Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management method and system

A data security and data technology, applied in the field of data security governance methods and systems, can solve problems such as staying, lack of systematic and effective solutions, etc., to achieve the effect of easy governance

Active Publication Date: 2022-01-21
HANGZHOU SHIPING INFORMATION & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the supervision and governance of data security in the existing technology mostly stay on a single-dimensional supervision, such as access restrictions for different data security levels corresponding to different permissions
The governance of data security lacks a systematic and effective solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management method and system
  • Data security management method and system
  • Data security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] In the first aspect, this embodiment provides a data security governance method, which can be executed on both ordinary nodes and consensus nodes, such as figure 1 As shown, it includes: detecting that when operating the first data on the node logged in with the first account, obtaining the first data content before and after the operation; finding the first data content in the database according to the hash value of the first data content before the operation A data storage location; store the timestamp of the first data after operation, the content of the first data after operation, the hash value of the content of the first data after operation, the hierarchical identification of the first data after operation, and the first account number in the operation the first data storage location before and after the operation; encrypt the first data before and after the operation to form the first encrypted data before and after the operation; combine the first encrypted data...

Embodiment 2

[0116] The first aspect of this embodiment provides a data security governance method, which is executed on consensus nodes, such as figure 2 shown, including:

[0117] receiving and verifying a first data transaction;

[0118] After receiving the message that N4 consensus nodes have successfully verified the first data transaction, put the first data transaction into the transaction pool;

[0119] When the number of first data transactions in the transaction pool reaches M, or when the time from the last packaged block exceeds T, the first data transaction in the transaction pool is packaged into a block, and the block is broadcast for consensus; after the consensus is successful , store blocks locally and in the cloud;

[0120] Among them, N4≥0.51*N, N is the total number of consensus nodes in the blockchain network environment; M, N4 and N are all integers.

[0121] The value of M is set to a fixed value, and blocks are packaged quantitatively or regularly for consensus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security governance method and system, and belongs to the technical field of data security, and the method comprises the steps of storing a timestamp for operating first data, a first data content after the operation, a hash value of the first data content after the operation, a grading identifier of the first data after the operation and a first account at a first data storage position before the operation; encrypting the first data before and after the operation to form first encrypted data before and after the operation; forming a first data transaction by the first encrypted data before and after the operation, the timestamp when the first data is operated, the first account and the grading identifier of the first data. The operation of the whole process from generation to destruction of the data can be systematically and effectively recorded, the recorded content is well documented, and the circulation condition of the whole life process of the data can be conveniently traced.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a data security management method and system. Background technique [0002] With the development of the digital economy, data security is particularly important in the process of national economic development, which is related to the privacy of individuals and the security of the country. However, the supervision and governance of data security in the existing technology mostly stays on a single-dimensional supervision, such as access restrictions with different permissions corresponding to different data confidentiality levels. There is a lack of systematic and effective solutions for data security governance. Contents of the invention [0003] The technical problem to be solved by the invention [0004] In order to overcome the above technical problems, the present invention provides a data security management method and system, which can systematically and ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06F21/60G06F21/62G06F21/64
CPCG06Q40/04G06F21/602G06F21/6218G06F21/64
Inventor 纪磊磊
Owner HANGZHOU SHIPING INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products