Unlock instant, AI-driven research and patent intelligence for your innovation.

Data exporting tool security analysis method and system and data exporting method

A technology of data export and analysis method, applied in the field of data processing, can solve the problem of lack of inspection and verification of export tools, and achieve the effect of strengthening safety detection and monitoring, low cost, and wide application and promotion value

Active Publication Date: 2021-05-11
湖北宸威玺链信息技术有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods are implemented through external restrictions or monitoring during operation, and lack strict inspection and verification of the export tool itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data exporting tool security analysis method and system and data exporting method
  • Data exporting tool security analysis method and system and data exporting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Please refer tofigure 1 , figure 1 It is a schematic flowchart of a security analysis method for a data export tool. Embodiment 1 of the present invention provides a security analysis method for a data export tool. The method includes:

[0051] Obtain the source code or object code of the data export tool;

[0052] Analyze the source code or object code of the data export tool to obtain the analysis results of the data export tool. The analysis results of the data export tool include: whether the grammatical structure of the data export tool is correct, whether there is an unexpected structure in the data export tool, whether the functional modules in the data export tool Whether there are isolated functional modules in the directed control flow graph between and data export tools;

[0053] Based on the requirements of this data export task and the analysis results of the data export tool, judge whether it is safe for the data export tool to perform this data export ta...

Embodiment approach

[0054] The method is described in detail below in conjunction with specific examples, but the method is not limited to the following implementation modes, and the method includes:

[0055] 1. For the export tool without source code, decompile it to obtain the target code;

[0056] 2. Perform static syntax analysis on the source code or object code of the export tool:

[0057] 2.1 Lexical analysis: use the grammatical analysis tool lex, according to the type of programming language used, such as Java, C / C++, C#, GO, Python, etc., based on the grammatical rules of each language, use regular expressions to convert all key grammars, the focus is Expressions related to input and output generate a symbol list; wherein, other grammatical analysis tools can also be used in this embodiment, and the present invention does not limit the type of grammatical analysis tools;

[0058] 2.2 Grammatical analysis: use the grammatical analysis tool yacc to further generate a syntax tree from the...

Embodiment 2

[0069] Embodiment 2 of the present invention provides a data export method, and the method includes:

[0070] Analyzing the security of the data export tool using the described data export tool security analysis method;

[0071] Use the security-analyzed data export tool to export data from the data source.

[0072] Wherein, the data exporting method in the present invention overcomes the defect that the traditional method does not consider the security of the data exporting tool itself by judging the security of the data exporting tool.

[0073] Wherein, in Embodiment 2 of the present invention, the method further includes:

[0074] Analyze the data source and obtain the data type of the data source, including: public data, proprietary data and private data;

[0075] For public data, suspicious or high-risk behavior of data export tools is allowed;

[0076] For proprietary data, if the data export tool has suspicious or high-risk behavior, it will be transferred to manual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data exporting tool security analysis method and system and a data exporting method, and relates to the field of data processing, and the method comprises the following steps: obtaining a source code or a target code of a data exporting tool; analyzing the source code or thetarget code of the data exporting tool to obtain a data exporting tool analysis result; the data exporting tool analysis result comprises whether the grammatical structure of the data exporting tool is correct or not, whether the data exporting tool has an unexpected structure or not, a directed control flow diagram between function modules in the data exporting tool and whether an isolated function module exists in the data exporting tool or not; based on the demand of the data exporting task and the analysis result of the data exporting tool, judging whether the data exporting tool is safe to execute the data exporting task or not; the method can ensure that the input and output function parts of the exporting tool do not contain suspicious codes and logics, and ensures that the data exporting task is secure and reliable.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a security analysis method and system of a data export tool and a data export method. Background technique [0002] Data export is a common function in data processing and information systems. There are many methods for data export security detection, including setting strict access control policies for the operating environment of the export tool, performing real-time dynamic monitoring and monitoring during the export process, etc. method to ensure the safe operation of the export process. However, these methods are implemented through external restrictions or monitoring during operation, and lack strict inspection and verification of the export tool itself. Contents of the invention [0003] Aiming at the lack of detection of data export tool in data export security detection in the prior art, the present invention provides a security analysis method and system of data export...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/606
Inventor 洪薇洪健李京昆刘文思
Owner 湖北宸威玺链信息技术有限公司