Sensitive data security protection method and system based on shadow system

A sensitive data and security protection technology, applied in the field of data security, can solve the problem of low security of sensitive data, achieve the effect of improving security and data security

Active Publication Date: 2020-08-21
NINGBO TRANSMISSION & DISTRIBUTION CONSTR +4
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the existing problem of low security of sensitive data, provide a sensitive data security protection method and system based on shadow system, and improve the security of sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive data security protection method and system based on shadow system
  • Sensitive data security protection method and system based on shadow system
  • Sensitive data security protection method and system based on shadow system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0112] see figure 2 with Figure 5 , a sensitive data security protection system based on a shadow system, including a shadow system 1 and a real data access system 2, and the real data access system 2 includes a sensitive data identification module 21;

[0113] The shadow system is used to receive user read / write requests, and send user read / write requests to the real data access system;

[0114] The real data access system is used to receive user read / write requests sent by the shadow system; and identify whether the requested data is sensitive data or ordinary data through the sensitive data identification module; for ordinary data, directly return the result; for sensitive data, encrypt the sensitive data data, and determine the authority of the user;

[0115] If the user does not have access to sensitive data, deny the user access to sensitive data;

[0116] If the user only has read permission for sensitive data, return the address of the shadow page of the sensitive...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive data security protection method and system based on a shadow system. The sensitive data security protection method comprises the steps: transmitting a shadow systemuser read/write request o a real data access system; by the real data access system, identifting whether the request data is sensitive data or common data; for common data, directly returning a result; for the sensitive data, encrypting the sensitive data, and determining the permission of the user; if the sensitive data access permission does not exist, refusing the user to access the sensitivedata; if only the sensitive data reading permission exists, returning a shadow page address of the sensitive data to the shadow system; and if the sensitive data read-write permission exists, openinga trusted security area of the sensitive data, and responding to the shadow system. The invention further discloses a response system. According to the technical scheme, the security of the sensitivedata is improved based on the shadow system.

Description

technical field [0001] The invention belongs to the field of data security, and in particular relates to a sensitive data security protection method and system based on a shadow system. Background technique [0002] With the advent of the era of big data, the development of cloud computing and deep learning, more efficient data processing technology brings higher productivity, but also triggers a security crisis on how to ensure data security. Especially for enterprises such as the State Grid that are involved in the lifeline of the national economy and national energy security, once a data leak occurs, it will inevitably bring great losses to the country and the people. Therefore, data security has become an indispensable part of the national smart grid plan, and how to ensure the data security of the national grid has attracted more and more attention from researchers. [0003] At present, the security protection schemes for large amounts of data in power companies are no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/64G06F21/31
CPCG06F21/6218G06F21/604G06F21/64G06F21/31G06F2221/2141
Inventor 夏洪涛卞蓓蕾王彬栩李鹏杨跃平王辉华杨扬王猛徐重酉叶楠苏建华赵剑叶斌琚小明潘富城胡妙于晓蝶张朋飞刘宇冉清文章宏娟朱振洪
Owner NINGBO TRANSMISSION & DISTRIBUTION CONSTR
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products