Supercharge Your Innovation With Domain-Expert AI Agents!

Information system data security protection method and system and cloud platform

A data security and information system technology, applied in the field of system and cloud platform, and information system data security protection methods, can solve problems such as abnormal information protection, network attack analysis completeness and depth limitation, etc.

Active Publication Date: 2022-08-05
佛山市承林科技有限公司
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the actual application process, most technologies pay too much attention to individual types of network attacks, which may lead to limited integrity and depth of network attack analysis, resulting in abnormal information protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system data security protection method and system and cloud platform
  • Information system data security protection method and system and cloud platform
  • Information system data security protection method and system and cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. When the following description refers to the drawings, the same numerals in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with some aspects of the invention as recited in the appended claims.

[0041] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence.

[0042] The method embodiments provided by the embodiments of the present invention may be executed in a data security protection cloud pl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the information system data security protection method and system and the cloud platform provided by the invention, under the condition of performing comprehensive intrusion attack tendency identification on the data intrusion protection log, the identification processing of intrusion attacks except the active attack intention vector can be considered, so that different types of intrusion attacks can be considered at the same time, and the security of the data intrusion protection log is improved. And therefore, comprehensive and abundant intrusion attack tendency identification and analysis can be realized, and the integrity and the analysis depth of an intrusion attack analysis report can be guaranteed to a certain extent. In addition, the passive attack is usually easily neglected, so that omission of intrusion attack analysis can be avoided as far as possible by adopting the scheme, and subsequent information protection is further prevented from being abnormal.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data security protection method, system and cloud platform for an information system. Background technique [0002] With the extensive establishment of information systems and the interconnection and intercommunication of various networks, people realize that security issues can no longer be considered individually from security functions and individual networks, but must be comprehensively considered from the system and architecture. safe question. At present, in various business interactions, it is necessary to ensure that information is protected from accidental or malicious illegal leakage, transfer or destruction during storage, processing and transmission. However, in practical application, most technologies focus too much on individual types of network attacks, which may limit the completeness and depth of network attack analysis, resulting in abnormal information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425
Inventor 林锭瀚周晓钢匡东明
Owner 佛山市承林科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More