Cross-domain identification analysis node data privacy protection and security sharing method and system

A privacy protection and node data technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of weak data privacy protection, large amount of data interaction, high encryption cost, etc., to save development costs and operating costs, save service resources, and reduce the effect of repeated development

Active Publication Date: 2021-11-02
国家工业信息安全发展研究中心
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the existing industrial Internet identification analysis identification data storage and data use process, there are problems such as high encryption cost, excessive data interaction, weak data privacy protection, and low degree of sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identification analysis node data privacy protection and security sharing method and system
  • Cross-domain identification analysis node data privacy protection and security sharing method and system
  • Cross-domain identification analysis node data privacy protection and security sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The purpose of the present invention is to provide a data privacy protection and security sharing method and system for cross-domain identification analysis nodes, which can improve data privacy protection and sharing, and can save the development cost and operating cost of the entire industry.

[0044] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cross-domain identification analysis node data privacy protection and security sharing method and system. The method comprises the following steps: carrying out privacy data grading division on to-be-processed data generated by enterprise nodes; verifying the legality of the to-be-processed data, and encrypting the to-be-processed data when the to-be-processed data is legal; obtaining a corresponding encryption algorithm or desensitization algorithm according to the division result and the data request; encrypting or desensitizing the data by using an encryption algorithm or a desensitization algorithm, and storing the encrypted or desensitized data to a corresponding database; and when a data query request is obtained, enabling the identification analysis system directly to obtain data from a corresponding database in a node encryption mode and transmit the obtained data to the node front-end module of the enterprise node, and enabling the node front-end module to decrypt the obtained data and transmit the data to the enterprise node. The data privacy protection and sharing degree can be improved, and the development cost and the operation cost of the whole industry can be saved.

Description

technical field [0001] The present invention relates to the field of industrial Internet identification analysis data security, in particular to a cross-domain identification analysis node data privacy protection and security sharing method and system. Background technique [0002] The scale of the industrial Internet industry is trillions of scale and has become the pillar of national economic development. In recent years, the industrial Internet industry has developed in a blowout manner, but the security technology strength of various enterprises varies, and the industrial Internet identification data has security risks such as illegal cracking, unauthorized access, and privacy leakage. Sensitive data and private data are the core assets of enterprises, and data leakage will bring huge economic losses. [0003] Traditional solutions use firewalls, intrusion detection, etc. to build network security layer protection. This network security layer protection method has high ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F16/172G06F16/176
CPCG06F21/602G06F21/6218G06F21/64G06F16/172G06F16/176
Inventor 郝志强王冲华周昊樊佩茹李俊张雪莹余果林晨李红飞刘东东王允成
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products