CN108881230A - 一种政务大数据的安全传输方法及装置 - Google Patents
一种政务大数据的安全传输方法及装置 Download PDFInfo
- Publication number
- CN108881230A CN108881230A CN201810642513.0A CN201810642513A CN108881230A CN 108881230 A CN108881230 A CN 108881230A CN 201810642513 A CN201810642513 A CN 201810642513A CN 108881230 A CN108881230 A CN 108881230A
- Authority
- CN
- China
- Prior art keywords
- subdata
- memory node
- big data
- government affairs
- code image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000011218 segmentation Effects 0.000 claims abstract description 40
- 238000004590 computer program Methods 0.000 claims description 9
- 238000004422 calculation algorithm Methods 0.000 claims description 8
- 239000011159 matrix material Substances 0.000 claims description 6
- 230000009467 reduction Effects 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 3
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000007246 mechanism Effects 0.000 abstract description 3
- 238000001914 filtration Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000000151 deposition Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000009193 crawling Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003449 preventive effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810642513.0A CN108881230B (zh) | 2018-06-21 | 2018-06-21 | 一种政务大数据的安全传输方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810642513.0A CN108881230B (zh) | 2018-06-21 | 2018-06-21 | 一种政务大数据的安全传输方法及装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108881230A true CN108881230A (zh) | 2018-11-23 |
CN108881230B CN108881230B (zh) | 2020-09-22 |
Family
ID=64340618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810642513.0A Active CN108881230B (zh) | 2018-06-21 | 2018-06-21 | 一种政务大数据的安全传输方法及装置 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881230B (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572369A (zh) * | 2019-08-14 | 2019-12-13 | 平安科技(深圳)有限公司 | 图片验证方法、装置、计算机设备及存储介质 |
CN110602159A (zh) * | 2019-07-30 | 2019-12-20 | 广州力挚网络科技有限公司 | 一种数据处理方法与系统 |
CN111158584A (zh) * | 2019-11-26 | 2020-05-15 | 国网江苏省电力有限公司盐城供电分公司 | 基于泛在电力物联网的配网施工安全质量管控平台大数据存储方法及系统 |
CN111783155A (zh) * | 2020-07-03 | 2020-10-16 | 福建正孚软件有限公司 | 一种电子证件处理方法和系统 |
CN111899173A (zh) * | 2020-07-24 | 2020-11-06 | 自然资源部第一海洋研究所 | 数据传输方法和装置及电子设备 |
CN115426348A (zh) * | 2022-08-26 | 2022-12-02 | 湖北云谷信息技术有限公司 | 一种基于连续动态二维码的文件存储传输方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101840485A (zh) * | 2010-05-19 | 2010-09-22 | 韩萧 | 文件混序分割存储与合成互验的方法 |
CN102063587A (zh) * | 2010-11-29 | 2011-05-18 | 北京卓微天成科技咨询有限公司 | 一种云存储的数据存储与取回的方法、装置及系统 |
CN103607393A (zh) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | 一种基于数据分割的数据安全保护方法 |
US20150324789A1 (en) * | 2014-05-06 | 2015-11-12 | Case Wallet, Inc. | Cryptocurrency Virtual Wallet System and Method |
CN107800776A (zh) * | 2017-09-27 | 2018-03-13 | 深圳市金立通信设备有限公司 | 一种文件处理方法、终端、服务器及计算机可读介质 |
-
2018
- 2018-06-21 CN CN201810642513.0A patent/CN108881230B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101840485A (zh) * | 2010-05-19 | 2010-09-22 | 韩萧 | 文件混序分割存储与合成互验的方法 |
CN102063587A (zh) * | 2010-11-29 | 2011-05-18 | 北京卓微天成科技咨询有限公司 | 一种云存储的数据存储与取回的方法、装置及系统 |
CN103607393A (zh) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | 一种基于数据分割的数据安全保护方法 |
US20150324789A1 (en) * | 2014-05-06 | 2015-11-12 | Case Wallet, Inc. | Cryptocurrency Virtual Wallet System and Method |
