CN110110536A - A kind of data sharing method of cloud computing system - Google Patents

A kind of data sharing method of cloud computing system Download PDF

Info

Publication number
CN110110536A
CN110110536A CN201910357727.8A CN201910357727A CN110110536A CN 110110536 A CN110110536 A CN 110110536A CN 201910357727 A CN201910357727 A CN 201910357727A CN 110110536 A CN110110536 A CN 110110536A
Authority
CN
China
Prior art keywords
data
cloud computing
classification
sharing
computing system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910357727.8A
Other languages
Chinese (zh)
Other versions
CN110110536B (en
Inventor
张雅洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bencai Culture Communication Co ltd
Original Assignee
Wenzhou Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Polytechnic filed Critical Wenzhou Polytechnic
Priority to CN201910357727.8A priority Critical patent/CN110110536B/en
Publication of CN110110536A publication Critical patent/CN110110536A/en
Application granted granted Critical
Publication of CN110110536B publication Critical patent/CN110110536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The present invention relates to data sharing technology fields, and the invention discloses a kind of data sharing methods of cloud computing system, reach user terminal including register account number, the certification of identity information, the input management of data, the classification of data, the outgoing management of data and data.The present invention can change the view of people couple with resource sharing; corresponding remuneration is expressed to the sharing of worth of data; so that individual and company have the attitude of support to resource sharing; the safety of data information can be effectively protected in the sharing mode simultaneously; avoid the problem that data are revealed during transmitting and sharing; user terminal quickly checking to resource data can be effectively improved simultaneously, and retrieval is quick.

