Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security management method and system based on metadata driving

A technology for data security and management methods, applied in the field of metadata-driven data security management methods and systems, and can solve problems such as intrusions

Pending Publication Date: 2022-04-08
XIAMEN ANSCEN NETWORK TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. Emerging data security is to monitor internal and external security issues, while traditional data security mainly protects external intrusion;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management method and system based on metadata driving
  • Data security management method and system based on metadata driving
  • Data security management method and system based on metadata driving

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0055] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0056] figure 1 Shown is an exemplary system architecture 100 that can be applied to a metadata-driven data security management method according to an embodiment of the present application.

[0057] Such as figure 1 As shown, the system architecture 100 may include termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security management method and system based on metadata driving. The system comprises metadata and a meta-model based on a public warehouse meta-model design standard. A detector and an adapter are used as independent applets to be connected with a main system used for managing metadata, then the detector is used for detecting and processing database services, and the adapter is used for obtaining and storing the metadata of various data sources; performing metadata automatic identification and association combination on the basis of the meta-model and the acquired metadata so as to construct a directory for extracting detail information step by step for the acquired metadata; performing automatic benchmarking by using name matching and content sampling matching in combination with an NLP algorithm so as to perform classification and asset inventory on data assets; an overall risk profile of the asset is evaluated based on the directory and dynamic changes in the metadata of the data asset. And the user can be well assisted to know data asset distribution and sort data use conditions.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a metadata-driven data security management method and system. Background technique [0002] Metadata is the data that describes data. Starting from metadata to manage and monitor data security, data risk assessment can be performed more accurately, thereby driving the compliance utilization of overall data assets. Most domestic enterprises and organizations have realized the importance of data security, are gradually building data security management systems, and also realize the necessity of metadata management. There are many references and actual cases about metadata in China. Most of the literature , Cases are all about metadata definition, classification, standards, etc., and a few are driven by CWM (Common Warehouse Metamodel). Therefore, many existing cases have somewhat inflexible architecture and metadata abuse. [0003] Traditional data security focuses on the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/25G06F21/60G06F16/2458
Inventor 林炳生许光锋黄惠海林山黄键牛军
Owner XIAMEN ANSCEN NETWORK TECH CO LTD