Movatterモバイル変換


[0]ホーム

URL:


CN120223434B - User database information leakage protection system and equipment based on big data - Google Patents

User database information leakage protection system and equipment based on big data

Info

Publication number
CN120223434B
CN120223434BCN202510669408.6ACN202510669408ACN120223434BCN 120223434 BCN120223434 BCN 120223434BCN 202510669408 ACN202510669408 ACN 202510669408ACN 120223434 BCN120223434 BCN 120223434B
Authority
CN
China
Prior art keywords
data
historical
transmission
type
importance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510669408.6A
Other languages
Chinese (zh)
Other versions
CN120223434A (en
Inventor
黄兴贺
黄海亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Xingkai Information Technology Co ltd
Original Assignee
Shandong Xingkai Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Xingkai Information Technology Co ltdfiledCriticalShandong Xingkai Information Technology Co ltd
Priority to CN202510669408.6ApriorityCriticalpatent/CN120223434B/en
Publication of CN120223434ApublicationCriticalpatent/CN120223434A/en
Application grantedgrantedCritical
Publication of CN120223434BpublicationCriticalpatent/CN120223434B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention discloses a system and equipment for preventing leakage of user database information based on big data, and relates to the technical field of data processing. The device comprises a data acquisition module, an importance analysis module, a necessity analysis module and a key updating module, wherein the data acquisition module is used for acquiring current data to be transmitted, the importance analysis module is used for determining the data importance of the current data to be transmitted according to the current data type of the current data to be transmitted, the necessity analysis module is used for determining the key updating necessity of the current data to be transmitted according to the data importance and each key history updating moment, and the key updating module is used for updating the key of the current data to be transmitted under the condition that the key updating necessity is larger than a preset necessity threshold. The user database information anti-disclosure protection device based on big data can improve information security.

Description

System and equipment for preventing leakage of user database information based on big data
Technical Field
The invention relates to the technical field of data processing, in particular to a system and equipment for preventing leakage of user database information based on big data.
Background
At present, data encryption transmission is adopted to protect information security of a user database, and in the data encryption transmission process, the security and reliability of data transmission are often ensured by updating a key.
However, the current time point selection for updating the key is often updated based on a set time period, and the set time period has risks of interception and cracking, so that the risk coefficient of the user database is increased in the data transmission process, and the information security is poor.
Disclosure of Invention
The embodiment of the invention provides a system and equipment for protecting information leakage of a user database based on big data, which can improve the information security.
In a first aspect of an embodiment of the present invention, there is provided a security disclosure protection apparatus for user database information based on big data, including:
The data acquisition module is used for acquiring current data to be transmitted;
the importance analysis module is used for determining the importance of the current data to be transmitted according to the current data type of the current data to be transmitted;
the necessity degree analysis module is used for determining the key updating necessity degree of the current data to be transmitted according to the data importance degree and each key history updating moment;
and the key updating module is used for updating the key of the data to be transmitted currently under the condition that the key updating necessity degree is larger than a preset necessity degree threshold value.
In some possible implementations, the importance analysis module specifically includes the following units:
The first type importance determining unit is used for determining the importance of the target type corresponding to the current data type of the current data to be transmitted based on the target matching relationship, wherein the target matching relationship is used for representing the matching relationship between various data types and the corresponding type importance;
the element acquisition unit is used for acquiring a first transmission data amount of the current data to be transmitted and type difference degree between the current data to be transmitted and the corresponding first historical transmission data in the historical time window, wherein the type difference degree is used for representing the difference condition between the current data type and the first historical data type of the first historical transmission data in the historical time window;
and the data importance determining unit is used for determining the data importance of the data to be transmitted currently by utilizing the target type importance, the first transmission data quantity and the type difference.
In some possible implementations, the importance analysis module further includes the following units:
a data acquisition unit configured to acquire second history transmission data in a target history period;
the second type importance determining unit is used for determining the type importance corresponding to the second historical data type of each batch of second historical transmission data according to the second historical transmission data in the target historical time period;
and the relation generating unit is used for generating a target matching relation based on the type importance degree corresponding to each second historical data type.
In some possible implementations, the second type of importance determining unit specifically includes the following sub-units:
The transmission performance determining subunit is used for determining the transmission performance of each second historical data type according to the starting transmission time and the ending transmission time of each batch of second historical transmission data in the target historical time period;
The type importance determining subunit is configured to determine, for each second historical data type, a type importance of the target historical data type according to a transmission performance of the target historical data type, a single transmission duration of data of the target second historical transmission data, and a second transmission data amount, where the target historical data type is any one second historical data type, and the target second historical transmission data is each batch of second historical transmission data corresponding to the target historical data type.
In some possible implementations, the transmission performance determining subunit is specifically configured to:
Determining the total data transmission time length of the target historical data type and the transmission interval time length between every two adjacent target second historical transmission data according to the starting transmission time and the ending transmission time of each batch of second historical transmission data in the target historical time period;
And determining the transmission performance of the target historical data type by using the total data transmission time length of the target historical data type, the transmission interval time length between every two adjacent target second historical transmission data and the historical total time length of the target historical time period.
In some possible implementations, the type importance determination subunit is specifically configured to:
Determining the calling frequency of the target historical data type according to the single data transmission time length and the second data transmission amount of the target second historical transmission data;
And determining the type importance of the target historical data type by using the transmission expressive degree and the call frequency of the target historical data type.
In some possible implementations, the necessity degree analysis module specifically includes the following units:
The interval duration determining unit is used for determining the average interval duration of updating the key according to each key history updating moment;
The necessity determining unit is used for determining the key updating necessity of the current data to be transmitted according to the data importance and the size relation between the current interval duration and the average interval duration of the current data to be transmitted, wherein the current interval duration is the interval duration between the current time and the time of updating the last key.
In some possible implementations, the interval duration determining unit is specifically configured to:
Determining the duration weight of the key updating time period based on the third transmission data amount in the key updating time period and the type importance of each data type in the key updating time period, wherein the key updating time period is a time period formed between adjacent key history updating moments;
And determining the average interval duration of updating the key by using the time period duration of each key updating time period and the corresponding duration weight.
In some possible implementations, the necessity determining unit is specifically configured to:
determining the necessity degree weight of the current data to be transmitted according to the size relation between the current interval duration and the average interval duration of the current data to be transmitted;
And determining the key updating necessity of the data to be transmitted currently by using the data importance, the necessity weight and the abnormal data duty ratio between the current time and the time of updating the key last time.
In a second aspect of the embodiment of the present invention, a system for protecting information of a user database from disclosure based on big data is provided, including:
the data encryption subsystem is used for encrypting the data to be transmitted of the user database;
the behavior detection subsystem is used for detecting health and abnormality of the data transmission behavior of the user database;
The right control subsystem is used for managing the access right of the data to be transmitted of the user database;
The above-mentioned user database information anti-disclosure protection device based on big data provided in any aspect communicates with the data encryption subsystem, the behavior detection subsystem and the authority control subsystem, respectively.
The beneficial effects of the invention are as follows:
In the user database information anti-disclosure protection device based on big data provided by the embodiment of the invention, the data importance of the current data to be transmitted is analyzed according to the current data type of the current data to be transmitted. And then, determining the key updating necessity of the current data to be transmitted according to the transmission importance of the current data to be transmitted and each key history updating moment. And under the condition that the key updating necessity degree is larger than a preset necessity degree threshold, updating the key of the data to be transmitted currently. In this way, the invention determines the transmission importance of the current data to be transmitted according to the current data type of the current data to be transmitted, and analyzes the necessity of key update at the current time by combining the interval duration of key update under the history condition, thereby determining whether to perform key update according to the necessity of key update. Therefore, the eavesdropping risk and the cracking risk of key updating under the set time period can be avoided, and the information security is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions and advantages of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a configuration of a security protection device for user database information based on big data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a configuration of a necessity degree analysis module according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a system for protecting information of a user database against disclosure based on big data according to an embodiment of the present invention.
Detailed Description
In order to further describe the technical means and effects adopted by the invention to achieve the preset aim, the following detailed description is given below of a system and a device for protecting the information leakage of the user database based on big data according to the invention, which are specific implementation, structure, characteristics and effects thereof, with reference to the accompanying drawings and preferred embodiments. In the following description, different "one embodiment" or "another embodiment" means that the embodiments are not necessarily the same. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It should be noted that, in the technical scheme of the invention, the acquisition, storage, use, processing and the like of the data all conform to the relevant regulations of laws and regulations.
The current mainstream solution focuses on constructing a data protection barrier by encrypted transmission, while key management is a key element of the system, and the update mechanism directly affects the protection efficiency. Although the conventional periodic key update strategy has implementation convenience, the update mode of the fixed time window objectively forms a predictable security rhythm. The deterministic mode provides a potential breach for an attacker, and the attacker is expected to implement accurate attack at night before the key is invalid through long-term monitoring and mode analysis, so that a periodic fragile window period of a protection system appears, and the risk of data leakage is obviously increased.
The invention aims to provide a system and equipment for preventing leakage of user database information based on big data. In the user database information anti-disclosure protection device based on big data provided by the embodiment of the invention, the data importance of the current data to be transmitted is analyzed according to the current data type of the current data to be transmitted. And then, determining the key updating necessity of the current data to be transmitted according to the transmission importance of the current data to be transmitted and each key history updating moment. And under the condition that the key updating necessity degree is larger than a preset necessity degree threshold, updating the key of the data to be transmitted currently. In this way, the invention determines the transmission importance of the current data to be transmitted according to the current data type of the current data to be transmitted, and analyzes the necessity of key update at the current time by combining the interval duration of key update under the history condition, thereby determining whether to perform key update according to the necessity of key update. Therefore, the eavesdropping risk and the cracking risk of key updating under the set time period can be avoided, and the information security is improved.
The following describes a specific embodiment of a system and a device for protecting user database information from disclosure based on big data.
As shown in fig. 1, a schematic structural diagram of a user database information anti-disclosure protection device based on big data is provided. The big data-based user database information anti-disclosure protection apparatus 100 includes a data acquisition module 110, an importance analysis module 120, a necessity analysis module 130, and a key update module 140.
The data acquisition module 110 is configured to acquire data to be transmitted currently.
In this embodiment, the data to be transmitted currently may come from various sources, such as environmental data collected by the sensor (e.g. temperature, humidity, pressure, etc.), business data generated by the business system (e.g. transaction records, customer information, etc.), file data uploaded by the user, etc.
The current data to be transmitted can be acquired in any one of real-time acquisition, periodic acquisition and event-triggered acquisition. The data acquisition module 110 acquires data with high real-time requirements, such as equipment running state data in industrial production, through a sensor, periodically collects data, such as daily sales data, the data acquisition module 110 can set a timing task and collect the data at a specific time point, and the event trigger collection comprises the step of triggering the data acquisition module 110 to collect the data when a specific event occurs, such as after a user completes a transaction, the system automatically collects related data of the transaction.
The data to be transmitted acquired by the data acquisition module 110 is usually stored in a temporary buffer or data queue, and waits for subsequent processing. This buffer may be a data structure in memory or may be a temporary table in a database.
The importance analysis module 120 is configured to determine the importance of the data to be transmitted according to the current data type of the data to be transmitted.
In this embodiment, the current data type is used to characterize the type to which the data currently to be transmitted belongs. By way of example, the data types may include sensitive data types, general traffic data types, and non-critical data types. The sensitive data types may include personal identity information (name, identification card number, bank card number, etc.), medical data, enterprise core confidential data (business plan, research and development results, etc.), which may cause serious loss to individuals or enterprises once leaked, the general business data types may include general business report forms, daily operation records, etc., which have a certain reference value to business but have relatively low leakage risk, and the non-critical data types may include temporary data for testing, log data with less influence to business, etc.
The importance of the data is used to characterize the importance of the data. For example, the importance analysis module 120 may preset the corresponding importance level according to various data types. For example, the data importance of a sensitive data type is specified as 3 (highest level), the data importance of a general traffic data type as 2, and the data importance of a non-critical data type as 1.
Thus, after the data obtaining module 110 obtains the current data to be transmitted, the importance analyzing module 120 may directly determine the importance of the current data to be transmitted according to the preset matching relationship according to the current data type of the current data to be transmitted.
The necessity degree analysis module 130 is configured to determine the necessity degree of updating the key of the data to be transmitted currently according to the importance degree of the data and each key history updating time.
In this embodiment, the key history update time is used to characterize the time of updating the key in the history process, and the key update necessity is used to characterize the necessity of updating the key corresponding to the data to be transmitted currently.
As one example, the desirability analysis module 130 calculates an average interval duration for updating the keys based on each key history update time. Then, dividing the interval duration between the current time and the time of the last key update by the average interval duration to obtain a target ratio. And calculating a quantized value of the key update necessity through weighted summation according to the target ratio and the data importance.
And the key updating module 140 is configured to update the key of the data to be transmitted currently, if the key updating necessity is greater than a preset necessity threshold.
In this embodiment, the key update module 140 sets the threshold of necessity for key update in advance based on factors such as security requirements and service characteristics. For example, the threshold is set to 0.7, and when the calculated key update necessity is greater than 0.7, the key update operation is triggered.
Specifically, a secure key generation algorithm is first employed, such as generating a new key based on a random number generator, a cryptographic hash function, and the like. The new key should have sufficient randomness and complexity to ensure its security. The new key is then securely distributed to the data sender and receiver. The distribution process can adopt encryption channels, digital certificate authentication and other technologies to ensure confidentiality and integrity of the key in the transmission process. After the data sender and receiver successfully acquire the new key, the old key is replaced with the new key. For the data to be transmitted currently, a key smooth transition mechanism can be adopted to ensure the continuity of data transmission. For example, both old and new key decryption are supported for a period of time, gradually transitioning to using only the new key. Finally, after confirming that the new key is normally used and the old key is no longer needed, the old key is safely destroyed, and the old key is prevented from being maliciously utilized. The destroying mode may be to physically destroy the storage medium (e.g. destroy the hardware security module containing the old key), or to ensure that the old key cannot be recovered by covering, clearing, etc. operations in the software layer.
As an alternative embodiment, the importance analysis module 120 specifically includes the following units:
The first type importance determining unit is used for determining the importance of the target type corresponding to the current data type of the current data to be transmitted based on the target matching relationship, wherein the target matching relationship is used for representing the matching relationship between various data types and the corresponding type importance;
the element acquisition unit is used for acquiring a first transmission data amount of the current data to be transmitted and type difference degree between the current data to be transmitted and the corresponding first historical transmission data in the historical time window, wherein the type difference degree is used for representing the difference condition between the current data type and the first historical data type of the first historical transmission data in the historical time window;
and the data importance determining unit is used for determining the data importance of the data to be transmitted currently by utilizing the target type importance, the first transmission data quantity and the type difference.
In the present embodiment, the target matching relationship is a matching relationship describing various data types and corresponding type importance degrees. For example, the data type and the corresponding type importance may be stored using a hash table structure, where the key is the data type and the value is the corresponding type importance.
The first transmission data amount is used for representing the total amount of data which needs to be transmitted in the user database, namely the total amount of data contained in the current data to be transmitted.
The first historical transmission data is used for representing the historical transmission data in the historical time window, and the first historical data type is used for representing the data type corresponding to the first historical transmission data.
The type difference degree is the difference condition between the current data type of the current data to be transmitted and the first historical data type of the first historical transmission data in the corresponding historical time window. For example, the size of the historical time window may be 5 batches of data to be transmitted before the current data to be transmitted.
As an example, the first type importance determining unit searches the hash table for a corresponding value by using the current data type as a key by using the constructed object matching relationship, thereby the object type importance.
And simultaneously, acquiring 5 batches of data to be transmitted (namely first historical transmission data) before the current data to be transmitted from the user database, determining the number of coincidence types which are the same as the current data type of the current data to be transmitted in the data types (namely first historical data types) of the 5 batches of data to be transmitted, and dividing the number of coincidence types by 5 to obtain the type difference between the current data to be transmitted and the first historical transmission data in the historical time window.
Finally, the data importance determining unit determines the data importance of the current data to be transmitted by using the target type importance, the first transmission data amount, and the type difference through the following formula 1:
Equation 1
In the formula 1 of the present invention,For characterizing the importance of the data to be transmitted for the jth batch,For characterizing the importance of the type of data to be transmitted in the jth batch,A first amount of transmission data for characterizing a j-th batch of data to be transmitted,And the type difference degree between the j-th batch of data to be transmitted and the first historical transmission data in the corresponding historical time window is represented.
The formula 1 mainly utilizes the type importance of the current data to be transmitted in the user database, and combines the first transmission data amount of the current data to be transmitted and whether the type data is transmitted at the moment before the current data to be transmitted, so as to comprehensively determine the data importance of the current data to be transmitted. The greater the importance of the type of the data currently to be transmitted, or the greater the first transmission data amount of the data currently to be transmitted, or the less the data of this type is transmitted at the previous time of the data currently to be transmitted, the greater the importance of the data currently to be transmitted.
According to the method and the device for determining the data importance of the current data to be transmitted, the first data transmission quantity of the current data to be transmitted, the type difference degree between the current data to be transmitted and the first historical transmission data in the corresponding historical time window and the target type importance corresponding to the current data type are combined, the data importance of the current data to be transmitted is comprehensively determined, and the accuracy of the data importance of the current data to be transmitted can be improved, so that the information security is improved.
As an alternative embodiment, the importance analysis module 120 further includes the following units:
a data acquisition unit configured to acquire second history transmission data in a target history period;
the second type importance determining unit is used for determining the type importance corresponding to the second historical data type of each batch of second historical transmission data according to the second historical transmission data in the target historical time period;
and the relation generating unit is used for generating a target matching relation based on the type importance degree corresponding to each second historical data type.
In this embodiment, the target historical time period may be determined according to a service requirement, a data feature analysis, a related rule, or the like. For example, the target history period may be set to last one month if the reference meaning of the recent data transmission pattern to the current data processing is to be analyzed, and to last one year if the long-term trend is concerned.
The second historical transmission data is used for representing the historical transmission data in the target historical time period, and the second historical data type is used for representing the data type corresponding to the second historical transmission data.
As an example, the data acquisition unit acquires the second historical transmission data from the user database using the corresponding query statement or data extraction tool according to the target historical time period.
Then, the second-type importance determining unit analyzes each batch of the second historical transmission data to identify the data type thereof. In particular, this may involve data parsing, e.g., for structured data (e.g., tabular data in a database), the data type may be determined by looking at field definitions and data content, and for unstructured data (e.g., text, images, audio), feature extraction and classification may be required using specific algorithms or tools, e.g., using natural language processing techniques to identify the subject type of the text data, and image recognition techniques to determine the category of the image data.
Then, the second type importance determining unit assigns type importance to different data types according to the service requirement and the importance evaluation criteria. For example, in a medical data transmission scenario, the patient's medical record information data type importance may be set to 9 (full scale 10), while the general health promotion data type importance may be set to 3.
Finally, the relationship generating unit selects the appropriate data structure to store the target matching relationship, thereby storing each second historical data type and its corresponding type importance into the selected data structure. In particular, common data structures may include hash tables, dictionaries, or tables in relational databases.
Through the embodiment, second historical transmission data in a target historical time period is acquired, the type importance of each data type is determined, and a target matching relationship for representing the matching relationship between the data type and the type importance is generated. Therefore, the importance of the target type corresponding to the current data type of the current data to be transmitted can be determined directly according to the target matching relationship, and the determination efficiency of the importance of the target type can be improved.
As an alternative embodiment, the second type of importance determining unit specifically comprises the following sub-units:
The transmission performance determining subunit is used for determining the transmission performance of each second historical data type according to the starting transmission time and the ending transmission time of each batch of second historical transmission data in the target historical time period;
The type importance determining subunit is configured to determine, for each second historical data type, a type importance of the target historical data type according to a transmission performance of the target historical data type, a single transmission duration of data of the target second historical transmission data, and a second transmission data amount, where the target historical data type is any one second historical data type, and the target second historical transmission data is each batch of second historical transmission data corresponding to the target historical data type.
In this embodiment, the transmission performance level is used to characterize the overall transmission performance of the second historical data type over the target historical period. For example, the transmission performance may comprehensively consider factors such as stability, timeliness, and the like of the transmission. For example, the transmission performance may be defined as the ratio of the standard deviation of the transmission duration to the average transmission duration to measure the stability of the transmission, while the timeliness is evaluated in connection with whether the transmission is completed within a specified time.
The single transmission duration of the data is used for representing the duration required for transmitting a batch of target second historical transmission data, and the second transmission data quantity is used for representing the total data quantity contained in the target second historical transmission data.
As one example, the transmission performance determining subunit first obtains a start transmission time and an end transmission time of each batch of second historical transmission data in the target historical period, and calculates a transmission duration of each batch of second historical transmission data.
Then, the average transmission duration and the standard deviation of the transmission durations of all the second historical transmission data of the same data type in the target historical time period are calculated. And calculating the transmission expressive degree of the corresponding second historical data type by utilizing the average transmission time length and the standard deviation of the transmission time length of the second historical transmission data of the same data type according to the defined index.
And the type importance determining subunit acquires the corresponding second historical transmission data amount of each batch of target second historical transmission data according to the target historical data type, calculates the single transmission time length average value of the data, and calculates the corresponding second transmission data amount of each batch of target second historical transmission data to obtain the second transmission data amount average value.
And finally, calculating the type importance of the target historical data type through weighted summation based on the transmission expressive degree of the target historical data type, the average value of the single transmission time length of the data and the average value of the second transmission data quantity.
According to the embodiment, the type importance of the target historical data type is accurately determined according to the transmission performance of the target historical data type, the single data transmission duration of the target second historical transmission data and the second transmission data quantity. Thus, the type importance of each data type can be accurately calculated, and the information security is further improved.
As an alternative embodiment, the transmission performance determining subunit is specifically configured to:
Determining the total data transmission time length of the target historical data type and the transmission interval time length between every two adjacent target second historical transmission data according to the starting transmission time and the ending transmission time of each batch of second historical transmission data in the target historical time period;
And determining the transmission performance of the target historical data type by using the total data transmission time length of the target historical data type, the transmission interval time length between every two adjacent target second historical transmission data and the historical total time length of the target historical time period.
In this embodiment, the total data transmission duration is used to represent the sum of transmission durations of the second historical transmission data of each batch of targets of the target historical data type, and the total historical duration is used to represent the time length of the target historical time period.
The transmission interval duration is used to characterize the duration of the interval between adjacent target second historical transmission data. For example, the transmission interval duration between the target second historical transmission data of the a+1st batch and the target second historical transmission data of the a+1st batch is obtained by subtracting the end transmission time of the target second historical transmission data of the a batch from the start transmission time of the target second historical transmission data of the a batch.
As an example, the transmission performance of the target history data type may be determined specifically by the following equation 2:
Equation 2
In the formula 2 of the present invention,For characterizing the transmission expressive degree of the data type corresponding to the j-th batch of data to be transmitted,For characterizing the total transmission time length of the data corresponding to the data type of the j-th batch of data to be transmitted,A historical total duration for characterizing the target historical time period,And the average value is used for representing the transmission interval duration between the second historical transmission data of each adjacent target of the data type corresponding to the j-th batch of data to be transmitted.
Wherein, theThe time length ratio of the total data transmission time length of the data types corresponding to the j-th batch of data to be transmitted to the total historical time length is used for representing, the larger the time length ratio is, or the shorter the time interval of data transmission of the same data type is, the more frequently the data of the type are called in a user database, namely the larger the corresponding transmission expressive degree is.
According to the method and the device, the transmission performance of the target historical data type can be accurately determined by using the total data transmission time length of the target historical data type, the transmission interval time length between every two adjacent target second historical transmission data and the total historical time length of the target historical time period, so that the calculation accuracy of the type importance can be improved.
As an alternative embodiment, the type importance determination subunit is specifically configured to:
Determining the calling frequency of the target historical data type according to the single data transmission time length and the second data transmission amount of the target second historical transmission data;
And determining the type importance of the target historical data type by using the transmission expressive degree and the call frequency of the target historical data type.
In the present embodiment, the type importance of the target history data type can be determined specifically by the following formula 3:
Equation 3
In the formula 3 of the present invention,For characterizing the type importance of the data type corresponding to the j-th batch of data to be transmitted,And the transmission expressive degree is used for representing the transmission expressive degree of the data type corresponding to the j-th batch of data to be transmitted.The batch number of the target second historical transmission data for representing the corresponding data type of the j-th batch of the data to be transmitted,A data single transmission time length for representing the ith batch of target second historical transmission data of the data type corresponding to the jth batch of data to be transmitted,And the second transmission data quantity is used for representing the second historical transmission data of the ith batch of targets of the data type corresponding to the jth batch of data to be transmitted.
Wherein, theThe method is used for representing the calling frequency of the data type corresponding to the j-th batch of data to be transmitted, namely when data of a certain data type is transmitted for a plurality of times in the transmission process, the time for transmitting the data each time is long, and the data transmission quantity is large, the data of the type is indicated to be called frequently. The greater the call frequency, or the greater the transmission performance, the greater the type importance.
According to the method and the device, the type importance of the target historical data type can be accurately determined by utilizing the transmission performance of the target historical data type and the calling frequency of the target historical data type, so that the calculation accuracy of the type importance is improved, and the information security can be further improved.
As an alternative embodiment, as shown in fig. 2, the necessity degree analysis module 130 specifically includes the following units:
An interval duration determining unit 131, configured to determine an average interval duration of updating the key according to each key history updating time;
the necessity determining unit 132 is configured to determine, according to the data importance, the size relationship between the current interval duration of the current data to be transmitted and the average interval duration, the key update necessity of the current data to be transmitted, where the current interval duration is an interval duration between the current time and the time at which the key is updated last time.
In the embodiment, the average interval duration is used for representing the average interval duration between adjacent updating moments of the key in the history updating process, and the current interval duration is used for representing the interval duration between the current moment and the moment of the last key updating.
As one example, the interval duration determination unit 131 acquires the history update time information of the key from the log record, sorts the collected history update time information, and arranges in time order for subsequent calculation.
Then, the sorted historical update time information is traversed, and the time interval between every two adjacent updates is calculated. And adding the time intervals between all adjacent updates, and dividing the time intervals by the number of the intervals to obtain the average interval duration of updating the key.
Then, the necessity determining unit 132 acquires the current interval duration of the current data to be transmitted, and compares the magnitude relation between the current interval duration and the average interval duration. And determining a calculation rule of the key updating necessity according to the size relation between the current interval duration and the average interval duration.
And finally, determining the key updating necessity degree of the current data to be transmitted by utilizing the data importance degree of the current data to be transmitted according to the calculation rule of the key updating necessity degree.
According to the key updating method and device, the key updating necessity of the current data to be transmitted is accurately calculated by utilizing the data importance of the current data to be transmitted and combining the size relation between the current interval duration and the average interval duration of the current data to be transmitted. Therefore, the calculation accuracy of the key updating necessity degree of the data to be transmitted at present can be improved, so that whether the key is updated or not can be accurately judged according to the key updating necessity degree, and the information security can be improved.
As an alternative embodiment, the interval duration determining unit 131 is specifically configured to:
Determining the duration weight of the key updating time period based on the third transmission data amount in the key updating time period and the type importance of each data type in the key updating time period, wherein the key updating time period is a time period formed between adjacent key history updating moments;
and determining the average interval duration of updating the key by using the time period duration of each key updating time period and the corresponding time duration weight.
In this embodiment, the third transmission data amount is used to characterize the total amount of data transmitted in the key update period, that is, the total amount of data included in the key update period.
