Supercharge Your Innovation With Domain-Expert AI Agents!

Data processing method and device and computer readable storage medium

A data processing and data technology, applied in the field of data processing, can solve the problems of data leakage, affecting data storage, poor data distribution processing security, etc., to achieve the effect of improving security and preventing data leakage

Active Publication Date: 2021-08-13
SHENZHEN LONGRISE SCI & TECH
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing distributed data processing method (such as the patent of publication number CN105892953B) generally assigns a storage identification code to each independent storage device, and when receiving the data to be stored, generates a format corresponding to the storage identification code according to the data to be stored. Random number, the data to be stored is directly stored in the storage device corresponding to the storage identification code with the highest matching degree of the random number. When extracting, the data can be extracted by matching and verifying the storage identification code. However, this data processing method is easy to cause Data leakage and distributed data processing are less secure; in addition, this solution requires pre-classification of storage devices, which seriously affects data storage. Excessive reliance on physical pre-defined things does not reflect the superiority of software algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device and computer readable storage medium
  • Data processing method and device and computer readable storage medium
  • Data processing method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0103] refer to image 3 , image 3 It is a schematic flow chart of the second embodiment of the data processing method of the present invention. Based on the first embodiment, the steps of S40 above include:

[0104] Step S41, upon receiving the data extraction instruction sent by the terminal device, parsing the data extraction instruction to obtain the data access information in the data extraction instruction;

[0105] Step S42: Obtain the security level code of the data access information, the target storage identification code, and the identity information of the terminal device; determine the secret-related security level of the data to be extracted according to the security level code, and store it in the storage device of the distributed storage system Filter out the stored data with the same confidentiality security level as the data to be extracted.

[0106] In this example, refer to Figure 6 After the data processing device 02 receives the data extraction instr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and device and a computer readable storage medium, and the method comprises the steps: receiving a data processing request sent by a terminal device, and obtaining to-be-stored data and an encryption instruction; converting the to-be-stored data into ciphertext data, and generating a secret-related security level and an identity verification code of the ciphertext data, wherein the ciphertext data, the secret-related security level of the ciphertext data and the identity verification code of the ciphertext data are stored in an associated mode, and when a data extraction instruction sent by the terminal equipment is received, a target storage identification code, a security level code and identity information of the terminal equipment are determined according to the data extraction instruction; determining the confidential security level of the to-be-extracted data according to the security level code, and screening out storage data with the same confidential security level as the to-be-extracted data; and determining ciphertext data of the to-be-extracted data according to the target storage identification code and the screened storage data, and decrypting the ciphertext data to obtain viewable to-be-extracted data. According to the invention, the security of data distributed processing can be improved.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a data processing method, device and computer-readable storage medium. Background technique [0002] The existing distributed data processing method (such as the patent of publication number CN105892953B) generally assigns a storage identification code to each independent storage device, and when receiving the data to be stored, generates a format corresponding to the storage identification code according to the data to be stored. Random number, the data to be stored is directly stored in the storage device corresponding to the storage identification code with the highest matching degree of the random number. When extracting, the data can be extracted by matching and verifying the storage identification code. However, this data processing method is easy to cause Data leakage and distributed data processing are less secure; in addition, this solution requires pre-c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/31
CPCG06F21/31G06F21/602G06F21/6218
Inventor 连樟文蔡樊涌袁小欢张锐
Owner SHENZHEN LONGRISE SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More