Data confidential information protection system based on zero-trust network

An information protection and confidentiality technology, applied in the field of communications, can solve the problems of illegal client theft, high protection difficulty, malicious deletion of databases, etc., to prevent interception or forgery, ensure data security, and increase information security.

Active Publication Date: 2022-05-10
南京智人云信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, these locations are insecure and easy to be obtained by attackers, and information is usually circulated between systems in plain text. Any insecurity in any link may cause leakage, and the protection is difficult
On the other hand, ordinary development or operation and maintenance personnel can access it, which is prone to malicious deletion of databases and other phenomena.
Some solutions have realized this problem and started to store these sensitive information in confidential storage components, but this information also requires a very effective management system to manage which services/personnel can view which information
Moreover, when the service connects to this information, it usually needs to import the corresponding SDK for different confidential storage components for development, which will lead to the addi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data confidential information protection system based on zero-trust network
  • Data confidential information protection system based on zero-trust network
  • Data confidential information protection system based on zero-trust network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0091] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0092] see Figure 1-Figure 4 , in this example:

[0093] The construction scenario is information protection scenarios such as passwords when the service accesses the external mysql system. It mainly describes the case where the mysql access information is protected as confidential information.

[0094] MySQL is used as a data persistent storage facility for services, and its security determines the security of the entire service. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data confidential information protection system based on a zero-trust network, and belongs to the technical field of communication. The system comprises a control plane module, a confidential information storage module, a configuration center, a configuration agent, a sidecar main module and an external system, the control plane module is used for adding, deleting, modifying and checking confidential information, verifying authority information of operators, storing configuration information into a configuration center, and sending a configuration updating signal to the configuration center; the confidential information storage module is used for storing confidential information; receiving and storing the configuration updating signal by using the configuration center; calling an update signal and actual configuration from a configuration center by using a configuration agent, applying the configuration, and communicating with a sidecar main module; management and verification of confidential information are realized by using the sidecar main module; an external system is used for receiving micro-service calling, and a checking request is initiated for confidential information content.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a data confidential information protection system based on a zero-trust network. Background technique [0002] In a zero-trust network, some sensitive information of microservices, especially passwords, secret keys, and tokens used to authenticate external systems, are usually stored in configuration files or environment variables. On the one hand, these locations are insecure and easy to be obtained by attackers, and information is usually circulated between systems in plain text. Insecurity in any link may cause leakage, making protection difficult. On the other hand, ordinary development or operation and maintenance personnel can access it, so it is easy to maliciously delete the database and other phenomena. Some solutions have realized this problem and started to store these sensitive information in confidential storage components, but this information also requires ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L41/22H04L41/28H04L69/163G06F21/62G06F21/60G06F16/2455
CPCH04L63/0428H04L69/163H04L63/0884H04L41/22H04L41/28G06F21/602G06F16/24552G06F21/6245
Inventor 李彪张超徐建平
Owner 南京智人云信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products