Network security data sharing and control method and system

A data sharing and network security technology, applied in the field of network security, can solve problems such as the use of data and the approval process of the party responsible for the data, and the unification of data access rights without realizing data operation rights

Pending Publication Date: 2021-05-11
BEIJING VENUS INFORMATION SECURITY TECH +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unification of data operation authority and data access authority in the system is not realized
Finally, database audit products do not have a data approval process for the use of data and data responsible parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security data sharing and control method and system
  • Network security data sharing and control method and system
  • Network security data sharing and control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the following will clearly illustrate the spirit of the content disclosed in the application with the accompanying drawings and detailed descriptions. After any person skilled in the art understands the embodiments of the content of the application , when it can be changed and modified by the technology taught in the content of the application, it does not depart from the spirit and scope of the content of the application.

[0044] The exemplary embodiments and descriptions of the present application are used to explain the present application, but not to limit the present application. In addition, elements / members with the same or similar numbers used in the drawings and embodiments are used to represent the same or similar parts.

[0045] As used herein, "comprising", "comprising", "having", "comprising" and so on are all open terms, meaning includi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security data sharing and control method and system. The sharing and control method comprises: classifying data and compiling the data into a data directory; opening an account for a data access party, binding an IP, and allocating a data administrator role; obtaining work orders of data access and data operation authority of a data access party, examined and approved the work orders of the data access and the data operation authority of the data access party, giving operation authority of corresponding data to the approved work orders, and encrypting the access and operation authority to be written into an authorization table; introducing the SDK into a project of the data access party obtaining the operation authority; authenticating the IP of the data access party by the SDK; authenticating, by the SDK, the operation authority of the data access party of which the IP is stored in a preset authorization table; performing association analysis on the access and query behaviors of the database and the database performance indexes; and presetting a data access rule, and if a data access party triggers the access rule, fusing query and giving an alarm. According to the application, auditing, monitoring and alarming of the data sharing process can be ensured.

Description

technical field [0001] The present application belongs to the technical field of network security, and in particular relates to a method and system for sharing and controlling network security data. Background technique [0002] Network security data usually includes security event logs, threat intelligence data, vulnerability intelligence data, IT assets, and traffic. At present, there are relatively few products for data sharing and control in the field of network security, mainly products for database auditing. For example, Anhuajin and the database security audit system are database auditing products. Anhuajin and the database security audit system implement database security auditing and protection based on database protocol analysis and control technology. [0003] Existing database audit products have the following problems: First, database audit products are aimed at database operation and maintenance personnel and security managers, and they focus more on the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62H04L29/06
CPCG06F21/31G06F21/6218H04L63/10H04L63/101H04L63/0876G06F2221/2141
Inventor 冯玉超祁锦怀李发财韩三田
Owner BEIJING VENUS INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products