Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security protocol

A data security and protocol technology, applied in the field of data services, can solve problems that cannot meet the needs of big data analysis

Inactive Publication Date: 2019-05-28
王睿
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The rapid development of big data is also accompanied by huge challenges, including the problem of data modeling. One of the core contents of data analysis is data modeling. By analyzing the statistical and semantic characteristics of existing data, find out the laws, Then generalize it into an abstract data analysis model, and then provide a basis for data analysis. Big data analysis deals with massive data. Due to the existence of massive data, a single or a few model combinations in the past can no longer meet the needs of big data analysis. , building a model library composed of many models is an effective way to solve massive data analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following is a detailed description of the embodiments of the present invention: this embodiment is implemented on the premise of the technical solution of the present invention, and provides detailed implementation methods and specific operation processes. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention, and these all belong to the protection scope of the present invention.

[0015] like figure 1 As shown, a data security protocol includes a client 1, a server 2, a security computer 3, a data collection terminal 4, and a cloud data module 5 connected in sequence;

[0016] Wherein, described server module 2 comprises data analysis module 6, knowledge base 7, model base 8, database 9; Described data analysis module 6 is connected with knowledge base 7, model base 8 respectively; Described database 9 is connected with data analysis module respectively 6. The k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of data service. The invention particularly relates to a data security protocol. The cloud data module is Web data, business system data, sensing network data or scientific experiment data; a user information storage server and the user equipment are used for deducing the secret key according to the same parameters. The key associated with the algorithm is storedin a storage unit which is connected to the algorithm in a readable manner. A communication channel that is securely encrypted with the key is transmitted from a key carrier to the algorithm, where the key equivalent to the private key is transmitted to a security module in a certificate encrypted by the system private key, and the system public key is stored both in the security module and in the device.

Description

technical field [0001] The invention belongs to the field of data services, and in particular relates to a data security protocol. Background technique [0002] In order to discover knowledge from data and use it to guide people's decision-making, it is necessary to conduct in-depth analysis of data instead of just generating simple reports. These complex analyzes must rely on complex analysis models, which are difficult to express in SQL. Collectively referred to as in-depth analysis. Big data is characterized by its complexity, mass, low density, and rapid generation, making in-depth analysis of big data necessary to obtain useful information or intelligence. [0003] The rapid development of big data is also accompanied by huge challenges, including the problem of data modeling. One of the core contents of data analysis is data modeling. By analyzing the statistical and semantic characteristics of existing data, find out the laws, Then generalize it into an abstract dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 王睿
Owner 王睿