CN107800776A (zh) * | 2017-09-27 | 2018-03-13 | 深圳市金立通信设备有限公司 | 一种文件处理方法、终端、服务器及计算机可读介质 |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602159A (zh) * | 2019-07-30 | 2019-12-20 | 广州力挚网络科技有限公司 | 一种数据处理方法与系统 |
CN110572369A (zh) * | 2019-08-14 | 2019-12-13 | 平安科技(深圳)有限公司 | 图片验证方法、装置、计算机设备及存储介质 |
CN111158584A (zh) * | 2019-11-26 | 2020-05-15 | 国网江苏省电力有限公司盐城供电分公司 | 基于泛在电力物联网的配网施工安全质量管控平台大数据存储方法及系统 |
CN111158584B (zh) * | 2019-11-26 | 2022-09-30 | 国网江苏省电力有限公司盐城供电分公司 | 基于泛在电力物联网的配网施工安全质量管控平台大数据存储方法及系统 |
CN111783155A (zh) * | 2020-07-03 | 2020-10-16 | 福建正孚软件有限公司 | 一种电子证件处理方法和系统 |
CN111783155B (zh) * | 2020-07-03 | 2022-08-02 | 福建正孚软件有限公司 | 一种电子证件处理方法和系统 |
CN111899173A (zh) * | 2020-07-24 | 2020-11-06 | 自然资源部第一海洋研究所 | 数据传输方法和装置及电子设备 |
CN115426348A (zh) * | 2022-08-26 | 2022-12-02 | 湖北云谷信息技术有限公司 | 一种基于连续动态二维码的文件存储传输方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108881230B (zh) | 2020-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Buchanan | The hacker and the state: Cyber attacks and the new normal of geopolitics | |
Ghappour | Searching places unknown: Law enforcement jurisdiction on the dark web | |
CN108881230A (zh) | 一种政务大数据的安全传输方法及装置 | |
EP3070630B1 (en) | Data system and method | |
Chander et al. | Data nationalism | |
Wilson | Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress | |
Frank et al. | Approach to cyber security issues in Nigeria: challenges and solution | |
Rao et al. | The InfoSec handbook: An introduction to information security | |
JP2021530907A (ja) | クラウド通信、コンピューティング、及びグローバル電子商取引のための分散型サイバーセキュアプライバシーネットワーク | |
Hildebrandt | Balance or trade-off? Online security technologies and fundamental rights | |
Ryan | Ransomware Revolution: the rise of a prodigious cyber threat | |
Schell et al. | Webster's new world hacker dictionary | |
Chertoff | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | |
Cross | Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging | |
Nayak et al. | The InfoSec handbook: An introduction to information security | |
Luntovskyy et al. | Cryptographic technology blockchain and its applications | |
Ghasemi et al. | Threats of social engineering attacks against security of Internet of Things (IoT) | |
Wall | How big data feeds big crime | |
Omand | Understanding digital intelligence and the norms that might govern it | |
Gupta et al. | Social media security analysis of threats and security measures | |
Silva | Web 3.0 and Cybersecurity–Short Paper | |
CN109040173A (zh) | 一种政务大数据的可靠储存方法及装置 | |
Lessambo | Anti-money laundering, counter financing terrorism and cybersecurity in the banking industry | |
Zamir | Cybersecurity and social media | |
Janczewski et al. | Cyber conflicts and small states |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20181123 Assignee: Dongguan Zhaoyi Information Technology Co.,Ltd. Assignor: FOSHAN University Contract record no.: X2022990000868 Denomination of invention: A Secure Transmission Method and Device of Government Big Data Granted publication date: 20200922 License type: Common License Record date: 20221031 |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240626 Address after: Room 519, 1st Floor, Building B, Entrepreneurship Development Center, No. 12 Yushun Road, Yufa Town, Daxing District, Beijing, 102600 Patentee after: Beijing Xuneng Hechuang Technology Co.,Ltd. Country or region after: China Address before: 528000 Foshan Institute of science and technology, Xianxi reservoir West Road, Shishan town, Nanhai District, Foshan City, Guangdong Province Patentee before: FOSHAN University Country or region before: China |