CN117220992A - Cloud security management monitoring method and system supporting commercial cryptographic algorithm - Google Patents
Cloud security management monitoring method and system supporting commercial cryptographic algorithm Download PDFInfo
- Publication number
- CN117220992A CN117220992A CN202311321723.7A CN202311321723A CN117220992A CN 117220992 A CN117220992 A CN 117220992A CN 202311321723 A CN202311321723 A CN 202311321723A CN 117220992 A CN117220992 A CN 117220992A
- Authority
- CN
- China
- Prior art keywords
- information
- acquiring
- authentication
- potential
- target object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 27
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000006399 behavior Effects 0.000 claims abstract description 50
- 238000004458 analytical method Methods 0.000 claims description 42
- 230000002159 abnormal effect Effects 0.000 claims description 26
- 238000012795 verification Methods 0.000 claims description 20
- 238000012216 screening Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Landscapes
- Alarm Systems (AREA)
Abstract
The application discloses a cloud security management monitoring method and a cloud security management monitoring system supporting a commercial cryptographic algorithm, which comprise an intelligent acquisition unit, a personnel authentication management unit and an information output unit, relate to the technical field of information communication management, and solve the technical problem that whether potential hazards exist or not can not be identified according to operation behaviors of users and further information leakage can be caused.
Description
Technical Field
The application relates to the technical field of information communication management, in particular to a cloud security management monitoring method and system supporting a commercial cryptographic algorithm.
Background
With the rapid development of information network technology, cloud-based wireless networks are also spreading to various domestic families and public places, and people have begun to enjoy the convenience brought by wireless networks to work and life. However, this convenience also brings a multiplicative opportunity for lawbreakers, and more network illegal activities are started to be performed through the wireless network of the public place.
According to the patent display of application number CN202211400767.4, the remote real-time management of the monitoring equipment is realized through an interactive mode, the monitoring equipment is convenient for users and operation and maintenance personnel to manage, meanwhile, the supported lightweight publishing/subscribing type message transmission is adopted, reliable network service is provided for the monitoring equipment in a low-bandwidth and unstable network environment, mass connection, high concurrency and low-time delay stable monitoring equipment access service is provided, data encryption is supported, a high-safety monitoring equipment data transmission channel is provided, monitoring equipment information is screened and forwarded, asynchronous execution is realized through sending the information, so that the response speed of a system is improved, the monitoring cloud platform is supported to issue monitoring equipment instructions, and state information of the monitoring equipment is acquired according to different instructions.
When the existing network information is managed and monitored, on one hand, the information is monitored by encrypting the data, and on the other hand, the log, the user operation and the loopholes in the cloud server are managed and monitored, but whether potential hazards exist can not be identified according to the operation behaviors of the user in the process of management and monitoring, and further potential hazards exist, so that the potential hazards of information leakage can be caused to the whole.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides a cloud security management monitoring method and a cloud security management monitoring system supporting a commercial cryptographic algorithm, which solve the problem that whether potential danger exists or not can not be identified according to the operation behaviors of users and further information leakage can be caused.
In order to achieve the above purpose, the application is realized by the following technical scheme: a cloud security management system supporting a business cryptographic algorithm, comprising:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information;
the personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the specific mode of transmitting the authentication correct information and the authentication error information to the cloud security management monitoring unit and transmitting the authentication error information to the information output unit and generating the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information. Firstly, verifying and authenticating basic information of an operation user, directly not allowing access to the basic information without verification, and performing access right verification analysis to the basic information after verification;
the cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the method comprises the steps of transmitting a potential danger signal and a normal signal to a potential danger analysis unit, and transmitting the normal signal to an information output unit, wherein the specific mode for generating supervision information is as follows:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, classifying the user operation times to obtain normal operation times and dangerous operation times, respectively marking the normal operation times and the dangerous operation times as ZC and XC, and substituting the normal operation times and the dangerous operation times into a formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator. The dangerous occupation ratio is expressed as the occupation ratio of the abnormal operation, the operation times of the user in the history information are expressed as the operation times corresponding to the same abnormal operation, and whether the current operation of the user has potential danger is judged by judging the occupation ratio of the same abnormal operation;
the potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and combining the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, and transmitting the analysis results to the information output unit, wherein the specific mode for generating the analysis results is as follows:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object; here, the reference numeral i denotes a classification type, 1 and 2 denote types, and a specific classification type may be used.
