WO2019200754A1 - 数据传输风险评估方法、装置、计算机设备和存储介质 - Google Patents
数据传输风险评估方法、装置、计算机设备和存储介质 Download PDFInfo
- Publication number
- WO2019200754A1 WO2019200754A1 PCT/CN2018/095607 CN2018095607W WO2019200754A1 WO 2019200754 A1 WO2019200754 A1 WO 2019200754A1 CN 2018095607 W CN2018095607 W CN 2018095607W WO 2019200754 A1 WO2019200754 A1 WO 2019200754A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- risk
- information
- value
- indicator
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Definitions
- the present application relates to a data transmission risk assessment method, apparatus, computer device and storage medium.
- a data transmission risk assessment method is provided.
- a data transmission risk assessment method including:
- a data transmission risk assessment device comprising:
- a data requirement acquisition module for acquiring data requirement information
- a transmission data acquisition module configured to acquire data to be transmitted according to the data requirement information
- a data type identification module configured to identify a data type of the data to be transmitted
- a risk indicator determining module configured to determine a data risk indicator value of the data to be transmitted by using a risk indicator determining manner corresponding to the identified data type
- An evaluation information obtaining module configured to acquire data sender risk assessment information and data receiver risk assessment information according to the data requirement information
- the risk report generating module is configured to generate a data transmission risk report according to the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information.
- a computer device comprising a memory and one or more processors having stored therein computer readable instructions, the computer readable instructions being executable by the processor to cause the one or more processors to execute The following steps:
- One or more non-transitory computer readable storage mediums storing computer readable instructions, when executed by one or more processors, cause one or more processors to perform the steps of:
- FIG. 1 is an application scenario diagram of a data transmission risk assessment method in accordance with one or more embodiments.
- FIG. 2 is a flow diagram of a data transmission risk assessment method in accordance with one or more embodiments.
- FIG. 3 is a flow diagram of the steps of obtaining data demand information in accordance with one or more embodiments.
- FIG. 4 is a flow diagram of the steps of obtaining a risk indicator evaluation form in accordance with one or more embodiments.
- FIG. 5 is a flow diagram of the steps of transmitting data in accordance with one or more embodiments.
- FIG. 6 is a block diagram of a data transmission risk assessment device in accordance with one or more embodiments.
- Figure 7 is a block diagram of a data transmission risk assessment device in another embodiment.
- FIG. 8 is a block diagram of a computer device in accordance with one or more embodiments.
- Terminal 102 communicates with server 104 over a network over a network.
- the terminal 102 can be, but is not limited to, various personal computers, notebook computers, smart phones, tablets, and portable wearable devices, and the server 104 can be implemented with a stand-alone server or a server cluster composed of a plurality of servers.
- a data transmission risk assessment method is provided.
- the method is applied to the server in FIG. 1 as an example, and includes the following steps:
- the terminal acquires the entered data requirement information and the server address, and sends the data requirement information to the server according to the server address.
- the server receives data request information sent by the terminal.
- the data demand information is information related to the data receiver's demand for data.
- the data requirement information may specifically include at least one of a data condition, a data receiver identifier, and an employee account registered in the terminal.
- the server parses the data requirement information, parses and extracts the data condition in the data requirement information, and queries the data from the database according to the extracted data condition, and uses the queried data as the to-be-transmitted data. data.
- the server extracts the data type identifier in the data to be transmitted, and determines the data type of the data to be transmitted according to the data type identifier.
- the data type identifier includes a personal information identifier and an important service data identifier.
- the server extracts each data segment identifier in the data to be transmitted, and identifies whether the extracted data segment identifier includes a data segment identifier corresponding to the personal information or a data segment identifier corresponding to the important service data identifier;
- the data segment identifier includes the data segment identifier corresponding to the personal information, and the data type of the data to be transmitted is identified as the personal information type; if the extracted data segment identifier includes the data segment identifier corresponding to the important service data, the data segment identifier is identified.
- the data type of the transmitted data is an important business data type.
- the server stores a risk indicator determination manner corresponding to the personal information type and the important service data type. If the server identifies that the data type is the personal information type, the method for determining the risk indicator corresponding to the type of the personal information is queried, and the data to be transmitted is analyzed according to the determined risk indicator determining manner, and the data risk indicator value is obtained; if the server recognizes When the data type is an important service data type, the method for determining the risk indicator corresponding to the important service data type is analyzed, and the data to be transmitted is analyzed according to the determined risk indicator determination manner, and the data risk indicator value is obtained.
- S208 specifically includes the following: when the identified data type is a personal information type, determining a sensitivity level value, a data range indicator value, a data volume indicator value, and a technical processing indicator value of the data to be transmitted to determine The sensitivity level value, the data range index value, the data volume index value, and the technical processing index value are used as the data risk indicator value of the data to be transmitted; when the identified data type is an important service data type, determining the data importance of the data to be transmitted The value, the data range index value, the data volume index value, and the technical processing index value, and the determined data importance value, the data range index value, the data volume index value, and the technical processing index value are used as data risk indicator values of the data to be transmitted.
- the server counts the number of personal sensitive data segments and the total number of data segments in the data to be transmitted, and obtains the sensitivity by dividing the number of personal sensitive data segments by the total number of data segments. Value; the number of required data segments required in the server statistics demand information, compares the total number of data segments with the number of demand data segments, determines the data range index value according to the comparison result; the total amount of data segments that the server will count
- the preset quantity threshold is compared, and the data quantity indicator value is determined according to the comparison result; the server identifies whether the data to be transmitted includes the encrypted data, and determines the technical processing index value according to the identification result; the server determines the sensitivity level value and the data range indicator value.
- the data quantity indicator value and the technical processing indicator value are used as data risk indicator values of the data to be transmitted.
- the server identifies whether important data is included in the data to be transmitted, and determines an important data indicator value according to the recognition result; the server counts the total data segment of the data to be transmitted, and statistics The number of required data segments required in the data demand information is compared with the total number of data segments and the number of required data segments, and the data range index value is determined according to the comparison result; the total number of data segments that the server will count and the preset number threshold Comparing, determining a data quantity index value according to the comparison result; the server identifying whether the data to be transmitted includes the encrypted data, determining a technical processing index value according to the identification result; determining a sensitivity level value, a data range indicator value, and a data quantity indicator by the server The value and the technical processing indicator value are used as the data risk indicator value of the data to be transmitted.
- the server stores risk assessment information of the data sender and the data receiver, wherein the risk assessment information is stored corresponding to the data sender identifier and the data receiver identifier.
- the server extracts the data sender identifier and the data receiver identifier from the data requirement information, and queries the stored risk assessment information for the risk assessment information corresponding to each of the extracted data sender identifier and the data receiver identifier.
- the risk assessment information may specifically include at least one of technical support capability information, management support capability, subject review information, and legal environment information.
- the server extracts the risk indicator evaluation value of the data sender and the risk indicator evaluation value of the data receiver from the data sender risk assessment information and the data receiver risk assessment information, and extracts according to the determined data risk indicator value.
- the risk indicator evaluation value generates a data transmission risk report.
- the data to be transmitted is obtained according to the data requirement information, and the data risk indicator value of the data to be transmitted is determined by determining the risk indicator corresponding to the data type of the data to be transmitted, and the determined data is determined.
- the accuracy of the data risk indicator value According to the determined data risk indicator value, the data sender risk assessment information and the data receiver risk assessment information, the data transmission risk report is generated, and the risk assessment information used is more comprehensive, thereby further improving the accuracy of the risk assessment during data transmission.
- S202 specifically includes the step of acquiring data requirement information, and the step specifically includes the following content:
- the terminal displays a data transmission page.
- the terminal detects that the data transmission button in the data transmission page is clicked, the terminal acquires the employee account and password registered in the terminal, and generates a data transmission request according to the obtained employee account and password. Send a data transfer request to the server.
