Data access method, device, system, electronic device and computer readable medium

A data access and data system technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as inability to ensure data privacy, information leakage, and potential safety hazards, and achieve the effect of ensuring access security

Active Publication Date: 2022-05-17
TAIKANG LIFE INSURANCE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, the user accesses the image data stored in the insurance company's intranet through the user name and password. Once the user name and password are leaked, there will be a security risk of information leakage.
In addition, each user can access the image data stored in the intranet, so that each user can view the data of other users, which cannot ensure the privacy of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method, device, system, electronic device and computer readable medium
  • Data access method, device, system, electronic device and computer readable medium
  • Data access method, device, system, electronic device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus their repeated descriptions will be omitted.

[0041] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or mor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to a data access method, device, system, electronic equipment and computer readable medium. The method includes: performing first verification on the enterprise platform through a first user name and a first password, and obtaining first verification data; performing verification on an auxiliary verification platform through a second user name, a second password and the first verification data. The second verification is to obtain second verification data; generate a data access request through the identification of the second verification data and target data; and obtain a return result based on the access request. The data access method, device, system, electronic equipment and computer-readable medium involved in the present disclosure can ensure the security of data access in the system.

Description

technical field [0001] The present disclosure relates to the field of computer information processing, in particular, to a data access method, device, system, electronic equipment and computer readable medium. Background technique [0002] In order to ensure the security of the system, when the user wants to use the data in the system, it is an important measure to ensure the security of the system to verify the user. Most systems will enable data access permissions for users after the user is authenticated. For systems with a large number of agencies, the problem of insecurity often comes from the leakage of user names and passwords. Moreover, different users may need to upload their own data to the system. How to prevent the data of different users from leaking each other and ensure their privacy is also an important issue. [0003] Especially in the field of insurance, each user enters policy information into the insurance company system through the external network, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/105H04L63/083H04L63/0884H04L63/0815
Inventor 孟淑玲
Owner TAIKANG LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products