Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed data security application method, system and electronic equipment

A distributed data and security application technology, applied in the computer field, can solve the problem of data security and information confidentiality being difficult to be strictly and effectively guaranteed, and achieve data security and information confidentiality guarantee, avoid migration, data security and information confidentiality are strict and effective. Effect

Active Publication Date: 2021-08-13
英联(厦门)金融技术服务股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a distributed data security application method, system, and electronic equipment to solve the existing data application methods. After migration and concentration for the purpose of applying the data of the data ownership party, the existing data security and Information confidentiality is difficult to obtain strict and effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed data security application method, system and electronic equipment
  • Distributed data security application method, system and electronic equipment
  • Distributed data security application method, system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] In order to solve the problem that existing data security and information confidentiality are difficult to be effectively guaranteed after migration and centralization in order to achieve the purpose of applying the data of the data ownership party in the existing data application mode, the embodiment of this specification provides a distributed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed data security application method, system and electronic equipment. The method includes: the management node of the distributed data security application system sends a distributed computing request to the distributed data security application system according to the distributed computing request of the data application demand side. At least one computing node in the network sends a sub-calculation request, and feeds back the calculation result returned by the computing node to the data application demander. The sub-calculation request is used to request the computing node to call the target sub-model and the target data of the data owner for calculation. The target sub-model The model is obtained by splitting the overall computing model corresponding to the distributed computing request, and the target data is the data required for calculation of the target sub-model stored in the computing node; in response to the sub-computing request, the computing node calls The target sub-model and target data are calculated to obtain the calculation result, and the calculation result is returned to the management node. The method can strictly and effectively guarantee data security and information confidentiality in computing nodes.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a distributed data security application method, system and electronic equipment. Background technique [0002] At present, the prerequisite for the data requester to use the data of the data owner (or data provider) is to migrate (or transfer or deliver) the data stored in the server of the data owner to the server of the data requester. [0003] However, this data application method based on data migration has the defect that the data security and information confidentiality of the data owner cannot be guaranteed, and it needs to be improved urgently. Contents of the invention [0004] The embodiment of the present application provides a distributed data security application method, system, and electronic equipment to solve the existing data application methods. After migration and concentration for the purpose of applying the data of the data ownership party, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L12/24
CPCG06F21/6218H04L41/145
Inventor 郑明程
Owner 英联(厦门)金融技术服务股份有限公司