Unlock instant, AI-driven research and patent intelligence for your innovation.

Security data processing method and system

A technology for secure data and processing methods, applied in the field of computer security, can solve the problems of reduced processing efficiency, inability to identify file feature information, and long update time, and achieve the effects of reducing maintenance costs, improving update efficiency, and reducing maintenance costs.

Active Publication Date: 2013-04-03
BEIJING QIANXIN TECH
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This method can ensure the security of the internal data of the enterprise. However, when the amount of data uploaded by the terminal to the security control server is large, or the number of concurrent uploads is large, the security control server often cannot respond quickly, which reduces the processing efficiency. In severe cases, It may even lead to problems such as the security control server being unable to respond
When there is no relevant file feature information in the security control server, it is impossible to identify the file feature information uploaded by the terminal. Therefore, this method has high requirements for the timeliness of the data in the security information database in the security control server.
In order to ensure effective and accurate identification of the feature information of the files uploaded by the terminal, the security control server needs to update the security information data in real time and quickly, but at present, it often needs to be realized by manual operation, or by comparing file features one by one. To achieve, the update takes a long time and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data processing method and system
  • Security data processing method and system
  • Security data processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] refer to figure 1 , showing the first embodiment of the secure data processing method of the present invention, including the following steps:

[0048] Step 101, receiving a data upload request from a terminal, and acquiring file characteristics included in the data upload request and an identification code of the terminal.

[0049] In the security control server of the private cloud system, identification codes of all terminals that perform data interaction with the security control server are stored in advance. Specifically, it may be stored in a configuration file, a relational table, and the like. Wherein, the identification code of the terminal may be a serial number of the terminal, a feature code, etc., which can uniquely identify the terminal. The file feature may be the MD5 value of the file or other identification data that can identify the file.

[0050]When the terminal uploads data to the security control server, the data upload request will include the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a security data processing method, which comprises the following steps: receiving a data upload request from a terminal to obtain file features and an identification code of the terminal included in the data upload request; determining whether the terminal is a trusted computer according to the identification code of the terminal; if the terminal is a trusted computer, determining the trusted computer type of the terminal, and if the terminal is an automatic trusted computer, adding the uploaded file features to a security database; if the terminal is a manual trusted computer, obtaining the file source of the file features from the data upload request of the terminal; and if the source is a security control server, adding the uploaded file features information to the security database, otherwise not adding the uploaded file features information to the security database. The invention also provides a security data processing system for implementing the above method. The security data processing method and system can increase the security data updating efficiency.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a security data processing method and system. Background technique [0002] Private cloud is a computer security system deployed separately for enterprises, which can effectively guarantee the security of internal data. Generally speaking, in a private cloud system, the client uploads the feature information of the file that cannot be identified locally to the server, and the server identifies the file feature information through the internally stored security information database, and transmits the identification result to the client. Realize the security management of internal data. [0003] This method can ensure the security of the internal data of the enterprise, but when the amount of data uploaded by the terminal to the security control server is large, or the amount of concurrent uploads is large, the security control server often cannot respond quickly, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L67/06H04L63/20
Inventor 温铭李宇胡劲张家柱
Owner BEIJING QIANXIN TECH