A data security management system based on machine learning
A technology of data security and machine learning, applied in the field of data security management system based on machine learning, can solve problems such as easy to be cracked, potential safety hazards, simple passwords, etc., to increase the difficulty of cracking, improve data security, and enhance security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] Such as figure 2 As shown, the password setting module is used for the user to set the access password and send the access password to the server for storage; the password setting module communicates with the access module; the access module is used for the user to input the access password and access the historical database; the password setting module and the password verification The modules are connected; the password verification module is used to verify the complexity of the access password set by the user, and through the machine learning method, the password is checked for eligibility. If it is unqualified, it will return to the password setting module to prompt the user to reset or modify it; The specific verification steps are:
[0069] Step 1: collect the access password set by the user, the access password is several characters;
[0070] Number the several characters of the access password with Arabic numerals according to the input sequence, and mark the ...
Embodiment 2
[0083] Such as image 3 As shown, the system also includes a data monitoring module, a real-time database, and a data distribution module;
[0084] The data monitoring module is used to monitor the status of hydropower station equipment, and store the monitored data of equipment monitoring points into the real-time database through the server, and the server is used to periodically transfer the data in the real-time database to the historical database;
[0085] The real-time database is connected with the data reconstruction module. The data reconstruction module is used to collect the equipment monitoring point data in the real-time database and reconstruct the equipment monitoring point data to obtain the reconstruction file, and then periodically transfer the reconstruction file to In the historical database; the reconstructed file contains the confidentiality level information of the reconstructed file;
[0086] The historical database contains several storage terminals; ...
Embodiment 3
[0099] Such as Figure 4 As shown, the system also includes a virus monitoring module, a data analysis module and a threat assessment module;
[0100] The virus monitoring module is used for monitoring worms. The existing worm monitoring method is used to monitor the storage end for worms. When a virus is detected, the timing is started; when no virus is detected again, the timing is stopped; The time period is marked as the virus attack time period;
[0101] The virus monitoring module is used to transmit a virus signal to the data analysis module when a virus is detected; the data analysis module receives the virus signal transmitted by the virus monitoring module for data analysis, and the specific analysis steps are as follows:
[0102]SS1: When a virus signal is detected, record the storage terminal information infected by the virus at this time; the storage terminal information includes the storage terminal number and virus name;
[0103] SS2: Obtain all storage termin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