- the server extracts the employee account and password in the data transmission request, and verifies whether the extracted employee account and password are consistent. If the verification is consistent, the server queries the demand information page data according to the data transmission request, and sends the query to the demand information page data to the terminal.
- the terminal After receiving the data of the demand information page, the terminal displays the data requirement information page according to the demand information page data, and when the terminal detects that the information submission button in the data requirement information page is clicked, the terminal acquires the data entered in the data requirement information page.
- the demand information sends the obtained data demand information to the server.
- the server receives data request information sent by the terminal.
- the terminal after receiving the data transmission request sent by the terminal, the terminal returns the demand information page data to the terminal, and determines that the terminal displays the data requirement information page according to the demand information page data, so that the user inputs the data requirement information in the data requirement information page. In order to improve the efficiency of data demand information entry.
- S210 specifically includes the step of acquiring a risk indicator evaluation table, and the step specifically includes the following content:
- the server parses the data requirement information, and extracts the data sender identifier and the data receiver identifier from the data requirement information.
- the data sender identifier may be at least one of an address, a name, and a number of the data sender; the data receiver identifier may be an address of the data receiver. At least one of a name and a number.
- S404 Obtain risk indicator description information corresponding to the data sender identifier and the data receiver identifier respectively.
- the server stores the risk indicator description information, where the risk indicator description information is stored corresponding to the risk indicator identifier.
- the server queries the risk indicator identifier corresponding to the data sender identifier, and obtains the risk indicator description information corresponding to the queried risk indicator identifier in the stored risk indicator description information; the server extracts the data receiving After the party is identified, the risk indicator identifier corresponding to the data sender identifier is queried, and the risk indicator description information corresponding to the queried risk indicator identifier is obtained in the stored risk indicator description information.
- the server After obtaining the risk indicator description information corresponding to the data sender identifier and the data receiver identifier respectively, the server sends the risk indicator description information corresponding to the data sender identifier and the data receiver identifier to the terminal.
- the receiving terminal obtains a risk indicator evaluation table that is returned by the data sender identifier and the data receiver identifier according to the risk indicator evaluation table returned by the risk indicator description information.
- the terminal displays the risk indicator description information in the risk indicator evaluation table.
- the risk indicator description information that the user can display is entered into the risk indicator evaluation value in the risk indicator evaluation form.
- the terminal obtains a risk indicator evaluation form for inputting the risk indicator evaluation value, and sends the obtained risk indicator evaluation form to the server.
- the obtained risk indicator evaluation table includes a risk indicator evaluation table corresponding to the data sender identifier and a risk indicator evaluation table corresponding to the data receiver identifier.
- the corresponding risk indicator description information is obtained according to the data sender identifier and the data receiver identifier, and the terminal displays the obtained risk indicator description information. Ensure that the user can enter the corresponding risk indicator value into the risk indicator evaluation form based on the displayed risk indicator description information.
- the risk indicator evaluation form returned by the receiving terminal and having entered the risk indicator evaluation value improves the accuracy of obtaining the risk indicator evaluation value.
- S212 specifically includes: extracting, from the risk indicator evaluation table respectively corresponding to the data sender identifier and the data receiver identifier, a risk indicator evaluation value corresponding to each of the data sender identifier and the data receiver identifier; The data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier, and the data transmission risk report corresponding to the data requirement information is determined.
- the server After receiving the risk indicator evaluation table returned by the terminal, the server extracts the data indicator identifier and the data receiver identifier respectively corresponding to the risk indicator evaluation table corresponding to the data indicator identifier and the data receiver identifier respectively corresponding to the risk indicator evaluation table.
- the value is added to the data transmission risk report corresponding to the data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier.
- the server receives the risk indicator evaluation table returned by the terminal, where the risk indicator evaluation table includes a risk indicator evaluation table corresponding to the data receiver identifier and a risk indicator evaluation table corresponding to the data sender identifier.
- the server extracts the risk indicator evaluation table corresponding to the data sender identifier and the risk indicator evaluation table corresponding to the data receiver identifier from the received risk indicator evaluation table.
- the server extracts the risk indicator evaluation value corresponding to the data sender identifier from the risk indicator evaluation table corresponding to the data sender identifier, and the server extracts the risk indicator evaluation value corresponding to the data receiver identifier from the risk indicator evaluation table corresponding to the data receiver identifier,
- the data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier are added to the data transmission risk report corresponding to the data requirement information.
- S212 specifically includes a step of transmitting data, and the step specifically includes the following:
- the server after generating the data transmission risk report, extracts the terminal address from the data requirement information, and sends the data transmission risk report to the terminal corresponding to the data requirement information according to the extracted terminal address.
- the receiving terminal returns a data transmission instruction according to the data transmission risk report.
- the terminal when receiving the data transmission risk report, displays the data transmission risk report, so that the user can view the data transmission risk report, and the user triggers the data transmission instruction at the terminal after checking the data transmission risk report.
- the terminal sends the triggered data transfer instruction to the server.
- the server receives the data transfer instruction returned by the terminal according to the data transmission risk report.
- the data transmission instruction is an instruction that instructs the server to transmit data.
- the server after receiving the data transmission instruction, extracts the risk level in the data transmission risk report, and extracts the terminal address in the data transmission instruction, and generates transmission inquiry information according to the extracted risk level, according to the extracted terminal address.
- the transmission inquiry information is sent to the terminal.
- the data to be transmitted is transmitted according to the data transmission instruction.
- the transmission inquiry information is displayed in the inquiry information display box, and if the terminal detects that the confirmation transmission button in the inquiry information display box is clicked, the confirmation transmission information is obtained, and the obtained information is obtained. Confirm that the transmission information is sent to the server.
- the server determines the data to be transmitted according to the data identifier in the data transmission instruction, and transmits the data to be transmitted.
- the data transmission instruction includes an employee account
- the employee account is an employee account registered in the terminal.
- the server extracts the employee account in the data transmission instruction, and extracts data requirement information corresponding to the data to be transmitted.
- S512 Generate a data transmission log according to the employee account and the obtained data requirement information.
- the server records the transmission time of the data to be transmitted, and stores the recorded transmission time, the employee account, and the obtained data requirement information in a preset data transmission log template to generate a data transmission log.
- the data transmission risk report is sent to the terminal, so that the user views the data risk transmission report through the terminal.
- Receiving the data transmission instruction sent by the terminal according to the data transmission risk report returning the transmission inquiry information to the terminal according to the risk level and the data transmission instruction in the data transmission risk report, thereby ensuring that the user can transmit the risk level in the risk report according to the data. Whether to confirm the transmission of information, improve the security of data transmission.
- a data transmission risk assessment apparatus 600 including: a data requirement acquisition module 602, a transmission data acquisition module 604, a data type identification module 606, a risk indicator determination module 608, and an evaluation.
- An information acquisition module 610 and a risk report generation module 612 wherein:
- the data requirement obtaining module 602 is configured to obtain data requirement information.
- the transmission data obtaining module 604 is configured to acquire data to be transmitted according to the data requirement information.
- the data type identification module 606 is configured to identify the data type of the data to be transmitted.
- the risk indicator determining module 608 is configured to determine a data risk indicator value of the data to be transmitted by using a risk indicator determining manner corresponding to the identified data type.
- the evaluation information obtaining module 610 is configured to obtain data sender risk assessment information and data receiver risk assessment information according to the data requirement information.
- the risk report generating module 612 is configured to generate a data transmission risk report according to the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information.
- the data to be transmitted is obtained according to the data requirement information, and the data risk indicator value of the data to be transmitted is determined by determining the risk indicator corresponding to the data type of the data to be transmitted, and the determined data is determined.
