Digital information risk monitoring method and device

A monitoring device and risk technology, which is applied in the field of big data, can solve problems such as insufficient processing of sensitive data, untimely risk monitoring, and low efficiency of message data, and achieve the effects of convenient risk management, high degree of automation, and simple use

Inactive Publication Date: 2021-10-22
杭州振牛信息科技有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A digital information risk monitoring method provided by the present invention aims to solve the problem that in the prior art, the processing of sensitive data in enterprise digital information is not thorough enough, the repeated processing of message data leads to inefficiency, and the data is put into storage after the risk The monitoring is not timely, and the alarm cannot be issued in time to form a closed-loop risk management problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital information risk monitoring method and device
  • Digital information risk monitoring method and device
  • Digital information risk monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Such as figure 1 As shown, a digital information risk monitoring method includes the following steps:

[0059] S110. Acquire the first message data, and send the first message data to the message queue after screening, the screening process includes removing static data and illegal abnormal data in the first message data;

[0060] S120. Acquire the filtered first message data from the message queue and perform deduplication and combination processing to obtain second message data;

[0061] S130. Using a multi-pattern matching algorithm to identify sensitive data in the second message data, and add a corresponding sensitive label;

[0062] S140. Put the second message data after the identification process into storage, and perform risk monitoring.

[0063] In Example 1, digital information mainly refers to information asset data of an enterprise, while sensitive data refers to data that may cause serious harm to society or individuals if leaked. Including personal pri...

Embodiment 2

[0065] Such as figure 2 As shown, a digital information risk monitoring method includes:

[0066] S210. Collect raw traffic data by configuring scripts and application interfaces, where the scripts are used to control collection frequency and limit collected data content;

[0067] S220. Decode the original traffic data according to the network packet format to obtain the first packet data;

[0068] S230. After filtering and formatting the first message data according to preset filtering rules, push it to the message queue through the script;

[0069] S240. Acquire the screened first message data from the message queue and perform deduplication and merging processing to obtain second message data;

[0070] S250. Use a multi-pattern matching algorithm to identify sensitive data in the second message data, and add a corresponding sensitive label;

[0071] S260. Put the second message data after the identification process into storage, and perform risk monitoring.

[0072] It...

Embodiment 3

[0074] Such as image 3 As shown, a digital information risk monitoring method includes:

[0075] S310. Acquire the first message data, and send the first message data to the message queue after screening, the screening process includes removing static data and illegal abnormal data in the first message data;

[0076] S320. Obtain the screened first message data from the message queue, extract key parameters therefrom, use an information digest algorithm to concatenate and encrypt the key parameters sequentially to generate a unique hash value; according to the hash The value is deduplicated and merged;

[0077] S330. Match the text content of the second message data according to a preset keyword and a preset regular expression, and add a sensitive label to the matching text content if the match matches; the preset keyword Represents personal privacy identity data, and the preset regular expression representation is used to retrieve and replace text that matches a certain pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital information risk monitoring method, which comprises the following steps: acquiring first message data, screening the first message data, and sending the first message data to a message queue; obtaining the screened first message data from the message queue, and performing de-overlapping and merging processing to obtain second message data; identifying sensitive data in the second message data by using a multi-mode matching algorithm, and adding a corresponding sensitive tag; and putting the second message data subjected to identification processing into a library, and carrying out risk monitoring. The whole process is high in automation degree, and a series of functions such as collection, cleaning, recognition, display and alarm are achieved; all the modules complete full-life-cycle management of sensitive data discovery, alarm, processing, verification and the like through cooperative work and logic judgment; the device is easy to use, high in expandability and suitable for application interface sensitive data identification and database sensitive data identification, and enterprise information risk management is greatly facilitated.

Description

technical field [0001] The invention relates to the field of big data, in particular to a digital information risk monitoring method and device. Background technique [0002] In recent years, with the vigorous development of the digital economy, enterprises have brought rapid development and new opportunities while promoting the development of productivity and the transformation of production relations. However, at the same time, enterprises have encountered some information and digital security risks in the process of digital transformation and upgrading, such as Corporate data breaches. With the gradual improvement of people's awareness of their own privacy and data security protection, data security has attracted more and more attention from the state and all walks of life. Once a data leak occurs, an enterprise will face risks: [0003] Risk of customer asset loss: If user data is leaked, their information will be used by lawbreakers to defraud or steal (financial data)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06G06F16/903G06F16/901
CPCG06F21/577H04L63/1425G06F16/90344G06F16/9014G06F2221/034
Inventor 刘博
Owner 杭州振牛信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products