Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data security processing method and system

A security processing and data technology, applied in the field of communication, can solve the problems of increasing the workload of the central node, reducing the efficiency of data security processing, damage, etc., and achieving the effect of improving the efficiency of security processing

Inactive Publication Date: 2021-07-23
龚明袖
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the development of cloud computing technology, the data volume of data resources used in cloud computing has increased rapidly, which greatly increases the workload of the central node, which reduces the security processing efficiency of the data of the central node, and the central node is generally far away from the user The equipment is far away, and the long-distance transmission of a large amount of data takes a long time, and it is easy to cause data loss, damage, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method and system
  • Data security processing method and system
  • Data security processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order for those skilled in the art to better understand the technical solutions of the present application, the technical solutions in the embodiments of the present application are clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only the present invention. Some, but not all, embodiments of the application. Based on the description of the embodiments of the present application, all other embodiments obtained by those skilled in the art without making creative efforts fall within the protection scope of the present application.

[0024] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data security processing method and system, and the method comprises the steps of receiving a to-be-processed image collected by a camera in real time, the to-be-processed image comprising M first image blocks; grouping the M first image blocks to obtain a first image block group, wherein the first image block group comprises at least one target image block, and the target image block is an image block comprising a target object; and encrypting the first image block group, and sending the encrypted first image block group to a cloud server. According to the invention, the target image block including the target object is extracted from the to-be-processed image, and only the target image block is encrypted and then transmitted to the cloud server, so that the security of the image data can be ensured while the processing workload of the cloud server is reduced, and the security processing efficiency of the data is improved.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a data security processing method and system. Background technique [0002] Cloud computing technology is a technology that unifies hardware, software, network and other sources and provides them to users through the network to realize data calculation, storage, sharing and other processing technologies. At present, when using cloud computing technology to realize safe processing of data, data resources can be uploaded to the central node in a centralized manner to realize specific data safe processing. Specifically, users can upload data resources used for cloud computing to the central node; when computing processing needs to be performed, users can send corresponding data security processing requests to the central node. After the central node receives the data security processing request, it searches for the data resources corresponding to the data sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06K9/46G06K9/62G06N3/04G06N3/08
CPCG06F21/602G06F21/6209G06N3/08G06V10/44G06N3/045G06F18/22
Inventor 龚明袖
Owner 龚明袖
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products