- the accuracy of the data risk indicator value According to the determined data risk indicator value, the data sender risk assessment information and the data receiver risk assessment information, the data transmission risk report is generated, and the risk assessment information used is more comprehensive, thereby further improving the accuracy of the risk assessment during data transmission.
- the risk indicator determining module 608 is further configured to: when the identified data type is a personal information type, determine a sensitivity level value, a data range indicator value, a data volume indicator value, and a technical processing indicator value of the data to be transmitted, Determining the sensitivity value, the data range index value, the data volume index value, and the technical processing index value as the data risk indicator value of the data to be transmitted; or determining the data to be transmitted when the identified data type is an important service data type Data importance value, data range index value, data volume index value, and technical processing index value, to determine data importance value, data range index value, data volume index value, and technical processing index value as data risk of data to be transmitted Index value.
- the data requirement obtaining module 602 is further configured to: receive a data transmission request sent by the terminal; return the demand information page data to the terminal according to the data transmission request; and acquire the data demand information page displayed by the terminal according to the demand information page data, and enter Data demand information.
- the terminal after receiving the data transmission request sent by the terminal, the terminal returns the demand information page data to the terminal, and determines that the terminal displays the data requirement information page according to the demand information page data, so that the user inputs the data requirement information in the data requirement information page. In order to improve the efficiency of data demand information entry.
- the evaluation information obtaining module 610 is further configured to extract the data sender identifier and the data receiver identifier in the data requirement information, and obtain the risk indicator description information corresponding to the data sender identifier and the data receiver identifier respectively;
- the indicator description information is sent to the terminal; the receiving terminal obtains the risk indicator evaluation table corresponding to the data sender identifier and the data receiver identifier respectively according to the risk indicator evaluation table returned by the risk indicator description information.
- the corresponding risk indicator description information is obtained according to the data sender identifier and the data receiver identifier, and the terminal displays the obtained risk indicator description information. Ensure that the user can enter the corresponding risk indicator value into the risk indicator evaluation form based on the displayed risk indicator description information.
- the risk indicator evaluation form returned by the receiving terminal and having entered the risk indicator evaluation value improves the accuracy of obtaining the risk indicator evaluation value.
- the risk report generating module 612 is further configured to extract, from the risk indicator evaluation table respectively corresponding to the data sender identifier and the data receiver identifier, the risk indicator evaluation value corresponding to each of the data sender identifier and the data receiver identifier. And determining a data transmission risk report corresponding to the data requirement information according to the data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier.
- the data transmission risk assessment apparatus 600 specifically includes the following: a risk report returning module 614, a transmission instruction receiving module 616, an inquiry information sending module 618, a data transmission module 620, and a transmission log generation. Module 622.
- the risk report return module 614 is configured to return the data transmission risk report to the terminal.
- the transmission instruction receiving module 616 is configured to receive a data transmission instruction returned by the terminal according to the data transmission risk report.
- the query information sending module 618 is configured to return the transmission query information to the terminal according to the risk level and the data transmission instruction in the data transmission risk report.
- the data transmission module 620 is configured to: when receiving the acknowledgement transmission information returned by the terminal according to the transmission query information, transmit the data to be transmitted according to the data transmission instruction.
- the transmission log generating module 622 is configured to extract an employee account in the data transmission instruction, and obtain data demand information corresponding to the data to be transmitted; and generate a data transmission log according to the employee account and the obtained data requirement information.
- the data transmission risk report is sent to the terminal, so that the user views the data risk transmission report through the terminal.
- Receiving the data transmission instruction sent by the terminal according to the data transmission risk report returning the transmission inquiry information to the terminal according to the risk level and the data transmission instruction in the data transmission risk report, thereby ensuring that the user can transmit the risk level in the risk report according to the data. Whether to confirm the transmission of information, improve the security of data transmission.
- the various modules in the above data transmission risk assessment device may be implemented in whole or in part by software, hardware, and combinations thereof.
- Each of the above modules may be embedded in or independent of the processor in the computer device, or may be stored in a memory in the computer device in a software form, so that the processor invokes the operations corresponding to the above modules.
- a computer device which may be a server, the internal structure of which may be as shown in FIG.
- the computer device includes a processor, memory, network interface, and database connected by a system bus.
- the processor of the computer device is used to provide computing and control capabilities.
- the memory of the computer device includes a non-transitory computer readable storage medium, an internal memory.
- the non-transitory computer readable storage medium stores an operating system, computer readable instructions, and a database.
- the internal memory provides an environment for the operation of an operating system and computer readable instructions in a non-transitory computer readable storage medium.
- the database of the computer device is used to store data transmission risk assessment data.
- the network interface of the computer device is used to communicate with an external terminal via a network connection.
- the computer readable instructions are executed by the processor to implement a data transmission risk assessment method.
- FIG. 8 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation of the computer device to which the solution of the present application is applied.
- the specific computer device may It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
- a computer apparatus comprising a memory and a processor, the memory storing computer readable instructions that, when executing the computer readable instructions, implement the steps of: obtaining data demand information; Obtaining data to be transmitted; identifying a data type of data to be transmitted; determining a data risk indicator value of the data to be transmitted by determining a risk indicator corresponding to the identified data type; and acquiring data sender risk assessment information and data according to the data requirement information Receiver risk assessment information; generate a data transmission risk report based on the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information.
- the data risk indicator value of the data to be transmitted is determined by determining a risk indicator corresponding to the identified data type, including: determining the sensitivity of the data to be transmitted when the identified data type is a personal information type.
- the degree value, the data range index value, the data volume index value, and the technical processing index value, the determined sensitivity level value, the data range index value, the data volume index value, and the technical processing index value are used as data risk indicator values of the data to be transmitted; or ,
- the data importance value, the data range index value, the data volume index value, and the technical processing index value of the data to be transmitted are determined, and the determined data importance value and the data range index value are determined.
- the data volume index value and the technical processing index value are used as data risk indicator values of the data to be transmitted.
- the data request information is obtained, including: receiving a data transmission request sent by the terminal; returning the demand information page data to the terminal according to the data transmission request; and acquiring the data demand information page displayed by the terminal according to the demand information page data, Data demand information.
- the data sender risk assessment information and the data receiver risk assessment information are obtained according to the data requirement information, including: extracting the data sender identifier and the data receiver identifier in the data requirement information; acquiring the data sender identifier and the data The risk indicator description information corresponding to the receiver identifier is respectively sent; the risk indicator description information is sent to the terminal; the receiving terminal evaluates the risk indicator corresponding to the data sender identifier and the data receiver identifier according to the risk indicator evaluation table returned by the risk indicator description information. table.
- the data transmission risk report is generated according to the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information, including: a risk corresponding to the data sender identifier and the data receiver identifier respectively In the indicator evaluation table, the risk indicator evaluation value corresponding to each of the data sender identifier and the data receiver identifier is extracted; according to the data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier Determine the data transmission risk report corresponding to the data requirement information.
- the processor further implements the following steps when executing the computer readable instruction: The transmission risk report is returned to the terminal; the receiving terminal returns a data transmission instruction according to the data transmission risk report; according to the risk level and the data transmission instruction in the data transmission risk report, the transmission inquiry information is returned to the terminal; when the receiving terminal returns according to the transmission inquiry information When the transmission information is confirmed, the data to be transmitted is transmitted according to the data transmission instruction.
- the processor after receiving the acknowledgment transmission information returned by the terminal according to the transmission query information, after the data to be transmitted is transmitted according to the data transmission instruction, the processor further implements the following steps: extracting the data transmission instruction when executing the computer readable instruction The employee account in the middle, and obtain the data demand information corresponding to the data to be transmitted; generate a data transmission log according to the employee account and the obtained data demand information.
- the data to be transmitted is obtained according to the data requirement information, and the data risk indicator value of the data to be transmitted is determined by determining the risk indicator corresponding to the data type of the data to be transmitted, and the determined data is determined.
- the accuracy of the data risk indicator value According to the determined data risk indicator value, the data sender risk assessment information and the data receiver risk assessment information, the data transmission risk report is generated, and the risk assessment information used is more comprehensive, thereby further improving the accuracy of the risk assessment during data transmission.
- a computer readable storage medium having stored thereon computer readable instructions that, when executed by a processor, implement the steps of: obtaining data demand information; obtaining a to-be-transmitted data according to data demand information Data; identifying the data type of the data to be transmitted; determining the data risk indicator value of the data to be transmitted by determining the risk indicator corresponding to the identified data type; obtaining the data sender risk assessment information and the data receiver risk according to the data demand information Evaluation information; generate a data transmission risk report based on the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information.
- the data risk indicator value of the data to be transmitted is determined by determining a risk indicator corresponding to the identified data type, including: determining the sensitivity of the data to be transmitted when the identified data type is a personal information type.
- the degree value, the data range index value, the data volume index value, and the technical processing index value, the determined sensitivity level value, the data range index value, the data volume index value, and the technical processing index value are used as data risk indicator values of the data to be transmitted; or ,
- the data importance value, the data range index value, the data volume index value, and the technical processing index value of the data to be transmitted are determined, and the determined data importance value and the data range index value are determined.
- the data volume index value and the technical processing index value are used as data risk indicator values of the data to be transmitted.
- the data request information is obtained, including: receiving a data transmission request sent by the terminal; returning the demand information page data to the terminal according to the data transmission request; and acquiring the data demand information page displayed by the terminal according to the demand information page data, Data demand information.
- the data sender risk assessment information and the data receiver risk assessment information are obtained according to the data requirement information, including: extracting the data sender identifier and the data receiver identifier in the data requirement information; acquiring the data sender identifier and the data The risk indicator description information corresponding to the receiver identifier is respectively sent; the risk indicator description information is sent to the terminal; the receiving terminal evaluates the risk indicator corresponding to the data sender identifier and the data receiver identifier according to the risk indicator evaluation table returned by the risk indicator description information. table.
- the data transmission risk report is generated according to the determined data risk indicator value, the data sender risk assessment information, and the data receiver risk assessment information, including: a risk corresponding to the data sender identifier and the data receiver identifier respectively In the indicator evaluation table, the risk indicator evaluation value corresponding to each of the data sender identifier and the data receiver identifier is extracted; according to the data risk indicator value, the risk indicator evaluation value corresponding to the data sender identifier, and the risk indicator evaluation value corresponding to the data receiver identifier Determine the data transmission risk report corresponding to the data requirement information.
- the computer readable instructions are executed by the processor to implement the following steps:
- the data transmission risk report is returned to the terminal;
- the receiving terminal returns a data transmission instruction according to the data transmission risk report;
- the transmission inquiry information is returned to the terminal; when the receiving terminal receives the inquiry information according to the transmission
- the data to be transmitted is transmitted according to the data transmission instruction.
- the computer readable instructions are further executed by the processor to: extract the data transmission The employee account in the instruction, and obtain data demand information corresponding to the data to be transmitted; generate a data transmission log according to the employee account and the obtained data demand information.
- the data to be transmitted is obtained according to the data requirement information, and the data risk indicator value of the data to be transmitted is determined by determining the risk indicator corresponding to the data type of the data to be transmitted, and the determined data is determined.
- the accuracy of the data risk indicator value According to the determined data risk indicator value, the data sender risk assessment information and the data receiver risk assessment information, the data transmission risk report is generated, and the risk assessment information used is more comprehensive, thereby further improving the accuracy of the risk assessment during data transmission.
- Non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory can include random access memory (RAM) or external cache memory.
- RAM is available in a variety of formats, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization chain.
- SRAM static RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDRSDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- Synchlink DRAM SLDRAM
- Memory Bus Radbus
- RDRAM Direct RAM
- DRAM Direct Memory Bus Dynamic RAM
- RDRAM Memory Bus Dynamic RAM
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
一种数据传输风险评估方法,包括:获取数据需求信息;根据数据需求信息获取待传输数据;识别待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值;根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告。
Description
相关申请的交叉引用
本申请要求于2018年4月19日提交中国专利局,申请号为2018103544674,申请名称为“数据传输风险评估方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及一种数据传输风险评估方法、装置、计算机设备和存储介质。
近年来,随着互联网的蓬勃发展,数据流动无处不在。数据流动所产生的经济价值和社会价值凸显,这一过程中的安全风险也随之增加,社会公共利益、公司发展、个人隐私受到严重威胁,防范数据泄露和滥用所产生的风险日益紧迫。
然而,发明人意识到,普通的防止数据泄露的方式,在外传数据时,都需要人工对数据进行风险评估,通过人工的风险评估结果来确定数据的外传是否存在风险,从而才能确定数据是否可以外传。况且不同的业务部分涉及到的业务数据也不相同,人工在对数据风险评估时,可能风险评估的准确率较低。
发明内容
根据本申请公开的各种实施例,提供一种数据传输风险评估方法、装置、计算机设备和存储介质。
一种数据传输风险评估方法,包括:
获取数据需求信息;
根据所述数据需求信息获取待传输数据;
识别所述待传输数据的数据类型;
通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;
根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及
根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
一种数据传输风险评估装置,包括:
数据需求获取模块,用于获取数据需求信息;
传输数据获取模块,用于根据所述数据需求信息获取待传输数据;
数据类型识别模块,用于识别所述待传输数据的数据类型;
风险指标确定模块,用于通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;
评估信息获取模块,用于根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及
风险报告生成模块,用于根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:
获取数据需求信息;
根据所述数据需求信息获取待传输数据;
识别所述待传输数据的数据类型;
通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;
根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及
根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
获取数据需求信息;
根据所述数据需求信息获取待传输数据;
识别所述待传输数据的数据类型;
通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;
根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及
根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中数据传输风险评估方法的应用场景图。
图2为根据一个或多个实施例中数据传输风险评估方法的流程示意图。
图3为根据一个或多个实施例中获取数据需求信息的步骤的流程示意图。
图4为根据一个或多个实施例中获取风险指标评估表的步骤的流程示意图。
图5为根据一个或多个实施例中传输数据的步骤的流程示意图。
图6为根据一个或多个实施例中数据传输风险评估装置的框图。
图7为另一个实施例中数据传输风险评估装置的框图。
图8为根据一个或多个实施例中计算机设备的框图。
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的数据传输风险评估方法,可以应用于如图1所示的应用环境中。终端102通过网络与服务器104通过网络进行通信。终端102可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,服务器104可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
在一些实施例中,如图2所示,提供了一种数据传输风险评估方法,以该方法应用于图1中的服务器为例进行说明,包括以下步骤:
S202,获取数据需求信息。
具体地,终端获取录入的数据需求信息和服务器地址,根据服务器地址将数据需求信息发送至服务器。服务器接收终端发送的数据需求信息。数据需求信息为数据接收方对数据的需求相关的信息。数据需求信息中具体可以包括数据条件、数据接收方标识和终端中登录的员工账号中的至少一种。
S204,根据数据需求信息获取待传输数据。
具体地,服务器在接收到数据需求信息后,对数据需求信息进行解析,通过解析提取数据需求信息中的数据条件,根据提取到的数据条件从数据库中查询数据,以查询到的数据作为待传输数据。
S206,识别待传输数据的数据类型。
具体地,服务器获取到待传输数据后,提取待传输数据中的数据类型标识,根据数据类型标识确定待传输数据的数据类型。其中,数据类型标识包括个人信息标识和重要业务数据标识。
在一些实施例中,服务器提取待传输数据中各数据段标识,识别提取到的数据段标识中是否包括个人信息对应的数据段标识或重要业务数据标识对应的数据段标识;若识别到提取到的数据段标识包括个人信息对应的数据段标识,则识别到待传输数据的数据类型为个人信息类型;若识别到提取到的数据段标识包括重要业务数据对应的数据段标识,则识别到待传输数据的数据类型为重要业务数据类型。
S208,通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值。
具体地,服务器中存储着分别与个人信息类型和重要业务数据类型对应的风险指标确定方式。若服务器在识别到数据类型为个人信息类型时,查询与个人信息类型对应的风险指标确定方式,根据查询到的风险指标确定方式对待传输数据进行分析,得到数据风险指标值;若服务器在识别到数据类型为重要业务数据类型时,查询与重要业务数据类型对应的风险指标确定方式,根据查询到的风险指标确定方式对待传输数据进行分析,得到数据风险指标值。
在一些实施例中,S208具体包括以下内容:当识别到的数据类型为个人信息类型时,确定待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值;当识别到的数据类型为重要业务数据类型时,确定待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值。
具体地,当识别到的数据类型为个人信息类型时,服务器统计待传输数据中个人敏感数据段数量和数据段总量,以统计到的个人敏感数据段数量除以数据段总量得到敏感程度值;服务器统计数据需求信息中所需要的需求数据段数量,将统计到数据段总量与需求数据段数量进行比较,根据比较结果确定数据范围指标值;服务器将统计到的数据段总量与预设数量阈值进行比较,根据比较结果确定数据量指标值;服务器识别待传输数据中是否包括经过加密的数据,根据识别结果确定技术处理指标值;服务器以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
在一些实施例中,当识别到的数据类型为重要业务类型时,服务器识别待传输数据中是否包括重要数据,根据识别结果确定重要数据指标值;服务器统计待传输数据的数据段总量,统计数据需求信息中所需要的需求数据段数量,将统计到数据段总量与需求数据段数量进行比较,根据比较结果确定数据范围指标值;服务器将统计到的数据段总量与预设数量阈值进行比较,根据比较结果确定数据量指标值;服务器识别待传输数据中是否包括经过加密的数据,根据识别结果确定技术处理指标值;服务器以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
S210,根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息。
具体地,服务器中存储着数据发送方和数据接收方的风险评估信息,其中风险评估信息与数据发送方标识和数据接收方标识相应存储。服务器从数据需求信息中提取数据发送方标识和数据接收方标识,在存储的风险评估信息中查询与提取到的数据发送方标识和数据接收方标识各自对应的风险评估信息。
其中,风险评估信息具体可包括技术保障能力信息、管理保障能力、主体审查信息和法律环境信息中的至少一种。
S212,根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告。
具体地,服务器从数据发送方风险评估信息和数据接收方风险评估信息中,提取数据发送方的风险指标评估值和数据接收方的风险指标评估值,根据确定的数据风险指标值、提取到的风险指标评估值生成数据传输风险报告。
本实施例中,在获取数据需求信息后,根据数据需求信息获取待传输数据,通过与待传输数据的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,保证了确定的数据风险指标值的准确性。根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,所采用的风险评估信息更加全面,从而进一步提高数据传输时风险评估的准确率。
在一些实施例中,如图3所示,S202具体还包括获取数据需求信息的步骤,该步骤具体包括以下内容:
S302,接收终端发送的数据传输请求。
具体地,终端中展示有数据传输页面,终端在检测到数据传输页面中的数据传输按钮被点击时,获取终端中登录的员工账号和密码,根据获取到的员工账号和密码生成数据传输请求,将数据传输请求发送至服务器。
S304,根据数据传输请求向终端返回需求信息页面数据。
具体地,服务器在接收到数据传输请求后,提取数据传输请求中的员工账号和密码,验证提取到的员工账号和密码是否一致。若验证一致,服务器根据数据传输请求查询需求信息页面数据,将查询到需求信息页面数据发送至终端。
S306,获取终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
具体地,终端在接收到需求信息页面数据后,根据需求信息页面数据展示数据需求信息页面,终端在检测到数据需求信息页面中的信息提交按钮被点击时,获取数据需求信息页面中录入的数据需求信息,将获取到的数据需求信息发送至服务器。服务器接收终端发送的数据需求信息。
本实施例中,在接收到终端发送的数据传输请求后,向终端返回需求信息页面数据,确定终端根据需求信息页面数据展示数据需求信息页面,使得用户在数据需求信息页面中录入数据需求信息,以便提高数据需求信息的录入效率。
在一些实施例中,如图4所示,S210具体包括获取风险指标评估表的步骤,该步骤具体包括以下内容:
S402,提取数据需求信息中数据发送方标识和数据接收方标识。
具体地,服务器在对数据需求信息进行解析,从数据需求信息中提取数据发送方标识和数据接收方标识。其中,数据发送方标识可以是数据发送方的地址、名称和编号中的至少一种;数据接收方标识可以是数据接收方的地址。名称和编号中的至少一种。
S404,获取与数据发送方标识和数据接收方标识分别对应的风险指标描述信息。
具体地,服务器中存储着风险指标描述信息,其中风险指标描述信息与风险指标标识对应存储。服务器在提取到数据发送方标识后,查询与数据发送方标识对应风险指标标识,在存储的风险指标描述信息中获取与查询到的风险指标标识对应的风险指标描述信息;服务器在提取到数据接收方标识后,查询与数据发送方标识对应风险指标标识,在存储的风险指标描述信息中获取与查询到的风险指标标识对应的风险指标描述信息。
S406,将风险指标描述信息发送至终端。
具体地,服务器在获取到与数据发送方标识和数据接收方标识分别对应的风险指标描述信息后,将数据发送方标识和数据接收方标识各自对应的风险指标描述信息发送至终端。
S408,接收终端根据风险指标描述信息返回的风险指标评估表,得到数据发送方标识和数据接收方标识分别对应的风险指标评估表。
具体地,终端在接收到风险指标描述信息后,将风险指标描述信息展示在风险指标评估表中。用户可以展示的风险指标描述信息在风险指标评估表中录入风险指标评估值。终端获取录入风险指标评估值的风险指标评估表,将获取到的风险指标评估表发送至服务器。其中,获取到的风险指标评估表包括与数据发送方标识对应的风险指标评估表和数据接收方标识对应的风险指标评估表。
本实施例中,根据数据发送方标识和数据接收方标识获取相应的风险指标描述信息,并使终端将获取到的风险指标描述信息进行展示。确保用户可根据展示的风险指标描述信息将相应的风险指标值录入到风险指标评估表中。接收终端返回的已经录入风险指标评估值的风险指标评估表,提高了获取风险指标评估值的准确性。
在一些实施例中,S212具体包括以下内容:从数据发送方标识和数据接收方标识分别对应的风险指标评估表中,提取数据发送方标识和数据接收方标识各自对应的风险指标评估值;根据数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值,确定数据需求信息对应的数据传输风险报告。
具体地,服务器在接收到终端返回的风险指标评估表后,从数据发送方标识和数据接收方标识分别对应的风险指标评估表中,提取数据发送方标识和数据接收方标识分别对应风险指标评估值,将数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值,添加到数据需求信息对应的数据传输风险报告。
在一些实施例中,服务器接收到终端返回的风险指标评估表,风险指标评估表中包括数据接收方标识对应的风险指标评估表和数据发送方标识对应的风险指标评估表。服务器从接收到的风险指标评估表中,分别提取与数据发送方标识对应的风险指标评估表和与数据接收方标识对应的风险指标评估表。服务器从数据发送方标识对应的风险指标评估表中提取数据发送方标识对应的风险指标评估值,服务器从数据接收方标识对应的风险指标评估表中提取数据接收方标识对应的风险指标评估值,将数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值添加到数据需求信息对应的数据传输风险报告。
在一些实施例中,如图5所示,S212之后具体还包括传输数据的步骤,该步骤具体包括以下内容:
S502,将数据传输风险报告返回至终端。
具体地,服务器在生成数据传输风险报告后,从数据需求信息中提取终端地址,根据提取到的终端地址将数据传输风险报告发送至数据需求信息对应的终端。
S504,接收终端根据数据传输风险报告返回的数据传输指令。
具体地,终端在接收到数据传输风险报告时,将数据传输风险报告展示,以便用户可以查看数据传输风险报告,用户在查勘数据传输风险报告后,在终端触发数据传输指令。终端将触发的数据传输指令发送至服务器。服务器接收终端根据数据传输风险报告返回的数据传输指令。其中,数据传输指令为指示服务器传输数据的指令。
S506,根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息。
具体地,服务器在接收到数据传输指令后,提取数据传输风险报告中的风险等级,并提取数据传输指令中的终端地址,根据提取到的风险等级生成传输询问信息,根据提取到的终端地址将传输询问信息发送至终端。
S508,当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输。
具体地,在终端接收到传输询问信息后,将传输询问信息展示在询问信息展示框中,若终端检测到询问信息展示框中的确认传输按钮被点击时,获取确认传输信息,将获取到的确认传输信息发送至服务器。服务器接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令中的数据标识确定待传输数据,将待传输数据进行传输。
S510,提取数据传输指令中的员工账号,并获取所述待传输数据对应的数据需求信息。
具体地,数据传输指令中包括员工账号,员工账号为终端中登录的员工账号。服务器提取数据传输指令中的员工账号,提取待传输数据对应的数据需求信息。
S512,根据员工账号和获取到的数据需求信息生成数据传输日志。
具体地,服务器记录待传输数据的传输时间,将记录的传输时间、员工账号和获取 到的数据需求信息对应存储在预设数据传输日志模板中,生成数据传输日志。
本实施例中,在将数据传输风险报告发送至终端,以便用户通过终端查看数据风险传输报告。在接收到终端根据数据传输风险报告发送的数据传输指令,根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息,从而可以保证用户可以根据数据传输风险报告中的风险等级是否确认传输信息,提高了数据传输的安全性。
应该理解的是,虽然图2-5的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2-5中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在一些实施例中,如图6所示,提供了一种数据传输风险评估装置600,包括:数据需求获取模块602、传输数据获取模块604、数据类型识别模块606、风险指标确定模块608、评估信息获取模块610和风险报告生成模块612,其中:
数据需求获取模块602,用于获取数据需求信息。
传输数据获取模块604,用于根据数据需求信息获取待传输数据。
数据类型识别模块606,用于识别待传输数据的数据类型。
风险指标确定模块608,用于通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值。
评估信息获取模块610,用于根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息。
风险报告生成模块612,用于根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告。
本实施例中,在获取数据需求信息后,根据数据需求信息获取待传输数据,通过与待传输数据的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,保证了确定的数据风险指标值的准确性。根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,所采用的风险评估信息更加全面,从而进一步提高数据传输时风险评估的准确率。
在一些实施例中,风险指标确定模块608还用于当识别到的数据类型为个人信息类型时,确定待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值;或者,当识别到的数据类型为重要业务数据类型时,确定待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重 要程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值。
在一些实施例中,数据需求获取模块602还用于接收终端发送的数据传输请求;根据数据传输请求向终端返回需求信息页面数据;获取终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
本实施例中,在接收到终端发送的数据传输请求后,向终端返回需求信息页面数据,确定终端根据需求信息页面数据展示数据需求信息页面,使得用户在数据需求信息页面中录入数据需求信息,以便提高数据需求信息的录入效率。
在一些实施例中,评估信息获取模块610还用于提取数据需求信息中数据发送方标识和数据接收方标识;获取与数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将风险指标描述信息发送至终端;接收终端根据风险指标描述信息返回的风险指标评估表,得到数据发送方标识和数据接收方标识分别对应的风险指标评估表。
本实施例中,根据数据发送方标识和数据接收方标识获取相应的风险指标描述信息,并使终端将获取到的风险指标描述信息进行展示。确保用户可根据展示的风险指标描述信息将相应的风险指标值录入到风险指标评估表中。接收终端返回的已经录入风险指标评估值的风险指标评估表,提高了获取风险指标评估值的准确性。
在一些实施例中,风险报告生成模块612还用于从数据发送方标识和数据接收方标识分别对应的风险指标评估表中,提取数据发送方标识和数据接收方标识各自对应的风险指标评估值;根据数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值,确定数据需求信息对应的数据传输风险报告。
在一些实施例中,如图7所示,数据传输风险评估装置600具体还包括以下内容:风险报告返回模块614、传输指令接收模块616、询问信息发送模块618、数据传输模块620和传输日志生成模块622。
风险报告返回模块614,用于将数据传输风险报告返回至终端。
传输指令接收模块616,用于接收终端根据数据传输风险报告返回的数据传输指令。
询问信息发送模块618,用于根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息。
数据传输模块620,用于当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输。
传输日志生成模块622,用于提取数据传输指令中的员工账号,并获取待传输数据对应的数据需求信息;根据员工账号和获取到的数据需求信息生成数据传输日志。
本实施例中,在将数据传输风险报告发送至终端,以便用户通过终端查看数据风险传输报告。在接收到终端根据数据传输风险报告发送的数据传输指令,根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息,从而可以保证用户可以根据数据传输风险报告中的风险等级是否确认传输信息,提高了数据传输的安全性。
关于数据传输风险评估装置的具体限定可以参见上文中对于数据传输风险评估方法的限定,在此不再赘述。上述数据传输风险评估装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一些实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图8所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性计算机可读存储介质、内存储器。该非易失性计算机可读存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性计算机可读存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储着数据传输风险评估数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种数据传输风险评估方法。
本领域技术人员可以理解,图8中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
在一些实施例中,提供了一种计算机设备,包括存储器和处理器,该存储器存储有计算机可读指令,该处理器执行计算机可读指令时实现以下步骤:获取数据需求信息;根据数据需求信息获取待传输数据;识别待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值;根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告。
在一些实施例中,通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,包括:当识别到的数据类型为个人信息类型时,确定待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值;或者,
当识别到的数据类型为重要业务数据类型时,确定待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值。
在一些实施例中,获取数据需求信息,包括:接收终端发送的数据传输请求;根据数据传输请求向终端返回需求信息页面数据;获取终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
在一些实施例中,根据数据需求信息获取数据发送方风险评估信息和数据接收方风 险评估信息,包括:提取数据需求信息中数据发送方标识和数据接收方标识;获取与数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将风险指标描述信息发送至终端;接收终端根据风险指标描述信息返回的风险指标评估表,得到数据发送方标识和数据接收方标识分别对应的风险指标评估表。
在一些实施例中,根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,包括:从数据发送方标识和数据接收方标识分别对应的风险指标评估表中,提取数据发送方标识和数据接收方标识各自对应的风险指标评估值;根据数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值,确定数据需求信息对应的数据传输风险报告。
在一些实施例中,根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告之后,处理器执行计算机可读指令时还实现以下步骤:将数据传输风险报告返回至终端;接收终端根据数据传输风险报告返回的数据传输指令;根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息;当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输。
在一些实施例中,当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输之后,处理器执行计算机可读指令时还实现以下步骤:提取数据传输指令中的员工账号,并获取待传输数据对应的数据需求信息;根据员工账号和获取到的数据需求信息生成数据传输日志。
本实施例中,在获取数据需求信息后,根据数据需求信息获取待传输数据,通过与待传输数据的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,保证了确定的数据风险指标值的准确性。根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,所采用的风险评估信息更加全面,从而进一步提高数据传输时风险评估的准确率。
在一些实施例中,提供了一种计算机可读存储介质,其上存储有计算机可读指令,计算机可读指令被处理器执行时实现以下步骤:获取数据需求信息;根据数据需求信息获取待传输数据;识别待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值;根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告。
在一些实施例中,通过与识别到的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,包括:当识别到的数据类型为个人信息类型时,确定待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值;或 者,
当识别到的数据类型为重要业务数据类型时,确定待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为待传输数据的数据风险指标值。
在一些实施例中,获取数据需求信息,包括:接收终端发送的数据传输请求;根据数据传输请求向终端返回需求信息页面数据;获取终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
在一些实施例中,根据数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息,包括:提取数据需求信息中数据发送方标识和数据接收方标识;获取与数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将风险指标描述信息发送至终端;接收终端根据风险指标描述信息返回的风险指标评估表,得到数据发送方标识和数据接收方标识分别对应的风险指标评估表。
在一些实施例中,根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,包括:从数据发送方标识和数据接收方标识分别对应的风险指标评估表中,提取数据发送方标识和数据接收方标识各自对应的风险指标评估值;根据数据风险指标值、数据发送方标识对应的风险指标评估值和数据接收方标识对应的风险指标评估值,确定数据需求信息对应的数据传输风险报告。
在一些实施例中,根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告之后,计算机可读指令被处理器执行时还实现以下步骤:将数据传输风险报告返回至终端;接收终端根据数据传输风险报告返回的数据传输指令;根据数据传输风险报告中的风险等级和数据传输指令,向终端返回传输询问信息;当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输。
在一些实施例中,当接收到终端根据传输询问信息返回的确认传输信息时,根据数据传输指令将待传输数据进行传输之后,计算机可读指令被处理器执行时还实现以下步骤:提取数据传输指令中的员工账号,并获取待传输数据对应的数据需求信息;根据员工账号和获取到的数据需求信息生成数据传输日志。
本实施例中,在获取数据需求信息后,根据数据需求信息获取待传输数据,通过与待传输数据的数据类型对应的风险指标确定方式,确定待传输数据的数据风险指标值,保证了确定的数据风险指标值的准确性。根据确定的数据风险指标值、数据发送方风险评估信息和数据接收方风险评估信息,生成数据传输风险报告,所采用的风险评估信息更加全面,从而进一步提高数据传输时风险评估的准确率。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的 流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (20)
- 一种数据传输风险评估方法,包括:获取数据需求信息;根据所述数据需求信息获取待传输数据;识别所述待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
- 根据权利要求1所述的方法,其特征在于,所述通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值,包括:当识别到的数据类型为个人信息类型时,确定所述待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值;或者,当识别到的数据类型为重要业务数据类型时,确定所述待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
- 根据权利要求1所述的方法,其特征在于,所述获取数据需求信息,包括:接收终端发送的数据传输请求;根据所述数据传输请求向终端返回需求信息页面数据;及获取所述终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
- 根据权利要求3所述的方法,其特征在于,所述根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息,包括:提取所述数据需求信息中数据发送方标识和数据接收方标识;获取与所述数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将所述风险指标描述信息发送至所述终端;及接收所述终端根据所述风险指标描述信息返回的风险指标评估表,得到所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表。
- 根据权利要求4所述的方法,其特征在于,所述根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告,包括:从所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表中,提取所述数据发送方标识和所述数据接收方标识各自对应的风险指标评估值;及根据所述数据风险指标值、所述数据发送方标识对应的风险指标评估值和所述数据接收方标识对应的风险指标评估值,确定所述数据需求信息对应的数据传输风险报告。
- 根据权利要求5所述的方法,其特征在于,所述根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告之后,所述方法还包括:将所述数据传输风险报告返回至所述终端;接收所述终端根据所述数据传输风险报告返回的数据传输指令;根据所述数据传输风险报告中的风险等级和所述数据传输指令,向所述终端返回传输询问信息;及当接收到所述终端根据所述传输询问信息返回的确认传输信息时,根据所述数据传输指令将所述待传输数据进行传输。
- 根据权利要求6所述的方法,其特征在于,所述当接收到所述终端根据所述传输询问信息返回的确认传输信息时,根据所述数据传输指令将所述待传输数据进行传输之后,所述方法还包括:提取数据传输指令中的员工账号,并获取所述待传输数据对应的数据需求信息;及根据所述员工账号和获取到的数据需求信息生成数据传输日志。
- 一种数据传输风险评估装置,包括:数据需求获取模块,用于获取数据需求信息;传输数据获取模块,用于根据所述数据需求信息获取待传输数据;数据类型识别模块,用于识别所述待传输数据的数据类型;风险指标确定模块,用于通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;评估信息获取模块,用于根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及风险报告生成模块,用于根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
- 根据权利要求8所述的装置,其特征在于,所述风险指标确定模块还用于当识别到的数据类型为个人信息类型时,确定所述待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值;或者,当识别到的数据类型为重要业务数据类型时,确定所述待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
- 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:获取数据需求信息;根据所述数据需求信息获取待传输数据;识别所述待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
- 根据权利要求10所述的计算机设备,其特征在于,所述通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值,包括:当识别到的数据类型为个人信息类型时,确定所述待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值;或者,当识别到的数据类型为重要业务数据类型时,确定所述待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
- 根据权利要求10所述的计算机设备,其特征在于,所述获取数据需求信息,包括:接收终端发送的数据传输请求;根据所述数据传输请求向终端返回需求信息页面数据;及获取所述终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信息。
- 根据权利要求12所述的计算机设备,其特征在于,所述根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息,包括:提取所述数据需求信息中数据发送方标识和数据接收方标识;获取与所述数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将所述风险指标描述信息发送至所述终端;及接收所述终端根据所述风险指标描述信息返回的风险指标评估表,得到所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表。
- 根据权利要求13所述的计算机设备,其特征在于,所述根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告,包括:从所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表中,提取所述数据发送方标识和所述数据接收方标识各自对应的风险指标评估值;及根据所述数据风险指标值、所述数据发送方标识对应的风险指标评估值和所述数据接收方标识对应的风险指标评估值,确定所述数据需求信息对应的数据传输风险报告。
- 根据权利要求14所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还执行以下步骤:将所述数据传输风险报告返回至所述终端;接收所述终端根据所述数据传输风险报告返回的数据传输指令;根据所述数据传输风险报告中的风险等级和所述数据传输指令,向所述终端返回传输询问信息;及当接收到所述终端根据所述传输询问信息返回的确认传输信息时,根据所述数据传输指令将所述待传输数据进行传输。
- 一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:获取数据需求信息;根据所述数据需求信息获取待传输数据;识别所述待传输数据的数据类型;通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值;根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息;及根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告。
- 根据权利要求16所述的存储介质,其特征在于,所述通过与识别到的数据类型对应的风险指标确定方式,确定所述待传输数据的数据风险指标值,包括:当识别到的数据类型为个人信息类型时,确定所述待传输数据的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的敏感程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值;或者,当识别到的数据类型为重要业务数据类型时,确定所述待传输数据的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值,以确定的数据重要程度值、数据范围指标值、数据量指标值和技术处理指标值作为所述待传输数据的数据风险指标值。
- 根据权利要求16所述的存储介质,其特征在于,所述获取数据需求信息,包括:接收终端发送的数据传输请求;根据所述数据传输请求向终端返回需求信息页面数据;及获取所述终端根据需求信息页面数据展示的数据需求信息页面中,录入的数据需求信 息。
- 根据权利要求18所述的存储介质,其特征在于,所述根据所述数据需求信息获取数据发送方风险评估信息和数据接收方风险评估信息,包括:提取所述数据需求信息中数据发送方标识和数据接收方标识;获取与所述数据发送方标识和数据接收方标识分别对应的风险指标描述信息;将所述风险指标描述信息发送至所述终端;及接收所述终端根据所述风险指标描述信息返回的风险指标评估表,得到所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表。
- 根据权利要求19所述的存储介质,其特征在于,所述根据确定的数据风险指标值、所述数据发送方风险评估信息和所述数据接收方风险评估信息,生成数据传输风险报告,包括:从所述数据发送方标识和所述数据接收方标识分别对应的风险指标评估表中,提取所述数据发送方标识和所述数据接收方标识各自对应的风险指标评估值;及根据所述数据风险指标值、所述数据发送方标识对应的风险指标评估值和所述数据接收方标识对应的风险指标评估值,确定所述数据需求信息对应的数据传输风险报告。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354467.4 | 2018-04-19 | ||
CN201810354467.4A CN108712275A (zh) | 2018-04-19 | 2018-04-19 | 数据传输风险评估方法、装置、计算机设备和存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019200754A1 true WO2019200754A1 (zh) | 2019-10-24 |
Family
ID=63866766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/095607 WO2019200754A1 (zh) | 2018-04-19 | 2018-07-13 | 数据传输风险评估方法、装置、计算机设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108712275A (zh) |
WO (1) | WO2019200754A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110633112A (zh) | 2019-08-30 | 2019-12-31 | 北京小米移动软件有限公司 | 信息处理方法及装置、设备、存储介质 |
CN113808712A (zh) * | 2021-08-24 | 2021-12-17 | 武汉联影医疗科技有限公司 | 医学数据传输方法、装置、计算机设备和存储介质 |
CN116112203B (zh) * | 2022-11-16 | 2023-07-28 | 广东一码通信科技有限公司 | 基于风险模型的网络通信风险预测方法及装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101083627A (zh) * | 2007-07-30 | 2007-12-05 | 华为技术有限公司 | 检测数据属性的方法及系统、数据属性分析装置 |
CN104601355A (zh) * | 2013-10-31 | 2015-05-06 | 大连智友软件科技有限公司 | 基于加权平均法的企业网上传输数据风险评估方法 |
CN106341389A (zh) * | 2016-08-11 | 2017-01-18 | 福州瑞芯微电子股份有限公司 | 一种车联网数据传输方法和装置 |
CN107122669A (zh) * | 2017-04-28 | 2017-09-01 | 北京北信源软件股份有限公司 | 一种评估数据泄露风险的方法和装置 |
CN107122666A (zh) * | 2016-12-05 | 2017-09-01 | 招商银行股份有限公司 | 金融应用的风险评估方法及装置 |
US20170300824A1 (en) * | 2016-04-13 | 2017-10-19 | Hartford Fire Insurance Company | Performance estimation system utilizing a data analytics predictive model |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100435526C (zh) * | 2004-07-21 | 2008-11-19 | 威达电股份有限公司 | 网络安全动态侦测系统及方法 |
CN101374051A (zh) * | 2008-08-22 | 2009-02-25 | 中国航天科工集团第二研究院七○六所 | 一种基于多要素融合的信息系统风险评估方法 |
CN101784054A (zh) * | 2009-01-20 | 2010-07-21 | 华为终端有限公司 | 一种防止手机流氓软件的方法、终端、服务器及系统 |
CN104361097A (zh) * | 2014-11-21 | 2015-02-18 | 国家电网公司 | 一种基于多模匹配的电力敏感邮件实时检测方法 |
CN105553956A (zh) * | 2015-12-09 | 2016-05-04 | 国家电网公司 | 一种基于敏感信息识别的邮件阻断方法和装置 |
CN107644340A (zh) * | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | 风险识别方法、客户端设备及风险识别系统 |
CN106713266B (zh) * | 2016-11-14 | 2020-09-04 | 腾讯科技(深圳)有限公司 | 一种防止信息泄露的方法、装置、终端及系统 |
-
2018
- 2018-04-19 CN CN201810354467.4A patent/CN108712275A/zh active Pending
- 2018-07-13 WO PCT/CN2018/095607 patent/WO2019200754A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101083627A (zh) * | 2007-07-30 | 2007-12-05 | 华为技术有限公司 | 检测数据属性的方法及系统、数据属性分析装置 |
CN104601355A (zh) * | 2013-10-31 | 2015-05-06 | 大连智友软件科技有限公司 | 基于加权平均法的企业网上传输数据风险评估方法 |
US20170300824A1 (en) * | 2016-04-13 | 2017-10-19 | Hartford Fire Insurance Company | Performance estimation system utilizing a data analytics predictive model |
CN106341389A (zh) * | 2016-08-11 | 2017-01-18 | 福州瑞芯微电子股份有限公司 | 一种车联网数据传输方法和装置 |
CN107122666A (zh) * | 2016-12-05 | 2017-09-01 | 招商银行股份有限公司 | 金融应用的风险评估方法及装置 |
CN107122669A (zh) * | 2017-04-28 | 2017-09-01 | 北京北信源软件股份有限公司 | 一种评估数据泄露风险的方法和装置 |
Non-Patent Citations (1)
Title |
---|
XU, XUEBIN ET AL.: "Discussion on Key Technology of Network Security Risk Assessment", CHINA NEW TELECOMMUNICATIONS, vol. 17, no. 21, 31 December 2015 (2015-12-31), pages 81 - 82 * |
Also Published As
Publication number | Publication date |
---|---|
CN108712275A (zh) | 2018-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021003980A1 (zh) | 黑名单共享方法、装置、计算机设备和存储介质 | |
US11005779B2 (en) | Method of and server for detecting associated web resources | |
CN109670049B (zh) | 图谱路径查询方法、装置、计算机设备和存储介质 | |
WO2020140679A1 (zh) | 接口对接方法、装置、计算机设备和存储介质 | |
WO2019200741A1 (zh) | 项目评估信息处理方法、装置、计算机设备和存储介质 | |
WO2021003977A1 (zh) | 违约信息查询方法、装置、计算机设备和存储介质 | |
US11263344B2 (en) | Data management method and registration method for an anonymous data sharing system, as well as data manager and anonymous data sharing system | |
WO2018120722A1 (zh) | 异步接口测试方法、终端、设备、系统及存储介质 | |
CN111027295B (zh) | 数据处理方法、装置、计算机设备和存储介质 | |
WO2019134333A1 (zh) | 端口监控方法、装置、计算机设备及存储介质 | |
US9311681B2 (en) | Claiming conversations between users and non-users of a social networking system | |
WO2019200754A1 (zh) | 数据传输风险评估方法、装置、计算机设备和存储介质 | |
WO2019214080A1 (zh) | 报批信息处理方法、装置、计算机设备和存储介质 | |
US10154082B2 (en) | Providing customer information obtained from a carrier system to a client device | |
WO2019109529A1 (zh) | 网页识别方法、装置、计算机设备及计算机存储介质 | |
WO2019148712A1 (zh) | 钓鱼网站检测方法、装置、计算机设备和存储介质 | |
WO2019100682A1 (zh) | 风险评估方法、装置、计算机设备及可读存储介质 | |
US20160006734A1 (en) | Dual channel identity authentication | |
WO2020056973A1 (zh) | 跨平台产品推荐方法、装置、服务器和存储介质 | |
US9471665B2 (en) | Unified system for real-time coordination of content-object action items across devices | |
WO2019144548A1 (zh) | 安全测试方法、装置、计算机设备和存储介质 | |
WO2021120628A1 (zh) | 基于区块链的敏感词检测方法、装置、计算机设备和计算机可读存储介质 | |
WO2018192432A1 (zh) | 工作信息处理方法、装置、计算机设备和存储介质 | |
WO2018184520A1 (zh) | 业务数据处理方法、装置、服务器和存储介质 | |
CN112328486A (zh) | 接口自动化测试方法、装置、计算机设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18915251 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/02/2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18915251 Country of ref document: EP Kind code of ref document: A1 |