Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for realizing data supervision and user traceability

A data supervision and data technology, applied in the field of data security, can solve problems such as the inability to provide third-party supervision and traceability, and achieve the effect of ensuring integrity and enhancing security.

Active Publication Date: 2021-10-08
网安卫谷(天津)科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present invention aims to propose a method and system for realizing data supervision and user traceability, so as to solve the security risks caused by data stored in plain text in the prior art, and the inability to provide the first data during data use. Security flaws in third-party regulatory traceability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for realizing data supervision and user traceability
  • A method and system for realizing data supervision and user traceability

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0076] 1. System registration:

[0077] 1) The key system provides a management authentication interface for the managed business system, and the administrator of the managed business system registers the identity information of the managed business system in the key system;

[0078] 2) The managed business system provides a user authentication interface to the key system;

[0079] 3) The user authentication interface provided by the managed business system to the key system needs to integrate the server communication security module provided by the key system.

[0080] 2. User registration and login:

[0081] 1) The user login operation of the managed business system is taken over by the key system, and the key system forwards the user login request to the login interface of the managed business system, thereby obtaining the user name, which is determined by the login return information of the managed business system User's legitimacy;

[0082] 2) When the login interface ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for realizing data supervision and user traceability, including the following steps: S1, providing unique identity authentication information for each user in the key system; S2, the managed business system through the key system , to encrypt the data; S3, in the key system, grant data access rights to the managed business system user; S4, the managed business system obtains the data encryption and decryption key corresponding to the user from the key system; S5, the key system Record each key request event of the user in real time and identify the user; S6. When the data is leaked, extract the user identification who manipulated the data through the key system to complete the traceability. A method and system for realizing data supervision and user traceability described in the present invention, through third-party supervision and traceability, enhances data security, ensures the integrity, availability and confidentiality of network data, and is free from information leakage and illegal Security threat impact of tampering.

Description

technical field [0001] The invention belongs to the field of data security, and in particular relates to a method and system for realizing data supervision and user traceability. Background technique [0002] With the advent of the era of big data, the scale of data in various industries has increased by terabytes, and enterprises with high-value data sources occupy a vital core position in the big data industry chain. After realizing big data centralization, how to ensure the integrity, availability and confidentiality of network data, and not be affected by the security threats of information leakage and illegal tampering, has become the core issue to be considered for the healthy development of government agencies and public institutions' informatization. Contents of the invention [0003] In view of this, the present invention aims to propose a method and system for realizing data supervision and user traceability, so as to solve the security risks caused by data store...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60G06Q50/26H04L9/00
CPCG06F21/31G06F21/602G06Q50/26H04L9/001
Inventor 刘锦程仇金顺赵炳利
Owner 网安卫谷(天津)科技有限公司