Data compliance management and control method and system based on security capability scenarized arrangement

A technology of security capabilities and scenarios, which is applied in the field of data compliance control methods and systems based on scenario-based arrangement of security capabilities, can solve problems such as failure of protection strategies, unusable data, and inconsistent security strategies, and achieve consistency and flexibility The effect of management and deployment, and good protection performance

Pending Publication Date: 2022-02-25
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem in the prior art that the protection strategy fails due to the inconsistency of security policies, and even the data cannot be used, the present invention provides a data compliance management and control method based on scenario-based arrangement of security capabilities, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data compliance management and control method and system based on security capability scenarized arrangement
  • Data compliance management and control method and system based on security capability scenarized arrangement
  • Data compliance management and control method and system based on security capability scenarized arrangement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiment 1: The present invention provides a data compliance management and control method based on scenario-based orchestration of security capabilities, such as figure 1 shown, including:

[0067] Step 1: Based on the data security protection process to be executed, determine the data security software and hardware tools to be called from the pre-established workflow engine, and obtain the status information of the data software and hardware tools;

[0068] Step 2: Based on the status information of the workflow engine, the data security software and hardware tools, and the preset calling method, generate a call command to call the data security software and hardware tool;

[0069] Among them, the workflow engine is obtained by using computer language to describe the security policy involved in the data security protection process, the data security software and hardware tools required by the security policy, and the cooperative relationship between the data securit...

Embodiment 2

[0090] Based on the same inventive concept, the present invention also provides a data compliance management and control system based on scenario-based orchestration of security capabilities, including: a data security capability scheduling module;

[0091] The data security capability scheduling module is used to determine the data security software and hardware tools from the pre-established workflow engine according to the data security protection process to be executed, and obtain the status information fed back by the data security software and hardware tools, and generate a call instruction;

[0092] Wherein, the workflow engine is obtained by using computer language to describe the security policy involved in the data security protection process, the data security software and hardware tools required by the security policy, and the cooperative relationship between the data security software and hardware tools.

[0093] A data compliance management and control system bas...

Embodiment 3

[0129] Based on the same inventive concept, the present invention also provides a data compliance management and control method based on scenario-based arrangement of security capabilities, including: the scenario-based script description module uses computer language to describe the security policies corresponding to each scenario and the data security required by the security policies. Describe the software and hardware tools, the mutual cooperation relationship between each data security software and hardware tool, and the calling method, and obtain the workflow engine corresponding to each scene, and send it to the data security scheduling module;

[0130] The data security capability scheduling module generates call instructions according to the workflow engine sent by the scenario script description module and the status information fed back by the data security software and hardware tools, and sends them to the data security software and hardware tools;

[0131] Data sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data compliance management and control method and system based on security capability scenarized arrangement, and the method comprises the steps: determining a to-be-called data security software and hardware tool from a preset workflow engine based on a to-be-executed data security protection process, and obtaining the state information of the data software and hardware tool; and generating a calling instruction for calling the data security software and hardware tool based on a workflow engine, the state information of the data security software and hardware tool and a preset calling mode; wherein the workflow engine is obtained by adopting a computer language to describe a security policy involved in a data security protection process, data security software and hardware tools required by the security policy and a cooperative relationship among the data security software and hardware tools. According to the invention, the consistency of the security policy is realized, and the efficiency of the protection policy is better exerted.

Description

technical field [0001] The present invention relates to the field of scene-based arrangement, in particular to a data compliance management and control method and system based on scene-based arrangement of security capabilities. Background technique [0002] In the process of data security protection, different data security protection measures may be used at the same time, and only when the security policies are consistent can the due protection effectiveness be exerted. Otherwise, the protection strategy may fail, and even the data may not be usable. However, most of the current data security tools are independently provided by manufacturers, and data security protection measures are deployed in fragments. It is difficult to ensure consistent data security protection strategies, which limits the proper effectiveness of data security tools. Grid data application scenarios are complex and face different data security risks. Therefore, under the premise of unified management ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F16/23G06F9/48G06F16/906G06F21/62G06F21/16
CPCG06F21/60G06F16/2365G06F9/4881G06F16/906G06F21/6254G06F21/16
Inventor 于鹏飞石聪聪周小明王磊黄秀丽
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products