Data security sharing method, memory and processor

A data security and data technology, applied in the field of data security, can solve problems such as data opacity and information islands

Pending Publication Date: 2021-11-16
中和易茂科技服务(北京)有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, while bringing convenience, cloud storage and multi-user data sharing also have the problems of "information island" and "data opacity".

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security sharing method, memory and processor
  • Data security sharing method, memory and processor
  • Data security sharing method, memory and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0036] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0037] In this embodiment, a data security sharing method is provided, figure 1 is a flowchart of a data security sharing method according to an embodiment of the present application, such as figure 1 As shown, the flow of the method includes the following steps:

[0038] Step S102. Obtain first data, wherein the first data comes from multiple physica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security sharing method, a memory and a processor, and the method comprises the steps: obtaining first data which comes from a plurality of physical perception entities; classifying and integrating the first data according to the integrity of the data; encrypting the classified and integrated first data and uploading the first data to a cloud service; and receiving an access request for the encrypted first data, and determining that the permission of a source party of the access request can access the first data. According to the invention, the problem of secure sharing of data is solved, so that the reliability and integrity of data sharing are improved.

Description

technical field [0001] This application relates to the field of data security, and in particular, relates to a data security sharing method. Background technique [0002] In recent years, with the continuous development of information technology, a large number of information systems have been laid in various industries, and the data in the information system is constantly changing and complicated with the surrounding environment, so that the data in cloud storage not only has Multi-source heterogeneity, and it changes in real time. The continuous development of high-speed computing equipment and network technology has gradually shifted the data storage and calculation of the industrial Internet to the cloud. Storing data in the cloud not only makes data access and data sharing more convenient, but also more reliable, economical and effective than local storage. With better scalability, data sharing between users is becoming more and more convenient. [0003] However, whil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
CPCH04L63/0428H04L9/001H04L63/123H04L63/10
Inventor 靳方舟白亚莉王安平王艺霖
Owner 中和易茂科技服务(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products