A1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, the potential hazards matched with each other are acquired, highlighting processing is carried out on the potential hazards, meanwhile, operation behavior information of a target object is acquired, and specific screening is carried out according to operation time in the operation behavior information, wherein the specific screening mode is as follows:
a31: acquiring all corresponding operation time of the potential hazards of the same type classification, then calculating an operation time average value of the whole potential hazards of the same type classification as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed; it should be noted that the potential risk to be analyzed is represented as the two operation times are matched with each other, and the potential risk to be analyzed is of a general type.
A32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit. Here, the generated analysis result is expressed as an influence caused by the potential danger, and the analysis result is generated by integrating the influence and combining the corresponding operation behaviors.
And the information output unit is used for acquiring the transmitted supervision information and analysis results and displaying the supervision information and the analysis results to an operator through the display equipment.
Advantageous effects
The application provides a cloud security management monitoring method and system supporting a commercial cryptographic algorithm. Compared with the prior art, the method has the following beneficial effects:
according to the application, whether the operation user has access right is judged by carrying out authentication verification on basic information of the operation user, the operation user without the access right is directly not allowed to access, the current operation of the operation user with the access right is analyzed and monitored, whether the current operation has potential danger is judged, data analysis is carried out on the operation with the potential danger, specific potential danger analysis is carried out by combining historical data, the potential danger is displayed in a materialized mode, the operation user is convenient to watch and correct subsequent operation, and meanwhile, potential problems can be found timely, so that the influence of the occurrence of the potential problems on subsequent information storage is avoided.
Drawings
FIG. 1 is a flow chart of a system of the present application;
FIG. 2 is a flow chart of the method of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the present application provides a cloud security management system supporting a commercial cryptographic algorithm, including:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information.
The personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the specific mode of transmitting the authentication correct information and the authentication error information to the cloud security management monitoring unit and transmitting the authentication error information to the information output unit and generating the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information. The method includes that firstly, verification authentication is carried out on basic information of an operation user, access is not allowed for the basic information without verification, and access authority verification analysis is carried out for the basic information after verification.
The cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the method comprises the steps of transmitting a potential danger signal to a potential danger analysis unit, transmitting a normal signal to an information output unit, and generating supervision information in the following specific modes:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, and classifying the user operation times to obtain normal operation times and dangerous operation timesThe times are recorded as ZC and XC respectively, and then the two are substituted into the formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator. It should be noted that, the dangerous occupation ratio is represented by an occupation ratio of abnormal operation, and the number of user operations in the history information is represented by the number of operations corresponding to the same abnormal operation, and whether the current operation of the user has a potential danger is judged by judging the occupation ratio of the same abnormal operation to have the abnormality.
And the information output unit is used for acquiring the transmitted supervision information and displaying the supervision information to an operator through the display equipment.
In the second embodiment, the second embodiment of the present application is different from the first embodiment in that the potentially dangerous signal transmitted is acquired and analyzed by the potentially dangerous analyzing unit.
The potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and combining the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, transmitting the analysis results to the information output unit, and generating the analysis results in the following specific mode:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object; here, the reference numeral i denotes a classification type, 1 and 2 denote types, and a specific classification type may be used.
A1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, acquiring the potential hazards matched with each other, carrying out highlighting treatment on the potential hazards, acquiring the operation behavior information of the target object, and carrying out specific screening according to the operation time in the operation behavior information, wherein the specific screening mode is as follows:
a31: acquiring all corresponding operation time of the same type of classified potential hazards, then calculating the operation time average value of the whole classified potential hazards as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed; it should be noted that the potential risk to be analyzed is represented as the two operation times are matched with each other, and the potential risk to be analyzed is of a general type.
A32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit. Here, the generated analysis result is expressed as an influence caused by the potential danger, and the analysis result is generated by integrating the influence and combining the corresponding operation behaviors.
And the information output unit is used for acquiring the transmitted analysis result and displaying the analysis result to an operator through the display equipment.
Embodiment III as embodiment III of the present application, the emphasis is on combining the implementation procedures of embodiment I and embodiment II.
