Information security protection method based on data graph, information graph and knowledge graph

A knowledge graph, information security technology, applied in the intersection of distributed computing and software engineering, can solve problems such as user information security protection that cannot be fundamentally solved

Inactive Publication Date: 2018-11-20
HAINAN UNIVERSITY
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information security that cannot be found directly by current security protection methods can still be obtained by analyzing information (direct information and indirect information) and c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection method based on data graph, information graph and knowledge graph
  • Information security protection method based on data graph, information graph and knowledge graph
  • Information security protection method based on data graph, information graph and knowledge graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific process of an information security protection method based on data graph, information graph and knowledge graph is as follows:

[0049] Step 1) corresponds to figure 1 As shown in 001, according to the needs of users, a framework based on data graphs, information graphs, and knowledge graphs is established;

[0050] Step 2) correspond to figure 1 As shown in 002, according to formula 1, the security level L of information security resources Privacy Determine the sequence of requirement description analysis;

[0051] Step 3) correspond to figure 1 As shown in 003, combine formula 2 and algorithm 1 to analyze the feasibility of security requirement description;

[0052] Step 4) correspond to figure 1 As shown in 004, combine formula 3 and algorithm 2 to analyze the consistency of security requirement description;

[0053] Step 5) correspond to figure 1 As shown in 005, combined with Formula 4 and Algorithm 3, analyze the redundancy of the security requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an information security protection method based on a data graph, an information graph and a knowledge graph, and belongs to the crossing field of distributed computing and software engineering. According to the method, security resources are classified into data security, information security and knowledge security. The feasibility, consistency, redundancy and integrity ofuser security requirements are analyzed based on the data graph, the information graph and the knowledge graph; user security requirement descriptions are optimized; and corresponding data flow, information flow, knowledge flow and control flow are mapped to the knowledge graph. Then, in a three-layer framework composed of the data graph, the information graph and the knowledge graph, the information security resources are converted into other types of security resources in sequence and then are stored in a security space for protecting the explicit and implicit information security resources.

Description

technical field [0001] The invention is an information security protection method based on data graph, information graph and knowledge graph. It is mainly used for feasibility analysis, consistency analysis, redundancy analysis and integrity analysis of the user's security requirements, and extracts the corresponding data flow, information flow, knowledge flow and control flow mapping to data in each step of analysis graph, information graph and knowledge graph. According to the user's security needs, information security resources are classified into implicit and explicit situations according to their existence in the search space for protection. It belongs to the intersection field of distributed computing and software engineering. Background technique [0002] The collection and use of secure resources generates value, yet the protection of information security is not yet managed. Resource maintenance must ensure that resources are not subject to unauthorized use, ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F17/30
CPCG06F21/64
Inventor 段玉聪张欣悦周辉李京兵曹春杰
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products