[go: up one dir, main page]

TWI293161B - - Google Patents

Download PDF

Info

Publication number
TWI293161B
TWI293161B TW94143117A TW94143117A TWI293161B TW I293161 B TWI293161 B TW I293161B TW 94143117 A TW94143117 A TW 94143117A TW 94143117 A TW94143117 A TW 94143117A TW I293161 B TWI293161 B TW I293161B
Authority
TW
Taiwan
Prior art keywords
content
risk
library
sample
management
Prior art date
Application number
TW94143117A
Other languages
Chinese (zh)
Other versions
TW200723140A (en
Inventor
Meng-Fu Shi
zong-bo Lin
Yang-Sheng Li
Pail Lo
yu-guo Lu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Priority to TW094143117A priority Critical patent/TW200723140A/en
Publication of TW200723140A publication Critical patent/TW200723140A/en
Application granted granted Critical
Publication of TWI293161B publication Critical patent/TWI293161B/zh

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Description

1293161 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種多通訊埠内容湿^m 今风險官理方法及其系 統,尤指一種針對資訊流内容進行風險瞢裡+ 4 &狂之技術,而各 通訊埠資訊流的内容,將會依管理目的祐备 们被糸統性轉化應用 為管理決策。1293161 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a multi-communication, content, and risk management method and system thereof, and more particularly to a risk of information flow content 4 + + 4 & The technology of madness, and the content of each communication and information flow, will be applied to management decisions by the management of the purpose.

