A data security protection method, device and service equipment

A technology for data security and service equipment, applied in the field of data processing

Active Publication Date: 2020-04-03
长沙豆芽文化科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is difficult for existing technologies to provide a comprehensive and reliable security protection mechanism for data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security protection method, device and service equipment
  • A data security protection method, device and service equipment
  • A data security protection method, device and service equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0081] The inventor found through investigation that most of the common security protection mechanisms provided for data transmission set verification keys at the receiving end / sending end, or encrypt the transmitted data, but these methods are less resistant to attacks and are easily attacked by Trojan horses. Or malicious program cracking, the reliability is poor, and most of these methods are based on the receiving end / data appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of data processing. Specifically, the present invention relates to a data security protection method and device and service equipment. According to the data security protection method, a target terminal can be determined from a complex data interaction scene based on a drive link and a response path of an APK program; the target terminal is prevented from being disguised through the virtual identifier; the comprehensiveness and the accuracy of determining the target terminal are improved; hypertext data is used as an analysis basis; the reliability of verifying the target terminal can be improved; the operation efficiency of the data crawler determined according to the hypertext data is ensured; the timeliness and reliability of safety protection can be realized based on the operation result of the data crawler; and when it is judged that the data environment index does not pass the verification, the security protection scanning task is issued to the current terminal, and the current terminal can execute the data cleaning action and the data load balancing action, and the data transmission risk caused by continuous connection with the target terminal is avoided, and the timeliness and reliability of data security protection are improved.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a data security protection method, device and service equipment. Background technique [0002] Nowadays, with the development of science and technology, data plays an increasingly important role in social production and life, and the era of big data has also ushered in. People's daily production and life can already be realized in the form of data. Big data provides us with many conveniences, but at the same time there are certain security risks. For example, in the era of big data, data transmission is one of the important means of information exchange. With the increase of data volume and the expansion of data scale, the security of data transmission is an urgent problem to be solved at this stage. However, it is difficult for existing technologies to provide a comprehensive and reliable security protection mechanism for data transmission. Contents of the inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/951G06F16/955
CPCG06F16/951G06F16/955H04L63/0428H04L63/306
Inventor 胡宇郭春林施欧君杨凯周自力
Owner 长沙豆芽文化科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products