METHOD FOR DETERMINING THE USER-BREAKER IN A MULTI-USER NETWORK SYSTEM TRANSMITTING THE DATA TO THE EXTERNAL CONTRACTOR WITHOUT PERMISSION Russian patent published in 2018 - IPC G06F21/55 G06F21/50 

Abstract RU 2648621 C1

FIELD: information technology.

SUBSTANCE: obtaining the information about an external counterparty that can provide data from the data store without using the system. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Determining the location of the data received in the data warehouse. Defining the set time interval for making labels. Making tags in the data store at specified intervals. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Searching a mark in the obtained data of the storage. Searching the found tag in the tag journal, setting the user information that corresponds to found the label, form the current list of users-suspects found that fit the label. Selecting the next suspect user from the list. Disabling the service requests for the next user-suspect, perform request data from the storage to an external contractor without the use of the system, if you get data from the warehouse from the outside of the counterparty without the use of the system, form another list of users-suspects found that fit the label. Excluding from the current list those suspect users that are not present in the current or the next list, clear the log of making labels. Recognizing the next user-suspect as an intruder.

EFFECT: ability to identify users who receive data from a networked centralized data store in a legal way and provide this data to third parties without the permission of the data owner.

5 tbl

Similar patents RU2648621C1

Title Year Author Number
SYSTEM FOR ESTABLISHING A CONFIDENTIALITY MARK IN AN ELECTRONIC DOCUMENT, ACCOUNTING AND CONTROL OF WORK WITH CONFIDENTIAL ELECTRONIC DOCUMENTS 2017
  • Chugunov Evgenij Igorevich
RU2647643C1
SYSTEM AND METHOD FOR PROTECTING ELECTRONIC DOCUMENTS CONTAINING CONFIDENTIAL INFORMATION FROM UNAUTHORISED ACCESS 2020
  • Chugunov Evgenij Igorevich
RU2759210C1
METHOD OF PROCESSING SEARCH REQUESTS FOR SEVERAL RELATIONAL DATABASES OF ARBITRARY STRUCTURE 2019
  • Bolshakov Dmitrij Nikolaevich
  • Kuzin Roman Valerevich
  • Gavrilova Olga Anatolevna
  • Khovrich Mariya Aleksandrovna
RU2730241C1
METHOD FOR CONDUCTING MIGRATION AND DATA REPLICATION USING SECURED DATABASE ACCESS TECHNOLOGY 2020
  • Korolev Igor Dmitrievich
  • Litvinov Evgenij Sergeevich
  • Kryukov Denis Matveevich
  • Zakharchenko Romin Ivanovich
  • Kostrov Sergej Olegovich
RU2745679C1
AUTOMATION SYSTEM FOR THE EXCHANGE OF MARKING CODES 2021
  • Dankov Dmitrij Alekseevich
RU2773429C1
SYSTEM AND METHOD TO COLLECT AND CONTROL PROFILES OF INTERNET USERS 2012
  • Burtsev Artur Olegovich
  • Kotljarevskaja Anna Andreevna
  • Ganin Egor Vladimirovich
  • Kholodkov Anton Igorevich
RU2486585C1
FARE PAYMENT SYSTEM IN PUBLIC TRANSPORT AND CARGO MOVEMENT MONITORING USING BLUETOOTH TECHNOLOGIES 2019
  • Postolit Anatolij Vladimirovich
RU2710802C1
METHOD AND SYSTEM FOR CUSTOMIZED ON-DEMAND SERVICES 2017
  • Van Kevin Sunlin
RU2754066C2
METHOD OF REMOTE VERIFICATION OF DOCUMENTS 2019
  • Arzumanyan Grigorij Rachikovich
RU2707700C1
METHOD (VERSIONS) AND SYSTEM (VERSIONS) FOR ANONYMOUS AUTHORISATION ON USER SERVICE 2014
  • Neverov Vladimir Mikhailovich
RU2610258C2

RU 2 648 621 C1

Authors

Bogatyrev Mikhail Vasilevich

Sokurenko Anatolij Alekseevich

Dates

2018-03-26Published

2017-04-14Filed