Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for improving security of private data in open service

A private data and business technology, applied in the field of data security, can solve the hidden dangers of private data security, private data leakage and other issues, and achieve the effects of improving security, preventing leakage, and good performance

Inactive Publication Date: 2009-05-20
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] It can be seen that in the open business of the prior art, there is no security processing for the private data. In this case, the private data is likely to be leaked to an untrusted third-party business, which brings about hidden dangers to the security of the private data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for improving security of private data in open service
  • A method for improving security of private data in open service
  • A method for improving security of private data in open service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0058] The method for improving the security of private data in open services of the present invention records in advance the mapping relationship between each user's private data and outgoing messages, and sets a security control strategy for private data in outgoing messages; When an outgoing message containing private data is sent, according to the mapping relationship between the private data and the outgoing message and the security control policy, the outgoing message is transmitted or not transmitted, or the outgoing message is sent to another trusted third party with the same capabilities as the third-party business. Three-party business.

[0059] The method of the present invention can be realized by setting a privacy data control unit in the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for increasing private data safety in an open service, which registers the image relations between user private data and the out information before hand and designs a safety control strategy of private data in the out information. When the open service needs to transmit the out message containing private data to the third party service, said out information is transmitted or not, or is transmitted to another reliable third party service having the same ability with it according to the image relations between the private data and the out information is transmitted or not, or is transmitted to another reliable third party service having the same ability with it according to the image relations between the private data and the out information and the safe control strategy.

Description

technical field [0001] The invention relates to data security technology in open services, in particular to a method for improving the security of private data in open services. Background technique [0002] At present, with the development of computer technology and telecommunication technology, in the fields of computer, telecommunication, etc., the problem of opening up related service capabilities in this field has been raised. [0003] In the computer field, various middleware technologies have appeared, so that software can be opened as a business (service), and its capabilities can be used by users or other programs very conveniently. Such as CORBA object, Web service and Grid service, etc., they are deployed on the network, can accept the visit of other local or remote programs, perform corresponding processing and return the result. [0004] In the field of telecommunications, the next-generation network takes the softswitch at the control layer as the core, and ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 杨放春邹华苏森于晓燕孙其博徐鹏龙湘明李静林
Owner BEIJING UNIV OF POSTS & TELECOMM