Dynamic security level real-time division method, terminal equipment and storage medium

A dynamic security and static security technology, applied in the field of big data processing, can solve the problems of difficult maintenance, subsequent changes, and inflexible classification methods.

Pending Publication Date: 2022-04-05
XIAMEN MEIYA PICO INFORMATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the grading classifications that have been implemented are static processes, which do not take into account the following issues: the sensitivity of data resources may change with the deduction of status and time in the life cycle. The traditional authorization model also follows the access The mode of authorization can be granted only if the authority of the user is higher than the data sensitivity level, which cannot meet the requirements of cross-system, cross-domain, and cross-business security prevention and control
[0004] At present, there are no strict regulations in the process of defining and using data, and there is a lack of practical and feasible unified standards, such as "Guidelines for Classification and Grading of Industrial Data (Trial)" and "Guidelines for Data Security Grading of Financial Data Security". From the perspective of enterprises, the implementation of hierarchical and classified projects based on the principle of meeting their own business needs has the characteristics of strong subjectivity, difficult maintenance, and inflexible classification methods, and hierarchical and classified management is crucial for role-based authorization control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic security level real-time division method, terminal equipment and storage medium
  • Dynamic security level real-time division method, terminal equipment and storage medium
  • Dynamic security level real-time division method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The embodiment of the present invention provides a method for dividing dynamic security levels in real time, such as figure 1 As shown, the method includes the following steps:

[0032] S1: Set the classification dimension of the data resource and the categories contained in each classification dimension. According to the category of each data resource in different classification dimensions, set the corresponding static security level of the data resource. The static security level of the data resource corresponding to the category, and build a static security level mapping table.

[0033] Data resources in each field have their own unique classification dimensions related to business nature. The determination of classification dimensions can comprehensively analyze the business nature of data resources, and find a suitable classification strategy on the premise of covering all data resources as much as possible. Establish the granularity of each classification dimensi...

Embodiment 2

[0065] The present invention also provides a terminal device with dynamic security level division in real time, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, the Steps in the above method embodiment of Embodiment 1 of the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dynamic security level real-time division method, terminal equipment and a storage medium, and the method comprises the steps: S1, setting classification dimensions of data resources and categories contained in each classification dimension, setting a static security level according to the categories of each data resource in different classification dimensions, and according to the static security level, dividing the data resource into a plurality of data resources; constructing a static security level mapping table; s2, initializing and setting a desensitization lower bound L, a desensitization period T, a desensitization rate k (.) and a desensitization mode M; s3, after the data resource is received, searching a corresponding static security level x from the static security level mapping table; s4, judging whether the data resource is in an open state or not, and if so, setting the dynamic security level y of the data resource as a desensitization lower bound L; otherwise, entering S5; and S5, calculating a real-time dynamic security level according to the desensitization period of the data resource obtained in real time. According to the method, data opening control and data desensitization control are introduced, and real-time controllability of the security level of the data resource is realized.

Description

technical field [0001] The invention relates to the field of big data processing, in particular to a method for dividing dynamic security levels in real time, a terminal device and a storage medium. Background technique [0002] In the era of big data, data fusion, circulation, and sharing are inevitable trends. In the process, data with different levels of sensitivity will inevitably coexist. Unordered operations on data may lead to privacy leaks and other major security risks. How to implement corresponding security protection measures for data resources of different sensitivity levels and improve the security of data during access is the key content of current data governance. [0003] Different roles have different requirements for data management and use. When data is circulated and shared, the data that users need should be provided instead of data beyond the scope of authority. Data classification and management is the basis for authorization when data is open. Most ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06F21/62
Inventor 蔡晓强吴文黄荣昌魏超刘襄雄林至贤
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products