Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business data security processing method, device, computer equipment and storage medium

A technology for secure processing and business data, applied in the Internet field, can solve the problems of long security policy development process and high labor cost, and achieve the effect of low labor cost and short development process

Active Publication Date: 2021-05-28
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application proposes a business data security processing method, device, system, and intelligent terminal, which are used to solve the problems of data security processing methods in related technologies, long security policy development process, and high labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business data security processing method, device, computer equipment and storage medium
  • Business data security processing method, device, computer equipment and storage medium
  • Business data security processing method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0031] The method, device, computer equipment, and storage medium for securely processing business data in the embodiments of the present application are described below with reference to the accompanying drawings.

[0032] The embodiment of the present application aims at the problem of long security policy development process and high labor cost in the data security processing method in the related technology, and proposes a business data security processing method.

[0033] figure 1 It is a schematic flowchart of a metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application proposes a business data security processing method, device, computer equipment, and storage medium, wherein the method includes: obtaining a data query request sent by the business system, the query request includes the identification of the business system; according to the identification of the business system, obtaining the business The security policy corresponding to the system; according to the security policy corresponding to the business system and the function of each preset security component, determine each target security component corresponding to the business system and the invocation rules of each target security component; according to the invocation rules of each target security component, Invoke each target security component in turn to process the data queried by the business system; return the processed data to the business system. According to the security policies corresponding to different business systems, the method determines the security components and call sequence required for data processing, and can realize the corresponding security processing of the data queried by different business systems. The security policy development process is short and the labor cost is low.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a method, device, computer equipment and storage medium for securely processing business data. Background technique [0002] The data warehouse can provide data services for various business systems. Data security is the first thing to consider. It is necessary to provide effective data access on the premise of ensuring data security. [0003] At present, when data warehouses provide data services for various business systems, in order to ensure data security, it is usually necessary to customize corresponding security policies for each business system according to the needs of each business system. However, this data security processing method not only takes a long time to develop a security policy, but also has high labor costs. Contents of the invention [0004] This application proposes a business data security processing method, device, system, and inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2455G06F21/62
CPCG06F21/6227G06F16/24564
Inventor 吴海涛张新瑜
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products