Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer data security protection method and device based on artificial intelligence and electronic equipment

A technology of data security and artificial intelligence, applied in the field of data security, can solve problems such as risks, data tampering, users can not find in time, etc., to achieve the effect of clear and easy-to-understand description

Pending Publication Date: 2022-01-07
广西警察学院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the generation of a large amount of data, the security performance of data is gradually paid attention to. However, there is a possibility of data tampering when data is stored in a network disk or cloud. When users need to use data, the data they access may be tampered with. possibility, but the user cannot find out in time, and there is a risk of working with tampered data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer data security protection method and device based on artificial intelligence and electronic equipment
  • Computer data security protection method and device based on artificial intelligence and electronic equipment
  • Computer data security protection method and device based on artificial intelligence and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0111] Further, in an exemplary embodiment, the method also includes:

[0112] Step S206, accessing and obtaining the first storage data stored in other storage areas except the target area.

[0113] In this example embodiment, the access means may be that the user directly accesses in the server storage, for example, by clicking a storage location, such as a certain folder, or the user accesses the first stored data in the server storage through a client terminal. The above-mentioned first stored data may be data in any one or more areas except the target area.

[0114] Step S207, calculating a hash value corresponding to the stored data to obtain a first hash value.

[0115] In this exemplary embodiment, the above-mentioned algorithm for calculating the hash value may be an existing hash algorithm. This solution does not improve the above-mentioned hash algorithm, and calculates the hash value through the hash algorithm to obtain the hash value in this solution. The first ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer data security protection method and device based on artificial intelligence and electronic equipment, and the method comprises the steps: determining a storage space, and dividing the storage space to obtain at least one storage region; respectively configuring a storage index corresponding to each storage area; receiving to-be-stored data, and copying the to-be-stored data; constructing an association relationship between the copied to-be-stored data and the storage index; storing the to-be-stored data into each storage area based on the association relationship; and taking at least one area in the storage areas in which the to-be-stored data is stored as a target area, and registering the to-be-stored data in the target area to the block chain. According to the method, the to-be-stored data is copied, at least one piece of data in the copied data is registered on the block chain, and whether the user access data is tampered or not is judged based on comparison between the hash value of the copied data registered on the block chain and the hash value of the user access data, so that the security of the data is maintained.

Description

technical field [0001] The application belongs to the technical field of data security, and in particular relates to an artificial intelligence-based computer data security protection method, device and electronic equipment. [0002] technical background [0003] With the development of Internet technology, the Internet has been widely used in people's daily life, for example, using the data generated by WeChat. [0004] With the generation of a large amount of data, the security performance of data is gradually paid attention to. However, there is a possibility of data tampering when data is stored in a network disk or cloud. When users need to use data, the data they access may be tampered with. possibility, but users cannot find out in time, and there are risks in using tampered data for work. [0005] It should be noted that the information disclosed in the above background section is only for enhancing the understanding of the background of the present disclosure, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/27G06F16/22G06F3/06
CPCG06F16/27G06F3/0644G06F3/0631G06F3/067G06F16/2228
Inventor 陈雅唐宇健李俊李刚
Owner 广西警察学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products