Information data security processing method and device, equipment and storage medium

A technology for safe processing and information data, applied in the fields of electronic digital data processing, computer security devices, digital data authentication, etc., can solve problems such as unobvious problems, user data leakage, and neglect of user data protection issues

Pending Publication Date: 2021-02-26
深圳市橡树黑卡网络科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For the ToB platform, there are often multiple customers, and the data of different customers is required to be isolated. The existing technical solution is to build an independent system for different customers. The existing technical solution only requires a few problem is not obvious when a customer
But as the number of customers increases, for example, when there are more than 5, the operation and maintenance costs of the system will increase linearly
[0003] On the other hand, the protection of user data is also a common problem in the industry, and it often affects the reputation of the enterprise. If there is a large-scale user data leakage problem, it is often a fatal blow to the enterprise.
Some member rights platforms often pay attention to the development of functions, but ignore the protection of user data. It may be easy for illegal attackers to crack the system and obtain user data in batches.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information data security processing method and device, equipment and storage medium
  • Information data security processing method and device, equipment and storage medium
  • Information data security processing method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0022] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.

[0023] The embodiment of the present application provides a method, device, computer equipment, and storage medium ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of business data processing, and provides an information data security processing method and device, equipment and a storage medium, and the method comprises the steps: firstly recognizing a target object for the current operation, and determining the security category of the target object, wherein the security category comprises a sensitive object anda conventional object; and if the target object is a sensitive object, executing a preset security coping strategy for the current operation, the security coping strategy comprising data logic isolation, springboard mode login, identity verification, key verification, signature verification, log recording, sensitive information mask display, alarm prompt and/or real-time authorization to a third party. By means of the mode, a multi-dimensional and all-around safety protection method is adopted for the information data, pre-event prevention, in-event monitoring and post-event response can be achieved at the same time, user information is prevented from being leaked, and the safety of the user information is guaranteed.

Description

technical field [0001] The present application relates to the technical field of business data processing, and in particular to a method, device, equipment and storage medium for secure processing of information data. Background technique [0002] For the ToB platform, there are often multiple customers, and the data of different customers is required to be isolated. The existing technical solution is to build an independent system for different customers. The existing technical solution only requires a few When it comes to a customer, the problem is not obvious. However, as the number of customers increases, for example, when there are more than five, the operation and maintenance costs of the system will increase linearly. [0003] On the other hand, the protection of user data is also a common problem in the industry, and it often affects the reputation of the enterprise. If there is a large-scale user data leakage problem, it is often a fatal blow to the enterprise. So...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30G06F21/62
CPCG06F21/30G06F21/6245G06F2221/2141G06F2221/2115
Inventor 高泗俊彭志浪王崇烈赵雄飞
Owner 深圳市橡树黑卡网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products