



技术领域technical field
本发明涉及计算机技术领域,具体为一种计算机存储系统的数据安全访问系统及方法。The invention relates to the technical field of computers, in particular to a data security access system and method of a computer storage system.
背景技术Background technique
随着计算机技术的快速发展,计算机为人们的生产生活带来的巨大的便利,但同时人们在使用计算机的同时也面临一定的危险,在人们浏览网站时,网页上面的病毒也会对浏览网站的计算机进行攻击或者潜伏在计算机中,进而使得人们的计算机存在较大的风险,当人们访问重要数据时,会对访问的数据安全造成一定的威胁。With the rapid development of computer technology, computers have brought great convenience to people's production and life, but at the same time, people also face certain dangers while using computers. When people access important data, it will pose a certain threat to the security of the accessed data.
当前的数据安全访问系统,仅仅是从浏览的网站的关键词信息进行分析,通过识别浏览的网站类别对计算机的安全级别进行判定,进而确保计算机中的数据安全,但是这种方式存在较大的缺陷,计算机中的存储数据面临的是两方面安全隐患,一方面是人们对计算机的误操作,会因为人们误删数据导致数据缺失,另一方面是浏览器的浏览网站,但是一般的病毒会潜藏在网站内的广告条中,通过点击广告条对应的链接将病毒植入计算机中,同时这部分广告条不一定都是具备病毒的,且藏有安全隐患(病毒)的广告条还受广告条对应的宣传内容的影响。The current data security access system only analyzes the keyword information of the website being browsed, and determines the security level of the computer by identifying the type of website being browsed, thereby ensuring the data security in the computer. Defects, the data stored in the computer is faced with two security risks. On the one hand, people misuse the computer, which will cause data loss because people delete data by mistake. On the other hand, the browser browses the website, but the general virus will The advertisements are hidden in the website, and the virus is implanted into the computer by clicking the link corresponding to the advertisement. At the same time, these advertisements are not necessarily virus-containing, and the advertisements with hidden security risks (viruses) are also subject to advertisements. The influence of the corresponding publicity content.
针对上述情况,我们需要一种算机存储系统的数据安全访问系统及方法。In view of the above situation, we need a data security access system and method for computer storage system.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种计算机存储系统的数据安全访问系统及方法,以解决上述背景技术中提出的问题。The purpose of the present invention is to provide a data security access system and method of a computer storage system to solve the problems raised in the above background art.
为了解决上述技术问题,本发明提供如下技术方案:一种计算机存储系统的数据安全访问系统,包括:In order to solve the above-mentioned technical problems, the present invention provides the following technical solutions: a data security access system of a computer storage system, comprising:
操作信息采集模块,所述操作信息采集模块获取用户在计算机上单位时间内的操作信息;an operation information acquisition module, the operation information acquisition module acquires the operation information of the user per unit time on the computer;
数据安全处理模块,所述数据安全处理模块用于将操作信息采集模块获取的用户操作信息进行分类处理,获取处理后的各个类别对应的用户操作信息进行保存;a data security processing module, the data security processing module is configured to classify and process the user operation information obtained by the operation information collection module, and obtain and store the user operation information corresponding to each category after processing;
数据安全判定模块,所述数据安全判定模块对数据安全处理模块保存的结果进行分析,判断用户操作信息中各类别的操作信息分别对应的安全风险系数;a data security determination module, wherein the data security determination module analyzes the results saved by the data security processing module, and determines the respective security risk coefficients corresponding to each type of operation information in the user operation information;
访问权限判定模块,所述访问权限判定模块根据每个用户的操作信息分别对应的安全风险系数,对用户对应的访问权限进行判定,并根据用户对应的访问权限,判断是否允许用户访问存储系统。An access authority judgment module, which judges the access authority corresponding to the user according to the security risk coefficient corresponding to the operation information of each user, and judges whether to allow the user to access the storage system according to the access authority corresponding to the user.
本发明通过各个模块的协同合作,通过分析用户在计算机上单位时间内的操作信息对应的安全风险系数,进而确定用户的访问权限,进而判断是否允许用户访问存储系统,确保存储系统中数据的安全性。Through the cooperation and cooperation of various modules, the present invention determines the user's access authority by analyzing the security risk coefficient corresponding to the user's operation information per unit time on the computer, and then determines whether the user is allowed to access the storage system, so as to ensure the safety of the data in the storage system. sex.
进一步的,所述操作信息采集模块获取的用户在计算机上单位时间内的操作信息包括:本地操作信息及浏览器操作信息,Further, the operation information of the user in the unit time on the computer obtained by the operation information collection module includes: local operation information and browser operation information,
所述本地操作信息指用户对计算机本地内容的操作信息,包括访问的文件夹及所在位置,对文件的增加、删除、修改及查找;The local operation information refers to the operation information of the user on the local content of the computer, including the accessed folder and location, and the addition, deletion, modification and search of files;
所述浏览器操作信息指用户在计算机中浏览器上执行的操作信息,包括打开的网址信息对应的网站名称、浏览内容信息。The browser operation information refers to the operation information performed by the user on the browser in the computer, including the website name and browsing content information corresponding to the opened website information.
本发明从本地操作信息及浏览操作信息这两个方面对用户的操作信息进行分析,是因为这两者涉及的安全隐患方向不同,本地操作信息对应的用户自身的因素,所有的安全隐患均是用户自身的误操作导致的(分析该方面内容是为了判断用户是否具有误删文件的习惯及该习惯的严重程度),浏览器操作信息对应的是外部因素,安全隐患取决于用户浏览的网站中存在风险的几率。The present invention analyzes the user's operation information from the two aspects of the local operation information and the browsing operation information, because the security risks involved in the two are different, the local operation information corresponds to the user's own factors, and all the security risks are Caused by the user's own misoperation (the content of this aspect is analyzed to determine whether the user has the habit of deleting files by mistake and the severity of the habit), the browser operation information corresponds to external factors, and the security risks depend on the website that the user browses. the probability of risk.
进一步的,所述数据安全处理模块对获取的用户操作信息进行分类处理时,将用户在计算机中单位时间内的本地操作信息的处理结果记为该用户的第一操作信息集合,将用户在计算机中单位时间内的浏览器操作信息的处理结果记为该用户的第二操作信息集合。Further, when the data security processing module classifies the acquired user operation information, the processing result of the user's local operation information per unit time in the computer is recorded as the user's first operation information set, and the user is stored in the computer. The processing result of the browser operation information in the unit time is recorded as the second operation information set of the user.
本发明设置第一操作信息集合与第二操作信息集合是为了便于后续分别对本地操作信息及浏览器操作信息对应的处理结果进行分析,能够将两者的处理结果股有效的区分开,进而避免两者对应的分析结果在保存是产生混淆,进而对后续的数据分析产生影响,使得分析结果产生偏差。The present invention sets the first operation information set and the second operation information set to facilitate the subsequent analysis of the processing results corresponding to the local operation information and the browser operation information respectively, and can effectively distinguish the processing results of the two, thereby avoiding The corresponding analysis results of the two are confused when saved, which in turn affects the subsequent data analysis and causes deviations in the analysis results.
