Knowledge sharing method of information operation and maintenance service based on big data trusted computing

A technology of trusted computing and knowledge sharing, applied in the field of information sharing, can solve the problems of poor timeliness and security of knowledge sharing in information operation and maintenance services, and the inability to safely and quickly realize shared information storage and release of shared information, achieving convenience The effect of barrier-free sharing, fast verification, and user privacy guarantee

Active Publication Date: 2017-09-29
广州同构信息科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The information operation and maintenance service knowledge sharing method in the related technology cannot safely and quickly realize the storage and release of the shared information, which makes the timeliness and security of the information operation and maintenance service knowledge sharing poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Knowledge sharing method of information operation and maintenance service based on big data trusted computing
  • Knowledge sharing method of information operation and maintenance service based on big data trusted computing
  • Knowledge sharing method of information operation and maintenance service based on big data trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance service knowledge security storage and information operation and maintenance service knowledge security access;

[0057] The secure storage of information operation and maintenance service knowledge includes the following steps:

[0058] Step 101: when the storage user submits a storage request for information operation and maintenance service knowledge, perform security verification on the identity of the storage user;

[0059] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of the information operation and maintenan...

Embodiment 2

[0073] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance service knowledge security storage and information operation and maintenance service knowledge security access;

[0074] The secure storage of information operation and maintenance service knowledge includes the following steps:

[0075] Step 101: when the storage user submits a storage request for information operation and maintenance service knowledge, perform security verification on the identity of the storage user;

[0076] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of the information operation and maintenan...

Embodiment 3

[0106] see figure 1 , figure 2 , this embodiment is based on big data trusted computing information operation and maintenance service knowledge sharing method, including information operation and maintenance service knowledge security storage and information operation and maintenance service knowledge security access;

[0107] The secure storage of information operation and maintenance service knowledge includes the following steps:

[0108] Step 101: when the storage user submits a storage request for information operation and maintenance service knowledge, perform security verification on the identity of the storage user;

[0109] Step 102 preprocesses the information operation and maintenance service knowledge data, and divides the information operation and maintenance service knowledge into two types of data: basic knowledge and business knowledge. The basic knowledge includes text and images that can reflect the basic situation of the information operation and maintenance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information operation and maintenance service knowledge sharing method based on trusted computation of big data. According to the method, a trusted degree assessment mechanism and a trusted relationship transfer mechanism are built on the basis of characteristics such as protective function, authentication, integrity measurement and the like; the method comprises steps as follows: secure storage of information operation and maintenance knowledge, secure access of information operation and maintenance knowledge as well as trusted evaluation, wherein the secure storage of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of a stored user; (2), preprocessing information operation and maintenance service knowledge data; (3), performing encoding; (4), performing abstract concentration on hardware storage resources, mapping the resources to an integrated and unified resource pool, and virtualizing a user operating system; (5), storing the information operation and maintenance service knowledge data into the resource pool in a final code form; the secure access of the information operation and maintenance knowledge comprises following steps: (1), performing security verification on an identity of an access user; (2), reading the information operation and maintenance service knowledge data stored on the resource pool. With the adoption of the method, barrier-free sharing can be realized, memory footprint is reduced, the data calling speed is increased, and the security of information operation and maintenance service knowledge sharing is improved on the premise that the convenience is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information sharing, in particular to a knowledge sharing method for information operation and maintenance services based on trusted computing of big data. Background technique [0002] The information operation and maintenance service knowledge sharing method in the related art cannot safely and quickly realize the storage and release of the shared information, which makes the timeliness and security of the information operation and maintenance service knowledge sharing poor. [0003] Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Information security has four aspects: equipment security, data security, content security and behavior security. Behavioral security includes: the confidentiality of behavior, the integrity of behavior, the authenticity of behavio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F3/06G06F21/31G06F21/32G06F21/78
CPCG06F3/061G06F3/0622G06F3/0637G06F3/0638G06F3/067G06F21/31G06F21/32G06F21/602G06F21/604G06F21/606G06F21/6218G06F21/78
Inventor 欧浩李小华刘水平
Owner 广州同构信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products