Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collaborative data anti-leakage method and system

An anti-leak, data technology, applied in the field of data security, can solve problems such as affecting work efficiency, normal user operation interference, poor scalability, etc., to achieve the effect of improving comprehensive performance and avoiding data leakage incidents

Active Publication Date: 2018-05-11
北京明朝万达科技股份有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] To sum up, the existing data leakage prevention system has deficiencies in the analysis and detection of encrypted network traffic, that is, the gateway has low participation (cannot effectively analyze encrypted network traffic), terminal analysis ability is low (cannot analyze encrypted traffic content in depth), and collaborative Poor performance (the gateway and the terminal failed to effectively link to complete the data leakage prevention of encrypted traffic)
Among them, the terminal analysis capability can be realized by applying efficient data analysis algorithms, but in the scenario of high network traffic, it may occupy more host system resources, interfere with normal user operations, affect work efficiency, and restrict productivity
At the same time, this method has poor scalability and low resource usage efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative data anti-leakage method and system
  • Collaborative data anti-leakage method and system
  • Collaborative data anti-leakage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0064]

[0065] figure 2 It is the composition structure of the host-side terminal of the present invention. In addition to the original data leakage prevention components, the software also includes the access detection module required by the present invention, the flow redirection module (including functions such as SPI, Hook, drive and forwarding) and the user interface. A management and control notification module based on user notifications.

[0066] image 3 The composition structure of the gateway side of the present invention, in addition to the original data leakage prevention gateway component, also includes the access nodes (node ​​scheduling module, flow access module, encrypted communication module, flow detection management module, flow forwarding module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a collaborative data anti-leakage method and system. The method comprises the following steps: collecting network traffic data generated by a host, and establishing and training a sensitive data model by combining a data anti-leakage strategy; capturing, by a terminal, the network traffic data generated by the host, and redirecting and sending the network traffic data to anoptimal access node; determining, by the access node, whether to establish an encrypted communication link with a target address according to the network traffic data; selecting, by the access node,an appropriate detection node according to the current operation status of a detection node and other reference data, and issuing a detection task; identifying, by the detection node, sensitive data in real time by combining a detection strategy with the sensitive data model, and feeding back the sensitive data to the access node; deciding, by the access node, whether to manage and control the network traffic data by combining the feedback result and a management and control strategy. By adoption of the technical scheme of the invention, the external sensitive data can be identified, managed and controlled in time, and the security protection ability of the data anti-leakage system on the data is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and a system for a leakage system gateway and a terminal to jointly complete the analysis and detection of host encrypted network traffic. Background technique [0002] With the rapid development of computer science, the scope of application of Internet technology is becoming wider and wider, and the benefits brought by the interconnection of information systems to all walks of life are becoming more and more obvious. However, the ensuing data leakage problem has formed an obstacle to the widespread development of information and interconnection. As a security protection measure for the entire data life cycle, the data leakage prevention system also faces many challenges. Among them, the use of encrypted network traffic communication on the host side of the information system to avoid the detection and discovery of the data leakage prevention system has become an effective ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0272H04L63/0281H04L63/0428H04L63/1425H04L63/1433H04L67/02
Inventor 李静华喻波王志海秦凯王玮
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products