Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

192 results about "Big data security" patented technology

Big data security is the collective term for all the measures and tools used to guard both the data and analytics processes from attacks, theft, or other malicious activities that could harm or negatively affect them.

Big data security analysis system based on massive network monitoring data

The invention discloses a big data security analysis system based on massive network monitoring data. The system includes a data traffic monitoring module, a deep packet detection module, a data jointanalysis module, an anomaly detection module and a security evaluation module, wherein the data traffic monitoring module is used to monitor data traffic in real time, analyze applications, perform lossless collection on various system traffic data, and transmit the data to other modules; the deep packet detection module is used to judge the service types and application types by deeply reconstituting and analyzing the payload content of a seventh-layer packet and matching service characteristics, and performs analysis to obtain different application types; the data joint analysis module is used to perform data aggregation and study the state and association analysis to further remove redundant information in original data; the anomaly detection module is used to detect a data analysis result and judge whether the data is abnormal; and the security evaluation module is used to obtain a data evaluation result by combining the network situation based on the analysis and detection of other modules. According to the system, the real-time monitoring of network data and corresponding data security analysis can be implemented, and the data security and reliability can be improved.
Owner:国网吉林省电力有限公司信息通信公司 +1

Big data security threat processing method and system based on smart service

The invention relates to the technical field of smart services and big data security and protection, in particular to a big data security threat processing method and system based on smart services, which can determine information threat security evaluation by means of smart service activity data collected by a big data processing thread. Unnecessary resource overhead caused by adoption of an extra information threat detection mode is avoided, and the determination efficiency of information threat security evaluation is improved; the business activity popularity description reflects the global activity popularity of all potential threat type business items in the suspected intrusion threat scene, and compared with a global statistical result of the current activity popularity of all potential threat type business items in the suspected intrusion threat scene, the global activity popularity of all potential threat type business items in the suspected intrusion threat scene is obtained; the business activity popularity description can more accurately feed back an information threat condition in a suspected intrusion threat scene; on the premise of business activity popularity description, the accuracy and credibility of information threat security evaluation can be remarkably improved in combination with the business project emergency degree.
Owner:中软数智信息技术(武汉)有限公司

Encryption method based on big data cloud platform system

The invention provides an encryption and decryption method based on a big data security cloud platform system, and the method comprises the steps: accessing a secret key manager with a triple of a data owner identifier, an application identifier and a region code during encryption; receiving a triple key and a key group identifier for uniquely identifying the triple key; for documents with document identifiers, deriving an independent key of each document from a combination of the triple key and the document identifier; broadcasting the encrypted documents, the document identifiers and the keytriad identifier; encrypting the documents by using the independent key for each document. During decryption, an extraction engine extracts the document identifiers and the key triad identifier froman encryption header; the document identifiers and the key group identifier are provided to a KGF to generate an independent key for each document; the documents are decrypted using the independent key of each document to produce original documents. According to the encryption and decryption method for the security cloud platform system based on the big data, a data owner is allowed to establish avariable-granularity access strategy, identify risk behaviors and possible data leakage and accurately specify a data range needing to be protected, so that the security and efficiency of interactionwith cloud services are improved.
Owner:广州知弘科技有限公司

Big data security processing method and server for remote online office

The embodiment of the invention discloses a big data security processing method and server for remote online office, and the method comprises the steps: carrying out the log differentiation analysis and arrangement of remote office logs according to the description content of office participants and the description keywords of the participants, so the efficiency of subsequent log demand analysis can be improved; determining the keyword analysis content summarized data and log office event summarized data of the remote office logs of the description keywords of each participant, so a comparison result of office interaction demands of the to-be-detected office time period and a pre-stored previous office time period is obtained. Therefore, the comparison result of the office interaction demand can be analyzed based on the detection requirement of the preset demand evaluation, so that whether the office data loss threat exists in the to-be-detected office period or not is judged. In this way, the corresponding digital office terminal can be reminded to carry out information security and protection response operation, and therefore the situation that office data are lost when the digital office terminal carries out remote office in the to-be-detected office time period is avoided.
Owner:山东正奇科技咨询服务有限公司

Industrial big data security sharing method and system, electronic device and storage medium

InactiveCN113505398ATo achieve the effect of traceability and accountabilitySolve difficult problemsDigital data protectionCiphertextBusiness enterprise
The invention relates to an industrial big data security sharing method and system, an electronic device and a storage medium, and the method comprises the steps: obtaining industrial data, enabling an enterprise to calculate an industrial data Hash value through a Hash algorithm, encrypting the industrial data through a public key of a government agency, obtaining an industrial data ciphertext, performing private key signature on the industrial data ciphertext and the industrial data Hash value, calling a data uplink contract to generate an industrial information record, and storing the industrial information record in a block chain; then, by the government agency, obtaining the industry information record through the data obtaining contract, decrypting the industry information record through the public and private keys to obtain industry data in the industry information record, and verifying the authenticity and integrity of the industry data obtained through decryption through a Hash algorithm; and finally, by the government agency, performing data analysis on the decrypted industrial data through a big data analysis contract to obtain an industrial analysis result, and generating an industrial information use record and an uplink evidence through a data uplink contract. Accurate layout and planning of various enterprises by the government are facilitated.
Owner:杭州费尔斯通科技有限公司

Big data security system access operation platform and data retrieval method

The invention belongs to the technical field of big data, and particularly relates to a big data security system access operation platform and a data retrieval method. The big data security system access operation platform comprises an identity verification system, a security verification system, an authority management system and an access monitoring system, the identity verification system comprises an intelligent identification face fingerprint identification module, a digital password verification sealing instruction identification module and a digital certificate verification module connected with a verification code through a mobile terminal. The security verification module comprises a security auditing module, an intrusion detection module, a code detection module, a mail detection module, a virus warning module and a security evaluation module; the big data security system access operation platform is reasonable in structure, corresponding access authorities are established according to user levels and data levels, users of different levels can access data materials of different levels, checking of conventional data and protection of sensitive data are facilitated, and safety of the sensitive data is guaranteed under the condition that normal work is guaranteed.
Owner:蓝盾信息安全技术有限公司

Big data information safety-based strategy configuration method and artificial intelligence protection system

The embodiment of the invention provides a big data information safety-based strategy configuration method and an artificial intelligence protection system. The method comprises the following steps: obtaining a first threat defense capability feature of a target big data safety protection strategy, and information safety big data of the target big data safety protection strategy in a target safety updating stage; and generating a target policy configuration feature according to the first threat defense capability feature and the information safety big data, and performing threat defense capability feature updating on the target policy configuration feature based on a threat defense capability feature updating network to obtain a second threat defense capability feature corresponding to the target big data safety protection policy. Thus, in combination with the first threat defense capability feature and the information safety big data of the target big data safety protection strategy in the target safety updating stage, the initial threat defense capability feature and the feature of the information safety big data can be considered, and threat defense capability feature updating is carried out based on the feature. The reliability of safety protection is improved.
Owner:东莞市镁客教育科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products