进一步的,数据安全处理模块获取用户的第一操作信息集合的方法包括以下步骤:Further, the method for the data security processing module to obtain the user's first operation information set includes the following steps:
S1.1、获取用户在单位时间内的本地操作信息对应的所有操作信息内容;S1.1. Obtain all operation information content corresponding to the user's local operation information within a unit time;
S1.2、将本地操作信息中用户删除的文件、在回收站查找或者还原的文件分别进行标记,其中用户删除的文件进行第一标记,用户在回收站查找的文件进行第二标记,用户还原内的文件进行第三标记;S1.2. Mark the files deleted by the user in the local operation information and the files searched or restored in the recycle bin, wherein the files deleted by the user are marked first, the files searched by the user in the recycle bin are marked second, and the users restore the document within the third mark;
S1.3、判断每个第三标记的用户还原文件之后的本地操作信息中是否含有针对该文件的修改操作,S1.3. Determine whether the local operation information after each third marked user restores the file contains a modification operation for the file,
当用户还原文件之后的本地操作信息中含有针对该文件的修改操作,则将该修改操作与该用户还原文件进行绑定,并获取该修改操作对应的修改内容及该修改操作距离该用户还原文件时的时长,When the local operation information after the user restores a file contains a modification operation for the file, the modification operation is bound to the user's restored file, and the modification content corresponding to the modification operation and the distance between the modification operation and the user's restored file are obtained. time period,
当用户还原文件之后的本地操作信息中不含有针对该文件的修改操作,则不对该用户还原文件进行处理;When the local operation information after the user restores the file does not contain the modification operation for the file, the file restored by the user will not be processed;
S1.4、按照本地操作信息的时间先后顺序,逐个将各个第一标记、第二标记及第三标记对应的操作信息录入到一个空白集合中,构成第一操作信息集合;S1.4, according to the chronological order of the local operation information, enter the operation information corresponding to each first mark, second mark and third mark one by one into a blank set to form a first operation information set;
数据安全处理模块获取用户的第二操作信息集合的方法包括以下步骤:The method for obtaining the second operation information set of the user by the data security processing module includes the following steps:
S2.1、获取用户在计算机中单位时间内的浏览器操作信息;S2.1. Obtain the user's browser operation information per unit time in the computer;
S2.2、将每个浏览器操作信息对应的网站名称与对比数据库进行比较,S2.2, compare the website name corresponding to each browser operation information with the comparison database,
若浏览器操作信息对应的网站名称包含于对比数据库中,则判定该浏览器操作信息对应的网站名称为授权网站,If the website name corresponding to the browser operation information is included in the comparison database, it is determined that the website name corresponding to the browser operation information is an authorized website,
若浏览器操作信息对应的网站名称不包含于对比数据库中,则判定该浏览器操作信息对应的网站名称为非授权网站;If the website name corresponding to the browser operation information is not included in the comparison database, it is determined that the website name corresponding to the browser operation information is an unauthorized website;
S2.3、分别提取每个非授权网站的网站内容中对应的广告条,并将提取的广告条分别与对应的非授权网站进行绑定;S2.3. Respectively extract the corresponding advertisement banners in the website content of each unauthorized website, and bind the extracted advertisement banners to the corresponding unauthorized websites respectively;
S2.4、按浏览器操作信息的时间先后顺序,逐个将各个非授权网站名称对应的操作信息添加到一个空白集合中,构成第二操作信息集合。S2.4. According to the chronological sequence of the browser operation information, add the operation information corresponding to each unauthorized website name to a blank set one by one to form a second operation information set.
本发明获取第一操作信息集合时,将本地操作信息中用户删除的文件、在回收站查找或者还原的文件分别进行标记,是因为便于对三者进行区分,这三者中任意一种均会存在一定的风险性,均会造成数据的丢失,删除文件是造成文件丢失的起因,查找文件是造成文件丢失的直观表现,还原文件是造成文件丢失的弥补措施,这三者直观体现了一个用户在本地操作的习惯及该习惯会造成文件丢失的影响程度,在计算机存储系统中该习惯极易造成数据丢失,在未保存有数据备份的情况下,会造成较为严重的后果(无法复原数据);获取第二操作信息集合中判断网站是否授权,是为了确认用户是否浏览未经允许(对比数据库中包含的)的网站,提取每个非授权网站的网站内容中对应的广告条,是因为非授权的网站存在较大的安全隐患,尤其是广告条对应的链接,因此需要将其与相应非授权网站进行绑定,进而对其进行分析。When the present invention obtains the first operation information set, the files deleted by the user in the local operation information and the files searched or restored in the recycle bin are marked respectively, because it is convenient to distinguish the three, and any one of the three will be There are certain risks, all of which will cause data loss. Deleting files is the cause of file loss, searching for files is an intuitive manifestation of file loss, and restoring files is a remedy for file loss. These three intuitively reflect a user. The habit of operating locally and the extent to which it will cause file loss. In the computer storage system, this habit can easily lead to data loss. If no data backup is saved, it will cause serious consequences (the data cannot be restored). Obtain the second operation information set to judge whether the website is authorized, in order to confirm whether the user browses the website without permission (contained in the comparison database), extract the corresponding advertisement bar in the website content of each unauthorized website, because the non-authorized website Authorized websites have great security risks, especially the links corresponding to advertisement banners. Therefore, it is necessary to bind them with corresponding unauthorized websites and then analyze them.
进一步的,所述数据安全判定模块获取用户的第一操作信息集合并对其进行分析,得到第一安全风险系数;Further, the data security determination module acquires the user's first operation information set and analyzes it to obtain the first security risk coefficient;
所述数据安全判定模块获取用户的第二操作信息集合并对其进行分析,得到第二安全风险系数。The data security determination module acquires the user's second operation information set and analyzes it to obtain a second security risk coefficient.
进一步的,所述数据安全判定模块得到第一安全风险系数的方法包括以下步骤:Further, the method for obtaining the first security risk coefficient by the data security determination module includes the following steps:
S3.1、获取用户对应的第一操作信息集合中的内容;S3.1. Obtain the content in the first operation information set corresponding to the user;
S3.2、计算该用户对应的第一安全风险系数Q1,S3.2. Calculate the first safety risk coefficient Q1 corresponding to the user,
所述其中,a1表示删除文件风险系数,a2表示丢失文件风险系数,a3表示还原文件风险系数,said Among them, a1 represents the risk factor of deleting files, a2 represents the risk factor of losing files, a3 represents the risk factor of restoring files,
B1表示第一操作信息集合中第一标记对应的未备份的删除文件的个数,B1 represents the number of unbacked deleted files corresponding to the first mark in the first operation information set,
所述第一操作信息集合中第一标记对应的未备份的删除文件的个数是通过数据安全判定模块自动检索计算机中第一标记对应的删除文件的名称时,通过对应的检索结果来获取的,The number of unbacked deleted files corresponding to the first mark in the first operation information set is obtained through the corresponding retrieval result when the data security determination module automatically retrieves the name of the deleted file corresponding to the first mark in the computer ,
当检索结果中不存在与第一标记对应的删除文件的名称相同名称的文件时,则判定第一标记对应的删除文件未备份,When there is no file with the same name as the name of the deleted file corresponding to the first mark in the retrieval result, it is determined that the deleted file corresponding to the first mark is not backed up,
当检索结果中存在与第一标记对应的删除文件的名称相同名称的文件时,则判定第一标记对应的删除文件备份;When there is a file with the same name as the name of the deleted file corresponding to the first mark in the retrieval result, it is determined that the deleted file corresponding to the first mark is backed up;
B2表示丢失的文件个数,等于第一操作信息集合中第二标记对应的查找结果中未查找到文件的个数,所述第一操作信息集合中第二标记对应的查找结果中未查找到文件的个数是通过数据安全判定模块自动检索计算机中第二标记对应的查找文件的名称时,通过对应的检索结果来获取的,B2 represents the number of lost files, which is equal to the number of files not found in the search results corresponding to the second mark in the first operation information set, and the search results corresponding to the second mark in the first operation information set are not found. The number of files is obtained through the corresponding retrieval result when the name of the search file corresponding to the second mark in the computer is automatically retrieved by the data security determination module,
B3表示第一操作信息集合中第三标记的个数,B3 represents the number of the third mark in the first operation information set,
Ci表示第i个第三标记对应的还原文件对应的还原文件风险值,Ci represents the risk value of the restored file corresponding to the restored file corresponding to the ith third mark,
所述said
其中,C1表示第i个第三标记对应的还原文件未绑定修改操作时的还原文件风险值,Among them, C1 represents the risk value of the restored file when the restored file corresponding to the ith third mark is not bound to the modification operation,
表示第i个第三标记对应的还原文件绑定修改操作时的还原文件风险值, Indicates the risk value of the restored file when the restored file corresponding to the i-th third tag is bound to the modification operation,
d1表示还原内容风险系数,d2表示还原时长风险系数,d1 represents the risk factor of restoration content, d2 represents the risk factor of restoration duration,
R1i表示第i个第三标记对应的还原文件绑定的修改操作对应的修改内容的总字数,所述修改内容表示还原文件中发生文字增加、文字删除或者文字替换的句子,R1i represents the total number of words in the modified content corresponding to the modification operation bound to the restored file corresponding to the i-th third tag, where the modified content represents a sentence in the restored file in which text is added, text is deleted, or text is replaced,
R2i表示第i个第三标记对应的还原文件执行绑定的修改操作前的总字数,R2i represents the total number of words in the restore file corresponding to the ith third mark before the bound modification operation is performed,
ti表示第i个第三标记对应的还原文件绑定的修改操作距离该用户还原文件时的时长;ti represents the duration of the modification operation bound to the restored file corresponding to the i-th third mark from the time when the user restores the file;
所述a1、a2及a3是动态变化的,不同单位时间内分别对应的a1或者a2或者a3可能不同,基于当前时间获取下一单位时间内a1、a2及a3分别对应的值,The a1, a2, and a3 are dynamically changed, and the corresponding a1, a2, or a3 may be different in different unit times. The values corresponding to a1, a2, and a3 in the next unit time are obtained based on the current time.
