Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management system based on transparent encryption, computer equipment and terminal

A transparent encryption and data security technology, applied in the field of data security, can solve the problems of weak security performance and unsuitable for power grid data communication transmission, etc., to avoid the risk of leakage

Pending Publication Date: 2022-04-15
STATE GRID CORP OF CHINA +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the power industry, in order to monitor the operation of the power system in real time, it is necessary to obtain real-time power data. Communication mobile terminals can obtain power grid data by accessing the power grid database, but the problem is that power grid data is very important confidential information. However, the way in which communication mobile terminals used in the prior art to obtain power grid data is relatively weak in terms of security performance, and is not suitable for communication transmission of power grid data.
[0004] The way in which communication mobile terminals used in the prior art to obtain power grid data is weak in terms of security performance, and is not suitable for communication transmission of power grid data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management system based on transparent encryption, computer equipment and terminal
  • Data security management system based on transparent encryption, computer equipment and terminal
  • Data security management system based on transparent encryption, computer equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] Aiming at the problems existing in the prior art, the present invention provides a data security management system based on transparent encryption. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0049] Such as figure 1 As shown, the data security management system based on transparent encryption provided by the embodiment of the present invention includes a data collection module 1, a data classification storage module 2, a data encryption module 3, an identity authentication module 4, a USB storage device detection module 5, and a certificate issuance module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data security, and discloses a data security management system based on transparent encryption, a computer device and a terminal, and the system comprises a data collection module, a data classification storage module, a data encryption module, an identity authentication module, a USB storage device detection module, a certificate issuing module, a certificate verification module and a central processing and control module. Data encryption is carried out in a transparent encryption mode, after a user issues a transparent encryption strategy through a server platform, a client monitors read-write operation of an application program on a specified type of file in real time according to the strategy, real-time encryption of the file is achieved, transparent use in a controlled range is achieved, and the file cannot be used without a controlled environment; therefore, the risk of data leakage in the production process of the core data document of the user is effectively solved, and the method can be used for avoiding numerous risks of leakage in plaintext storage in the production process of the core data document of the user, such as copying by demission personnel, loss of mobile storage equipment, network transmission interception and the like.

Description

technical field [0001] The invention belongs to the technical field of data security, and in particular relates to a transparent encryption-based data security management system, computer equipment and a terminal. Background technique [0002] At present, communication technology is mature and widely used in various industries, including the traditional electric power industry. In the power industry, in order to monitor the operation of the power system in real time, it is necessary to obtain real-time power data. Communication mobile terminals can obtain power grid data by accessing the power grid database, but the problem is that power grid data is very important confidential information. However, the way in which the communication mobile terminal used in the prior art acquires grid data is relatively weak in terms of security performance, and is not suitable for communication transmission of grid data. Therefore, data security has become the top priority of today's infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/33G06F21/45G06F21/60G06F16/906G06F13/40
Inventor 詹伟金波查志勇余铮罗弦张科董亮徐焕龙霏邓国如郭峰
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products