Data security operating system and method based on authority management and control

A technology of data security and operation method, applied in the field of information security, which can solve the problems of data damage, slow encryption and decryption speed, and impact of reading and writing speed.

Inactive Publication Date: 2013-02-13
WUXI CINSEC INFORMATION TECH
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Today, when the encryption algorithm is made public, the key acts as a key and a lock. Although major manufacturers say that the encrypted files are highly secure and how stable the encrypted products are, no one can tell if the original data has been changed through the algorithm. Under the circumstances, whether it will cause irreversible damage to the data during the conversion process of encryption and decryption, and the impact on the read and write speed when encrypting and decrypting data is also an unavoidable fact
It can be seen that in the actual implementation, the encryption and decryption speed is too slow, the file is damaged, the instability and other factors further indicate that the security technology needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security operating system and method based on authority management and control
  • Data security operating system and method based on authority management and control
  • Data security operating system and method based on authority management and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides a data security operating system based on authority control, such as figure 1 As shown, the data security operating system based on authority control includes: an identity recognition device 1, a client 2, a data collection center 3, and a data processing center 4; the identity recognition device 1 is used to collect and pre-operate users identity feature information; the client 2 is connected to the identity recognition device 1 to upload the user’s identity feature information and the user’s pre-operation information on the data; the data collection center 3 stores the identity features of all users information and its authority; the data processing center 4 is connected to the client 2 and the data acquisition center 3 respectively, and judges whether the user has authority to perform the operation information; if so, the user is allowed to perform the operation through the client information; otherwise, the identity recognition device will r...

Embodiment 2

[0048] This embodiment provides a data security operation method based on authority control, such as figure 2 As shown, the data security operation method based on authority control includes:

[0049] S1, the client uploads the operation information performed by the user on the data in advance.

[0050] S2, the data processing center judges whether the operation information needs permission determination; if not, order the client to directly execute the operation information; if necessary, execute step S3. Specifically, the operation information requiring permission determination described in step S2 includes adding, deleting, changing, viewing, taking screenshots, or / and copying files.

[0051] S3. The identity recognition device collects identity feature information of users who pre-operate on the data.

[0052] Further, the step S3 also includes: the data processing center judges whether the identity device has collected the user's identity feature information for the op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data security operating system and method based on authority management and control. The data security operating system comprises identification equipment, a client side, a data acquisition center and a data processing center, wherein the identification equipment is used for acquiring identity feature information of a user performing operation on data; the client side is connected with the identification equipment and is used for uploading the identity feature information of the user and information of the operation performed on the data by the user; the data acquisition center is used for storing identity feather information and authorities of all users; and the data processing center is connected with the client side and the data acquisition center respectively and is used for judging whether the user has the authority to perform the operating information or not, and if so, the user is permitted to perform the operating information through the client side, otherwise, the identification equipment is commanded to acquire the identity feather information of the user again. According to the invention, the identification equipment is used for acquiring the information of the user, the authority of the operation user is judged before the user performs the data operation, and only can the user meeting authority requirements perform the corresponding data operation, so that the data operation is managed, and the data are protected comprehensively.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a secure data transmission method, in particular to a data security operating system and method based on authority control. Background technique [0002] The wave of electronic informatization marked by computers, networks and mobile storage devices has covered all aspects of social life, greatly liberating productivity and improving the speed and effectiveness of information interaction. While informatization is fully covered, it also brings security problems, especially the illegal misuse of information, for example: employees sell documents to competitors, documents are illegally stolen, etc. In order to solve the above problems, products using encryption technology as a means are gradually becoming active. Today, when the encryption algorithm is made public, the key acts as a key and a lock. Although major manufacturers say that the encrypted files are highly secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62H04L29/06H04L9/32
Inventor 耿振民汪亮
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products