Description

A kind of data sharing method of cloud computing system
Technical field
The present invention relates to data sharing technology field more particularly to a kind of data sharing methods of cloud computing system.
Background technique
It for applied information system, is often required to consider its " function ", essentially, an applied information system is complete At be not in fact what " function ", but receive data input and handled, and generate corresponding output or change system It unites itself state.If there are the treatment process of two (or more than two) data inputs having the same, then we Claim the two (or more than two) treatment processes that there is " shared data ", the set of shared data is exactly those identical inputs Data, but there are the hidden danger on data information security for resource-sharing in the prior art, while to valuable data resource Corresponding remuneration is not expressed, so that the enthusiasm of resource sharing is not high, is unfavorable for the development of resource-sharing.
Summary of the invention
The invention proposes a kind of data sharing methods of cloud computing system, to solve mentioned above in the background art ask Topic.
The invention proposes a kind of data sharing methods of cloud computing system, include the following steps:
S1, register account number: user carries out the registration of Windows account using internet platform, after register account number, to the account Number the setting of password is carried out, and corresponding close guarantor's problem is set, so that after the account succeeds in registration, after cloud computing platform Platform server is connected with cloud computing platform;
The certification of S2, identity information: when being operated using the Windows account, need to the identity information of user into Row verification;
The input management of S3, data: input management specifically includes the detection of the compression of data, the encryption and decryption of data and data, It specifically includes following aspects:
The compression of M1, data: data file is compressed using ZIP file format by computer, it is not only provided only The function of compression, but also used as filing tool, many files can be stored into same file;
The encryption and decryption of M2, data: for the data rich in technology content, company and individual are unwilling freely to be shared, can It is shared in such a way that data encryption algorithm and encryption key will be changed into ciphertext in plain text, other think pair to people or company The data of the sharing are further understood, and are needed through mobile phone or the corresponding amount of money of PC mobile terminal payment, then cloud computing The key of the encryption data can be sent on the mobile phone or PC mobile terminal of user by the processor of the platform of platform, to both realize Data resource it is shared, while the enthusiasm that corresponding compensation promotes resource sharing is carried out to participator again;
The detection of M3, data: the detection of data includes checking whether locally saving user password, to sensitive privacy information, If whether relation chain and Bank Account Number are encrypted, check whether and be stored in system file, configuration file outside in plain text It in portion's equipment, partially needs to be stored into the information of external equipment, needs all to judge whether information is tampered using preceding every time, check Whether sensitive information has done encryption in network transmission, and important data first use TLS or SSL, forbid network internal Program assembly is by any third party's routine call, when needing the component for external call, should check to whether caller is signed Name limitation;
The classification of S4, data: the database using cloud computing system backstage classifies to source data, including determines class data point Class, ordinal data classification, spacing data classification and fixed than data classification, can be rapidly performed by the classification to data;
The outgoing management of S5, data: the outgoing management of data specifically includes the share and access of Data Transmission Controlling and data;
S6, data reach user terminal: destination address can be found in the local area network of oneself first after data transmission, if local area network In there is no destination address, the router in local area network will be transmitted data to, router is found according to the IP address of destination address Next local area network, if purpose terminal, in next local area network, that just conveys data to the road in next local area network By device, last router gives data production to purpose terminal, is otherwise determined to convey data to that office by this router again It in the net of domain, relays always, until finding purpose user terminal.
Preferably, Data Transmission Controlling is specifically divided into four kinds, and program directly controls mode, interrupts control mode, dma mode And channel mode.
Preferably, share and access refers to that multiple users may access simultaneously and update identical data, and file and equipment are total More effective way can not only be provided using data and data sharing for user by enjoying access, and can be carried out if necessary to access Limitation, so as to use Internet resources and make user that shared resource be used to be equivalent to other network user's shared resources Be it is equally simple and directly using the local resource of oneself, browsing a network file is like on browsing user oneself hard disk A file it is the same.
Preferably, determine class data classification to refer to classifying data according to category attribute, it is of all categories between be equality Coordination, this data cannot be ranked up without quantity information at of all categories;Ordinal data classification not only can be with Data are divided into different classifications, and it is of all categories between can also compare superiority and inferiority by sorting;Spacing data are that have one The actual measured value of order position, at this time not only it is known that two variables between have differences, can also by adding, subtraction Accurately calculate the practical gap between each variable is how many, it may be said that the accuracy of spacing data is than determining class data and determining For ordinal number according to being a a progressive step, it can measure spacing data classification to the actual range between things classification or order; It is fixed more the same with spacing data than the data representation of data classification, it is actual measured value.
Preferably, when carrying out the registration of S1 account, the sensitive vocabulary contained in Windows account can be put down by cloud computing Server inside platform is detected, so that avoiding the occurrence of sensitive vocabulary in Windows account, has purified the ring of network Border.
Preferably, in the certification for carrying out S2 identity information, system is provided with firewall and IDS anti-intrusion system simultaneously System, so that operator is in operation, information will not be revealed, and ensure that the safety of operation.
Preferably, two kinds of the routing algorithm major design designed in S6: one is distance vector Routing Protocols, every 30 Second, distance vector Routing Protocol will send entire routing table to adjacent sites, obtain the routing table of adjacent sites To update.In this way, it can from the list of other website (being connected directly or other modes connect) one network of collection, with Just it is routed, distance vector Routing Protocol uses hop count as metric, to calculate the road for arriving at the destination and being passed through By device number;Another kind is link state routing selection agreement, is primarily referred to as in a link state routing selection, a node It checks the state of all direct link, and resulting status information is sent to online all other nodes, and not only Those nodes being connected directly are intended for, in this way, every other node receives from network comprising straight each node The routing iinformation of chain link line state.
A kind of data sharing method of cloud computing system proposed by the present invention, beneficial effect are this kind of cloud computing system Data sharing method can change the view of people couple with resource sharing, express corresponding remuneration to valuable data sharing, So that individual and company have the attitude of support to resource sharing, while data information can be effectively protected in the sharing mode Safety avoids the problem that data are revealed during transmitting and sharing, while can effectively improve user terminal to number of resources According to quickly check, retrieval is quick.
Specific embodiment
It is next combined with specific embodiments below that the present invention will be further described.
A kind of data sharing method of cloud computing system, includes the following steps:
S1, S1, register account number: user carries out the registration of Windows account using internet platform, right after register account number The account carries out the setting of password, and corresponding close guarantor's problem is arranged, so that passing through cloud computing platform after the account succeeds in registration Background server be connected with cloud computing platform, in the registration of account, the sensitive vocabulary contained in Windows account, meeting It is detected by the server inside cloud computing platform, so that sensitive vocabulary is avoided the occurrence of in Windows account, purification The environment of network;
The certification of S2, identity information: when being operated using the Windows account, need to the identity information of user into Row verification, in the certification for carrying out identity information, system is provided with firewall and IDS anti-intrusion system simultaneously, so that operation In operation, information will not be revealed person, ensure that the safety of operation.
The input management of S3, data: input management specifically includes the inspection of the compression of data, the encryption and decryption of data and data It surveys, specifically includes following aspects:
The compression of M1, data: data file is compressed using ZIP file format by computer, it is not only provided only The function of compression, but also used as filing tool, many files can be stored into same file;
The encryption and decryption of M2, data: for the data rich in technology content, company and individual are unwilling freely to be shared, can It is shared in such a way that data encryption algorithm and encryption key will be changed into ciphertext in plain text, other think pair to people or company The data of the sharing are further understood, and are needed through mobile phone or the corresponding amount of money of PC mobile terminal payment, then cloud computing The key of the encryption data can be sent on the mobile phone or PC mobile terminal of user by the processor of the platform of platform, to both realize Data resource it is shared, while the enthusiasm that corresponding compensation promotes resource sharing is carried out to participator again;
The detection of M3, data: the detection of data includes checking whether locally saving user password, to sensitive privacy information, If whether relation chain and Bank Account Number are encrypted, check whether and be stored in system file, configuration file outside in plain text It in portion's equipment, partially needs to be stored into the information of external equipment, needs all to judge whether information is tampered using preceding every time, check Whether sensitive information has done encryption in network transmission, and important data first use TLS or SSL, forbid network internal Program assembly is by any third party's routine call, when needing the component for external call, should check to whether caller is signed Name limitation provides compensation return to the participator of resource, while while realizing resource-sharing, to the value of data resource It is protected, and promotes sharing of the personal and company to resource.
The classification of S4, data: the database using cloud computing system backstage classifies to source data, including determines class data Classification, ordinal data classification, spacing data classification and fixed than data classification, can be rapidly performed by the classification to data, fixed Class data classification refers to classifying data according to category attribute, it is of all categories between be equality coordination, this data Without quantity information, and cannot be ranked up at of all categories;Data can not only be divided into different by ordinal data classification Classification, and it is of all categories between can also compare superiority and inferiority by sorting;Spacing data are that have the actual measurement of certain unit Value, at this time not only it is known that two variables between have differences, can also by adding, subtraction accurately calculate each change Practical gap between amount is how many, it may be said that the accuracy of spacing data has advanced one greatly than determining class data and ordinal data Step, it can measure spacing data classification to the actual range between things classification or order;The fixed number than data classification It is the same with spacing data according to the form of expression, it is actual measured value, by the mode classification of four kinds of data to different data Source is classified, to be conducive to improve the effect of classification and the speed of classification.
The outgoing management of S5, data: the outgoing management of data specifically includes the shared visit of Data Transmission Controlling and data It asks, Data Transmission Controlling is specifically divided into four kinds, and program directly controls mode, interrupts control mode, dma mode and channel mode Data Transmission Controlling is specifically divided into four kinds, and program directly controls mode, interrupts control mode, dma mode and channel mode, altogether It enjoys access and refers to that multiple users may access simultaneously and update identical data, file and collaborative share access can not only be user More effective way is provided using data and data sharing, and access can be limited if necessary, so as to use Internet resources and user is made to be equivalent to be the local using oneself using shared resource with other network user's shared resources Resource is equally simple and direct, and browsing a network file is like a file on browsing user oneself hard disk.
S6, data reach user terminal: destination address can be found in the local area network of oneself first after data transmission, if office There is no destination address in the net of domain, will transmit data to the router in local area network, router is according to the IP address of destination address Next local area network is found, if purpose terminal, in next local area network, that is just conveyed data in next local area network Router, last router by data production give purpose terminal, otherwise determine to convey data to that by this router again In a local area network, relay always, until find purpose user terminal, two kinds of the routing algorithm major design of design: one is away from From Vector Routing Protocol, every 30 seconds, distance vector Routing Protocol will send entire routing table to adjacent sites, make phase The routing table of neighbors is updated.In this way, it can be from other website (be connected directly or other modes connect) The list of a network is collected, to be routed, distance vector Routing Protocol uses hop count as metric, to calculate Arrive at the destination the router number to be passed through;Another kind is link state routing selection agreement, is primarily referred to as in a link shape In state Route Selection, a node checks the state of all direct link, and resulting status information is sent to and is owned on the net Other nodes, rather than just those nodes being connected directly are issued, each node is in this way, every other Node receives the routing iinformation comprising direct link state from network.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

