Cross-domain identification analysis node data privacy protection and security sharing method and system

A privacy protection and node data technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of weak data privacy protection, large amount of data interaction, high encryption cost, etc., to save development costs and operating costs, save service resources, and reduce the effect of repeated development

Active Publication Date: 2022-03-22
国家工业信息安全发展研究中心
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the existing industrial Internet identification analysis identification data storage and data use process, there are problems such as high encryption cost, excessive data interaction, weak data privacy protection, and low degree of sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identification analysis node data privacy protection and security sharing method and system
  • Cross-domain identification analysis node data privacy protection and security sharing method and system
  • Cross-domain identification analysis node data privacy protection and security sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The purpose of the present invention is to provide a data privacy protection and security sharing method and system for cross-domain identification analysis nodes, which can improve data privacy protection and sharing, and can save the development cost and operating cost of the entire industry.

[0044] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for data privacy protection and security sharing of cross-domain identification analysis nodes. The method includes dividing the data to be processed generated by the enterprise node into graded privacy data; verifying the legality of the data to be processed, and encrypting the data to be processed when the data to be processed is legal; according to the division result and the data request Obtain the corresponding encryption algorithm or desensitization algorithm; use the encryption algorithm or desensitization algorithm to encrypt or desensitize the data, and store the encrypted or desensitized data in the corresponding database; when obtaining the request for data query, it will be resolved by the identification The system obtains data directly from the corresponding database through node encryption, and transmits the obtained data to the node front-end module of the enterprise node. The node front-end module decrypts the obtained data and transmits it to the enterprise node. The invention can improve data privacy protection and sharing degree, and further can save the development cost and operation cost of the whole industry.

Description

technical field [0001] The present invention relates to the field of industrial Internet identification analysis data security, in particular to a cross-domain identification analysis node data privacy protection and security sharing method and system. Background technique [0002] The scale of the industrial Internet industry is trillions of scale and has become the pillar of national economic development. In recent years, the industrial Internet industry has developed in a blowout manner, but the security technology strength of various enterprises varies, and the industrial Internet identification data has security risks such as illegal cracking, unauthorized access, and privacy leakage. Sensitive data and private data are the core assets of enterprises, and data leakage will bring huge economic losses. [0003] Traditional solutions use firewalls, intrusion detection, etc. to build network security layer protection. This network security layer protection method has high ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F16/172G06F16/176
CPCG06F21/602G06F21/6218G06F21/64G06F16/172G06F16/176
Inventor 郝志强王冲华周昊樊佩茹李俊张雪莹余果林晨李红飞刘东东王允成
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products