The key updating time period is a time period formed between adjacent key history updating moments, and the time period duration of the key updating time period is that the last key history updating moment corresponding to the key updating time period subtracts the previous key history updating moment.
As an example, the duration weight of the key update period may be determined specifically by the following equation 4:
Equation 4
In the formula 4 of the present invention,The duration weight used to characterize the c-th key update period,For characterizing a third amount of transmission data in a c-th key update period,For characterizing the type importance of the data type corresponding to the j-th batch of data to be transmitted,For characterizing the number of data types in the c-th key update period.
The more the transmission data amount in the key updating time period is, or the more the type importance average value in the key updating time period is, the more the duration weight of the key updating time period is. That is, as for the duration weight of the key update period, the greater the amount of data transmitted in the key update period, the greater the importance of the type in the key update period, the weight value of the greater the amount of the key update period is given.
Further, the average interval duration for updating the key may be determined specifically by the following equation 5:
Equation 5
In the formula 5 of the present invention,The average interval duration for characterizing the key updates,The period duration used to characterize the c-th key update period,The duration weight used to characterize the c-th key update period,For characterizing the number of key update time periods,For characterizing the accumulation of the duration weights of the respective key update periods,I.e. the duty cycle of the duration weight characterizing the c-th key update period to the duration weight accumulation value of the respective key update period. According to the embodiment, the average interval duration of updating the key is determined by using the time period duration of each key updating time period and the corresponding duration weight. Therefore, based on the scale of data transmission and the importance degree of the data type in each key updating time period as weights, the average interval duration of updating the key can be more accurately determined, and the accuracy of the follow-up key updating necessity degree can be improved.
As an alternative embodiment, the necessity determining unit 132 is specifically configured to:
determining the necessity degree weight of the current data to be transmitted according to the size relation between the current interval duration and the average interval duration of the current data to be transmitted;
And determining the key updating necessity of the data to be transmitted currently by using the data importance, the necessity weight and the abnormal data duty ratio between the current time and the time of updating the key last time.
In the present embodiment, the abnormal data duty is used to characterize the proportion of the total transmission data in the period constituted at the present time and the time at which the key is updated last. The abnormal data is the data with abnormal phenomena such as data stealing and the like.
As an example, the necessity degree weight of the current data to be transmitted may be determined specifically by the following equation 6:
Equation 6
In the formula 6 of the present invention,For characterizing the necessity weight of the data currently to be transmitted,For characterizing the current interval duration of the current data to be transmitted,The average interval duration used to characterize the key update. s is used to characterize a predetermined constant parameter to avoid zero denominator.
Setting the necessary degree weight of the current data to be transmitted as the difference value between the current interval duration and the average interval duration when the current interval duration is longer than the average interval duration, and setting the necessary degree weight of the current data to be transmitted as the inverse of the sum of the absolute value of the difference value between the current interval duration and the average interval duration and the preset constant parameter when the current interval duration is smaller than or equal to the average interval duration.
The key update necessity of the data to be transmitted currently can be determined specifically by the following formula 7:
Equation 7
In the formula 7 of the present invention,The key update necessary for characterizing the data currently to be transmitted,For characterizing the importance of the data currently to be transmitted,The norm is used for representing the degree of necessity weight of the current data to be transmitted and the norm is used for representing the normalization operation.For characterizing the amount of abnormal data between the current time and the time of last key update,For characterizing the total amount of transmitted data between the current time and the time of last key update,And the abnormal data duty ratio is used for representing the abnormal data duty ratio between the current time and the time of updating the key last time. It should be noted that, in order to ensure that the calculation result is significant, when the denominator is 0 during the calculation of the embodiment of the present application, a parameter adjustment factor greater than 0 needs to be added to the denominator to prevent the denominator from being 0, and the numerical value of the parameter adjustment factor is set by the practitioner according to the actual situation, which is not particularly limited.
According to the key updating method and device, the key updating necessity degree of the data to be transmitted currently can be accurately determined by utilizing the data importance degree, the necessity degree weight and the abnormal data duty ratio between the current time and the time of key updating last time, and therefore whether key updating is performed or not is determined according to the key updating necessity degree. Therefore, the eavesdropping risk and the cracking risk of key updating under the set time period can be avoided, and the information security is improved.
The invention provides a user database information anti-disclosure protection device based on big data. Correspondingly, the invention also provides a specific embodiment of the anti-disclosure protection system for the user database information based on big data.
As shown in fig. 3, a schematic structural diagram of a system for protecting user database information from disclosure based on big data is provided. The system for protecting the information of the user database from disclosure based on big data comprises:
a data encryption subsystem 310, configured to encrypt data to be transmitted in the user database;
The behavior detection subsystem 320 is used for detecting health and abnormality of the data transmission behavior of the user database;
The rights control subsystem 330 is configured to manage access rights of data to be transmitted in the user database;
The big data based user database information anti-disclosure protection device 100 provided in any of the above aspects, where the big data based user database information anti-disclosure protection device 100 communicates with the data encryption subsystem 310, the behavior detection subsystem 320, and the rights control subsystem 330, respectively.
In this embodiment, the data encryption subsystem 310 employs advanced encryption algorithms to encrypt sensitive data in the user database. The choice of encryption algorithm should be based on the importance of the data, the transmission requirements, and the availability of computing resources.
The behavior detection subsystem 320 monitors the data transmission behavior of the user database, including time, frequency, etc., of data transmissions, using big data analysis and machine learning techniques.
The rights control subsystem 330 assigns specific roles for different users or groups of users, each role having different data access rights, thereby enabling fine-grained control of data access, such as read-only, write-in, delete-out, etc., rights, ensuring that only authorized users can perform specific operations. And simultaneously, dynamically adjusting the user permission according to the service requirements, the analysis result of the user behavior or the change of the security policy.
The big data based user database information anti-disclosure protection device 100 is used as a central control node, and communicates with the data encryption subsystem 310, the behavior detection subsystem 320 and the authority control subsystem 330 through a safe and efficient communication protocol, so as to execute the user database information anti-disclosure protection process in the big data based user database information anti-disclosure protection device 100 provided in any aspect.
In the user database information anti-disclosure protection system based on big data provided by the embodiment of the invention, the data importance of the current data to be transmitted is analyzed according to the current data type of the current data to be transmitted. And then, determining the key updating necessity of the current data to be transmitted according to the transmission importance of the current data to be transmitted and each key history updating moment. And under the condition that the key updating necessity degree is larger than a preset necessity degree threshold, updating the key of the data to be transmitted currently. In this way, the invention determines the transmission importance of the current data to be transmitted according to the current data type of the current data to be transmitted, and analyzes the necessity of key update at the current time by combining the interval duration of key update under the history condition, thereby determining whether to perform key update according to the necessity of key update. Therefore, the eavesdropping risk and the cracking risk of key updating under the set time period can be avoided, and the information security is improved.
It should be understood that the invention is not limited to the particular arrangements and instrumentality described above and shown in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. The method processes of the present invention are not limited to the specific steps described and shown, but various changes, modifications and additions, or the order between steps may be made by those skilled in the art after appreciating the spirit of the present invention.