1. a kind of data sharing method of cloud computing system, which comprises the steps of:
S1, register account number: user carries out the registration of Windows account using internet platform, after register account number, to the account Number the setting of password is carried out, and corresponding close guarantor's problem is set, so that after the account succeeds in registration, after cloud computing platform Platform server is connected with cloud computing platform;
The certification of S2, identity information: when being operated using the Windows account, need to the identity information of user into Row verification;
The input management of S3, data: input management specifically includes the detection of the compression of data, the encryption and decryption of data and data, It specifically includes following aspects:
The compression of M1, data: data file is compressed using ZIP file format by computer, it is not only provided only The function of compression, but also used as filing tool, many files can be stored into same file;
The encryption and decryption of M2, data: for the data rich in technology content, company and individual are unwilling freely to be shared, can It is shared in such a way that data encryption algorithm and encryption key will be changed into ciphertext in plain text, other think pair to people or company The data of the sharing are further understood, and are needed through mobile phone or the corresponding amount of money of PC mobile terminal payment, then cloud computing The key of the encryption data can be sent on the mobile phone or PC mobile terminal of user by the processor of the platform of platform, to both realize Data resource it is shared, while the enthusiasm that corresponding compensation promotes resource sharing is carried out to participator again;
The detection of M3, data: the detection of data includes checking whether locally saving user password, to sensitive privacy information, If whether relation chain and Bank Account Number are encrypted, check whether and be stored in system file, configuration file outside in plain text It in portion's equipment, partially needs to be stored into the information of external equipment, needs all to judge whether information is tampered using preceding every time, check Whether sensitive information has done encryption in network transmission, and important data first use TLS or SSL, forbid network internal Program assembly is by any third party's routine call, when needing the component for external call, should check to whether caller is signed Name limitation;
The classification of S4, data: the database using cloud computing system backstage classifies to source data, including determines class data point Class, ordinal data classification, spacing data classification and fixed than data classification, can be rapidly performed by the classification to data;
The outgoing management of S5, data: the outgoing management of data specifically includes the share and access of Data Transmission Controlling and data;
S6, data reach user terminal: destination address can be found in the local area network of oneself first after data transmission, if local area network In there is no destination address, the router in local area network will be transmitted data to, router is found according to the IP address of destination address Next local area network, if purpose terminal, in next local area network, that just conveys data to the road in next local area network By device, last router gives data production to purpose terminal, is otherwise determined to convey data to that office by this router again It in the net of domain, relays always, until finding purpose user terminal.
2. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that Data Transmission Controlling Four kinds are specifically divided into, program directly controls mode, interrupts control mode, dma mode and channel mode.
3. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that share and access refers to Multiple users may access simultaneously and update identical data, file and collaborative share access can not only for user using data and Data sharing provides more effective way, and can limit if necessary access, so as to use Internet resources and With other network user's shared resources make user be equivalent to using shared resource be as the local resource using oneself it is simple Single and direct, browsing a network file is like a file on browsing user oneself hard disk.
4. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that determine class data classification Refer to classifying data according to category attribute, it is of all categories between be equality coordination, this data are believed without quantity Breath, and cannot be ranked up at of all categories;Data can be not only divided into different classifications by ordinal data classification, but also each Superiority and inferiority can also be compared by sorting between classification;Spacing data are that have the actual measured value of certain unit, at this time not only It is known that had differences between two variables, can also by adding, subtraction accurately calculate the reality between each variable Border gap is how many, it may be said that the accuracy of spacing data is a a progressive step than determining class data and ordinal data, it can be right Actual range between things classification or order measures spacing data classification;It is fixed more same than the data representation of data classification Spacing data are the same, are actual measured value.
5. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that carrying out S1 account Registration when, the sensitive vocabulary contained in Windows account can be detected by the server inside cloud computing platform, to make It obtains and avoids the occurrence of sensitive vocabulary in Windows account, purified the environment of network.
6. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that carrying out S2 identity In the certification of information, system is provided with firewall and IDS anti-intrusion system simultaneously, so that operator is in operation, information is not It can reveal, ensure that the safety of operation.
7. a kind of data sharing method of cloud computing system according to claim 1, which is characterized in that designed in S6 Two kinds of routing algorithm major design: one is distance vector Routing Protocols, and every 30 seconds, distance vector Routing Protocol will be to phase Neighbors sends entire routing table, updates the routing table of adjacent sites.In this way, it can be from other website The list of (connection of be connected directly or other modes) one network of collection, to be routed, distance vector routing Agreement uses hop count as metric, to calculate the router number for arriving at the destination and being passed through;Another kind is link state routing Agreement is selected, is primarily referred to as in a link state routing selection, a node checks the state of all direct link, and will Resulting status information is sent to online all other nodes, rather than just those nodes being connected directly are issued, often All in this way, every other node receives the routing iinformation comprising direct link state to a node from network.
CN201910357727.8A 2019-04-30 2019-04-30 Data sharing method of cloud computing system Active CN110110536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910357727.8A CN110110536B (en) 2019-04-30 2019-04-30 Data sharing method of cloud computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910357727.8A CN110110536B (en) 2019-04-30 2019-04-30 Data sharing method of cloud computing system