基于当前时间获取下一单位时间内a1对应的值的方法包括以下步骤:The method for obtaining the value corresponding to a1 in the next unit time based on the current time includes the following steps:
S3.2.1、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a1与B1的乘积,并计算获取的乘积之和的平均值,记为S3.2.1. Based on the unit time to which the current time belongs, obtain the product of a1 and B1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and calculate the sum of the obtained products. average, denoted as
S3.2.2、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的B1的和的平均值,记为S3.2.2. Based on the unit time to which the current time belongs, obtain the average value of the sum of B1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.3、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a1的和的平均值,记为S3.2.3. Based on the unit time to which the current time belongs, obtain the average value of the sum of a1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.4、基于当前时间获取的下一单位时间内a1的值为与这两者中的最小值,记为其中,p的值等于当前时间所属单位时间对应的a1的值;S3.2.4. The value of a1 in the next unit time obtained based on the current time is and The minimum of the two, denoted as Among them, the value of p is equal to the value of a1 corresponding to the unit time to which the current time belongs;
根据基于当前时间获取下一单位时间内a1对应的值的方法,分别基于当前时间获取下一单位时间内a2、a3对应的值,According to the method of obtaining the value corresponding to a1 in the next unit time based on the current time, the values corresponding to a2 and a3 in the next unit time are obtained respectively based on the current time,
基于当前时间获取下一单位时间内a2对应的值的方法包括以下步骤:The method for obtaining the value corresponding to a2 in the next unit time based on the current time includes the following steps:
S3.2.1-1、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a2与B2的乘积,并计算获取的乘积之和的平均值,记为S3.2.1-1. Based on the unit time to which the current time belongs, obtain the product of a2 and B2 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and calculate the sum of the obtained products The average of the sum, denoted as
S3.2.2-2、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的B2的和的平均值,记为S3.2.2-2. Based on the unit time to which the current time belongs, obtain the average value of the sum of B2 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.3-2、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a2的和的平均值,记为S3.2.3-2. Based on the unit time to which the current time belongs, obtain the average value of the sum of a2 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.4-2、基于当前时间获取的下一单位时间内a2的值为与这两者中的最小值,记为其中,p1的值等于当前时间所属单位时间对应的a2的值;S3.2.4-2. The value of a2 in the next unit time obtained based on the current time is the value of and The minimum of the two, denoted as Among them, the value of p1 is equal to the value of a2 corresponding to the unit time to which the current time belongs;
基于当前时间获取下一单位时间内a3对应的值的方法包括以下步骤:The method for obtaining the value corresponding to a3 in the next unit time based on the current time includes the following steps:
S3.2.1-3、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a3与的乘积,并计算获取的乘积之和的平均值,记为S3.2.1-3. Based on the unit time to which the current time belongs, obtain respectively the a3 and the corresponding a3 and the corresponding unit time of each unit time in the first n unit times of the unit time to which the current time belongs in the historical data. The product of , and calculate the average value of the sum of the obtained products, denoted as
S3.2.2-3、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的的和的平均值,记为S3.2.2-3. Based on the unit time to which the current time belongs, obtain the corresponding unit time of each unit time in the first n unit times of the unit time to which the current time belongs in the historical data. The average of the sums of , denoted as
S3.2.3-3、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a3的和的平均值,记为S3.2.3-3. Based on the unit time to which the current time belongs, obtain the average value of the sum of a3 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.4-3、基于当前时间获取的下一单位时间内a3的值为与这两者中的最小值,记为其中,p2的值等于当前时间所属单位时间对应的a3的值。S3.2.4-3. The value of a3 in the next unit time obtained based on the current time is the value of and The minimum of the two, denoted as Among them, the value of p2 is equal to the value of a3 corresponding to the unit time to which the current time belongs.
本发明在计算该用户对应的第一安全风险系数Q1的过程中,a1、a2及a3是通过数据库查询获取的,用a1乘商B1(第一操作信息集合中第一标记对应的未备份的删除文件的个数),而不是第一标记的个数,是因为删除的文件包括备份过的及未备份的,只有未备份的文件才会造成数据丢失;B2可能会含有B1对应的未备份且删除的文件,但是两者不冲突,因为B2可能还包括单位时间之前删除的未备份的文件,同时查找文件的次数能够侧面凸显出该文件的重要性;计算还原文件风险值时设置多段函数,是因为需要考虑到第三标记对应的还原文件未绑定修改操作时的还原文件风险值情况;基于当前时间获取下一单位时间内a1对应的值时,与分别为历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间不受B1值的影响和受B1值的影响状态下前n个单位时间中分别对应的a1的平均值,与均是根据获取的平均值与当前时间所属单位时间对应的a1值及下一单位时间对应的a1值之间的关系进行推导的,预设三者之间是稳定的,存在等差关系,进而分贝推导出与设置是为了使得获取的下一单位时间对应的a1更加稳定,进而使得误差最下化。In the present invention, in the process of calculating the first safety risk coefficient Q1 corresponding to the user, a1, a2 and a3 are obtained through database query, and a1 is multiplied by the quotient B1 (the unbacked data corresponding to the first mark in the first operation information set The number of deleted files), not the number of the first mark, because the deleted files include backed up and unbacked files, and only unbacked files will cause data loss; B2 may contain unbacked files corresponding to B1 And deleted files, but the two do not conflict, because B2 may also include unbacked files deleted before unit time, and the number of times to find files can highlight the importance of the file; set a multi-segment function when calculating the risk value of restoring files , because it is necessary to consider the risk value of the restored file when the restored file corresponding to the third mark is not bound to the modification operation; when obtaining the value corresponding to a1 in the next unit of time based on the current time, and are the average values of a1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data that is not affected by the B1 value and the corresponding a1 in the first n unit times that are affected by the B1 value, respectively. and Both are derived based on the relationship between the obtained average value and the a1 value corresponding to the unit time to which the current time belongs and the a1 value corresponding to the next unit time. decibels derived and set up The purpose is to make the obtained a1 corresponding to the next unit time more stable, thereby minimizing the error.
进一步的,所述数据安全判定模块得到第二安全风险系数的方法包括以下步骤:Further, the method for obtaining the second security risk coefficient by the data security determination module includes the following steps:
S4.1、获取用户对应的第二操作信息集合中的内容;S4.1. Obtain the content in the second operation information set corresponding to the user;
S4.2、计算该用户对应的第二安全风险系数Q2,所述S4.2, calculate the second safety risk coefficient Q2 corresponding to the user, the
其中,j1表示非授权网站的网站内容中对应的广告条的总类别数,Among them, j1 represents the total number of categories of advertisement bars corresponding to the website content of the unauthorized website,
e3j表示非授权网站的网站内容中对应的广告条中第j类对应的广告条的个数,e3j represents the number of advertisement banners corresponding to the jth category in the corresponding advertisement banners in the website content of the unauthorized website,
e4表示非授权网站的网站内容中对应的广告条的总个数,e4 represents the total number of advertisement bars corresponding to the website content of the unauthorized website,
d4j表示非授权网站的网站内容中对应的广告条中第j类对应的广告条对应的广告风险系数,d4j represents the advertisement risk coefficient corresponding to the advertisement strip corresponding to the jth category in the corresponding advertisement strip in the website content of the unauthorized website,
所述非授权网站的网站内容中对应的广告条的类别是通过广告条对应的图片进行划分的,具体的划分方法包括以下步骤:The category of the advertisement bar corresponding to the website content of the unauthorized website is divided by the pictures corresponding to the advertisement bar, and the specific dividing method includes the following steps:
S5.1、获取广告条中的图片;S5.1. Obtain the picture in the advertisement banner;
S5.2、通过图像识别,分别得到图片中相应的文字内容,并对文字内容进行关键词提取;S5.2, through image recognition, respectively obtain the corresponding text content in the picture, and perform keyword extraction on the text content;
S5.3、将每个图片中提取的所有关键词分别与类别对比数据库进行比对,获取图片对应的类别,进而得到广告条对应的类别。S5.3, compare all the keywords extracted from each picture with the category comparison database respectively, obtain the category corresponding to the picture, and then obtain the category corresponding to the advertisement banner.
本发明数据安全判定模块得到第二安全风险系数的过程中,通过广告条所属的类别及各类别对应的广告风险系数进行获取,广告风险系数是通过数据库进行查询获取的;在划分广告条的类别时,通过识别图片中的文字信息,并根据文字信息中的关键词对广告条所属类别进行划分的,此处采用的图像识别方法获取图片中的文字信息运用的是现有技术。In the process of obtaining the second security risk coefficient by the data security determination module of the present invention, the category of the advertisement banner and the corresponding advertisement risk coefficient of each category are obtained, and the advertisement risk coefficient is obtained by querying the database; , by identifying the text information in the picture, and classifying the category to which the advertisement belongs according to the keywords in the text information, the image recognition method adopted here uses the prior art to obtain the text information in the picture.
进一步的,所述访问权限判定模块对用户对应的访问权限进行判定时,需要获取每个用户的操作信息分别对应的第一安全风险系数及第二安全风险系数,计算每个用户的操作信息对应的第一安全风险系数与第二安全风险系数之和,记为相应用户对应的最终安全风险值,Further, when the access authority determination module determines the access authority corresponding to the user, it needs to obtain the first security risk coefficient and the second security risk coefficient corresponding to the operation information of each user, and calculate the corresponding operation information of each user. The sum of the first safety risk coefficient and the second safety risk coefficient of , is recorded as the final safety risk value corresponding to the corresponding user,
当用户对应的最终安全风险值大于等于第一阈值时,判定该用户具有访问存储系统的权限,允许该用户访问存储系统;When the final security risk value corresponding to the user is greater than or equal to the first threshold, it is determined that the user has the authority to access the storage system, and the user is allowed to access the storage system;
当用户对应的最终安全风险值小于第一阈值时,判定该用户不具有访问存储系统的权限,禁止该用户访问存储系统。When the final security risk value corresponding to the user is less than the first threshold, it is determined that the user does not have the right to access the storage system, and the user is prohibited from accessing the storage system.
本发明计算每个用户的操作信息对应的第一安全风险系数与第二安全风险系数之和能够实现对用户本地操作信息及浏览器操作信息对应风险的综合评估,实现对用户操作信息对应安全风险情况的预测。The invention calculates the sum of the first security risk coefficient and the second security risk coefficient corresponding to the operation information of each user, which can realize the comprehensive evaluation of the corresponding risks of the user's local operation information and the browser operation information, and realize the corresponding security risks of the user's operation information. forecast of the situation.
一种计算机存储系统的数据安全访问方法,所述方法包括以下步骤:A data security access method of a computer storage system, the method comprises the following steps:
S1、通过操作信息采集模块获取用户在计算机上单位时间内的操作信息;S1, obtain the operation information of the user per unit time on the computer through the operation information collection module;
S2、在数据安全处理模块中,将操作信息采集模块获取的用户操作信息进行分类处理,获取处理后的各个类别对应的用户操作信息进行保存;S2. In the data security processing module, classify and process the user operation information obtained by the operation information collection module, and obtain and save the user operation information corresponding to each category after processing;
S3、通过数据安全判定模块对数据安全处理模块保存的结果进行分析,判断用户操作信息中各类别的操作信息分别对应的安全风险系数;S3, analyze the results saved by the data security processing module through the data security determination module, and determine the security risk coefficients corresponding to each type of operation information in the user operation information;
S4、在访问权限判定模块中,根据每个用户的操作信息分别对应的安全风险系数,对用户对应的访问权限进行判定,并根据用户对应的访问权限,判断是否允许用户访问存储系统。S4. In the access authority determination module, the access authority corresponding to the user is determined according to the security risk coefficient corresponding to the operation information of each user, and whether the user is allowed to access the storage system is determined according to the access authority corresponding to the user.
与现有技术相比,本发明所达到的有益效果是:本发明在对用户的操作信息进行分析时,通过用户的本地操作信息及浏览器操作信息实现对用户操作行为的综合评估,并根据评估结果判断用户操作信息对应的安全风险系数,进而判定用户的访问权限,最终判断是否允许用户访问计算机存储系统,确保用户的数据的安全性,同时该方式获取的用户访问权限会更加安全、考虑的更加全面,能够有效避免计算机存储系统的数据泄露及数据丢失情况。Compared with the prior art, the beneficial effect achieved by the present invention is: when the present invention analyzes the user's operation information, the comprehensive evaluation of the user's operation behavior is realized through the user's local operation information and the browser operation information, and according to the The evaluation results determine the security risk factor corresponding to the user's operation information, and then determine the user's access authority, and finally determine whether to allow the user to access the computer storage system to ensure the security of the user's data. It is more comprehensive and can effectively avoid data leakage and data loss in the computer storage system.
附图说明Description of drawings
附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。在附图中:The accompanying drawings are used to provide a further understanding of the present invention, and constitute a part of the specification, and are used to explain the present invention together with the embodiments of the present invention, and do not constitute a limitation to the present invention. In the attached image:
图1是本发明一种计算机存储系统的数据安全访问系统的结构示意图;1 is a schematic structural diagram of a data security access system of a computer storage system of the present invention;
图2是本发明一种计算机存储系统的数据安全访问系统中数据安全处理模块获取用户的第一操作信息集合的方法的流程示意图;2 is a schematic flowchart of a method for a data security processing module in a data security access system of a computer storage system of the present invention to obtain a user's first operation information set;
图3是本发明一种计算机存储系统的数据安全访问系统中数据安全处理模块获取用户的第二操作信息集合的方法的流程示意图;3 is a schematic flowchart of a method for a data security processing module in a data security access system of a computer storage system of the present invention to obtain a user's second operation information set;
图4是本发明一种计算机存储系统的数据安全访问方法的流程示意图。FIG. 4 is a schematic flowchart of a data security access method of a computer storage system according to the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
请参阅图1-图4,本发明提供技术方案:一种计算机存储系统的数据安全访问系统,包括:1-4, the present invention provides a technical solution: a data security access system for a computer storage system, including:
操作信息采集模块,所述操作信息采集模块获取用户在计算机上单位时间内的操作信息;an operation information acquisition module, the operation information acquisition module acquires the operation information of the user per unit time on the computer;
数据安全处理模块,所述数据安全处理模块用于将操作信息采集模块获取的用户操作信息进行分类处理,获取处理后的各个类别对应的用户操作信息进行保存;a data security processing module, the data security processing module is configured to classify and process the user operation information obtained by the operation information collection module, and obtain and store the user operation information corresponding to each category after processing;
数据安全判定模块,所述数据安全判定模块对数据安全处理模块保存的结果进行分析,判断用户操作信息中各类别的操作信息分别对应的安全风险系数;a data security determination module, wherein the data security determination module analyzes the results saved by the data security processing module, and determines the respective security risk coefficients corresponding to each type of operation information in the user operation information;
访问权限判定模块,所述访问权限判定模块根据每个用户的操作信息分别对应的安全风险系数,对用户对应的访问权限进行判定,并根据用户对应的访问权限,判断是否允许用户访问存储系统。An access authority judgment module, which judges the access authority corresponding to the user according to the security risk coefficient corresponding to the operation information of each user, and judges whether to allow the user to access the storage system according to the access authority corresponding to the user.
