Method for protecting important data in Internet system

An important data and Internet technology, applied in transmission systems, electrical digital data processing, internal/peripheral computer component protection, etc., can solve problems such as encryption measures that are easy to be broken

Inactive Publication Date: 2018-12-07
江苏杜微育成科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the business becomes more complex, data may infiltrate each other in the business chain, resulting in data being stored multiple times in multiple places, and there may even be vulnerable points that are easily broken due to the lack of experience of the business responsible person and the adoption of weak encryption measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0014] Embodiment: a method for protecting important data in an Internet system, the method steps are as follows,

[0015] Step 1, establishing an important data access area in the Internet system, the important data access area provides unified important data access services; important data can be stored and kept in a unified manner.

[0016] The method of storing important data is as follows: After the user provides important data information, the user stores these important data information in the same data storage area, performs multi-layer encryption, stores them in the database, and returns the unique verification code of the important data.

[0017] The method of extracting important data is as follows: In the whole system, when the user needs to use important data, the unique verification code of important data is used first for identity verification and decryption of data information.

[0018] Step 2: Restrict the identity of the visitor to the centrally stored import...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting important data in an Internet system. The method includes the following steps that: an important data storage area is established in the Internet system and is used for providing a unified important data access service; and when a user inputs important data information, the data storage area will encrypt the uniformly stored important data and generates a unique authentication code, and when extracting the important data, a requester needs to authenticate his or her identity and decrypts the important data information through the unique authentication code.

Description

technical field [0001] The invention relates to a method for protecting important data, in particular to a method for protecting important data in an Internet system. Background technique [0002] With the development of Internet technology, the application of big data has become more and more extensive, and data information leakage accidents occur frequently. Important data is usually encrypted and protected by users in their respective business chains. For small systems, because the business is not complicated, it is usually easier for system maintainers to control each access point involving important data. As the business becomes more and more complex, data may infiltrate each other in the business chain, resulting in data being stored multiple times in multiple places, and there may even be vulnerable points that are easy to be breached due to the lack of experience of the business responsible person and the adoption of weak encryption measures. For complex systems, im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/602G06F21/78H04L63/0428H04L63/08
Inventor 唐宁
Owner 江苏杜微育成科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products