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed;
a32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit.
6. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the information output unit is configured to obtain the transmitted supervision information and analysis result and display the same to an operator through a display device.
7. A cloud security monitoring method supporting a commercial cryptographic algorithm according to any one of claims 1-6, characterized in that the method comprises the steps of:
step one: acquiring personnel information of an operation user, checking the personnel information, and then authenticating the access authority of the operation user passing the check to generate authentication correct information and authentication error information;
step two: then, operation behavior information corresponding to the operation user corresponding to the authentication correct information is obtained, and the operation behavior is identified by combining a behavior model established by the historical information to obtain normal operation and abnormal operation;
step three: secondly, analyzing the abnormal operation, and generating a corresponding normal signal and a corresponding potential dangerous signal by calculating the dangerous occupation ratio of the abnormal operation and comparing the dangerous occupation ratio with a preset value;
step four: and finally, analyzing the potential danger signals, classifying the potential hazards, and matching the classified potential hazards with the abnormal operation of the user to generate an analysis result.
CN202311321723.7A 2023-10-12 2023-10-12 Cloud security management monitoring method and system supporting commercial cryptographic algorithm Active CN117220992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311321723.7A CN117220992B (en) 2023-10-12 2023-10-12 Cloud security management monitoring method and system supporting commercial cryptographic algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311321723.7A CN117220992B (en) 2023-10-12 2023-10-12 Cloud security management monitoring method and system supporting commercial cryptographic algorithm

Publications (2)

Publication Number Publication Date
CN117220992A true CN117220992A (en) 2023-12-12
CN117220992B CN117220992B (en) 2024-05-10

Family

ID=89044428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311321723.7A Active CN117220992B (en) 2023-10-12 2023-10-12 Cloud security management monitoring method and system supporting commercial cryptographic algorithm

Country Status (1)

Country Link
CN (1) CN117220992B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111913860A (en) * 2020-07-15 2020-11-10 中国民航信息网络股份有限公司 Operation behavior analysis method and device
CN113282474A (en) * 2021-05-31 2021-08-20 长沙市到家悠享家政服务有限公司 User behavior monitoring method, system, equipment and medium based on bastion machine
CN114254716A (en) * 2022-03-02 2022-03-29 浙江鹏信信息科技股份有限公司 High-risk operation identification method and system based on user behavior analysis
CN115374426A (en) * 2022-08-23 2022-11-22 中国电信股份有限公司 Access control method, device, equipment and storage medium
US11652828B1 (en) * 2021-01-11 2023-05-16 Wells Fargo Bank, N.A. Systems and methods for automated anomalous behavior detection and risk-scoring individuals
CN116319100A (en) * 2023-05-22 2023-06-23 交通运输部水运科学研究所 Port dangerous source safety admittance method and system based on GIS spatial data analysis
CN116595502A (en) * 2023-06-12 2023-08-15 江西开创数码科技有限公司 User management method and related device based on intelligent contract
CN116800515A (en) * 2023-07-10 2023-09-22 福建省远顺智能科技有限公司 Industrial Internet platform safety maintenance system based on artificial intelligence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111913860A (en) * 2020-07-15 2020-11-10 中国民航信息网络股份有限公司 Operation behavior analysis method and device
US11652828B1 (en) * 2021-01-11 2023-05-16 Wells Fargo Bank, N.A. Systems and methods for automated anomalous behavior detection and risk-scoring individuals
CN113282474A (en) * 2021-05-31 2021-08-20 长沙市到家悠享家政服务有限公司 User behavior monitoring method, system, equipment and medium based on bastion machine
CN114254716A (en) * 2022-03-02 2022-03-29 浙江鹏信信息科技股份有限公司 High-risk operation identification method and system based on user behavior analysis
CN115374426A (en) * 2022-08-23 2022-11-22 中国电信股份有限公司 Access control method, device, equipment and storage medium
CN116319100A (en) * 2023-05-22 2023-06-23 交通运输部水运科学研究所 Port dangerous source safety admittance method and system based on GIS spatial data analysis
CN116595502A (en) * 2023-06-12 2023-08-15 江西开创数码科技有限公司 User management method and related device based on intelligent contract
CN116800515A (en) * 2023-07-10 2023-09-22 福建省远顺智能科技有限公司 Industrial Internet platform safety maintenance system based on artificial intelligence

Also Published As

Publication number Publication date
CN117220992B (en) 2024-05-10

Similar Documents

Publication Publication Date Title
US8819807B2 (en) Apparatus and method for analyzing and monitoring sap application traffic, and information protection system using the same
JP2019527417A (en) System and method for providing a secure data monitoring system executed in a factory or plant
US11431505B2 (en) Generating a legally binding object within a group-based communication system
CN112216038A (en) Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system
US10282239B2 (en) Monitoring method
CN113506096B (en) Inter-system interface method based on industrial internet identification analysis system
CN111339050B (en) Centralized security audit method and system based on big data platform
CN112583594B (en) Data processing method, acquisition device, gateway, trusted platform and storage medium
CN116760868B (en) Automatic judging and detecting method and system for intelligent distribution transformer
CN117220992B (en) Cloud security management monitoring method and system supporting commercial cryptographic algorithm
CN110138792B (en) Public health geographic data privacy removal processing method and system
CN110086796B (en) Transmission method for collecting monitoring data based on public-private key encryption technology
CN112087301A (en) Gas meter safety certification system based on state cryptographic algorithm
CN111737747A (en) Database security method, device, equipment and computer storage medium
US20130311385A1 (en) Third Party Security Monitoring & Audit
CN111723410A (en) Hard disk encryption method, hard disk lock system, hard disk encryption device and storage medium
CN114567469B (en) Application password type detection method and platform based on B/S mode
CN108600173B (en) Distributed traveling wave ranging system and method with encryption security
CN110570197A (en) Data processing method and device based on block chain
CN115967537A (en) Block chain-based power grid service data storage method and system
CN112214771A (en) Information analysis method and device based on big data and computer readable storage medium
CN117194334B (en) Log storage method, device, equipment and medium of distributed log storage system
CN111814183B (en) Financial real-time wind control system and method based on network layer message analysis
CN117407849B (en) Industrial data security protection method and system based on industrial Internet technology
CN110569646B (en) File recognition method and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant