Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing safety management view of full life cycle of unstructured data

An unstructured data, full life cycle technology, applied in the field of data security, can solve the problems of lack of data security management view, wide distribution of unstructured data, difficult data leakage and other security emergencies tracking and traceability, to improve accuracy Sexuality and real-time effects

Active Publication Date: 2015-07-15
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unlike structured data, unstructured data is often widely distributed, not subject to centralized management by the data resource management platform, but decentralized management and storage by various departments; and according to business needs, it frequently flows between terminals and servers in the enterprise network time, it is difficult to control data security
[0003] At present, the security monitoring of unstructured data is only for the security monitoring of a certain part of data creation, transmission, destruction, etc., and lacks a data security management view with a full life cycle, so it is difficult to trace the source of security emergencies such as data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing safety management view of full life cycle of unstructured data
  • Method for establishing safety management view of full life cycle of unstructured data
  • Method for establishing safety management view of full life cycle of unstructured data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Embodiment of the present invention: a method for establishing a security management view of the whole life cycle of unstructured data, such as figure 1 As shown, the design is mainly carried out from two aspects of data tracking and evidence collection: First, record the data operation behavior of unstructured data files in the stages of creation, storage, use, transmission, destruction and recovery, and store them as log audit records. Track the data; then, read the log audit records of the unstructured data files in the stages of creation, storage, use, transmission, destruction and recovery, analyze the data operation behavior that violates the security policy, generate an analysis report, and complete the analysis Data forensics; finally, establish a full life cycle security management view of unstructured data (such as Figure 6 As shown), it shows the information of each stage of data creation, circulation, operation, and destruction, and provides analysis basis ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for establishing a safety management view of a full life cycle of unstructured data. The method comprises the following steps: 1, recording data operation behaviors of an unstructured data file in various stages, namely creation, storage, use, transmission, destruction and recovery, and storing the data operation behaviors as log audit records; 2, reading the log audit records of the unstructured data file in various stages, namely creation, storage, use, transmission, destruction and recovery, and analyzing the data operation behaviors contrary to a safety strategy to generate an analysis report; 3, establishing the safety management view of the full life cycle of the unstructured data. The method disclosed by the invention can be used for tracing the full life cycle (creation, storage, use, transmission, destruction and recovery) of big data, and obtaining the evidence of the behaviors contrary to the safety strategy, so that the safety burst time, such as data leakage can be traced to the source, and the data monitoring accuracy and the data monitoring real-time property are improved.

Description

technical field [0001] The invention relates to a method for establishing a security management view of the whole life cycle of unstructured data, belonging to the technical field of data security. Background technique [0002] The generation and use of enterprise structured data are all in the database, so the management of structured data is relatively centralized. Generally, all the information of structured data can be obtained by directly querying the database. The unstructured data of an enterprise includes all office documents, text, pictures, XML, HTML, images and audio / video information that are not included in the master data. Unlike structured data, unstructured data is often widely distributed, not subject to centralized management by the data resource management platform, but decentralized management and storage by various departments; and according to business needs, it frequently flows between terminals and servers in the enterprise network time, it is diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F17/30
Inventor 赵延帅蔡徽唐亮亮魏理豪邹洪陈锐忠李皓彭泽武冯歆尧林泽鑫
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products