Data exploration system and method, device and storage medium

A data and sensitive data technology, applied in the field of data security, can solve problems such as inability to realize coordinated protection and difficult support, and achieve the effect of coordinated defense and comprehensive protection

Active Publication Date: 2017-12-15
北京明朝万达科技股份有限公司
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The sensitive data detection module integrated in a specific data security management and control system only provides support for the sensitive data governance means of the data security management an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data exploration system and method, device and storage medium
  • Data exploration system and method, device and storage medium
  • Data exploration system and method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0054] With the continuous changes in the current network security environment, pure "prevention" has been difficult to deal with existing security threats, such as "single point", "partial", and "passive" protection cannot ensure the security of sensitive data. Sensitive data protection is changing from "single point protection" to "coordinated protection", from "local security" to "global security", and from "passive protection" to "active protection".

[0055] It should be noted that sensitive data refers to information that is not known to the public, has actual and potential value, and is lost, improperly used, or accessed without authorization, causing harm to society, enterprises, or individuals, such as personal privacy inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data exploration system and method, an electronic device and a storage medium and relates to the technical field of data safety. The system comprises an exploration module, a supporting engine module and an exploration management module; the exploration module is used for setting configuration information and sending the configuration information to the exploration management module, and the configuration information comprises configuration parameters which are determined according to service requirements; the exploration management module is used for packaging exploration strategy information according to the configuration information, and the exploration strategy information is sent to the supporting engine module; the supporting engine module is used for conducting sensitive data exploration on target data according to the exploration strategy information, and the target data is data which is determined according to the configuration parameters. According to the embodiment, the data exploration system is deployed in the data network in a format of the independent and special data exploration system, the support can be provided for treatment measures of various sensitive data in different data safety management and control systems, and then collaborative defense can be achieved.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a data search system, a data search method, an electronic device and a readable storage medium. Background technique [0002] With the development of information technology and the advent of the era of big data, data circulation has become the main means and way to release the dividend and value of data. [0003] In the process of data circulation, sensitive data has an internal driving force of "internal leakage and external theft" based on its unique value, and is in a high-risk state of easy leakage and abuse. In order to cope with the threats faced by sensitive data, effective protection of sensitive data is required. [0004] For sensitive data protection, only by thoroughly understanding the distribution and status of sensitive data and adopting precise and powerful governance and control strategies can we provide efficient and comprehensive protection for se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/24564G06F16/2465G06F21/6209G06F21/6218G06F21/6245
Inventor 宋博韬王志海喻波魏力
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products