A security management method and system for centralized network data

A technology for security management and network data, which is applied in the field of security management methods and systems for centralized network data, can solve problems such as network resource security, and achieve the effects of protecting business data, avoiding excessive concentration, and reducing the probability of being attacked.

Active Publication Date: 2022-01-04
武汉思普崚技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a security management method and system for centralized network data, to solve the security problems of the existing over-concentrated network resources, and to introduce technical means of dynamic layering of resource security, so as to better protect the services of different users data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security management method and system for centralized network data
  • A security management method and system for centralized network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0039] figure 1 A general flow chart of the security management method for centralized network data provided by this application, the method includes:

[0040] Define designated network resources as physical security layer, network intermediate security layer, business security layer and master control node;

[0041] The physical security layer includes: periodically knowing the working status of the underlying physical device, activating the dormant physical device, dormant faulty physical device, and removing the dormant physical device from the physical security layer;

[0042] Wherein, before activating the dormant physical device, it includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a security management method and system for centralized network data, which defines designated network resources as physical security layer, network intermediate security layer, service security layer and main control node, and defines the protection system as physical security layer, network The four parts of the middle security layer, the business security layer and the main control node realize the one-to-one correspondence between the composition of the protection system and the specified network layer. Not only can the security layer be dynamically adjusted in real time according to the state of the physical device, but also the size of the attribute domain can be dynamically adjusted to avoid excessive concentration of physical devices and reduce the probability of being attacked. The technical means of attribute encryption is introduced to encrypt the transmitted data to better protect the business data of different users.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a security management method and system for centralized network data. Background technique [0002] Existing network resources usually exist concentratedly in a certain domain, for example, network resources corresponding to a certain attribute domain exist in a concentrated manner, while few network resources deviate from the certain domain. This will bring about a network security problem, and network resources that are too concentrated are more likely to be attacked by the network. At the same time, the traditional layering of network architecture is not divided from the perspective of network security, but more from the perspective of network transmission. As a result, whether it is resource concentration or architecture layering, network security urgently needs to be strengthened. [0003] Therefore, there is an urgent need for a targeted safety managemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/0428
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products