Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for internal security management and control of enterprise data

A security control and enterprise data technology, applied in the field of information system data security, can solve problems such as data security difficulty and data leakage, and achieve the effect of friendly visual operation

Active Publication Date: 2018-04-20
ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, from a technical point of view, in order to achieve a comprehensive integration of the data ecological chain, if data security issues and data privacy issues are not properly resolved, then there will be obstacles in all stages of data fusion, accompanied by data integration. There is a huge risk of leakage; at the same time, it is also very difficult to achieve good visualization operations in ensuring data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for internal security management and control of enterprise data
  • Method and system for internal security management and control of enterprise data
  • Method and system for internal security management and control of enterprise data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This embodiment provides a method for internal security management and control of enterprise data, such as Figure 1-2 As shown, it is based on the full-service unified data center built on the enterprise cloud platform. The full-service unified data center includes structured data in the unified view area and data warehouse area. Formulate security specifications for the entire data protection from the perspective of the security life cycle;

[0030] Based on the above security specifications, the LabelSecurity security label mechanism is enabled on the enterprise cloud platform, and the security label distinguishes the data access level of the enterprise cloud platform into four levels of confidentiality: public data, internal data, confidential data, and confidential data; and through The LabelSecurity access mechanism implements different effective security control strategies for different columns of the same table data.

[0031] After the security label mechanism ...

Embodiment 2

[0037] This embodiment provides a system for internal security management and control of enterprise data, such as image 3 shown, which includes:

[0038] Full-service unified data center: A full-service unified data center based on the enterprise cloud platform, including structured data in the unified view area and data warehouse area;

[0039] Security label mechanism enabling unit: used to enable the LabelSecurity security label mechanism;

[0040] Security specification formulation unit: After analyzing the actual operating environment risk of the structured data in the unified view area and the data warehouse area, formulate the security specification for the entire data protection from the perspective of the data security life cycle;

[0041] Data security management and control unit: Based on the above security specifications, the LabelSecurity security label mechanism is enabled on the enterprise cloud platform, and the security label distinguishes the data access le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and a system for internal security management and control of enterprise data. The method disclosed by the present invention is based on a full-service unifieddata center built by an enterprise cloud platform, the full-service unified data center comprises structured data in a unified view area and in a digital warehouse area, and after carrying out actualoperating environment risk analysis on the structured data, from the perspective of the security lifecycle, the entire data protection security specification is formulated; based on the security specification, the LabelSecurity security tag mechanism is enabled on the enterprise cloud platform, and the data access levels of the enterprise cloud platform are divided into four levels of confidentiality of open data, internal data, secret data and confidential data by the security tags; and through the LabelSecurity access mechanism, different effective security control strategies are implementedfor different columns of the data in the same table. According to the method and system disclosed by the present invention, secure tracking and management and control of the service data within the life cycle is ensured; and at the same time, a friendly visual operation is ensured during the entire data management and control process.

Description

technical field [0001] The invention belongs to the field of information system data security, in particular to a method and system for internal security management and control of enterprise data. Background technique [0002] Within the enterprise, in order to solve multi-source data sources, break the barriers between enterprises and the current situation of data non-circulation between departments, it can facilitate the management of enterprise decision makers and dig deep into the value of data, establish cooperation between enterprise departments, and improve data It is the trend of the times to realize the internal opening of data to realize the value and utilization of assets. [0003] In order to maximize the value of enterprise data, at present, the data of various business departments of State Grid Zhejiang Electric Power has been uploaded to the cloud, and a unified data center for the entire business of the enterprise has been basically built, which effectively c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/604G06F2221/2107
Inventor 李景韩嘉佳李沁园戴桦吕磅李霁远姚影
Owner ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products