Data processing method, device and system, trusted computing device, appartus and medium

A technology of trusted computing and data processing, applied in the field of data processing, to achieve the effect of ensuring reliability and security

Active Publication Date: 2019-08-02
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the processing method of the data center also has certain defects: all data to be processed must be stor...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and system, trusted computing device, appartus and medium
  • Data processing method, device and system, trusted computing device, appartus and medium
  • Data processing method, device and system, trusted computing device, appartus and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] figure 2 It is a flow chart of a decentralized data processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to data processing, especially applicable to one or more of the decentralized data system architectures. Scenarios in which multiple trusted computing devices, multiple data centers, and data users interact with each other to process data, so as to solve the existing contradictory data processing methods based on data centers. The technical solution of the embodiment of the present invention is executed by a trusted computing device, wherein the trusted computing device implements a trusted computing environment based on hardware. The method can be executed by a decentralized data processing device, which can be configured in a computing device of a trusted computing device, and implemented in the form of hardware and / or software. see figure 2 , the method specifically includes:

[0056] S210. Receive a data analysis...

Embodiment 2

[0077] image 3 It is a flow chart of a decentralized data processing method provided in Embodiment 2 of the present invention. This embodiment is based on the above embodiments, and in the case where the decentralized data processing system architecture includes a blockchain network , for further optimization. see image 3 , the method specifically includes:

[0078] S310. Receive a data analysis request initiated by a data user.

[0079] S320. According to the data analysis request, read at least one piece of data required for analysis from one or more data centers to the trusted storage space of the trusted computing device.

[0080] S330, verifying the read data based on the data fingerprint of each piece of data stored in the blockchain network.

[0081] In this embodiment, the data fingerprint is an anti-counterfeiting signature method, which has a unique effect; for each piece of data, it can be divided into different unit data granularities according to actual need...

Embodiment 3

[0096] Figure 4 It is a flow chart of a decentralized data processing method provided in Embodiment 3 of the present invention. This embodiment is further optimized on the basis of the foregoing embodiments. see Figure 4 , the method specifically includes:

[0097] S410. Receive a data analysis request initiated by a data user.

[0098] S420. According to the data analysis request, query whether the data required for analysis exists in the trusted storage space.

[0099] In this embodiment, for the data read into the trusted storage space, the trusted storage space needs to be cleared due to the limitation of the trusted storage space usage policy. For example, when the trusted storage space is full, clear the data to release the trusted storage space Therefore, when the trusted computing device needs the read data again, it needs to read the data from the data center again; if there is data that needs to be used in the trusted computing device, it can be used directly wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method, device and system, a trusted computing device, appartus and a medium. The method is executed by a trusted computing device. The trusted computing device realizes a trusted computing environment based on hardware, and the method comprises the following steps: receiving a data analysis request initiated by a data user; according tothe data analysis request, reading at least one piece of data required by analysis from one or more data centers to a trusted storage space of the trusted computing device; analyzing and processing the read data based on an analysis algorithm running in the trusted computing device according to the data analysis request to generate a processing result, and storing the processing result in the trusted storage space; and feeding back the processing result to the data user. Through the technical scheme provided by the embodiment of the invention, the data joint analysis and processing can be realized and credibility and safety of the data analysis and processing process can be ensured.

Description

technical field [0001] Embodiments of the present invention relate to data processing technologies, and in particular, to a data processing method, device, system, trusted computing device, equipment, and medium. Background technique [0002] In the era of big data, all kinds of raw data and secondary processed data are intangible assets with economic value. Various types of enterprise users can provide some data themselves, but also need other enterprise users to share some data, so data centers have emerged. Various users provide their own data to the data center for payment or free trial by other users. [0003] In a data center, data is processed centrally. Not only can it be conveniently shared, but it can also perform joint analysis and processing based on multiple data, which greatly improves the ability and efficiency of data processing, and also provides richer data processing methods. [0004] However, the processing method of the data center also has certain de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/22G06F16/27G06F16/245
CPCG06F16/22G06F16/27G06F16/245
Inventor 肖伟
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products