Unstructured data protection method based on cloud storage technology

An unstructured data and unstructured technology, applied in electrical components, transmission systems, etc., can solve problems such as complex authority management, difficult implementation by enterprises, and difficult tracking

Inactive Publication Date: 2015-03-25
SHANGHAI BAOSIGHT SOFTWARE CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there is no perfect protection method for the protection of unstructured data. At present, the only methods are to achieve similar effects through other technical means. The limitations and deficiencies of the current technical means will be analyzed one by one below:
The main problems of this solution include: firstly, there are restrictions on document types, and it is impossible to protect all types of documents; secondly, authority management is complicated and difficult to implement in enterprises; thirdly, it is impossible to prevent authorized users from actively leaking secrets, and it is also difficult track

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unstructured data protection method based on cloud storage technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0034] The present invention effectively links terminal security, data security, and cloud storage security, uses virtual mounting technology to generate secure disks on user terminals, and ensures that only legal personnel can create secure disks through compliant terminals, and through secure disks and cloud storage Perform real-time synchronization to provide full-cycle, full-process, and full-level protection for all protected unstructured data.

[0035] The unstructured data protection method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unstructured data protection method based on a cloud storage technology. According to the unstructured data protection method, terminal security, data security and cloud storage security are effectively linked. A security disk is generated on a user terminal by adopting a virtual mounting technology, and only legal personnel can create the security disk through a compliant terminal. Real-time synchronization is performed through the security disk and cloud storage, so that complete-period, complete-flow and complete-level protection is provided for all protected unstructured data.

Description

technical field [0001] The invention relates to a data protection method, in particular to an unstructured data protection method based on cloud storage technology, and is especially suitable for enterprises and institutions that have an internal local area network and need to protect unstructured data inside the enterprise from leakage. Background technique [0002] Traditionally, information security is considered only the security of network systems or computers, often ignoring data security. Unstructured data, as an important information asset of an enterprise, often contains huge economic benefits and is the core competitiveness of an enterprise. Due to its monopolistic characteristics, it can often bring returns beyond the normal level to the enterprise. Because of this, unstructured data is very attractive to competitors, and it is very easy to lead to the phenomenon of stealing and misappropriating by improper means. Especially in the increasingly fierce global mark...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/1097H04L67/1095
Inventor 贾大智黄玉飞王斌斌
Owner SHANGHAI BAOSIGHT SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products