Data acquisition method in grade protection

A technology for data collection and data protection, applied in the field of information security, can solve the problems of time-consuming, labor-intensive, manpower and material resources, and achieve the effect of optimizing the detection path, reducing the workload, and improving the efficiency of data collection

Pending Publication Date: 2020-06-02
SHANGHAI NEWDON TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of implementing graded protection technology, how to collect network security device information, network terminal data information, network application data information in the unit, how to evaluate the graded protection status, and how to carry out defect reminders and solution descriptions, etc. Time-consuming and labor-intensive, consumes huge manpower and material resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data acquisition method in grade protection
  • Data acquisition method in grade protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] ginseng figure 1 As shown, an embodiment of the present invention is shown here, which specifically includes the following steps:

[0026] Step 110, corresponding to the network application object, setting an active RFID as a detection tag capable of realizing the detection function.

[0027] The detection tag needs a wireless data transmission source capable of emitting detectable electromagnetic signals, and the specifics are not limited, but it should be as low-cost and portable as possible. In actual operation, RFID is an excellent alternative.

[0028] Passive RFID can be deployed in a cost-effective manner. However, the effective detection distance corresponding to passive RFID is very short. Therefore, a more preferable solution is to use active RFID, through which the detection path can be extended in a large range.

[0029] The network application objects mentioned above refer to all the terminal devices capable of connecting to the network used by the unit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data acquisition method in grade protection, and belongs to the technical field of information safety. The method comprises the following steps: setting a detection label capable of realizing a detection effect corresponding to a network application object; calculating an advancing path corresponding to the detection label; advancing to a network application object corresponding to the detection label according to the advancing path, and performing data acquisition; classifying the acquired data, and establishing a grade protection data acquisition information list; and comparing the obtained grade protection data acquisition information list with a grade protection data standard to generate a grade protection machine detection result. Through the detection tags arranged in the invention, the detection path can be optimized, and the data acquisition efficiency is improved; through a machine collection mode which compriseswhich comprises a robot, the workload ofpeople in grade protection can be greatly reduced, the working quality is improved, and errors are reduced.

Description

technical field [0001] The invention belongs to the technical field of information security. Background technique [0002] The application scenarios of network technology have been widely and deeply involved in various aspects, including industry, agriculture, national defense, and residents' life, entertainment, education, finance, medical care, and so on. Although network technology has brought great value, at the same time, network security issues have also brought great hidden dangers. [0003] For example, network viruses have emerged in an endless stream since their creation, seriously threatening various network applications. A wide variety of network attack methods, hidden Trojan horses, and new software and hardware that threaten network security are all hidden dangers to network security. This hidden danger has different effects at different levels. For example, small private units; tertiary hospitals; government agencies in prefecture-level cities; financial de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06F16/955G06K17/00
CPCG06K17/0029G06F16/9554G06F21/50
Inventor 杨腾霄于红岩乔梁
Owner SHANGHAI NEWDON TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products