Data security intelligent reinforcement system and method

A data security and intelligent technology, applied in the field of data security, to achieve the effect of enriching audit query conditions

Pending Publication Date: 2021-06-25
北京国联易安信息技术有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of this, the present invention provides a data security intelligent reinforcement system and method, which perfectly solves the problem of database information security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security intelligent reinforcement system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] Such as figure 1 As shown, a data security intelligent reinforcement system includes a sensitive data discovery module, a database performance audit module, a database risk assessment module, a database audit module, a database firewall module and a data transparent encryption module.

[0040] The sensitive data discovery module is used for discovering servers by scanning IPs, automatically discovering database services by scanning port ranges, and discovering sensitive data according to specified sensitive data conditions, helping enterprises understand the distribution of database servers ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security intelligent reinforcement system. The system comprises a sensitive data discovery module, a database performance auditing module, a database risk assessment module, a database auditing module, a database firewall module and a data transparent encryption module. The invention has the beneficial effects that multi-level security protection is realized, and selectable database security protection functions including sensitive data discovery, performance monitoring, risk assessment, coarse-grained auditing, fine-grained auditing, firewall and sensitive content encryption are provided. The security protection capability of the modules is gradually enhanced, and the controllability of security evaluation, data activity visualization and data security management is gradually realized. The performance is high: the continuous SQL processing capability of the system can easily reach 100,000 per second, and the minimum storage capability of each TB hard disk can reach 3 billion, which is far higher than that of competitive products at home and abroad. The comprehensive auditing range is achieved: the auditing range of the system covers all possible data access ways, and whether the data access ways are internal or external, the data access ways are direct or indirect.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data security intelligent reinforcement system and method. Background technique [0002] In recent years, the Internet and mobile Internet have developed very rapidly, the Internet and people's lives are increasingly integrated, and society has gradually entered the era of intelligence and data. A large amount of data is stored and processed on various networks, including a large amount of valuable and sensitive data. Subsequently, new features appear in information system security incidents. One of the characteristics is that the main purpose of the attack is no longer to destroy and destroy the information system, but to obtain sensitive data as the main purpose instead. [0003] In order to obtain sensitive data, attackers have correspondingly produced many new attack methods, such as SQL injection attacks, APT (Advanced Persistent Attacks) and so on. This poses new...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/62G06F21/64G06F16/21
CPCG06F21/577G06F21/602G06F21/604G06F21/6218G06F21/64G06F2221/033G06F16/21
Inventor 门嘉平
Owner 北京国联易安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products