Fine particle data protection method based on security model

A security model and data protection technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as difficulty in implementation and data leakage, and achieve authority, consistency, efficiency and security. sexual effect

Pending Publication Date: 2022-01-14
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to avoid data leakage, it is usually necessary to adopt data protection strength and protection granularity that meet the security requirements. Protection rule configuration requires a high level of admini

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine particle data protection method based on security model
  • Fine particle data protection method based on security model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings.

[0037] The technical problem that the present invention mainly solves has following two aspects:

[0038] 1) The password-based security model generation method embeds protection rules in the data model to solve the problem of data protection configuration management complexity, high professional requirements, and possible insufficient protection, resulting in data leakage. This method abstracts the common business data into a data model, configures protection methods for the data model by professional security personnel, embeds protection rules in the data model, and implements strong binding between the protection rules and the data model based on cryptographic technology, forming a tamper-proof Capabilities security model that simplifies the management of data protection.

[0039] 2) Batch data protection technology, by associating and mapping the actual data to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fine particle data protection method based on a security model. The method comprises the following steps: step 1, establishing a data model; step 2, generating a protection rule and binding the protection rule with the data model to generate a security model; step 3, establishing association mapping from the data to the security model; 4, extracting data according to the association mapping relation between the data and the security model to form security model data; and 5, executing the protection rule through the security model to complete data protection. According to the scheme provided by the invention, unified protection measures are provided for common data through the security model, the consistency of data protection strength is guaranteed, and the problem of data leakage caused by a certain protection short board condition is avoided; the security model performs integrity and authenticity protection based on a cryptographic algorithm, and has relatively strong tamper-proof and anti-counterfeiting capabilities; the complexity of data security configuration management is greatly simplified, the professional technical threshold of data security management is reduced, and the efficiency and security of data protection are improved.

Description

technical field [0001] The invention relates to the field of data protection, in particular to a fine-grained data protection method based on a security model. Background technique [0002] In the scenarios of big data applications and cross-domain data sharing, there is a large demand for structured and semi-structured data protection. The current method for structured and semi-structured data protection depends on the granularity of data protection. There are two main methods: 1) Configure the same data protection rules for the same type of data, and implement data encryption and access control. Data can be processed in batches, but the granularity of data protection is relatively coarse. 2) Extract structural information from the specified structured and semi-structured data, then configure protection rules for the structural information, and perform encryption and access control on the data associated with the structural information according to the protection rules. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/64G06F21/6218
Inventor 刘栋颜亮谢建武刘福金文刚
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products