Data sharing methods to prevent data breaches

A data sharing and data leakage technology, applied in the information field, can solve problems such as difficult data separation, and achieve the effects of reducing the risk of data leakage, avoiding mutual influence, and preventing malicious calls

Active Publication Date: 2022-06-07
北京链道科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, considering factors such as laws and regulations, commercial interests, and risks brought about by direct data transmission on public links, it is difficult to directly separate data from data providers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing methods to prevent data breaches
  • Data sharing methods to prevent data breaches
  • Data sharing methods to prevent data breaches

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] figure 1 It is a flow chart of a specific implementation manner of the data sharing method for preventing data leakage of the present invention. like figure 1 As shown, the specific steps of the data sharing method for preventing data leakage of the present invention include:

[0046] S101: Build a data sharing system:

[0047] Deploy the management end node under the public network, set the management server Sever on it, and then deploy the data end node at each data provider. figure 2 It is the flow chart of data end node deployment. like figure 2 As shown, the specific steps of data end node deployment include:

[0048] S1.1: Apply for data end node:

[0049] The data provider applies to the management end node for a data end node. After the management end node is approved, the network access certificate tunnel-token is allocated to the data end node.

[0050] S1.2: Build data end nodes:

[0051] The data provider builds the data end node under the local pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data sharing method for preventing data leakage. A management end node is deployed on a public network, and a management server Sever is set on it, and then data end nodes are deployed on each data provider, and data access is set on it. Agent Agent, the application provider develops the data application program, deploys it to the data end node through the data access agent agent, the data access agent agent creates an account for the data application at the data source, and generates the corresponding data access credential ds‑token When making a data application call, the data access proxy Agent maps the data access credential ds-token to the account of the data application, uses the account to query data from the data source and returns it. The present invention deploys the data application to the data provider, and isolates the data application of the data application from the data source of the data provider by setting a data access agent, which can not only allow the data application to use data in compliance, but also reduce the risk of data leakage .

Description

technical field [0001] The invention belongs to the field of information technology, and more particularly, relates to a data sharing method for preventing data leakage. Background technique [0002] In the traditional mode, if the data user wants to use the data, the data provider needs to transmit its data to the data user. This mode requires compliance with laws and regulations and mutual trust between the two parties. However, in practical applications, considering factors such as laws and regulations, commercial interests, and risks brought about by the direct transmission of data on public links, it is difficult to directly separate data from the data provider. [0003] Taking into account the above reasons, the industry has begun to separate applications and data, and deploy applications to execute in an environment that the data provider can control (called "bring the code to the data"). privacy and security issues. However, in practical applications, how to build ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0281H04L63/0807H04L63/02H04L63/10
Inventor 陈虹冉峰丘志杰
Owner 北京链道科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products