FIELD: information technology.
SUBSTANCE: obtaining the information about an external counterparty that can provide data from the data store without using the system. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Determining the location of the data received in the data warehouse. Defining the set time interval for making labels. Making tags in the data store at specified intervals. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Searching a mark in the obtained data of the storage. Searching the found tag in the tag journal, setting the user information that corresponds to found the label, form the current list of users-suspects found that fit the label. Selecting the next suspect user from the list. Disabling the service requests for the next user-suspect, perform request data from the storage to an external contractor without the use of the system, if you get data from the warehouse from the outside of the counterparty without the use of the system, form another list of users-suspects found that fit the label. Excluding from the current list those suspect users that are not present in the current or the next list, clear the log of making labels. Recognizing the next user-suspect as an intruder.
EFFECT: ability to identify users who receive data from a networked centralized data store in a legal way and provide this data to third parties without the permission of the data owner.
5 tbl
Authors
Dates
2018-03-26—Published
2017-04-14—Filed