Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operator data security sharing method

A technology for data security and operators, applied in secure communication devices, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as loss, terminal hardware loss, Trojan horse virus theft, etc., and achieve fine-grained permissions , The effect of facilitating targeted management

Pending Publication Date: 2020-08-18
狄光
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in order to facilitate the query and analysis of Internet applications, the operator side needs to share the collected user data, which makes the protection of user privacy data limited in the existing technical solutions
Under normal circumstances, the operator usually only performs irreversible Hash processing (such as MD5) on the user's online account, and sensitive data such as the user's access history and search history are still processed in plain text, which is not conducive to the protection of user privacy.
[0004] In terms of data security of user terminals: terminal data can be operated by any person, there are problems such as Trojan horse virus theft of data, loss of terminal hardware problems, and personnel's initiative to leak secrets, etc., which may cause serious losses
[0005] In terms of internal data transfer security: data network theft may exist during the data exchange process, and misoperations may lead to wrong delivery, posing threats to business data
[0006] In terms of data off-network and outgoing security: After the data leaves the internal environment, the data cannot be effectively controlled, and anyone who has access to the data can spread it, and there is a risk of secondary leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operator data security sharing method
  • Operator data security sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Please refer to figure 1 , the present embodiment provides a method for safely sharing operator data, including the following steps:

[0038] S10: Map the end user IP with the encrypted online account, and continuously extract the user's real-time network access behavior;

[0039] S11: Obtain the user's access behavior data, evaluate the privacy level of the behavior data, classify and label the data according to the privacy level to obtain multiple data files, and if the privacy level of the data file is greater than the preset level, then the data file Encrypt and store to obtain encrypted data files;

[0040] S12: Perform permission verification if it is detected that the user uses the encrypted data file.

[0041] Design principle: After long-term research and practice, the inventor found that in the existing technology, in order to facilitate query and analysis, the operator needs to share the collected user data, which is not conducive to the protection of user ...

Embodiment 2

[0047] Please refer to figure 2 , the difference between this embodiment and Embodiment 1 is that a method for safely sharing operator data further includes setting: a security management and control center server, an authority authentication server, an encryption and decryption interface server, a user authentication interface server, and a database server; the security management and control center There are multiple servers, and the present embodiment is preferably provided with 2, which are respectively a security management and control center server 1 and a security management and control center server 2. Switch 1 and switch 2 are connected, and switch 1 and switch 2 are connected to the network through a firewall. The security management and control center server is used to manage encrypted data files, and the management includes hierarchical user rights management. The purpose of such setting is to improve the security management capability of the operator's core data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operator data security sharing method, which relates to the technical field of operator data application, and comprises the following steps of: mapping an IP of a terminal user and an encrypted Internet account, and continuously extracting a real-time network access behavior of the user; obtaining access behavior data of the user, performing privacy level evaluation on the behavior data, classifying the data according to privacy levels and labeling the data to obtain a plurality of data files, and if the privacy levels of the data files are greater than a preset level, encrypting and storing the data files to obtain encrypted data files; and if it is detected that the user uses the encrypted data file, performing authority verification. The data are encrypted onthe operator side, so that the relationship between the file and the operator is established, the authority is refined, the targeted management is facilitated, and the problem that in the prior art, the plaintext processing on the data is easy to leak and influence is solved. The security management capability of core data of an operator is improved, and the loss brought to the operator is reduced.

Description

technical field [0001] The invention relates to the technical field of operator data application, in particular to a method for safely sharing operator data. Background technique [0002] With the development of the Internet, the data traffic of operators is increasing. Usually, operators will split and back up users' online data for query and use. The solution in the prior art generally provides an interface for downloading user data, and the data is transmitted in the form of ordinary files, and the data includes user account data and http stream data. [0003] However, in order to facilitate the query and analysis of Internet applications, the operator side needs to share the collected user data, which makes the protection of user privacy data limited in the solutions of the prior art. Under normal circumstances, the operator usually only performs irreversible Hash processing (such as MD5) on the user's online account. Sensitive data such as the user's access history and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L63/10H04L63/0407H04L63/0428H04L63/1425H04L63/1416H04L63/083H04L67/02H04L9/0643
Inventor 狄光
Owner 狄光
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products