Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internetwork data security sharing and management method and system

A data security and management system technology, applied in the field of data security sharing and management between networks, can solve the problems of not introducing the perspective of data life cycle, scattered data cross-domain sharing process, and non-safe use environment, so as to achieve small security risks, The effect of low management cost and low misjudgment rate

Active Publication Date: 2018-06-15
北京明朝万达科技股份有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] In view of the above problems, a method and system for data security sharing and management between networks is proposed to solve the problem of manual processing of data cross-domain sharing, decentralized data cross-domain sharing process, not introducing the perspective of data life cycle, and non-standard cross-domain data sharing. Defects in safe use environment, weak audit mechanism, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internetwork data security sharing and management method and system
  • Internetwork data security sharing and management method and system
  • Internetwork data security sharing and management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] refer to Figure 4 , showing a schematic diagram of a method for data security sharing and management between networks, the method is applied to a data security sharing and management system between networks, wherein the core system belonging to the data management party can be deployed on the network where the data management party is located The core domain in the security domain. Other systems belonging to the data demander can be deployed in other domains in the network security domain where the data demander is located. Other domains are usually non-core domains in the network security domain where the data demander is located. For example, the data demander The office domain in the network security domain, etc., the data security sharing and management system between the networks can be deployed in the DMZ area between the core domain and other domains (demilitarized zone, also called demilitarized zone, different network security The buffer zone between domains. ...

Embodiment 2

[0150] refer to Figure 5 , shows a schematic diagram of a data security sharing and management method between financial institutions networks, the method is applied to the data security sharing and management system between financial institutions networks, wherein the production system belonging to a bank can be deployed in the bank The production domain in the network security domain where the bank is located. The production system can store head office data and branch data, etc. The office system belonging to the banking business department can be deployed in the office domain in the network security domain where the bank is located. The data security sharing and management system can be deployed in the DMZ area between the production domain and the office domain. The method specifically may include the following steps:

[0151] Step 501: In the management portal module, initialize system operating parameters and environment, and perform cross-domain approval rules, cross-do...

Embodiment 3

[0203] refer to Image 6 , shows a block diagram of an inter-network data security sharing and management system 600, the system includes a security process module 601, a security cross-domain sharing module 602, a security data storage module 603, a security data processing module 604 and a management portal module 605 ;

[0204] The security process module 601 is used for:

[0205] For cross-domain application, the data demander fills in the cross-domain sharing application form for the target data in the core domain according to its own business needs, and initiates a cross-domain sharing application request;

[0206] Cross-domain approval, the data management party approves the cross-domain sharing application work order submitted by the data requester according to specific cross-domain approval rules;

[0207] Cross-domain audit, record cross-domain application process information, cross-domain approval process information, and audit data across domains according to spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an internetwork data security sharing and management method and system, and belongs to the technical field of data security. According to the embodiment of theinvention, by means of a dedicated system, data cross-domain sharing is realized; the efficiency is high; the misjudgment rate is low; the management cost is low; effective control on large-scale andbatch data cross-domain sharing can be carried out; online unified implementation can be realized through an integrated dedicated system; the process is full-automatic; internal docking is carried out between different processes; the security risk in a docking process is low; starting from data security, the data life cycle perspective is introduced; targeted systematic effective protection can be formed for data generation, data transmission, data storage, data using and data destruction processes of specific data; after obtaining the specific data, a data demander uses the specific data only in a security environment, so that the specific data is effectively controlled; an audit mechanism for a data cross-domain sharing process is complete; and thus, the problem in the data cross-domainsharing process can be found effectively.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an inter-network data security sharing and management method and system. Background technique [0002] With the increasingly serious network security situation, information security is facing challenges. The state has strengthened cybersecurity governance, promulgated laws and regulations such as the Cybersecurity Law and the Amendment to the Criminal Law, and clarified that data security protection is a mandatory requirement bound by law. The regulatory authorities continue to strengthen safety supervision, eliminate safety problems with a zero-tolerance attitude, and require that the bottom line of safety be firmly guarded. [0003] The release of policies and norms on information system security level protection, hierarchical protection, and the introduction of Sarbanes-Oxley internal control audit requirements show that the importance of information security protection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06Q40/02
CPCG06Q40/02H04L63/0227H04L63/0428H04L63/0869H04L63/145H04L67/1095H04L67/1097
Inventor 魏力王志海喻波宋博韬安鹏
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products