Claims (10)

Translated fromChinese
1.一种基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述设备包括:1. A user database information anti-leakage protection device based on big data, characterized in that the device includes:数据获取模块,用于获取当前待传输数据;Data acquisition module, used to obtain the current data to be transmitted;重要度分析模块,用于根据所述当前待传输数据的当前数据类型,确定所述当前待传输数据的数据重要度,数据类型包括敏感数据类型、一般业务数据类型以及非关键数据类型,敏感数据类型的数据重要度高于一般业务数据类型的数据重要度,一般业务数据类型的数据重要度高于非关键数据类型的数据重要度;an importance analysis module, configured to determine the data importance of the data to be transmitted according to the current data type of the data to be transmitted, where the data types include sensitive data types, general business data types, and non-critical data types, where the data importance of the sensitive data types is higher than that of the general business data types, and the data importance of the general business data types is higher than that of the non-critical data types;必要度分析模块,用于根据所述数据重要度以及每个密钥历史更新时刻,确定所述当前待传输数据的密钥更新必要度,所述密钥更新必要度用于表征更新当前待传输数据的密钥的必要程度;a necessity analysis module, configured to determine the necessity of updating the key of the data to be transmitted based on the importance of the data and each historical key update time, wherein the key update necessity is used to represent the degree of necessity of updating the key of the data to be transmitted;密钥更新模块,用于在所述密钥更新必要度大于预设必要度阈值的情况下,对所述当前待传输数据的密钥进行更新;A key updating module, configured to update the key of the data to be transmitted when the key update necessity is greater than a preset necessity threshold;所述密钥更新必要度满足下述公式:The key update necessity satisfies the following formula:其中,表示所述密钥更新必要度,表示当前待传输数据的数据重要度,表示当前待传输数据的必要度权重,表示归一化运算,表示当前时刻与上一次密钥进行更新的时刻之间的异常数据量,表示当前时刻与上一次密钥进行更新的时刻之间的传输数据总量,表示当前时刻与上一次密钥进行更新的时刻之间的异常数据占比。in, Indicates the degree of necessity for key update, Indicates the importance of the data to be transmitted. Indicates the necessity weight of the data to be transmitted. represents the normalization operation, Indicates the amount of abnormal data between the current time and the time when the key was last updated. Indicates the total amount of data transmitted between the current time and the time when the key was last updated. Indicates the percentage of abnormal data between the current time and the time when the key was last updated.2.根据权利要求1所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述重要度分析模块,具体包括以下单元:2. The user database information anti-leakage protection device based on big data according to claim 1, wherein the importance analysis module specifically includes the following units:第一类型重要度确定单元,用于基于目标匹配关系,确定所述当前待传输数据的当前数据类型对应的目标类型重要度,所述目标匹配关系用于表征各种数据类型与对应的类型重要度之间的匹配关系;A first type importance determination unit is configured to determine a target type importance corresponding to a current data type of the data to be transmitted based on a target matching relationship, wherein the target matching relationship is used to characterize a matching relationship between various data types and corresponding type importances;要素获取单元,用于获取所述当前待传输数据的第一传输数据量,以及所述当前待传输数据与对应的历史时间窗口内第一历史传输数据之间的类型差异度,所述类型差异度用于表征所述当前数据类型与所述历史时间窗口内第一历史传输数据的第一历史数据类型之间的差异情况;an element acquisition unit, configured to acquire a first transmission data volume of the current data to be transmitted, and a type difference between the current data to be transmitted and the first historical transmission data within the corresponding historical time window, the type difference being used to characterize the difference between the current data type and the first historical data type of the first historical transmission data within the historical time window;数据重要度确定单元,用于利用所述目标类型重要度、所述第一传输数据量以及所述类型差异度,确定所述当前待传输数据的数据重要度。A data importance determination unit is used to determine the data importance of the data to be transmitted currently by using the target type importance, the first transmission data volume and the type difference.3.根据权利要求2所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述重要度分析模块,还包括以下单元:3. The user database information anti-leakage protection device based on big data according to claim 2, wherein the importance analysis module further comprises the following units:数据获取单元,用于获取目标历史时间段内的第二历史传输数据;A data acquisition unit, configured to acquire second historical transmission data within a target historical time period;第二类型重要度确定单元,用于根据所述目标历史时间段内的第二历史传输数据,确定每批所述第二历史传输数据的第二历史数据类型对应的类型重要度;a second type importance determining unit, configured to determine, based on the second historical transmission data within the target historical time period, a type importance corresponding to the second historical data type of each batch of the second historical transmission data;关系生成单元,用于基于各所述第二历史数据类型对应的类型重要度,生成所述目标匹配关系。The relationship generating unit is configured to generate the target matching relationship based on the type importance corresponding to each of the second historical data types.4.根据权利要求3所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述第二类型重要度确定单元,具体包括以下子单元:4. The user database information anti-leakage protection device based on big data according to claim 3, wherein the second type importance determination unit specifically includes the following subunits:传输表现度确定子单元,用于根据所述目标历史时间段内每批所述第二历史传输数据的开始传输时刻以及结束传输时刻,确定各所述第二历史数据类型的传输表现度;a transmission performance determination subunit, configured to determine a transmission performance of each type of the second historical data according to a start transmission time and an end transmission time of each batch of the second historical transmission data within the target historical time period;类型重要度确定子单元,用于针对各所述第二历史数据类型,分别执行:根据目标历史数据类型的传输表现度,以及目标第二历史传输数据的数据单次传输时长与第二传输数据量,确定目标历史数据类型的类型重要度,所述目标历史数据类型为任意一种所述第二历史数据类型,所述目标第二历史传输数据为所述目标历史数据类型对应的每批所述第二历史传输数据。The type importance determination sub-unit is used to perform, for each second historical data type, respectively: determine the type importance of the target historical data type based on the transmission performance of the target historical data type, and the single transmission duration and second transmission data volume of the target second historical transmission data, the target historical data type is any one of the second historical data types, and the target second historical transmission data is each batch of the second historical transmission data corresponding to the target historical data type.5.根据权利要求4所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述传输表现度确定子单元,具体用于:5. The user database information anti-leakage protection device based on big data according to claim 4, wherein the transmission performance determination subunit is specifically configured to:根据所述目标历史时间段内每批所述第二历史传输数据的开始传输时刻以及结束传输时刻,确定所述目标历史数据类型的数据总传输时长以及各相邻的所述目标第二历史传输数据之间的传输间隔时长;Determine, based on the start transmission time and the end transmission time of each batch of the second historical transmission data within the target historical time period, the total transmission duration of the data of the target historical data type and the transmission interval duration between adjacent target second historical transmission data;利用所述目标历史数据类型的数据总传输时长、各相邻的所述目标第二历史传输数据之间的传输间隔时长以及所述目标历史时间段的历史总时长,确定所述目标历史数据类型的传输表现度。The transmission performance of the target historical data type is determined by using the total data transmission duration of the target historical data type, the transmission interval durations between adjacent target second historical transmission data, and the total historical duration of the target historical time period.6.根据权利要求4所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述类型重要度确定子单元,具体用于:6. The user database information anti-leakage protection device based on big data according to claim 4, wherein the type importance determination subunit is specifically used to:根据所述目标第二历史传输数据的所述数据单次传输时长与所述第二传输数据量,确定所述目标历史数据类型的调用频繁度;determining a call frequency of the target historical data type according to the single data transmission duration of the target second historical transmission data and the second transmission data volume;利用所述目标历史数据类型的传输表现度与所述调用频繁度,确定所述目标历史数据类型的类型重要度。The type importance of the target historical data type is determined by utilizing the transmission performance of the target historical data type and the call frequency.7.根据权利要求1所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述必要度分析模块,具体包括以下单元:7. The user database information anti-leakage protection device based on big data according to claim 1, wherein the necessity analysis module specifically includes the following units:间隔时长确定单元,用于根据每个所述密钥历史更新时刻,确定所述密钥进行更新的平均间隔时长;an interval duration determining unit, configured to determine an average interval duration for updating the key according to each historical update moment of the key;必要度确定单元,用于根据所述数据重要度、所述当前待传输数据的当前间隔时长与所述平均间隔时长之间的大小关系,确定所述当前待传输数据的密钥更新必要度,所述当前间隔时长为当前时刻与上一次所述密钥进行更新的时刻之间的间隔时长。The necessity determination unit is used to determine the necessity of updating the key of the data to be transmitted according to the importance of the data, the current interval duration of the data to be transmitted and the average interval duration, where the current interval duration is the interval duration between the current moment and the moment when the key was last updated.8.根据权利要求7所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述间隔时长确定单元,具体用于:8. The user database information anti-leakage protection device based on big data according to claim 7, wherein the interval duration determination unit is specifically configured to:针对各密钥更新时间段,分别执行:基于所述密钥更新时间段内的第三传输数据量,以及所述密钥更新时间段内各所述数据类型的类型重要度,确定所述密钥更新时间段的时长权重,所述密钥更新时间段为相邻的所述密钥历史更新时刻之间构成的时间段;For each key update time period, respectively performing: determining a duration weight of the key update time period based on a third amount of transmitted data within the key update time period and a type importance of each of the data types within the key update time period, wherein the key update time period is a time period formed between adjacent key historical update moments;利用各所述密钥更新时间段的时间段时长与对应的所述时长权重,确定所述密钥进行更新的平均间隔时长。The average interval duration of the key update is determined by using the time period duration of each key update time period and the corresponding time period weight.9.根据权利要求7所述的基于大数据的用户数据库信息防泄密保护设备,其特征在于,所述必要度确定单元,具体用于:9. The user database information anti-leakage protection device based on big data according to claim 7, wherein the necessity determination unit is specifically configured to:根据所述当前待传输数据的当前间隔时长与所述平均间隔时长之间的大小关系,确定所述当前待传输数据的必要度权重;Determining a necessity weight of the data to be transmitted currently based on a relationship between a current interval duration of the data to be transmitted currently and the average interval duration;利用所述数据重要度、所述必要度权重以及所述当前时刻与上一次所述密钥进行更新的时刻之间的异常数据占比,确定所述当前待传输数据的密钥更新必要度。The necessity of updating the key of the data to be transmitted is determined by using the data importance, the necessity weight, and the proportion of abnormal data between the current moment and the moment when the key was last updated.10.一种基于大数据的用户数据库信息防泄密保护系统,其特征在于,所述系统包括:10. A user database information leakage protection system based on big data, characterized in that the system includes:数据加密子系统,用于对用户数据库的待传输数据进行加密处理;Data encryption subsystem, used to encrypt the data to be transmitted in the user database;行为检测子系统,用于对所述用户数据库的数据传输行为进行健康与异常的检测;A behavior detection subsystem, used to detect the health and abnormality of the data transmission behavior of the user database;权限控制子系统,用于对所述用户数据库的待传输数据的访问权限进行管理;The authority control subsystem is used to manage the access rights to the data to be transmitted in the user database;权利要求1-9中任意一项所述的基于大数据的用户数据库信息防泄密保护设备,所述基于大数据的用户数据库信息防泄密保护设备分别与所述数据加密子系统、所述行为检测子系统以及所述权限控制子系统进行通信。The big data-based user database information anti-leakage protection device as described in any one of claims 1 to 9, wherein the big data-based user database information anti-leakage protection device communicates with the data encryption subsystem, the behavior detection subsystem and the authority control subsystem respectively.
CN202510669408.6A2025-05-232025-05-23 User database information leakage protection system and equipment based on big dataActiveCN120223434B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510669408.6ACN120223434B (en)2025-05-232025-05-23 User database information leakage protection system and equipment based on big data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510669408.6ACN120223434B (en)2025-05-232025-05-23 User database information leakage protection system and equipment based on big data