Publications (2)

Publication Number Publication Date
CN110110536A true CN110110536A (en) 2019-08-09
CN110110536B CN110110536B (en) 2022-11-08

Family

ID=67487509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910357727.8A Active CN110110536B (en) 2019-04-30 2019-04-30 Data sharing method of cloud computing system

Country Status (1)

Country Link
CN (1) CN110110536B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000691A (en) * 2020-08-21 2020-11-27 武汉原点勘测设计工程有限公司 Geographic information data storage platform and consultation service method
CN113344230A (en) * 2021-06-29 2021-09-03 国网河南省电力公司周口供电公司 Power grid big data safety protection system
CN115221135A (en) * 2022-07-21 2022-10-21 东营国图信息科技有限公司 Industrial internet data sharing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281368A (en) * 2013-05-22 2013-09-04 河海大学 Data sharing exchange model and method based on cloud computation
CN103457733A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data sharing method and system under cloud computing environment
CN103546495A (en) * 2012-07-09 2014-01-29 上海博路信息技术有限公司 Device data sharing method
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
US20140122608A1 (en) * 2012-03-05 2014-05-01 Tencent Technologyy (Shenzhen) Company Limited Resource sharing method and device, and storage medium
CN106027552A (en) * 2016-06-30 2016-10-12 中经汇通电子商务有限公司 Method and system for accessing cloud storage data by user
CN107124278A (en) * 2017-03-30 2017-09-01 腾讯科技(深圳)有限公司 Method for processing business, device and data-sharing systems
US20190012335A1 (en) * 2016-02-24 2019-01-10 Optim Corporation Data sharing system, data sharing method, and program
CN109451067A (en) * 2018-12-27 2019-03-08 宝鸡文理学院 Data sharing method in cloud computing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140122608A1 (en) * 2012-03-05 2014-05-01 Tencent Technologyy (Shenzhen) Company Limited Resource sharing method and device, and storage medium
CN103546495A (en) * 2012-07-09 2014-01-29 上海博路信息技术有限公司 Device data sharing method
CN103281368A (en) * 2013-05-22 2013-09-04 河海大学 Data sharing exchange model and method based on cloud computation
CN103457733A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data sharing method and system under cloud computing environment
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
US20190012335A1 (en) * 2016-02-24 2019-01-10 Optim Corporation Data sharing system, data sharing method, and program
CN106027552A (en) * 2016-06-30 2016-10-12 中经汇通电子商务有限公司 Method and system for accessing cloud storage data by user
CN107124278A (en) * 2017-03-30 2017-09-01 腾讯科技(深圳)有限公司 Method for processing business, device and data-sharing systems
CN109451067A (en) * 2018-12-27 2019-03-08 宝鸡文理学院 Data sharing method in cloud computing system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000691A (en) * 2020-08-21 2020-11-27 武汉原点勘测设计工程有限公司 Geographic information data storage platform and consultation service method
CN113344230A (en) * 2021-06-29 2021-09-03 国网河南省电力公司周口供电公司 Power grid big data safety protection system
CN113344230B (en) * 2021-06-29 2022-10-18 国网河南省电力公司周口供电公司 Power grid big data safety protection system
CN115221135A (en) * 2022-07-21 2022-10-21 东营国图信息科技有限公司 Industrial internet data sharing method and system

