Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security access method, device, terminal equipment and readable storage medium

A technology for secure access and data, applied in the field of network communication, which can solve problems such as data leakage and illegal use

Active Publication Date: 2021-03-02
中移动信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a method, device, terminal equipment and readable storage medium for secure access to data, aiming to solve the problem of offline data transmission in the prior art, which may easily cause data leakage and be used illegally question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access method, device, terminal equipment and readable storage medium
  • Data security access method, device, terminal equipment and readable storage medium
  • Data security access method, device, terminal equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] refer to figure 1 , figure 1 It is a schematic structural diagram of a terminal device in a hardware operating environment involved in the solution of the embodiment of the present invention.

[0054] Such as figure 1As shown, the terminal device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), and an input unit such as a keyboard (Keyboard) or a mouse (Mouse). Optionally, the user interface 1003 may also include a standard wired interface or a wireless interface. Optionally, the network inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security access method, device, terminal equipment and readable storage medium. In the present invention, when the data requesting agency needs to access the data provided by the data providing agency, the data requesting agency makes a matching field of the first data stored locally with a matching field of the second data obtained from the responding data providing agency. Intersect to get a complete matching field data set, and then transmit the matching field data set to the secure directory in the trusted execution environment, so that the trusted execution environment can The field obtains and stores the data corresponding to each matching field from the pre-built data exploration consortium chain, so that the data requesting agency can directly access the data corresponding to each matching field stored in the trusted execution environment without copying. Data transmission avoids data leakage and illegal use.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a data security access method, device, terminal equipment and readable storage medium. Background technique [0002] With the development of network communication technology, data access based on the network becomes more and more convenient. However, while it is convenient for users to access data, many network problems have also appeared, such as server attacks, data leakage and other problems have become more and more serious. Therefore, in order to protect their core data from being attacked and leaked, various enterprise organizations usually set up various firewalls and even do not connect to the Internet. Based on security considerations, different enterprise organizations usually desensitize sensitive data when performing data sharing and access operations, and then encrypt, copy, transmit, and use the desensitized data. [0003] However, in the pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218G06F2221/2141H04L63/04H04L63/10
Inventor 刘钦根陈吉韩建安桂家海许可
Owner 中移动信息技术有限公司