Publications (2)

Publication NumberPublication Date
CN120223434A CN120223434A (en)2025-06-27
CN120223434Btrue CN120223434B (en)2025-08-08

Family

ID=96102793

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510669408.6AActiveCN120223434B (en)2025-05-232025-05-23 User database information leakage protection system and equipment based on big data

Country Status (1)

CountryLink
CN (1)CN120223434B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119853907A (en)*2025-03-182025-04-18山东德源电力科技股份有限公司Intelligent operation and maintenance information system of power distribution room based on quantum encryption

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP3956099B2 (en)*2002-01-182007-08-08株式会社日立製作所 Recording / playback device
JP2008109519A (en)*2006-10-262008-05-08Hitachi Ltd Signature key verification method, electronic signature method, electronic signature verification method, and information processing apparatus
CN116366373B (en)*2023-06-012023-08-22深圳市柏英特电子科技有限公司Intelligent management method and storage medium for set top box data
KR20250067605A (en)*2023-11-082025-05-15인하대학교 산학협력단Method and System for Certification and Acquisition of Vehicle's Data
CN119071062B (en)*2024-08-272025-10-03湖南大学 A method and system for secure encryption of email transmission
CN119299091B (en)*2024-10-102025-09-26湖南大学 A chat security communication method and system based on dynamic key
CN119254549B (en)*2024-12-092025-02-21福建中信网安信息科技有限公司 A key management equipment operation and maintenance management system based on data analysis
CN119743303A (en)*2024-12-182025-04-01珠海格力电器股份有限公司 Data transmission method, device, computer equipment and computer readable medium
CN119342475B (en)*2024-12-202025-04-18南京英锐祺科技有限公司 A terminal access authentication method for wireless networking protocol of Internet of Things node equipment
CN119402297B (en)*2024-12-302025-04-25苏州元脑智能科技有限公司Data transmission method, device, readable storage medium and program product
CN119995988A (en)*2025-02-102025-05-13苏州和数智能软件有限公司 A kind of alliance encryption method and node management system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119853907A (en)*2025-03-182025-04-18山东德源电力科技股份有限公司Intelligent operation and maintenance information system of power distribution room based on quantum encryption

Also Published As

Publication numberPublication date
CN120223434A (en)2025-06-27

Similar Documents

PublicationPublication DateTitle
US11444772B2 (en)Fuzzy dataset processing and biometric identity technology leveraging blockchain ledger technology
CN118114301A (en)File processing method and system based on digital information security
US20070094265A1 (en)Automatic detection of abnormal data access activities
CN117692257B (en)High-speed encryption method and device for service data of electric power Internet of things
CN119417612B (en) A method and system for security risk assessment of digital assets
CN120017424B (en) A method and system for secure access to encrypted enterprise network data
CN117272349A (en)Method, system and storage medium for protecting security of relational database
CN118349979B (en)User information safety processing control system applied to intelligent medical treatment
CN116881948A (en)Data encryption management system and method based on general database
CN120223391A (en) Cross-industry data security sharing method, system and medium based on data desensitization
CN118504028A (en)Platform access processing method, device, computer equipment, readable storage medium and program product based on behavior analysis
CN120030515B (en) A blockchain-based e-commerce operation data security protection system and method
CN118627110A (en) A data security management method and system based on big data
CN120338736A (en) A human resource management method and system based on data security
CN111553689A (en)Matching correlation method and system based on quadratic hash
CN116432193A (en)Financial database data protection transformation method and financial data protection system thereof
CN117786756B (en)Method and system for realizing safe sharing of user patient data based on skin database
CN119377985A (en) A method, device, medium and equipment for ensuring human resources data security
CN118862133A (en) A data management system and method based on water resources blockchain
CN120223434B (en) User database information leakage protection system and equipment based on big data
CN111931218A (en)Client data safety protection device and protection method
RU2792789C1 (en)Personal data protection device for information system users
CN118890140B (en) Method and system for secure storage of agency data based on blockchain technology
CN118784328B (en) Transaction data security monitoring system and method for e-commerce
CN119418842A (en) Applied to OFD format electronic medical record rapid access and security management system

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp