Security data processing method and system
A technology for secure data and processing methods, applied in the field of computer security, can solve the problems of reduced processing efficiency, inability to identify file feature information, and long update time, and achieve the effects of reducing maintenance costs, improving update efficiency, and reducing maintenance costs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] refer to figure 1 , showing the first embodiment of the secure data processing method of the present invention, including the following steps:
[0048] Step 101, receiving a data upload request from a terminal, and acquiring file characteristics included in the data upload request and an identification code of the terminal.
[0049] In the security control server of the private cloud system, identification codes of all terminals that perform data interaction with the security control server are stored in advance. Specifically, it may be stored in a configuration file, a relational table, and the like. Wherein, the identification code of the terminal may be a serial number of the terminal, a feature code, etc., which can uniquely identify the terminal. The file feature may be the MD5 value of the file or other identification data that can identify the file.
[0050]When the terminal uploads data to the security control server, the data upload request will include the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 