Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security protection method and device, equipment and storage medium

A data security and data technology, applied in the field of data processing, can solve problems such as threats to user information security, low verification efficiency, server, operating system LAN disaster, etc.

Pending Publication Date: 2022-04-01
杭州安恒信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The popularization of WEB has enriched all kinds of WEB products, but due to the enhancement of WEB interactive ability, it also breeds a wide variety of security threats. Among them, illegal user input will not only threaten user information security, but also bring harm to servers, operating systems, and even the entire LAN. Therefore, verifying the data entered by users is an essential security measure for WEB applications
The conventional practice is to manually verify the data submitted by the front end separately, but this method leads to low verification efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device, equipment and storage medium
  • Data security protection method and device, equipment and storage medium
  • Data security protection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] see figure 1 , which shows a flow chart of a data security protection method provided by an embodiment of the present invention, which may specifically include:

[0037] S11: Return corresponding data acquired from the application server as target data to the target user, and store data corresponding to specified information included in the target data as candidate data in the cache warehouse.

[0038] Wherein, the application server can specifically b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security protection method, device and equipment and a storage medium, and the method comprises the steps: taking corresponding data obtained from an application server as target data, returning the target data to a target user, taking data corresponding to specified information in the target data as candidate data, and storing the candidate data in a cache warehouse; receiving data which is submitted by the target user and is obtained after the target data is updated as to-be-updated data, and acquiring data corresponding to the specified information from the to-be-updated data as to-be-verified data; and comparing the to-be-verified data with the candidate data, if a comparison result shows that the to-be-verified data and the candidate data are the same, respectively performing corresponding updating on data in the application server and data in the cache warehouse based on the to-be-updated data, otherwise, refusing to perform corresponding updating based on the to-be-updated data. It can be seen that the data verification efficiency can be effectively improved while safety protection of user input is achieved.

Description

technical field [0001] The present invention relates to the technical field of data processing, and more specifically, to a data security protection method, device, equipment and storage medium. Background technique [0002] The popularization of WEB has enriched all kinds of WEB products, but due to the enhanced interactive ability of WEB, it also breeds a wide variety of security threats. Among them, illegal user input will not only threaten user information security, but also bring serious problems to servers, operating systems, and even the entire LAN. Therefore, verifying the data entered by users is an essential security measure for WEB applications. The conventional practice is to manually verify the data submitted by the front end separately, but this method leads to low verification efficiency. Contents of the invention [0003] The purpose of the present invention is to provide a data security protection method, device, equipment and storage medium, which can ef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 肖杨叶张乐
Owner 杭州安恒信息安全技术有限公司