Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security control method and system based on data classification and grading

A data classification and data security technology, applied in the field of data security, can solve problems such as the discovery of abnormal behaviors in document use, the lack of data security assessment, and the lack of indexed representation of data security.

Active Publication Date: 2017-05-17
北京明朝万达科技股份有限公司
View PDF4 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Does not have the ability to define the security level of documents; does not have the ability to discover the distribution of important documents; does not have the ability to identify document feature attributes within the document; does not have the ability to control document use restrictions; does not have the ability to discover abnormal behaviors of document use ;Does not have the ability to express data security index; does not have the ability to evaluate data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security control method and system based on data classification and grading
  • Data security control method and system based on data classification and grading
  • Data security control method and system based on data classification and grading

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Glossary:

[0043] Windows Session, the operating system session, is composed of processes and other system objects (such as window stations, desktops, and windows), which represent a user's workstation login session.

[0044]JSON, is a lightweight data interchange format that is easy to read and write, as well as easy to machine parse and generate. JSON uses a text format that has nothing to do with programming languages, and borrows the habits of C-like languages. These characteristics make JSON an ideal data exchange format.

[0045] Bayes' theorem is a theorem about the conditional probability of random events A and B. where P(A|B) is the probability of A happening given B happening.

[0046] Bayesian classification is a classification method of statistics. It is a class of algorithms that use probability and statistics knowledge for classification.

[0047] Naive Bayesian algorithm is a classification method based on Bayesian theorem and the independent assumpti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security control method and system based on data classification and grading. The method includes the following steps of finding, wherein data sets in the management range are vectorized; classifying, wherein found and vectorized documents are classified according to a classifying model; important service data identifying, wherein whether the documents are important service data or not is judged according to an important service data identifying model for the classification results; grading, wherein for identified important service data, the security level of the documents is defined according to a grading model; labeling, wherein document important characteristics in the important service data obtained after grading are recorded, identification ID and the document important characteristics are recorded in a document header, and detailed content of the labeled data is stored in a third-party database; the important service data formed by the important service data perception step are analyzed and controlled. By means of the scheme, the data security control system is constructed from the visual angle of combining security management and data management, the system is evaluated subjectively and accurately, the security control result is quantized in an index assessment mode to guide control improvement.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data security management and control method and system. Background technique [0002] DLP, data leakage prevention technology, is a strategy and technology that prevents specified data or information assets of an enterprise from flowing out of the enterprise in a form that violates security policies through certain technical means. DLP technology can process data storage, use and transmission, identify and process data content, ensure data can be transparently processed, intelligently encrypted, has high stability and system compatibility, and can form a detailed data content level audit log. The core technical points of DLP include transmission protocol analysis, data format content recognition, high-speed rule matching, natural semantic analysis, machine learning, cluster analysis, data feature matching, etc. [0003] DLP at this stage generally uses three basic detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06K9/62G06N99/00
CPCG06F21/604G06F21/6218G06N20/00G06F18/23213
Inventor 孙亚东王志海魏力何晋昊喻波杨巨杰
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products