Specifically, when the whole system monitors and manages data, the data is encrypted through a commercial cryptographic algorithm, wherein the commercial cryptographic algorithm comprises: common cryptographic algorithms comprise three kinds of symmetric cryptographic algorithms, public key cryptographic algorithms and hash algorithms, common symmetric algorithms comprise ZUC, SM1, SM4, SM7 and DES, TDES, AES, common asymmetric algorithms comprise SM2, SM9, RSA, ECC and the like, common cryptographic hash algorithms comprise SM3, SHA1, SHA256, SHA512, MD5 and the like, and the SM9 in the asymmetric algorithms adopted in the application is particularly used for encrypting data and transmitting and storing the encrypted data for supervision.
A cloud security monitoring method supporting a commercial cryptographic algorithm specifically comprises the following steps:
step one: acquiring personnel information of an operation user, checking the personnel information, and then authenticating the access authority of the operation user passing the check to generate authentication correct information and authentication error information;
step two: then, operation behavior information corresponding to the operation user corresponding to the authentication correct information is obtained, and the operation behavior is identified by combining a behavior model established by the historical information to obtain normal operation and abnormal operation;
step three: secondly, analyzing the abnormal operation, and generating a corresponding normal signal and a corresponding potential dangerous signal by calculating the dangerous occupation ratio of the abnormal operation and comparing the dangerous occupation ratio with a preset value;
step four: and finally, analyzing the potential danger signals, classifying the potential hazards, and matching the classified potential hazards with the abnormal operation of the user to generate an analysis result.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.
Claims (7)
1. A cloud security management system supporting a business cryptographic algorithm, comprising:
the intelligent acquisition unit is used for acquiring basic information of a target object and transmitting the basic information to the personnel authentication management unit, wherein the target object is: the operation user, basic information includes: operational behavior information and personnel information;
the personnel authentication management unit is used for acquiring and analyzing basic information of the target object, carrying out authentication operation on the target object by combining personnel information in the basic information, and generating corresponding authentication information, wherein the authentication information comprises: the authentication correct information and the authentication error information are transmitted to the cloud security management monitoring unit at the same time, and the authentication error information is transmitted to the information output unit;
the cloud security management monitoring unit is used for acquiring and analyzing the transmitted authentication correct information, acquiring the history information transmitted by the information intelligent storage unit, and analyzing, judging and generating supervision information by combining the operation behaviors of the authentication correct information corresponding to the user, wherein the supervision information comprises: the potential danger signal and the normal signal are transmitted to the potential danger analysis unit at the same time, and the normal signal is transmitted to the information output unit;
the potential danger analysis unit is used for acquiring and analyzing the transmitted potential danger signals, analyzing the potential danger signals by combining the history information transmitted by the information intelligent storage unit and the history information, generating corresponding analysis results by matching the potential dangers of the potential danger signals, and transmitting the analysis results to the information output unit.
2. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the specific manner in which the person authentication management unit generates the authentication information is as follows:
s1: acquiring personnel information of a target object, wherein the personnel information comprises: the name, account number, password and access authority, then verifying personnel information of the target object, generating verification correct information and marking the verification correct information as personnel to be authenticated if verification is successful, and generating authentication error information if verification fails;
s2: and then acquiring the access rights of the personnel to be authenticated and judging the access rights, if the access rights of the personnel to be authenticated meet the requirements, generating authentication correct information, otherwise, if the access rights of the personnel to be authenticated do not meet the requirements, generating authentication error information.
3. The cloud security management system supporting a commercial cryptographic algorithm according to claim 1, wherein the specific manner in which the cloud security management monitoring unit generates the supervision information is as follows:
p1: the method comprises the steps of obtaining historical information, building a behavior model according to user behaviors and system operation, obtaining operation behaviors of a target object, and matching the operation behaviors with the behavior model to obtain a matching result, wherein the matching result comprises the following steps: normal operation and abnormal operation, and do not perform any processing on the normal operation;
p2: then, acquiring and analyzing the abnormal operation, and judging whether the abnormal operation has potential danger or not by analyzing the dangerous proportion value of the abnormal operation and generating corresponding supervision information, wherein the specific judging mode is as follows:
p21: acquiring the user operation times in the history information, classifying the user operation times to obtain normal operation times and dangerous operation times, respectively marking the normal operation times and the dangerous operation times as ZC and XC, and substituting the normal operation times and the dangerous operation times into a formulaCalculating to obtain a dangerous occupation ratio Q of dangerous operation times;
p22: and comparing the calculated dangerous ratio Q with a preset value YS, if Q is more than or equal to YS, indicating that the user operation has potential danger and generating a potential danger signal, otherwise, if Q is less than YS, indicating that the user operation is normal and generating a normal signal, wherein the preset value YS is a preset proportionality coefficient, and the specific value is set by an operator.
4. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the specific manner in which the potentially dangerous analysis unit generates the analysis result is as follows:
a1: acquiring all potential hazards in the history information, classifying the potential hazards to obtain classified potential hazards, marking the classified potential hazards as i, and acquiring operation time corresponding to the classified potential hazards, wherein i=1, 2, … and j, and simultaneously acquiring the operation time of a target object and matching the operation time with the operation time of the target object;
a1: when only one matching result exists, acquiring mutually matched potential hazards, recording the mutually matched potential hazards as potential hazards to be analyzed, acquiring operation behavior information of a target object, performing secondary matching according to the operation type in the operation behavior information and the potential hazards to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit;
a3: when a plurality of matching results exist, the potential hazards matched with each other are acquired, highlighting processing is carried out on the potential hazards, meanwhile, operation behavior information of a target object is acquired, and specific screening is carried out according to operation time in the operation behavior information.
5. The cloud security management system supporting a commercial cryptographic algorithm according to claim 4, wherein the specific screening method in A3 is as follows:
a31: acquiring all corresponding operation time of the potential hazards of the same type classification, then calculating an operation time average value of the whole potential hazards of the same type classification as Tpi, simultaneously acquiring the operation behavior time of a target object, and carrying out matching screening on the operation behavior time and the Tpi to obtain the potential hazards to be analyzed;
a32: and then acquiring the operation type of the target object, performing secondary matching on the operation type and the potential danger to be analyzed to generate an analysis result, and transmitting the analysis result to an information output unit.
6. The cloud security management system supporting a business cryptographic algorithm according to claim 1, wherein the information output unit is configured to obtain the transmitted supervision information and analysis result and display the same to an operator through a display device.
7. A cloud security monitoring method supporting a commercial cryptographic algorithm according to any one of claims 1-6, characterized in that the method comprises the steps of:
step one: acquiring personnel information of an operation user, checking the personnel information, and then authenticating the access authority of the operation user passing the check to generate authentication correct information and authentication error information;
step two: then, operation behavior information corresponding to the operation user corresponding to the authentication correct information is obtained, and the operation behavior is identified by combining a behavior model established by the historical information to obtain normal operation and abnormal operation;
step three: secondly, analyzing the abnormal operation, and generating a corresponding normal signal and a corresponding potential dangerous signal by calculating the dangerous occupation ratio of the abnormal operation and comparing the dangerous occupation ratio with a preset value;
step four: and finally, analyzing the potential danger signals, classifying the potential hazards, and matching the classified potential hazards with the abnormal operation of the user to generate an analysis result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311321723.7A CN117220992B (en) | 2023-10-12 | 2023-10-12 | Cloud security management monitoring method and system supporting commercial cryptographic algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311321723.7A CN117220992B (en) | 2023-10-12 | 2023-10-12 | Cloud security management monitoring method and system supporting commercial cryptographic algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117220992A true CN117220992A (en) | 2023-12-12 |
CN117220992B CN117220992B (en) | 2024-05-10 |
Family
ID=89044428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311321723.7A Active CN117220992B (en) | 2023-10-12 | 2023-10-12 | Cloud security management monitoring method and system supporting commercial cryptographic algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117220992B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111913860A (en) * | 2020-07-15 | 2020-11-10 | 中国民航信息网络股份有限公司 | Operation behavior analysis method and device |
CN113282474A (en) * | 2021-05-31 | 2021-08-20 | 长沙市到家悠享家政服务有限公司 | User behavior monitoring method, system, equipment and medium based on bastion machine |