本发明通过各个模块的协同合作,通过分析用户在计算机上单位时间内的操作信息对应的安全风险系数,进而确定用户的访问权限,进而判断是否允许用户访问存储系统,确保存储系统中数据的安全性。Through the cooperation and cooperation of various modules, the present invention determines the user's access authority by analyzing the security risk coefficient corresponding to the user's operation information per unit time on the computer, and then determines whether the user is allowed to access the storage system, so as to ensure the safety of the data in the storage system. sex.
所述操作信息采集模块获取的用户在计算机上单位时间内的操作信息包括:本地操作信息及浏览器操作信息,The operation information of the user in the unit time on the computer obtained by the operation information collection module includes: local operation information and browser operation information,
所述本地操作信息指用户对计算机本地内容的操作信息,包括访问的文件夹及所在位置,对文件的增加、删除、修改及查找;The local operation information refers to the operation information of the user on the local content of the computer, including the accessed folder and location, and the addition, deletion, modification and search of files;
所述浏览器操作信息指用户在计算机中浏览器上执行的操作信息,包括打开的网址信息对应的网站名称、浏览内容信息。The browser operation information refers to the operation information performed by the user on the browser in the computer, including the website name and browsing content information corresponding to the opened website information.
本发明从本地操作信息及浏览操作信息这两个方面对用户的操作信息进行分析,是因为这两者涉及的安全隐患方向不同,本地操作信息对应的用户自身的因素,所有的安全隐患均是用户自身的误操作导致的(分析该方面内容是为了判断用户是否具有误删文件的习惯及该习惯的严重程度),浏览器操作信息对应的是外部因素,安全隐患取决于用户浏览的网站中存在风险的几率。The present invention analyzes the user's operation information from the two aspects of the local operation information and the browsing operation information, because the security risks involved in the two are different, the local operation information corresponds to the user's own factors, and all the security risks are Caused by the user's own misoperation (the content of this aspect is analyzed to determine whether the user has the habit of deleting files by mistake and the severity of the habit), the browser operation information corresponds to external factors, and the security risks depend on the website that the user browses. the probability of risk.
所述数据安全处理模块对获取的用户操作信息进行分类处理时,将用户在计算机中单位时间内的本地操作信息的处理结果记为该用户的第一操作信息集合,将用户在计算机中单位时间内的浏览器操作信息的处理结果记为该用户的第二操作信息集合。When the data security processing module classifies the acquired user operation information, the processing result of the user's local operation information per unit time in the computer is recorded as the first operation information set of the user, and the user's unit time in the computer is recorded as the user's first operation information set. The processing result of the browser operation information in the device is recorded as the second operation information set of the user.
本发明设置第一操作信息集合与第二操作信息集合是为了便于后续分别对本地操作信息及浏览器操作信息对应的处理结果进行分析,能够将两者的处理结果股有效的区分开,进而避免两者对应的分析结果在保存是产生混淆,进而对后续的数据分析产生影响,使得分析结果产生偏差。The present invention sets the first operation information set and the second operation information set to facilitate the subsequent analysis of the processing results corresponding to the local operation information and the browser operation information respectively, and can effectively distinguish the processing results of the two, thereby avoiding The corresponding analysis results of the two are confused when saved, which in turn affects the subsequent data analysis and causes deviations in the analysis results.
数据安全处理模块获取用户的第一操作信息集合的方法包括以下步骤:The method for the data security processing module to obtain the user's first operation information set includes the following steps:
S1.1、获取用户在单位时间内的本地操作信息对应的所有操作信息内容;S1.1. Obtain all operation information content corresponding to the user's local operation information within a unit time;
S1.2、将本地操作信息中用户删除的文件、在回收站查找或者还原的文件分别进行标记,其中用户删除的文件进行第一标记,用户在回收站查找的文件进行第二标记,用户还原内的文件进行第三标记;S1.2. Mark the files deleted by the user in the local operation information and the files searched or restored in the recycle bin, wherein the files deleted by the user are marked first, the files searched by the user in the recycle bin are marked second, and the users restore the document within the third mark;
S1.3、判断每个第三标记的用户还原文件之后的本地操作信息中是否含有针对该文件的修改操作,S1.3. Determine whether the local operation information after each third marked user restores the file contains a modification operation for the file,
当用户还原文件之后的本地操作信息中含有针对该文件的修改操作,则将该修改操作与该用户还原文件进行绑定,并获取该修改操作对应的修改内容及该修改操作距离该用户还原文件时的时长,When the local operation information after the user restores a file contains a modification operation for the file, the modification operation is bound to the user's restored file, and the modification content corresponding to the modification operation and the distance between the modification operation and the user's restored file are obtained. time period,
当用户还原文件之后的本地操作信息中不含有针对该文件的修改操作,则不对该用户还原文件进行处理;When the local operation information after the user restores the file does not contain the modification operation for the file, the file restored by the user will not be processed;
S1.4、按照本地操作信息的时间先后顺序,逐个将各个第一标记、第二标记及第三标记对应的操作信息录入到一个空白集合中,构成第一操作信息集合;S1.4, according to the chronological order of the local operation information, enter the operation information corresponding to each first mark, second mark and third mark one by one into a blank set to form a first operation information set;
数据安全处理模块获取用户的第二操作信息集合的方法包括以下步骤:The method for obtaining the second operation information set of the user by the data security processing module includes the following steps:
S2.1、获取用户在计算机中单位时间内的浏览器操作信息;S2.1. Obtain the user's browser operation information per unit time in the computer;
S2.2、将每个浏览器操作信息对应的网站名称与对比数据库进行比较,S2.2, compare the website name corresponding to each browser operation information with the comparison database,
若浏览器操作信息对应的网站名称包含于对比数据库中,则判定该浏览器操作信息对应的网站名称为授权网站,If the website name corresponding to the browser operation information is included in the comparison database, it is determined that the website name corresponding to the browser operation information is an authorized website,
若浏览器操作信息对应的网站名称不包含于对比数据库中,则判定该浏览器操作信息对应的网站名称为非授权网站;If the website name corresponding to the browser operation information is not included in the comparison database, it is determined that the website name corresponding to the browser operation information is an unauthorized website;
S2.3、分别提取每个非授权网站的网站内容中对应的广告条,并将提取的广告条分别与对应的非授权网站进行绑定;S2.3. Respectively extract the corresponding advertisement banners in the website content of each unauthorized website, and bind the extracted advertisement banners to the corresponding unauthorized websites respectively;
S2.4、按浏览器操作信息的时间先后顺序,逐个将各个非授权网站名称对应的操作信息添加到一个空白集合中,构成第二操作信息集合。S2.4. According to the chronological sequence of the browser operation information, add the operation information corresponding to each unauthorized website name to a blank set one by one to form a second operation information set.
本发明获取第一操作信息集合时,将本地操作信息中用户删除的文件、在回收站查找或者还原的文件分别进行标记,是因为便于对三者进行区分,这三者中任意一种均会存在一定的风险性,均会造成数据的丢失,删除文件是造成文件丢失的起因,查找文件是造成文件丢失的直观表现,还原文件是造成文件丢失的弥补措施,这三者直观体现了一个用户在本地操作的习惯及该习惯会造成文件丢失的影响程度,在计算机存储系统中该习惯极易造成数据丢失,在未保存有数据备份的情况下,会造成较为严重的后果(无法复原数据);获取第二操作信息集合中判断网站是否授权,是为了确认用户是否浏览未经允许(对比数据库中包含的)的网站,提取每个非授权网站的网站内容中对应的广告条,是因为非授权的网站存在较大的安全隐患,尤其是广告条对应的链接,因此需要将其与相应非授权网站进行绑定,进而对其进行分析。When the present invention obtains the first operation information set, the files deleted by the user in the local operation information and the files searched or restored in the recycle bin are marked respectively, because it is convenient to distinguish the three, and any one of the three will be There are certain risks, all of which will cause data loss. Deleting files is the cause of file loss, searching for files is an intuitive manifestation of file loss, and restoring files is a remedy for file loss. These three intuitively reflect a user. The habit of operating locally and the extent to which it will cause file loss. In the computer storage system, this habit can easily lead to data loss. If no data backup is saved, it will cause serious consequences (the data cannot be restored). Obtain the second operation information set to judge whether the website is authorized, in order to confirm whether the user browses the website without permission (contained in the comparison database), extract the corresponding advertisement bar in the website content of each unauthorized website, because the non-authorized website Authorized websites have great security risks, especially the links corresponding to advertisement banners. Therefore, it is necessary to bind them with corresponding unauthorized websites and then analyze them.
所述数据安全判定模块获取用户的第一操作信息集合并对其进行分析,得到第一安全风险系数;The data security determination module acquires the user's first operation information set and analyzes it to obtain the first security risk coefficient;
所述数据安全判定模块获取用户的第二操作信息集合并对其进行分析,得到第二安全风险系数。The data security determination module acquires the user's second operation information set and analyzes it to obtain a second security risk coefficient.
所述数据安全判定模块得到第一安全风险系数的方法包括以下步骤:The method for obtaining the first security risk coefficient by the data security determination module includes the following steps:
S3.1、获取用户对应的第一操作信息集合中的内容;S3.1. Obtain the content in the first operation information set corresponding to the user;
S3.2、计算该用户对应的第一安全风险系数Q1,S3.2. Calculate the first safety risk coefficient Q1 corresponding to the user,
所述其中,a1表示删除文件风险系数,a2表示丢失文件风险系数,a3表示还原文件风险系数,said Among them, a1 represents the risk factor of deleting files, a2 represents the risk factor of losing files, a3 represents the risk factor of restoring files,
B1表示第一操作信息集合中第一标记对应的未备份的删除文件的个数,B1 represents the number of unbacked deleted files corresponding to the first mark in the first operation information set,
所述第一操作信息集合中第一标记对应的未备份的删除文件的个数是通过数据安全判定模块自动检索计算机中第一标记对应的删除文件的名称时,通过对应的检索结果来获取的,The number of unbacked deleted files corresponding to the first mark in the first operation information set is obtained through the corresponding retrieval result when the data security determination module automatically retrieves the name of the deleted file corresponding to the first mark in the computer ,
当检索结果中不存在与第一标记对应的删除文件的名称相同名称的文件时,则判定第一标记对应的删除文件未备份,When there is no file with the same name as the name of the deleted file corresponding to the first mark in the retrieval result, it is determined that the deleted file corresponding to the first mark is not backed up,
当检索结果中存在与第一标记对应的删除文件的名称相同名称的文件时,则判定第一标记对应的删除文件备份;When there is a file with the same name as the name of the deleted file corresponding to the first mark in the retrieval result, it is determined that the deleted file corresponding to the first mark is backed up;
B2表示丢失的文件个数,等于第一操作信息集合中第二标记对应的查找结果中未查找到文件的个数,所述第一操作信息集合中第二标记对应的查找结果中未查找到文件的个数是通过数据安全判定模块自动检索计算机中第二标记对应的查找文件的名称时,通过对应的检索结果来获取的,B2 represents the number of lost files, which is equal to the number of files not found in the search results corresponding to the second mark in the first operation information set, and the search results corresponding to the second mark in the first operation information set are not found. The number of files is obtained through the corresponding retrieval result when the name of the search file corresponding to the second mark in the computer is automatically retrieved by the data security determination module,
B3表示第一操作信息集合中第三标记的个数,B3 represents the number of the third mark in the first operation information set,
Ci表示第i个第三标记对应的还原文件对应的还原文件风险值,Ci represents the risk value of the restored file corresponding to the restored file corresponding to the ith third mark,
所述said
其中,C1表示第i个第三标记对应的还原文件未绑定修改操作时的还原文件风险值,Among them, C1 represents the risk value of the restored file when the restored file corresponding to the ith third mark is not bound to the modification operation,
表示第i个第三标记对应的还原文件绑定修改操作时的还原文件风险值, Indicates the risk value of the restored file when the restored file corresponding to the i-th third tag is bound to the modification operation,
d1表示还原内容风险系数,d2表示还原时长风险系数,d1 represents the risk factor of restoration content, d2 represents the risk factor of restoration duration,
R1i表示第i个第三标记对应的还原文件绑定的修改操作对应的修改内容的总字数,所述修改内容表示还原文件中发生文字增加、文字删除或者文字替换的句子,R1i represents the total number of words in the modified content corresponding to the modification operation bound to the restored file corresponding to the i-th third tag, where the modified content represents a sentence in the restored file in which text is added, text is deleted, or text is replaced,
R2i表示第i个第三标记对应的还原文件执行绑定的修改操作前的总字数,R2i represents the total number of words in the restore file corresponding to the ith third mark before the bound modification operation is performed,
ti表示第i个第三标记对应的还原文件绑定的修改操作距离该用户还原文件时的时长;ti represents the length of time between the modification operation bound to the restored file corresponding to the i-th third mark and the time when the user restores the file;
本实施例中用户甲含有两个第三标记对应的还原文件,第1个第三标对应的还原文件未绑定修改操作,第2个第三标记对应的还原文件绑定的修改操作对应的修改内容的总字数为50字,第2个第三标记对应的还原文件执行绑定的修改操作前的总字数为500字,第2个第三标记对应的还原文件绑定的修改操作距离该用户还原文件时的时长为15小时,In this embodiment, user A contains two restored files corresponding to the third mark. The restored file corresponding to the first third mark is not bound to the modification operation, and the second third mark corresponds to the restored file bound to the modification operation. The total number of words in the modified content is 50 words, the total number of words in the restored file corresponding to the second and third mark before the bound modification operation is performed is 500 words, and the bound modification operation of the restore file corresponding to the second and third mark is far from The time period when the user restores the file is 15 hours,
C1为1,d1为10,d2为3,C1 is 1, d1 is 10, d2 is 3,
则C1=1;Then C1 =1;
所述a1、a2及a3是动态变化的,不同单位时间内分别对应的a1或者a2或者a3可能不同,基于当前时间获取下一单位时间内a1、a2及a3分别对应的值,并将获取的下一单位时间内a1、a2及a3分别对应的值保存到数据库中,The a1, a2, and a3 are dynamically changed, and the corresponding a1, a2, or a3 may be different in different unit times. Based on the current time, obtain the values corresponding to a1, a2, and a3 in the next unit time, and use the obtained values. In the next unit time, the corresponding values of a1, a2 and a3 are stored in the database,
基于当前时间获取下一单位时间内a1对应的值的方法包括以下步骤:The method for obtaining the value corresponding to a1 in the next unit time based on the current time includes the following steps:
S3.2.1、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a1与B1的乘积,并计算获取的乘积之和的平均值,记为S3.2.1. Based on the unit time to which the current time belongs, obtain the product of a1 and B1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and calculate the sum of the obtained products. average, denoted as
S3.2.2、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的B1的和的平均值,记为S3.2.2. Based on the unit time to which the current time belongs, obtain the average value of the sum of B1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.3、基于当前时间所属的单位时间,分别获取历史数据中当前时间所属单位时间的前n个单位时间中每个单位时间分别对应的a1的和的平均值,记为S3.2.3. Based on the unit time to which the current time belongs, obtain the average value of the sum of a1 corresponding to each unit time in the first n unit times of the unit time to which the current time belongs in the historical data, and denote it as
S3.2.4、基于当前时间获取的下一单位时间内a1的值为与这两者中的最小值,记为其中,p的值等于当前时间所属单位时间对应的a1的值;S3.2.4. The value of a1 in the next unit time obtained based on the current time is and The minimum of the two, denoted as Among them, the value of p is equal to the value of a1 corresponding to the unit time to which the current time belongs;
本实施例中当前时间所属单位时间对应的a1的值为0.5,In this embodiment, the value of a1 corresponding to the unit time to which the current time belongs is 0.5,
历史数据中当前时间所属单位时间的前3个单位时间中每个单位时间分别对应的B1的值,分别为2、4、3,The value of B1 corresponding to each unit time in the first 3 unit times of the unit time to which the current time belongs in the historical data is 2, 4, and 3, respectively.