L先丽技術J 不論是網際網路或區域網路’其帶給人們在相互連炊 溝通上的便利毋庸置疑,然而高度便利性的背後亦潛㈣ 咼度的危險性,一般討論的網路安全, 隹 夕千果甲在封包安 全性的解析,鮮少著眼在網路資訊流的内容管理。有關於 封包的女全性解析,大多教+受各如厶 夕数止業會在網路設備與外部網路 之間架設防火牆’以遏止病毒入侵及垃圾郵件。但 = 卜部傳送的資訊流,在内容上是否符合安全規範,= 〜的技術執行自動化管理,反而訴諸在從業人員本身的、 署 由制度面來加以規範,例如要求從業人員簽 有法律政力的彳早0说中 鱼八 0保在協疋,錯此保護企業内機密或客戶 鍵貝斜不致外洩°然而前述的方式&努—— 消極且不切實際的。ώ认a J" A ^ ^ ^ 業人員有咅“立同路貧訊流通的便捷性,不論從 ee,,. 〜S…、’&,都十分容易將涉及企業内部的機@ $ 闕鐽資料透過網败从士 1钱社或 規範,是益法右 浊,此種狀況單靠宣導或保密協定的 疋無法有效遏止的。 1293161 【發明内容】 由上述可知,既有網路安全管理 安全性的解淤,i w、— θ 制大夕者重於封包 认八 少者眼於資訊流内容的安全〜 於企業的網路安全fg理,此對 文王e理無疑疋—大隱憂與挑戰。 ^ 本發^要目的在提供—種㈣ 流内容進行風險管理之方法。 了夕通讯埠貢訊 為達成前述目的採取的主要技 括下列步驟: 杈係7别述方法包, 將網路設備送出的資訊流進 的内容屬性予以分類儲存; 亚根據預先定義 利用預設的樣本、古五粗芬^一 訊流進行檢核比對;— ”條件對備份的資 險指:==果判_流的風險指數,並根據風 流内衮么…/ 進而依管理目的,將資訊 、、二由本系統轉化為管理決策之參考用。 利用前述技術可針對企辈 容進行風險管理,強調運用内:=外對内的資訊流内 關技術,以強化資安 ,、使用仃為分析的相 *理。“^曰、"斤能力與有效實施内容安全的 一面本發明更有別於現有網路 anti-vi「us、丨ps)著 文厓叫丨間wan、 疋網路安全的工具性產品 丄其不,、 識及成效管理,^u 、/ 纟可達到内容安全的智 過滹範本庫 止業冬識領域所發展的内容分類及 I應轭本庫,解析網路資訊流的 ^ 企業針對數位内容管理的麥策 H式’藉以提升 ’、乘仏值,降低網路不當資訊流 1293161 所造成的使用風險。 用系:發:二:二的在提供一種多通訊埠内容風險管理應 ”訊流備及防火牆網路設備送 。其包括有:理,並進而提供管理^策資訊 2知核組,係針對送入或送出的資訊流進行備份; 使用ϋ =類資料庫’係針對企業特性建立内容特徵及 Φ ‘,、、寺斂樣本,作為内容管理之檢核比對依據; :檢查過渡模組’係根據智識分類資料庫建立的特徵 險户數對:f份模組已備份之資訊流執行檢查,以分析其風 值則予摘=風險指數低則予放行,若風險指數高於-警戒 即時==模=成:…可依據管理政策分別執行 &理,或進行分批資訊的事後檢核追查。 :述多通訊埠内容風險管理應用系統適用於内 #外對内之雙向資訊流管理。 月·J述智識分類資料庫至少包括有·· 學習=本庫’/系運用文意解析技術’收集各類過濾庠的 徵;〜.,亚經過自動學習’萃取出各類樣本庫的樣本特 隹語料庫,係運用内容解析及關鍵語詞萃取原理, 木笔子郵件及不當資訊 料庫的樣本特徵; 的内…本,以萃取出各類語 内谷使用行為特徵庫,係將企業觀察資訊流内容的 6 1293161 =為,進行特徵分析,並對每一種特徵分別定義其風 前述文意解析技術係採用 技術。 文子探勘」(Text Mining 【實施方式】 ^帛圖所v本發明主要係將—多通訊璋内容風險 管理應用系統(10)橋接於網路防火牆(2〇)(或 Router)的後端,並以柊垃 π n、 橋接(Βηε1π)的方式安裝於防火牆( 2〇)與各種網路設備(3〇)之間,尤指在防火 w)後,能夠接觸到SMTP/P0P3軸卩鳩㈣、L Xianli Technology J Whether it is the Internet or the regional network, it brings people the convenience of communicating with each other, but there is no doubt behind the high convenience. (4) The danger of ambiguity, the network in general discussion Security, 隹 千 果 在 在 in the analysis of packet security, rarely focus on the content management of the network information flow. Regarding the full-featured analysis of the female package, most of the teachings are subject to the slogan of setting up a firewall between the network device and the external network to curb virus intrusion and spam. However, if the information flow transmitted by Bu Department meets the safety regulations in the content, the technical execution of the technology is automatically managed. Instead, it is appealed to the practitioners themselves, and the department is regulated by the system. For example, the practitioners are required to sign legal power. The early 0 0 said that the fish eight 0 insurance in the agreement, the wrong to protect the confidentiality of the enterprise or the customer key slant does not leak. However, the aforementioned method & - negative and unrealistic. I admit that a J" A ^ ^ ^ industry staff has the convenience of "distributing the same road to the poor, regardless of the ee,.. ~S..., '&, are very easy to involve the internal machine @ $ 阙鐽 鐽 鐽 从 从 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 士 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Management security, silencing, iw, θ 大 夕 夕 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者 者Challenge. ^ The purpose of this issue is to provide a method for risk management of (4) streaming content. The main steps taken by the communication company to achieve the above objectives are the following steps: The content attributes of the information sent by the device are classified and stored; the sub-predetermined sample is used according to the pre-defined sample, the ancient five rough fen ^ ^ flow for checking the comparison; - "conditions for the backup of the insurance refers to: == fruit Judging the risk index of the flow, and according to the turbulence ... / then according to management purposes, information ,, will be transformed by the two reference systems management decision-making purposes. The above technology can be used for risk management of enterprise resources, emphasizing the use of internal information technology within the internal:= external and internal information to strengthen the security, and use 仃 as the analysis. "^曰," 斤 capability and effective implementation of content security The present invention is more indistinguishable from the existing network anti-vi "us, 丨ps", which is called the wan, 疋 network security tool product 丄It does not, and recognizes the effectiveness management, ^u, / 纟 can achieve the content security of the wisdom of the model library, the industry classification of the development of the content of the field and I should yoke the library, the analysis of the network information flow ^ Enterprise targeted The digital content management of the Maizer H-type 'to enhance', take advantage of the value, reduce the risk of the use of improper network information flow 1293161. Department: send: two: two in the provision of a multi-communication, content risk management should be" Streaming and firewall network device delivery. It includes: rationality, and then provides management information policy 2 knowledge core group, which is to back up the information flow sent or sent; use ϋ = class database to establish content features and Φ ',, The sample of the temple is used as the basis for checking the content management; the inspection transition module is based on the number of characteristic insurance households established according to the intellectual classification database: the inspection of the information flow that has been backed up by the module is analyzed to analyze The wind value will be excerpted = if the risk index is low, the risk index will be released. If the risk index is higher than - the warning is immediate == modulo = Cheng: ... can be executed separately according to the management policy, or after the post-checking of the batch information. : The multi-communication, content risk management application system is applicable to the two-way information flow management within the internal and external. The monthly J-intelligence classification database includes at least the following: · Learning = the library '/ is the use of literary analysis technology to collect the various types of filtering ; ;; ~., through the automatic learning 'extracting various sample libraries The sample special corpus is based on the principle of content analysis and key word extraction, the sample characteristics of the wooden pen mail and the inappropriate information database; the internal...the original, to extract the various types of intra-language use behavior characteristics library, the company will observe the enterprise The information flow content of 6 1293161 = for, the feature analysis, and each of the characteristics of the wind is defined by the aforementioned textual analysis technology. Text Mining [Text] [Embodiment] The present invention mainly relates to the multi-communication, content risk management application system (10) bridged to the back end of the network firewall (2) (or Router), and It is installed between the firewall (2〇) and various network devices (3〇) in the manner of πππ, bridge (Βηε1π), especially after the fire protection w), it can access the SMTP/P0P3 axis (4),