CN114254716A (en) * | 2022-03-02 | 2022-03-29 | 浙江鹏信信息科技股份有限公司 | High-risk operation identification method and system based on user behavior analysis |
CN115374426A (en) * | 2022-08-23 | 2022-11-22 | 中国电信股份有限公司 | Access control method, device, equipment and storage medium |
US11652828B1 (en) * | 2021-01-11 | 2023-05-16 | Wells Fargo Bank, N.A. | Systems and methods for automated anomalous behavior detection and risk-scoring individuals |
CN116319100A (en) * | 2023-05-22 | 2023-06-23 | 交通运输部水运科学研究所 | Port dangerous source safety admittance method and system based on GIS spatial data analysis |
CN116595502A (en) * | 2023-06-12 | 2023-08-15 | 江西开创数码科技有限公司 | User management method and related device based on intelligent contract |
CN116800515A (en) * | 2023-07-10 | 2023-09-22 | 福建省远顺智能科技有限公司 | Industrial Internet platform safety maintenance system based on artificial intelligence |
-
2023
- 2023-10-12 CN CN202311321723.7A patent/CN117220992B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111913860A (en) * | 2020-07-15 | 2020-11-10 | 中国民航信息网络股份有限公司 | Operation behavior analysis method and device |
US11652828B1 (en) * | 2021-01-11 | 2023-05-16 | Wells Fargo Bank, N.A. | Systems and methods for automated anomalous behavior detection and risk-scoring individuals |
CN113282474A (en) * | 2021-05-31 | 2021-08-20 | 长沙市到家悠享家政服务有限公司 | User behavior monitoring method, system, equipment and medium based on bastion machine |
CN114254716A (en) * | 2022-03-02 | 2022-03-29 | 浙江鹏信信息科技股份有限公司 | High-risk operation identification method and system based on user behavior analysis |
CN115374426A (en) * | 2022-08-23 | 2022-11-22 | 中国电信股份有限公司 | Access control method, device, equipment and storage medium |
CN116319100A (en) * | 2023-05-22 | 2023-06-23 | 交通运输部水运科学研究所 | Port dangerous source safety admittance method and system based on GIS spatial data analysis |
CN116595502A (en) * | 2023-06-12 | 2023-08-15 | 江西开创数码科技有限公司 | User management method and related device based on intelligent contract |
CN116800515A (en) * | 2023-07-10 | 2023-09-22 | 福建省远顺智能科技有限公司 | Industrial Internet platform safety maintenance system based on artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
CN117220992B (en) | 2024-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8819807B2 (en) | Apparatus and method for analyzing and monitoring sap application traffic, and information protection system using the same | |
JP2019527417A (en) | System and method for providing a secure data monitoring system executed in a factory or plant | |
US11431505B2 (en) | Generating a legally binding object within a group-based communication system | |
CN112216038A (en) | Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system | |
US10282239B2 (en) | Monitoring method | |
CN113506096B (en) | Inter-system interface method based on industrial internet identification analysis system | |
CN111339050B (en) | Centralized security audit method and system based on big data platform | |
CN112583594B (en) | Data processing method, acquisition device, gateway, trusted platform and storage medium | |
CN116760868B (en) | Automatic judging and detecting method and system for intelligent distribution transformer | |
CN117220992B (en) | Cloud security management monitoring method and system supporting commercial cryptographic algorithm | |
CN110138792B (en) | Public health geographic data privacy removal processing method and system | |
CN110086796B (en) | Transmission method for collecting monitoring data based on public-private key encryption technology | |
CN112087301A (en) | Gas meter safety certification system based on state cryptographic algorithm | |
CN111737747A (en) | Database security method, device, equipment and computer storage medium | |
US20130311385A1 (en) | Third Party Security Monitoring & Audit | |
CN111723410A (en) | Hard disk encryption method, hard disk lock system, hard disk encryption device and storage medium | |
CN114567469B (en) | Application password type detection method and platform based on B/S mode | |
CN108600173B (en) | Distributed traveling wave ranging system and method with encryption security | |
CN110570197A (en) | Data processing method and device based on block chain | |
CN115967537A (en) | Block chain-based power grid service data storage method and system | |
CN112214771A (en) | Information analysis method and device based on big data and computer readable storage medium | |
CN117194334B (en) | Log storage method, device, equipment and medium of distributed log storage system | |
CN111814183B (en) | Financial real-time wind control system and method based on network layer message analysis | |
CN117407849B (en) | Industrial data security protection method and system based on industrial Internet technology | |
CN110569646B (en) | File recognition method and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |