Unlock instant, AI-driven research and patent intelligence for your innovation.

Data sharing method

A data sharing and data encryption technology, applied in the field of data processing, can solve the problems of data insecurity, privacy, easy leakage, etc., and achieve the effect of realizing security, preventing leakage, and ensuring security

Pending Publication Date: 2022-03-25
GUANGDONG POWER GRID CO LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the use of a centralized method to share data in related technologies will lead to problems of insecurity and privacy leakage during the data sharing process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method
  • Data sharing method
  • Data sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0066] The data sharing method provided by this application can be applied to such as Figure 1a shown in the application environment. in, Figure 1a Both the first security domain and the second security domain in include at least one device, or at least one type of device; and Figure 1a The first security domain and the first security domain can be deployed on computer devices or terminal devices in any field, including but not limited to various personal computers, notebook computers, tablet computers, wearable devices, etc. etc., the embodiment of the present applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data sharing method, which comprises the following steps that: a first security domain performs cross-domain security verification on an access user in response to a data access request of the access user, and sends decryption information of a target data file to the access user if the cross-domain security verification of the access user is passed, the decryption information is used for indicating the access user to decrypt the encrypted data of the target data file to obtain the target data file; wherein the access user is a user in the second security domain; the first security domain and the second security domain are different security domains. According to the method, cross-domain sharing of the data can be realized, the security and privacy in the cross-domain sharing process of the data are ensured, and tracking and tracing can be realized in the data sharing process.

Description

technical field [0001] This application relates to the field of data processing, in particular to a data sharing method. Background technique [0002] Data sharing can provide reliable and credible data support for the analysis and visualization of the status quo problems of the power grid, intelligent planning scheme preparation, etc., or accelerate the incubation and implementation of data external service products. [0003] When sharing data, the method in related technologies adopts a centralized method, that is, an intermediate agent is used to send all data to a unified sharing platform. This method requires the intermediate agent to be absolutely credible. [0004] However, sharing data in a centralized manner in related technologies will lead to problems of insecurity and privacy leakage during the data sharing process. Contents of the invention [0005] Based on this, it is necessary to address the above-mentioned technical problems and provide a data sharing met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/604G06F2221/2107
Inventor 陈军李涛钱正浩刘晔裴求根彭泽武
Owner GUANGDONG POWER GRID CO LTD