Security detection method and device for computing task

A technology for computing tasks and detection methods, applied in the computer field, can solve problems such as data leakage, achieve the effect of security quantification, meet security requirements, and reduce complexity

Pending Publication Date: 2021-03-12
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and device for detecting the safety of computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and device for computing task
  • Security detection method and device for computing task
  • Security detection method and device for computing task

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] In the embodiment of the present invention, refer to figure 1 , which shows an architecture diagram of a privacy computing system provided by an embodiment of the present invention. The privacy computing system is used to obtain the computing tasks sent by the task initiator and the computing data sent by the data party, and the computing data and computing tasks are processed by the computing module Process and get calculation results.

[0027...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security detection method and device for a calculation task. The method comprises the steps of obtaining a target calculation task; preprocessing the target calculation task to obtain an atomic calculation task; detecting the data leakage probability of the target calculation task by utilizing the atomic calculation task and the preset judgment rule. According to the invention, the target calculation task can be preprocessed into at least one atomic calculation task, so the complexity of the target calculation task is reduced, the difficulty of determining the data leakage probability of a single atomic computing task is greatly reduced, the data leakage probability of the target computing task is further obtained according to the data leakage probability of all the atomic computing tasks, the safety of the target computing task is quantified, and the data leakage probability of the target computing task can be determined according to the data leakage probability of the target computing task; risk management and control of the target computing task are realized, the security requirement of the computing task is met, and the probability of data leakage is reduced.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a safety detection method and device for computing tasks. Background technique [0002] With the advent of the big data era, how to protect data security and prevent data leakage has become a major challenge, and privacy computing systems focus on solving data security and data leakage problems. [0003] At present, in addition to the security of the computing protocol itself, the privacy computing system needs to pay attention to the security of the computing tasks input into the system. Specifically, the privacy computing system can carry out corresponding security design in the computing process, such as, Use random numbers to cover or encrypt the original data to improve data security. [0004] In the process of realizing the present invention, the inventor found at least the following problems in the current solution: the current security design is relatively ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52G06F9/48
CPCG06F21/52G06F9/4881Y02D10/00
Inventor 王天雨
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products