Also Published As

Publication number Publication date
CN110110536B (en) 2022-11-08

Similar Documents

Publication Publication Date Title
AU2019261802C1 (en) Computer network threat assessment
US20200356666A1 (en) Techniques for sharing network security event information
Wang et al. GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs
Hu et al. A blockchain-based reward mechanism for mobile crowdsensing
Nowak et al. Verticals in 5G MEC-use cases and security challenges
CN101610264B (en) Firewall system, safety service platform and firewall system management method
CN110110536A (en) A kind of data sharing method of cloud computing system
EP3149582B1 (en) Method and apparatus for a scoring service for security threat management
Liu et al. A semi-centralized trust management model based on blockchain for data exchange in iot system
CN103179100B (en) A kind of method and apparatus preventing domain name system Tunnel Attack
CN103490884A (en) System and method for verification of digital certificates
TW201404073A (en) Techniques to monitor connection pathson networked devices
US10129281B2 (en) Latency-based detection of covert routing
CN102333096A (en) Creditworthiness control method and system for anonymous communication system
CN107409119A (en) Prestige is determined by network characteristic
US20200059491A1 (en) Generation of security policies for microsegmented computer networks
Mathew et al. Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey
Sergey et al. Cyber security concept for Internet of Everything (IoE)
US20240089300A1 (en) Applying overlay network policy based on users
WO2021137753A1 (en) Electronic authentication system and process using the same
Kumari et al. A critical analysis of privacy and security on social media
JP4393580B1 (en) Service system
CN107040401A (en) Wired local network user management system and method with safety and function expansion
Khan et al. Lucy with agents in the sky: trustworthiness of cloud storage for industrial internet of things
Alam IoT-fog-blockchain framework: Opportunities and challenges

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230206

Address after: Room 227-6, Floor 2, Building 1, Incubator, Wenzhou National University Science Park, No. 50, Dongfang South Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province, 325000

Patentee after: Wenzhou Zhongtong Enterprise Management Co.,Ltd.

Address before: 325000 Wenzhou City National University Science Park incubator, No. 38 Dongfang South Road, Ouhai District, Wenzhou, Zhejiang

Patentee before: WENZHOU VOCATIONAL & TECHNICAL College

Effective date of registration: 20230206

Address after: 510000, No. 106, Fengze East Road, Nansha District, Guangzhou City, Guangdong Province (self-compiled building 1) X1301-E011212 (cluster registration) (JM)

Patentee after: Guangzhou Specialized Enterprise Information Technology Co.,Ltd.

Address before: Room 227-6, Floor 2, Building 1, Incubator, Wenzhou National University Science Park, No. 50, Dongfang South Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province, 325000

Patentee before: Wenzhou Zhongtong Enterprise Management Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230601

Address after: Room 818, No. 2063 Kongjiang Road, Yangpu District, Shanghai, 200082

Patentee after: Shanghai Bencai Culture Communication Co.,Ltd.

Address before: 510000, No. 106, Fengze East Road, Nansha District, Guangzhou City, Guangdong Province (self-compiled building 1) X1301-E011212 (cluster registration) (JM)

Patentee before: Guangzhou Specialized Enterprise Information Technology Co.,Ltd.