Data protection method and safety bastion host

A technology of data protection and bastion machine, which is applied in the field of communication and can solve problems such as the inability to guarantee the security of server data.

Inactive Publication Date: 2015-07-22
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the bastion machine is attacked by hackers, the hacker obtains the authority of the system administrator and uses the highest authority of the system administrator in the bastion machine to access and modify the data of the server, so the security of the server data cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and safety bastion host
  • Data protection method and safety bastion host
  • Data protection method and safety bastion host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] Such as figure 1 As shown, the embodiment of the present invention provides a data protection method, in which the bastion machine is connected in series on the path between the client and the server, and the method may include the following steps:

[0041] Step 101: Obtain multiple pieces of data from the server.

[0042] Step 102: Determine the importance level of each data, and set the system administrator to have no operation authority on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection method and a safety bastion host which is connected in series to a path between a client terminal and a server. The method comprises the following steps: acquiring a plurality of data of a server; determining the importance level of each datum, and setting up no operation privilege of a system administrator to data with higher importance level than the set threshold; determining the importance level of data operated by a first operation instruction sent by the system administrator when the first operation instruction is received; and preventing the first operation instruction from access to the data operated by the first operation instruction when the importance level of the data operated by the first operation instruction is higher than the set threshold. According to the scheme, attacking server data by a hacker through acquiring the privilege of the system administrator is avoided through setting no operation privilege of the system administrator to the data with higher importance level than the set threshold, thereby improving the safety performance of the server data.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a data protection method and a bastion machine. Background technique [0002] With the rapid development of communication technology, server data security is particularly important. The traditional data protection method can use the bastion machine to ensure the data security of the server. Among them, the bastion host is an operation and maintenance audit product for data centers, which can provide functions such as single sign-on, account management, authorization management, and security audit. [0003] In the prior art, the bastion machine is used to ensure the data security of the server. By connecting the bastion machine in series between the client and the server, the system administrator on the client side obtains the data in the server and stores the data in the server in the bastion In the machine, when receiving the access instruction sent by the client, it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 张和超
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products