Unlock instant, AI-driven research and patent intelligence for your innovation.

Data sharing method for preventing data leakage

A data sharing and data leakage technology, applied in the information field, can solve the problem of difficult data separation, and achieve the effect of reducing the risk of data leakage, precise control, and avoiding mutual influence.

Active Publication Date: 2021-08-03
北京链道科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, considering factors such as laws and regulations, commercial interests, and risks brought about by direct data transmission on public links, it is difficult to directly separate data from data providers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method for preventing data leakage
  • Data sharing method for preventing data leakage
  • Data sharing method for preventing data leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] figure 1 It is a flowchart of a specific implementation of the data sharing method for preventing data leakage in the present invention. Such as figure 1 As shown, the specific steps of the data sharing method for preventing data leakage in the present invention include:

[0046] S101: Build a data sharing system:

[0047] Deploy the management node under the public network, set the management server Sever on it, and then deploy the data node on each data provider. figure 2 It is a flow chart of data end node deployment. Such as figure 2 As shown, the specific steps of data end node deployment include:

[0048] S1.1: Apply for data end nodes:

[0049] The data provider applies to the management node for the data node, and after the management node passes the review, it distributes the network access certificate tunnel-token for the data node.

[0050] S1.2: Build data end nodes:

[0051] The data provider builds a data end node under the local private network,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sharing method for preventing data leakage, which comprises the following steps of deploying a management end node in a public network, setting a management server Sever on the management end node, deploying a data end node on each data provider, setting a data access agent on each data end node, developing a data application by an application provider, through deploying the data access agent to each data end node, creating an account for the data application at a data source and generating a corresponding data access credential ds-token by each data access agent, when a data user calls the data application, mapping the data access credential ds-token to obtain the account of the data application by the data access agent, and querying the data from the data source by using the account and returning the data. According to the data sharing method, the data application is deployed to the data provider, and the data application of the data application party and the data source of the data provider are isolated by setting the data access agent, so that the data application can use the data in a compliance manner, and the risk of data leakage is further reduced.

Description

technical field [0001] The invention belongs to the field of information technology, and more specifically relates to a data sharing method for preventing data leakage. Background technique [0002] In the traditional model, if the data user wants to use the data, the data provider needs to transmit its data to the data user. This model needs to be premised on compliance with laws and regulations and mutual trust between the two parties. However, in practical applications, considering factors such as laws and regulations, commercial interests, and risks brought about by direct data transmission on public links, it is difficult to directly separate data from data providers. [0003] Considering the above reasons, the industry has begun to separate applications and data, and deploy applications to execute in an environment controllable by the data provider (called "bring the code to the data"). This method can effectively avoid rights and interests arising from data transfer. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0807H04L63/02H04L63/10
Inventor 陈虹冉峰丘志杰
Owner 北京链道科技有限公司