Unlock instant, AI-driven research and patent intelligence for your innovation.

Monitoring method for data security operation and device thereof

A data security and block data technology, applied in the field of data information, can solve problems such as simplicity, blurred boundaries between system and data security responsibilities, single processing of security monitoring objects, etc., to achieve the effect of ensuring security and stability, and ensuring the security of user data services

Pending Publication Date: 2021-10-19
中国雄安集团数字城市科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Databases based on government affairs systems are usually separate, and different business systems establish databases for users to access. This traditional database service usually uses a single system as the core for security monitoring. In the self-built and self-maintained mode, information The boundaries of responsibility and authority for system and data security are relatively clear and clear, and the single processing method of security monitoring objects is simple
[0003] In the database service scenario of unified construction of block data platform, the government system data is centrally and unifiedly managed under the same block data platform or server, and data sharing and exchange are carried out based on block data. Provide access services, and the boundaries of responsibility and authority for system and data security become blurred

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method for data security operation and device thereof
  • Monitoring method for data security operation and device thereof
  • Monitoring method for data security operation and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0039] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps that are closely related to the solution according to the present invention are shown in the drawings, while those related to the present invention are omitted. Other details are not relevant to the invention.

[0040] It should be emphasized that the term "comprising / comprising" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other featur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a monitoring method for data security operation and a device thereof, and the method is suitable for constructing a plurality of databases which operate on the same server and are accessed through the same gateway; a first type of alarm configuration, a second type of alarm configuration and an abnormal operation alarm configuration are respectively set for an application program interface service, a gateway service and a user abnormal operation, and a risk behavior is alarmed by monitoring a user access request, a gateway working state and user login information. Under the data platform with the fuzzy data security responsibility boundary, timely alarm and response to data high-risk behaviors are realized, data service security, stability and controllability are guaranteed, and security events are timely responded and processed.

Description

technical field [0001] The present invention relates to the technical field of data information, in particular to a monitoring method and device for data security operation. Background technique [0002] Databases based on government affairs systems are usually separate, and different business systems establish databases for users to access. This traditional database service usually uses a single system as the core for security monitoring. In the self-built and self-maintained mode, information The boundaries of responsibility and authority for system and data security are relatively clear, and the single processing method of security monitoring objects is simple. [0003] In the database service scenario of unified construction of block data platform, the government system data is centrally and unifiedly managed under the same block data platform or server, and data sharing and exchange are carried out based on block data. The boundaries of responsibility and authority for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/26G06F21/60
CPCG06Q10/063114G06Q10/0635G06Q50/26G06F21/602
Inventor 王臻赵龙军崔丹丹罗雨帆郝治国李攀李洋
Owner 中国雄安集团数字城市科技有限公司