Data protection method and device

A data protection and data manipulation technology, applied in the computer field, can solve the problem of low security of data protection methods, and achieve the effect of protecting against theft and improving security.

Inactive Publication Date: 2022-03-01
北京交研智慧科技有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a data protection method and device to solve the problem of low security of data protection methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device
  • Data protection method and device
  • Data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] The terms "first", "second" and the like in the embodiments of the present invention are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection method and device. The method comprises the following steps: acquiring a data operation request; under the condition that the data operation request is used for carrying out target operation on target data, risk assessment is carried out on the target operation, a risk assessment result is obtained, and the target data are data stored at a preset position; and determining whether to execute the data operation request or not according to the risk assessment result. Therefore, in the data access process, the data operation request is obtained, under the condition that the data operation request is used for performing the target operation on the target data, risk assessment is performed on the target operation, and whether the data operation request is executed or not is determined according to the risk assessment result. According to the data storage method and device, under the condition that a permission-based data protection mechanism fails, the data operation request with a high leakage risk can still be refused to be executed by performing risk assessment on the target operation, so that the target data is protected from being stolen, and the security of data storage is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data protection method and device. Background technique [0002] With the development of computer technology, data security issues also emerge in endlessly. Data protection in the prior art is usually a rights-based protection method, which has low security. If hackers break through the operating system and obtain permissions, they can bypass the permission-based protection mechanism and gain access to sensitive or high-value data, which may easily lead to information leakage. [0003] It can be seen that the existing data protection method has the problem of low security. Contents of the invention [0004] Embodiments of the present invention provide a data protection method and device to solve the problem of low security of data protection methods in the prior art. [0005] An embodiment of the present invention provides a data protection method, the method comprising:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/57
CPCG06F21/62G06F21/577
Inventor 朱子玉朱丽云
Owner 北京交研智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products