历史数据中当前时间所属单位时间的前3个单位时间中每个单位时间分别对应的a1的值,分别为0.4、0.6、0.5,The value of a1 corresponding to each unit time in the first three unit times of the unit time to which the current time belongs in the historical data is 0.4, 0.6, and 0.5, respectively.
则对应的then the corresponding
对应的corresponding
对应的corresponding
则but
进而and then
根据基于当前时间获取下一单位时间内a1对应的值的方法,分别基于当前时间获取下一单位时间内a2、a3对应的值。According to the method of obtaining the value corresponding to a1 in the next unit time based on the current time, the values corresponding to a2 and a3 in the next unit time are obtained respectively based on the current time.
本发明在计算该用户对应的第一安全风险系数Q1的过程中,a1、a2及a3是通过数据库查询获取的,用a1乘商B1(第一操作信息集合中第一标记对应的未备份的删除文件的个数),而不是第一标记的个数,是因为删除的文件包括备份过的及未备份的,只有未备份的文件才会造成数据丢失;B2可能会含有B1对应的未备份且删除的文件,但是两者不冲突,因为B2可能还包括单位时间之前删除的未备份的文件,同时查找文件的次数能够侧面凸显出该文件的重要性;计算还原文件风险值时设置多段函数,是因为需要考虑到第三标记对应的还原文件未绑定修改操作时的还原文件风险值情况。In the present invention, in the process of calculating the first safety risk coefficient Q1 corresponding to the user, a1, a2 and a3 are obtained through database query, and a1 is multiplied by the quotient B1 (the unbacked data corresponding to the first mark in the first operation information set The number of deleted files), not the number of the first mark, because the deleted files include backed up and unbacked files, and only unbacked files will cause data loss; B2 may contain unbacked files corresponding to B1 And deleted files, but the two do not conflict, because B2 may also include unbacked files deleted before unit time, and the number of times to find files can highlight the importance of the file; set a multi-segment function when calculating the risk value of restoring files , because the risk value of the restored file when the restored file corresponding to the third mark is not bound to the modification operation needs to be considered.
所述数据安全判定模块得到第二安全风险系数的方法包括以下步骤:The method for obtaining the second security risk coefficient by the data security determination module includes the following steps:
S4.1、获取用户对应的第二操作信息集合中的内容;S4.1. Obtain the content in the second operation information set corresponding to the user;
S4.2、计算该用户对应的第二安全风险系数Q2,所述S4.2, calculate the second safety risk coefficient Q2 corresponding to the user, the
其中,j1表示非授权网站的网站内容中对应的广告条的总类别数,Among them, j1 represents the total number of categories of advertisement bars corresponding to the website content of the unauthorized website,
e3j表示非授权网站的网站内容中对应的广告条中第j类对应的广告条的个数,e3j represents the number of advertisement banners corresponding to the jth category in the corresponding advertisement banners in the website content of the unauthorized website,
e4表示非授权网站的网站内容中对应的广告条的总个数,e4 represents the total number of advertisement bars corresponding to the website content of the unauthorized website,
d4j表示非授权网站的网站内容中对应的广告条中第j类对应的广告条对应的广告风险系数,d4j represents the advertisement risk coefficient corresponding to the advertisement strip corresponding to the jth category in the corresponding advertisement strip in the website content of the unauthorized website,
本实施例中非授权网站的网站内容中对应的广告条的总类别数为3,非授权网站的网站内容中对应的广告条的总个数为5,In this embodiment, the total number of categories of advertisement bars corresponding to the website content of the unauthorized website is 3, and the total number of advertisement bars corresponding to the website content of the unauthorized website is 5.
非授权网站的网站内容中对应的广告条中第1类对应的广告条个数为2,The number of advertisements corresponding to the first category in the corresponding advertisements in the website content of the unauthorized website is 2,
非授权网站的网站内容中对应的广告条中第2类对应的广告条个数为1,The number of advertisements corresponding to the second category in the corresponding advertisements in the website content of the unauthorized website is 1.
非授权网站的网站内容中对应的广告条中第3类对应的广告条个数为2,The number of advertisements corresponding to the third category in the corresponding advertisements in the website content of the unauthorized website is 2,
非授权网站的网站内容中对应的广告条中,In the corresponding advertisement strip in the website content of the unauthorized website,
第1类对应的广告条对应的广告风险系数为1.5,The advertisement risk factor corresponding to the advertisement bar corresponding to the first category is 1.5.
第2类对应的广告条对应的广告风险系数为2,The advertisement risk factor corresponding to the advertisement bar corresponding to the second category is 2,
第3类对应的广告条对应的广告风险系数为1.3,The advertisement risk factor corresponding to the advertisement bar corresponding to the third category is 1.3,
则该用户对应的第二安全风险系数Then the second security risk factor corresponding to the user
所述非授权网站的网站内容中对应的广告条的类别是通过广告条对应的图片进行划分的,具体的划分方法包括以下步骤:The category of the advertisement bar corresponding to the website content of the unauthorized website is divided by the pictures corresponding to the advertisement bar, and the specific dividing method includes the following steps:
S5.1、获取广告条中的图片;S5.1. Obtain the picture in the advertisement banner;
S5.2、通过图像识别,分别得到图片中相应的文字内容,并对文字内容进行关键词提取;S5.2, through image recognition, respectively obtain the corresponding text content in the picture, and perform keyword extraction on the text content;
S5.3、将每个图片中提取的所有关键词分别与类别对比数据库进行比对,获取图片对应的类别,进而得到广告条对应的类别。S5.3, compare all the keywords extracted from each picture with the category comparison database respectively, obtain the category corresponding to the picture, and then obtain the category corresponding to the advertisement banner.
本发明数据安全判定模块得到第二安全风险系数的过程中,通过广告条所属的类别及各类别对应的广告风险系数进行获取,广告风险系数是通过数据库进行查询获取的;在划分广告条的类别时,通过识别图片中的文字信息,并根据文字信息中的关键词对广告条所属类别进行划分的,此处采用的图像识别方法获取图片中的文字信息运用的是现有技术。In the process of obtaining the second security risk coefficient by the data security determination module of the present invention, the category of the advertisement banner and the corresponding advertisement risk coefficient of each category are obtained, and the advertisement risk coefficient is obtained by querying the database; , by identifying the text information in the picture, and classifying the category to which the advertisement belongs according to the keywords in the text information, the image recognition method adopted here uses the prior art to obtain the text information in the picture.
