Big data security management method and system

A security management and big data technology, applied in the field of big data security management methods and systems, can solve problems such as increasing the security risk of users' personal information, and achieve the effect of strengthening security protection and avoiding public circulation

Inactive Publication Date: 2016-12-21
周奇
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, user personal information is an important part of big data. H

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data security management method and system
  • Big data security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below, in conjunction with accompanying drawing and specific embodiment, the present invention is described further:

[0033] see figure 1 , the present invention provides a big data security management method, which is mainly applied to a big data platform, and the big data platform performs data interaction with a client to prevent leakage of user information, specifically including the following steps:

[0034] S1: Receive user data and privacy setting requirements, and generate a user ID corresponding to the user data according to the source of the user data; the user data includes several logical modules;

[0035] The big data platform can receive user data sent from external third-party systems and store these user data. When third-party systems send user data, some of them will follow the user data to send privacy setting requirements. The privacy settings here The specific requirement means that some logic modules in the user data need to be encrypted and prote...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data security management method and system. The method comprises the following steps of receiving user data and privacy setting requirements, and generating a user identification corresponding to the user data according to the source of the user data, wherein the user data comprises a plurality of logic modules; encrypting the corresponding logic module according to the privacy setting requirements; receiving an access request of a user side, wherein the access request comprises screening conditions; screening out the user data conforming to the screening conditions from all user data as target data; taking the user identification corresponding to the target data as an anonymous identification; and sending the anonymous identification and the target data to the user side. According to the method and the system, some logic modules can be encrypted according to the user needs, and the user identification sent to the user side is anonymous, so that the public circulation of personnel information is avoided and the security protection of the user information is enhanced.

Description

technical field [0001] The invention relates to the field of big data, in particular to a big data security management method and system. Background technique [0002] Big data is a strategic resource that plays an increasingly important role in today's social and economic development. Optimizing the big data environment can bring huge economic benefits to enterprises. While big data is centrally processing and storing massive amounts of data, its security issues are also facing increasing challenges. At present, user personal information is an important part of big data. However, big data increases the security risk of user personal information. Contents of the invention [0003] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a big data security management method, which can strengthen the security protection of big data and ensure the security of users' personal information. [0004] The second object o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0407H04L63/0807H04L63/10H04L67/146H04L67/60
Inventor 周奇
Owner 周奇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products