Unlock instant, AI-driven research and patent intelligence for your innovation.

A data security management system based on machine learning

A technology of data security and machine learning, applied in the field of data security management system based on machine learning, can solve problems such as easy to be cracked, potential safety hazards, simple passwords, etc., to increase the difficulty of cracking, improve data security, and enhance security Effect

Active Publication Date: 2021-09-21
GUODIAN DADU RIVER POWER ENG
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, everything has two sides. While it brings us fast and convenient life and work, it also brings us many safety hazards.
The data stored in the database may be stolen due to system flaws or malicious attacks, or the login password is too simple;
[0004] However, the current data security management system generally uses password verification for access users. Sometimes the password is too simple and easy to be cracked, resulting in the leakage of data stored in the database; Reasonably select the corresponding storage terminal for data storage and improve data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security management system based on machine learning
  • A data security management system based on machine learning
  • A data security management system based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Such as figure 2 As shown, the password setting module is used for the user to set the access password and send the access password to the server for storage; the password setting module communicates with the access module; the access module is used for the user to input the access password and access the historical database; the password setting module and the password verification The modules are connected; the password verification module is used to verify the complexity of the access password set by the user, and through the machine learning method, the password is checked for eligibility. If it is unqualified, it will return to the password setting module to prompt the user to reset or modify it; The specific verification steps are:

[0069] Step 1: collect the access password set by the user, the access password is several characters;

[0070] Number the several characters of the access password with Arabic numerals according to the input sequence, and mark the ...

Embodiment 2

[0083] Such as image 3 As shown, the system also includes a data monitoring module, a real-time database, and a data distribution module;

[0084] The data monitoring module is used to monitor the status of hydropower station equipment, and store the monitored data of equipment monitoring points into the real-time database through the server, and the server is used to periodically transfer the data in the real-time database to the historical database;

[0085] The real-time database is connected with the data reconstruction module. The data reconstruction module is used to collect the equipment monitoring point data in the real-time database and reconstruct the equipment monitoring point data to obtain the reconstruction file, and then periodically transfer the reconstruction file to In the historical database; the reconstructed file contains the confidentiality level information of the reconstructed file;

[0086] The historical database contains several storage terminals; ...

Embodiment 3

[0099] Such as Figure 4 As shown, the system also includes a virus monitoring module, a data analysis module and a threat assessment module;

[0100] The virus monitoring module is used for monitoring worms. The existing worm monitoring method is used to monitor the storage end for worms. When a virus is detected, the timing is started; when no virus is detected again, the timing is stopped; The time period is marked as the virus attack time period;

[0101] The virus monitoring module is used to transmit a virus signal to the data analysis module when a virus is detected; the data analysis module receives the virus signal transmitted by the virus monitoring module for data analysis, and the specific analysis steps are as follows:

[0102]SS1: When a virus signal is detected, record the storage terminal information infected by the virus at this time; the storage terminal information includes the storage terminal number and virus name;

[0103] SS2: Obtain all storage termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security management system based on machine learning, which relates to the technical field of data security, including a password setting module, a server, a password verification module, a historical database, a data monitoring module, a data reconstruction module, a real-time database and data distribution module; the password setting module is used for the user to set the access password; the password verification module is used for the complexity verification of the access password set by the user, which ensures the complexity of the access password and increases the difficulty of password cracking, thereby enhancing the security of the data The data reconstruction module is used to collect the equipment monitoring point data in the real-time database for reconstruction to obtain the reconstructed file, and periodically transfer the reconstructed file to the historical database; the data distribution module is used to obtain the access of the reconstructed file The data is analyzed and accessed, and then the reconstructed files are allocated to different levels of storage terminals for storage according to the size of the storage value, and the storage space is rationally used to effectively improve data security.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data security management system based on machine learning. Background technique [0002] At present, in order to ensure the safe, stable and efficient operation of hydropower stations, hydropower station equipment status monitoring is usually carried out, and the monitored data of equipment monitoring points are stored in the real-time database, and the data in the real-time database is periodically transferred to the historical database. Provide analysis data for fault warning and monitoring; [0003] With the rapid development of digital information technology, computers have played different important roles in people's life and work. People are increasingly inseparable from computers and digital information technology. However, everything has two sides. While it brings quickness and convenience to our life and work, it also brings us many safety hazards. The data sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06N20/00
CPCG06F21/602G06F21/6209G06N20/00
Inventor 许剑罗玮刘金全
Owner GUODIAN DADU RIVER POWER ENG