所述访问权限判定模块对用户对应的访问权限进行判定时,需要获取每个用户的操作信息分别对应的第一安全风险系数及第二安全风险系数,计算每个用户的操作信息对应的第一安全风险系数与第二安全风险系数之和,记为相应用户对应的最终安全风险值,When the access authority determination module determines the access authority corresponding to the user, it needs to obtain the first security risk coefficient and the second security risk coefficient corresponding to the operation information of each user, and calculate the first security risk coefficient corresponding to the operation information of each user. The sum of the safety risk coefficient and the second safety risk coefficient is recorded as the final safety risk value corresponding to the corresponding user,
当用户对应的最终安全风险值大于等于第一阈值时,判定该用户具有访问存储系统的权限,允许该用户访问存储系统;When the final security risk value corresponding to the user is greater than or equal to the first threshold, it is determined that the user has the authority to access the storage system, and the user is allowed to access the storage system;
当用户对应的最终安全风险值小于第一阈值时,判定该用户不具有访问存储系统的权限,禁止该用户访问存储系统。When the final security risk value corresponding to the user is less than the first threshold, it is determined that the user does not have the right to access the storage system, and the user is prohibited from accessing the storage system.
本发明计算每个用户的操作信息对应的第一安全风险系数与第二安全风险系数之和能够实现对用户本地操作信息及浏览器操作信息对应风险的综合评估,实现对用户操作信息对应安全风险情况的预测。The invention calculates the sum of the first security risk coefficient and the second security risk coefficient corresponding to the operation information of each user, which can realize the comprehensive evaluation of the corresponding risks of the user's local operation information and the browser operation information, and realize the corresponding security risks of the user's operation information. forecast of the situation.
一种计算机存储系统的数据安全访问方法,所述方法包括以下步骤:A data security access method of a computer storage system, the method comprises the following steps:
S1、通过操作信息采集模块获取用户在计算机上单位时间内的操作信息;S1, obtain the operation information of the user per unit time on the computer through the operation information collection module;
S2、在数据安全处理模块中,将操作信息采集模块获取的用户操作信息进行分类处理,获取处理后的各个类别对应的用户操作信息进行保存;S2. In the data security processing module, classify and process the user operation information obtained by the operation information collection module, and obtain and save the user operation information corresponding to each category after processing;
S3、通过数据安全判定模块对数据安全处理模块保存的结果进行分析,判断用户操作信息中各类别的操作信息分别对应的安全风险系数;S3, analyze the results saved by the data security processing module through the data security determination module, and determine the security risk coefficients corresponding to each type of operation information in the user operation information;
S4、在访问权限判定模块中,根据每个用户的操作信息分别对应的安全风险系数,对用户对应的访问权限进行判定,并根据用户对应的访问权限,判断是否允许用户访问存储系统。S4. In the access authority determination module, the access authority corresponding to the user is determined according to the security risk coefficient corresponding to the operation information of each user, and whether the user is allowed to access the storage system is determined according to the access authority corresponding to the user.
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。It should be noted that, in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any such actual relationship or sequence exists. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus.
最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, the The technical solutions described in the foregoing embodiments may be modified, or some technical features thereof may be equivalently replaced. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111528966.9ACN114398667A (en) | 2021-12-14 | 2021-12-14 | Data security access system and method of computer storage system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111528966.9ACN114398667A (en) | 2021-12-14 | 2021-12-14 | Data security access system and method of computer storage system |
| Publication Number | Publication Date |
|---|---|
| CN114398667Atrue CN114398667A (en) | 2022-04-26 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111528966.9APendingCN114398667A (en) | 2021-12-14 | 2021-12-14 | Data security access system and method of computer storage system |
| Country | Link |
|---|---|
| CN (1) | CN114398667A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116451262A (en)* | 2023-06-16 | 2023-07-18 | 河北登浦信息技术有限公司 | Data encryption method and encryption system for financial system client |
| CN116701118A (en)* | 2023-06-14 | 2023-09-05 | 黑龙江省力元信息科技有限公司 | A risk monitoring and early warning system and method based on data analysis |
| CN120256396A (en)* | 2025-06-04 | 2025-07-04 | 上海农林职业技术学院 | A computer resource allocation management system and method based on data analysis |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20010042126A1 (en)* | 2000-02-29 | 2001-11-15 | Wong Leon C. | Methods and systems for controlling access to presence information according to a variety of different access permission types |
| CN108123926A (en)* | 2016-11-30 | 2018-06-05 | 阿里巴巴集团控股有限公司 | Identity identifying method and device and computing device |
| CN109800589A (en)* | 2019-01-25 | 2019-05-24 | 深信服科技股份有限公司 | A kind of information security management and control method, system, device and readable storage medium storing program for executing |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20010042126A1 (en)* | 2000-02-29 | 2001-11-15 | Wong Leon C. | Methods and systems for controlling access to presence information according to a variety of different access permission types |
| CN108123926A (en)* | 2016-11-30 | 2018-06-05 | 阿里巴巴集团控股有限公司 | Identity identifying method and device and computing device |
| CN109800589A (en)* | 2019-01-25 | 2019-05-24 | 深信服科技股份有限公司 | A kind of information security management and control method, system, device and readable storage medium storing program for executing |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116701118A (en)* | 2023-06-14 | 2023-09-05 | 黑龙江省力元信息科技有限公司 | A risk monitoring and early warning system and method based on data analysis |
| CN116451262A (en)* | 2023-06-16 | 2023-07-18 | 河北登浦信息技术有限公司 | Data encryption method and encryption system for financial system client |
| CN116451262B (en)* | 2023-06-16 | 2023-08-25 | 河北登浦信息技术有限公司 | Data encryption method and encryption system for financial system client |
| CN120256396A (en)* | 2025-06-04 | 2025-07-04 | 上海农林职业技术学院 | A computer resource allocation management system and method based on data analysis |
| Publication | Publication Date | Title |
|---|---|---|
| US10783168B2 (en) | Systems and methods for probabilistic data classification | |
| US20190236102A1 (en) | System and method for differential document analysis and storage | |
| US11036808B2 (en) | System and method for indexing electronic discovery data | |
| US11176000B2 (en) | Methods and systems for custom metadata driven data protection and identification of data | |
| Bernstein et al. | Redundant documents and search effectiveness | |
| CN114398667A (en) | Data security access system and method of computer storage system | |
| US11030054B2 (en) | Methods and systems for data backup based on data classification | |
| US11113148B2 (en) | Methods and systems for metadata tag inheritance for data backup | |
| CN110888990A (en) | Text recommending methods, devices, equipment and media | |
| US20130110839A1 (en) | Constructing an analysis of a document | |
| US12079276B2 (en) | Methods and systems for event based tagging of metadata | |
| US20140180934A1 (en) | Systems and Methods for Using Non-Textual Information In Analyzing Patent Matters | |
| US11093448B2 (en) | Methods and systems for metadata tag inheritance for data tiering | |
| US20180025012A1 (en) | Web page classification based on noise removal | |
| US20150081681A1 (en) | Method and apparatus for classifying and comparing similar documents using base templates | |
| US11574287B2 (en) | Automatic document classification | |
| CN105975547B (en) | Based on content web document detection method approximate with position feature | |
| US11113238B2 (en) | Methods and systems for metadata tag inheritance between multiple storage systems | |
| US11100048B2 (en) | Methods and systems for metadata tag inheritance between multiple file systems within a storage system | |
| CN110880142A (en) | A method and device for obtaining a risk entity | |
| US20240193522A1 (en) | Citation and policy based document classification | |
| CN108763961B (en) | Big data based privacy data grading method and device | |
| Kopliku et al. | Towards a framework for attribute retrieval | |
| CN106933993B (en) | An information processing method and device | |
| CN107169065B (en) | Method and device for removing specific content |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |