Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System for preventing data information from being false and stolen

A data information and false technology, applied in the field of personal and enterprise data information security, can solve problems such as interception and abuse, security risks, personal information leakage, etc., to improve the awareness of security prevention, and the effect of data and information security is true and reliable.

Pending Publication Date: 2019-09-10
叶春林
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, it is known that with the development and progress of society and technology, computers, mobile phones and various networking products have increasingly become an indispensable part of people's work and life, but while they bring great convenience, It also caused us a lot of trouble. I believe everyone has personal experience. When you browse or search for something on your computer and mobile phone, related content and advertising windows will pop up on the page from time to time. What's more, through everyone The products you usually use and the workflow you have handled will also allow personal information to be obtained and leaked invisibly. The most basic rights and interests that should be enjoyed by privacy and confidential information are instead shown off with technology and equipment in this area, and used as profit-making tools and capital. We ordinary people are clearly aware of many current phenomena, which are obviously in violation of national laws and regulations. , but can only stand helplessly... As long as the data information of individuals or enterprises and institutions flows through electronic devices, it may be intercepted and abused at will. It is indeed a security risk hidden in the real society. Now the European Union The most stringent data law in history has been introduced, which clearly draws a benchmark red line that everyone must abide by, intending to severely punish and eliminate offenders. However, we know that no matter how strict regulations and policy requirements are, there will always be imperfections What's more, there will inevitably be problems of disconnection with reality in practice, because after all, the system and specific measures are two distinctly different things. In fact, there are still problems such as intentional crimes and unconscious touches that need to be treated differently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] Embodiment: A system for preventing false and stolen data information, which includes a data information subject, a data related party, a data control center, an authorization management platform, a centralized management platform, government departments and relevant functional departments; each data related party needs to Before intercepting any data information involving privacy and rights, it is necessary to declare to the authorized management platform or the centralized management platform the content, purpose and channel of the data information to be obtained. The standard rules supervise and review each data information, including the authenticity of internal circulation and media public information, and urge the related parties to use the data to obtain the authorization of the data information subject before they can use it, or specify the use period and cancellation conditions when authorizing, and regardless of Whether it is permitted to be used or not will be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for preventing data information from being false and stolen. The system comprises a data information main body, a data associated party, a data management and controlcenter, an authorization management platform, a homeward management platform, a government competent department and related functional departments; the structure is set in a manner that various advantageous resources can be flexibly implemented in an appropriate or step-by-step manner can be integrated, goods are verified, supervised, interactively authenticated or authorised layer by layer through interlinking, social strength is encouraged to participate in supervision and perfect management systems, so that the functional departments are enabled to perform work-keeping cooperative maintenance and self-conscious compliance with people; a highly-safe, unified and reliable standardized management and control protection net for the data information is constructed; the system can practicallyand effectively solve the problem that the data information is easy to be stolen illegally and falsely made, can be used for collecting and screening false and fake products and advertisements, fullyembodies fairness, creates an excellent atmosphere of safely and reasonably using the real data information, and is beneficial to integrity harmonious social health development.

Description

technical field [0001] The invention relates to the field of personal and enterprise data information security, in particular to a system for preventing false and stolen data information. Background technique [0002] At present, it is known that with the development and progress of society and technology, computers, mobile phones and various networking products have increasingly become an indispensable part of people's work and life, but while they bring great convenience, It also caused us a lot of trouble. I believe everyone has personal experience. When you browse or search for something on your computer and mobile phone, related content and advertising windows will pop up on the page from time to time. What's more, through everyone The products you usually use and the workflow you have handled will also allow personal information to be obtained and leaked invisibly. The most basic rights and interests that should be enjoyed by privacy and confidential information are i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/16G06F21/10G06F21/60G06F21/62
CPCG06F21/10G06F21/16G06F21/604G06F21/6218G06F21/6245
Inventor 叶春林
Owner 叶春林
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products