A network data protection method for privacy leakage and corresponding firewall

A privacy data and firewall technology, applied in the field of network security, can solve problems such as the difficulty of accurately judging the user's transmission intention

Active Publication Date: 2021-03-23
武汉思普崚技术有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a network data protection method and a corresponding firewall for privacy leakage, to solve the problem that the existing transmission mechanism is difficult to accurately judge the user's transmission intention, and to introduce a technical means of dynamic layering of resource security to better protect different User's business data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network data protection method for privacy leakage and corresponding firewall
  • A network data protection method for privacy leakage and corresponding firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0042] figure 1 A general flow chart of the network data protection method for privacy leakage provided by this application, the method includes:

[0043] Define designated network resources as data extraction layer, network transport layer, business analysis layer and master control node;

[0044] The data extraction layer includes: security classification of the underlying physical devices according to the business attributes carried, and is divided into common devices and privacy-related devices; ordinary devices are included in the general security layer, and privacy-related devices are included in the privacy security layer , the ordinary s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network data protection method for privacy leakage and a corresponding firewall. The method comprises the following steps: detecting identified privacy data, determining whether privacy-related equipment borne by the data supports the category of the privacy data or not, analyzing the transmission intention of a user, and if the related privacy-related equipment does not support the category of the transmitted privacy data, determining that the privacy is leaked; introducing the technical means of resource security dynamic layering, removing the privacy-related equipment with privacy leakage from the corresponding security layer. The security layers can be dynamically adjusted in real time according to the state of physical equipment. A technical means of dynamically adjusting the attribute domain is introduced, so that the attacked probability is reduced, and the service data of different users can be better protected.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network data protection method against privacy leakage and a corresponding firewall. Background technique [0002] Existing network data transmission mechanisms are prone to leakage of private data of users or services. A common privacy leak detection method is to detect whether there is transmission of private data. However, the transmission of private data does not necessarily mean privacy leakage, and the transmission not intended by the user will lead to privacy leakage. Therefore, whether a transmission mechanism or system can accurately judge the user's transmission intention becomes very important. [0003] At the same time, the traditional layering of the network architecture is not divided from the perspective of network security, but more from the perspective of network transmission, and the security of the network needs to be strengthened urgentl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0428H04L63/20H04L67/10H04L67/12
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products