Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data security management and control method and system based on data classification and classification

A data classification and data security technology, applied in the field of data security, can solve the problems of not being able to discover the distribution of important documents, not being able to define the security level of documents, not being able to control the use of documents, etc.

Active Publication Date: 2019-11-15
北京明朝万达科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Does not have the ability to define the security level of documents; does not have the ability to discover the distribution of important documents; does not have the ability to identify document feature attributes within the document; does not have the ability to control document use restrictions; does not have the ability to discover abnormal behaviors of document use ;Does not have the ability to express data security index; does not have the ability to evaluate data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security management and control method and system based on data classification and classification
  • A data security management and control method and system based on data classification and classification
  • A data security management and control method and system based on data classification and classification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Glossary:

[0043] Windows Session, the operating system session, is composed of processes and other system objects (such as window stations, desktops, and windows), which represent a user's workstation login session.

[0044]JSON, is a lightweight data interchange format that is easy to read and write, as well as easy to machine parse and generate. JSON uses a text format that has nothing to do with programming languages, and borrows the habits of C-like languages. These characteristics make JSON an ideal data exchange format.

[0045] Bayes' theorem is a theorem about the conditional probability of random events A and B. where P(A|B) is the probability of A happening given B happening.

[0046] Bayesian classification is a classification method of statistics. It is a class of algorithms that use probability and statistics knowledge for classification.

[0047] Naive Bayesian algorithm is a classification method based on Bayesian theorem and the independent assumpti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security management and control method and system based on data classification and grading. The method includes the following steps: discovering, vectorizing the data set within the management range; classifying, discovering and vectorizing the document, according to the classification model Carry out classification; identify important business data, and determine whether the document is important business data according to the classification result based on the important business data identification model; classify, define the security level of the document according to the identified important business data according to the classification model ;Identify, record the important features of the document in the important business data after the classification, record the identification ID and the important features of the document in the document header, and store the detailed content of the identified data in a third-party database; The important business data formed in the business data perception step is analyzed and controlled. Through the scheme of the invention, a data security management and control system is constructed from the perspective of combining security management and data management, an objective and accurate evaluation system, and an index evaluation method is used to quantify the results of security management and control and guide the improvement of management and control.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data security management and control method and system. Background technique [0002] DLP, data leakage prevention technology, is a strategy and technology that prevents specified data or information assets of an enterprise from flowing out of the enterprise in a form that violates security policies through certain technical means. DLP technology can process data storage, use and transmission, identify and process data content, ensure data can be transparently processed, intelligently encrypted, has high stability and system compatibility, and can form a detailed data content level audit log. The core technical points of DLP include transmission protocol analysis, data format content recognition, high-speed rule matching, natural semantic analysis, machine learning, cluster analysis, data feature matching, etc. [0003] DLP at this stage generally uses three basic detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60G06K9/62G06N20/00
CPCG06F21/604G06F21/6218G06N20/00G06F18/23213
Inventor 孙亚东王志海魏力何晋昊喻波杨巨杰
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products