Measurement data safety protection method

A technology for security protection and data measurement, applied in the field of information security, it can solve the problem that data security protection methods are difficult to meet actual needs, and achieve the effect of fast access, data security protection, and efficient access.

Pending Publication Date: 2021-09-07
HUNAN INST OF METROLOGY & TEST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The access to data resources has also changed from single-user and single-host access to multi-user and multi-data domain data access, which leads to the problem of complex user and multi-data resource domain access in the big data service environment, but this also affects data from another aspect. Security poses new requirements and challenges. Traditional data security protection methods are gradually difficult to meet actual needs and need to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following examples are for illustrative purposes only and are not intended to limit the scope of the invention.

[0033] A measurement data security protection method, the method comprising the following steps:

[0034] Step 1: User authentication. When users access data resources for the first time, they must first apply for a security certificate from a security certification authority, so that users can prove their identity when accessing data resources, and reject malicious access without obtaining a security certificate. The way of accessing data resources for security protection;

[0035] Step 2: domain positioning, when the authenticated user accesses the data resource, the access request Req(SAV t ,RAV m ,EAV n ,AAV k ) to the domain location server, and the domain location server analyzes the subject attributes and resource attributes, and the subject attributes and resource attributes correspond to SAV respectively. t and RAV t , and judge whether it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information safety, and particularly relates to a measurement data safety protection method, which comprises the following steps of: 1, user authentication: when a user accesses a data resource for the first time, firstly applying a safety certificate from a safety certificate authority so as to prove the identity of the user when the user accesses the data resource, safety assurance is carried out on malicious access which does not obtain the safety certificate by adopting a mode of denying to access data resources; and step 2: domain positioning: when a user passing identity authentication accesses data resources, an access request Req (SAVt, RAVm, EAVn, AAVk) is forwarded to a domain positioning server, the domain positioning server analyzes a subject attribute and a resource attribute, the subject attribute and the resource attribute respectively correspond to the SAVt and the RAVt, and whether local access or cross-domain access is determined according to an analysis result. According to the method, an attribute-based access control model is adopted, the problems of user authentication, domain positioning, access decision and module association are solved, the data safety in a big data environment can be effectively protected, and quick decision and efficient access can be realized.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a measurement data security protection method. Background technique [0002] With the rapid development of cloud computing, the Internet of Things, and the mobile Internet, the scale of data that needs to be collected, processed, and managed has grown rapidly, and data information has grown explosively. As a national basic energy facility, the power industry provides power support for the development of the national economy. , is closely related to social development and people's lives, and is an important condition for the healthy, stable, sustained and rapid development of the national economy. With the development of the smart grid, the data and information in the power system will become more complex, the amount of data and information will increase exponentially, and the correlation between various types of information will be closer. [0003] Metering is one...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60G06F21/62G06N5/00
CPCG06F21/64G06F21/604G06F21/6218G06N5/00
Inventor 宋扬阳叶田明棋徐小玲柏文琦吴双双
Owner HUNAN INST OF METROLOGY & TEST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products