FIELD: information technology.
SUBSTANCE: obtaining the information about an external counterparty that can provide data from the data store without using the system. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Determining the location of the data received in the data warehouse. Defining the set time interval for making labels. Making tags in the data store at specified intervals. Performing a request for data from the repository to an external counterparty without using the system. Receiving data from the repository from an external counterparty without using the system. Searching a mark in the obtained data of the storage. Searching the found tag in the tag journal, setting the user information that corresponds to found the label, form the current list of users-suspects found that fit the label. Selecting the next suspect user from the list. Disabling the service requests for the next user-suspect, perform request data from the storage to an external contractor without the use of the system, if you get data from the warehouse from the outside of the counterparty without the use of the system, form another list of users-suspects found that fit the label. Excluding from the current list those suspect users that are not present in the current or the next list, clear the log of making labels. Recognizing the next user-suspect as an intruder.
EFFECT: ability to identify users who receive data from a networked centralized data store in a legal way and provide this data to third parties without the permission of the data owner.
5 tbl
Title | Year | Author | Number |
---|---|---|---|
SYSTEM FOR ESTABLISHING A CONFIDENTIALITY MARK IN AN ELECTRONIC DOCUMENT, ACCOUNTING AND CONTROL OF WORK WITH CONFIDENTIAL ELECTRONIC DOCUMENTS | 2017 |
|
RU2647643C1 |
SYSTEM AND METHOD FOR PROTECTING ELECTRONIC DOCUMENTS CONTAINING CONFIDENTIAL INFORMATION FROM UNAUTHORISED ACCESS | 2020 |
|
RU2759210C1 |
METHOD OF PROCESSING SEARCH REQUESTS FOR SEVERAL RELATIONAL DATABASES OF ARBITRARY STRUCTURE | 2019 |
|
RU2730241C1 |
METHOD FOR CONDUCTING MIGRATION AND DATA REPLICATION USING SECURED DATABASE ACCESS TECHNOLOGY | 2020 |
|
RU2745679C1 |
AUTOMATION SYSTEM FOR THE EXCHANGE OF MARKING CODES | 2021 |
|
RU2773429C1 |
SYSTEM AND METHOD TO COLLECT AND CONTROL PROFILES OF INTERNET USERS | 2012 |
|
RU2486585C1 |
METHOD AND DEVICE FOR ROUTING REQUESTS | 2023 |
|
RU2839911C1 |
FARE PAYMENT SYSTEM IN PUBLIC TRANSPORT AND CARGO MOVEMENT MONITORING USING BLUETOOTH TECHNOLOGIES | 2019 |
|
RU2710802C1 |
METHOD AND SYSTEM FOR CUSTOMIZED ON-DEMAND SERVICES | 2017 |
|
RU2754066C2 |
METHOD OF REMOTE VERIFICATION OF DOCUMENTS | 2019 |
|
RU2707700C1 |
Authors
Dates
2018-03-26—Published
2017-04-14—Filed