Enterprise data isolation method
A technology of enterprise data and business data, applied in the field of information management, can solve the problems of increasing the cost of system acquisition and ineffective utilization of resources, and achieve the effect of ensuring effective identification, improving utilization, and reducing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] In order to enable those skilled in the art to better understand the technical solution of the present invention, the present invention will be further described in detail below.
[0017] The present invention provides a kind of enterprise data isolation method, comprises the following steps:
[0018] Step 1. In the cloud data service system, user registration is performed with each enterprise user as a unit, and relevant basic information is uploaded to establish a separate database for enterprise users;
[0019] Step 2. When the user registers, add the key of the data identifier in the system, and generate a unique token identifier by encrypting the key. This identifier is used as the credential for the user to access the data, and every subsequent login, it will be deleted through the encryption algorithm of the key. Check whether the token is valid;
[0020] Step 3: Bring the token identifier into the relevant business functions used by the user, and store the toke...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More