Http、旧、P2P...等所右眘 所,貝乱流的位置,以便針對各個資 訊執行截取及管理的動作。 胃 ==容風險管理應用系统(1。)係雙向地 ::内谷官理功施’意即由外部送入企業的資訊 企業内對:傳送的資訊流,均在内容管理之列。- :關前述多通訊痒内容風險管理應用系統(1㈧之 、、且成睛參閱第一圖所示,其包括有· 一備份模組(Ί !、 及力丄„ ,令資π、、亡可# 0 I A / ,丨小淡丨巧送入的資訊流進行備份 4貝讯Μ可月b疋外對内或内對外; 一智識分類資料庫(1 2 ) , ^ 容特n乃#用粁A、針對企業特性建立内 谷特欲及使用订為特徵樣本, 據; 勹鬥谷官理之檢核比對依 一檢查過濾模組(Ί 9、,此 $根據智識分類資料庫( 7 1293161 1 2 )建立的特徵樣本,對備份模乡且 訊執行檢查,並分析其風 )備知' 扞,芒/i? ^ 2 才數右風險指數低則予放 -右:險指數高於-警戒值則予摘截;其中: 如第三圖所示,該備份 分類資料庫㈠!,用以1 )中包含複數個的 1 )刀別储存經過備份模組(1 1 )備伤且分類的資訊流, QMTD/n^ j仏分類的類型為·· SMTP/p〇p3/,MAp/Web Majl ^The Http, the old, the P2P, etc. are located in the right place, in order to perform the interception and management actions for each information. Stomach == tolerance risk management application system (1.) is two-way: :: 内谷官理施施' means that information sent from outside the enterprise is within the enterprise: the information flow transmitted is in the content management. - : Turn off the above-mentioned multi-communication itch content risk management application system (1 (8), and look at the first picture, which includes a backup module (Ί!, and force 丄, π, 、, 死可# 0 IA / , 丨小淡巧巧入入的信息流 for backup 4贝讯Μ可月b疋外内内内内内内; 一智识分类库(1 2 ) , ^ 容特n乃# Use 粁A, establish a characteristic sample of the characteristics and use of the company for the characteristics of the enterprise, according to; 勹斗谷官理inspection comparison check filter module (Ί 9,, this $ according to the intellectual classification database (7 1293161 1 2 ) Established feature samples, check the backup model and analyze the wind, and analyze the wind.) 捍, 芒/i? ^ 2 Only the right risk index is low - right: the risk index is higher than - the warning value is extracted; wherein: as shown in the third figure, the backup classification database (1)!, for 1) contains a plurality of 1) knife storage is repaired by the backup module (1 1 ) The classified information flow, QMTD/n^ j仏 classification type is ·· SMTP/p〇p3/, MAp/Web Majl ^

