Unlock instant, AI-driven research and patent intelligence for your innovation.

A device, method and system for distributed data security protection

A distributed data and data security technology, applied in the field of computer networks, can solve the problems of increased management complexity, increased implementation difficulty, complex operation and maintenance work, etc., achieving the effect of short implementation period, rapid implementation, and guaranteed data security

Active Publication Date: 2022-04-12
BEIJING LIANSHI NETWORKS TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Many information systems are often built in an enterprise, and each information system will generate corresponding sensitive data that needs to be protected. Deploying a set of data security protection solutions or products for each information system not only increases the difficulty of implementation, It will also cause huge financial and human costs to the enterprise, and increase the complexity of management, bringing a lot of complicated operation and maintenance work in the later stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device, method and system for distributed data security protection
  • A device, method and system for distributed data security protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be further described in detail below in conjunction with the drawings and embodiments. Apparently, the specific embodiments described here are some, not all, embodiments of the present invention, and are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0052] like figure 1 As shown, the device for distributed data security protection is a centralized management and distributed security protection device, which is suitable for scenarios with a large number of information systems and wide distribution. The device for distributed data security protection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a device, method and system for distributed data security protection, by distributing data security protection plug-ins in various information systems, and receiving security protection from the unified data security management platform According to the strategy received, the security protection plug-ins intercept the communication data in the information system, analyze and identify the element information, and determine an effective security protection strategy to implement security protection measures. The security protection measures include access control, security audit, Data encryption and decryption, etc. This method can increase refined security protection capabilities for information that has already been built and has insufficient security capabilities. It is suitable for scenarios where there are many internal information systems in organizations and it is necessary to increase security capabilities for information systems without transforming information systems.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a device, method and system for distributed data security protection. Background technique [0002] A large amount of high-value data circulates in enterprise information systems. These data are generally stored in databases or file storage systems. They are the core assets of enterprises and are also the targets of attackers. Once the data is leaked, it will bring immeasurable losses to the enterprise. In order to protect the interests of enterprises, we must pay attention to the protection of enterprise data security, and provide security protection for key, sensitive, and important data in enterprise data storage. [0003] Many information systems are often built in an enterprise, and each information system will generate corresponding sensitive data that needs to be protected. Deploying a set of data security protection solutions or products for each information sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 钱晶岳小杰白小勇
Owner BEIJING LIANSHI NETWORKS TECH CO LTD