Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security leakproof self-save system and method, readable memory medium and device

A data security and anti-leakage technology, which is applied in the field of data security anti-leakage self-rescue system, can solve the problems of being unable to prevent security attacks using new software vulnerabilities and preventing data leakage, etc., and achieve the effect of facilitating centralized maintenance and preventing theft or attack

Inactive Publication Date: 2018-07-10
SHANGHAI INFORMATION NETWORK
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a data security anti-leakage self-rescue system, method, readable storage medium and equipment, which are used to solve the problem that the prior art cannot prevent security attacks using new software vulnerabilities, and the inability to prevent data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security leakproof self-save system and method, readable memory medium and device
  • Data security leakproof self-save system and method, readable memory medium and device
  • Data security leakproof self-save system and method, readable memory medium and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a data security anti-leakage self-rescue system, which is communicatively connected to at least one network device and at least one client, and at least one server is connected to the network device; the data security anti-leakage self-rescue system includes:

[0047] A traffic collection module, connected to the network device, for copying the server traffic passing through the network device, and forwarding the server traffic;

[0048] A traffic analysis and monitoring module, configured to receive the server traffic, extract network key feature content from the server traffic, and search for network attack features from the key feature content to determine whether a network attack occurs;

[0049] A control module, configured to form attack information when the traffic analysis, monitoring and monitoring module finds that there is a network attack on the server, and send the attack information and the processing selection corresponding to the ...

Embodiment 2

[0071] This embodiment provides a self-rescue method for data security leakage prevention, which is applied to a communication network including at least one network device connected to at least one server; the data security leakage prevention self-rescue method includes:

[0072] Step 1, copying the server traffic passing through the network device, and forwarding the server traffic;

[0073] Step 2, receiving the server traffic, extracting network key feature content from the server traffic, and searching for network attack features from the key feature content to determine whether a network attack occurs;

[0074] Step 3: When it is found that there is a network attack on the server, form attack information, send the attack information and the processing selection corresponding to the attack information to a client, and select the processing according to the feedback from the client Execute the corresponding action.

[0075]The data security leakage prevention self-rescue ...

Embodiment 3

[0092] This embodiment provides a device, which includes: a processor, a memory, a transceiver, a communication interface, and a system bus; the memory and the communication interface are connected to the processor and the transceiver through the system bus and complete mutual communication, and the memory is used for The computer program is stored, the communication interface is used to communicate with other devices, the processor and the transceiver are used to run the computer program, so that the device performs the steps of the above data security leakage prevention and self-rescue method.

[0093] The system bus mentioned above may be a Peripheral Component Interconnect (PCI for short) bus or an Extended Industry Standard Architecture (EISA for short) bus or the like. The system bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security leakproof self-save system and method, a readable memory medium and a device. The data security leakproof self-save system comprises a traffic collection modulewhich is used for copying server traffic passing a network device and forwarding the server traffic; a traffic analysis and monitoring module which is used for receiving the server traffic, extractingnetwork key feature content from the server traffic, searching network attack features from the key feature content and judging whether a network attack occurs or not; and a control module which is used for forming attack information when the traffic analysis and monitoring module discovers that the network attack exists on a server, sending the attack information and processing model selection corresponding to the attack information to a client, and performing a corresponding operation action according to the processing model selection fed back by the client. According to the system, the method, the readable memory medium and the device, the network traffic is analyzed and monitored, and when a network is attacked and data may be leaked, network device ports are closed, so the steal or attack of a network hacker is effectively prevented, and the centralized maintenance is facilitated.

Description

technical field [0001] The invention belongs to the technical field of Internet data security, and relates to a self-rescue system and method, in particular to a data security leakage prevention self-rescue system, method, readable storage medium and equipment. Background technique [0002] In the Internet production environment, server systems and application software are faced with network malicious scanning, vulnerability discovery, followed by network attacks, and the release of software security patches usually lags behind the discovery of vulnerabilities. When a security attack occurs, it is usually accompanied by data leakage caused by obtaining system permissions through vulnerabilities, resulting in the leakage of business secrets, and also increases the difficulty of troubleshooting for the IT department and the workload of application operation and maintenance. [0003] In view of the above problems, the existing solution is mainly to deploy a firewall in the netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1408H04L63/1416H04L63/1441
Inventor 程德怿陈兵乔健张靖韬刘春
Owner SHANGHAI INFORMATION NETWORK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products