Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information operation and maintenance service knowledge sharing method based on trusted computing of big data

A trusted computing and knowledge sharing technology, applied in the field of information sharing, can solve the problems of poor timeliness and security of knowledge sharing in information operation and maintenance services, and the inability to safely and quickly realize shared information storage and release of shared information, etc.

Active Publication Date: 2016-11-23
广州同构信息科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The information operation and maintenance service knowledge sharing method in the related technology cannot safely and quickly realize the storage and release of the shared information, which makes the timeliness and security of the information operation and maintenance service knowledge sharing poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information operation and maintenance service knowledge sharing method based on trusted computing of big data
  • Information operation and maintenance service knowledge sharing method based on trusted computing of big data
  • Information operation and maintenance service knowledge sharing method based on trusted computing of big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance knowledge security storage, information operation and maintenance knowledge security access and trustworthiness assessment;

[0062] The safe storage of the information operation and maintenance knowledge includes the following steps:

[0063] Step 101 When the storage user submits a storage request for operation and maintenance information knowledge security service knowledge, perform security verification on the storage user's identity;

[0064] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of information operatio...

Embodiment 2

[0083] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance knowledge security storage, information operation and maintenance knowledge security access and trustworthiness evaluation;

[0084] The safe storage of the information operation and maintenance knowledge includes the following steps:

[0085] Step 101 When the storage user submits a storage request for operation and maintenance information knowledge security service knowledge, perform security verification on the storage user's identity;

[0086] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of information operatio...

Embodiment 3

[0121] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance knowledge security storage, information operation and maintenance knowledge security access and trustworthiness assessment;

[0122] The safe storage of the information operation and maintenance knowledge includes the following steps:

[0123] Step 101 When the storage user submits a storage request for operation and maintenance information knowledge security service knowledge, perform security verification on the storage user's identity;

[0124] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of information operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information operation and maintenance service knowledge sharing method based on trusted computation of big data. According to the method, a trusted degree assessment mechanism and a trusted relationship transfer mechanism are built on the basis of characteristics such as protective function, authentication, integrity measurement and the like; the method comprises steps as follows: secure storage of information operation and maintenance knowledge, secure access of information operation and maintenance knowledge as well as trusted evaluation, wherein the secure storage of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of a stored user; (2), preprocessing information operation and maintenance service knowledge data; (3), performing encoding; (4), performing abstract concentration on hardware storage resources, mapping the resources to an integrated and unified resource pool, and virtualizing a user operating system; (5), storing the information operation and maintenance service knowledge data into the resource pool in a final code form; the secure access of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of an access user; (2), reading the information operation and maintenance service knowledge data stored on the resource pool. With the adoption of the method, barrier-free sharing can be realized, memory footprint is reduced, the data calling speed is increased, and the security of information operation and maintenance service knowledge sharing is improved on the premise that the convenience is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information sharing, in particular to a knowledge sharing method for information operation and maintenance services based on trusted computing of big data. Background technique [0002] The information operation and maintenance service knowledge sharing method in the related art cannot safely and quickly realize the storage and release of the shared information, which makes the timeliness and security of the information operation and maintenance service knowledge sharing poor. [0003] Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Information security has four aspects: equipment security, data security, content security and behavior security. Behavioral security includes: the confidentiality of behavior, the integrity of behavior, the authenticity of behavio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F3/06G06F21/31G06F21/32G06F21/78
CPCG06F3/061G06F3/0622G06F3/0637G06F3/0638G06F3/067G06F21/31G06F21/32G06F21/602G06F21/604G06F21/606G06F21/6218G06F21/78
Inventor 陈祖斌谢铭胡继军翁小云袁勇邓戈锋莫英红谢菁张鹏唐玲丽黄连月陈勇銘贺冠博苏宇琦林孔升
Owner 广州同构信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products