Approaches to protecting customer data in a multi-tenant environment
A customer data, multi-tenant technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of low security, difficult data backup and recovery, increase the amount of security development, etc., to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] see figure 1 , the method of protecting customer data in a multi-tenant environment adopts the method of cloud encryption storage + terminal decryption calculation; data is stored on the server, but stored in an encrypted manner; the key is stored in the hands of the user; data is processed on the user terminal, plus Decryption is also not performed on the server to prevent penetration attacks. The key in the user's hand is stored in USB and cannot be exported; the password can also be protected by allowing the user to manually input the password.
[0031] Such as figure 2 As shown, the tenant's access process through the APP includes the following steps:
[0032] a. The user submits an access request to the APP;
[0033] b. APP authenticates the user. After the user passes the authentication, the APP directs the DB database according to the user information; if the user is a new user, it applies to open a new DB database;
[0034] c. APP does not process data on ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 