Http ' IM、P2P...等資料。 忒#識分類資料庫(2 2 ) 含: 乙」係如弟四圖所示,至少包 複數的樣本庫(;[2 j ) 如「寺& # ^ ^ 係運用文意解析技術(例 如文子板勘」(Text Mining) 璺羽铲士 收票各類過濾庫的 子白乾本,並經過自動學習, 微,!;i 一八I 卞取出各類樣本庫的樣本特 支以一止業為例,各類樣本 務資料、業務資料、客戶資料的樣本特徵包含與財 嗖一, 貝枓、人事資料、研發資料、合 4貧料、客服客訴類等有關的相關字詞; 曰 複數的語料庫(1 2 2 ),俜谨田ώ Λ 二m — 係運用内谷解析及關餘兮五 祠卒取原理,收集電子郵件及者次^ '* s 不备為訊防治的内容筋太, 以卒取出各類語料庫的樣本特徵;i处 庫或不當資訊防治語料庫等; 〃月匕…罔路郵件語料 複數的内容使用行為特徵庫 察資訊流内容的使用行為# τ、將企業觀 為換式進行特徵分析,並對每一錄 特徵分別定義其風險指數。 母一種 又S理目的,該内容- 特徵庫(123)可經系統 使用仃為 n 愿用為顧客關#、、牡铱士 k資料庫」、風險防範決策支援資料痛 …、朿支 朿叉杈貝枓庫」、「營銷策略 1293161 決策支援資料庫」等決策支援參考資訊。 利用則述系、·先可用以對多通訊蜂的資訊流執行内 理: & 當資μ進人企業網路(如第—圖所示)《自企業網 路送出(如第五圖所示)時,合 — s先經過該多通訊埠内容風 險管理應用系統(10)的内容過濾管理程序。 首、先將啟動備份馳(11)將所有資料流的内容即 :伤’並予分類儲存,而經分類儲存的資訊流則再送入 才双查過濾模組(1 3 ) 5 Μ 康3硪分類資料庫(1 2 )提 以 料庫及特徵料執行檢查程序,並定義以 &風險指& ’在此—檢查程序中將預先定義―警戒值,作 為攔截或放行的判斷依據。若 ^ . 貝汛内容的風險指數高過 舌戒值,即依據管理政策分別執行即時搁截管理,或進行 H訊的事後檢核追m若資職㈣風險指數 L 則經系統備份後即直接放行。 、▲,兒月可瞭解本發明之具體技術内容及工作原 ,以該等設計至少具備下列優點與特色: “::_易於管理稽查:本發明可針對資訊流及人員使用 二了τ統計’除了提保負責人員*主管進行稽查,透過 > 、表可瞭解内容官理之成效。而系統管理者可參考實 鈿成果報表,調整内容管理政策及因應之系統設定。 内谷管理政策.企業訂立内容管理政策後, :針:全體或群組別進行内容過濾、處理狀態等設定。並 、同時對照智識分類資料庫’逐筆檢核資訊流的内容,並 9 Ϊ293161 、仃風險指數的計算及核定。 —.積極的管理成效··經過本發 後,若資 不知月内合官理機制過濾 核出資訊::内容,:直接放行而離開系統;若檢 分別執行g 士合的風險扣數同過誓戒值’則依據管理政策 理者等 攔截資訊流,並會執行進入審核、或通知管 批h =行動。對於高㈣戒值不多的資訊流則進行分 報止 檢核追查’對於整體而言’可提供風險評估 土:對於個別人員管理而言’可做為使用行為異常的報 一盖:上述可知’本發明確實可為企業的資訊流執行嚴密 :。勺内容管;里’對於企業的商業機密或關鍵資料提卜 機制,從而保障企業本身的權益及提高消費者; t賴感,故已具備突出的技術特徵與顯然的 並付合發明專利要件,爰依法提起申請。 , 【圖式簡單說明】 =一圖係本發明之系統安裝位置示意圖。 第二圖係本發明之一系統方塊圖。 /·、一圖係本發明備份模組之組成示意圖。 第四圖係' 本發明智識分類資料庫之組成示意圖。 第五圖係本發明又一系統方塊圖。 【主要元件符號說明】 (1 〇)多通訊埠内容風險管理應用系統 (1 1 )備份模組 (1 1 1 )分類資料庫 1293161Http 'IM, P2P... and other information.忒#Classification database (2 2 ) Contains: B) is shown in the figure of the fourth brother, at least the number of sample libraries (; [2 j ) such as "Temple &# ^ ^ is the use of semantic analysis techniques (such as Text Mining 璺 铲 铲 收 收 收 收 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 各类 铲 铲 铲 铲 各类 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲 铲For example, the sample characteristics of various sample business materials, business data, and customer data include related words related to Caiyiyi, Bessie, personnel data, R&D data, 4 poor materials, and customer service complaints; Corpus (1 2 2 ), 俜 ώ ώ ώ Λ m m m m 运用 运用 运用 运用 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内 内To take out the sample characteristics of various corpora; i library or improper information prevention corpus; etc.; 〃月匕...罔路邮件 corpus plural use content behavior characteristics library to check the use of information flow content τ, view of the enterprise Perform feature analysis for the change and separate each feature Yiqi risk index. The mother-type and the purpose of the purpose, the content - the feature library (123) can be used by the system 仃 is willing to use as customer-off #,, 铱 铱 k database, risk prevention decision support data pain... Decision support reference information such as “朿 朿 杈 杈 」 ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” μ into the corporate network (as shown in the figure - "sent from the corporate network (as shown in Figure 5), the - s first through the multi-communication content risk management application system (10) content filtering Management program. First, the first backup will start (11), the content of all data streams will be classified as: injury and classified, and the classified information will be sent to the double filter module (1 3 ) 5 Μ The Kang 3硪 classification database (1 2) carries out the inspection procedure with the library and the characteristic materials, and defines the & risk index & 'in this - the inspection program will pre-define the warning value as the judgment of interception or release. According to. If ^. The risk of Bessie content The index is higher than the tongue ring value, that is, the immediate delivery management is performed according to the management policy, or the H-signal is checked afterwards. If the risk index L is released after the system is backed up, ▲, 儿月Knowing the specific technical content and working principle of the present invention, the design has at least the following advantages and features: "::_Easy to manage the audit: The present invention can be used for information flow and personnel use τ statistics' except for the responsible person* The supervisor conducts audits and can understand the effectiveness of the content management through the > and the table. The system administrator can refer to the actual results report, adjust the content management policy and the system settings. The internal management policy. After the company has established the content management policy, :Needle: Set the content filtering and processing status for all or groups. At the same time, the content of the information flow is checked one by one against the intellectual classification database, and the calculation and verification of the risk index are carried out. —. Positive management results··After this issue, if the funds do not know the monthly government and the mechanism to filter out the information:: content, direct release and leave the system; if the check is performed separately, the risk deductions are the same The swearing-off value is based on the management policy, etc., and intercepts the information flow, and will perform the entry review, or notify the approval of the h = action. For the information flow with high (four) ring value, the report will be checked and checked. For the whole, the risk assessment can be provided: for individual personnel management, it can be used as a report of abnormal use behavior: 'The invention can indeed enforce strict information flow for the enterprise: Spoon content management; in the 'business secrets or key information technology to protect the company's own rights and improve consumers; t, so it has outstanding technical characteristics and apparently pay and invent the patent requirements,提起 File an application in accordance with the law. [Simplified description of the drawing] = A diagram is a schematic diagram of the installation position of the system of the present invention. The second figure is a block diagram of one of the systems of the present invention. /·, a picture is a schematic diagram of the composition of the backup module of the present invention. The fourth figure is a schematic diagram of the composition of the intellectual classification database of the present invention. The fifth figure is a block diagram of still another system of the present invention. [Main component symbol description] (1 〇) multi-communication 埠 content risk management application system (1 1 ) backup module (1 1 1 ) classification database 1293161

(1 2 )智識分類資料庫 (1 2 1 )樣本庫 (1 3 )檢查過濾模組 (1 2 2 )語料庫 (1 2 3 )内容使用行為特徵庫 (2〇)防火牆 (3〇)網路設備 11(1 2) Intellectual Classification Database (1 2 1) Sample Library (1 3) Check Filter Module (1 2 2) Corpus (1 2 3) Content Usage Behavior Feature Library (2〇) Firewall (3〇) Network Road equipment 11

Claims (1)

1293161 、申請專利範圍 1 · -種多通訊痒内容風 : 万去,包括下列步驟 把即將送入或送出的 義的内容屬性予以分類儲存; 73亚根據預先定 根據預設的内容特徵條件對備 對· 勺一貝汛▲進行檢核比 根據前述比對結果定義眘、ώ 我貝5fU丨L的風險指數, 險指數高低決定攔截或放行。 JL根據風 〜二如:!:利範圍第1項所述之多通訊埠内容風險 官理刀冰,_谷特徵條件係根據至少—個樣本庫作' 較依據,該樣本庫係運用音 厂庫作為比 的學習範本,並經過自動學習 庫 特徵。 卞取出各類樣本庫的樣本 其理=如!請專利範圍第2項所述之多通訊埠内容風險 …該文意解析技術係採用文字探勘(TextMining) 2、’ h申請專利範圍第^所述之多通料内容風險 g理方法,該内容特徵 保件係根據至少一個語料庫作為比 車父依據,該語料庫得、土軍# ,、用内谷解析及關鍵語詞萃取原理, 收市電子郵件及不當資 A 〜Μ 1 防,口的内谷範本,以萃取出各類 5口科庫的樣本特徵 、 卫依官理目的,應用為管理參考之決 朿支挺資料庫。 5 ·如申請專利範圍第1項所述之多通訊埠内容風險 12 !293161 營古'+ 万法’該内容特徵條件係 特徵庫作為比'、乂象至夕一個内容 …下為比較依據,該内容使用 仃為 喊祭資訊流内容的使用行 /',、、铽庫,係將企業 種特被分別定義其風險指數。 刀祈並對母一 6 ·-種多通訊埠内容風險 ·· 主應用糸統,其包括有 一備份模組,係針對送人或 並予分類儲存; 出的貝矾 進行備份, 一智識分類資料庫,係針對企 使用行為炉外接士 建立内容特徵及 政樣本,作為内容管理之檢核比對依據; 欢查過濾模組,係根據智識分 樣本’對样飞刀頰貝枓庫建立的特徵 子仏知候組已備份之資訊流執 險指赵,-门 以为析其風 才曰數,右風險指數低則予放行,若 值則予攔截。 晶數同表一警戒 管理:用如申請專利範圍第6項所述之多通訊琿内容風險 六\糸統’該備份模詛包含複數的分類資料庫,以分 ’=存經過備份及分類的資訊流。 爲8如申睛專利範圍第6項所述之多通訊埠内容風險 官理應用系統,該智識分類資料庫至少包括有: 與抑一樣本庫,係運用文意解析技術,收集各類過濾庫的 子白fe本,亚經過自動學習,萃取出各類樣本庫的樣 徵; 可 隹“ °°料庫’係運用内容解析及關鍵語詞萃取原理,收 亦電子郵件及不當資訊防治的内容範本,以萃取出各類語 13 I293l6l 料庫的樣本特徵; .如申請專利範圍第8項 管理應用系統,該内容…… 料内♦風險 使用盯為特彳政庫依管理目的,經 、’先整理應用為「顧玄關备 μ *、 顧各關係決朿支援資料庫」、「風險防範1293161, the scope of patent application 1 · - Multi-communication itch content wind: 10,000 to go, including the following steps to classify and store the content attributes of the right to be sent or sent; 73 ya according to the preset content characteristics Checking the spoon 一 汛 汛 ▲ According to the above comparison results, the risk index is defined, and the risk index of the 5fU丨L is determined. The risk index determines the interception or release. JL according to the wind ~ two like:! : The multi-communication content mentioned in item 1 of the profit range is the official risk knife, and the _ valley characteristic condition is based on at least one sample library, which uses the sound factory library as a learning model. After learning the library features automatically.卞Retrieve the samples of various sample banks. If you want to! Please refer to the multi-communication content risk mentioned in item 2 of the patent scope... The text analysis technology uses text mining (TextMining) 2. 'h apply for the patent scope. The multi-content content risk method is based on at least one corpus as a basis for the parent, the corpus, the corpus, the inner valley analysis and the key word extraction principle, the closing email and Improper capital A ~ Μ 1 prevention, mouth of the valley model, in order to extract the sample characteristics of the five types of scientific research, Wei Yi official purpose, the application of the management reference to support the database. 5 · As described in the scope of patent application, the multi-communication content risk 12!293161 Yinggu '+ Wanfa' is characterized by a feature library as a comparison between ', 乂象至夕一... This content uses the usage line /', , and library of the content of the information stream, and defines the risk index of the enterprise type. Knife and mother-to-female multi-communication, content risk, main application system, including a backup module, for the delivery or classification, storage; The database is based on the use of behavioral furnaces to establish content features and political samples, as the basis for the comparison of content management; the check filter module is based on the wisdom of the sample 'sample flying knife cheek shell library The traits of the 仏 仏 仏 仏 已 已 已 已 已 已 已 已 已 , , , , , , , , , , , , , , , , , , , , , , , , , , , , The number of crystals is the same as that of Table 1. The use of the multi-communication content as described in item 6 of the scope of the patent application, the content risk six, the backup model contains a plurality of classification databases, which are divided into '= stored and backed up Information flow. For example, the multi-communication content risk application system described in item 6 of the scope of the patent application scope includes at least the same library as the same, and uses various semantic analysis techniques to collect various types of filtering. The sub-feature of the library, the sub-automatic learning, extracts the sample of various sample banks; can be used in the "° ° library" using content analysis and key word extraction principles, collecting emails and inappropriate information prevention and control content Fanben, to extract the sample characteristics of the 13 I293l6l library of various languages; If the patent application scope 8 management application system, the content... ♦ risk use stare for the special management of the government, the purpose, First, organize the application as "Gu Xuan Guanbu μ *, Gu Yu relationship support database", "risk prevention 決朿支援資料庫 Γ Μ Μ结 早」 呂銷朿略決策支援資料庫」等決策 支援參考資訊。 10如申請專利範圍第8項所述之多通訊埠内容風 險管理方法’該文意解析技術係採用文字探勘(Text M i n i n g)技術。 十一、圖式: 如次頁Decision support database Γ Μ Early "Luxury Strategy Support Database" and other decision support reference information. 10 The multi-communication content risk management method described in claim 8 of the patent application scope. The textual analysis technology system adopts Text M i n i g technology. XI. Schema: as the next page 1414
TW094143117A 2005-12-07 2005-12-07 Method for content risk management of multiple communication ports and knowledge application and system therefor TW200723140A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW094143117A TW200723140A (en) 2005-12-07 2005-12-07 Method for content risk management of multiple communication ports and knowledge application and system therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW094143117A TW200723140A (en) 2005-12-07 2005-12-07 Method for content risk management of multiple communication ports and knowledge application and system therefor

Publications (2)

Publication Number Publication Date
TW200723140A TW200723140A (en) 2007-06-16
TWI293161B true TWI293161B (en) 2008-02-01

Family

ID=45067752

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094143117A TW200723140A (en) 2005-12-07 2005-12-07 Method for content risk management of multiple communication ports and knowledge application and system therefor

Country Status (1)

Country Link
TW (1) TW200723140A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI841061B (en) * 2021-11-25 2024-05-01 皓德盛科技股份有限公司 Transaction risk control device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI423152B (en) * 2007-07-12 2014-01-11 Chunghwa Telecom Co Ltd Intelligent digital audit record instant analysis method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI841061B (en) * 2021-11-25 2024-05-01 皓德盛科技股份有限公司 Transaction risk control device
TWI841062B (en) * 2021-11-25 2024-05-01 皓德盛科技股份有限公司 Risk control judgment device and transaction system

Also Published As

Publication number Publication date
TW200723140A (en) 2007-06-16

Similar Documents

Publication Publication Date Title
Wang et al. Cybersecurity incident handling: a case study of the Equifax data breach.
Johnson et al. A comparison of international information security regulations
Jiang et al. Compliance analysis of business information system under classified protection 2.0 of cybersecurity
TWI293161B (en)
Townend et al. Protecting sources and whistleblowers in a digital age
Flynn The e-policy handbook
Punda et al. The legal status and capabilities of cyber police in Ukraine: The reasons for the existence of frauds with the use of IT technologies
Busing et al. Computer forensics: The modern crime fighting tool
Moore The growing trend of government involvement in IT security
Hoskins Far Right> Digital Rights: The Precarity of Free Expression, Internet Access, Net Neutrality and Data Privacy in Bolsonaro’s Brazil
Ribeiro High-profile data breaches: Designing the right data protection architecture based on the law, ethics and trust
Maldoff et al. Essential Equivalence and European Adequacy after Schrems: The Canadian Example
Valackienė et al. The impact of cyber security management on the digital economy: multiple case study analysis
Dewan An Analysis of Digital Privacy Laws
Holm et al. Establishing proactive auditor responsibilities in relation to fraud: The role of the courts and professional bodies in Denmark
Breliastiti et al. Whistleblowing System: Alarm Transparency and BUMN Accountability
Zhao Reflections on Criminal Compliance for Corporate Personal Information Protection
Okenyi Meta: The Cost of Strict Data Privacy Regime in the Era of Technology-Driven Economy
Joel Choosing both: Making technology choices at the intersections of privacy and security
yixin Study on the current situation of information security and countermeasures in China
Kasl Cybersecurity of small and medium enterprises in the era of internet of things
Ogunade Beyond the Synthetic Veil: A Triple-Lock Framework for Neutralizing AI-Generated Death Hoaxes in Corporate Crisis Communication
Enoma Data breach in the travel sector and strategies for risk mitigation
U Vrabec et al. Data Localisation Measures and Their Impacts on Data Science
Morina et al. Collecting Evidence in Forensic Events and Comparison of the Digital Evidence Practices of Kosovo and Turkey

Legal Events

Date Code Title Description
MK4A Expiration of patent term of an invention patent